Fully Auditable Electronic Secret-Ballot Elections

Total Page:16

File Type:pdf, Size:1020Kb

Fully Auditable Electronic Secret-Ballot Elections Internet Technology Fully Auditable Electronic Secret-Ballot Elections Berry Schoenmakers “What could be easier than counting a bunch of votes!” is a natural thought when one first thinks of the problem of electronic voting. It does not seem very hard either to build an Internet-based system which enables people to vote conveniently from their PCs, WAP phones, or other personal devices. The problem gets much more difficult, however, if one wants to address ballot se- crecy in a serious way. The challenge then is to guarantee voters’ privacy and integrity of the election result at the same time. In this paper we show how special-purpose cryptographic protocols help to achieve this goal. Introduction code. Digital signatures can be used as a more ad- vanced form of authentication, as we will see later on in this paper. The apparent simplicity of electronic voting sys- tems is probably the reason for the large number of For Internet-based elections another simple security initiatives in this area. The Internet provides an ex- measure is to use a secure web server for collecting cellent environment for quick polls, which are easy the votes. In that case, the communication between to implement especially if people need not be pre- the voter’s client and the web server is protected vented from voting more than once. Cookies are by a protocol such as SSL (Secure Socket Layer). sometimes used by web servers to prevent inexpe- Once the communication between client and server rienced users from voting more than once, but this is protected by SSL, the information necessary for line of defense is easily circumvented: users may casting a vote (possibly including software such as simply remove the cookies, or set their browser to a Java applet) may be downloaded securely to the use ‘per-session cookies’ only—which is a good client, and the vote and authentication information idea anyway if one cares about privacy—and so on. may be uploaded securely to the server. The use Even inexperienced users will quickly realize that of SSL thus prevents the votes from being read or they should be able to cast multiple votes by using altered when traveling over the Internet. different computers. Recently, from March 7th to 11th 2000, the Ari- A more serious election will require people to first zona Democratic Party ran such an Internet-based register as a voter. The goal of the registration pro- election for its Presidential Preference Primary. The cess is to give each eligible person a unique iden- election involved several thousands of online voters, tity. Double voting is then prevented simply by ac- see [2]. The voting system has not been certified cepting at most one vote per identity. Clearly, there by the State of Arizona, however, since the election must also be a mechanism to authenticate the use was internal to the Democratic Party. For such a of such an identity. For this purpose a PIN code is system to be used in elections for public officials, sometimes used such that a vote is only accepted for such as the upcoming U.S. presidential elections in a given identity if it comes with the matching PIN November, the system needs to be certified by the July 2000 5 states where it is used. Next consider the situation described in Table 2. A major impediment to government certification of This time to encode a ‘no’ vote, the voter picks a such Internet-voting systems is that these systems random natural number of a sufficiently large size ! fail to satisfy the following two basic requirements: and sends to server and to server . For a " #%$ ‘yes’ vote, the voter sends to server and Ballot Secrecy To protect the voters’ privacy, only to server & . As a result, the individual views of the the voter may know which vote he/she cast. & servers (columns " and in Table 2) contain no Even when the system is audited (or, moni- information about the individual votes. However, tored), all voters should have their privacy pro- by adding the totals for the columns we still get tected. ('*)*+*,-#.'*)*,*$0/21 , which is the desired election Auditability The election results should be verifi- result. (Of course, it must be prevented that for in- able to independent observers (or any interested " #-$*1*+*, stance Alice sends ($*1*+*3 to server and party, for that matter). This means that it is pos- to server & , but we are not concerned with that in sible to check unambiguously that the published this example.) election result corresponds to the ballots cast by legitimate voters. We claim that achieving both of these properties at the same time is impossible when using a single Bulletin Board Model server (or rather a single party) to count the votes. Only by using multiple servers we are able to solve The example in the introduction shows the power this fundamental problem. of using multiple servers, or rather multiple talliers, to distribute the tallying of the votes. The example vote also shows that if both talliers collude they are still Alice yes 1 able to find every voter’s vote. Therefore, the actual Bob no 0 system involves a larger number of talliers such that Carol yes 1 Diane no 0 we may trust at least some of them not to collude. total 2 For instance, we could have a representative of each Table 1: One server learns all the voters’ votes. (major) Dutch political party, representatives of or- ganizations such as the Consumentenbond, and so Let us consider a very simple example to provide on. In this way we achieve a form of distributed some intuition why using multiple servers is use- trust. ful. First consider the situation described by Ta- The idea of distributed trust is incorporated in the ble 1. Each voter must choose between ‘yes’ and bulletin board model, a paradigm for verifiable elec- ‘no’, which are encoded as 1 and 0, respectively. tions set forth by Benaloh et al. (e.g., see [7, 6, 4]). Since the server must check whether the voter is al- Another important aspect of the model is that the lowed to vote, the server learns the identity of the bulletin board is assumed to behave as a broadcast voter. And, since the server must be able to count channel such that everybody is able to see what is the votes, the server learns the individual votes as posted in the bulletin board. well. Hence, there is no privacy, unless we are will- To discuss the bulletin board model we distinguish ing to trust this single server. four types of roles in the election process. ¢¡ ¤£ vote Officers operate the bulletin board server itself. ¦¨ Alice yes ¥§¦©¨ Voters cast their votes by sending electronic ballots ¦ Bob no ¥§¦© to the bulletin board. ¦ Carol yes ¥§¦ Talliers assist in computing the final tally from all ¦ Diane no ¥§¦© ¦ total ¥ correctly submitted ballots. £ Table 2: Two servers ¢¡ and learn none of the voters’ Scrutineers check whether the final tally corre- votes, unless they collude. sponds to the correctly submitted ballots. 6 XOOTIC MAGAZINE A person may play several roles during the same board. election. For example, each member of a nation’s 2. The officers freeze the contents of the voters’ parliament may play the role of voter, tallier, and sections on the bulletin board, and accumulate scrutineer at the same time. For large-scale elec- the valid ballots. tions, however, there are many more voters than tal- 3. The talliers produce their sub-tallies. liers, and the role of scrutineer is probably limited 4. The officers freeze the contents of the talliers’ to a small set of observers. Still, any interested party sections on the bulletin board. The final tally as other than the official observers is also able to play computed from the sub-tallies is also included. the role of scrutineer. 5. The scrutineers read the complete contents of Without going into cryptographic details at this the bulletin board, and check point, we may now outline the steps taken by a vot- 4 that all and only valid ballots are counted, ing system in the bulletin board model. and Before an election is conducted, the following steps 4 that the valid sub-tallies correspond to the are executed. final tally published on the bulletin board. 1. The officers do all the necessary preparations for The tricky part is in the way the scrutineers can do the election: their job without compromising the privacy of the (a) One or several bulletin board servers are set individual votes. Note that, unlike in some other up. In particular, this includes the genera- systems, voters are not anonymous when they cast tion and certification of public keys for these their votes. Instead it is kept secret what they are servers. voting throughout the entire election. Since the vot- (b) The officers determine the deadlines for the ers have to identify themselves as part of the vot- various phases of the election. ing protocol it is easy to prevent double voting. (c) The officers determine the list of eligible Also one knows exactly who voted and who didn’t, voters. which is useful in countries like Belgium where (d) The officers determine the list of talliers. people get a penalty if they don’t cast a vote. (e) The above information is distributed to all relevant parties. 2. The talliers register their public keys with the Cryptographic Protocols bulletin board. To achieve privacy and auditability it does not suf- 3. Eligible voters register their public keys with the fice to combine some off-the-shelf digital signatures bulletin board.
Recommended publications
  • Black Box Voting Ballot Tampering in the 21St Century
    This free internet version is available at www.BlackBoxVoting.org Black Box Voting — © 2004 Bev Harris Rights reserved to Talion Publishing/ Black Box Voting ISBN 1-890916-90-0. You can purchase copies of this book at www.Amazon.com. Black Box Voting Ballot Tampering in the 21st Century By Bev Harris Talion Publishing / Black Box Voting This free internet version is available at www.BlackBoxVoting.org Contents © 2004 by Bev Harris ISBN 1-890916-90-0 Jan. 2004 All rights reserved. No part of this book may be reproduced in any form whatsoever except as provided for by U.S. copyright law. For information on this book and the investigation into the voting machine industry, please go to: www.blackboxvoting.org Black Box Voting 330 SW 43rd St PMB K-547 • Renton, WA • 98055 Fax: 425-228-3965 • [email protected] • Tel. 425-228-7131 This free internet version is available at www.BlackBoxVoting.org Black Box Voting © 2004 Bev Harris • ISBN 1-890916-90-0 Dedication First of all, thank you Lord. I dedicate this work to my husband, Sonny, my rock and my mentor, who tolerated being ignored and bored and galled by this thing every day for a year, and without fail, stood fast with affection and support and encouragement. He must be nuts. And to my father, who fought and took a hit in Germany, who lived through Hitler and saw first-hand what can happen when a country gets suckered out of democracy. And to my sweet mother, whose an- cestors hosted a stop on the Underground Railroad, who gets that disapproving look on her face when people don’t do the right thing.
    [Show full text]
  • Chapter 08-Talion
    Company Information 63 This free internet version is available at www.BlackBoxVoting.org Black Box Voting — © 2004 Bev Harris Rights reserved. ISBN 1-890916-90-0. Paperback version can be purchased at www.Amazon.com 8 Company Information (What you won’t find on the company Web sites) If anything should remain part of the public commons, it is voting. Yet as we have progressed through a series of new voting methods, control of our voting systems, and even our understanding of how they work, has come under new ownership. “It’s a shell game, with money, companies and corporate brands switching in a blur of buy-outs and bogus fronts. It’s a sink- hole, where mobbed-up operators, paid-off public servants, crazed Christian fascists, CIA shadow-jobbers, war-pimping arms dealers — and presidential family members — lie down together in the slime. It’s a hacker’s dream, with pork-funded, half-finished, secretly-programmed computer systems installed without basic security standards by politically-partisan private firms, and pro- tected by law from public scrutiny.” 1 The previous quote, printed in a Russian publication, leads an article which mixes inaccuracies with disturbing truths. Should we assume crooks are in control? Is it a shell game? Whatever it is, it has certainly deviated from community-based counting of votes by the local citizenry. We began buying voting machines in the 1890s, choosing clunky mechanical-lever machines, in part to reduce the shenanigans going This free internet version is available at www.BlackBoxVoting.org 64 Black Box Voting on with manipulating paper-ballot counts.
    [Show full text]
  • Election Reform 20002006
    ElElectiectionon ReformReform What’sWhat’s Changed, What Hasn’t and Why 2000–2006 53134_TextX 2/1/06 8:53 AM Page 1 Table of Contents Introduction . 3 Executive Summary . 5 Voting Systems . 9 Map: Voter-Verified Paper Audit Trails, 2006 . 12 Voter ID . 13 Map: State Voter Verification Requirements, 2000 . 16 Map: State Voter Verification Requirements, 2006 . 17 Statewide Registration Databases . 19 Map: Statewide Voter Registration Databases, 2000 . 22 Map: Statewide Voter Registration Databases, 2006 . 23 Chart: Statewide Voter Registration Database Contracts/Developers . 24 Legislation . 25 Litigation . 27 Map: Absentee Voting By Mail, 2000. 28 Map: Absentee Voting By Mail, 2006. 29 Map: Pre-Election Day In-Person Voting, 2000 . 30 Map: Pre-Election Day In-Person Voting, 2006 . 31 Provisional Voting . 32 Map: Provisional Balloting, 2000 . 34 Map: Provisional Balloting, 2006 . 35 Map: HAVA Fund Distribution . 36 Election Reform in the States . 39 Endnotes. 73 Methodology . 81 Table of Contents 1 ELECTION REFORM SINCE NOVEMBER 2000 53134_Text 1/28/06 2:47 AM Page 2 53134_Text 1/28/06 2:47 AM Page 3 am pleased to present the fourth edition of And watching it all, the electorate – better-informed electionline.org’s What’s Changed, What Hasn’t about the specifics of the electoral process than any and Why – our annual report detailing the state time in our history – continues to monitor develop- Iof election reform nationwide. ments and ask how, if at all, such changes will affect them. As 2006 begins, the standard title of the report is espe- cially apt. The Help America Vote Act of 2002 (HAVA) This is a fascinating time for followers of election imposed a number of key deadlines that finally arrived reform – and we hope this latest report will assist you January 1; as a result, the existence (or lack thereof) in understanding What’s Changed, What Hasn’t and of electoral changes – and the reasons why – are no Why.
    [Show full text]
  • Voters' Evaluations of Electronic Voting Systems
    American Politics Research Volume 36 Number 4 July 2008 580-611 © 2008 Sage Publications Voters’ Evaluations of 10.1177/1532673X08316667 http://apr.sagepub.com hosted at Electronic Voting Systems http://online.sagepub.com Results From a Usability Field Study Paul S. Herrnson University of Maryland Richard G. Niemi University of Rochester Michael J. Hanmer University of Maryland Peter L. Francia East Carolina University Benjamin B. Bederson University of Maryland Frederick G. Conrad University of Michigan, University of Maryland Michael W. Traugott University of Michigan Electronic voting systems were developed, in part, to make voting easier and to boost voters’ confidence in the election process. Using three new approaches to studying electronic voting systems—focusing on a large-scale field study of the usability of a representative set of systems—we demonstrate that voters view these systems favorably but that design differences have a substantial impact on voters’ satisfaction with the voting process and on the need to request help. Factors associated with the digital divide played only a small role with respect to overall satisfaction but they were strongly associated with feeling the need for help. Results suggest numerous possible improvements in electronic voting systems as well as the need for continued analysis that assesses specific char- acteristics of both optical scan and direct recording electronic systems. Keywords: election reform; voting technology; public opinion; usability; voting machines olitical scientists’ interest in voting systems and ballots may seem rela- Ptively recent but research on these topics goes back to the beginning of the profession and includes a long line of work on ballot content (Allen, 580 Downloaded from apr.sagepub.com by guest on December 9, 2015 Herrnson et al.
    [Show full text]
  • Computational Aspects of Voting: a Literature Survey Fatima Talib
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by RIT Scholar Works Rochester Institute of Technology RIT Scholar Works Theses Thesis/Dissertation Collections 2007 Computational aspects of voting: a literature survey Fatima Talib Follow this and additional works at: http://scholarworks.rit.edu/theses Recommended Citation Talib, Fatima, "Computational aspects of voting: a literature survey" (2007). Thesis. Rochester Institute of Technology. Accessed from This Thesis is brought to you for free and open access by the Thesis/Dissertation Collections at RIT Scholar Works. It has been accepted for inclusion in Theses by an authorized administrator of RIT Scholar Works. For more information, please contact [email protected]. Fatima Al-Raisi May 16th, 2007 Abstract Preference aggregation is a topic of study in different fields such as philosophy, mathematics, economics and political science. Recently, computational aspects of preference aggregation have gained especial attention and “computational politics” has emerged as a marked line of research in computer science with a clear concentration on voting protocols. The field of voting systems, rooted in social choice the- ory, has expanded notably in both depth and breadth in the last few decades. A significant amount of this growth comes from studies con- cerning the computational aspects of voting systems. This thesis comprehensively reviews the work on voting systems (from a computing perspective) by listing, classifying and comparing the re- sults obtained by different researchers in the field. This survey covers a wide range of new and historical results yet provides a profound commentary on related work as individual studies and in relation to other related work and to the field in general.
    [Show full text]
  • Electronic Voting
    Electronic Voting Ronald L. Rivest Laboratory for Computer Science Massachusetts Institute of Technology Cambridge, MA 02139 [email protected] 1 Introduction Over the years, with varying degrees of success, inventors have repeatedly tried to adapt the latest technology to the cause of improved voting. For example, on June 1, 1869 Thomas A. Edison received U.S. Patent 90,646 for an \Electric Vote-Recorder" intended for use in Congress. It was never adopted because it was allegedly \too fast" for the members of Congress. Yet it is clear that we have not reached perfection in voting technology, as evidenced by Florida's “butterfly ballots" and \dimpled chads." Stimulated by Florida's election problems, the California Institute of Tech- nology and MIT have begun a joint study of voting technologies [5], with the dual objectives of analyzing technologies currently in use and suggesting im- provements. This study, funded by the Carnegie Foundation, complements the Carter/Ford commision [6], which is focusing on political rather than technolog- ical issues. Electronic voting will be studied. Among people considering electronic voting systems for the first time, the following two questions seem to be the most common: Could I get a receipt telling me how I voted? Could the U.S. Presidential elections be held on the Internet? The first question is perhaps most easily answered (in the negative), by point- ing out that receipts would enable vote-buying and voter coercion: party X would pay $20 to every voter that could show a receipt of having voted for party X's candidate. Designated-verifier receipts, however, where the voter is the only designated verifier—that is, the only one who can authenticate the receipt as valid|would provide an interesting alternative approach to receipts that avoids the vote-buying and coercion problem.
    [Show full text]
  • Voting System Failures: a Database Solution
    B R E N N A N CENTER FOR JUSTICE voting system failures: a database solution Lawrence Norden Brennan Center for Justice at New York University School of Law about the brennan center for justice The Brennan Center for Justice at New York University School of Law is a non-partisan public policy and law institute that focuses on fundamental issues of democracy and justice. Our work ranges from voting rights to campaign finance reform, from racial justice in criminal law to presidential power in the fight against terrorism. A singular institution – part think tank, part public interest law firm, part advocacy group – the Brennan Center combines scholarship, legislative and legal advocacy, and communication to win meaningful, measurable change in the public sector. about the brennan center’s voting rights and elections project The Brennan Center promotes policies that protect rights, equal electoral access, and increased political participation on the national, state and local levels. The Voting Rights and Elections Project works to expend the franchise, to make it as simple as possible for every eligible American to vote, and to ensure that every vote cast is accurately recorded and counted. The Center’s staff provides top-flight legal and policy assistance on a broad range of election administration issues, including voter registration systems, voting technology, voter identification, statewide voter registration list maintenance, and provisional ballots. The Help America Vote Act in 2002 required states to replace antiquated voting machines with new electronic voting systems, but jurisdictions had little guidance on how to evaluate new voting technology. The Center convened four panels of experts, who conducted the first comprehensive analyses of electronic voting systems.
    [Show full text]
  • Thresholds Quantifying Proportionality Criteria for Election Methods
    THRESHOLDS QUANTIFYING PROPORTIONALITY CRITERIA FOR ELECTION METHODS SVANTE JANSON Abstract. We define several different thresholds for election methods by considering different scenarios, corresponding to different proportion- ality criteria that have been proposed by various authors. In particular, we reformulate the criteria known as DPC, PSC, JR, PJR, EJR in our setting. We consider multi-winner election methods of different types, using ballots with unordered lists of candidates or ordered lists, and for comparison also methods using only party lists. The thresholds are cal- culated for many different election methods. The considered methods include classical ones such as BV, SNTV and STV (with some results going back to e.g. Droop and Dodgson in the 19th century); we also study in detail several perhaps lesser known methods by Phragm´en and Thiele. There are also many cases left as open problems. Contents 1. Introduction 2 2. Notations and general definitions 5 2.1. Some notation 5 2.2. Proportionality thresholds 7 3. General properties 11 4. Party ballots 13 4.1. Unordered and ordered ballots 17 5. Unordered ballots: Block Vote, SNTV, Limited Vote, . 17 6. JR, PJR, EJR 24 7. Phragm´en’s and Thiele’s unordered methods 30 arXiv:1810.06377v1 [cs.GT] 12 Oct 2018 7.1. The party list case 30 7.2. Phragm´en’s method 30 7.3. Thiele’s optimization method 32 7.4. Thiele’s addition method 33 7.5. Thiele’s elimination method 41 7.6. Thiele’s optimization method with general weights 42 7.7. Thiele’s addition method with general weights 45 8.
    [Show full text]
  • 9Hqh]Xhodq (Ohfwlrqv
    9HQH]XHODQ(OHFWLRQV Over 340 million votes registered in total since 2004. $FKLHYHPHQWV First ever nationalwide election with paper trail 2004. First-ever nationwide election with biometric voting session activation – 2012. Venezuela's electronic voting platform has been closely reviewed and validated by international organizations such as the Carter Center, the European Union and the Organization of American States. According to surveys by renowned pollster Datanálisis dating from 2010 and 2012, over 71% of Venezuelans consider that the voting technology used in the country is one of the most advanced in the world, and over 93% consider that voting with Smartmatic machines is “very easy” or “easy”. Venezuela has become a global reference for the best-run elections. &RQWH[W Since 2004 Smartmatic has worked closely with the forefront of election administration by successfully electoral authorities, modernizing Venezuela's automating every step of the electoral cycle. voting system, leading to a remarkable increase in The unique combination of technology, services, the efficiency and transparency of elections. knowledge and experience that Smartmatic provides, The custom-made end-to-end electoral solution has consistently delivered fast official results of developed by Smartmatic has brought Venezuela to indisputable legitimacy. 6FRSH The 13 electoral processes conducted in Venezuela the 504,929 electronic voting machines necessary since 2004 constitute the world’s biggest aggregation to capture the vote of Venezuelans. of automated elections in terms of the number of voters using machines that print voting vouchers. In 2012, Venezuela achieved another record-setting feat in election automation. For the first time in Smartmatic has trained and deployed more than a national election, all voters were biometrically 290,000 operators to set up, distribute and retrieve authenticated as a prerequisite to activate the voting machines.
    [Show full text]
  • Electronic Voting Systems, Smartmatic, Jimmy Carter, and How an Election Was Robbed - El American
    10/2/2021 Electronic Voting Systems, Smartmatic, Jimmy Carter, and How an Election was Robbed - El American Electronic Voting Systems, Smartmatic, Jimmy Carter, and How an Election was Robbed An interview with Maria Corina Machado, Venezuelan civil rights leader and persecuted politician on the truth behind the voting machines startup bought by Dominion BY DEBBIE D’SOUZA · 11.23.20 · 14 MINUTE READ [Leer en español] 747 ve wanted74 t7o ask Maria Corina Machado for many years what it was like to re-live the Share I’ nightmare that started the beginning of the end for Venezuela and I finally got the https://elamerican.com/electronic-voting-smartmatic-jimmy-carter/ 1/30 10/2/2021I nightmare tElectronichat sta rVtotinged tSystems,he beg Smartmatic,inning o Jimmyf the Carter end, and fo rHow Ve ann eElectionzuela was an Robbedd I fi n- Ela lAmericanly got the chance to do it. In light of the US election of 2020 and some of the voting machines that have come into question and their ties to the Venezuelan machines, this interview is perhaps more important than ever before. She was extremely brave to do this and I’m fully aware of the personal risk she is taking. María Corina Machado was elected member of the National Assembly of Venezuela on September 2010, having obtained the highest number of votes of any candidate in the race. Machado ran as an independent presidential candidate during the opposition primaries held on February 2012, and is the head of Vente Venezuela, a political party founded in 2012. Machado has been a firm and vocal critic of the regime in Venezuela.
    [Show full text]
  • Electronic Absentee Ballot Return for UOCAVA Voters
    Electronic Absentee Ballot Return for UOCAVA Voters None Electronic Return for UOCAVA Voters Under Electronic Return for Any UOCAVA Voter (Paper Ballot Must Be Mailed) Certain Conditions e k Alabama Colorado [email, fax] (CRS 1-8.3-113) Alaska [fax, web upload] (6 AAC 25.680) f l Arkansas (AR Code 7-5-411(a)(1)) Hawaii [fax] (HRS 15-5(b)) Arizona [fax, web upload] (ARS 16-543) o g Connecticut (CGS 9-140b) Idaho [fax] (ID Stat. 34-1005) California [fax] (Elec. Code 3106) h Georgia (Ga. Code 21-2-385(a)) Iowa [email, fax] (IAC 721-.1(13)) Delaware [email, fax] (Del. Code Tit. 155525(d)) i Illinois (10 ILCS 5/20) Missouri [email, fax] (Mo. Rev. Stat §115.291) D.C. [email, fax] (DC Mun. Regs. Tit. 3, 718.8) Kentucky (31 Ky. Admin. Regs. 4:130(5)) Texasj [fax] (Elec. Code 105.001) Florida [fax] (FAC 1S-2.030(4)) Marylandm (MD Code Regs. 33.11.03.06) Indiana [email, fax] (IC 3-11-4-6(h)) Michigana Kansas [email, fax] (KS 25-1216(b)) Minnesota (Minn. Stat. 203B.225(b)) Louisianak [fax] (LaRS 18:1308(A)(1)(b)) New Hampshire (NHRS 657:17) Mainen [email, fax] (21-A MRSA §783) New York (Elec. Law 11-212) Massachusetts [email, fax] (MGL Ch. 54, §95) Ohiob Mississippi [email, fax] (MS Code 23-15-699) Pennsylvaniac Montana [email, fax] (MCA 13-21-207) South Dakota (SDCL 17-19-2.5) Nebraska [email, fax] (NRS 32-939.02(6)) Tennessee (Tenn. Code 2-6-502) Nevadak [email, fax] (NRS 293.325) Vermontd New Mexico [email, fax] (NMSA 1-6-9(C)(1)) Virginia (Va.
    [Show full text]
  • Security Considerations for Remote Electronic Voting Over the Internet
    Security Considerations for Remote Electronic Voting over the Internet Avi Rubin AT&T Labs – Research Florham Park, NJ [email protected] http://avirubin.com/ Abstract This paper discusses the security considerations for remote electronic voting in public elections. In particular, we examine the feasibility of running national federal elections over the Internet. The focus of this paper is on the limitations of the current deployed infrastructure in terms of the security of the hosts and the Internet itself. We conclude that at present, our infrastructure is inadequate for remote Internet voting. 1 Introduction The right of individuals to vote for our government representatives is at the heart of the democracy that we enjoy. Historically, great effort and care has been taken to ensure that elections are conducted in a fair manner such that the candidate who should win the election based on the vote count actually does. Of equal importance is that public confidence in the election process remain strong. In the past changes to the election process have proceeded deliberately and judiciously, often entailing lengthy debates over even the minutest of details. These changes are approached so sensitively because a discrepancy in the election system threatens the very principles that make our society free, which in turn, affects every aspect of the way we live. Times are changing. We now live in the Internet era, where decisions cannot be made quickly enough, and there is a perception that anyone who does not jump on the technology bandwagon is going to be left far behind. Businesses are moving online at astonishing speed.
    [Show full text]