• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations

DMCA

Three Voting Protocols: ThreeBallot, VAV, and Twin (2007)

Cached

  • Download as a PDF

Download Links

  • [www.usenix.org]
  • [www.usenix.org]
  • [www.usenix.org]
  • [www.usenix.org]
  • [www.usenix.org]
  • [people.csail.mit.edu]
  • [theory.lcs.mit.edu]
  • [csail.mit.edu]
  • [people.csail.mit.edu]
  • [math.temple.edu]
  • [theory.csail.mit.edu]

  • Save to List
  • Add to Collection
  • Correct Errors
  • Monitor Changes
by Ronald L. Rivest , Warren D. Smith
Venue:Proceedings of USENIX/ACCURATE Electronic Voting Technology (EVT
Citations:44 - 0 self
  • Summary
  • Citations
  • Active Bibliography
  • Co-citation
  • Clustered Documents
  • Version History

BibTeX

@INPROCEEDINGS{Rivest07threevoting,
    author = {Ronald L. Rivest and Warren D. Smith},
    title = {Three Voting Protocols: ThreeBallot, VAV, and Twin},
    booktitle = {Proceedings of USENIX/ACCURATE Electronic Voting Technology (EVT},
    year = {2007},
    publisher = {Press}
}

Share

Facebook Twitter Reddit Bibsonomy

OpenURL

 

Abstract

We present three new paper-based voting methods with interesting security properties. Our goal is to achieve the same security properties as recently proposed cryptographic voting protocols, but using only paper ballots and no cryptography. From a security viewpoint we get reasonably close, particularly for short ballots. However, our proposals should probably be considered as more “academic ” than “practical.” In these proposals, not only can each voter verify that her vote is recorded as intended, but she gets a “receipt ” she can take home that can be used later to verify that her vote is actually included in the final tally. But her receipt does not allow her to prove to anyone else how she voted. All ballots cast are scanned and published in plaintext on a “public bulletin board ” (web site), so anyone may correctly compute the election result. In ThreeBallot, each voter casts three paper ballots, with certain restrictions on how they may be filled out. These paper ballots are of course “voterverifiable.” A voter receives a copy of one of her ballots as her “receipt”, which she may take home. Only the voter knows which ballot she copied for her receipt. The voter is unable to use her receipt to prove how she voted or to sell her vote, as the receipt doesn’t reveal how she voted. A voter can check that the web site contains a ballot matching her receipt. Deletion or modification of ballots is thus detectable; so the integrity of the election is verifiable. VAV is like ThreeBallot, except that the ballotmarking rules are different: one ballot may “cancel” another (VAV = Vote/Anti-Vote/Vote). VAV is better suited to – i.e. yields better security properties ∗ The latest version of this paper is always at

Keyphrases

paper ballot    voting protocol    security property    voter verify    election result    ballotmarking rule    final tally    cryptographic voting protocol    new paper-based voting method    vav vote anti-vote vote    short ballot    certain restriction    web site    public bulletin board    interesting security property    receipt doesn    security viewpoint   

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University