26 research outputs found
Scantegrity II Municipal Election at Takoma Park: The First E2E Binding Governmental Election with Ballot Privacy
On November 3, 2009, voters in Takoma Park, Maryland,
cast ballots for the mayor and city council members
using the Scantegrity II voting system—the first time
any end-to-end (E2E) voting system with ballot privacy
has been used in a binding governmental election. This
case study describes the various efforts that went into
the election—including the improved design and implementation
of the voting system, streamlined procedures,
agreements with the city, and assessments of the experiences
of voters and poll workers.
The election, with 1728 voters from six wards, involved
paper ballots with invisible-ink confirmation
codes, instant-runoff voting with write-ins, early and
absentee (mail-in) voting, dual-language ballots, provisional
ballots, privacy sleeves, any-which-way scanning
with parallel conventional desktop scanners, end-to-end
verifiability based on optional web-based voter verification
of votes cast, a full hand recount, thresholded authorities,
three independent outside auditors, fully-disclosed
software, and exit surveys for voters and pollworkers.
Despite some glitches, the use of Scantegrity II was
a success, demonstrating that E2E cryptographic voting
systems can be effectively used and accepted by the general public.United States. Dept. of Defense (IASP grant H98230-08-1-0334)United States. Dept. of Defense (IASP grant H98230-09-1-0404)National Science Foundation (U.S.) (Grant no. CNS 0831149
Advances in cryptographic voting systems
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2006.Includes bibliographical references (p. 241-254).Democracy depends on the proper administration of popular elections. Voters should receive assurance that their intent was correctly captured and that all eligible votes were correctly tallied. The election system as a whole should ensure that voter coercion is unlikely, even when voters are willing to be influenced. These conflicting requirements present a significant challenge: how can voters receive enough assurance to trust the election result, but not so much that they can prove to a potential coercer how they voted? This dissertation explores cryptographic techniques for implementing verifiable, secret-ballot elections. We present the power of cryptographic voting, in particular its ability to successfully achieve both verifiability and ballot secrecy, a combination that cannot be achieved by other means. We review a large portion of the literature on cryptographic voting. We propose three novel technical ideas: 1. a simple and inexpensive paper-base cryptographic voting system with some interesting advantages over existing techniques, 2. a theoretical model of incoercibility for human voters with their inherent limited computational ability, and a new ballot casting system that fits the new definition, and 3. a new theoretical construct for shuffling encrypted votes in full view of public observers.by Ben Adida.Ph.D