(opens in new tab)<\/span><\/a>: Sign up to receive the latest news from Microsoft Research<\/li>\n<\/ul>\n
\nFinal Transcript<\/h3>\n
Josh Benaloh: Elections in the US are conducted mostly at the county level. There are over 4,000 counties in the US. There are over 8,000 separate election jurisdictions in the US. And the thought that a small county, somewhere, maybe in an important swing state, could have enough cyber security in place to withstand an attack from state-level attackers is just not realistic. Even though we can\u2019t defend an election from being tampered with, we can institute good auditing. And one method of good auditing is this end-to-end verifiability that allows you, as a voter, to see whether your vote has been changed.<\/p>\n
Host: You\u2019re listening to the Microsoft Research Podcast, a show that brings you closer to the cutting-edge of technology research and the scientists behind it. I\u2019m your host, Gretchen Huizinga.<\/strong><\/p>\nHost: If you\u2019ve ever wondered why, in the age of the internet, we still don\u2019t hold our elections online, you need to spend more time with Dr. Josh Benaloh, Senior Cryptographer at Microsoft Research in Redmond. Josh knows a lot about elections, and even more about homomorphic encryption, the mathematical foundation behind the end-to-end verifiable election systems that can dramatically improve election integrity today, and perhaps move us toward wide-scale online voting in the future.<\/strong><\/p>\nToday, Dr. Benaloh gives us a brief, but fascinating, history of elections, explains how the trade-offs among privacy, security and verifiability make the relatively easy math of elections such a hard problem for the internet, and tells the story of how the University of Michigan fight song forced the cancellation of an internet voting pilot. That and much more on this episode of the Microsoft Research Podcast.<\/strong><\/p>\n(music plays)<\/strong><\/p>\nHost: Josh Benaloh, welcome to the podcast.<\/strong><\/p>\nJosh Benaloh: Thank you so much.<\/p>\n
Host: Your bio begins by saying that you\u2019re a Senior Cryptographer at Microsoft Research. What does a senior cryptographer do for a living? What gets you up in the morning?<\/strong><\/p>\nJosh Benaloh: It varies quite a bit. I tend to have a foot in a few different places. I do research on elections in particularly, but cryptographic protocols more generally, multi-party protocols. I do policy work of various sorts and I spend a lot of my time doing internal consulting with Microsoft product groups.<\/p>\n
Host: So, what do you do when you consult with a product group? Do you give them insights into why they\u2019re not as safe as they think they are or\u2026?<\/strong><\/p>\nJosh Benaloh: Well, there are a few aspects to this. There\u2019s a benefit to having one part of me in the research side and one part of me in the practitioner side, because I know what is being developed, I know what\u2019s coming down the pike. So, I can talk to product groups about how they should do things. Cryptography is very subtle. It seems easy. There are some books out there that are very popular that people read and think, \u201cOkay, I understand this all.\u201d And when I go into somebody\u2019s office and I see this on the shelf, I know I have a hard time ahead of me.<\/p>\n
Host: What, Cryptography for Dummies, or\u2026?<\/strong><\/p>\nJosh Benaloh: There are books with titles like Applied Cryptography or Practical Cryptography that often oversimplify things. And just the order in which you do certain steps can make a critical difference. So, if I can go to a product team and they show me what they\u2019re doing, and I can say, \u201cNo, if you do A before B, you\u2019re going to have a problem, you\u2019re going to regret it, do B before A\u2026\u201d<\/p>\n
Host: So, do they seek you out, the product groups, as, \u201cHelp us out here, Josh?\u201d Or do you go around and say, \u201cHey, you guys need this?\u201d<\/strong><\/p>\nJosh Benaloh: It\u2019s almost always seeking out. But there are a lot of different ways in which I can work with product groups. For about the past, I think fourteen years, we\u2019ve had something called a Crypto Board at Microsoft. And the Crypto Board is responsible for multiple tasks. One of them is setting corporate policy for how cryptography is used. Another is working with product groups to try to consult and help them.<\/p>\n
Host: Well, let\u2019s talk about this concept of security. We\u2019re doing so much on the internet these days, and arguably we\u2019re going to do more and more. And yet, the internet was not designed with security in mind. So, what are folks like you doing about that?<\/strong><\/p>\nJosh Benaloh: Yeah, it\u2019s certainly true that the internet was not designed for security. The internet was designed by a few people who knew each other very well and they were trying to set things up so that they could communicate with each other, and there was no sense, in the initial designs of the internet, of having to secure it against malicious forces. More recently, we\u2019ve had to build security on top of the internet. If we had designed it initially with security at the base, it would have been a lot easier. Cryptography is an important tool in trying to secure it in a variety of ways: trying to keep data private, trying to make sure that the people you\u2019re talking to are the people who you think you\u2019re talking to, trying to maintain integrity of data, which is distinct from privacy of data, and basically \u201cI should have access to the data that I\u2019m entitled to have access to, and I should not have access to the data that I\u2019m not entitled to.\u201d In practice, although cryptography is an important tool there, and it\u2019s very widely used now, most breaks of the internet are not about the cryptography. Most breaks are, maybe, the use of the cryptography or the implementation of the cryptography or things that even go around the cryptography. We\u2019ve essentially got a very good front door, but the windows and the back door and other parts of the house that we\u2019re trying to protect are more vulnerable.<\/p>\n
Host: All right, we\u2019re going to come back to that \u201cwhat freaks me out at night\u201d kind of thing\u2026 I was going to say, what keeps you up at night? That freaks me out at night. All right, Josh, let\u2019s talk about securing the vote.<\/strong><\/p>\nJosh Benaloh: OK!<\/p>\n
Host: First, could you give us a little election history? I mean, I don’t know that people think about how we\u2019re voting now and how it used to be and how it\u2019s changed, but I think that would be a good level-set for launching into what you\u2019re doing with election security now.<\/strong><\/p>\nJosh Benaloh: Sure. Well, voting certainly goes back for millennia, and attempts at voting secretly go back for millennia. Public votes are difficult to tamper with in the sense of tampering with the votes themselves. But of course, when votes are public, then votes are coercible, and people can sell their votes or have their arms twisted into voting in particular ways. The history is not a pretty one. People have been stealing elections for centuries.<\/p>\n
Host: As long as they\u2019ve been voting.<\/strong><\/p>\nJosh Benaloh: Yes.<\/p>\n
Host: Vote for me!<\/strong><\/p>\nJosh Benaloh: It\u2019s interesting to note that most US Presidents were elected without the benefit of the secret ballot. The secret ballot in large elections actually was a technological innovation when it came about in the mid-19th Century. So, the way that people voted for president or many offices was typically, you would go to a public space and you would announce in some public way what your vote was, and that makes it easy to tell who\u2019s voting and that only authorized people are voting, and that the votes are being counted properly, but it enables coercion and vote selling. The way that we vote in a poll site, in-person voting, was a technological advance in the 1850s. It\u2019s typically called the Australian ballot, the process wherein people are voting in private within a public space so that the fact that they are voting privately is publicly monitored and enforced. So, this was an innovation at the time, and it took a while to move around the world. In the US, the number of US Presidents is different from the number of the US President, because Grover Cleveland was president number 22 and number 24. And that actually came about because of the lack of a secret ballot. So, in 1884, Grover Cleveland was elected without a secret ballot. In 1888, his competitor Benjamin Harrison defeated him, again, without a secret ballot, in an election that was utterly rife with vote selling, with coercion. And it was so bad at that time, that the US moved very quickly to secret ballots, and in the election of 1892, there was a rematch between Grover Cleveland and Benjamin Harrison, and with the benefit of the secret ballot, Grover Cleveland won again and became the 24th president.<\/p>\n
(music plays)<\/strong><\/p>\nHost: Okay, so we\u2019ve got the secret ballot now. Since the mid-19th century, lots of stuff has happened, technologically, and the size of the country, and\u2026 So where are we now? Give us a lay of the land of what the unique problems are and what you\u2019re doing, with technology, to work on these big problems.<\/strong><\/p>\nJosh Benaloh: Well, if we look at elections broadly, they\u2019re much harder than most other problems. The thing about banking or e-commerce or other fields is that, if something goes wrong, I know about it. I can have an opportunity to correct it. If my vote is changed, I don\u2019t know it. There\u2019s no way for me to discover that my vote has been altered, much less correct it. That\u2019s of course within the context of the secret ballot. Of course, if we gave up on the secret ballot, then it would be very easy. We could have a public vote in which people cast their votes in person, by mail, over the internet, even by carrier pigeon. They just make their intentions known to the voting office, and the voting office publishes a list on a webpage somewhere, digitally signed for integrity purposes, so that everybody can look at the list and see, yup, my vote is there, it\u2019s correct. I can see all the other people who are voting. I can check that they are legitimate voters, at least according to the registration lists. Of course, the accuracy of registration lists is another question, but that\u2019s a little bit out of scope here, and that\u2019s a public process.<\/p>\n
Host: Right? Scope creep.<\/strong><\/p>\nJosh Benaloh: Yes. But I can check that everybody else who\u2019s listed there is supposedly a legitimate voter and that they have had an opportunity to check the list as well, because the list is public, and I can add up the votes on the list myself.<\/p>\n
Host: But that\u2019s not going to happen.<\/strong><\/p>\nJosh Benaloh: Yes. So, it turns out, it\u2019s possible to achieve all of these things with a secret ballot. And this is where cryptography comes in. With just a little bit of cryptographic sauce in just the right places, it\u2019s not that hard to achieve the same things. And the basic trick is, we can still have a public list, but the public list is not of my vote, directly, but it\u2019s of my encrypted vote, and everybody else\u2019s encrypted votes. So, you can still check that you\u2019re on the list. You can still check who else has voted. But now you need means for checking that the encrypted votes really do correspond to the tally. That\u2019s all math, and cryptographically, we can do that. We can compute on encrypted data in such a way that we can process the data in encrypted form, turn it into an encrypted tally, and then provably decrypt that tally so that anybody can check and confirm the whole process and say, yep, this all looks good. We also need to provide tools that allow voters to be certain that the encrypted votes next to their names, which are opaque, really correspond to their selections. And that seems hard, but it turns out there are some pretty good ways of doing that that are quite effective, and we can make that happen as well. And I should try to be clear. I\u2019m describing one process, but there\u2019s this notion that\u2019s called end-to-end verifiability, that enables this kind of election verification to take place.<\/p>\n
Host: Talk a little bit about end-to-end verification. It\u2019s a definition\u2026<\/strong><\/p>\nJosh Benaloh: Yes\u2026<\/p>\n
Host: \u2026but there\u2019s many ways to get to it.<\/strong><\/p>\nJosh Benaloh: Exactly.<\/p>\n
Host: Could you break that down?<\/strong><\/p>\nJosh Benaloh: Sure. The definition of end-to-end verifiability is the properties that I just described. Voters should be able to check that their own votes have been properly recorded. And voters should be able to check that all of the recorded votes have been properly tallied. You might think that\u2019s missing a little bit, that, well, but I can\u2019t check that your vote has been properly recorded. But in some sense, that\u2019s not really possible in any means without my knowing what your vote is.<\/p>\n
Host: Right.<\/strong><\/p>\nJosh Behaloh: So, this is really the most we can hope to have, and this is what we achieve in a public election. The challenge now is to achieve the same thing with a secret ballot election, and that\u2019s where the cryptography comes in. And there turn out to be multiple ways of achieving these goals. Some very creative ways have come up for both parts, for the checking that votes have been recorded properly, and for the tallying. But the tallying tends to be highly cryptographic either by using homomorphic tallying methods, which compute on encrypted data and transform these individual encrypted votes into encrypted tallies, or there\u2019s another approach that\u2019s commonly used called a mix-net, which is basically a cryptographic shuffle of the ballots which has some benefits. It also has some privacy concerns, so there are trade-offs. But it\u2019s good to have both techniques available.<\/p>\n
Host: Well, and in fact, we\u2019re going to have trade-offs no matter what. I mean, it\u2019s just a matter of what is the sweet spot for what we\u2019re willing to reveal versus what we want to keep private?<\/strong><\/p>\nJosh Benaloh: Yes, and that manifests itself very distinctly in the election context, because you would think that it would be a good thing to have all the ballots be public in the end. But if the ballots are public, then it allows voters to sell their votes, once again, by various little tricks. You know, for instance, if I work for a small company, say, with a couple hundred employees, and the owner of the company is running for mayor, the owner can say, I want everybody in the company to vote for me as mayor, and there\u2019s some minor office down at the bottom of the ballot, you know, dogcatcher type of office. Write in your own name there, and I will now look at all the public ballots that have been published and make sure that for each of you there is a ballot of that form, and if I don\u2019t see a ballot with your name for dogcatcher and my name for mayor, don\u2019t bother coming to work tomorrow.<\/p>\n
Host: Interesting\u2026<\/strong><\/p>\nJosh Benaloh: And that is a sort of an obvious way of revealing things, but there are less obvious ways that can be used that are collectively called pattern voting, where a different pattern is assigned to each voter of the low-level contests. And that pattern had better appear. If a town council has ten different seats, then there are ten factorial ways of ordering the names, and the local controlling entities could just…<\/p>\n
Host: Shall we say?<\/strong><\/p>\nJosh Benaloh: Yes\u2026 could just go around and assign a different permutation to each voter and say, if this permutation doesn\u2019t appear on a ballot, then whatever consequences might occur\u2026<\/p>\n
Host: Suddenly, Josh don\u2019t feel so good.<\/strong><\/p>\nJosh Benaloh: Exactly.<\/p>\n
Host: You know, there\u2019s another side of it too, in the 21st century, where, if your vote was made public, it wouldn\u2019t just be the vote-buying thing, it would be the Twitter-mobbing afterwards if somebody decided they didn\u2019t like how voted, they can ruin your life after the fact.<\/strong><\/p>\nJosh Benaloh: Yeah.<\/p>\n
Host: Well, I mean, these are all ruining-your-life-after-the-fact kind of things, but…<\/strong><\/p>\nJosh Benaloh: Sure. There could be vote-shaming of various kinds.<\/p>\n
Host: Vote-shaming. What a fascinating word.<\/strong><\/p>\nJosh Benaloh: We\u2019ve invented a new term.<\/p>\n
Host: I love it.<\/strong><\/p>\n(music plays)<\/strong><\/p>\nHost: Okay, so. Cryptography in general being a way to get closer to that sweet spot\u2026 what\u2019s the math and the theory behind this? Our listeners are pretty technical, and I\u2019ve seen some of your slides on this. I didn\u2019t understand any of the slides, but I saw them.<\/strong><\/p>\nJosh Benaloh: That\u2019s because you didn\u2019t hear me talking about them. Once I explain them, they\u2019re easy.<\/p>\n
Host: I was\u2026 busy.<\/strong><\/p>\nJosh Benaloh: So, homomorphic encryption has existed for over thirty years. When I was an undergraduate, I took a cryptography class from Ron Rivest at MIT. And Ron is great. And Ron does, in many of his classes, and I do this very often when I teach, whenever I can, is have students do projects at the end of the semester or quarter or whatever it is. And in this case, this was in the spring of 1981. There had just been an election in 1980. It was a 3-way election, and I was sort of naively thinking, maybe if we could computerize this somehow, we could have ways that would allow people to express their preferences in some way. I didn\u2019t know at the time that it doesn\u2019t really work very well.<\/p>\n
Host: No.<\/strong><\/p>\nJosh Benaloh: There\u2019s Arrow\u2019s Theorem and related theorems that say that there\u2019s nothing good that we can do with preference lists. But I was thinking about this, and I decided I would do my project on elections. And Ron handed me a paper that he\u2019d written with a few colleagues, Adleman and Dertouzos, called Privacy Homomorphisms, which talked about how you can manipulate data that had been, not encrypted, but protected in some way. And…<\/p>\n
Host: Mathematically.<\/strong><\/p>\nJosh Benaloh: Yes. And I had been a math major, and I jumped on the word homomorphism. I knew what that meant. You know, it meant that you can apply an operation that preserves the structure of something. So, I thought yes, maybe I can do that in this context. And I did a few sort of weak things along that line for my project. None of it really worked, but these were interesting ideas. Years later, when I found myself in a doctoral program and looking at thesis topics, I had much better tools available to me, I knew a lot more, and the field had grown. And I realized that I could actually do something that went much further to solving that problem and started using homomorphic encryption as a way of enabling an election that really could be verified. Elections really come down to doing addition. It\u2019s just ones and zeros, who you voted for, and the tallies are just adding them up, and there\u2019s really not much more than that. So, the trick is basically, if we have an additively homomorphic function, then we can take encrypted votes and apply this additive homomorphism and we get an encryption of the tally. And that\u2019s pretty much all there is to it. There\u2019s a whole thesis in that. Well, there was a little bit more in the thesis, but you know that was the core idea.<\/p>\n
Host: That\u2019s awesome.<\/strong><\/p>\nJosh Benaloh: And it turns out, could be done very efficiently, so I invented a little additive homomorphic encryption system of my own. The general form of RSA, at least typically, used a large exponent. RSA in its practical usage today typically uses a small exponent, and my encryption system used two small exponentiations, which is a lot more efficient than one large one. So, it was an efficient way of doing things. People have been interested in homomorphic encryption for years, saying, well, there are additive homomorphic encryption systems, there are multiplicative homomorphic encryption systems. I wonder if we could do something that would do both at the same time. And it turns out that if you can do addition and multiplication together, then you can do everything. You can do any computation because you can break computations down into addition and multiplication. It\u2019s really the equivalent of ands and ors. But people thought for many, many years that it would be nice, but there are good reasons to think that this just can\u2019t be done. And then about ten years ago, it turned out it could be done. It was Craig Gentry that found a way to do this that was wildly inefficient. It slowed things down by I think about twenty-five orders of magnitude. It\u2019s about 10 to the 25th slower than doing the computation directly.<\/p>\n
Host: That\u2019s ridiculous.<\/strong><\/p>\nJosh Benaloh: Yes, that\u2019s, of course, ridiculous. You can\u2019t do the simplest computation with that. And there\u2019s been a lot of research since then on bringing that down. And now it\u2019s down to about ten orders of magnitude for general computation, which is still very painful, but there are cases where it\u2019s far more efficient, and this is a tool that allows for computation on data in encrypted form. So, once we have that, then we really enable very powerful cloud data services, and we can do some of that today. We can\u2019t do all of it, because the general computation is still nowhere close to efficient enough. The reason I want to distinguish it is I want to make clear that even though we\u2019re using homomorphic encryption for our elections, we\u2019re using what\u2019s now come to be called simple homomorphic encryption, which is very efficient.<\/p>\n
Host: We\u2019ve heard the pronouncements: people aren\u2019t going to put public elections on the internet until it is end-to-end verifiable. And we can\u2019t do that yet, so we\u2019re not doing this yet, right?<\/strong><\/p>\nJosh Benaloh: Well, I would say a little bit more.<\/p>\n
Host: That\u2019s what I want you to do.<\/strong><\/p>\nJosh Benaloh: Okay, then I will.<\/p>\n
Host: Isn\u2019t this speculative technology now? Where\u2019s it being used? It is being used?<\/strong><\/p>\nJosh Benaloh: No, it is not speculative. Yes, it is being used. So, end-to-end verifiable election systems do exist and have been fielded in a variety of contexts. They tend to be in small, localized contexts. There was an end-to-end verifiable system used in Tacoma Park, Maryland, for a couple of public elections. A few hundred voters. But they used a very nice end-to-end verifiable system there called Scantegrity. And the voters liked it very much. But it was a lot of work, and after doing elections in, I believe it was 2009 and 2011, Tacoma Park was very happy to continue it, but the researchers, who had put a lot of time and effort into it, were saying at that point, find a way to do it yourself, please. And of course, there was nobody to pick it up, so it hasn\u2019t been done so much since.<\/p>\n
Host: OK.<\/strong><\/p>\nJosh Benaloh: There\u2019s an internet-based end-to-end verifiable system called Helios that\u2019s used in a variety of places. It\u2019s used commonly by professional societies, like the ACM uses this. The IACR, the International Association for Cryptologic Research and many professional…<\/p>\n
Host: Of course they do\u2026<\/strong><\/p>\nJosh Benaloh: Well, actually, it was very hard to bring this in, because cryptographers are very suspicious people.<\/p>\n
Host: That\u2019s funny right there.<\/strong><\/p>\nJosh Benaloh: So, it was quite a challenge to move the community to this. What the community had been doing was mailing out paper ballots in double envelopes and such. And many people thought we should continue doing that, even though it costs tens of thousands of dollars.<\/p>\n
Host: You don\u2019t even eat your own dog food.<\/strong><\/p>\nJosh Benaloh: Well, we weren\u2019t. But eventually, the economics, together with the import of the election moved us to, you know, we can really do this. Many of our offices, there\u2019s only one candidate. There aren\u2019t a lot of people spending a lot of money trying to steal this election. It\u2019s okay. I would not recommend this for public elections. Not today. End-to-end verifiability is a very valuable tool, and it mitigates a lot of the concerns of internet voting. I was a part of a US Vote Foundation study that was published three years ago that looked at using end-to-end verifiability for internet voting. And some of the conclusions were that it\u2019s absolutely unconscionable to do internet voting without end-to-end verifiability. It mitigates many of the problems in a way that nothing else can, and without it, it\u2019s just so vulnerable you shouldn\u2019t even touch it. However, there are still problems even with end-to-end verifiability that have not been adequately mitigated, and therefore, we should not be doing that today, even with end-to-end verifiability. What the report recommends it we should be using end-to-end verifiability in in-person elections, in poll sites, in traditional ways first, getting more experience with it before we contemplate the next step of moving it into the internet realm. We should definitely be doing things carefully. Anytime we try something new, it\u2019s good to put it out for the public to have dry runs and trials. There was an internet voting system that was built for Washington, D.C. a few years ago, and it was actually built very well, although it wasn\u2019t end-to-end verifiable. But it was open source. It did many of the right things. The code was actually quite good. And they did the right thing of putting it out for a public challenge in a mock election before it was actually used. And a professor at the University of Michigan, Alex Halderman, got a few students to look at this during the trial, and they eviscerated the system. They were watching the internal cameras in the voting center, watching the workers look at what was going on. They were able to compromise all of the votes, change all the votes to anything they wanted. They changed the actual voting mechanism and put the University of Michigan fight song at the end of the voting process. The first that the election officials in D.C. got wind of what was going on was when they started getting complaints from voters saying, \u201cI really like this internet voting process, but that music at the end is kind of annoying.\u201d And that\u2019s when they discovered that this trial had been hacked, and they did cancel the project.<\/p>\n
Host: I always ask my guests on this podcast what keeps you up at night. I want this end-to-end verifiability to be there. It\u2019s not, but what ought we to be thinking as we now know these things, I think that were made clearer? Maybe we had our head in the sand a little bit?<\/strong><\/p>\nJosh Benaloh: There\u2019s a lot that we can do. So, I was an author of a report that was just released in September. It was released by the National Academy of Science, Engineering and Medicine, called Securing the Vote: Protecting American Democracy. There\u2019s a lot of good stuff in the report. A few highlights I can give now. Feel free to download it and read it yourself. I think it\u2019s a very readable report. But some of the highlights include that, of course, the 2016 election was infiltrated, but we saw no evidence of actual tampering with votes themselves. Even though we know now that it\u2019s very possible, we didn\u2019t see any evidence of that. In fact, I was on a phone call with election officials from all over the country two days after the election and the consensus was that as far as the casting and counting of votes go, this was the cleanest election that people had seen in a long time. There were certainly some incidents, but they were relatively small compared to what is typically seen in an election. So, we know there are vulnerabilities, and they really do need to be addressed. So, there are a few steps that can be taken. Certainly, we can apply best practices, things that are not being done today to secure registration lists, to better secure the actual voting equipment. And there are things that we can do in terms of basic, general security practices that most industry does today. The problem we have is that it\u2019s an asymmetric battle. Elections in the US are conducted mostly at the county level. There are over 4,000 counties in the US. There are over 8,000 separate election jurisdictions in the US. And the thought that a small county, somewhere, maybe in an important swing state, could have enough cyber security in place to withstand an attack from state-level attackers is just not realistic. Even though we can\u2019t defend an election from being tampered with, we can institute good auditing. And one method of good auditing is this end-to-end verifiability that allows you, as a voter, to see whether your vote has been changed. We have other methods of auditing, and there are better methods of administrative auditing that can be used, but end-to-end verifiability offers a public audit, allows voters, themselves, to become part of the process and to check for themselves, and candidates to check for themselves, and interest groups or news media or others to do the checks. So, that\u2019s something that I very much hope that we\u2019ll be moving towards.<\/p>\n
Host: So, in conclusion, we need more research? Classic last line of a dissertation\u2026<\/strong><\/p>\nJosh Benaloh: I\u2019m actually reluctant to say that. Yes, it\u2019s true, but\u2026. And the reason I want to say but is that end-to-end verifiability is ready to go now. And many people are putting it off and saying, well, that sounds good. You should do more research on it and wait. And sure, there are ways that we could improve it. Better usability studies would be helpful. There\u2019s a lot of opportunity for good usability research. There are some opportunities for other areas, but usability applies in traditional elections as well, and we\u2019re not saying, well, we haven\u2019t done enough usability studies, so we can\u2019t have an election.<\/p>\n
Host: Right!<\/strong><\/p>\nJosh Benaloh: Let\u2019s do that research, but that doesn\u2019t mean we should wait on deploying end-to-end verifiability and the best tools that we have now. And then also, let\u2019s do some research on how to make them better.<\/p>\n
Host: Josh Benaloh, thank you for coming on the podcast. It\u2019s been delightful having you as a guest.<\/strong><\/p>\nJosh Benaloh: Thank you so much, Gretchen. This has been really a lot of fun.<\/p>\n
(music plays)<\/strong><\/p>\nTo learn more about Dr. Josh Benaloh and how cryptographers are working to secure the vote, visit Microsoft.com\/research.<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"Episode 65, February 27, 2019 – Dr. Josh Benaloh gives us a brief but fascinating history of elections, explains how the trade-offs among privacy, security and verifiability make the relatively easy math of elections such a hard problem for the internet, and tells the story of how the University of Michigan fight song forced the cancellation of an internet voting pilot.<\/p>\n","protected":false},"author":37074,"featured_media":544278,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"msr-url-field":"https:\/\/player.blubrry.com\/id\/41849816\/","msr-podcast-episode":"","msrModifiedDate":"","msrModifiedDateEnabled":false,"ep_exclude_from_search":false,"_classifai_error":"","footnotes":""},"categories":[240054],"tags":[],"research-area":[13558],"msr-region":[],"msr-event-type":[],"msr-locale":[268875],"msr-post-option":[],"msr-impact-theme":[],"msr-promo-type":[],"msr-podcast-series":[],"class_list":["post-544257","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-msr-podcast","msr-research-area-security-privacy-cryptography","msr-locale-en_us"],"msr_event_details":{"start":"","end":"","location":""},"podcast_url":"https:\/\/player.blubrry.com\/id\/41849816\/","podcast_episode":"","msr_research_lab":[],"msr_impact_theme":[],"related-publications":[],"related-downloads":[],"related-videos":[],"related-academic-programs":[],"related-groups":[144840,901101],"related-projects":[],"related-events":[],"related-researchers":[],"msr_type":"Post","featured_image_thumbnail":"","byline":"","formattedDate":"February 27, 2019","formattedExcerpt":"Episode 65, February 27, 2019 - Dr. Josh Benaloh gives us a brief but fascinating history of elections, explains how the trade-offs among privacy, security and verifiability make the relatively easy math of elections such a hard problem for the internet, and tells the story…","locale":{"slug":"en_us","name":"English","native":"","english":"English"},"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/posts\/544257"}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/users\/37074"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/comments?post=544257"}],"version-history":[{"count":10,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/posts\/544257\/revisions"}],"predecessor-version":[{"id":569415,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/posts\/544257\/revisions\/569415"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media\/544278"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media?parent=544257"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/categories?post=544257"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/tags?post=544257"},{"taxonomy":"msr-research-area","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/research-area?post=544257"},{"taxonomy":"msr-region","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-region?post=544257"},{"taxonomy":"msr-event-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-event-type?post=544257"},{"taxonomy":"msr-locale","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-locale?post=544257"},{"taxonomy":"msr-post-option","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-post-option?post=544257"},{"taxonomy":"msr-impact-theme","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-impact-theme?post=544257"},{"taxonomy":"msr-promo-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-promo-type?post=544257"},{"taxonomy":"msr-podcast-series","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-podcast-series?post=544257"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}