Cryptography Meets Voting

Total Page:16

File Type:pdf, Size:1020Kb

Cryptography Meets Voting Smith typeset 12:13 10 Sep 2005 crypto vote Cryptography meets voting Warren D. Smith∗ [email protected] September 10, 2005 Abstract — We survey the contributions of the entire the- 4.19 Designated-verifier ZK-proofs; deniable signa- oretical computer science/cryptography community dur- tures........................ 19 ing 1975-2002 that impact the question of how to run ver- 4.20 Zeroknowledgeproofofsinglebit . 20 ifiable elections with secret ballots. The approach based 4.21 Bit “commitments” and “oblivious transfer” . 21 on homomorphic encryptions is the most successful; one 4.22 Zero knowledge proof number is in interval . 23 such scheme is sketched in detail and argued to be fea- 4.22.1 A flawed procedure by Fabrice Boudot . 23 sible to implement. It is explained precisely what these 4.22.2 A new procedure that repairs Boudot’s ideas accomplish but also what they do not accomplish, flaws.................... 23 and a short history of election fraud throughout history 4.23 Proof of El Gamal encryption of a single bit is included. andofanumberinaninterval . 25 4.24 Co-signing, dating, and “bit-by-bit release” technique ..................... 25 Contents 4.25 Otherzeroknowledgeproofs. 26 4.26 Faster general purpose zero knowledge proofs . 26 1 Introduction 2 4.27 Secure general multiparty computation . 28 2 Election Desiderata 2 5 Voting–realizationofpossibility 31 3 The top things to know about crypto 3 5.1 Electionhashes . 33 3.1 Essentials of speed, security, and parallelism . 4 6 Where are we now? 33 3.2 Elliptic curve groups – why you want them and 7 The four main approaches to efficient and fully- howtousethem ................. 5 secure elections 33 3.3 Still faster with secret key cryptography . 8 7.1 Mixnets ...................... 35 4Algorithmictoolkit 8 7.2 Homomorphic cryptography and its uses . 37 4.1 Fastpoweringinsemigroups. 8 7.3 A practical secure election: Homomorphic re- 4.2 Fast inversion and square roots in finite groups 8 pair to 5’ssemi-trustedscheme. 37 § 4.3 Finding discrete logarithms in “black-box”groups 8 7.4 Heterodoxvotingschemes . 39 4.4 Onetimepads .................. 9 7.5 Voting via secret sharing and secure general 4.5 Secretkeycryptosystems . 10 multiparty computations . 40 4.6 Keyexchange................... 11 8 We trade fire with electronic voting opponent 4.7 Public key cryptosystems via RSA one way Rebecca Mercuri 41 functions ..................... 11 9 Examples of real world voting frauds, errors, 4.8 Public key cryptosystems via Elgamal . 11 deceptions, suspicious events, and stupidities 43 4.9 Digital signatures via RSA or Elgamal . 12 9.1 Voter registration and eligibility . 43 4.10 Blindsignatures . 12 9.2 Votecollecting . 45 4.11 Secretsharing. 13 9.3 The story of the Ukraine election in 2004 . 45 4.12 Verifiable shuffles and mixnets . 15 9.4 The USA 2004 presidential election, with focus 4.13 Zero knowledgeproofprotocols . 16 onOhio ...................... 46 4.14 (Poor)Efficiency . 17 9.5 Votebuying.................... 49 4.15 Zero knowledge proof that know discrete log . 17 9.6 Electronic voting machines . 50 4.16 Zero knowledge test of discrete log equality . 18 9.7 Votecounting.. .. .. .. .. .. .. .. .. 53 4.17 Zero knowledge proof of one of several discrete 9.8 Threefraud-aidedUS Presidents . 53 logs; ORing and ANDing zero-knowledge proofs 19 9.9 Election fraud as a government-toppling or 4.18 ZK-proof of at least k-out-of-n statements . 19 democracy-destroyingevent . 56 9.10 Conclusions . 56 ∗21 Shore Oaks Drive, Stony Brook NY 11790. Sep 2004; revised Jan 2005 1 0. 0. 0 Smith typeset 12:13 10 Sep 2005 crypto vote 10 Will quantum computers destroy cryptographic this sort collecting all this material in one place, we are now electionprotocols? 56 for the first time able to see the “big picture” and hence to 11 Conclusions 57 reach some conclusions that seem not to have been previously reached, or at least not previously clearly explained. 11.1Tenlessons .................... 57 11.2 Whatwecanandcannotdo. 58 References 59 2 Election Desiderata 1 Introduction Here are three, possibly conflicting, desires. 1a. Easy cheap elections: To get tremendous savings in We are going to explain, survey, criticize, and evaluate all cost and increases in accuracy and convenience, we want elec- the main cryptographic procedures that have been proposed tions to be run using computers and the internet. for the purpose of holding verifiable and secure secret-ballot 1b. Hard-to-steal: But people are also afraid (with rea- elections. We begin by listing election desiderata in 2. Then son!) that such automation would also make it easy to steal 3-4 surveys and explains most of the highlights of§ crypto- elections – quite possibly without anybody even noticing! We graphic§ theoretical computer science during 1978-1995, espe- want it to be difficult or impossible to cheat – so difficult, in cially“zero knowledge proof”technology. This is all developed fact, that even huge corporations, and spy agencies such as from the ground up (or anyhow from a fairly low level) and in the NSA and CIA, should be unable to do it. enough detail to try to make everything readable by political scientists and programmers, and to permit engineers to be- 1c. Hack/destruction immunity; recountability: The gin system implementation now, without need of any source trouble with running elections via computers, electronics, and besides this. In fact, this is a superior introduction to mathe- the internet is: those things could be destroyed, or rendered matical cryptography than any other source I know, although temporarily disfunctional, or their data erased, by some en- a planned book by Daniel J. Bernstein titled“high speed cryp- emy. So it is necessary that all votes be stored in lower-tech, tography” (partially available on his web site) should eclipse but less vulnerable, forms (e.g. on paper ballots) to permit a us and Schneier’s book [136] is a highly recommended broad recount in such an event. But that seems to prevent the cost survey, although limited in its detail and having some aston- savings in 1a. 1 ishing omissions. (Meanwhile, in the other direction, we will Here is a quadruplet of desires which again seem (now even point out some political desiderata that seem to have gone more strongly) to be in conflict (and also to conflict with 1c): unnoticed by the crypto-CS community.) The algorithmic toolkit from 3-4 is summarized in a handy table and then 2a. Secret ballots: Nobody but the voter should know how used in 5-7 to§ design different voting systems. he voted (because otherwise pressure could be placed on that § voter to vote in a certain way). 6 and 8 review what we have learned. The latter analy- ses§ and§ corrects the adamant anti-electronic-voting views of 2b: No sale: Even more strongly, even if the voter wants voting expert Rebecca Mercuri. 9 surveys election frauds to reveal how he voted, he should be unable to do that in throughout history, focusing especially§ on recent and Ameri- any way more convincing than just his unsupported asser- can history. Due to the timidity of the US press, it is not com- tion (because otherwise that voter would be able to “sell his monly realized that 3 US presidents during 1950-2000 were vote”). The voter should still be unable to do this even if he elected with substantial aid from fraud, at least comparable collaborates with a (corrupt) election authority. to and sometimes far exceeding their winning margins. 2c. Invisible abstention? Some support the still stronger Finally, 11 lays out what conclusions we have been able to idea is that nobody but the voter (or somebody who has been reach, including§ some not appreciated before. observing him continually) should even be able to tell whether he voted (because otherwise pressure could be placed on that The whole political-science question of which vote-combining voter to refrain from voting). method should be used is largely – but not entirely – inde- pendent of the computer-science question of how to implement 2d. Verifiability: All should be able to verify that only au- a given vote-combining method in such a way as to protect thorized voters voted, they voted at most once and in a valid voter privacy, make everybody confident the right election re- manner, and their votes then were correctly used to determine sults got computed, etc. We are here focusing almost entirely the election result. Each voter should be able to verify that on the computer-science question. he successfully voted and his unaltered vote was incorporated This is a survey of the contributions relevant to voting of the into the election result. entire CS-cryptographic community. It therefore is mostly 2a, 2b, and 2c are really increasing-strength versions of the unoriginal work. Nevertheless, to my surpise it now includes same thing. We might imagine achieving 2a by having vote a fair number of new theoretical contributions2 as well as some submissions be encrypted so that nobody besides the voter numerous improvements more pedagogical rather than foun- and recipient knows the vote. With more cleverness perhaps dational. Because there has not previously been a survey of we could make the recipient also incapable of decrypting – 1For example, although Schneier extensively discusses Shamir secret sharing (our 4.11), he does not mention many details, e.g. verifiable secret sharing is given only 1 sentence, and ignores its main theoretical use, secure multiparty§ computation ([18][40], our 4.27). 2New tables of nice safeprimes ( 3.1), new kinds of signatures ( 4.10), new general purpose zero knowledge proof§ protocols ( 4.26), new recog- nition of the inefficiency of Boudot’s§ interval-membership proofs ( §4.22) and first way to repair that flaw, new realizations about§ voting, and new homomorphic voting scheme involving “designated verifier” zero knowledge§ proofs to prevent voters from constructing “receipts.” Sep 2004; revised Jan 2005 2 2.
Recommended publications
  • What's Wrong with Bush V. Gore and Why We Need to Amend the Constitution to Ensure It Never Happens Again Jamin B
    Maryland Law Review Volume 61 | Issue 3 Article 7 What's Wrong with Bush v. Gore and Why We Need to Amend the Constitution to Ensure it Never Happens Again Jamin B. Rasking Follow this and additional works at: http://digitalcommons.law.umaryland.edu/mlr Part of the Politics Commons Recommended Citation Jamin B. Rasking, What's Wrong with Bush v. Gore and Why We Need to Amend the Constitution to Ensure it Never Happens Again, 61 Md. L. Rev. 652 (2002) Available at: http://digitalcommons.law.umaryland.edu/mlr/vol61/iss3/7 This Conference is brought to you for free and open access by the Academic Journals at DigitalCommons@UM Carey Law. It has been accepted for inclusion in Maryland Law Review by an authorized administrator of DigitalCommons@UM Carey Law. For more information, please contact [email protected]. WHAT'S WRONG WITH BUSH V. GORE AND WHY WE NEED TO AMEND THE CONSTITUTION TO ENSURE IT NEVER HAPPENS AGAIN JAMIN B. RASKIN* I. Disenfranchisement as Remedy, Vote-Counting as H arm ................................................... 652 A. A Political Question Raised By a Candidate Without Standing ............................................ 653 B. And If It Had Been Gore v. Bush? ................... 660 C. Bush v. Gore: Hypocrisy and Reaction; Moral Expressivism and Legal Realism .................... 668 1. Moral Realism and Moral Expressivism ......... 670 2. Moral Realism and Legal Realism at Odds ...... 673 3. Hypocrites or Reactionaries ..................... 676 II. The People's Missing Right to Vote ..................... 679 A. The Missing Right to Vote in House and Senate Elections: Disenfranchisement in the District ....... 682 B. Territorial Subjects: The People of Puerto Rico, American Samoa, Virgin Islands, Guam ............
    [Show full text]
  • Security Considerations for Remote Electronic UOCAVA Voting
    NISTIR 7770 Security Considerations for Remote Electronic UOCAVA Voting Nelson Hastings Rene Peralta Stefan Popoveniuc Andrew Regenscheid [This page intentionally left blank. ] NISTIR 7770 Security Considerations for Remote Electronic UOCAVA Voting Nelson Hastings Rene Peralta Stefan Popoveniuc Andrew Regenscheid Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899-8930 February 2011 U.S. Department of Commerce Gary Locke, Secretary National Institute of Standards and Technology Patrick D. Gallagher, Director [This page intentionally left blank. ] This document has been prepared by the National Institute of Standards and Technology (NIST) and describes research in support military and overseas voting for the Election Assistance Commission and the Technical Guidelines Development Committee. It does not represent a consensus view or recommendation from NIST, nor does it represent any policy positions of NIST. Certain commercial entities, equipment, or materials may be identified in this document in order to describe an experimental procedure or concept adequately. Such identification is not intended to imply recommendation or endorsement by NIST, nor is it intended to imply that the entities, materials, or equipment are necessarily the best available for the purpose. There may be references in this publication to other publications currently under development by NIST in accordance with its assigned statutory responsibilities. The information in this publication, including concepts and methodologies, may be used by organizations even before the completion of such companion publications. Thus, until each publication is completed, current requirements, guidelines, and procedures, where they exist, remain operative. For planning and transition purposes, organizations may wish to closely follow the development of these new publications by NIST.
    [Show full text]
  • Sorting and the Split-Ticket: Evidence from Presidential and Subpresidential Elections
    Polit Behav (2016) 38:337–354 DOI 10.1007/s11109-015-9315-7 ORIGINAL PAPER Sorting and the Split-Ticket: Evidence from Presidential and Subpresidential Elections 1 2 Nicholas T. Davis • Lilliana Mason Published online: 28 August 2015 Ó Springer Science+Business Media New York 2015 Abstract Although prior research demonstrates that strong partisans are less likely to cast a split-ticket, recent scholarly work hints that partisan-ideological sorting— the matching of an individual’s partisan and ideological identities—may play a comparatively stronger role in shaping this voting behavior. Simply, if a high degree of congruence between identities underscores psychological orientations that pre- vent association with an out-group, then highly-sorted voters should be less likely to cross-party lines within the voting booth. Using the 1972–2012 ANES Time-Series and 2010 CCES surveys, we provide evidence that demonstrates that a high degree of partisan-ideological sorting produces the strongest negative effect on split-ticket voting among a variety of alternative explanations at both the national and subna- tional levels. We then supplement these analyses with 1992–1996 ANES panel data to demonstrate how changes in sorting over time affect this voting behavior. Our results indicate that although an increase in partisan strength alone is insufficient to reduce an individual’s propensity to cast a split-ticket, an increase in identity sorting over time has a strong negative effect on split-ticket voting. We conclude with a brief discussion about the consequences of identity convergence; namely, that sorting fosters a unique form of electoral ‘‘polarization.’’ Keywords Sorting Á Ticket-splitting Á Electoral polarization Electronic supplementary material The online version of this article (doi:10.1007/s11109-015-9315-7) contains supplementary material, which is available to authorized users.
    [Show full text]
  • The Other Election Controversy of Y2K: Core First Amendment Values and High-Tech Political Coalitions
    Washington University Law Review Volume 82 Issue 1 2004 The Other Election Controversy of Y2K: Core First Amendment Values and High-Tech Political Coalitions Marc John Randazza Follow this and additional works at: https://openscholarship.wustl.edu/law_lawreview Part of the Constitutional Law Commons, Election Law Commons, First Amendment Commons, Law and Politics Commons, and the President/Executive Department Commons Recommended Citation Marc John Randazza, The Other Election Controversy of Y2K: Core First Amendment Values and High- Tech Political Coalitions, 82 WASH. U. L. Q. 143 (2004). Available at: https://openscholarship.wustl.edu/law_lawreview/vol82/iss1/4 This Article is brought to you for free and open access by the Law School at Washington University Open Scholarship. It has been accepted for inclusion in Washington University Law Review by an authorized administrator of Washington University Open Scholarship. For more information, please contact [email protected]. THE OTHER ELECTION CONTROVERSY OF Y2K: CORE FIRST AMENDMENT VALUES AND HIGH-TECH POLITICAL COALITIONS MARC JOHN RANDAZZA, ESQ.∗ TABLE OF CONTENTS I. INTRODUCTION .................................................................................... 145 A. The Issue.................................................................................. 145 B. Research Questions................................................................. 153 C. Research Methodology............................................................ 154 D. Part Outline............................................................................
    [Show full text]
  • Modeling Canadian Federal Electoral Reforms
    Modeling Canadian Federal Electoral Reforms by Eric Koch B.A. (Political Science), Simon Fraser University, 2009 Project Submitted in Partial Fulfillment of the Requirements for the Degree of Master of Arts in the Department of Political Science Faculty of Arts and Social Sciences © Eric Koch SIMON FRASER UNIVERSITY Spring 2017 Copyright in this work rests with the author. Please ensure that any reproduction or re-use is done in accordance with the relevant national copyright legislation. APPROVAL Name: Eric Koch Degree: Master of Arts (Political Science) Title of Project: Modeling Canadian Federal Electoral Reforms Examining Committee: Chair: Genevieve Fuji Johnson, Professor David Laycock Senior Supervisor Professor Rémi Léger Supervisor Assistant Professor Andrew Heard Internal Examiner Professor Date Defended/Approved: April 10, 2017 ii ABSTRACT This research project is focused on developing an exploratory model that can help explain the factors that affect the political desire for electoral reform. The model, premised on institutional and rational actor theories, develops a set of “endogenous” and “exogenous” factors that allow for evaluation of electoral reform discourse. While some attention is paid to the major reforms that the electoral system has undergone since Confederation, detailed analysis is reserved to the post- 1980 period. Data was collected from party manifestos and Speeches from the Throne. Because the federal government has not made any structural changes to its electoral system, provincial and international electoral reforms are considered for the potential influence by “contagion”. Institutional barriers to reform are also factored into the model. Lastly, the model introduces the element of developing web-based technologies such as social media that are changing how the electorate is exerting its influence on the federal parties.
    [Show full text]
  • Is It Ever Safe to Vote Strategically? Tech
    Is it ever safe to vote strategically? Arkadii Slinko and Shaun White The University of Auckland, New Zealand Abstract There are many situations in which mis-coordinated strategic voting can leave strategic voters worse off than they would have been had they not tried to strategize. We analyse the simplest of such scenarios, in which the set of strategic voters all have the same sincere preferences and all cast the same strategic vote, while all other voters vote sincerely. Most mis-coordinations in this framework can be classified as instances of either strategic overshoot- ing (too many voted strategically) or strategic undershooting (too few). If mis-coordination can result in strategic voters ending up worse off than they would have been had they all just voted sincerely, we call the relevant strate- gic vote unsafe. We show that under every onto and non-dictatorial social choice rule there exist circumstances where a voter has an incentive to cast a safe strategic vote. We extend the Gibbard-Satterthwaite Theorem by prov- ing that every onto and non-dictatorial social choice rule can be individually manipulated by a voter casting a safe strategic vote. Keywords: Social choice function, strategic voting, Gibbard-Satterthwaite theorem, manipulation, safe strategic vote. arXiv:1301.1420v1 [cs.GT] 8 Jan 2013 Preprint submitted to ArXiv.org October 31, 2018 1. Introduction 1.1. Overview In this paper we consider strategic behaviour of voters when one candi- date must be chosen from a set of candidates and voters’ preferences with re- spect to those candidates are expressed as strict linear orders.
    [Show full text]
  • The Supreme Court V. the American People
    Book Review Overruling Democracy: The Supreme Court v. The American People By Jamin B. Raskin. New York: Taylor and Francis Books, Inc., 2003. BRIAN P. MARRON I. INTRODUCTION In Overruling Democracy, Professor Jamin Raskin discusses how the Supreme Court has failed to enforce basic political rights by subordinating democratic principles inherent in the Constitution.1 The Court tolerates the usurpation of popular sovereignty through the manipulation of the electoral process. The Court also fails to protect the functioning of democratic principles in our everyday lives in cases dealing with schools and corporations. Throughout the book, Raskin offers several solutions to the democracy deficit, including several proposed constitutional amendments to clearly enshrine democratic rights. However, the issues are presented in such a manner that may undermine the book’s effectiveness as a tool for building support for a democracy reform movement. II. MANIPULATION OF THE ELECTORAL PROCESS A. Bush v. Gore’s Twister Take on Democracy Raskin begins with a discussion of Bush v. Gore as a recent and blatant example of the Court’s (mainly the conservative justices’) hostility to democratic principles. He states that “the Court’s decision expressed perfectly its paramount commitment to the political rights of conservative majority-white factions in each state, its hostility to potential electoral majorities comprised of African Americans and Hispanics, its perplexing eagerness to show favoritism towards certain political parties over others, and its readiness in the crunch to substitute 1 JAMIN B. RASKIN, OVERRULING DEMOCRACY: THE SUPREME COURT V. THE AMERICAN PEOPLE (2003). 158 CONN. PUB. INT. L.J. [Vol. 3, No.
    [Show full text]
  • Legislative Process
    South Carolina's Legislative Process By Sandra K. McKinney, Clerk S.C. House ofRepresentatives SOUTH CAROLINA'S LEGISLATIVE PROCESS ( , . s. t' c ~ r:.~R.I).RV r·····tt r:. .HJV 1 " 19.9.0I ~ Jr" n HISTORY ~J ;\' !:, L n order to understand what happens in the legis­ lative process, it's necessary to know a few basic facts about the lawmaking body. The Legislature I of South Carolina (called the General Assembly) consists of two parts, the Senate and House of Repre­ sentatives. There are 170 Members- 46 Senators and 124 Representatives representing districts based on population. To be eligible to be a Representative, a person must be at least 21 years old. Senators must be 25, qualified voters and live in their districts. Members are legally immune while attending and traveling to and from the General Assembly during the session and for ten days before and ten days after adjournment. This immunity applies except for a Mem­ ber charged with treason, felony or breach of the peace. The House can punish its Members for disorderly behavior and if two-thirds of the members agree, can expel a Member from the session, but cannot do so a second time for the same reason. Members of the House serve for two years; Senators serve for four years. The terms of office begin on the Monday following the General Election, held in even numbered years on the first Tuesday after the first Monday in November. The Members of the House meet on the first Tues­ day following certification of the election for a maximum of three days to organize.
    [Show full text]
  • Overruling Democracy: the Supreme Court Vs. the American People
    Overruling Democracy Overruling Democracy The Supreme Court vs. The American People Jamin B.Raskin Routledge NEW YORK AND LONDON Published in 2003 by Routledge 29 West 35th Street New York, NY 10001 www.routledge-ny.com Published in Great Britain by Routledge 11 New Fetter Lane London EC4P 4EE www.routledge.co.uk Copyright © 2003 by Taylor & Francis Books, Inc. Design and typography: Jack Donner Routledge is an imprint of the Taylor & Francis Group. This edition published in the Taylor & Francis e-Library, 2005. “To purchase your own copy of this or any of Taylor & Francis or Routledge’s collection of thousands of eBooks please go to www.eBookstore.tandf.co.uk.” All rights reserved. No part of this book may be reprinted or reproduced or utilized in any form or by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying and recording, or in any information storage or retrieval system, without permission in writing from the publishers. Library of Congress Cataloging-in-Publication Data Raskin, Jamin B. Overruling democracy: the Supreme Court versus the American people/ By Jamin B.Raskin. p. cm. Includes bibliographical references and index. ISBN 0-415-93439-7 (hbk.) 1. United States. Supreme Court. 2. Political questions and judicial power— United States. I. Title. KF8748 .R33 2002 347.73'26—dc21 2002011222 ISBN 0-203-50921-8 Master e-book ISBN ISBN 0-203-57541-5 (Adobe eReader Format) To my mother and father CONTENTS Acknowledgments vi CHAPTER ONE The Supreme Court and America’s 1 Democracy Deficit CHAPTER TWO The Court Supreme 11 Bush v.
    [Show full text]
  • SUBMISSION to Working Group on Unification Referendums on the Island of Ireland from the DE BORDA INSTITUTE
    SUBMISSION TO Working Group on Unification Referendums on the Island of Ireland from THE DE BORDA INSTITUTE www.deborda.org www.debordavote.org “If the problem ain’t binary, don’t use a binary vote.” “The truth of an [electorate’s] decisions depends as much on the form by which they are reached as on the enlightenment of its members.” Le Marquis de Condorcet, (McLean and Urken 1995: 113). “In blunt words, by not publicising what can go wrong [with different voting systems]… expect to experience societal consequences that are significant and serious.” Donald Saari. (Saari 2008: 217.) In the Belfast Agreement, {Constitutional Issues, para 1 (ii)}, the two governments: Quote I recognise that it is for the people of the island of Ireland… to exercise their right of self-determination on the basis of consent, freely and concurrently given, North and South… subject to the… consent of a majority of the people of Northern Ireland; and in para 1 (iii), Quote II acknowledge that while a substantial section of the people in Northern Ireland share the legitimate wish of a majority of the people of the island of Ireland for a united Ireland, the present wish of a majority of the people of Northern Ireland… is to maintain the Union… and that it would be wrong to make any change in the status of Northern Ireland save with the consent of a majority of its people. 1 INTRODUCTION The Agreement is riddled with the word majority1 (my emphases), due no doubt to the widely held notion that a majority opinion can be identified in a binary procedure, a (simple, weighted or consociational) majority vote.
    [Show full text]
  • Vote Reassignment & Parliamentary Voting
    VOTE REASSIGNMENT & PARLIAMENTARY VOTING PROCEDURES UNDER PPR123 PPR123, by fulfilling its promise to “Make Every Vote Count—Always!”, presents exciting new possibilities for consideration. This should be the subject of future academic analysis and broad discussion. Here’s a preliminary list of some of the issues and possibilities. 1. Absentee voting. o With digital technology, it should be possible for MPs to vote securely from any location. o It’s suggested this should be subject to approval by the party whip. 2. Vote verification and vote security. o Voting procedures, records and responsibilities would be carefully established and continually monitored by technical experts. o Voting would be initiated by the Speaker, through the party whips, sending an ‘invitation to cast a vote on a particular issue’ (i.e. a ‘voting transaction’ or online ballot) to the registered voting devices (cell phone or tablet computer) of each MP. o Each MP would respond by casting a vote, to be sent to the vote servers (i.e. networked computers) controlled by the Speaker and each party whip. o The Speaker’s vote server would issue a vote confirmation message to each MP. o Every MP and party whip would be responsible to report any inconsistencies or problems to the Speaker. o The overall security of the voting process and voting records would be ensured through security procedures and controls, authorization, verification, replication of data, and transparency. o Potentially each MP’s digital device could be enabled to record all votes by all MPs. o Potentially the media might also be authorized to immediately receive voting summaries.
    [Show full text]
  • Legislative Flg&~§~ ·Qy
    Jouthfi~j Legislative flg&~§~ ·qy STATE DOCUMENTS BY SANDRA K. MCKINNEY, CLERK S.C. HOUSE OF REPRESENTATIVES SouTH CAROLINA's LEGISLATIVE PROCESS HISTORY n order to understand what happens in the legislative process, it's necessary to know a few basic facts about the lawmaking body. I The Legislature of South Carolina (called the General Assembly) consists of two parts, the Senate and House of Representatives. There are 170 Members - 46 Senators and 124 Representatives rep­ resenting districts based on population. To be eligible to be a Representative, a person must be at least 21 years old. Senators must be 25, qualified voters and live in their districts. Members are legally immune while attending and traveling to and from the General Assembly during the session and for ten days before and ten days after adjournment. This immunity applies except for a Member charged with treason, felony or breach of the peace. The House can punish its Members for disorderly behavior and if two-thirds of the members agree, can expel a Member from the session, but cannot do so a second time for the same reason. Members of the House serve for two years; Sena­ tors serve for four years. The terms of office begin on the Monday following the General Election, held in even numbered years on the first Tuesday after the first Monday in November. The Members of the House meet on the first Tues­ day following certification of the election for a maxi­ mum of three days to organize. The business at this organizational session includes: election of officers, appointment of standing committees, adoption of rules, assignment of desks and other housekeeping de­ tails.
    [Show full text]