Individual Verifiability in Electronic Voting

Total Page:16

File Type:pdf, Size:1020Kb

Individual Verifiability in Electronic Voting Individual Verifiability in Electronic Voting Sandra Guasch Castell´o Universitat Polit`ecnicade Catalunya Supervisor: Paz Morillo Bosch 2 Contents Acknowledgements 7 Preface 9 1 Introduction 11 1.1 Requirements of electronic voting . 12 1.2 Electronic voting basics . 13 1.2.1 Basic approach . 13 1.2.2 Pollsterless or code voting . 14 1.2.3 Two agencies model . 16 1.2.4 Homomorphic tally systems . 17 1.2.5 Mixnet-based systems . 18 1.3 Cryptography introduction . 20 1.3.1 Symmetric key encryption schemes . 20 1.3.2 Public key encryption schemes . 21 1.3.3 Security notions for encryption schemes . 23 1.3.4 Homomorphic public key cryptosystems . 25 1.3.5 Signature schemes . 25 1.3.6 σ-protocols and proof schemes . 26 1.4 Motivation, organization and contributions of this work . 31 1.4.1 Motivation . 31 1.4.2 Organization and contributions . 32 2 Individual verifiability 35 2.1 Introduction . 35 2.2 Challenge-or-cast . 37 2.3 Verifiable Optical Scanning . 42 2.4 Verification with codes . 48 2.4.1 Code voting . 49 2.4.2 Return Codes . 52 2.5 Hardware-based verification . 55 2.6 Decryption-based verification . 57 3 Electronic Voting Model 59 3.1 Introduction . 59 3.2 Protocol Syntax . 59 3.3 Security Definitions . 63 3 4 CONTENTS 3.3.1 Trust model . 63 3.3.2 Ballot privacy . 64 3.3.3 Strong Consistency . 66 3.3.4 Strong Correctness . 67 3.3.5 Cast-as-Intended verifiability . 67 3.3.6 Coercion-resistant cast-as-intended . 69 4 Return Codes with Single Voting: Neuch^atel'sScheme 71 4.1 Introduction . 71 4.2 Improving the Norwegian solution . 72 4.2.1 Solution Overview . 74 4.3 Confirmation Phase . 75 4.4 Protocol description . 76 4.4.1 Workflow . 80 4.5 Security of the Protocol . 81 4.5.1 Ballot Privacy . 82 4.5.2 Strong Consistency . 84 4.5.3 Strong Correctness . 85 4.5.4 Cast-as-Intended Verifiability . 85 4.5.5 Coercion-resistant cast-as-intended . 86 4.6 Protocol implementation . 86 4.6.1 Performance . 87 4.7 Authentication, usability and correctness: implementation details . 89 4.7.1 Authentication and private keys provision . 89 4.7.2 Short Return Codes . 90 4.7.3 Vote correctness . 92 4.7.4 Ballot Box vs Bulletin Board . 93 4.8 Protocol extensions . 94 4.8.1 Supporting multiple entry points . 94 4.8.2 Distributed return code generation . 94 4.8.3 Support for multiple voting . 99 4.8.4 Assignation of verification cards . 99 5 Challenge-and-cast 101 5.1 Introduction . 101 5.2 Overview . 101 5.3 Related work . 102 5.4 Proof simulation . 103 5.4.1 A simulatable NIZK proof using chameleon hashes . 105 5.4.2 Simulatable NIZKPK scheme properties . 106 5.5 Core Protocol using Mixnets . 107 5.5.1 Security of the Protocol . 112 5.5.2 Concrete instantiation . 117 5.5.3 Performance . 119 5.6 Protocol for homomorphic tally-based systems . 119 5.6.1 Security Analysis . 120 5.6.2 Primitives . 120 CONTENTS 5 5.7 Multiple Trustees . 122 5.8 Voting Scheme . 123 5.9 Protocol extension for multiple voting . 125 6 Making Cast-as-Intended Universal 127 6.1 Introduction . 127 6.2 Motivation . 127 6.3 UCIV System description . 128 6.3.1 Overview . 128 6.3.2 Syntactical definition . 130 6.3.3 Security definitions . 132 6.4 Protocol based on NIZK proofs . 136 6.4.1 Protocol description . 136 6.4.2 Security analysis . 138 6.4.3 Implementation . 139 6.5 UCIV with return codes . 140 6.5.1 Overview of the solution . 140 6.5.2 Protocol description . 140 6.5.3 Security Analysis . 142 6.5.4 Implementation . 146 6.5.5 Extension to multiple voting . 147 6.6 Distributed generation of UCIV information . 147 6.7 Setup . 149 7 Conclusions 151 6 CONTENTS Acknowledgements I would like to thank my family and friends, who have being very patient with me and supportive while I was writing this thesis. I would also like to thank my colleagues at work, who have provided a lot of useful comments, specially when opining about the drawings! My English teacher, Ryan Jones deserves a special mention. He bravely read all the document and reviewed my English without crying or falling asleep (at least this is what he said) in a week. He is the best! A special thanks to my supervisor Paz Morillo, who is the most dynamic person I know, who has been always confident that I could do this, and who has helped me a lot, specially during the last months. My boyfriend, Guillem, took care that I did not starve during the last months while I was working full time and also writing this thesis. Thanks a lot! Thanks also to my external reviewers, Rolf Haenni and Francesc Seb´e,who provided great comments to this text. Finally, I would like to thank Jordi Puiggal´ıand Alex Escala, with whom I have make most of the research in this thesis. Working with you is great, and I hope I will continue doing it in the future. 7 8 CONTENTS Preface This PhD Thesis is the fruit of the job of the author as a researcher at Scytl Secure Electronic Voting, as well as the collaboration with Paz Morillo, from the Depart- ment of Applied Mathematics at UPC and Alex Escala, PhD student. In her job at Scytl, the author has participated in several electronic voting projects for national-level binding elections in different countries. The participa- tion of the author covered from the protocol design phase, to the implementation phase by providing support to the development teams. Since her participation on the Norwegian project (2009-2011), which pioneered the use of verifiable electronic voting systems on binding elections, the author has specialized in individual verifiability, which englobes the processes that can be done by the voter, in order to check that the system works correctly. Part of the author's work at Scytl has been to continue with the experience of the design and development of the electronic voting system used in Norway, and improve it. The result has been implemented and already been used in 2014 and 2015 elections in Neuch^atel,and it is planned to be used in the next years. The analysis of existing protocols, as well as the design of new ones, fulfilling the requirements of the different projects executed at Scytl, made the author realise that there is not a gold solution for everyone, when it comes to individual verifiability. This is due to the fact that the trust assumptions that can be made are different in each project or setup, and that individual verifiability strongly defines how the voter is going to interact with the system. For the latter, customers / electoral commissions may have very specific requirements, for example given their traditional voting process. Therefore, this thesis also contains proposals which did not emerge from the projects conducted at Scytl, but from the need of both the market and the academia of new protocols with new properties, and which work under different trust assump- tions. These proposals are intended to be a contribution to the state of the art of individual verifiability, both in academic and industrial environments, as well as being the basis for new systems that may be implemented in the future. In summary, this thesis has to be seen as the fruit of industrial research, while also contributing to the academic state of the art. 9 10 CONTENTS Chapter 1 Introduction Electronic voting systems have been around for a long time. The first optical scanners were first used in 1962, and Direct Recording Electronic Voting Machines (DREs) were introduced in 1975. Complex, time-consuming and error-prone count- ing processes have been made faster, easier and more reliable with electronic mech- anisms. New technologies also provide aids for disabled voters to independently cast a vote, and for regular voters to fill-in complex ballots without errors. Logistic costs derived, for example, from handling multiple-language ballots, long-term costs, or the time needed for setting up an election can also be reduced using electronic means. With the rise of Internet, and later on the widespread use of intelligent portable devices (such as smart phones) in our daily life, we have become used to performing a large proportion of our transactions remotely and at any time. Although, in more or less measure, the existence of attacks inherent to the remote nature of the Internet is known by everybody (identity impersonation, interception or observation of our communications, website impersonation or phishing, access to personal data, etc.), and this fact does not inhibit for the provision of multiple online services, some of them as sensitive as banking, paying taxes or buying flight tickets. One could say that the advantages overcome the drawbacks. Therefore, the implementation of Internet voting naturally emerges, together with other e-government solutions which are aimed to bring the administration closer to the citizens, and collaborates to improve the welfare of the society. Internet voting cannot only enable increased participation due to its convenience, but also provides the opportunity of voting to collectives which may otherwise not be able to vote: people who are abroad during the election day, military located in conflict regions, embarked fishermen, or people with decreased mobility due to disabilities. Usually, voters who cannot go to a polling station on election day can use the postal mail channel to cast their voters.
Recommended publications
  • Black Box Voting Ballot Tampering in the 21St Century
    This free internet version is available at www.BlackBoxVoting.org Black Box Voting — © 2004 Bev Harris Rights reserved to Talion Publishing/ Black Box Voting ISBN 1-890916-90-0. You can purchase copies of this book at www.Amazon.com. Black Box Voting Ballot Tampering in the 21st Century By Bev Harris Talion Publishing / Black Box Voting This free internet version is available at www.BlackBoxVoting.org Contents © 2004 by Bev Harris ISBN 1-890916-90-0 Jan. 2004 All rights reserved. No part of this book may be reproduced in any form whatsoever except as provided for by U.S. copyright law. For information on this book and the investigation into the voting machine industry, please go to: www.blackboxvoting.org Black Box Voting 330 SW 43rd St PMB K-547 • Renton, WA • 98055 Fax: 425-228-3965 • [email protected] • Tel. 425-228-7131 This free internet version is available at www.BlackBoxVoting.org Black Box Voting © 2004 Bev Harris • ISBN 1-890916-90-0 Dedication First of all, thank you Lord. I dedicate this work to my husband, Sonny, my rock and my mentor, who tolerated being ignored and bored and galled by this thing every day for a year, and without fail, stood fast with affection and support and encouragement. He must be nuts. And to my father, who fought and took a hit in Germany, who lived through Hitler and saw first-hand what can happen when a country gets suckered out of democracy. And to my sweet mother, whose an- cestors hosted a stop on the Underground Railroad, who gets that disapproving look on her face when people don’t do the right thing.
    [Show full text]
  • Chapter 08-Talion
    Company Information 63 This free internet version is available at www.BlackBoxVoting.org Black Box Voting — © 2004 Bev Harris Rights reserved. ISBN 1-890916-90-0. Paperback version can be purchased at www.Amazon.com 8 Company Information (What you won’t find on the company Web sites) If anything should remain part of the public commons, it is voting. Yet as we have progressed through a series of new voting methods, control of our voting systems, and even our understanding of how they work, has come under new ownership. “It’s a shell game, with money, companies and corporate brands switching in a blur of buy-outs and bogus fronts. It’s a sink- hole, where mobbed-up operators, paid-off public servants, crazed Christian fascists, CIA shadow-jobbers, war-pimping arms dealers — and presidential family members — lie down together in the slime. It’s a hacker’s dream, with pork-funded, half-finished, secretly-programmed computer systems installed without basic security standards by politically-partisan private firms, and pro- tected by law from public scrutiny.” 1 The previous quote, printed in a Russian publication, leads an article which mixes inaccuracies with disturbing truths. Should we assume crooks are in control? Is it a shell game? Whatever it is, it has certainly deviated from community-based counting of votes by the local citizenry. We began buying voting machines in the 1890s, choosing clunky mechanical-lever machines, in part to reduce the shenanigans going This free internet version is available at www.BlackBoxVoting.org 64 Black Box Voting on with manipulating paper-ballot counts.
    [Show full text]
  • Election Reform 20002006
    ElElectiectionon ReformReform What’sWhat’s Changed, What Hasn’t and Why 2000–2006 53134_TextX 2/1/06 8:53 AM Page 1 Table of Contents Introduction . 3 Executive Summary . 5 Voting Systems . 9 Map: Voter-Verified Paper Audit Trails, 2006 . 12 Voter ID . 13 Map: State Voter Verification Requirements, 2000 . 16 Map: State Voter Verification Requirements, 2006 . 17 Statewide Registration Databases . 19 Map: Statewide Voter Registration Databases, 2000 . 22 Map: Statewide Voter Registration Databases, 2006 . 23 Chart: Statewide Voter Registration Database Contracts/Developers . 24 Legislation . 25 Litigation . 27 Map: Absentee Voting By Mail, 2000. 28 Map: Absentee Voting By Mail, 2006. 29 Map: Pre-Election Day In-Person Voting, 2000 . 30 Map: Pre-Election Day In-Person Voting, 2006 . 31 Provisional Voting . 32 Map: Provisional Balloting, 2000 . 34 Map: Provisional Balloting, 2006 . 35 Map: HAVA Fund Distribution . 36 Election Reform in the States . 39 Endnotes. 73 Methodology . 81 Table of Contents 1 ELECTION REFORM SINCE NOVEMBER 2000 53134_Text 1/28/06 2:47 AM Page 2 53134_Text 1/28/06 2:47 AM Page 3 am pleased to present the fourth edition of And watching it all, the electorate – better-informed electionline.org’s What’s Changed, What Hasn’t about the specifics of the electoral process than any and Why – our annual report detailing the state time in our history – continues to monitor develop- Iof election reform nationwide. ments and ask how, if at all, such changes will affect them. As 2006 begins, the standard title of the report is espe- cially apt. The Help America Vote Act of 2002 (HAVA) This is a fascinating time for followers of election imposed a number of key deadlines that finally arrived reform – and we hope this latest report will assist you January 1; as a result, the existence (or lack thereof) in understanding What’s Changed, What Hasn’t and of electoral changes – and the reasons why – are no Why.
    [Show full text]
  • Voters' Evaluations of Electronic Voting Systems
    American Politics Research Volume 36 Number 4 July 2008 580-611 © 2008 Sage Publications Voters’ Evaluations of 10.1177/1532673X08316667 http://apr.sagepub.com hosted at Electronic Voting Systems http://online.sagepub.com Results From a Usability Field Study Paul S. Herrnson University of Maryland Richard G. Niemi University of Rochester Michael J. Hanmer University of Maryland Peter L. Francia East Carolina University Benjamin B. Bederson University of Maryland Frederick G. Conrad University of Michigan, University of Maryland Michael W. Traugott University of Michigan Electronic voting systems were developed, in part, to make voting easier and to boost voters’ confidence in the election process. Using three new approaches to studying electronic voting systems—focusing on a large-scale field study of the usability of a representative set of systems—we demonstrate that voters view these systems favorably but that design differences have a substantial impact on voters’ satisfaction with the voting process and on the need to request help. Factors associated with the digital divide played only a small role with respect to overall satisfaction but they were strongly associated with feeling the need for help. Results suggest numerous possible improvements in electronic voting systems as well as the need for continued analysis that assesses specific char- acteristics of both optical scan and direct recording electronic systems. Keywords: election reform; voting technology; public opinion; usability; voting machines olitical scientists’ interest in voting systems and ballots may seem rela- Ptively recent but research on these topics goes back to the beginning of the profession and includes a long line of work on ballot content (Allen, 580 Downloaded from apr.sagepub.com by guest on December 9, 2015 Herrnson et al.
    [Show full text]
  • Computational Aspects of Voting: a Literature Survey Fatima Talib
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by RIT Scholar Works Rochester Institute of Technology RIT Scholar Works Theses Thesis/Dissertation Collections 2007 Computational aspects of voting: a literature survey Fatima Talib Follow this and additional works at: http://scholarworks.rit.edu/theses Recommended Citation Talib, Fatima, "Computational aspects of voting: a literature survey" (2007). Thesis. Rochester Institute of Technology. Accessed from This Thesis is brought to you for free and open access by the Thesis/Dissertation Collections at RIT Scholar Works. It has been accepted for inclusion in Theses by an authorized administrator of RIT Scholar Works. For more information, please contact [email protected]. Fatima Al-Raisi May 16th, 2007 Abstract Preference aggregation is a topic of study in different fields such as philosophy, mathematics, economics and political science. Recently, computational aspects of preference aggregation have gained especial attention and “computational politics” has emerged as a marked line of research in computer science with a clear concentration on voting protocols. The field of voting systems, rooted in social choice the- ory, has expanded notably in both depth and breadth in the last few decades. A significant amount of this growth comes from studies con- cerning the computational aspects of voting systems. This thesis comprehensively reviews the work on voting systems (from a computing perspective) by listing, classifying and comparing the re- sults obtained by different researchers in the field. This survey covers a wide range of new and historical results yet provides a profound commentary on related work as individual studies and in relation to other related work and to the field in general.
    [Show full text]
  • Electronic Voting
    Electronic Voting Ronald L. Rivest Laboratory for Computer Science Massachusetts Institute of Technology Cambridge, MA 02139 [email protected] 1 Introduction Over the years, with varying degrees of success, inventors have repeatedly tried to adapt the latest technology to the cause of improved voting. For example, on June 1, 1869 Thomas A. Edison received U.S. Patent 90,646 for an \Electric Vote-Recorder" intended for use in Congress. It was never adopted because it was allegedly \too fast" for the members of Congress. Yet it is clear that we have not reached perfection in voting technology, as evidenced by Florida's “butterfly ballots" and \dimpled chads." Stimulated by Florida's election problems, the California Institute of Tech- nology and MIT have begun a joint study of voting technologies [5], with the dual objectives of analyzing technologies currently in use and suggesting im- provements. This study, funded by the Carnegie Foundation, complements the Carter/Ford commision [6], which is focusing on political rather than technolog- ical issues. Electronic voting will be studied. Among people considering electronic voting systems for the first time, the following two questions seem to be the most common: Could I get a receipt telling me how I voted? Could the U.S. Presidential elections be held on the Internet? The first question is perhaps most easily answered (in the negative), by point- ing out that receipts would enable vote-buying and voter coercion: party X would pay $20 to every voter that could show a receipt of having voted for party X's candidate. Designated-verifier receipts, however, where the voter is the only designated verifier—that is, the only one who can authenticate the receipt as valid|would provide an interesting alternative approach to receipts that avoids the vote-buying and coercion problem.
    [Show full text]
  • Voting System Failures: a Database Solution
    B R E N N A N CENTER FOR JUSTICE voting system failures: a database solution Lawrence Norden Brennan Center for Justice at New York University School of Law about the brennan center for justice The Brennan Center for Justice at New York University School of Law is a non-partisan public policy and law institute that focuses on fundamental issues of democracy and justice. Our work ranges from voting rights to campaign finance reform, from racial justice in criminal law to presidential power in the fight against terrorism. A singular institution – part think tank, part public interest law firm, part advocacy group – the Brennan Center combines scholarship, legislative and legal advocacy, and communication to win meaningful, measurable change in the public sector. about the brennan center’s voting rights and elections project The Brennan Center promotes policies that protect rights, equal electoral access, and increased political participation on the national, state and local levels. The Voting Rights and Elections Project works to expend the franchise, to make it as simple as possible for every eligible American to vote, and to ensure that every vote cast is accurately recorded and counted. The Center’s staff provides top-flight legal and policy assistance on a broad range of election administration issues, including voter registration systems, voting technology, voter identification, statewide voter registration list maintenance, and provisional ballots. The Help America Vote Act in 2002 required states to replace antiquated voting machines with new electronic voting systems, but jurisdictions had little guidance on how to evaluate new voting technology. The Center convened four panels of experts, who conducted the first comprehensive analyses of electronic voting systems.
    [Show full text]
  • Thresholds Quantifying Proportionality Criteria for Election Methods
    THRESHOLDS QUANTIFYING PROPORTIONALITY CRITERIA FOR ELECTION METHODS SVANTE JANSON Abstract. We define several different thresholds for election methods by considering different scenarios, corresponding to different proportion- ality criteria that have been proposed by various authors. In particular, we reformulate the criteria known as DPC, PSC, JR, PJR, EJR in our setting. We consider multi-winner election methods of different types, using ballots with unordered lists of candidates or ordered lists, and for comparison also methods using only party lists. The thresholds are cal- culated for many different election methods. The considered methods include classical ones such as BV, SNTV and STV (with some results going back to e.g. Droop and Dodgson in the 19th century); we also study in detail several perhaps lesser known methods by Phragm´en and Thiele. There are also many cases left as open problems. Contents 1. Introduction 2 2. Notations and general definitions 5 2.1. Some notation 5 2.2. Proportionality thresholds 7 3. General properties 11 4. Party ballots 13 4.1. Unordered and ordered ballots 17 5. Unordered ballots: Block Vote, SNTV, Limited Vote, . 17 6. JR, PJR, EJR 24 7. Phragm´en’s and Thiele’s unordered methods 30 arXiv:1810.06377v1 [cs.GT] 12 Oct 2018 7.1. The party list case 30 7.2. Phragm´en’s method 30 7.3. Thiele’s optimization method 32 7.4. Thiele’s addition method 33 7.5. Thiele’s elimination method 41 7.6. Thiele’s optimization method with general weights 42 7.7. Thiele’s addition method with general weights 45 8.
    [Show full text]
  • 9Hqh]Xhodq (Ohfwlrqv
    9HQH]XHODQ(OHFWLRQV Over 340 million votes registered in total since 2004. $FKLHYHPHQWV First ever nationalwide election with paper trail 2004. First-ever nationwide election with biometric voting session activation – 2012. Venezuela's electronic voting platform has been closely reviewed and validated by international organizations such as the Carter Center, the European Union and the Organization of American States. According to surveys by renowned pollster Datanálisis dating from 2010 and 2012, over 71% of Venezuelans consider that the voting technology used in the country is one of the most advanced in the world, and over 93% consider that voting with Smartmatic machines is “very easy” or “easy”. Venezuela has become a global reference for the best-run elections. &RQWH[W Since 2004 Smartmatic has worked closely with the forefront of election administration by successfully electoral authorities, modernizing Venezuela's automating every step of the electoral cycle. voting system, leading to a remarkable increase in The unique combination of technology, services, the efficiency and transparency of elections. knowledge and experience that Smartmatic provides, The custom-made end-to-end electoral solution has consistently delivered fast official results of developed by Smartmatic has brought Venezuela to indisputable legitimacy. 6FRSH The 13 electoral processes conducted in Venezuela the 504,929 electronic voting machines necessary since 2004 constitute the world’s biggest aggregation to capture the vote of Venezuelans. of automated elections in terms of the number of voters using machines that print voting vouchers. In 2012, Venezuela achieved another record-setting feat in election automation. For the first time in Smartmatic has trained and deployed more than a national election, all voters were biometrically 290,000 operators to set up, distribute and retrieve authenticated as a prerequisite to activate the voting machines.
    [Show full text]
  • Electronic Voting Systems, Smartmatic, Jimmy Carter, and How an Election Was Robbed - El American
    10/2/2021 Electronic Voting Systems, Smartmatic, Jimmy Carter, and How an Election was Robbed - El American Electronic Voting Systems, Smartmatic, Jimmy Carter, and How an Election was Robbed An interview with Maria Corina Machado, Venezuelan civil rights leader and persecuted politician on the truth behind the voting machines startup bought by Dominion BY DEBBIE D’SOUZA · 11.23.20 · 14 MINUTE READ [Leer en español] 747 ve wanted74 t7o ask Maria Corina Machado for many years what it was like to re-live the Share I’ nightmare that started the beginning of the end for Venezuela and I finally got the https://elamerican.com/electronic-voting-smartmatic-jimmy-carter/ 1/30 10/2/2021I nightmare tElectronichat sta rVtotinged tSystems,he beg Smartmatic,inning o Jimmyf the Carter end, and fo rHow Ve ann eElectionzuela was an Robbedd I fi n- Ela lAmericanly got the chance to do it. In light of the US election of 2020 and some of the voting machines that have come into question and their ties to the Venezuelan machines, this interview is perhaps more important than ever before. She was extremely brave to do this and I’m fully aware of the personal risk she is taking. María Corina Machado was elected member of the National Assembly of Venezuela on September 2010, having obtained the highest number of votes of any candidate in the race. Machado ran as an independent presidential candidate during the opposition primaries held on February 2012, and is the head of Vente Venezuela, a political party founded in 2012. Machado has been a firm and vocal critic of the regime in Venezuela.
    [Show full text]
  • Electronic Absentee Ballot Return for UOCAVA Voters
    Electronic Absentee Ballot Return for UOCAVA Voters None Electronic Return for UOCAVA Voters Under Electronic Return for Any UOCAVA Voter (Paper Ballot Must Be Mailed) Certain Conditions e k Alabama Colorado [email, fax] (CRS 1-8.3-113) Alaska [fax, web upload] (6 AAC 25.680) f l Arkansas (AR Code 7-5-411(a)(1)) Hawaii [fax] (HRS 15-5(b)) Arizona [fax, web upload] (ARS 16-543) o g Connecticut (CGS 9-140b) Idaho [fax] (ID Stat. 34-1005) California [fax] (Elec. Code 3106) h Georgia (Ga. Code 21-2-385(a)) Iowa [email, fax] (IAC 721-.1(13)) Delaware [email, fax] (Del. Code Tit. 155525(d)) i Illinois (10 ILCS 5/20) Missouri [email, fax] (Mo. Rev. Stat §115.291) D.C. [email, fax] (DC Mun. Regs. Tit. 3, 718.8) Kentucky (31 Ky. Admin. Regs. 4:130(5)) Texasj [fax] (Elec. Code 105.001) Florida [fax] (FAC 1S-2.030(4)) Marylandm (MD Code Regs. 33.11.03.06) Indiana [email, fax] (IC 3-11-4-6(h)) Michigana Kansas [email, fax] (KS 25-1216(b)) Minnesota (Minn. Stat. 203B.225(b)) Louisianak [fax] (LaRS 18:1308(A)(1)(b)) New Hampshire (NHRS 657:17) Mainen [email, fax] (21-A MRSA §783) New York (Elec. Law 11-212) Massachusetts [email, fax] (MGL Ch. 54, §95) Ohiob Mississippi [email, fax] (MS Code 23-15-699) Pennsylvaniac Montana [email, fax] (MCA 13-21-207) South Dakota (SDCL 17-19-2.5) Nebraska [email, fax] (NRS 32-939.02(6)) Tennessee (Tenn. Code 2-6-502) Nevadak [email, fax] (NRS 293.325) Vermontd New Mexico [email, fax] (NMSA 1-6-9(C)(1)) Virginia (Va.
    [Show full text]
  • Security Considerations for Remote Electronic Voting Over the Internet
    Security Considerations for Remote Electronic Voting over the Internet Avi Rubin AT&T Labs – Research Florham Park, NJ [email protected] http://avirubin.com/ Abstract This paper discusses the security considerations for remote electronic voting in public elections. In particular, we examine the feasibility of running national federal elections over the Internet. The focus of this paper is on the limitations of the current deployed infrastructure in terms of the security of the hosts and the Internet itself. We conclude that at present, our infrastructure is inadequate for remote Internet voting. 1 Introduction The right of individuals to vote for our government representatives is at the heart of the democracy that we enjoy. Historically, great effort and care has been taken to ensure that elections are conducted in a fair manner such that the candidate who should win the election based on the vote count actually does. Of equal importance is that public confidence in the election process remain strong. In the past changes to the election process have proceeded deliberately and judiciously, often entailing lengthy debates over even the minutest of details. These changes are approached so sensitively because a discrepancy in the election system threatens the very principles that make our society free, which in turn, affects every aspect of the way we live. Times are changing. We now live in the Internet era, where decisions cannot be made quickly enough, and there is a perception that anyone who does not jump on the technology bandwagon is going to be left far behind. Businesses are moving online at astonishing speed.
    [Show full text]