Secret Ballot Elections with Unconditional Integrity
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Introduction Voting In-Person Through Physical Secret Ballot
CL 166/13 – Information Note 1 – April 2021 Alternative Voting Modalities for Election by Secret Ballot Introduction 1. This note presents an update on the options for alternative voting modalities for conducting a Secret Ballot at the 42nd Session of the Conference. At the Informal Meeting of the Independent Chairperson with the Chairpersons and Vice-Chairpersons of the Regional Groups on 18 March 2021, Members identified two possible, viable options to conduct a Secret Ballot while holding the 42nd Conference in virtual modality. Namely, physical in-person voting and an online voting system. A third option of voting by postal correspondence was also presented to the Chairpersons and Vice- chairpersons for their consideration. 2. These options have since been further elaborated in Appendix B of document CL 166/13 Arrangements for the 42nd Session of the Conference, for Council’s consideration at its 166th Session under item 13 of its Agenda. During discussions under item 13, Members not only sought further information on the practicalities of adopting one of the aforementioned options but also introduced a further alternative voting option: a hybrid of in-person and online voting. 3. In aiming to facilitate a more informed decision by Members, this note provides additional information on the previously identified voting options on which Members have already received preliminary information, and introduces the possibility of a hybrid voting option by combining in- person and online voting to create a hybrid option. 4. This Information Note further adds information on the conduct of a roll call vote through the Zoom system. Such a vote will be required at the beginning of the Conference for the endorsement of the special procedures outlined in Appendix A under item 3, Adoption of the Agenda and Arrangements for the Session, following their consideration by the General Committee of the Conference at its first meeting. -
Black Box Voting Ballot Tampering in the 21St Century
This free internet version is available at www.BlackBoxVoting.org Black Box Voting — © 2004 Bev Harris Rights reserved to Talion Publishing/ Black Box Voting ISBN 1-890916-90-0. You can purchase copies of this book at www.Amazon.com. Black Box Voting Ballot Tampering in the 21st Century By Bev Harris Talion Publishing / Black Box Voting This free internet version is available at www.BlackBoxVoting.org Contents © 2004 by Bev Harris ISBN 1-890916-90-0 Jan. 2004 All rights reserved. No part of this book may be reproduced in any form whatsoever except as provided for by U.S. copyright law. For information on this book and the investigation into the voting machine industry, please go to: www.blackboxvoting.org Black Box Voting 330 SW 43rd St PMB K-547 • Renton, WA • 98055 Fax: 425-228-3965 • [email protected] • Tel. 425-228-7131 This free internet version is available at www.BlackBoxVoting.org Black Box Voting © 2004 Bev Harris • ISBN 1-890916-90-0 Dedication First of all, thank you Lord. I dedicate this work to my husband, Sonny, my rock and my mentor, who tolerated being ignored and bored and galled by this thing every day for a year, and without fail, stood fast with affection and support and encouragement. He must be nuts. And to my father, who fought and took a hit in Germany, who lived through Hitler and saw first-hand what can happen when a country gets suckered out of democracy. And to my sweet mother, whose an- cestors hosted a stop on the Underground Railroad, who gets that disapproving look on her face when people don’t do the right thing. -
The Norwegian Internet Voting Protocol
The Norwegian Internet Voting Protocol Kristian Gjøsteen∗ August 9, 2013 Abstract The Norwegian government ran a trial of internet remote voting during the 2011 local government elections, and will run another trial during the 2013 parliamentary elections. A new cryptographic voting protocol will be used, where so-called return codes allow voters to verify that their ballots will be counted as cast. This paper discusses this cryptographic protocol, and in particular the ballot submission phase. The security of the protocol relies on a novel hardness assumption similar to Decision Diffie-Hellman. While DDH is a claim that a random subgroup of a non-cyclic group is indistinguishable from the whole group, our assumption is related to the indistinguishability of certain special subgroups. We discuss this question in some detail. Keywords: electronic voting protocols, Decision Diffie-Hellman. 1 Introduction The Norwegian government ran a trial of internet remote voting during the 2011 local government elections. During the advance voting period, voters in 10 municipalities were allowed to vote from home using their own computers. This form of voting made up a large majority of advance voting. The Norwegian goverment will run a second trial of remote voting during the 2013 parliamentary elections. Internet voting, and electronic voting in general, faces a long list of security challenges. For Norway, the two most significant security problems with internet voting will be compromised voter computers and coercion. Coercion will be dealt with by allowing voters to revote electronically. Revot- ing cancels previously submitted ballots. Also, the voter may vote once on paper, in which case every submitted electronic ballot is canceled, even those submitted after the paper ballot submission. -
Conducting Local Union Officer Elections a Guide for Election Officials
Conducting Local Union Officer Elections A Guide for Election Officials Official Ballot X X U.S. Department of Labor Office of Labor-Management Standards Material contained in this publication is in the public domain and may be reproduced, fully or partially, without permission of the federal government. Source credit is requested but not required. Permission is required only to reproduce any copyrighted material contained herein. This material will be made available to sensory impaired individuals upon request. Voice phone: (202) 693-0123 TTY* phone: 1-877-889-5627 *Teletypewriter Conducting Local Union Officer Elections A Guide for Election Officials U.S. Department of Labor Thomas E. Perez, Secretary Office of Labor-Management Standards 2010 (Revised May 2014 and January 2019) A Message to Local Union Election Officials Congratulations! You have been selected to serve as an election official in your union. You may have volunteered, been elected by the membership, appointed by your union’s president, chosen by one of the candidates, or maybe you were “drafted” to serve in this role. In any event, during the upcoming weeks you and your fellow election officials will be entrusted with the responsibility of providing members with the opportunity to exercise the most fundamental of union rights, the right to elect their union’s officers by secret ballot. Don’t underestimate the importance of your role — you are an essential part of the democratic process. The persons elected to office will help shape the future of your union as they handle the union’s finances, are involved in contract negotiations and grievances, and conduct other business affecting the welfare of your union’s members. -
PDF of Law As Amended to 14/12/2010
REPUBLIC OF LITHUANIA LAW ON REFERENDUM 4 June 2002 No IX-929 (As last amended on 14 December 2010 — No XI-1229) Vilnius The Seimas of the Republic of Lithuania, relying upon the legally established, open, just, harmonious, civic society and principles of a law - based State and the Constitution: the provisions of Article 2 that “the State of Lithuania shall be created by the People. Sovereignty shall belong to the Nation”; the provision of Article 3 that “no one may limit or restrict the sovereignty of the Nation and make claims to the sovereign powers belonging to the entire Nation”; the provision of Article 4 that “the Nation shall execute its supreme sovereign power either directly or through its democratically elected representatives”; and the provision of Article 9 that “the most significant issues concerning the life of the State and the Nation shall be decided by referendum”, passes this Law. CHAPTER I GENERAL PROVISIONS Article 1. Purpose of the Law This Law shall establish the procedure of implementing the right of the citizens of Lithuania to a referendum, the type of referendum and initiation, announcement, organising and conducting thereof. 2. The citizens of the Republic of Lithuania (hereinafter - citizens) or the Seimas of the Republic of Lithuania (hereinafter - Seimas) shall decide the importance of the proposed issue in the life of the State and the People in accordance with the Constitution of the Republic of Lithuania and this Law. Article 2. General Principles of Referendum 1. Taking part in the referendum shall be free and based upon the democratic principles of the right of elections: universal, equal and direct suffrage and secret ballot. -
F Public Voting, Secrecy Historic #4.Indd
Voting Viva Voce UNLOCKING THE SOCIAL LOGIC OF PAST POLITICS Secrecy in Voting in American History: No Secrets There DONALD A. DEBATS sociallogic.iath.virginia.edu Secrecy in Voting in American History: No Secrets There | Donald A. DeBats 1 Public Voting Secrecy in Voting in American History: No Secrets There by For most of America’s history, from colonial days to the 1890s, keeping the Donald A. DeBats, PhD content of your vote secret was almost impossible. There was no expectation that the vote should be secret and little understanding of how this could be Residential Fellow, Virginia Foundation for accomplished even if it were a good idea. Many people—and not just political the Humanities, operatives—thought secrecy was not a good idea. In those days there was no University of Virginia model for structuring elections so they could be private individual matters, Head, American Studies, conducted quietly inside public buildings, with votes cast while hidden red, Flinders University, Australia white, and blue striped curtains. That is not the way US elections were conducted. The alternative—today’s secret ballot—with which we are now so familiar had yet to be invented, or, as it turned out, imported into American politics. All elections for most of America’s history were organized to be non-secret. They were public events with individual voting occurring in plain sight of the crowds that election days once attracted. They were the culmination of weeks of excited electioneering. In large cities, they were public spectacles, with torchlight parades and the large scale public “illuminations,” so popular in the Victorian era. -
The Effects of Secret Voting Procedures on Political Behavior
UC San Diego UC San Diego Electronic Theses and Dissertations Title Voting Alone: The Effects of Secret Voting Procedures on Political Behavior Permalink https://escholarship.org/uc/item/50p7t4xg Author Guenther, Scott Publication Date 2016 Peer reviewed|Thesis/dissertation eScholarship.org Powered by the California Digital Library University of California UNIVERSITY OF CALIFORNIA, SAN DIEGO Voting Alone: The Effects of Secret Voting Procedures on Political Behavior A Dissertation submitted in partial satisfaction of the requirements for the degree Doctor of Philosophy in Political Science by Scott M. Guenther Committee in charge: Professor James Fowler, Chair Professor Samuel Kernell, Co-Chair Professor Julie Cullen Professor Seth Hill Professor Thad Kousser 2016 Copyright Scott M. Guenther, 2016 All rights reserved. The Dissertation of Scott M. Guenther is approved, and it is acceptable in quality and form for publication on microfilm and electronically: Co-Chair Chair University of California, San Diego 2016 iii DEDICATION To my parents. iv EPIGRAPH Three may keep a secret, if two of them are dead. { Benjamin Franklin v TABLE OF CONTENTS Signature Page................................... iii Dedication...................................... iv Epigraph......................................v Table of Contents.................................. vi List of Figures................................... viii List of Tables.................................... ix Acknowledgements.................................x Vita........................................ -
A Formal Analysis of the Norwegian E-Voting Protocol
A Formal Analysis of the Norwegian E-voting Protocol Véronique Cortier and Cyrille Wiedling LORIA - CNRS, Nancy, France Abstract. Norway has used e-voting in its last political election in September 2011, with more than 25 000 voters using the e-voting option. The underlying protocol is a new protocol designed by the ERGO group, involving several actors (a bulletin box but also a receipt generator, a decryption service, and an auditor). Of course, trusting the correctness and security of e-voting protocols is crucial in that context. Formal def- initions of properties such as privacy, coercion-resistance or verifiability have been recently proposed, based on equivalence properties. In this paper, we propose a formal analysis of the protocol used in Norway, w.r.t. privacy, considering several corruption scenarios. Part of this study has conducted using the ProVerif tool, on a simplified model. Keywords: e-voting, privacy, formal methods. 1 Introduction Electronic voting protocols promise a convenient, efficient and reliable way for collecting and tallying the votes, avoiding for example usual human errors when counting. It is used or have been used for political elections in several countries like e.g. USA, Estonia, Switzerland and recently Norway, at least in trials. How- ever, the recent history has shown that these systems are highly vulnerable to attacks. For example, the Diebold machines as well as the electronic machines used in India have been attacked [13,24]. Consequently, the use of electronic vot- ing raises many ethical and political issues. For example, the German Federal Constitutional Court decided on 3 March 2009 that electronic voting used for the last 10 years was unconstitutional [1]. -
College of Education Promotion & Tenure Voting Procedures
College of Education Promotion & Tenure Voting Procedures Approved May 2006 The processes and procedures for casting of Promotion & Tenure ballots in all college departments should be revised according to the following protocol: To protect the integrity of the process and to ensure anonymity of faculty casting ballots and the professional rights of all faculty, the following process for departmental voting on tenure and promotion candidates shall be followed. Voting takes place after the department has met (face to face or virtual) to discuss each individual application/case and has considered appropriate criteria. The process for casting ballots by faculty in their department must ensure that faculty have adequate time to review applications before casting ballots, be coordinated by at least two tenured members of the faculty (in addition to the department chair), and allow at least seven days from the date of receipt of the ballot to return the ballots. If a department does not have two tenured members to implement the process, the faculty may invite tenured faculty from another department to serve in this capacity and count ballots. The ballots shall be opened at a predesignated time and the meeting to do so shall be open to all voting faculty in the department, but must be attended by at least two tenured faculty in addition to the department chair. The department chair and the representative to the COE tenure and promotion committee shall be responsible for coordinating the voting process. The candidate's portfolios and application materials shall be available for eligible voting faculty to review at least one week prior to the mailing of the ballots and remain available until the ballots are opened and counted. -
Poll Worker Instructions Instructions for Chief Inspectors
Marin County Elections Department Poll Worker Instructions Instructions for Chief Inspectors Each polling place has a Chief Inspector, at least one Deputy Inspector, and at least 2 Clerks. This guide explains their duties. Questions or problems? Call: Procedures / Supplies: 415-473-6439 Accuvote or Automark: 415-473-7460 Or 415-473-6643 Rev. 6-2013 The polls are open from 7 a.m. to 8 p.m. on Election Day A. Before Election Day B. Election Day before the polls open C. Voting room set up / Accessible voting booth D. When the polls open … / Polling place rules E. Voter flow chart (Clerks’ Duties) / Poll worker procedure chart F. Common situations / Emergency evacuations G. Close the polls / Accounting for ballots H. Close the polls: Chief and Deputy duties I. Packing up A. Before Election Day – Chief Inspector Duties ♣ Pick up a red bag at the training class. Do not open the sealed This bag contains: a black Accuvote bag, a polling place portion of the Accuvote accessibility supply bag, a Vote by Mail Ballot Box, and other bag until Election Day. supplies you will need. ♣ Use the inventory list in the red bag to make sure your red bag has all the supplies you need. ♣ Call your polling place contact (listed on your supply receipt) to make sure you can get into the polling place on Election Day by 6:30 a.m., or earlier. Important! Take this person’s contact info with you on Election Day in case you have any problems getting in. ♣ Call your Deputy Inspector(s) to tell them what time to meet you at the polling place on Election Day. -
Open-Secret Voting
ISSN 1936-5349 (print) ISSN 1936-5357 (online) HARVARD JOHN M. OLIN CENTER FOR LAW, ECONOMICS, AND BUSINESS OPEN-SECRET VOTING Adrian Vermeule Discussion Paper No. 674 07/2010 Harvard Law School Cambridge, MA 02138 This paper can be downloaded without charge from: The Harvard John M. Olin Discussion Paper Series: http://www.law.harvard.edu/programs/olin_center/ The Social Science Research Network Electronic Paper Collection: http://ssrn.com/ OPEN-SECRET VOTING Adrian Vermeule* Stock debates about transparency and secrecy usually assume that open voting and secret voting are mutually exclusive. But these positions present a false alternative; open and secret voting can be employed as complements in a larger decision-procedure. In what follows I will propose a hybrid or dual procedure of open-secret voting, and attempt to specify the conditions under which that procedure works well. I suggest that open-secret voting can best be justified as an institutional means of obtaining a second opinion from the voting group. A second opinion of this sort might produce informational benefits either for the members of the voting group itself, for outside parties, or for both. (This is a companion paper to Adrian Vermeule, “Second Opinions,” available on SSRN). * John H. Watson Professor of Law, Harvard Law School. Prepared for a symposium on “Scrutin secret et vote public, huis clos et débat ouvert” at the College de France, June 3-4, 2010. Thanks to Jacob Gersen, Don Herzog, Adriaan Lanni, Daryl Levinson, Eric Posner, Melissa Schwartzberg, Philippe Urfalino, and the conference participants for helpful comments, and to Michael Kenneally for helpful research assistance. -
Adapting Helios for Provable Ballot Privacy
Adapting Helios for provable ballot privacy David Bernhard1, V´eronique Cortier2, Olivier Pereira3, Ben Smyth2, Bogdan Warinschi1 1 University of Bristol, England 2 LORIA - CNRS, France 3 Universit´eCatholique de Louvain, Belgium Abstract. Recent results show that the current implementation of He- lios, a practical e-voting protocol, does not ensure independence of the cast votes, and demonstrate the impact of this lack of independence on vote privacy. Some simple fixes seem to be available and security of the revised scheme has been studied with respect to symbolic models. In this paper we study the security of Helios using computational models. Our first contribution is a model for the property known as ballot privacy that generalizes and extends several existing ones. Using this model, we investigate an abstract voting scheme (of which the revised Helios is an instantiation) built from an arbitrary encryp- tion scheme with certain functional properties. We prove, generically, that whenever this encryption scheme falls in the class of voting-friendly schemes that we define, the resulting voting scheme provably satisfies ballot privacy. We explain how our general result yields cryptographic security guaran- tees for the revised version of Helios (albeit from non-standard assump- tions). Furthermore, we show (by giving two distinct constructions) that it is possible to construct voting-friendly encryption, and therefore voting schemes, using only standard cryptographic tools. We detail an instan- tiation based on ElGamal encryption and Fiat-Shamir non-interactive zero-knowledge proofs that closely resembles Helios and which provably satisfies ballot privacy. 1 Introduction Electronic voting protocols have the potential to offer efficient and sound tallying with the added convenience of remote voting.