Skip to content

Questions about how E2E-V would work in deployments #2

@vteague

Description

@vteague

Hi @kiniry, and all, I’ve started (but not finished) reading the docs, and I have a few high-level questions to make sure that I understand the threat model / trust model. I have mostly been reading https://github.com/FreeAndFair/VoteSecure/blob/main/docs/conops/conops.md

I understand that this is an SDK, not a voting system, but since the concept of operations seems relatively advanced it seems fair to ask about it. Of course, it’s the complexities of input and output that make Internet voting so hard.

  1. It looks like no receipt-freeness claim is being made. From a receipt-freeness perspective it’s very similar to Helios: a minor client-side modification could retain randomness and hence allow voters to prove how they voted. Am I understanding that right?

  2. Is there a verification spec somewhere?

  3. Cast-as-intended verification. It looks like the adversary may compromise the voting client, and I see in Conops - Environment there’s an assumption that malicious apps on the voter’s phone may leverage their presence to compromise the voting application. That makes sense. However, it also looks as if the Ballot Check application runs on the same phone. So I have three questions.
    a. What exactly is the threat model?
    b. Why is it reasonable to assume that the adversary can leverage cross-app security issues to compromise the voting application but not the checking application?
    c. Is there an easy way for voters to verify from another device?

  4. Are the mixing and decryption proofs published on the public BB?
    a. If not, would you still claim E2E-V?
    b. If so, why does the data need to be transferred via USB stick to the Trustee Servers rather than letting the Trustees read the data off the BB?

  5. What exactly is the trust assumption on the Trustee servers? Obviously they must be trusted (on a threshold basis) for privacy. Is there also an integrity trust assumption? (This relates to whether the decryption proofs are on the public BB or not.)

  6. Conops - Environment says “It is assumed that advanced persistent threats (APTs) have access to all environments.” Does that include the printer? To put it another way, if the printer substituted a ballot, what part of the verification process would detect the substitution?

  7. How does the threat model, in terms of both privacy and verifiability, compare with those of the Swisspost system, Belenios, Helios, or others?

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions