Browse Content

Use this page to browse all content from the Voting Technology Project, sorted by last updated.

Internet Voting in Estonia

Working Paper No.: 
60
Date Published: 
11/30/2008
Author(s): 
R. Michael Alvarez
Alexander H. Trechsel
Thad E. Hall
Several countries have conducted Internet voting trials in binding public elections over the past decade, including Switzerland, the United Kingdom, and the United States. These trials have been conducted at the local and regional levels of government, targeting specific populations of voters. However, Estonia—a former Soviet republic and now a full member of the European Union—has advanced the farthest in deploying Internet voting. Since 2000, Estonia has conducted two national elections in which all voters could use Internet voting.

New Barriers to Participation: Application of New Mexico's Voter Identification Law

Working Paper No.: 
59
Date Published: 
11/30/2008
Author(s): 
Thad E. Hall
Kyle L. Saunders
Lisa A. Bryant
In democratic societies there is a tension between maximizing ballot access and minimizing voter fraud. Since the 2000 presidential election, this tension has been central to discussions about election reform, at the national and local level. We examine this tension by focusing on the implementation of voter identification laws in one state that has experienced significant issues in recent elections, and that is now implementing significant attempts at election reform: New Mexico.

Access Versus Integrity in Voter Identification Requirements

Working Paper No.: 
58
Date Published: 
01/31/2007
Author(s): 
Stephen Ansolabehere
No abstract available.

The Effect of Voter Identification Laws on Turnout

Working Paper No.: 
57
Date Published: 
11/30/2008
Author(s): 
Jonathan Katz
Delia Bailey
R. Michael Alvarez
Since the passage of the “Help America Vote Act” in 2002, nearly half of the states have adopted a variety of new identification requirements for voter registration and participation by the 2006 general election. There has been little analysis of whether these requirements reduce voter participation, especially among certain classes of voters. In this paper we document the effect of voter identification requirements on registered voters as they were imposed in states in the 2000 and 2004 presidential elections, and in the 2002 and 2006 midterm elections.

The ThreeBallot Voting System

Working Paper No.: 
56
Date Published: 
11/30/2008
Author(s): 
Ronald L. Rivest
We present a new paper-based voting method with interesting security properties. The attempt here is to see if one can achieve the same security properties of recently proposed cryptographic voting protocols, but without using any cryptography, using only paper ballots. We partially succeed. (Initially, I thought the proposal accomplished this goal, but several readers discovered a vote-buying attack (see Section 4.4) that appears to be rather difficult to fix without making the resulting system much less usable in practice.

On Auditing Elections When Precincts Have Different Sizes

Working Paper No.: 
55
Date Published: 
11/30/2008
Author(s): 
Ronald L. Rivest
We address the problem of auditing an election when precincts may have different sizes, and suggest methods for picking a sample of precincts to audit that takes precinct size into account. one method yields optimal auditing strategies together with an exact measure of its effectiveness (probability of detecting corruption of a given size).

On Estimating the Size and Confidence of a Statistical Audit

Working Paper No.: 
54
Date Published: 
11/30/2008
Author(s): 
Javed A. Aslam
Ronald L. Rivest
We consider the problem of statistical sampling for auditing elections, and we develop a remarkably simple and easily-calculated upper bound for the sample size necessary for determining with probability at least c whether a given set of n objects contains b or more “bad” objects. While the size of the optimal sample drawn without replacement can be determined with a computer program, our goal is to derive a highly accurate and simple formula that can be used by election officials equipped with only a simple calculator.

Military Voting and the Law: Procedural and Technological Solutions to the Ballot Transit Problem

Working Paper No.: 
53
Date Published: 
11/30/2008
Author(s): 
Brian F. Roberts
Thad E. Hall
R. Michael Alvarez
No abstract available.

Advances in Cryptographic Voting Systems

Working Paper No.: 
51
Date Published: 
11/30/2008
Author(s): 
Ben Adida
Democracy depends on the proper administration of popular elections. Voters should receive assurance that their intent was correctly captured and that all eligible votes were correctly tallied. The election system as a whole should ensure that voter coercion is unlikely, even when voters are willing to be influenced. These conflicting requirements present a significant challenge: how can voters receive enough assurance to trust the election result, but not so much that they can prove to a potential coercer how they voted?

Pages