Privacy Violations in Election Results
- URL: http://arxiv.org/abs/2308.04100v4
- Date: Thu, 09 Jan 2025 18:57:35 GMT
- Title: Privacy Violations in Election Results
- Authors: Shiro Kuriwaki, Jeffrey B. Lewis, Michael Morse,
- Abstract summary: We show that the release of individual ballot records would lead to no revelation of any vote choice for 99.83% of voters.
We discuss the potential benefits of transparency, compare remedies to reduce privacy violations, and highlight the privacy-transparency tradeoff inherent in all election reporting.
- Score: 0.0
- License:
- Abstract: After an election, should election officials release a copy of each anonymous ballot? Some policymakers have championed public disclosure to counter distrust, but others worry that it might undermine ballot secrecy. We introduce the term vote revelation to refer to the linkage of a vote on an anonymous ballot to the voter's name in the public voter file, and detail how such revelation could theoretically occur. Using the 2020 election in Maricopa County, Arizona, as a case study, we show that the release of individual ballot records would lead to no revelation of any vote choice for 99.83% of voters as compared to 99.95% under Maricopa's current practice of reporting aggregate results by precinct and method of voting. Further, revelation is overwhelmingly concentrated among the few voters who cast provisional ballots or federal-only ballots. We discuss the potential benefits of transparency, compare remedies to reduce privacy violations, and highlight the privacy-transparency tradeoff inherent in all election reporting.
Related papers
- Efficient Lower Bounding of Single Transferable Vote Election Margins [56.12949230611067]
Single transferable vote (STV) is a system of preferential proportional voting employed in multi-seat elections.
The margin of victory, or simply margin, is the smallest number of ballots that, if manipulated, can alter the set of winners.
Lower bounds on the margin can also be used for this purpose, in cases where exact margins are difficult to compute.
arXiv Detail & Related papers (2025-01-24T13:39:23Z) - Cast vote records: A database of ballots from the 2020 U.S. Election [29.81784450632149]
This database includes vote records for President, Governor, U.S. Senate and House, and state upper and lower chambers.
It covers 42.7 million voters in 20 states who voted for more than 2,204 candidates.
Using this data, we show that in battleground states, 1.9 percent of solid Republicans split their ticket for Joe Biden, while 1.2 percent of solid Democrats split their ticket for Donald Trump.
arXiv Detail & Related papers (2024-10-24T12:42:03Z) - Improving the Computational Efficiency of Adaptive Audits of IRV Elections [54.427049258408424]
AWAIRE can audit IRV contests with any number of candidates, but the original implementation incurred memory and computation costs that grew superexponentially with the number of candidates.
This paper improves the algorithmic implementation of AWAIRE in three ways that make it practical to audit IRV contests with 55 candidates, compared to the previous 6 candidates.
arXiv Detail & Related papers (2024-07-23T13:28:00Z) - Publicly auditable privacy-preserving electoral rolls [0.32498796510544625]
We study the problem of designing publicly auditable yet privacy-preserving electoral rolls.
The audit can detect polling-day ballot stuffing and denials to eligible voters by malicious polling officers.
The entire electoral roll is never revealed, which prevents any large-scale systematic voter targeting and manipulation.
arXiv Detail & Related papers (2024-02-18T13:11:48Z) - Learning to Manipulate under Limited Information [44.99833362998488]
We trained over 100,000 neural networks of 26 sizes to manipulate against 8 different voting methods.
We find that some voting methods, such as Borda, are highly manipulable by networks with limited information, while others, such as Instant Runoff, are not.
arXiv Detail & Related papers (2024-01-29T18:49:50Z) - Is your vote truly secret? Ballot Secrecy iff Ballot Independence: Proving necessary conditions and analysing case studies [0.19116784879310028]
We formalise definitions of ballot secrecy and ballot independence by Smyth, JCS'21 as indistinguishability games in the computational model of security.
Both Smyth, JCS'21 and Smyth, draft '21 improve on earlier works by considering a more realistic adversary model wherein they have access to the ballot collection.
arXiv Detail & Related papers (2023-11-21T20:25:32Z) - Adaptively Weighted Audits of Instant-Runoff Voting Elections: AWAIRE [61.872917066847855]
Methods for auditing instant-runoff voting (IRV) elections are either not risk-limiting or require cast vote records (CVRs), the voting system's electronic record of the votes on each ballot.
We develop an RLA method that uses adaptively weighted averages of test supermartingales to efficiently audit IRV elections when CVRs are not available.
arXiv Detail & Related papers (2023-07-20T15:55:34Z) - Identifying Possible Winners in Ranked Choice Voting Elections with
Outstanding Ballots [0.0]
ranked-choice voting (RCV) allows voters to rank their choices, and the results are computed in rounds.
RCV election outcomes are not always apparent on election night, and can take several weeks to be published.
We present an algorithm for efficiently computing possible winners of RCV elections from partially known ballots.
arXiv Detail & Related papers (2022-06-25T22:08:15Z) - Obvious Manipulability of Voting Rules [105.35249497503527]
The Gibbard-Satterthwaite theorem states that no unanimous and non-dictatorial voting rule is strategyproof.
We revisit voting rules and consider a weaker notion of strategyproofness called not obvious manipulability.
arXiv Detail & Related papers (2021-11-03T02:41:48Z) - Bribery as a Measure of Candidate Success: Complexity Results for
Approval-Based Multiwinner Rules [58.8640284079665]
We study the problem of bribery in multiwinner elections, for the case where the voters cast approval ballots (i.e., sets of candidates they approve)
We consider a number of approval-based multiwinner rules (AV, SAV, GAV, RAV, approval-based Chamberlin--Courant, and PAV)
In general, our problems tend to be easier when we limit out bribery actions on increasing the number of approvals of the candidate that we want to be in a winning committee.
arXiv Detail & Related papers (2021-04-19T08:26:40Z) - Security Survey and Analysis of Vote-by-Mail Systems [0.0]
We examine the security of electronic systems used in the process of voting by mail, including online voter registration and online ballot tracking systems.
We find that online voter registration systems in some states have vulnerabilities that allow adversaries to alter or effectively prevent a voter's registration.
We additionally find that ballot tracking systems raise serious privacy questions surrounding ease of access to voter data.
arXiv Detail & Related papers (2020-05-18T02:18:15Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.