Security Market Segment LS
Friday, 28 February 2020 10:46

Blockchain the wrong tech for voting systems, says crypto expert Rivest Featured

Ron Rivest: "Voting is an activity where you actually don't need hi-tech to make it work." Ron Rivest: "Voting is an activity where you actually don't need hi-tech to make it work." Courtesy YouTube

Cryptography expert Ronald Rivest has dismissed the idea that blockchains would be of any use in voting systems, saying it was something like bringing a combination lock to a kitchen fire.

Rivest, a professor at the Massachusetts Institute of Technology and the R in the famous RSA public-key cryptosystem, was responding to a question from RSA chief technology office Zulfikar Ramzan who was moderating the Cryptographers' Panel, an annual feature at the RSA Security Conference, held in San Francisco this week

"Blockchain is the wrong security technology for voting. I like to think of it as bringing a combination lock to a kitchen fire or something like that..," he said. "It's good on its own for certain things but it's not good for voting."

With the US in election mode as the primaries are in progress with an election due in November, the question about using technology to make the process more secure has been discussed often, especially in view of the hysteria around alleged foreign interference in the polls.

"Voting is an interesting problem, it has requirements that are in many ways stronger than we see in many security applications," Rivest said. "The need for anonymous ballots, secret ballots, pervades the space and makes it really tough to do audits and other things.

"Blockchain technology really doesn't fit for a couple of reasons... one is that we have learned we need software independence. For many things we do in society, like flying an airplane, you need hi tech.

"Voting is an activity where you actually don't need hi-tech to make it work. You can get by just fine with paper ballots if you can keep that as your foundation.

"And if you do use some technology, use the paper ballots to check on it and you can do very well. We call this software independence, so you don't need to trust the results because you trust some software. That's a dangerous path to go down if you don't need to go down that path and with voting we really don't need to."

Rivest said blockchains provided certain things and had the audience laughing when he added, "I like to think of it as garbage in, garbage stored for ever. Once they've had the chance to manipulate your vote, it goes on the blockchain and never gets changed again."

He once again emphasised it was not the right technology for voting. "And so I think blockchains are a mismatch for voting. Blockchains may have other wonderful places to apply... but voting's not one of those."

The other panellists were Adi Shamir, the A in RSA and Borman Professor of Computer Science at the Weizmann Institute in Israel; Whitfield Diffie, cryptographer and security expert at Cryptomathic; Tal Rabin, head of Research at the Algorand Foundation; and Arvind Narayanan, Associate Professor of Computer Science at Princeton University.


As part of our Lead Machine Methodology we will help you get more leads, more customers and more business. Let us help you develop your digital marketing campaign

Digital Marketing is ideal in these tough times and it can replace face to face marketing with person to person marketing via the phone conference calls and webinars

Significant opportunity pipelines can be developed and continually topped up with the help of Digital Marketing so that deals can be made and deals can be closed

- Newsletter adverts in dynamic GIF slideshow formats

- News site adverts from small to large sizes also as dynamic GIF slideshow formats

- Guest Editorial - get your message out there and put your CEO in the spotlight

- Promotional News and Content - displayed on the homepage and all pages

- Leverage our proven event promotion methodology - The Lead Machine gets you leads

Contact Andrew our digital campaign designer on 0412 390 000 or via email



Security requirements such as confidentiality, integrity and authentication have become mandatory in most industries.

Data encryption methods previously used only by military and intelligence services have become common practice in all data transfer networks across all platforms, in all industries where information is sensitive and vital (financial and government institutions, critical infrastructure, data centres, and service providers).

Get the full details on Layer-1 encryption solutions straight from PacketLight’s optical networks experts.

This white paper titled, “When 1% of the Light Equals 100% of the Information” is a must read for anyone within the fiber optics, cybersecurity or related industry sectors.

To access click Download here.


Sam Varghese

website statistics

Sam Varghese has been writing for iTWire since 2006, a year after the site came into existence. For nearly a decade thereafter, he wrote mostly about free and open source software, based on his own use of this genre of software. Since May 2016, he has been writing across many areas of technology. He has been a journalist for nearly 40 years in India (Indian Express and Deccan Herald), the UAE (Khaleej Times) and Australia (Daily Commercial News (now defunct) and The Age). His personal blog is titled Irregular Expression.



Recent Comments