Podcast
Root Causes 425: PQC Requirements for Voting Systems


Hosted by
Tim Callan
Chief Compliance Officer
Jason Soroko
Fellow
Original broadcast date
September 27, 2024
In honor of the upcoming US elections, we describe the six main requirements for a post-quantum voting system.
Podcast Transcript
What I would like to do in this podcast very rapidly, is rhyme off the six main things, security aspects, to what would be required from a post- quantum voting system.
So there's many, many peer reviewed journal articles out there. There's one written out of a university in India, Quantum Enhanced Secure Approval Voting Protocol. And it's a mouthful, but I just want to point it out that I think it's worth reading along or looking at articles like that, because not only is this interesting for voting, but it is very interesting for anybody looking to build multi-party post-quantum encrypted systems, Tim. So that's a more general aspect than just voting.
So number one, with any form of voting, you need anonymity. And so your unique ID, if you will, that would be presumably supplied by some sort of a voting registration system would probably need to be hashed. So, in other words, the insurance of anonymity, probably coming from a hash function from a unique ID of an individual. Just number one.
Number two - This is kind of interesting one. Let's call it binding. And this is where, strangely enough, with any of these kinds of systems that are digital, you do not want any of the players, whether it's Alice, Bob or Charlie, if you will, you do not want them able to alter a voter's choice due to the encoding of the vote, because you could easily make mistakes in the encoding of a vote. And this is where - connected to post-quantum - this is where you could actually start to use security layers such as entanglement and traditional digital signatures. But entanglement is an interesting one with respect to post-quantum voting, Tim. And this is where things get really, really interesting. And that's number two, binding.
Number three. Of course, in a voting system, you want a vote to be non- reusable. And once again, that comes from a double check of the hash of that ID that came from the anonymity in number one. So it's almost like a special case of number one. And then not only does the hash function have to provide anonymity, it also has to provide a non-reusability. So there's a double check within the system.
Number four is verifiability. And this is an interesting one, where wouldn't it be nice if we could have the voter have the ability to verify if their vote has reached the voting authority without tampering?
And I think that that's why they’re looking at the deep far horizon about how to utilize quantum in the future, and that does interest me because the ways in which we do things today will probably be different, quite different, when quantum computers are truly available to us, and things like quantum memory are available to us, and things like entanglement are not just Star Trek subjects. They’re something that are computable and usable. And I don't know, I just, I think that looking at the horizon is interesting because even if it's not something we implement today, from an engineering standpoint, it should help to inform us for how to build systems thinking about the future.

