Page 27 - Towards Trustworthy Elections New Directions in Electronic Voting by Ed Gerck (auth.), David Chaum, Markus Jakobsson, Ronald L. Rivest, Peter Y. A. Ryan, Josh Benaloh, Miroslaw Kutylowski, Ben Adida ( (z-lib.org (1)
P. 27

27
                          by even a small fraction of the voters (e.g., 5%)
                                                                      can be effective in detecting
                          errors and create a credible deterrent to fraud. Thus, when properly done, voter
                          verification by even a small fraction of the voters can help improve election
                          outcome trustworthiness for all voters.  The Witness-Voting System  19
                            Another characteristic of a good voting system is freedom of choice. A voter
                          needs to be able to trust that she cannot be threatened, hurt, or even denied
                          something as a result of her vote choices. Election operators and the public in
                          general also need to be able to trust that voters cannot receive favors as a result
                          of their vote choices. To assure freedom of choice, the only person to whom
                          the vote should be proved is the voter himself. In other words, no one else and
                          certainly not the election operators should be able to prove how a voter voted.
                          Otherwise, the vote could be coerced or sold. Thus, no information channels
                          may exist allowing individual voters and ballots to be linkable. We call this the
                          unlinkability condition; even though voters and votes must each be identifiable,
                          they must not be linkable to each other.
                            In terms of electronic versus paper ballot voting systems, the primary concern
                          for increasing reliability is the capacity of the correction channels compared with
                          the capacity of the error channels —not the physical properties of the medium
                          (e.g., paper) used in a communication channel. If an electronic voting system is
                          able to provide N proofs (human and machine based), these N proofs for some
                          value of N larger than one will become more reliable than one so-called “physical
                          proof” even if this one proof is engraved in gold or printed on paper. The make-
                          up of each channel’s carrier (e.g., paper, photons, electrons) is by itself irrelevant.
                          See [40] for further discussion on this topic.
                            To assure end-to-end trust, in addition to protect casting the ballot, one must
                          also protect the former steps in presenting the ballot as well as the latter steps
                          in tallying and auditing the ballot. This will be given as a set of Requirements
                          (Section 7) that work together in an end-to-end design. The concept of trust in
                          [15] has the same meaning in all the components [VITM, Requirements, WVS]
                          of the design. Different verifiers can also use different trust models (e.g., hierar-
                          chical, web-of-trust), which are all integrated (though not unified) through the
                          same trust definition, subsuming the physical and conceptual cases.
                            With potential applications to other security problems, we note that the oft-
                          cited security paradigm “the weakest link defines the security of the system” does
                          not apply here. We also do not rely on “perfect” parts or one “strong” evidence.
                          The WVS error-free design condition (see Section 6.3, Error-Free Condition) is
                          based on several, mostly independent (and possibly imperfect) evidences that
                          can build a correction channel with enough capacity so as to correct all but an
                          arbitrarily small fraction of the errors. This is a new security paradigm provided
                          by this approach [16, 17, 40, 41], which we call the mesh paradigm —a mesh
                          does not break if a link breaks.
                            With the WVS, one or more witnesses are used to capture the primary infor-
                          mation: what the voter sees and confirms on the screen. A primary information
                          witness may be used by itself as the voted ballot, possibly with better reliability
                          27
                            A conservative estimate obtained by applying the Saltman auditing model [43].
   22   23   24   25   26   27   28   29   30   31   32