Skip to main content

2017 | OriginalPaper | Buchkapitel

Breaching the Privacy of Israel’s Paper Ballot Voting System

verfasst von : Tomer Ashur, Orr Dunkelman, Nimrod Talmon

Erschienen in: Electronic Voting

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

An election is a process through which citizens in liberal democracies select their governing bodies, usually through voting. For elections to be truly honest, people must be able to vote freely without being subject to coercion; that is why voting is usually done in a private manner. In this paper we analyze the security offered by a paper-ballot voting system that is used in Israel, as well as several other countries around the world. We provide an algorithm which, based on publicly-available information, breaks the privacy of the voters participating in such elections. Simulations based on real data collected in Israel show that our algorithm performs well, and can correctly recover the vote of up to 96% of the voters.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
The Inter-Parliamentary Union (IPU) is an international organization of 162 state parliaments and 10 regional parliaments. This union, which was established in 1889, has a permanent observer status at the United Nations and general consultative status with the Economic and Social Council.
 
2
The Knesset is the name of the Israeli parliament.
 
3
We stress that the count is done locally, and the votes of each ballot box are not mixed with other boxes.
 
4
Absentee votes (that is, voters who do not vote in their assigned ballot, such as diplomats, soldiers, and seamen), which account to about 5% of the votes, are excluded for simplicity.
 
5
This independence implies that an adversary can focus their effort on subsets of polling stations which are of interest, or where they expect to achieve a high success rate.
 
6
When \(T=7\) the first count is done after 3 h.
 
7
Sometimes referred to as “secular”.
 
8
Due to the somewhat unstable political system of Israel, a large amount of people cannot find their political home in any of the existing parties, and tend to vote in every elections cycle to a newly “trending” party. Moreover, parties often split, merge, or change their names.
 
Literatur
1.
Zurück zum Zitat Agrawal, D., Kesdogan, D.: Measuring anonymity: the disclosure attack. IEEE Secur. Priv. 1(6), 27–34 (2003)CrossRef Agrawal, D., Kesdogan, D.: Measuring anonymity: the disclosure attack. IEEE Secur. Priv. 1(6), 27–34 (2003)CrossRef
3.
Zurück zum Zitat Ashur, T., Dunkelman, O.: On the anonymity of Israel’s general elections. In: Sadeghi, A.-R., Gligor, V.D., Yung, M. (eds.) 2013 ACM SIGSAC Conference on Computer and Communications Security, CCS 2013, Berlin, Germany, 4–8 November 2013, pp. 1399–1402. ACM, New York (2013) Ashur, T., Dunkelman, O.: On the anonymity of Israel’s general elections. In: Sadeghi, A.-R., Gligor, V.D., Yung, M. (eds.) 2013 ACM SIGSAC Conference on Computer and Communications Security, CCS 2013, Berlin, Germany, 4–8 November 2013, pp. 1399–1402. ACM, New York (2013)
6.
Zurück zum Zitat Bernhard, D., Cortier, V., Pereira, O., Warinschi, B.: Measuring vote privacy, revisited. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, pp. 941–952. ACM (2012) Bernhard, D., Cortier, V., Pereira, O., Warinschi, B.: Measuring vote privacy, revisited. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, pp. 941–952. ACM (2012)
7.
Zurück zum Zitat Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24(2), 84–88 (1981)CrossRef Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24(2), 84–88 (1981)CrossRef
10.
Zurück zum Zitat Danezis, G.: Statistical disclosure attacks. In: Gritzalis, D., Capitani di Vimercati, S., Samarati, P., Katsikas, S. (eds.) SEC 2003. IFIP, vol. 122, pp. 421–426. Springer, Heidelberg (2003). doi:10.1007/978-0-387-35691-4_40 CrossRef Danezis, G.: Statistical disclosure attacks. In: Gritzalis, D., Capitani di Vimercati, S., Samarati, P., Katsikas, S. (eds.) SEC 2003. IFIP, vol. 122, pp. 421–426. Springer, Heidelberg (2003). doi:10.​1007/​978-0-387-35691-4_​40 CrossRef
11.
Zurück zum Zitat Delaune, S., Kremer, S., Ryan, M.: Verifying privacy-type properties of electronic voting protocols: a taster. In: Chaum, D., Jakobsson, M., Rivest, R.L., Ryan, P.Y.A., Benaloh, J., Kutylowski, M., Adida, B. (eds.) Towards Trustworthy Elections. LNCS, vol. 6000, pp. 289–309. Springer, Heidelberg (2010). doi:10.1007/978-3-642-12980-3_18 CrossRef Delaune, S., Kremer, S., Ryan, M.: Verifying privacy-type properties of electronic voting protocols: a taster. In: Chaum, D., Jakobsson, M., Rivest, R.L., Ryan, P.Y.A., Benaloh, J., Kutylowski, M., Adida, B. (eds.) Towards Trustworthy Elections. LNCS, vol. 6000, pp. 289–309. Springer, Heidelberg (2010). doi:10.​1007/​978-3-642-12980-3_​18 CrossRef
14.
Zurück zum Zitat Kesdogan, D., Agrawal, D., Penz,S.: Limits of anonymity in open environments. Inf. Hiding, 53–69 (2002) Kesdogan, D., Agrawal, D., Penz,S.: Limits of anonymity in open environments. Inf. Hiding, 53–69 (2002)
15.
Zurück zum Zitat Kesdogan, D., Pimenidis, L.: The hitting set attack on anonymity protocols. Inf. Hiding, 326–339 (2004) Kesdogan, D., Pimenidis, L.: The hitting set attack on anonymity protocols. Inf. Hiding, 326–339 (2004)
16.
Zurück zum Zitat Küsters, R., Truderung, T., Vogt, A.: A game-based definition of coercion-resistance and its applications. In: 2010 23rd IEEE Computer Security Foundations Symposium, pp. 122–136. IEEE (2010) Küsters, R., Truderung, T., Vogt, A.: A game-based definition of coercion-resistance and its applications. In: 2010 23rd IEEE Computer Security Foundations Symposium, pp. 122–136. IEEE (2010)
17.
Zurück zum Zitat Küsters, R., Truderung, T., Vogt, A.: Verifiability, privacy, and coercion-resistance: new insights from a case study. In: 2011 IEEE Symposium on Security and Privacy (SP), pp. 538–553. IEEE (2011) Küsters, R., Truderung, T., Vogt, A.: Verifiability, privacy, and coercion-resistance: new insights from a case study. In: 2011 IEEE Symposium on Security and Privacy (SP), pp. 538–553. IEEE (2011)
18.
Zurück zum Zitat Tianbo, L., Yao, P., Zhao, L., Li, Y., Xie, F., Xia, Y.: Towards attacks and defenses of anonymous communication systems. Int. J. Secur. Appl. 9(1), 313–328 (2015) Tianbo, L., Yao, P., Zhao, L., Li, Y., Xie, F., Xia, Y.: Towards attacks and defenses of anonymous communication systems. Int. J. Secur. Appl. 9(1), 313–328 (2015)
22.
Zurück zum Zitat Troncoso, C., Gierlichs, B., Preneel, B., Verbauwhede, I.: Perfect matching disclosure attacks. Priv. Enhanc. Technol., 2–23 (2008) Troncoso, C., Gierlichs, B., Preneel, B., Verbauwhede, I.: Perfect matching disclosure attacks. Priv. Enhanc. Technol., 2–23 (2008)
Metadaten
Titel
Breaching the Privacy of Israel’s Paper Ballot Voting System
verfasst von
Tomer Ashur
Orr Dunkelman
Nimrod Talmon
Copyright-Jahr
2017
DOI
https://doi.org/10.1007/978-3-319-52240-1_7