Page 34 - Towards Trustworthy Elections New Directions in Electronic Voting by Ed Gerck (auth.), David Chaum, Markus Jakobsson, Ronald L. Rivest, Peter Y. A. Ryan, Josh Benaloh, Miroslaw Kutylowski, Ben Adida ( (z-lib.org (1)
P. 34

E. Gerck
                          26
                            The WVS design is transparent. As part of the election setup, the WVS design
                          invites stakeholders to add their own witnesses and readers, which is critical to
                          the trustworthiness of the election’s outcome, step (III).
                            The WVS design is simple, scalable, and auditable. The WVS design uses
                          multiple, diverse channels to transfer information from each voter to the tally
                          results, which is promotive of end-to-end auditing and is amenable to end-to-
                          end arguments (see section 6.5). Consequently, the number of process points
                          that need to be witnessed is relatively small and the design can be implemented
                          using parallel elements (e.g., witnesses, readers, tally processing) for simplicity,
                          scalability and reliable auditing.
                            The WVS design is robust. For example, in order to satisfy step (III) the
                          WVS implementation should be transparent in operation to the voters and the
                          operators. If that does not seem to be the case for some operation in (I), that op-
                          eration can be redesigned using the considerations in Section 6 and the problem
                          solved to the satisfaction of both (II) and (III).
                            The WVS design is extensible. Additional control variables can be added. For
                          example, a step (IIIa) could be inserted to promote low election cost, while a
                          step (IIIb) could measure voter feedback to assure accessibility compliance.

                          8.1  How It Works

                          With the objective of highlighting the basic concepts used in our approach,
                          section 2 presented a WVS implementation that was highly simplified and used
                          intuitive requirements. A more practical WVS implementation is presented here,
                          following the model presentation and qualified requirements of the previous sec-
                          tions. Additional WVS implementations are described in [14].
                            This presentation includes many considerations of our approach. Notably
                          missing from our implementations, but referenced in [17], we did not provide
                          examples of voter registration, voter authentication, and ballot authentication,
                          as well as their use in terms of specifying a “closed-circle” voting process.
                            Most importantly, the WVS captures what we call the “magic moment”, when
                          the voter sees and confirms the choices in order to cast the ballot. This is the
                          primary information that needs to be voter-verified and universally verifiable,
                          albeit anonymously and without creating a “voter pattern fingerprinting” vul-
                          nerability (Section 7.1). The WVS will also provide end-to-end verification that
                          ballots are processed correctly, giving voters and other parties independent ver-
                          ification capability that the votes are cast, collected, and counted as intended.
                            Without limitation, we consider that the message selected by a voter (i.e., the
                          ballot that a voter sees and casts) is transmitted initially to the ballot box, stored
                          there and later tallied, with totals made public. We further describe how the
                          influence of errors in the voting process (including fraud, malfunctions, passive
                          and active attacks) may be corrected to achieve an outcome error that can be
                          as close to zero as desired (error-free), using ways of transmitting and receiving
                          the information that are provably optimal in reducing errors.
                            We will often refer the reader to slides in [14] for visualization. The slides
                          are available online. Please load or print slide number 13 in [14]. To refer to
   29   30   31   32   33   34   35   36   37   38   39