Usability of Voter Verifiable, End-to-end Voting Systems: Baseline Data for Helios, Prêt à Voter, and Scantegrity II
نویسندگان
چکیده
In response to voting security concerns, security researchers have developed tamper-resistant, voter verifiable voting methods. These end-to-end voting systems are unique because they give voters the option to both verify the system is working properly and to check that their votes have been recorded after leaving the polling place. While these methods solve many of the security problems surrounding voting with traditional methods, the systems’ added complexity might adversely impact their usability. This paper presents an experiment assessing the usability of Helios, Prêt à Voter, and Scantegrity II. Overall, the tested systems were exceptionally difficult to use. Data revealed that success rates of voters casting ballots on these systems were extraordinarily low. Specifically, only 58% of ballots were successfully cast across all three systems. There were reliable differences in voting completion times across the three methods, and these times were much slower than previously tested voting technologies. Subjective usability ratings differed across the systems, with satisfaction being generally low, but highest for Helios. Vote verification completion rates were even lower than those for vote casting. There were no reliable differences in ballot verification times across the three methods, but there were differences in satisfaction levels, with satisfaction being lowest for Helios. These usability findings— especially the extremely low vote casting completion rates—highlight that it is not enough for a system to be secure; every system must also be usable. INTRODUCTION For centuries there has been a desire for auditability in elections. In mid-19 century America, groups of voters stood in public venues and called out their ballot choices to the election clerks, while a judge tallied the votes (Jones, 2001). The advantage of this voting method was that anyone could listen to the vocal expression of preferences and keep their own vote count, which prevented practices like ballot box stuffing. While this oral voting method may have increased the accuracy of vote counting, voters’ desire for privacy was not addressed, enabling bribery and coercion. In response, during the late 1800s, voting jurisdictions began to introduce the use of the secret, Australian ballots that listed all the candidates for the same office on the same sheet of paper (which was issued to voters at the polling station) and guaranteed voters privacy in preparing ballots inside a booth (Brent, 2006). This voting system ensured that voters prepared their own ballot expressing their intent while preserving anonymity. Yet this voting method was not perfect; there was not a means to audit the election—leaving a long-standing tension between auditability and privacy in elections.
منابع مشابه
From Error to Error: Why Voters Could not Cast a Ballot and Verify Their Vote With Helios, Prêt à Voter, and Scantegrity II
The aim of this paper is to identify user errors, and the related potential design deficiencies, that contributed to participants failing to vote cast and vote verify across three end-to-end voting systems: Helios, Prêt à Voter, and Scantegrity II. To understand why voters could not cast a vote 42% of the time and verify that their ballots were cast and counted with the tested e2e systems 53% o...
متن کاملEnd-to-end veriable voting with Prêt à Voter
Transparent and verifiable elections can be achieved by end-to-end verifiable electronic voting systems. The purpose of such systems is to enable voters to verify the inclusion of their vote in the final tally while keeping the votes secret. Achieving verifiability and secrecy at the same time is hard and this thesis explores the properties of verifiable electronic voting systems and describes ...
متن کاملSelections: Internet Voting with Over-the-Shoulder Coercion-Resistance
We present Selections, a new cryptographic voting protocol that is end-to-end verifiable and suitable for Internet voting. After a one-time in-person registration, voters can cast ballots in an arbitrary number of elections. We say a system provides over-the-shoulder coercionresistance if a voter can undetectably avoid complying with an adversary that is present during the vote casting process....
متن کاملSigma Ballots
We present Sigma ballots, a new type of ballot designed to be used in secure elections. Sigma ballots use the random order of candidates introduced by Prêt à Voter, combined with the confirmation codes of Scantegrity II. These ballots can be produced by a DRE machine with a slightly modified VVPAT, or can be similar to optical scan ballots. Sigma ballots work in conjunction with existing public...
متن کاملPractical Governmental Voting with Unconditional Integrity and Privacy
Throughout the years, many cryptographically verifiable voting systems have been proposed with a whole spectrum of features and security assumptions. Where the voter casts an in-person (and possibly paper) ballot and leaves, as is common in a governmental election, the majority of the proposals fall in the category of providing unconditional integrity and computational privacy. A minority of pa...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014