On the Security of Election Audits with Low Entropy Randomness
نویسنده
چکیده
Secure election audits require some method of randomly selecting the units to be audited. Because physical methods such as dice rolling or lotterystyle ping pong ball selection are inefficient when a large number of audit units must be selected, some authors have proposed to stretch physical methods by using them to seed randomness tables or random number generators. We analyze the security of these methods when the amount of input entropy is low under the assumption that the attacker can choose the audit units to attack. Our results indicate that under these conditions audits do not necessarily provide the detection probability implied by the standard statistics. This effect is most pronounced for randomness tables, where significantly more units must be audited in order to achieve the detection probability that would be expected if the audit units were selected by a truly random process. It is still unclear whether there are practical methods for safely using such tables for this application.
منابع مشابه
Computational Complexity and Information Asymmetry in Election Audits with Low-Entropy Randomness
We investigate the security of an election audit using a table of random numbers prepared in advance. We show how this scenario can be modeled using tools from combinatorial graph theory and computational complexity theory, and obtain the following results: (1) A randomly generated table can be used to produce a statistically good election audit that requires less randomness to be generated in ...
متن کاملThe Role of Dice in Election Audits – Extended Abstract
Random audits are a powerful technique for statistically verifying that an election was tabulated correctly. Audits are especially useful for checking the correctness of electronic voting machines when used in conjunction with a voter-verified paper audit trail (VVPAT). While laws in many states already require election audits, they generally do not address the procedure for generating the rand...
متن کاملImproving Tor security against timing and traffic analysis attacks with fair randomization
The Tor network is probably one of the most popular online anonymity systems in the world. It has been built based on the volunteer relays from all around the world. It has a strong scientific basis which is structured very well to work in low latency mode that makes it suitable for tasks such as web browsing. Despite the advantages, the low latency also makes Tor insecure against timing and tr...
متن کاملAaron Burstein , Joseph Lorenzo Hall and Margaret Chen Brennan Center for Justice at New York University School of Law and the
Random audits are a powerful technique for statistically verifying that an election was tabulated correctly. Audits are especially useful for checking the correctness of electronic voting machines when used in conjunction with a voter-verified paper audit trail (VVPAT). While laws in many states already require election audits, they generally do not address the procedure for generating the rand...
متن کاملPrincipal Investigator ’ s Statement on Protection of Security - Sensitive Information
We present an independent security evaluation of the AccuVote Optical Scan voting terminal (AV-OS).We identify a number of new vulnerabilities of this system which, if exploited maliciously, can invalidatethe results of an election process utilizing the terminal. Furthermore, based on our findings an AV-OScan be compromised with off-the-shelf equipment in a matter of minutes even if...
متن کامل