Page 42 - Towards Trustworthy Elections New Directions in Electronic Voting by Ed Gerck (auth.), David Chaum, Markus Jakobsson, Ronald L. Rivest, Peter Y. A. Ryan, Josh Benaloh, Miroslaw Kutylowski, Ben Adida ( (z-lib.org (1)
P. 42
E. Gerck
34
time to vote, higher usability, higher public confidence in the election process,
reduced voter coercion in online voting (compared to mail voting), robust voter
registration, voter-verified auditing, increased opportunities for voter participa-
tion, reduced costs in the management of elections, secure storage of ballots, and
reduced time for tabulation and auditing are among the practical results that
can be quantified with the framework described in this paper. These and other
beneficial results have been confirmed in the continuous use of this framework
since 2000 with online voting in elections worldwide.
Acknowledgments. This work was supported by Safevote, Inc., which retains
intellectual property rights and copyright. We are thankful for comments and ref-
erences from many collaborators and several online discussion groups. Comments
by L. Bernstein, T. Gerck, V. Neppe, M. Norden, A. Todd and an anonymous
reviewer were particularly helpful in this paper.
References
1. Gritzalis, D. (ed.): Secure Electronic Voting. Kluwer Academic Publishers, Holland
(2002) ISBN 1-4020-7301-1
2. Bannet, J., Price, D.W., Rudys, A., Singer, J., Wallach, D.S.: Hack-a-Vote: Demon-
strating Security Issues with Electronic Voting Systems. IEEE Security Privacy
Magazine 2(1), 32–37 (2004)
3. Jones, D.W.: Evaluation of voting technologies. In: Secure Electronic Voting, ch.
1, ibid
4. Circuit Court of the Second Judicial Circuit, Leon County, Judge William Gary,
CASE NO. 2006-CA-2973 (2006), Copy online at,
http://electionlawblog.org/archives/ess-pdf.pdf
5. Gumbel, A.: Steal This Vote: Dirty Elections and the Rotten History of Democracy
in America. Nation Books (2005)
6. Gerck, E.: Year 2000 Public Sector U.S. Market Intelligence Study. The Bell,
vol. 1(1-3) (2000) ISSN 1530-048X, Copy online at
http://thebell.net/archives/thebell1.1.pdf,
http://thebell.net/archives/thebell1.2.pdf,
http://thebell.net/archives/thebell1.3.pdf
7. Gerck, E.,: Editorial –The Difference Between the Right and the Almost-Right.
The Bell 1(7) (2000) ISSN 1530-048X, Copy online at
http://thebell.net/archives/thebell1.7.pdf
8. Cherry, S.: The Perils of Polling. IEEE Spectrum Online (2004),
http://www.spectrum.ieee.org/oct04/4036
9. Shannon, C.E.: A Mathematical Theory of Communication. Bell System Technical
Journal 27, 623–656 (1948), Copy online at
http://cm.bell-labs.com/cm/ms/what/shannonday/shannon1948.pdf
10. Shannon, C.E.: Communication Theory of Secrecy Systems. Bell System Technical
Journal 28, 656–715 (1949), Copy online at,
http://netlab.cs.ucla.edu/wiki/files/shannon1949.pdf
11. Gallagher, R.G.: Information Theory and Reliable Communication. John Wiley &
Sons, New York (1968)
12. Yu, F.T.S.: Optics and Information Theory. John Wiley & Sons, New York (1976)

