An Internet Voting System Fatally Flawed in Creative New Ways
- URL: http://arxiv.org/abs/2411.11796v1
- Date: Mon, 18 Nov 2024 18:10:05 GMT
- Title: An Internet Voting System Fatally Flawed in Creative New Ways
- Authors: Andrew W. Appel, Philip B. Stark,
- Abstract summary: The recently published "MERGE" protocol is designed to be used in the prototype CAC-vote system.
The voting kiosk and protocol transmit votes over the internet and then transmit voter-verifiable paper ballots through the mail.
In the MERGE protocol, the votes transmitted over the internet are used to tabulate the results and determine the winners, but audits and recounts use the paper ballots that arrive in time.
- Score: 0.010231119246773925
- License:
- Abstract: The recently published "MERGE" protocol is designed to be used in the prototype CAC-vote system. The voting kiosk and protocol transmit votes over the internet and then transmit voter-verifiable paper ballots through the mail. In the MERGE protocol, the votes transmitted over the internet are used to tabulate the results and determine the winners, but audits and recounts use the paper ballots that arrive in time. The enunciated motivation for the protocol is to allow (electronic) votes from overseas military voters to be included in preliminary results before a (paper) ballot is received from the voter. MERGE contains interesting ideas that are not inherently unsound; but to make the system trustworthy--to apply the MERGE protocol--would require major changes to the laws, practices, and technical and logistical abilities of U.S. election jurisdictions. The gap between theory and practice is large and unbridgeable for the foreseeable future. Promoters of this research project at DARPA, the agency that sponsored the research, should acknowledge that MERGE is internet voting (election results rely on votes transmitted over the internet except in the event of a full hand count) and refrain from claiming that it could be a component of trustworthy elections without sweeping changes to election law and election administration throughout the U.S.
Related papers
- Efficient Lower Bounding of Single Transferable Vote Election Margins [56.12949230611067]
Single transferable vote (STV) is a system of preferential proportional voting employed in multi-seat elections.
The margin of victory, or simply margin, is the smallest number of ballots that, if manipulated, can alter the set of winners.
Lower bounds on the margin can also be used for this purpose, in cases where exact margins are difficult to compute.
arXiv Detail & Related papers (2025-01-24T13:39:23Z) - MERGE: Matching Electronic Results with Genuine Evidence for verifiable voting in person at remote locations [2.206168301581203]
We introduce the MERGE protocol to combine the speed of electronic ballot delivery with the reliability of paper returns.
This protocol allows voters to submit an electronic record of their vote quickly while simultaneously mailing a paper ballot for verification.
The electronic record can be used for preliminary results, but the paper ballot is used in a Risk Limiting Audit (RLA) if received in time, ensuring the integrity of the election.
arXiv Detail & Related papers (2024-10-09T09:19:01Z) - Improving the Computational Efficiency of Adaptive Audits of IRV Elections [54.427049258408424]
AWAIRE can audit IRV contests with any number of candidates, but the original implementation incurred memory and computation costs that grew superexponentially with the number of candidates.
This paper improves the algorithmic implementation of AWAIRE in three ways that make it practical to audit IRV contests with 55 candidates, compared to the previous 6 candidates.
arXiv Detail & Related papers (2024-07-23T13:28:00Z) - Publicly auditable privacy-preserving electoral rolls [0.32498796510544625]
We study the problem of designing publicly auditable yet privacy-preserving electoral rolls.
The audit can detect polling-day ballot stuffing and denials to eligible voters by malicious polling officers.
The entire electoral roll is never revealed, which prevents any large-scale systematic voter targeting and manipulation.
arXiv Detail & Related papers (2024-02-18T13:11:48Z) - Learning to Manipulate under Limited Information [44.99833362998488]
We trained over 100,000 neural networks of 26 sizes to manipulate against 8 different voting methods.
We find that some voting methods, such as Borda, are highly manipulable by networks with limited information, while others, such as Instant Runoff, are not.
arXiv Detail & Related papers (2024-01-29T18:49:50Z) - Adaptively Weighted Audits of Instant-Runoff Voting Elections: AWAIRE [61.872917066847855]
Methods for auditing instant-runoff voting (IRV) elections are either not risk-limiting or require cast vote records (CVRs), the voting system's electronic record of the votes on each ballot.
We develop an RLA method that uses adaptively weighted averages of test supermartingales to efficiently audit IRV elections when CVRs are not available.
arXiv Detail & Related papers (2023-07-20T15:55:34Z) - Design and analysis of tweet-based election models for the 2021 Mexican
legislative election [55.41644538483948]
We use a dataset of 15 million election-related tweets in the six months preceding election day.
We find that models using data with geographical attributes determine the results of the election with better precision and accuracy than conventional polling methods.
arXiv Detail & Related papers (2023-01-02T12:40:05Z) - Towards Secure Virtual Elections: Multiparty Computation of Order Based Voting Rules [5.156484100374059]
One of the main challenges in e-voting systems is to certify that the computed results are consistent with the cast ballots.
We propose a secure voting protocol for elections governed by order-based voting rules.
Our protocol offers perfect ballot secrecy, in the sense that it issues only the required output, while no other information on the cast ballots is revealed.
arXiv Detail & Related papers (2022-05-21T12:17:21Z) - Bribery as a Measure of Candidate Success: Complexity Results for
Approval-Based Multiwinner Rules [58.8640284079665]
We study the problem of bribery in multiwinner elections, for the case where the voters cast approval ballots (i.e., sets of candidates they approve)
We consider a number of approval-based multiwinner rules (AV, SAV, GAV, RAV, approval-based Chamberlin--Courant, and PAV)
In general, our problems tend to be easier when we limit out bribery actions on increasing the number of approvals of the candidate that we want to be in a winning committee.
arXiv Detail & Related papers (2021-04-19T08:26:40Z) - Modeling Voters in Multi-Winner Approval Voting [24.002910959494923]
We study voting behavior in single-winner and multi-winner approval voting scenarios with varying degrees of uncertainty.
We find that people generally manipulate their vote to obtain a better outcome, but often do not identify the optimal manipulation.
We propose a novel model that takes into account the size of the winning set and human cognitive constraints.
arXiv Detail & Related papers (2020-12-04T19:24:28Z) - Security Survey and Analysis of Vote-by-Mail Systems [0.0]
We examine the security of electronic systems used in the process of voting by mail, including online voter registration and online ballot tracking systems.
We find that online voter registration systems in some states have vulnerabilities that allow adversaries to alter or effectively prevent a voter's registration.
We additionally find that ballot tracking systems raise serious privacy questions surrounding ease of access to voter data.
arXiv Detail & Related papers (2020-05-18T02:18:15Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.