Attacking and fixing Helios: An analysis of ballot secrecy (bibtex)
by Véronique Cortier, Ben Smyth
Abstract:
Helios 2.0 is an open-source web-based end-to-end verifiable electronic voting system, suitable for use in low-coercion environments. In this article, we analyse ballot secrecy in Helios and discover a vulnerability which allows an adversary to compromise the privacy of voters. The vulnerability exploits the absence of ballot independence in Helios and works by replaying a voter's ballot or a variant of it, the replayed ballot magnifies the voter's contribution to the election outcome and this magnification can be used to violated privacy. We demonstrate the practicality of the attack by violating a voter's privacy in a mock election using the software implementation of Helios. Moreover, the feasibility of an attack is considered in the context of French legislative elections and, based upon our findings, we believe it constitutes a real threat to ballot secrecy. We present a fix and show that our solution satisfies a formal definition of ballot secrecy using the applied pi calculus. Furthermore, we present similar vulnerabilities in other electronic voting protocols -- namely, the schemes by Lee et al., Sako & Kilian, and Schoenmakers -- which do not assure ballot independence. Finally, we argue that independence and privacy properties are unrelated, and non-malleability is stronger than independence.
Reference:
Attacking and fixing Helios: An analysis of ballot secrecy (Véronique Cortier, Ben Smyth), In Journal of Computer Security, IOS Press, volume 21, 2013.
Bibtex Entry:
@article{2012-attacking-ballot-secrecy-in-Helios,
  author = {V\'{e}ronique Cortier and Ben Smyth},
  title = "{Attacking and fixing Helios: An analysis of ballot secrecy}",
  journal = "Journal of Computer Security",
  year = {2013},
  volume    = {21},
  number    = {1},
  pages     = {89--148},
  url = {http://www.bensmyth.com/publications/2012-attacking-ballot-secrecy-in-Helios/},
	pdf = {http://www.bensmyth.com/files/Smyth12-attacking-Helios.pdf},
	abstract = {Helios 2.0 is an open-source web-based end-to-end verifiable electronic voting system, suitable for use in low-coercion environments. In this article, we analyse ballot secrecy in Helios and discover a vulnerability which allows an adversary to compromise the privacy of voters. The vulnerability exploits the absence of ballot independence in Helios and works by replaying a voter's ballot or a variant of it, the replayed ballot magnifies the voter's contribution to the election outcome and this magnification can be used to violated privacy. We demonstrate the practicality of the attack by violating a voter's privacy in a mock election using the software implementation of Helios. Moreover, the feasibility of an attack is considered in the context of French legislative elections and, based upon our findings, we believe it constitutes a real threat to ballot secrecy. We present a fix and show that our solution satisfies a formal definition of ballot secrecy using the applied pi calculus. Furthermore, we present similar vulnerabilities in other electronic voting protocols -- namely, the schemes by Lee et al., Sako & Kilian, and Schoenmakers -- which do not assure ballot independence. Finally, we argue that independence and privacy properties are unrelated, and non-malleability is stronger than independence.},
  x-language = {EN},
  x-audience = {international},
 publisher = {IOS Press}
}
Powered by bibtexbrowser