Next:  Accuracy
Up:  Design and Implementation 
 Previous:  Cryptographic Polling Protocols
 
 
We outlined seven desirable properties of polling systems in Section
2.  In this section we will evaluate Sensus' ability to satisfy these
properties.
While evaluating the security and privacy aspects of the Sensus
system, we make a few assumptions.
-  We assume that a vote cannot be linked to a particular voter by
  tracing the packets in which the vote is delivered to the tallier
  back to the sender.  Thus, we assume all communication between voter
  and election authorities occurs over an anonymous channel.  This is
  not necessarily the case using the current Sensus implementation;
  however, an anonymous channel could be secured through the use of a
  chain of World Wide Web forwarding servers.
 -  We assume that the voter is using a computer system in which it
  is not possible for clear text messages to be intercepted.  Thus we
  assume no parts of the voter's computer system can be snooped
  through physical or electronic means.  The voter's privacy while
  casting the vote can only be violated if the voter allows someone to
  look over his or her shoulder.  This is, of course, not the case if
  the voter is using a multi-user system where other users have root
  privileges.
 -  We assume that messages from voters will not arrive at the
  validator and tallier in the same order, allowing the validator and
  tallier to collude to link ballots with the voters who cast them.
  This assumption is valid given a voter population large enough that
  multiple voters are likely to attempt to vote at approximately the
  same time.  In addition, voters concerned about this type of
  collusion need not submit their ballots to the tallier immediately
  after obtaining validation certificates from the validator.
 -  We assume that all encryption algorithms used are sufficiently
  strong that encrypted messages cannot be decrypted without the
  proper keys.  Thus, security in the current implementation is based
  on the strength of RSA.
 
 
 
   
   
         
 Next:  Accuracy
Up:  Design and Implementation 
 Previous:  Cryptographic Polling Protocols
 
 
 
Lorrie Faith Cranor 
Sun Nov  5 20:54:12 CST 1995