Knowledge

ThreeBallot

Source 📝

410:
on ballots with just 11 to 17 questions. This likely allows a voter's votes to be known by anyone with the receipt. Moreover, even without a receipt, it leaks information that could discredit a voter's claimed candidate selections. Consequently, a voter conspiring to prove their vote (for money, coercion, or posterity) could mark all the ballots in a previously agreed unusual pattern that could later prove to a third party whether the agreement was kept (even without seeing the receipt). In either case, the veil of the secret ballot is pierced and traceable to the ID number on the receipt.
373:
for John and Barb above. Each of them has an "X", but the voter is actually voting for John and not Barb. Likewise if you saw just the second column ballot, it only shows a mark for Bill, but again the overall vote by the three ballots together is actually for John. When all 3 ballots are summed, the totals will show 2 marks for John and 1 mark each for Barb and Bill. Subtracting the number of voters, in this case 1, produces 1 vote for John and none for the others.
53:. ThreeBallot attempts to solve this problem by giving each voter three ballots: one verifiable, and two anonymous. The voter chooses which ballot is verifiable and keeps this secret; since the vote-counter does not know, there is a 1/3 chance of being discovered destroying or altering any single ballot. The voter is forced to make two of their three ballots cancel each other out, so that they can only vote once. 384:, each voter may verify that his votes were counted by searching for the identifier on his receipt amongst the published ballots. However, because the voter selects which of his ballots he receives as a receipt, he can arrange for his receipt to bear any combination of markings. Thus voters cannot prove to another party who they voted for, eliminating vote selling, coercion, etc. using this receipt. 67: 423:
scheme, the proliferation of receipts (one per row) and chopped ballots rendered the mechanics of processing the votes or for a voter reviewing a receipt significantly complex, thus undermining its intended simplicity. An electronic version addressing the paper-ballot implementation and usability problems was proposed by Costa, et al.
20: 409:
race can be rejected. Since there are exponentially more possible vote patterns than there are ballots cast in a typical precinct (or even people in the world), statistically most of the ballots cast can be trined uniquely for sufficiently long ballots. Typically, 90% of ballots can be reconstructed
422:
schema in his final publication to require tearing off each row (each yes/no) individually (destroying the correlation of the questions) and also having unique tracking numbers on each mark on each ballot (not just one ID for each column ballot). While this did restore the unbreakable aspect of the
372:
Typically, the ballots might be co-joined to simplify the marking by the voter, but before they are cast, it is imperative that the ballots be separated. Once separated and combined with other ballots in scrambled order, the true vote is encrypted. For example, consider just the third-column ballot
376:
At the polling station, the voter makes a copy of any one of his three ballots including its ID number. In practice, the machine verifying the ballots would perform this task automatically based on the voter's free choice of one of the ballots. Then, all three original ballots are dropped into the
400:
The encryption system used in the ThreeBallot was broken by a correlation attack devised by Charlie Strauss, who also showed how it could be used to prove how you voted. While the ThreeBallot is secure if there is only one yes/no question on the ballot, Strauss observed that it is not secure when
387:
There is no indication on the ballots themselves which one was copied to make a receipt. Thus if at some point a ballot were "lost" or maliciously discarded, there is a 1/3 chance that this would be the receipt ballot. A vigilant voter could detect this loss.
287:
the candidate or not. While this also means that every candidate gets at least one vote when the three ballots are summed, this constant offset for all the candidates (equal to the number of voters) can be subtracted from the final total of all the ballots.
391:
Rivest discusses other benefits and flaws in his article. In particular, it is not suited for ranked preference voting. A field test has found ThreeBallot to have significant privacy, security, and usability problems, as well as implementation pitfalls.
401:
there are multiple questions, including the case of a single race with many candidates from which to choose. His attack exploited the fact that not every combination of 3 ballots forms a valid triple: proposed triples with 3 or 0 votes cast in
368:
vote once cast, so this multiple-vote fraud could not be detected until the final tally verification (and maybe not even then), and it cannot be corrected at that point or even traced to a specific voter.
291:
However, it is imperative to verify that the voter did not mismark their ballot – no candidate can be left blank on all 3 ballots, and no candidate can be selected on all three ballots:
405:
row on the ballot (not just one race of interest) can be rejected, since those ballots could not be from the same voter. Likewise, proposed trines resulting in a vote for more than one candidate in
352:
This requirement means all three ballots must be inserted into a machine to validate this before the 3-ballot vote is cast. Failure to do so would enable a voter to both cast an extra vote
171:
Each voter can verify that his vote was not discarded and was correctly used and not altered in the computation of the election result. (And if not, the voter is in a position to
42:
that can in principle be implemented on paper. The goal in its design was to provide some of the benefits of a cryptographic voting system without using cryptographic keys.
23:
A sample ThreeBallot multi-ballot, with a first race for President with candidates Jones, Smith, and Wu and a second race for Senator with candidates Yip and Zinn.
194:
In the ThreeBallot voting system, voters are given three blank ballots, identical except for a unique identifier that is distinct for each ballot. To vote
39: 114: 92: 88: 710: 577: 202:
a candidate (the equivalent of leaving a ballot blank in other systems), the voter must select that candidate on
77: 659:
Costa, R. G.; Santin, A. O.; Maziero, C. A. (2008). "A Three Ballot Based Secure Electronic Voting System".
527: 458: 96: 81: 668: 624:
Henry, K.; Stinson, D. R.; Sui, J. (2009). "The effectiveness of receipt-based attacks on threeballot".
594: 544: 502: 475: 419: 138:
The ballots can be counted directly, without decryption. This is because they have the property that
35: 673: 715: 686: 641: 127:
The crucial advantages that the ThreeBallot system offers over comparable, ciphered ballots are:
142:, even though any individual ballot section cannot reveal the candidate preference of the voter. 381: 150: 678: 633: 185:
and requires primarily low-tech devices, but is compatible with more advanced technologies.
607: 557: 488: 432: 209:
Thus every candidate gets at least one ballot with a mark and one ballot without a mark:
198:
a candidate, the voter must select that candidate on two of the three ballots. To vote
156:
While it requires a machine to validate the ballots before depositing them, afterwards
135:, compared to other encryption systems (arguably, the most important advantage of all). 704: 160:
and requires no additional security process beyond that afforded traditional ballots.
645: 690: 418:
Rivest later acknowledged this logic error in the original concept and revised the
66: 46: 380:
At the end of the election, all ballots are published. Since each ballot has a
637: 31: 506: 50: 283:
As a result, seeing any one ballot does not tell whether the voter voted
682: 19: 182: 178:
Everybody can verify that the election result was computed correctly.
168:
Each voter's vote is secret, preventing vote-selling and coercion.
18: 140:
the sum of the marks is the sum of the votes for the candidate
60: 626:
IEEE Transactions on Information Forensics and Security
377:
ballot box. The voter keeps the one copy as a receipt.
133:
familiarly looking and simple for voters to understand
501:
Jones, Harvey; Jason Juang, and Greg Belote (2006). "
248:Any two columns marked indicates a "for" vote. 263:Any single column marked is not a "for" vote. 164:Additional theoretical system goals include: 8: 16:End-to-end auditable anonymous voting system 95:. Unsourced material may be challenged and 181:The method is designed for use with paper 147:no key that requires protection or secrecy 45:It may be difficult for a vote to be both 672: 505:", 6.857 class project, MIT. Reported in 115:Learn how and when to remove this message 294: 211: 40:end-to-end (E2E) auditable voting system 619: 617: 444: 603: 592: 553: 542: 484: 473: 158:the ballot record is entirely on paper 571: 569: 567: 521: 519: 517: 515: 452: 450: 448: 364:vote cannot be distinguished from an 360:, allowing voter fraud; by design, a 7: 661:IEEE Security & Privacy Magazine 507:"ThreeBallot" tested by MIT students 149:in order to maintain security (the " 93:adding citations to reliable sources 14: 578:"The Trouble with Triples Part 2" 528:"The Trouble with Triples Part 1" 30:is a voting protocol invented by 175:that the vote counters cheated.) 65: 459:"The ThreeBallot Voting System" 576:Charlie E. M. Strauss (2006). 526:Charlie E. M. Strauss (2006). 1: 153:" of many proposed systems). 38:in 2006. ThreeBallot is an 732: 638:10.1109/TIFS.2009.2031914 503:Three Ballot in the Field 457:Ronald L. Rivest (2006). 303: 300: 297: 220: 217: 214: 602:Cite journal requires 552:Cite journal requires 483:Cite journal requires 131:Its implementation is 24: 22: 89:improve this section 683:10.1109/msp.2008.56 414:Revised ThreeBallot 356:and an extra vote 25: 711:Electoral systems 396:Broken encryption 382:unique identifier 350: 349: 281: 280: 125: 124: 117: 723: 695: 694: 676: 656: 650: 649: 621: 612: 611: 605: 600: 598: 590: 588: 587: 582: 573: 562: 561: 555: 550: 548: 540: 538: 537: 532: 523: 510: 509:, December 2006. 499: 493: 492: 486: 481: 479: 471: 469: 468: 463: 454: 295: 212: 120: 113: 109: 106: 100: 69: 61: 731: 730: 726: 725: 724: 722: 721: 720: 701: 700: 699: 698: 674:10.1.1.180.4126 658: 657: 653: 623: 622: 615: 601: 591: 585: 583: 580: 575: 574: 565: 551: 541: 535: 533: 530: 525: 524: 513: 500: 496: 482: 472: 466: 464: 461: 456: 455: 446: 441: 433:Electoral fraud 429: 416: 398: 192: 121: 110: 104: 101: 86: 70: 59: 36:Warren D. Smith 17: 12: 11: 5: 729: 727: 719: 718: 713: 703: 702: 697: 696: 651: 632:(4): 699–707. 613: 604:|journal= 563: 554:|journal= 511: 494: 485:|journal= 443: 442: 440: 437: 436: 435: 428: 425: 415: 412: 397: 394: 348: 347: 344: 342: 340: 338: 334: 333: 330: 327: 324: 321: 317: 316: 313: 310: 306: 305: 302: 299: 279: 278: 276: 274: 271: 269: 265: 264: 261: 258: 256: 254: 250: 249: 246: 243: 241: 238: 234: 233: 230: 227: 223: 222: 219: 216: 191: 188: 187: 186: 179: 176: 169: 162: 161: 154: 151:Achilles' heel 143: 136: 123: 122: 73: 71: 64: 58: 55: 15: 13: 10: 9: 6: 4: 3: 2: 728: 717: 714: 712: 709: 708: 706: 692: 688: 684: 680: 675: 670: 666: 662: 655: 652: 647: 643: 639: 635: 631: 627: 620: 618: 614: 609: 596: 579: 572: 570: 568: 564: 559: 546: 529: 522: 520: 518: 516: 512: 508: 504: 498: 495: 490: 477: 460: 453: 451: 449: 445: 438: 434: 431: 430: 426: 424: 421: 413: 411: 408: 404: 395: 393: 389: 385: 383: 378: 374: 370: 367: 363: 359: 355: 346:Not allowed. 345: 343: 341: 339: 336: 335: 332:Not allowed. 331: 328: 325: 322: 319: 318: 314: 311: 308: 307: 296: 293: 289: 286: 277: 275: 272: 270: 267: 266: 262: 259: 257: 255: 252: 251: 247: 244: 242: 239: 236: 235: 231: 228: 225: 224: 213: 210: 207: 205: 201: 197: 189: 184: 180: 177: 174: 170: 167: 166: 165: 159: 155: 152: 148: 144: 141: 137: 134: 130: 129: 128: 119: 116: 108: 98: 94: 90: 84: 83: 79: 74:This section 72: 68: 63: 62: 56: 54: 52: 48: 43: 41: 37: 33: 29: 21: 667:(3): 14–21. 664: 660: 654: 629: 625: 595:cite journal 584:. Retrieved 545:cite journal 534:. Retrieved 497: 476:cite journal 465:. Retrieved 417: 406: 402: 399: 390: 386: 379: 375: 371: 365: 361: 357: 353: 351: 290: 284: 282: 208: 203: 199: 195: 193: 172: 163: 157: 146: 139: 132: 126: 111: 102: 87:Please help 75: 44: 27: 26: 204:exactly one 28:ThreeBallot 705:Categories 586:2015-04-16 536:2015-04-16 467:2007-01-16 439:References 337:Elle Error 105:April 2022 47:verifiable 32:Ron Rivest 716:Elections 669:CiteSeerX 320:Andy Oops 298:Candidate 215:Candidate 145:There is 76:does not 51:anonymous 646:10717380 427:See also 268:Bill Too 253:Barb Bar 237:John Foo 206:ballot. 691:5959774 366:against 358:against 200:against 183:ballots 97:removed 82:sources 689:  671:  644:  304:Notes 301:Ballot 221:Notes 218:Ballot 190:Method 687:S2CID 642:S2CID 581:(PDF) 531:(PDF) 462:(PDF) 173:prove 57:Goals 608:help 558:help 489:help 80:any 78:cite 49:and 34:and 679:doi 634:doi 420:RFC 407:any 403:any 362:for 354:for 285:for 196:for 91:by 707:: 685:. 677:. 663:. 640:. 628:. 616:^ 599:: 597:}} 593:{{ 566:^ 549:: 547:}} 543:{{ 514:^ 480:: 478:}} 474:{{ 447:^ 315:3 232:3 693:. 681:: 665:6 648:. 636:: 630:4 610:) 606:( 589:. 560:) 556:( 539:. 491:) 487:( 470:. 329:X 326:X 323:X 312:2 309:1 273:X 260:X 245:X 240:X 229:2 226:1 118:) 112:( 107:) 103:( 99:. 85:.

Index


Ron Rivest
Warren D. Smith
end-to-end (E2E) auditable voting system
verifiable
anonymous

cite
sources
improve this section
adding citations to reliable sources
removed
Learn how and when to remove this message
Achilles' heel
ballots
unique identifier
RFC
Electoral fraud



"The ThreeBallot Voting System"
cite journal
help
Three Ballot in the Field
"ThreeBallot" tested by MIT students



Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.