Page 103 - Towards Trustworthy Elections New Directions in Electronic Voting by Ed Gerck (auth.), David Chaum, Markus Jakobsson, Ronald L. Rivest, Peter Y. A. Ryan, Josh Benaloh, Miroslaw Kutylowski, Ben Adida ( (z-lib.org (1)
P. 103
voters [12]. These receipts cannot prove what the voter voted on, but they can
prove that the vote is included in the tally. These receipts can help inspire
confidence in the entire process, showing voters that their vote was included in
the final tally. A Secure Architecture for Voting Electronically (SAVE) 95
In addition, the inclusion of witness modules written by political parties and
interest groups enables voters to see that votes were cast during valid voting
periods and helps reduce post-voting litigation due to accusations of ’stuffing
the ballot box.’
7 Conclusions
Paper balloting presents myriad opportunities for defrauding the election process,
and VVPT that have a legal preference over electronic systems retain the same
possibility for manipulation. VVPT systems also present the opportunity to sow
confusion amongst election officials and voters as to which result is actually valid.
Three different versions of SAVE systems have been written by students at
MIT. These systems have been implemented as C++ and Java, and coded
independently.
Whereas paper has no cryptographic security, electronic systems enable a
better way of ensuring the validity and privacy of ballots. By creating systems
with n-version programming, failures from denial of service attacks, nefarious
vendors and malicious poll workers can be mitigated.
The SAVE system takes the existing reliability of electronic voting systems
and adds resilience to both internal failures and malicious attack. The greater
the diversity achieved in the modules, the greater the protection from failure.
As always, cost is a factor, but as a modular architecture, SAVE systems should
be easy to build, understand and validate.
References
1. Albert, R., Albert, I., Nakarado, G.L.: Structural vulnerability of the North Amer-
ican power grid. Physical Review E 69(2), 25103 (2004)
2. Ansolabehere, S.: Voting Machines, Race, and Equal Protection. Election Law
Journal 1(1), 61–70 (2002)
3. Ansolabehere, S., Stewart, C.S.: Residual Votes Attributable to Technology. The
Journal of Politics 67(2), 365–389 (2005)
4. Bailey, M., Cooke, E., Jahanian, F., Watson, D., Nazario, J.: The Blaster Worm:
Then and Now. IEEE Security & Privacy 3(4), 26–31 (2005)
5. Bannet, J., Price, D.W., Rudys, A., Singer, J., Wallach, D.S.: Hack-a-vote: Security
issues with electronic voting systems. IEEE Security & Privacy Magazine 2(1),
32–37 (2004)
6. Bederson, B.B., Lee, B., Sherman, R.M., Herrnson, P.S., Niemi, R.G.: Electronic
voting system usability issues. In: Proceedings of the SIGCHI conference on Human
factors in computing systems, pp. 145–152 (2003)
7. Box, D., Ehnebuske, D., Kakivaya, G., Layman, A., Mendelsohn, N., Nielsen, H.F.,
Thatte, S., Winer, D.: Simple Object Access Protocol (SOAP) 1.1 (2000)
8. Calandrino, J.A., Feldman, A.J., Halderman, J.A., Wagner, D., Yu, H.,
Zeller, W.P.: Source Code Review of the Diebold Voting System

