Browse Content

Use this page to browse all content from the Voting Technology Project, sorted by last updated.

Application of Lean Management Principles to Election Systems

Working Paper No.: 
42
Date Published: 
01/31/2006
Author(s): 
Tomer Posner
No abstract or file available.Lean was first adopted as a management technique for improving results in manufacturing environments. It is based on the 5 principles of identifying the Value to be created, mapping the Value-Stream (incremental addition of value), ensuring process Flow, orienting the process towards the Pull of the customer and finally eliminating all Waste through a process of continuous improvement. This framework is highly adaptable, and has been applied in recent years to non-manufacturing efforts, such as product development and the retail and service industries.

Encrypted Receipts for Voter-Verified Elections Using Homomorphic Encryption

Working Paper No.: 
41
Date Published: 
11/30/2008
Author(s): 
Joy Forsythe
Voters are now demanding the ability to verify that their votes are cast and counted as intended. Most existing cryptographic election protocols do not treat the voter as a computationally-limited entity separate from the voting booth, and therefore do not ensure that the voting booth records the correct vote. David Chaum and Andrew Neff have proposed mixnet schemes that do provide this assurance, but little research has been done that combines voter verification with homomorphic encryption.

Essays on causal inference and political representation

Date Published: 
05/31/2007
Author(s): 
Delia Bailey
No abstract or file available.

Political Networks: When a Democrat Votes Republican"

Date Published: 
05/31/2007
Author(s): 
Betsy Sinclair
No abstract or file available.

Verifying Secret-Ballot Elections with Cryptography

Date Published: 
11/30/2008
Author(s): 
Ben Adida
No abstract or file available.

Auditing Technology for Electronic Voting Machines

Date Published: 
11/30/2008
Author(s): 
Sharon Cohen
Direct Recording Electronic (DRE) voting machine security has been a significant topic of contention ever since Diebold voting machine code turned up on a public internet site in 2003 and computer scientists at Johns Hopkins University declared the machine “unsuitable for use in a general election.” Since then, many people from computer scientists to politicians have begun to insist that DREs be equipped with a paper trail. A paper trail provides a paper printout for the voter to approve at the end of each voting session.

Encrypted Receipts for Voter-Verified Elections Using Homomorphic Encryption

Date Published: 
11/30/2008
Author(s): 
Joy Forsythe
Voters are now demanding the ability to verify that their votes are cast and counted as intended. Most existing cryptographic election protocols do not treat the voter as a computationally-limited entity separate from the voting booth, and therefore do not ensure that the voting booth records the correct vote. David Chaum and Andrew Neff have proposed mixnet schemes that do provide this assurance, but little research has been done that combines voter verification with homomorphic encryption.

Application of Lean Management Principles to Election Systems

Date Published: 
11/30/2008
Author(s): 
Tomer Posner
No abstract or file available.Lean was first adopted as a management technique for improving results in manufacturing environments. It is based on the 5 principles of identifying the Value to be created, mapping the Value-Stream (incremental addition of value), ensuring process Flow, orienting the process towards the Pull of the customer and finally eliminating all Waste through a process of continuous improvement. This framework is highly adaptable, and has been applied in recent years to non-manufacturing efforts, such as product development and the retail and service industries.

An N-Version Electronic Voting System

Date Published: 
11/30/2008
Author(s): 
Soyini D. Liburd
The ballot battles of the 2000 US Presidential Election clearly indicate that existing voting technologies and processes are not sufficient to guarantee that every eligible voter is granted their right to vote and implicitly to have that vote counted, as per the fifteenth, nineteenth, twenty fourth and twenty sixth amendments to the US constitution. Developing a voting system that is secure, correct, reliable and trustworthy is a significant challenge to current technology.

Potential Threats to Statewide Voter Registration Systems

Working Paper No.: 
40
Date Published: 
11/30/2008
Author(s): 
R. Michael Alvarez
No abstract available.

Pages