Skip to content

Could a malicious election administrator make the trustees live in their own world? #3

@pereira

Description

@pereira

Hi!

It is great to see all this documentation being made public!

I am looking at the threat model document, and am surprised by the absence of direct communication between the trustees and the public bulletin board: the election administrator always seems to stand between them.

What would then prevent a malicious election administrator from running a full trustee key generation ceremony alone, with one set of trustee signing keys that he generated himself and placed in the public election manifest, while the actual trustees live in a different world, in which the election administrator shows a different election manifest containing the "real" trustee public keys (on which they will all agree) and in which the trustees generate an election key that will never make its way to the voting application and bulletin board.

Similarly, would the election administrator be able to present to the trustees a "fake" set of voter signature keys, so that voters would encrypt all their ballots with the election administrator generated election key, which the election administrator would then decrypt, re-encrypt with the public key generated by the trustee, and sign with the "fake" voter signing keys? At the end of such an election, the trustees would feel that they completed their job, obtained and proved the correct outcome that is announced everywhere, except that the election administrator played man-in-the-middle and broke the confidentiality of all the votes.

I wonder if there is a need that, at some points, the trustees actually go out of their air-gapped network and check the public version of the bulletin board and the published version of the election manifest in order to make sure that what they are seeing there is consistent with what they are doing in their air-gapped network.

Concretely, taking the example of the diagram on page 9 (but the same would apply to the diagrams on pages 14 and 15), would it make sense to make the trustees also appear in the Internet area next to the verifier, and to mandate them to perform consistency checks between their view in their role of trustees and the view they are getting from the bulletin board?

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions