Helios Voting

Helios Voting is an open-source, web-based electronic voting system, primarily developed by Ben Adida.[3][4] The front-end browser code is written in both JavaScript and HTML, while the back-end server code is written in python.[5] The Ballot Preparation System (BPS) guides voters through the ballot and records their choices.[6][7] The process to create the ballot and process the votes is based on Benaloh's Simple Verifiable Voting Protocol.[8][6]

Helios Voting
Type of site
Open-source voting system
Founder(s)Ben Adida
URLhttps://heliosvoting.org/
Written inJavaScript, HTML, python
server
Repository
Written inPython
LicenseApache License 2.0 [1]
Websiteheliosvoting.org/ 
client
Repository
Written inJavaScript
LicenseGNU GPL 3+ [2]
Websiteheliosvoting.org/ 

Users can vote in elections and users can create elections. Anyone can cast a ballot; however, for the final vote to be counted, the voter's identification must be verified. Helios uses homomorphic encryption to ensure ballot secrecy.[9]

Creating an Election

A user must have a Helios account in order to create an election. A Helios account requires a user to provide an email address, name, and a password. The registered user can then create an election by specifying a name and time period. The user who created the election is known as the administrator of the election.[6] Once an election is created, Helios provides a public key to the administrator. The administrator prepares the ballot and creates a voter roll—these can be edited at any time before voting starts. The administrator freezes the election when the election is ready for voters to cast ballots. When the election is frozen, no changes can be made to the ballot, voter roll, or election time frame[6]

Voting Process

A voter, from the voting roll created by the administrator, receives an email with the voter's username, a random password for that specific election, a URL to the voting booth, and an SHA-1 hash of the election parameters. The voter follows the link in the email and begins the voting process. Once the voter finishes and has reviewed the ballot, the voter seals the ballot which triggers Helios to encrypt it and display a ciphertext.[6]

At this point the voter can either audit or cast the ballot. Auditing the ballot allows the voter to verify that the ciphertext is correct. Once ballot auditing is complete, that ballot is discarded (to provided some protection against vote-buying and coercion) and a new ballot is constructed. When the voter is ready to cast their ballot, they must provide their login information.[6][10] Helios authenticates the voter's identity and the ballot is cast. All votes are posted to a public online bulletin board which displays either a voter name or a voter ID number with the encrypted vote. [6]

Tallying Process

After an election ended, the Helios 1.0 system shuffled the ballots, decrypted all the votes, and made the shuffle publicly accessible for interested parties to audit.[11] Auditing allowed anyone to verify that the shuffle is correct. Once a reasonable amount of time for auditing had passed, Helios decrypted the ballots and tallied the votes. Anyone could download the election data to verify that the shuffle, decryptions, and tally were correct.[6] Helios 2.0, designed in 2008 and currently in use, abandoned the shuffling and switched to a homomorphic encryption scheme proposed by Cramer, Gennaro and Schoenmakers [12].

Deployment

The International Association for Cryptographic Research has used Helios annually since 2010 to elect board members,[13][14] the Association for Computing Machinery used Helios for their 2014 general election,[15] the Universite Catholique de Louvain used Helios to elect its university president in 2009 (of around 25,000 eligible voters, some 5,000 registered and 4,000 voted),[16] and Princeton University has used Helios since 2009 to elect student governments.

System limitations

The Helios platform is intended to be utilized in low-coercive, small scale environments such as university student governments. The following limitations are known.

Privacy:

  • The centralized server must be trusted not to violate ballot secrecy,[6] this limitation can mitigated against by distributing trust amongst several stakeholders.
  • Coercion and vote-buying are only ensured when material used to construct ballots (more precisely, nonces) are unknown to voters, e.g., when trusted devices are used to construct ballots.[6][17]

Verifiability:

  • The ballot construction device must be trusted to ensure successful ballot auditing (also known as cast-as-intended verifiability),[6][18] [18]this limitation can be mitigated against by distributing auditing checks amongst several devices, only one of which must be trusted.

System Weaknesses

  • In 2010 researchers identified a ballot secrecy vulnerability.[16]
  • In 2011 and 2016 researchers identified cross-site scripting vulnerabilities. The first endangers sessions of administrators and was promptly patched.[16] For the second, if the attacker is able to get a voter to click a specially crafted link, the voter will land on a modified HELIOS page which can violate ballot secrecy or manipulate votes.[3] It is unclear if the vulnerability has been fixed as of 2019.
gollark: +>markov 258639553357676545 10
gollark: +>markov 258639553357676545 10
gollark: +>markov 258639553357676545 10
gollark: +>markov 258639553357676545 10
gollark: +>markov 258639553357676545 10

References

  1. https://github.com/benadida/helios-server/blob/master/LICENSE
  2. https://github.com/benadida/helios-booth
  3. Kwon, Soonhak; Yun, Aaram (2016-03-09). Information Security and Cryptology - ICISC 2015: 18th International Conference, Seoul, South Korea, November 25-27, 2015, Revised Selected Papers. Springer. pp. 195, 199. ISBN 9783319308401.
  4. Hao, Feng; Ryan, Peter Y. A. (2016-11-30). Real-World Electronic Voting: Design, Analysis and Deployment. CRC Press. p. 355. ISBN 9781498714716.
  5. Backes, Michael; Hammer, Christian; Pfaff, David; Skoruppa, Malte. "Implementation-level analysis of the JavaScript helios voting client". Retrieved 2018-03-15.
  6. Adida, Ben. "Helios: Web-based Open-Audit Voting" (PDF). Retrieved 2018-03-15.
  7. Thomson, Iain (June 16, 2017). "Worried about election hacking? There's a technology fix – Helios". The Register. Retrieved 2018-04-25.
  8. Karayumak, Faith; Kauer, Michaela; Olembo, Maina M.; Volk, Tobias; Volkamer, Melanie (2011). "User study of the improved Helios voting system interfaces". 2011 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST). pp. 37–44. doi:10.1109/STAST.2011.6059254. ISBN 978-1-4577-1183-1.
  9. Cortier, Veronique; Smyth, Ben. "Attacking and fixing Helios: An analysis of ballot secrecy". Retrieved 2018-03-15.
  10. Greenberg, Andy. "For the Next Election, Don't Recount the Vote. Encrypt It". WIRED. Retrieved 2018-04-25.
  11. Kwon, Soonhak; Yun, Aaram (2016-03-09). Information Security and Cryptology - ICISC 2015: 18th International Conference, Seoul, South Korea, November 25-27, 2015, Revised Selected Papers. Springer. pp. 195, 199. ISBN 9783319308401.
  12. Cramer, Ronald; Gennaro, Rosario; Schoenmakers, Berry (1997). Fumy, Walter (ed.). "A Secure and Optimally Efficient Multi-Authority Election Scheme". Advances in Cryptology — EUROCRYPT ’97. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer: 103–118. doi:10.1007/3-540-69053-0_9. ISBN 978-3-540-69053-5.
  13. "Final Report of IACR Electronic Voting Committee". Retrieved 2019-11-06.
  14. "The Helios e-Voting Demo for the IACR" (PDF). Retrieved 2019-11-06.
  15. "ACM's 2014 General Election: Please Take This Opportunity to Vote". Communications of the ACM. 57 (5): 9–17. doi:10.1145/2597769.
  16. Adida, Ben; Marneffe, Olivier de; Pereira, Olivier; Quisquater, Jean-Jacques. "Electing a University President using Open-Audit Voting:Analysis of real-world use of Helios" (PDF). Retrieved 2018-03-15.
  17. Smyth, Ben. "Ballot secrecy: Security definition, sufficient conditions, and analysis of Helios". Retrieved 2019-11-06.
  18. Adida, Ben. "Helios Documentation: Attacks and Defenses". Retrieved 2019-11-06.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.