Thoughts On Appropriate Technologies for Voting Ronald L. Rivest - - PowerPoint PPT Presentation

thoughts on appropriate technologies for voting
SMART_READER_LITE
LIVE PREVIEW

Thoughts On Appropriate Technologies for Voting Ronald L. Rivest - - PowerPoint PPT Presentation

Thoughts On Appropriate Technologies for Voting Ronald L. Rivest Viterbi Professor of EECS MIT, Cambridge, MA Princeton CITP E-voting Workshop 2012-11-01 1 Is Voting Keeping Up with Technology? We live in an age of marvelous


slide-1
SLIDE 1

Thoughts On Appropriate Technologies for Voting

Ronald L. Rivest

Viterbi Professor of EECS MIT, Cambridge, MA

Princeton CITP E-voting Workshop 2012-11-01

1

slide-2
SLIDE 2

Is Voting “Keeping Up with Technology”?

◮ We live in an age of marvelous technology:

cellphones, man on the moon, the web, cars that drive themselves.

2

slide-3
SLIDE 3

Is Voting “Keeping Up with Technology”?

◮ We live in an age of marvelous technology:

cellphones, man on the moon, the web, cars that drive themselves.

◮ Many technology wishes come true—

wish it, and you can have it.

2

slide-4
SLIDE 4

Is Voting “Keeping Up with Technology”?

◮ We live in an age of marvelous technology:

cellphones, man on the moon, the web, cars that drive themselves.

◮ Many technology wishes come true—

wish it, and you can have it.

◮ Is voting being “left behind”?

2

slide-5
SLIDE 5

Is Voting “Keeping Up with Technology”?

◮ We live in an age of marvelous technology:

cellphones, man on the moon, the web, cars that drive themselves.

◮ Many technology wishes come true—

wish it, and you can have it.

◮ Is voting being “left behind”? ◮ Why are many of us voting on paper ballots?

2

slide-6
SLIDE 6

Is Voting “Keeping Up with Technology”?

◮ We live in an age of marvelous technology:

cellphones, man on the moon, the web, cars that drive themselves.

◮ Many technology wishes come true—

wish it, and you can have it.

◮ Is voting being “left behind”? ◮ Why are many of us voting on paper ballots? ◮ Why not voting, say, over the Internet?

2

slide-7
SLIDE 7

Choosing Appropriate Technology for Voting

◮ Voting tech has often followed other tech innovations:

paper ballot, lever machine, punch card, opscan ballot, DRE, ...

3

slide-8
SLIDE 8

Choosing Appropriate Technology for Voting

◮ Voting tech has often followed other tech innovations:

paper ballot, lever machine, punch card, opscan ballot, DRE, ...

◮ Technology introduces design options.

3

slide-9
SLIDE 9

Choosing Appropriate Technology for Voting

◮ Voting tech has often followed other tech innovations:

paper ballot, lever machine, punch card, opscan ballot, DRE, ...

◮ Technology introduces design options. ◮ You don’t have to take them.

3

slide-10
SLIDE 10

Choosing Appropriate Technology for Voting

◮ Voting tech has often followed other tech innovations:

paper ballot, lever machine, punch card, opscan ballot, DRE, ...

◮ Technology introduces design options. ◮ You don’t have to take them. ◮ Sometimes low tech is better! (esp. for security)

3

slide-11
SLIDE 11

Choosing Appropriate Technology for Voting

◮ Voting tech has often followed other tech innovations:

paper ballot, lever machine, punch card, opscan ballot, DRE, ...

◮ Technology introduces design options. ◮ You don’t have to take them. ◮ Sometimes low tech is better! (esp. for security) ◮ My students prefer chalk/blackboard to powerpoint.

3

slide-12
SLIDE 12

Choosing Appropriate Technology for Voting

◮ Voting tech has often followed other tech innovations:

paper ballot, lever machine, punch card, opscan ballot, DRE, ...

◮ Technology introduces design options. ◮ You don’t have to take them. ◮ Sometimes low tech is better! (esp. for security) ◮ My students prefer chalk/blackboard to powerpoint. ◮ When hiking, it may be better to carry a map than to

use a GPS. (What could go wrong?)

3

slide-13
SLIDE 13

Choosing Appropriate Technology for Voting

◮ Voting tech has often followed other tech innovations:

paper ballot, lever machine, punch card, opscan ballot, DRE, ...

◮ Technology introduces design options. ◮ You don’t have to take them. ◮ Sometimes low tech is better! (esp. for security) ◮ My students prefer chalk/blackboard to powerpoint. ◮ When hiking, it may be better to carry a map than to

use a GPS. (What could go wrong?)

◮ Manual car window may be safer than power window.

3

slide-14
SLIDE 14

Epigrams

I offer 11 “epigrams” that may help frame the discussion...

4

slide-15
SLIDE 15

# 1 A voting system must determine the winner and convince the losers they really lost.

5

slide-16
SLIDE 16

# 1 A voting system must determine the winner and convince the losers they really lost.

◮ VS is not a “trusted party,” but must justify its

conclusions.

5

slide-17
SLIDE 17

# 1 A voting system must determine the winner and convince the losers they really lost.

◮ VS is not a “trusted party,” but must justify its

conclusions.

◮ VS must produce credible evidence that the stated

  • utcome is correct.

5

slide-18
SLIDE 18

# 1 A voting system must determine the winner and convince the losers they really lost.

◮ VS is not a “trusted party,” but must justify its

conclusions.

◮ VS must produce credible evidence that the stated

  • utcome is correct.

◮ Key question to ask about any VS: “What

evidence does it produce about the outcome, and why is it credible?”

5

slide-19
SLIDE 19

# 1 A voting system must determine the winner and convince the losers they really lost.

◮ VS is not a “trusted party,” but must justify its

conclusions.

◮ VS must produce credible evidence that the stated

  • utcome is correct.

◮ Key question to ask about any VS: “What

evidence does it produce about the outcome, and why is it credible?”

◮ VS should include a (risk-limiting) audit to ensure

that (with high probability) the evidence really does support the stated outcome.

5

slide-20
SLIDE 20

# 2 The need for secret ballots makes voting system design both unique and hard.

6

slide-21
SLIDE 21

# 2 The need for secret ballots makes voting system design both unique and hard.

◮ Different than banking or other

information-processing applications.

6

slide-22
SLIDE 22

# 2 The need for secret ballots makes voting system design both unique and hard.

◮ Different than banking or other

information-processing applications.

◮ Voters should not be coerced or bribed (they must

be protected from their own temptations).

6

slide-23
SLIDE 23

# 2 The need for secret ballots makes voting system design both unique and hard.

◮ Different than banking or other

information-processing applications.

◮ Voters should not be coerced or bribed (they must

be protected from their own temptations).

◮ No one should know how a voter voted, even if the

voter wants it. (Mandatory privacy!)

6

slide-24
SLIDE 24

# 2 The need for secret ballots makes voting system design both unique and hard.

◮ Different than banking or other

information-processing applications.

◮ Voters should not be coerced or bribed (they must

be protected from their own temptations).

◮ No one should know how a voter voted, even if the

voter wants it. (Mandatory privacy!)

◮ Separation of voter identification from ballot

makes good chain of custody very important.

6

slide-25
SLIDE 25

# 2 The need for secret ballots makes voting system design both unique and hard.

◮ Different than banking or other

information-processing applications.

◮ Voters should not be coerced or bribed (they must

be protected from their own temptations).

◮ No one should know how a voter voted, even if the

voter wants it. (Mandatory privacy!)

◮ Separation of voter identification from ballot

makes good chain of custody very important.

◮ VBM (vote-by-mail) and unsupervised remote

voting are defective approaches.

6

slide-26
SLIDE 26

# 3 Beware of the “myth of the machine”!

7

slide-27
SLIDE 27

# 3 Beware of the “myth of the machine”!

◮ Myth = We can build infallible machines that

always work as specified.

7

slide-28
SLIDE 28

# 3 Beware of the “myth of the machine”!

◮ Myth = We can build infallible machines that

always work as specified.

◮ Even when attacked!

7

slide-29
SLIDE 29

# 3 Beware of the “myth of the machine”!

◮ Myth = We can build infallible machines that

always work as specified.

◮ Even when attacked! ◮ Ideal machine is equivalent to its specification.

7

slide-30
SLIDE 30

# 3 Beware of the “myth of the machine”!

◮ Myth = We can build infallible machines that

always work as specified.

◮ Even when attacked! ◮ Ideal machine is equivalent to its specification. ◮ Real machine is what you get.

7

slide-31
SLIDE 31

# 3 Beware of the “myth of the machine”!

◮ Myth = We can build infallible machines that

always work as specified.

◮ Even when attacked! ◮ Ideal machine is equivalent to its specification. ◮ Real machine is what you get. ◮ Rarely are these the same.

7

slide-32
SLIDE 32

# 3 Beware of the “myth of the machine”!

◮ Myth = We can build infallible machines that

always work as specified.

◮ Even when attacked! ◮ Ideal machine is equivalent to its specification. ◮ Real machine is what you get. ◮ Rarely are these the same. ◮ Even good commercial software has several

serious undiscovered errors per 1000 lines of

  • code. These are frequently security vulnerabilities.

7

slide-33
SLIDE 33

# 3 Beware of the “myth of the machine”!

◮ Myth = We can build infallible machines that

always work as specified.

◮ Even when attacked! ◮ Ideal machine is equivalent to its specification. ◮ Real machine is what you get. ◮ Rarely are these the same. ◮ Even good commercial software has several

serious undiscovered errors per 1000 lines of

  • code. These are frequently security vulnerabilities.

◮ Even worse, deployed implementation may have

additional changes.

7

slide-34
SLIDE 34

# 3 Beware of the “myth of the machine”!

◮ Myth = We can build infallible machines that

always work as specified.

◮ Even when attacked! ◮ Ideal machine is equivalent to its specification. ◮ Real machine is what you get. ◮ Rarely are these the same. ◮ Even good commercial software has several

serious undiscovered errors per 1000 lines of

  • code. These are frequently security vulnerabilities.

◮ Even worse, deployed implementation may have

additional changes.

◮ Properties of system derive from properties of

deployed system, not those of original spec.

7

slide-35
SLIDE 35

# 4 It may help to view a complex piece of technology as like a person.

8

slide-36
SLIDE 36

# 4 It may help to view a complex piece of technology as like a person.

◮ Automation / personification duality: Tasks once

performed by people have been automated.

8

slide-37
SLIDE 37

# 4 It may help to view a complex piece of technology as like a person.

◮ Automation / personification duality: Tasks once

performed by people have been automated.

◮ Just like a person, complex technologies can act

in unpredictable, even malicious, ways. They can say one thing and do another.

8

slide-38
SLIDE 38

# 4 It may help to view a complex piece of technology as like a person.

◮ Automation / personification duality: Tasks once

performed by people have been automated.

◮ Just like a person, complex technologies can act

in unpredictable, even malicious, ways. They can say one thing and do another.

◮ Think of buying a voting system as you would

hiring a team of workers from a temp agency.

8

slide-39
SLIDE 39

# 4 It may help to view a complex piece of technology as like a person.

◮ Automation / personification duality: Tasks once

performed by people have been automated.

◮ Just like a person, complex technologies can act

in unpredictable, even malicious, ways. They can say one thing and do another.

◮ Think of buying a voting system as you would

hiring a team of workers from a temp agency.

◮ Think of these workers as high-school students

(earnest), elves (mischevious), or guys in ski masks (malicious).

8

slide-40
SLIDE 40

# 4 It may help to view a complex piece of technology as like a person.

◮ Automation / personification duality: Tasks once

performed by people have been automated.

◮ Just like a person, complex technologies can act

in unpredictable, even malicious, ways. They can say one thing and do another.

◮ Think of buying a voting system as you would

hiring a team of workers from a temp agency.

◮ Think of these workers as high-school students

(earnest), elves (mischevious), or guys in ski masks (malicious).

◮ Imagine a voting machine, or the internet, as a

“person.” Did you ever make a hiring error?

8

slide-41
SLIDE 41

# 5 VS must be robust against “insider attacks”!

9

slide-42
SLIDE 42

# 5 VS must be robust against “insider attacks”!

◮ An insider (election official or piece of technology)

should not be able to undetectably corrupt evidence so as to cause change in outcome.

9

slide-43
SLIDE 43

# 5 VS must be robust against “insider attacks”!

◮ An insider (election official or piece of technology)

should not be able to undetectably corrupt evidence so as to cause change in outcome.

◮ Mental state of “temp worker” is at best weak or

“hearsay” evidence.

9

slide-44
SLIDE 44

# 5 VS must be robust against “insider attacks”!

◮ An insider (election official or piece of technology)

should not be able to undetectably corrupt evidence so as to cause change in outcome.

◮ Mental state of “temp worker” is at best weak or

“hearsay” evidence.

◮ Note difference between “job listing for the person

you hired” and “the person who shows up for work

  • n election day”. For a machine, this is the

difference between its specification and its actual behavior.

9

slide-45
SLIDE 45

# 5 VS must be robust against “insider attacks”!

◮ An insider (election official or piece of technology)

should not be able to undetectably corrupt evidence so as to cause change in outcome.

◮ Mental state of “temp worker” is at best weak or

“hearsay” evidence.

◮ Note difference between “job listing for the person

you hired” and “the person who shows up for work

  • n election day”. For a machine, this is the

difference between its specification and its actual behavior.

◮ Misbehavior by an insider should be detectable

(and correctable if possible!).

9

slide-46
SLIDE 46

# 5 VS must be robust against “insider attacks”!

◮ An insider (election official or piece of technology)

should not be able to undetectably corrupt evidence so as to cause change in outcome.

◮ Mental state of “temp worker” is at best weak or

“hearsay” evidence.

◮ Note difference between “job listing for the person

you hired” and “the person who shows up for work

  • n election day”. For a machine, this is the

difference between its specification and its actual behavior.

◮ Misbehavior by an insider should be detectable

(and correctable if possible!).

◮ Helps to distinguish “wholesale” from “retail” fraud.

9

slide-47
SLIDE 47

# 6 Paper has cool properties!

10

slide-48
SLIDE 48

# 6 Paper has cool properties!

◮ Low-tech approach to constraining complex

components, just as dog leash keeps dog from wandering off.

10

slide-49
SLIDE 49

# 6 Paper has cool properties!

◮ Low-tech approach to constraining complex

components, just as dog leash keeps dog from wandering off.

◮ Paper is human readable/writable, machine

readable/writable, tamper-evident, and durable.

10

slide-50
SLIDE 50

# 6 Paper has cool properties!

◮ Low-tech approach to constraining complex

components, just as dog leash keeps dog from wandering off.

◮ Paper is human readable/writable, machine

readable/writable, tamper-evident, and durable.

◮ A writing is a commitment–can’t be easily

changed.

10

slide-51
SLIDE 51

# 6 Paper has cool properties!

◮ Low-tech approach to constraining complex

components, just as dog leash keeps dog from wandering off.

◮ Paper is human readable/writable, machine

readable/writable, tamper-evident, and durable.

◮ A writing is a commitment–can’t be easily

changed.

◮ VVPAT creates evidence—a set of facts—that

can’t be ignored or altered by VS. VS can’t wander far from this set of facts.

10

slide-52
SLIDE 52

# 6 Paper has cool properties!

◮ Low-tech approach to constraining complex

components, just as dog leash keeps dog from wandering off.

◮ Paper is human readable/writable, machine

readable/writable, tamper-evident, and durable.

◮ A writing is a commitment–can’t be easily

changed.

◮ VVPAT creates evidence—a set of facts—that

can’t be ignored or altered by VS. VS can’t wander far from this set of facts.

◮ Audit is like yank on dog leash...

10

slide-53
SLIDE 53

# 7 There is a difference between a voter proxy and a voting witness.

11

slide-54
SLIDE 54

# 7 There is a difference between a voter proxy and a voting witness.

◮ A voter proxy votes in your place.

11

slide-55
SLIDE 55

# 7 There is a difference between a voter proxy and a voting witness.

◮ A voter proxy votes in your place. ◮ A voting witness watches you vote.

11

slide-56
SLIDE 56

# 7 There is a difference between a voter proxy and a voting witness.

◮ A voter proxy votes in your place. ◮ A voting witness watches you vote. ◮ Proxy: You tell touch-screen voting machine (guy

in ski mask) which candidate you prefer. Guy says he’ll remember that and vote that way on your behalf later.

11

slide-57
SLIDE 57

# 7 There is a difference between a voter proxy and a voting witness.

◮ A voter proxy votes in your place. ◮ A voting witness watches you vote. ◮ Proxy: You tell touch-screen voting machine (guy

in ski mask) which candidate you prefer. Guy says he’ll remember that and vote that way on your behalf later.

◮ Witness: You show scanner (elf) paper ballot you

have filled out. Elf makes notes, and ballot goes into ballot box.

11

slide-58
SLIDE 58

# 7 There is a difference between a voter proxy and a voting witness.

◮ A voter proxy votes in your place. ◮ A voting witness watches you vote. ◮ Proxy: You tell touch-screen voting machine (guy

in ski mask) which candidate you prefer. Guy says he’ll remember that and vote that way on your behalf later.

◮ Witness: You show scanner (elf) paper ballot you

have filled out. Elf makes notes, and ballot goes into ballot box.

◮ In first case, guy is creating the evidence of your

  • choices. In the second case, elf is merely
  • bserving the evidence you have created.

11

slide-59
SLIDE 59

# 8 Avoid Internet Voting, for security reasons.

12

slide-60
SLIDE 60

# 8 Avoid Internet Voting, for security reasons.

◮ Why vote over the Internet? Why?

Why?

12

slide-61
SLIDE 61

# 8 Avoid Internet Voting, for security reasons.

◮ Why vote over the Internet? Why?

Why? Why?

12

slide-62
SLIDE 62

# 8 Avoid Internet Voting, for security reasons.

◮ Why vote over the Internet? Why?

Why? Why? Why?

12

slide-63
SLIDE 63

# 8 Avoid Internet Voting, for security reasons.

◮ Why vote over the Internet? Why?

Why? Why? Why? Why?...

12

slide-64
SLIDE 64

# 8 Avoid Internet Voting, for security reasons.

◮ Why vote over the Internet? Why?

Why? Why? Why? Why?... Don’t you have a better approach?

12

slide-65
SLIDE 65

# 8 Avoid Internet Voting, for security reasons.

◮ Why vote over the Internet? Why?

Why? Why? Why? Why?... Don’t you have a better approach?

◮ Would you connect your toaster to a high-tension

power line?

12

slide-66
SLIDE 66

# 8 Avoid Internet Voting, for security reasons.

◮ Why vote over the Internet? Why?

Why? Why? Why? Why?... Don’t you have a better approach?

◮ Would you connect your toaster to a high-tension

power line?

◮ Would you invest your pension in credit default

swaps?

12

slide-67
SLIDE 67

# 8 Avoid Internet Voting, for security reasons.

◮ Why vote over the Internet? Why?

Why? Why? Why? Why?... Don’t you have a better approach?

◮ Would you connect your toaster to a high-tension

power line?

◮ Would you invest your pension in credit default

swaps?

◮ Vendors who claim to have solved internet

security problem are misleading you. (Like authors who write books on “How to make a million in real estate”—Why are they trying to make a buck writing how-to books?)

12

slide-68
SLIDE 68

# 8 Avoid Internet Voting, for security reasons.

◮ Why vote over the Internet? Why?

Why? Why? Why? Why?... Don’t you have a better approach?

◮ Would you connect your toaster to a high-tension

power line?

◮ Would you invest your pension in credit default

swaps?

◮ Vendors who claim to have solved internet

security problem are misleading you. (Like authors who write books on “How to make a million in real estate”—Why are they trying to make a buck writing how-to books?)

◮ Internet is useful in elections, but fails as an

“channel of evidence for voter intent”.

12

slide-69
SLIDE 69

# 9 Cryptography can help.

13

slide-70
SLIDE 70

# 9 Cryptography can help.

◮ Good for privacy and for commitments.

13

slide-71
SLIDE 71

# 9 Cryptography can help.

◮ Good for privacy and for commitments. ◮ With “end-to-end” (E2E) voting systems, voters

cast encrypted ballots onto public “bulletin board.”

13

slide-72
SLIDE 72

# 9 Cryptography can help.

◮ Good for privacy and for commitments. ◮ With “end-to-end” (E2E) voting systems, voters

cast encrypted ballots onto public “bulletin board.”

◮ Voters can verify encryption, without getting

“receipt”(!).

13

slide-73
SLIDE 73

# 9 Cryptography can help.

◮ Good for privacy and for commitments. ◮ With “end-to-end” (E2E) voting systems, voters

cast encrypted ballots onto public “bulletin board.”

◮ Voters can verify encryption, without getting

“receipt”(!).

◮ Bulletin board enables “verifiable chain of custody.”

13

slide-74
SLIDE 74

# 9 Cryptography can help.

◮ Good for privacy and for commitments. ◮ With “end-to-end” (E2E) voting systems, voters

cast encrypted ballots onto public “bulletin board.”

◮ Voters can verify encryption, without getting

“receipt”(!).

◮ Bulletin board enables “verifiable chain of custody.” ◮ Authorities can produce tally without violating

secret ballot.

13

slide-75
SLIDE 75

# 9 Cryptography can help.

◮ Good for privacy and for commitments. ◮ With “end-to-end” (E2E) voting systems, voters

cast encrypted ballots onto public “bulletin board.”

◮ Voters can verify encryption, without getting

“receipt”(!).

◮ Bulletin board enables “verifiable chain of custody.” ◮ Authorities can produce tally without violating

secret ballot.

◮ Anyone can verify tally of encrypted ballots.

13

slide-76
SLIDE 76

# 9 Cryptography can help.

◮ Good for privacy and for commitments. ◮ With “end-to-end” (E2E) voting systems, voters

cast encrypted ballots onto public “bulletin board.”

◮ Voters can verify encryption, without getting

“receipt”(!).

◮ Bulletin board enables “verifiable chain of custody.” ◮ Authorities can produce tally without violating

secret ballot.

◮ Anyone can verify tally of encrypted ballots. ◮ Scantegrity nicely integrates both paper ballots

and crypto (for poll-site voting).

13

slide-77
SLIDE 77

# 9 Cryptography can help.

◮ Good for privacy and for commitments. ◮ With “end-to-end” (E2E) voting systems, voters

cast encrypted ballots onto public “bulletin board.”

◮ Voters can verify encryption, without getting

“receipt”(!).

◮ Bulletin board enables “verifiable chain of custody.” ◮ Authorities can produce tally without violating

secret ballot.

◮ Anyone can verify tally of encrypted ballots. ◮ Scantegrity nicely integrates both paper ballots

and crypto (for poll-site voting).

◮ Helios embodies similar ideas for remote voting

(assuming that client is malware-free!).

13

slide-78
SLIDE 78

# 10 Beware wishful thinking! You can’t always get what you want:

14

slide-79
SLIDE 79

# 10 Beware wishful thinking! You can’t always get what you want:

◮ non-fattening pizza

14

slide-80
SLIDE 80

# 10 Beware wishful thinking! You can’t always get what you want:

◮ non-fattening pizza ◮ totally safe cigarette

14

slide-81
SLIDE 81

# 10 Beware wishful thinking! You can’t always get what you want:

◮ non-fattening pizza ◮ totally safe cigarette ◮ getting fit with 5 minutes exercise/day

14

slide-82
SLIDE 82

# 10 Beware wishful thinking! You can’t always get what you want:

◮ non-fattening pizza ◮ totally safe cigarette ◮ getting fit with 5 minutes exercise/day ◮ automobile that runs on water

14

slide-83
SLIDE 83

# 10 Beware wishful thinking! You can’t always get what you want:

◮ non-fattening pizza ◮ totally safe cigarette ◮ getting fit with 5 minutes exercise/day ◮ automobile that runs on water ◮ secure internet voting

(Calling something “secure” doesn’t make it so. Maybe we should call this “wishful labeling”. This happens a lot when marketing tells engineering what to invent.)

14

slide-84
SLIDE 84

# 10 Voting system design is all about tradeoffs.

15

slide-85
SLIDE 85

# 10 Voting system design is all about tradeoffs.

◮ Security vs. Usability vs. Cost vs. Complexity vs.

Accessibility vs. ...

15

slide-86
SLIDE 86

# 10 Voting system design is all about tradeoffs.

◮ Security vs. Usability vs. Cost vs. Complexity vs.

Accessibility vs. ...

◮ Conflicting requirements drive up complexity.

15

slide-87
SLIDE 87

# 10 Voting system design is all about tradeoffs.

◮ Security vs. Usability vs. Cost vs. Complexity vs.

Accessibility vs. ...

◮ Conflicting requirements drive up complexity. ◮ High complexity makes security tough.

15

slide-88
SLIDE 88

# 10 Voting system design is all about tradeoffs.

◮ Security vs. Usability vs. Cost vs. Complexity vs.

Accessibility vs. ...

◮ Conflicting requirements drive up complexity. ◮ High complexity makes security tough. ◮ Evidence-based elections may reduce need or

cost for certification.

15

slide-89
SLIDE 89

# 10 Voting system design is all about tradeoffs.

◮ Security vs. Usability vs. Cost vs. Complexity vs.

Accessibility vs. ...

◮ Conflicting requirements drive up complexity. ◮ High complexity makes security tough. ◮ Evidence-based elections may reduce need or

cost for certification.

◮ Continued research needed to identify interesting

new design points, with different trade-offs. Need to understand first what voting systems are possible, then to select those that are “best”.

15

slide-90
SLIDE 90

For more information

◮ Caltech/MIT Voting Technology Project.

Voting: What Has Changed, What Hasn’t & What Needs Improvement. October 2012. http://vote.caltech.edu.

◮ Douglas W. Jones and Barbara Simons.

Broken Ballots: Will Your Vote Count? CSLI, June 2012. http://brokenballots.com

◮ Verified Voting.

http://verifiedvoting.org/

◮ Overseas Vote Foundation

http://www.overseasvotefoundation.org

◮ Brennan Center for Justice

http://www.brennancenter.org/

16

slide-91
SLIDE 91

Summary

Evidence-based elections.

17

slide-92
SLIDE 92

Summary

Evidence-based elections. Complex technology.

17

slide-93
SLIDE 93

Summary

Evidence-based elections. Complex technology. Paper is cool. Paper is prudent.

17

slide-94
SLIDE 94

Summary

Evidence-based elections. Complex technology. Paper is cool. Paper is prudent. Internet voting isn’t ready for prime time.

17

slide-95
SLIDE 95

Summary

Evidence-based elections. Complex technology. Paper is cool. Paper is prudent. Internet voting isn’t ready for prime time. Auditability.

17

slide-96
SLIDE 96

Summary

Evidence-based elections. Complex technology. Paper is cool. Paper is prudent. Internet voting isn’t ready for prime time. Auditability. Post-election audits.

17

slide-97
SLIDE 97

Summary

Evidence-based elections. Complex technology. Paper is cool. Paper is prudent. Internet voting isn’t ready for prime time. Auditability. Post-election audits. Cryptography and end-to-end voting.

17

slide-98
SLIDE 98

Summary

Evidence-based elections. Complex technology. Paper is cool. Paper is prudent. Internet voting isn’t ready for prime time. Auditability. Post-election audits. Cryptography and end-to-end voting. Voting tech best of breed for poll-site voting seems to be:

◮ Opscan ballots with post-election auditing. ◮ End-to-end voting sytems.

17

slide-99
SLIDE 99

Thank you! !!! Please vote !!!

18