Petition for a Writ of Certiorari Filed

Total Page:16

File Type:pdf, Size:1020Kb

Petition for a Writ of Certiorari Filed No. _________ ================================================================ In The Supreme Court of the United States --------------------------------- --------------------------------- WILLIAM M. GARDNER, in his official capacity as Secretary of State of the State of New Hampshire, Petitioner, v. LEON H. RIDEOUT, ANDREW LANGOIS, and BRANDON D. ROSS, Respondents. --------------------------------- --------------------------------- On Petition For Writ Of Certiorari To The United States Court Of Appeals For The First Circuit --------------------------------- --------------------------------- PETITION FOR WRIT OF CERTIORARI --------------------------------- --------------------------------- JOSEPH A. FOSTER New Hampshire Attorney General LAURA E. B. LOMBARDI* Senior Assistant Attorney General New Hampshire Department of Justice 33 Capitol Street Concord, NH 03301-6397 Phone: (603) 271-3675 [email protected] STEPHEN G. LABONTE Assistant Attorney General Counsel for Petitioner *Counsel of Record ================================================================ COCKLE LEGAL BRIEFS (800) 225-6964 WWW.COCKLELEGALBRIEFS.COM i QUESTIONS PRESENTED In 2014, New Hampshire amended N.H. Rev. Stat. Ann. (RSA) § 659:35, I, to address the potential harm caused by the use of recent technology in voter coercion and vote buying schemes. The amendment prohibited a voter from allowing “his or her ballot to be seen by any person with the intention of letting it be known how he or she is about to vote or how he or she has voted except as provided in RSA 659:20.” The prohibi- tion expressly included “taking a digital image or pho- tograph of his or her marked ballot and distributing or sharing the image via social media or by any other means.” The questions presented are: 1. Whether N.H. RSA 659:35, I, is narrowly tailored to serve a significant governmental interest, thus passing intermediate scrutiny. 2. Whether any restriction placed on speech by N.H. RSA 659:35, I, is content-neutral. 3. Whether N.H. RSA 659:35, I, serves a compelling governmental interest and is nar- rowly tailored to achieve that interest, thus passing strict scrutiny. ii PARTIES TO THE PROCEEDING The Petitioner is William M. Gardner, in his offi- cial capacity as Secretary of State for the State of New Hampshire. The Respondents are Leon H. Rideout, Andrew Langois and Brandon D. Ross. There are no other par- ties to this proceeding. iii TABLE OF CONTENTS Page QUESTIONS PRESENTED .................................. i PARTIES TO THE PROCEEDING ........................ ii TABLE OF CONTENTS ........................................ iii TABLE OF AUTHORITIES ................................... iv PETITION FOR A WRIT OF CERTIORARI ......... 1 OPINIONS BELOW ............................................... 1 JURISDICTION ..................................................... 1 CONSTITUTIONAL AND STATUTORY PROVI- SIONS INVOLVED ............................................. 2 STATEMENT OF THE CASE ................................ 3 REASON TO GRANT THE PETITION ................. 6 This Case Presents Important Issues of Consti- tutional Law Which Should Be Settled By This Court .................................................................... 6 CONCLUSION ....................................................... 14 APPENDIX United States Court of Appeals for the First Cir- cuit, Opinion, September 28, 2016 .................. App. 1 United States District Court for the District of New Hampshire, Memorandum and Order, August 11, 2015 .............................................. App. 22 iv TABLE OF AUTHORITIES Page CASES Burson v. Freeman, 504 U.S. 191 (1992) ..... 6, 10, 11, 12 Crookston v. Johnson, 2016 U.S. App. LEXIS 19494 ......................................................................... 9 Hill v. Williams, 2016 U.S. Dist. LEXIS 155460 ........ 10 McIntyre v. Ohio Elections Comm’n, 514 U.S. 334 (1995) ......................................................................... 7 Munro v. Socialist Workers Party, 479 U.S. 189 (1986) ....................................................................... 12 Reynolds v. Sims, 377 U.S. 533 (1964).......................... 6 Rideout v. Gardner, 123 F. Supp. 3d 218 (D.N.H. 2015) .......................................................................... 1 Rideout v. Gardner, 838 F.3d 65 (2016) ........................ 1 Silberberg v. Bd. of Elections of N.Y., 2016 U.S. Dist. LEXIS 152784 .............................................. 8, 9 Wesberry v. Sanders, 376 U.S. 1 (1964) ........................ 6 CONSTITUTIONAL PROVISIONS U.S. Const., amend. I .................................... 2, 5, 10, 12 U.S. Const., amend. XIV, sec. 1 ..................................... 2 STATUTES 28 U.S.C. § 1254(1) ........................................................ 1 42 U.S.C. § 1983 ............................................................ 5 1911 N.H. Laws Ch. 102, Sec. 2 .................................... 7 v TABLE OF AUTHORITIES – Continued Page RSA 659:20 ............................................................... 3, 4 RSA 659:35, I .................................................. 2, 4, 8, 12 RSA 659:35, II ............................................................... 3 OTHER AUTHORITIES Katie Rogers, Are Selfies With Your Ballot Legal? Depends on Where You Vote, The New York Times (Nov. 8, 2016) at http://www.nytimes. com/2016/11/09/us/politics/ballot-selfies.html .......... 8 1 PETITION FOR A WRIT OF CERTIORARI William M. Gardner, in his official capacity as Sec- retary of State for the State of New Hampshire re- spectfully petitions for a writ of certiorari to review the judgment of the United States Court of Appeals for the First Circuit. --------------------------------- --------------------------------- OPINIONS BELOW The opinion of the United States Court of Appeals for the First Circuit in this matter is reported as Rideout v. Gardner, 838 F.3d 65 (2016) (App. 1).1 The opinion of the United States District Court for the District of New Hampshire in this matter is re- ported as Rideout v. Gardner, 123 F. Supp. 3d 218 (D.N.H. 2015) (App. 22). --------------------------------- --------------------------------- JURISDICTION Judgment of the First Circuit was entered on September 28, 2016. This petition for certiorari is filed within 90 days of the issuance of that judgment. This Court has jurisdiction under 28 U.S.C. § 1254(1). --------------------------------- --------------------------------- 1 “App.” refers to the appendix to this petition and page num- ber. 2 CONSTITUTIONAL AND STATUTORY PROVISIONS INVOLVED The First Amendment to the United States Con- stitution provides as follows: Congress shall make no law respecting an es- tablishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the peo- ple peaceably to assemble, and to petition the Government for a redress of grievances. The Fourteenth Amendment to the United States Constitution, Section 1, provides as follows: All persons born or naturalized in the United States, and subject to the jurisdiction thereof, are citizens of the United States and of the State wherein they reside. No State shall make or enforce any law which shall abridge the privileges or immunities of citizens of the United States; nor shall any State deprive any person of life, liberty, or property, without due process of law; nor deny to any person within its jurisdiction the equal protection of the laws. RSA 659:35, I, as amended by HB 366, provides as follows: No voter shall allow his or her ballot to be seen by any person with the intention of let- ting it be known how he or she is about to vote or how he or she has voted except as provided 3 in RSA 659:20.2 This prohibition shall include taking a digital image or photograph of his or her marked ballot and distributing or sharing the image via social media or by any other means. (Footnote added). RSA 659:35, II, provides as follows: No voter shall place a distinguishing mark upon his or her ballot nor write in any name as the candidate of his or her choice with the intention of thereby placing a distinguishing mark upon the ballot. --------------------------------- --------------------------------- STATEMENT OF THE CASE At the heart of this case lies the authority of the New Hampshire Legislature to proactively amend its current statutory scheme in order to protect the purity and integrity of the State’s election process in light of the dynamic changes made by technology over the past 2 RSA 659:20 states: “Any voter who declares to the modera- tor under oath that said voter needs assistance marking his or her ballot shall, upon the voter’s choice and request after the moder- ator has informed the voter of the accessible voting options that are available at the polling place, receive the assistance of one or both of the inspectors of election detailed for that purpose by the moderator or of a person of the voter’s choice provided that the person is not the voter’s employer or union official. Such person so assisting shall be sworn, shall mark the ballot as directed by said voter, and shall thereafter give no information regarding the same. Such person so assisting shall leave the space within the guardrail with the voter.” 4 quarter century. In 2014, the New Hampshire Legisla- ture amended N.H. Rev. Stat. Ann. (RSA) § 659:35, I, to ensure that the voters of New Hampshire can cast their votes free from the threat of reprisal, ensuring that elections in
Recommended publications
  • Introduction Voting In-Person Through Physical Secret Ballot
    CL 166/13 – Information Note 1 – April 2021 Alternative Voting Modalities for Election by Secret Ballot Introduction 1. This note presents an update on the options for alternative voting modalities for conducting a Secret Ballot at the 42nd Session of the Conference. At the Informal Meeting of the Independent Chairperson with the Chairpersons and Vice-Chairpersons of the Regional Groups on 18 March 2021, Members identified two possible, viable options to conduct a Secret Ballot while holding the 42nd Conference in virtual modality. Namely, physical in-person voting and an online voting system. A third option of voting by postal correspondence was also presented to the Chairpersons and Vice- chairpersons for their consideration. 2. These options have since been further elaborated in Appendix B of document CL 166/13 Arrangements for the 42nd Session of the Conference, for Council’s consideration at its 166th Session under item 13 of its Agenda. During discussions under item 13, Members not only sought further information on the practicalities of adopting one of the aforementioned options but also introduced a further alternative voting option: a hybrid of in-person and online voting. 3. In aiming to facilitate a more informed decision by Members, this note provides additional information on the previously identified voting options on which Members have already received preliminary information, and introduces the possibility of a hybrid voting option by combining in- person and online voting to create a hybrid option. 4. This Information Note further adds information on the conduct of a roll call vote through the Zoom system. Such a vote will be required at the beginning of the Conference for the endorsement of the special procedures outlined in Appendix A under item 3, Adoption of the Agenda and Arrangements for the Session, following their consideration by the General Committee of the Conference at its first meeting.
    [Show full text]
  • How to Read the Bill History Page Hb 2480
    HOW TO READ THE BILL HISTORY PAGE This tutorial will show you how to read the bill information and history page for a bill. This page and the next show the bill history for HB 2480 from the 2007-08 legislative session as it appears on the webpage. Beginning on page 3 this bill history is shown with a detailed explanation of what each line means. HB 2480 - 2007-08 (What is this?) Concerning public transportation fares. Sponsors: Clibborn, McIntire, Simpson Companion Bill: SB 6353 Go to documents. Go to videos. Bill History 2008 REGULAR SESSION Dec 21 Prefiled for introduction. Jan 14 First reading, referred to Transportation. (View Original Bill) Jan 17 Public hearing in the House Committee on Transportation at 3:30 PM. Jan 29 Executive action taken in the House Committee on Transportation at 3:30 PM. TR - Executive action taken by committee. TR - Majority; 1st substitute bill be substituted, do pass. (View 1st Substitute) Minority; do not pass. Feb 1 Passed to Rules Committee for second reading. Feb 12 Made eligible to be placed on second reading. Feb 13 Placed on second reading. Feb 14 1st substitute bill substituted (TR 08). (View 1st Substitute) Floor amendment(s) adopted. Rules suspended. Placed on Third Reading. Third reading, passed; yeas, 84; nays, 10; absent, 0; excused, 4. (View Roll Calls) (View 1st Engrossed) IN THE SENATE Feb 16 First reading, referred to Transportation. Feb 20 Public hearing in the Senate Committee on Transportation at 1:30 PM. Feb 26 Executive action taken in the Senate Committee on Transportation at 3:30 PM.
    [Show full text]
  • CONGRESSIONAL RECORD-SENATE. March 10
    1776 CONGRESSIONAL RECORD-SENATE. MARcH 10, H. Owen and ofW. W. Welch-severally to the Committee on Wax braces some six or seven hundred miles of road under one control, Claims. and, talring it in connection with its control of the Georgia road, By Mr. A.. HERR SMITH: The petition of soldiers and sailors of more than that. That is all worked in connection with the expor­ the late war for an increase of pension to all pensioners who lost an tation of productions at Savannah. The Louisville and Nashville arm and leg while in the line of duty-to the Committee on Invalid system, which is very prominent and controls probably some two Pensions. thousand miles of road, or more, works in harmony with the Central. By Mr. STONE: The petition of Patrick McDonald, to be placed That combination of roads naturally looks to Savannah as an outlet on the retired list-to the Committee on Military Affairs. for a great deal of the produce that is shipped over its lines. There By Mr. TALBOTT: Papers relating to the claim of Alexander M. is then the line by way of'the Georgia and Cent.ral, through Atlanta Templeton-to the Committee on War Claims. over the Stat.e Road~ as it is called, by the Nashville, Chattanoo~a By Mr. URNER: Papers relating to the claim of Robertson Topp antl Saint Louis, al o connecting with the Louisville and Nashviue and William L. Vance-to the same committee. Road to the western cities. There are the same connections up to By Mr.
    [Show full text]
  • Why Ballot Selfies Are Protected by the First Amendment
    Science and Technology Law Review Volume 18 Number 3 Article 3 2015 A Picture's Worth a Thousand Words: Why Ballot Selfies are Protected by the First Amendment Daniel A. Horwitz Follow this and additional works at: https://scholar.smu.edu/scitech Recommended Citation Daniel A. Horwitz, A Picture's Worth a Thousand Words: Why Ballot Selfies are Protected by the First Amendment, 18 SMU SCI. & TECH. L. REV. 247 (2015) https://scholar.smu.edu/scitech/vol18/iss3/3 This Article is brought to you for free and open access by the Law Journals at SMU Scholar. It has been accepted for inclusion in Science and Technology Law Review by an authorized administrator of SMU Scholar. For more information, please visit http://digitalrepository.smu.edu. A Picture's Worth a Thousand Words: Why Ballot Selfies are Protected by the First Amendment Daniel A. Horwitz* On September 9, 2014, Andrew Langlois walked into his polling place disgusted with the candidates who were running for U.S. Senate in the New Hampshire Republican Primary., Rather than voting for one of the ten candi- dates who appeared on his ballot, Mr. Langlois instead decided to vote for "his recently-deceased dog, 'Akira,'" whom he selected as a write-in candi- date.2 Thereafter, Mr. Langlois whipped out his smartphone, snapped a photo of his completed ballot, and posted the photo to his Facebook page along with the caption: "Because all of the candidates SUCK, I did a write-in of Akira."3 Unfortunately for Mr. Langlois, the election did not go his way.
    [Show full text]
  • Bills of Attainder
    University at Buffalo School of Law Digital Commons @ University at Buffalo School of Law Journal Articles Faculty Scholarship Winter 2016 Bills of Attainder Matthew Steilen University at Buffalo School of Law Follow this and additional works at: https://digitalcommons.law.buffalo.edu/journal_articles Part of the Legal History Commons Recommended Citation Matthew Steilen, Bills of Attainder, 53 Hous. L. Rev. 767 (2016). Available at: https://digitalcommons.law.buffalo.edu/journal_articles/123 This Article is brought to you for free and open access by the Faculty Scholarship at Digital Commons @ University at Buffalo School of Law. It has been accepted for inclusion in Journal Articles by an authorized administrator of Digital Commons @ University at Buffalo School of Law. For more information, please contact [email protected]. ARTICLE BILLS OF ATTAINDER Matthew Steilen* ABSTRACT What are bills of attainder? The traditional view is that bills of attainder are legislation that punishes an individual without judicial process. The Bill of Attainder Clause in Article I, Section 9 prohibits the Congress from passing such bills. But what about the President? The traditional view would seem to rule out application of the Clause to the President (acting without Congress) and to executive agencies, since neither passes bills. This Article aims to bring historical evidence to bear on the question of the scope of the Bill of Attainder Clause. The argument of the Article is that bills of attainder are best understood as a summary form of legal process, rather than a legislative act. This argument is based on a detailed historical reconstruction of English and early American practices, beginning with a study of the medieval Parliament rolls, year books, and other late medieval English texts, and early modern parliamentary diaries and journals covering the attainders of Elizabeth Barton under Henry VIII and Thomas Wentworth, earl of Strafford, under Charles I.
    [Show full text]
  • Parliamentary Debates (Hansard)
    Friday Volume 497 16 October 2009 No. 125 HOUSE OF COMMONS OFFICIAL REPORT PARLIAMENTARY DEBATES (HANSARD) Friday 16 October 2009 £5·00 © Parliamentary Copyright House of Commons 2009 This publication may be reproduced under the terms of the Parliamentary Click-Use Licence, available online through the Office of Public Sector Information website at www.opsi.gov.uk/click-use/ Enquiries to the Office of Public Sector Information, Kew, Richmond, Surrey TW9 4DU; e-mail: [email protected] 551 16 OCTOBER 2009 552 Solicitor-General to make a statement about the Yvonne House of Commons Fletcher case? It emerged last night that, two years ago, a senior lawyer carried out an independent review of Friday 16 October 2009 the case for the Crown Prosecution Service in which he said that the two Libyans involved could be charged for conspiracy to cause death. Neither had diplomatic The House met at half-past Nine o’clock immunity; they escaped from the Libyan embassy. The report made it clear that both those men played an instrumental role in the murder of WPC Yvonne Fletcher. PRAYERS Last night, as I said, it emerged that the Crown Prosecution Service had confirmed that, two years on, The Second Deputy Chairman of Ways and Means took the police had still not provided it with the final case file the Chair as Deputy Speaker (Standing Order No. 3). containing the admissible evidence. Surely the Home Secretary should make a statement explaining why the NEW WRIT Metropolitan police are sitting on that vital evidence, Ordered, and to put our minds at rest by assuring us that Britain’s That the Speaker do issue his Warrant to the Clerk of the trade interests are not being put before the interests of Crown, to make out a new Writ for the electing of a Member to bringing criminals to justice.
    [Show full text]
  • The Effects of Secret Voting Procedures on Political Behavior
    UC San Diego UC San Diego Electronic Theses and Dissertations Title Voting Alone: The Effects of Secret Voting Procedures on Political Behavior Permalink https://escholarship.org/uc/item/50p7t4xg Author Guenther, Scott Publication Date 2016 Peer reviewed|Thesis/dissertation eScholarship.org Powered by the California Digital Library University of California UNIVERSITY OF CALIFORNIA, SAN DIEGO Voting Alone: The Effects of Secret Voting Procedures on Political Behavior A Dissertation submitted in partial satisfaction of the requirements for the degree Doctor of Philosophy in Political Science by Scott M. Guenther Committee in charge: Professor James Fowler, Chair Professor Samuel Kernell, Co-Chair Professor Julie Cullen Professor Seth Hill Professor Thad Kousser 2016 Copyright Scott M. Guenther, 2016 All rights reserved. The Dissertation of Scott M. Guenther is approved, and it is acceptable in quality and form for publication on microfilm and electronically: Co-Chair Chair University of California, San Diego 2016 iii DEDICATION To my parents. iv EPIGRAPH Three may keep a secret, if two of them are dead. { Benjamin Franklin v TABLE OF CONTENTS Signature Page................................... iii Dedication...................................... iv Epigraph......................................v Table of Contents.................................. vi List of Figures................................... viii List of Tables.................................... ix Acknowledgements.................................x Vita........................................
    [Show full text]
  • Tracing the History of the Bill of Rights
    University of Minnesota Law School Scholarship Repository Constitutional Commentary 2019 From Appendix to Heart: Tracing the History of the Bill of Rights Lael Weinberger Follow this and additional works at: https://scholarship.law.umn.edu/concomm Part of the Law Commons Recommended Citation Weinberger, Lael, "From Appendix to Heart: Tracing the History of the Bill of Rights" (2019). Constitutional Commentary. 1202. https://scholarship.law.umn.edu/concomm/1202 This Article is brought to you for free and open access by the University of Minnesota Law School. It has been accepted for inclusion in Constitutional Commentary collection by an authorized administrator of the Scholarship Repository. For more information, please contact [email protected]. 07 WEINBERGER_FINAL (DO NOT DELETE) 12/23/2019 10:24 AM FROM APPENDIX TO HEART: TRACING THE HISTORY OF THE BILL OF RIGHTS THE HEART OF THE CONSTITUTION: HOW THE BILL OF RIGHTS BECAME THE BILL OF RIGHTS. Gerard N. Magliocca.1 New York: Oxford University Press, 2018. Pp. xii + 235. $29.95 (Hardcover). Lael Weinberger2 I. INTRODUCTION: THE THINGS WE TAKE FOR GRANTED The upper level of the National Archives museum features three documents, grandly presented in a marble rotunda: the Declaration of Independence, the Constitution, and the Bill of Rights. When the hall is open for visitors, the documents are displayed behind bulletproof glass and constantly attended by guards; at night, the documents are stored still more securely in a bomb-proof vault.3 “In this Rotunda are the most cherished material possessions of a great and good nation,” President George W. Bush said in 2003 at an event reopening the hall after a major renovation.4 Every branch of government was represented at the event, offering encomiums to the documents enshrined in the hall.
    [Show full text]
  • Insert Catchy Title
    Addressing Tomorrow’s Terrorists Andrew Peterson* American anti-terrorism laws are insufficient to address the next wave of global terrorism. When President Bush declared that the United States had begun a “war on terror,”1 the entire government began to reorient itself to tackle America’s newest “generational challenge.”2 The Department of Justice (DOJ) joined this massive effort, declaring in a new Strategic Plan that its focus was not simply to prosecute terrorists for crimes, but to “[p]revent, disrupt, and defeat terrorist operations before they occur.”3 Despite its constant talk of reorientation, however, DOJ has been limited in its ability to creatively address the war on terror for one simple reason: many of the relevant federal criminal statutes are poorly constructed. Prior to September 1994, there were no federal criminal prohibitions that specifically punished material support for terrorism. Prosecutors had to rely instead on generic federal crimes, such as murder and money laundering, or on a variety of statutes condemning specific acts of terrorism, such as air piracy or hostage taking. After the 1993 terrorist bombing of the World Trade Center, this situation rapidly changed. Legislators hastily drafted a number of statutes and amendments that sought to address the domestic terrorist threat. Acting in response to public demand for quick, decisive action, Congress generally maximized the scope of anti-terror prohibitions while overriding any legal obstacles to quick prosecution that were presented by the judiciary. Although it is difficult to fault Congress for acting decisively, the bedrock of counterterrorism enforcement laid down by these statutes is deeply flawed.
    [Show full text]
  • Calendar No. 80
    Calendar No. 80 113TH CONGRESS REPORT " ! 1st Session SENATE 113–40 BORDER SECURITY, ECONOMIC OPPORTUNITY, AND IMMIGRATION MODERNIZATION ACT JUNE 7, 2013.—Ordered to be printed Mr. LEAHY, from the Committee on the Judiciary, submitted the following R E P O R T together with ADDITIONAL AND MINORITY VIEWS [To accompany S. 744] The Committee on the Judiciary, to which was referred the bill (S. 744), to provide for comprehensive immigration reform, and for other purposes, having considered the same, reports favorably thereon, with an amendment, and recommends that the bill, as amended, do pass. CONTENTS Page I. Background and Purpose of the Border Security, Economic Opportunity, and Immigration Modernization Act ........................................................ 1 II. History of the Bill and Committee Consideration ....................................... 22 III. Section-by-Section Summary of the Bill ...................................................... 75 IV. Congressional Budget Office Cost Estimate ................................................ 161 V. Regulatory Impact Evaluation ...................................................................... 161 VI. Conclusion ...................................................................................................... 161 VII. Additional and Minority Views ..................................................................... 163 VIII. Changes to Existing Law Made by the Bill, as Reported ........................... 186 I. BACKGROUND AND PURPOSE OF THE BORDER SECURITY, ECONOMIC
    [Show full text]
  • Open-Secret Voting
    ISSN 1936-5349 (print) ISSN 1936-5357 (online) HARVARD JOHN M. OLIN CENTER FOR LAW, ECONOMICS, AND BUSINESS OPEN-SECRET VOTING Adrian Vermeule Discussion Paper No. 674 07/2010 Harvard Law School Cambridge, MA 02138 This paper can be downloaded without charge from: The Harvard John M. Olin Discussion Paper Series: http://www.law.harvard.edu/programs/olin_center/ The Social Science Research Network Electronic Paper Collection: http://ssrn.com/ OPEN-SECRET VOTING Adrian Vermeule* Stock debates about transparency and secrecy usually assume that open voting and secret voting are mutually exclusive. But these positions present a false alternative; open and secret voting can be employed as complements in a larger decision-procedure. In what follows I will propose a hybrid or dual procedure of open-secret voting, and attempt to specify the conditions under which that procedure works well. I suggest that open-secret voting can best be justified as an institutional means of obtaining a second opinion from the voting group. A second opinion of this sort might produce informational benefits either for the members of the voting group itself, for outside parties, or for both. (This is a companion paper to Adrian Vermeule, “Second Opinions,” available on SSRN). * John H. Watson Professor of Law, Harvard Law School. Prepared for a symposium on “Scrutin secret et vote public, huis clos et débat ouvert” at the College de France, June 3-4, 2010. Thanks to Jacob Gersen, Don Herzog, Adriaan Lanni, Daryl Levinson, Eric Posner, Melissa Schwartzberg, Philippe Urfalino, and the conference participants for helpful comments, and to Michael Kenneally for helpful research assistance.
    [Show full text]
  • Adapting Helios for Provable Ballot Privacy
    Adapting Helios for provable ballot privacy David Bernhard1, V´eronique Cortier2, Olivier Pereira3, Ben Smyth2, Bogdan Warinschi1 1 University of Bristol, England 2 LORIA - CNRS, France 3 Universit´eCatholique de Louvain, Belgium Abstract. Recent results show that the current implementation of He- lios, a practical e-voting protocol, does not ensure independence of the cast votes, and demonstrate the impact of this lack of independence on vote privacy. Some simple fixes seem to be available and security of the revised scheme has been studied with respect to symbolic models. In this paper we study the security of Helios using computational models. Our first contribution is a model for the property known as ballot privacy that generalizes and extends several existing ones. Using this model, we investigate an abstract voting scheme (of which the revised Helios is an instantiation) built from an arbitrary encryp- tion scheme with certain functional properties. We prove, generically, that whenever this encryption scheme falls in the class of voting-friendly schemes that we define, the resulting voting scheme provably satisfies ballot privacy. We explain how our general result yields cryptographic security guaran- tees for the revised version of Helios (albeit from non-standard assump- tions). Furthermore, we show (by giving two distinct constructions) that it is possible to construct voting-friendly encryption, and therefore voting schemes, using only standard cryptographic tools. We detail an instan- tiation based on ElGamal encryption and Fiat-Shamir non-interactive zero-knowledge proofs that closely resembles Helios and which provably satisfies ballot privacy. 1 Introduction Electronic voting protocols have the potential to offer efficient and sound tallying with the added convenience of remote voting.
    [Show full text]