Risk-Limiting Tallies

08/14/2019
by   Wojciech Jamroga, et al.
0

Many voter-verifiable, coercion-resistant schemes have been proposed, but even the most carefully designed systems necessarily leak information via the announced result. In corner cases, this may be problematic. For example, if all the votes go to one candidate then all vote privacy evaporates. The mere possibility of candidates getting no or few votes could have implications for security in practice: if a coercer demands that a voter cast a vote for such an unpopular candidate, then the voter may feel obliged to obey, even if she is confident that the voting system satisfies the standard coercion resistance definitions. With complex ballots, there may also be a danger of "Italian" style (aka "signature") attacks: the coercer demands the voter cast a ballot with a specific, identifying pattern. Here we propose an approach to tallying end-to-end verifiable schemes that avoids revealing all the votes but still achieves whatever confidence level in the announced result is desired. Now a coerced voter can claim that the required vote must be amongst those that remained shrouded. Our approach is based on the well-established notion of Risk-Limiting Audits, but here applied to the tally rather than to the audit. We show that this approach counters coercion threats arising in extreme tallies and "Italian" attacks. We illustrate our approach by applying it to the Selene scheme, and we extend the approach to Risk-Limiting Verification, where not all vote trackers are revealed, thereby enhancing the coercion mitigation properties of Selene.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
09/16/2023

Stylish Risk-Limiting Audits in Practice

Risk-limiting audits (RLAs) can use information about which ballot cards...
research
02/04/2019

Risk-Limiting Bayesian Polling Audits for Two Candidate Elections

We propose a simple common framework for Risk-Limiting and Bayesian (pol...
research
05/31/2021

Electryo, In-person Voting with Transparent Voter Verifiability and Eligibility Verifiability

Selene is an e-voting protocol that allows voters to directly check thei...
research
04/19/2023

A Protocol for Cast-as-Intended Verifiability with a Second Device

Numerous institutions, such as companies, universities, or non-governmen...
research
07/20/2023

Adaptively Weighted Audits of Instant-Runoff Voting Elections: AWAIRE

An election audit is risk-limiting if the audit limits (to a pre-specifi...
research
08/19/2020

A Unified Evaluation of Two-Candidate Ballot-Polling Election Auditing Methods

Counting votes is complex and error-prone. Several statistical methods h...
research
12/06/2020

More style, less work: card-style data decrease risk-limiting audit sample sizes

U.S. elections rely heavily on computers such as voter registration data...

Please sign up or login with your details

Forgot password? Click here to reset