Page 103 - Towards Trustworthy Elections New Directions in Electronic Voting by Ed Gerck (auth.), David Chaum, Markus Jakobsson, Ronald L. Rivest, Peter Y. A. Ryan, Josh Benaloh, Miroslaw Kutylowski, Ben Adida ( (z-lib.org (1)
P. 103

voters [12]. These receipts cannot prove what the voter voted on, but they can
                          prove that the vote is included in the tally. These receipts can help inspire
                          confidence in the entire process, showing voters that their vote was included in
                          the final tally.  A Secure Architecture for Voting Electronically (SAVE)  95
                            In addition, the inclusion of witness modules written by political parties and
                          interest groups enables voters to see that votes were cast during valid voting
                          periods and helps reduce post-voting litigation due to accusations of ’stuffing
                          the ballot box.’
                          7   Conclusions

                          Paper balloting presents myriad opportunities for defrauding the election process,
                          and VVPT that have a legal preference over electronic systems retain the same
                          possibility for manipulation. VVPT systems also present the opportunity to sow
                          confusion amongst election officials and voters as to which result is actually valid.
                            Three different versions of SAVE systems have been written by students at
                          MIT. These systems have been implemented as C++ and Java, and coded
                          independently.
                            Whereas paper has no cryptographic security, electronic systems enable a
                          better way of ensuring the validity and privacy of ballots. By creating systems
                          with n-version programming, failures from denial of service attacks, nefarious
                          vendors and malicious poll workers can be mitigated.
                            The SAVE system takes the existing reliability of electronic voting systems
                          and adds resilience to both internal failures and malicious attack. The greater
                          the diversity achieved in the modules, the greater the protection from failure.
                          As always, cost is a factor, but as a modular architecture, SAVE systems should
                          be easy to build, understand and validate.

                          References

                           1. Albert, R., Albert, I., Nakarado, G.L.: Structural vulnerability of the North Amer-
                             ican power grid. Physical Review E 69(2), 25103 (2004)
                           2. Ansolabehere, S.: Voting Machines, Race, and Equal Protection. Election Law
                             Journal 1(1), 61–70 (2002)
                           3. Ansolabehere, S., Stewart, C.S.: Residual Votes Attributable to Technology. The
                             Journal of Politics 67(2), 365–389 (2005)
                           4. Bailey, M., Cooke, E., Jahanian, F., Watson, D., Nazario, J.: The Blaster Worm:
                             Then and Now. IEEE Security & Privacy 3(4), 26–31 (2005)
                           5. Bannet, J., Price, D.W., Rudys, A., Singer, J., Wallach, D.S.: Hack-a-vote: Security
                             issues with electronic voting systems. IEEE Security & Privacy Magazine 2(1),
                             32–37 (2004)
                           6. Bederson, B.B., Lee, B., Sherman, R.M., Herrnson, P.S., Niemi, R.G.: Electronic
                             voting system usability issues. In: Proceedings of the SIGCHI conference on Human
                             factors in computing systems, pp. 145–152 (2003)
                           7. Box, D., Ehnebuske, D., Kakivaya, G., Layman, A., Mendelsohn, N., Nielsen, H.F.,
                             Thatte, S., Winer, D.: Simple Object Access Protocol (SOAP) 1.1 (2000)
                           8. Calandrino, J.A., Feldman, A.J., Halderman, J.A., Wagner, D., Yu, H.,
                             Zeller, W.P.: Source Code Review of the Diebold Voting System
   98   99   100   101   102   103   104   105   106   107   108