HOME

TheInfoList



OR:

End-to-end auditable or end-to-end voter verifiable (E2E) systems are voting systems with stringent integrity properties and strong
tamper resistance Tamperproofing, conceptually, is a methodology used to hinder, deter or detect unauthorised access to a device or circumvention of a security system. Since any device or system can be foiled by a person with sufficient knowledge, equipment, and ti ...
. E2E systems often employ cryptographic methods to craft receipts that allow voters to verify that their votes were counted as cast, without revealing which candidates were voted for. As such, these systems are sometimes referred to as receipt-based systems.


Overview

Electronic voting Electronic voting (also known as e-voting) is voting that uses electronic means to either aid or take care of casting and counting ballots. Depending on the particular implementation, e-voting may use standalone ''electronic voting machines'' ( ...
systems arrive at their final vote totals by a series of steps: # each voter has an original intent, # voters express their intent on ballots (whether interactively, as on the transient display of a
DRE voting machine A DRE voting machine, or direct-recording electronic voting machine, records votes by means of a ballot display provided with mechanical or electro-optical components that can be activated by the voter. These are typically buttons or a touchsc ...
, or durable, as in systems with voter verifiable paper trails), # the ballots are interpreted, to generate electronic cast vote records, # cast vote records are tallied, generating totals # where counting is conducted locally, for example, at the precinct or county level, the results from each local level are combined to produce the final tally. Classical approaches to election integrity tended to focus on mechanisms that operated at each step on the chain from voter intent to the final total. Voting is an example of a distributed system, and in general, distributed system designers have long known that such local focus may miss some vulnerabilities while over-protecting others. The alternative is to use end-to-end measures that are designed to measure the integrity of the entire chain. The failure of conventional optical scan voting systems to meet an end-to-end standard was pointed out in 2002. Comprehensive coverage of election integrity frequently involves multiple stages. Voters are expected to verify that they have marked their ballots as intended, recounts or audits are used to protect the step from marked ballots to ballot-box totals, and publication of all subtotals allows public verification that the overall totals correctly sum the ballot-box totals. While measures such as voter verified paper audit trails and manual recounts measure the effectiveness of some steps, they offer only weak measurement of the integrity of the physical or electronic ballot boxes. Ballots could be removed, replaced, or could have marks added to them without detection (''i.e.,''to fill in
undervote An undervote occurs when the number of distinct choices selected by a voter in a contest is less than the maximum number allowed for that contest or when no selection is made for a single choice contest. In a contested election, an undervote can be ...
d contests with votes for a desired candidate or to
overvote An overvote occurs when one votes for more than the maximum number of selections allowed in a contest. The result is a spoiled vote which is not included in the final tally. One example of an overvote would be voting for two candidates in a single ...
and
spoil Spoil or spoils: *Plunder taken from an enemy or victim *Material (such as rock, earth or other overburden) removed during: **excavation **mining **dredging Dredging is the excavation of material from a water environment. Possible reasons f ...
votes for undesired candidates). This shortcoming motivated the development of the end-to-end auditable voting systems discussed here, sometimes referred to as ''E2E voting systems''. These attempt to cover the entire path from voter attempt to election totals with just two measures: * Individual verifiability, by which any voter may check that his or her ballot is correctly included in the electronic ballot box, and * Universal verifiability, by which anyone may determine that all of the ballots in the box have been correctly counted. Because of the importance of the right to a secret ballot, some E2E voting schemes also attempt to meet a third requirement, usually referred to as ''receipt freeness'': *No voter can demonstrate how he or she voted to any third party. A researcher has argued that end-to-end auditability and receipt-freeness should be considered to be orthogonal properties. Other researchers have shown that these properties can co-exist, and these properties are combined in the 2005
Voluntary Voting System Guidelines The Voluntary Voting System Guidelines (VVSG) are guidelines adopted by the United States Election Assistance Commission (EAC) for the certification of voting systems. The National Institute of Standards and Technology's Technical Guidelines Develo ...
promulgated by the Election Assistance Commission. This definition is also predominant in the academic literature. To address
ballot stuffing Electoral fraud, sometimes referred to as election manipulation, voter fraud or vote rigging, involves illegal interference with the process of an election, either by increasing the vote share of a favored candidate, depressing the vote share of ...
, the following measure can be adopted: * Eligibility verifiability, by which anyone may determine that all counted ballots were cast by registered voters. Alternatively, assertions regarding ballot stuffing can be externally verified by comparing the number of ballots on hand with the number of registered voters recorded as having voted, and by auditing other aspects of the registration and ballot delivery system. Support for E2E auditability, based on prior experience using it with in-person elections, is also seen as a requirement for remote voting over the
Internet The Internet (or internet) is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a '' network of networks'' that consists of private, pub ...
by many experts.


Proposed E2E Systems

In 2004, David Chaum proposed a solution that allows each voter to verify that their votes are cast appropriately and that the votes are accurately tallied using
visual cryptography Visual cryptography is a cryptographic technique which allows visual information (pictures, text, etc.) to be encrypted in such a way that the decrypted information appears as a visual image. One of the best-known techniques has been credited to M ...
. After the voter selects their candidates, a voting machine prints out a specially formatted version of the ballot on two transparencies. When the layers are stacked, they show the human-readable vote. However, each transparency is
encrypt In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can deci ...
ed with a form of
visual cryptography Visual cryptography is a cryptographic technique which allows visual information (pictures, text, etc.) to be encrypted in such a way that the decrypted information appears as a visual image. One of the best-known techniques has been credited to M ...
so that it alone does not reveal any information unless it is decrypted. The voter selects one layer to destroy at the poll. The voting machine retains an electronic copy of the other layer and gives the physical copy as a receipt to allow the voter to confirm that the electronic ballot was not later changed. The system detects changes to the voter's ballot and uses a mix-net decryption procedure to check if each vote is accurately counted. Sastry, Karloff and Wagner pointed out that there are issues with both of the Chaum and VoteHere cryptographic solutions. Chaum's team subsequently developed
Punchscan Punchscan is an optical scan vote counting system invented by cryptographer David Chaum. Punchscan is designed to offer integrity, privacy, and transparency. The system is voter-verifiable, provides an end-to-end (E2E) audit mechanism, and issu ...
, which has stronger security properties and uses simpler paper ballots. The paper ballots are voted on and then a privacy-preserving portion of the ballot is scanned by an optical scanner. The
Prêt à Voter Prêt à Voter is an E2E voting system devised by Peter Ryan of the University of Luxembourg. It aims to provide guarantees of accuracy of the count and ballot privacy that are independent of software, hardware etc. Assurance of accuracy flows f ...
system, invented by Peter Ryan, uses a shuffled candidate order and a traditional
mix network Mix networks are routing protocols that create hard-to-trace communications by using a chain of proxy servers known as ''mixes'' which take in messages from multiple senders, shuffle them, and send them back out in random order to the next dest ...
. As in Punchscan, the votes are made on paper ballots and a portion of the ballot is scanned. The Scratch and Vote system, invented by Ben Adida, uses a scratch-off surface to hide cryptographic information that can be used to verify the correct printing of the ballot. The
ThreeBallot ThreeBallot is a voting protocol invented by Ron Rivest in 2006. ThreeBallot is an end-to-end (E2E) auditable voting system that can in principle be implemented on paper. The goal in its design was to provide some of the benefits of a cryptograph ...
voting protocol, invented by
Ron Rivest Ronald Linn Rivest (; born May 6, 1947) is a cryptographer and an Institute Professor at MIT. He is a member of MIT's Department of Electrical Engineering and Computer Science (EECS) and a member of MIT's Computer Science and Artificial In ...
, was designed to provide some of the benefits of a cryptographic voting system without using cryptography. It can in principle be implemented on paper although the presented version requires an electronic verifier. The
Scantegrity Scantegrity is a security enhancement for optical scan voting systems, providing such systems with end-to-end (E2E) verifiability of election results. It uses confirmation codes to allow a voter to prove to themselves that their ballot is included ...
and
Scantegrity II Scantegrity is a security enhancement for optical scan voting systems, providing such systems with end-to-end (E2E) verifiability of election results. It uses confirmation codes to allow a voter to prove to themselves that their ballot is included ...
systems provide E2E properties. Rather than replacing the entire voting system, as is the case in all the preceding examples, it works as an add-on for existing optical scan voting systems, producing conventional voter-verifiable paper ballots suitable for risk-limiting audits. Scantegrity II employs
invisible ink Invisible ink, also known as security ink or sympathetic ink, is a substance used for writing, which is invisible either on application or soon thereafter, and can later be made visible by some means, such as heat or ultraviolet light. Invisible ...
and was developed by a team that included Chaum, Rivest, and Ryan. The STAR-Vote system was defined for Travis County, the fifth most populous county in Texas, and home of the state capital, Austin. It illustrated another way to combine an E2E system with conventionally auditable paper ballots, produced in this case by a
ballot marking device A ballot is a device used to cast votes in an election and may be found as a piece of paper or a small ball used in secret voting. It was originally a small ball (see blackballing) used to record decisions made by voters in Italy around the 16 ...
. The project produced a detailed spec and request for proposals in 2016, and bids were received for all the components, but no existing contractor with an EAC certified voting was willing to adapt their system to work with the novel cryptographic open-source components, as required by the RFP. Building on the STAR-Vote experience, Josh Benaloh at
Microsoft Microsoft Corporation is an American multinational technology corporation producing computer software, consumer electronics, personal computers, and related services headquartered at the Microsoft Redmond campus located in Redmond, Washing ...
led the design and development of ElectionGuard, a
software development kit A software development kit (SDK) is a collection of software development tools in one installable package. They facilitate the creation of applications by having a compiler, debugger and sometimes a software framework. They are normally specific ...
that can be combined with existing voting systems to add E2E support. The voting system interprets the voter's choices, stores them for further processing, then calls ElectionGuard which encrypts these interpretations and prints a receipt for the voter. The receipt has a number which corresponds to the encrypted interpretation. The voter can then disavow the ballot ( spoil it), and vote again. Later, independent sources, such as political parties, can obtain the file of numbered encrypted ballots and sum the different contests on the encrypted file to see if they match the election totals. The voter can ask those independent sources if the number(s) on the voter's receipt(s) appear in the file. If enough voters check that their numbers are in the file, they will find if ballots are omitted. Voters can get the decrypted contents of their spoiled ballots, to determine if they accurately match what the voter remembers was on those ballots. The voter cannot get decrypted copies of voted ballots, to prevent selling votes. If enough voters check spoiled ballots, they will show mistakes in encryptions. ElectionGuard does not detect ballot stuffing, which must be detected by traditional records. It does not detect people who falsify receipts, claiming their ballot is missing or was interpreted in error. Election officials will need to decide how to track claimed errors, how many are needed to start an investigation, how to investigate and how to recover from errors, State law may give staff no authority to take action. ElectionGuard does not tally write-ins, except as an undifferentiated total. It is incompatible with
overvote An overvote occurs when one votes for more than the maximum number of selections allowed in a contest. The result is a spoiled vote which is not included in the final tally. One example of an overvote would be voting for two candidates in a single ...
s.


Use in elections

The city of
Takoma Park, Maryland Takoma Park is a city in Montgomery County, Maryland, United States. It is a suburb of Washington, and part of the Washington metropolitan area. Founded in 1883 and incorporated in 1890, Takoma Park, informally called "Azalea City", is a Tree C ...
used
Scantegrity II Scantegrity is a security enhancement for optical scan voting systems, providing such systems with end-to-end (E2E) verifiability of election results. It uses confirmation codes to allow a voter to prove to themselves that their ballot is included ...
for its 2009 and 2011 city elections. Helios has been used since 2009 by several organizations and universities for general elections, board elections, and student council elections. Wombat Voting was used in student council elections at the private research college
Interdisciplinary Center Herzliya Reichman University ( he, אוניברסיטת רייכמן) is Israel's only private university, located in Herzliya, Tel Aviv District. It was founded in 1994 as the IDC Herzliya private college, before being rebranded in 2021. It receives no ...
in 2011 and 2012, as well as in the primary elections for the Israeli political party Meretz in 2012. A modified version of
Prêt à Voter Prêt à Voter is an E2E voting system devised by Peter Ryan of the University of Luxembourg. It aims to provide guarantees of accuracy of the count and ballot privacy that are independent of software, hardware etc. Assurance of accuracy flows f ...
was used as part of the vVote poll-site electronic voting system at the 2014 Victorian State Election in Australia. ElectionGuard was combined with a voting system from VotingWorks and used for the
Fulton, Wisconsin Fulton is a town in Rock County, Wisconsin, in the United States. As of the 2000 census, the town population was 3,158. The unincorporated communities of Fulton and Indianford are located in the town. The unincorporated community of Newville ...
spring primary election on February 18, 2020. The DRE-ip system was trialed in a polling station in Gateshead on 2 May 2019 as part of the 2019 United Kingdom local elections.


Examples

* ADDER * Helios *
Prêt à Voter Prêt à Voter is an E2E voting system devised by Peter Ryan of the University of Luxembourg. It aims to provide guarantees of accuracy of the count and ballot privacy that are independent of software, hardware etc. Assurance of accuracy flows f ...
*
Punchscan Punchscan is an optical scan vote counting system invented by cryptographer David Chaum. Punchscan is designed to offer integrity, privacy, and transparency. The system is voter-verifiable, provides an end-to-end (E2E) audit mechanism, and issu ...
*
Scantegrity Scantegrity is a security enhancement for optical scan voting systems, providing such systems with end-to-end (E2E) verifiability of election results. It uses confirmation codes to allow a voter to prove to themselves that their ballot is included ...
* Wombat Voting *
ThreeBallot ThreeBallot is a voting protocol invented by Ron Rivest in 2006. ThreeBallot is an end-to-end (E2E) auditable voting system that can in principle be implemented on paper. The goal in its design was to provide some of the benefits of a cryptograph ...
* Bingo Voting * homomorphic secret sharing * DRE-i (E2E verifiable e-voting without tallying authorities based on pre-computation) * DRE-ipSiamak F. Shahandashti and Feng Hao
"DRE-ip: A Verifiable E-Voting Scheme without Tallying Authorities"
''Proceedings of the 21st European Symposium on Research in Computer Security (ESORICS)'', LNCS, Vol. 9879, 2016
(E2E verifiable e-voting without tallying authorities based on real-time computation)


References

{{reflist


External links


Verifying Elections with Cryptography
— Video of Ben Adida's 90-minute tech talk
Helios: Web-based Open-Audit Voting
— PDF describing Ben Adida's Helios web-site
Helios Voting System web-site

Simple Auditable & Anonymous Voting Scheme

Study on Poll-Site Voting and Verification Systems
— A review of existing electronic voting systems and its verification systems in supervised environments.
a 2020 MIT Media Lab article about end to end verifiable voting systems, includes discussion of blockchains

A Really Secret Ballot
— Article by The Economist Electronic voting methods Electoral fraud