Abstract
We present a method and software for ballot-polling risk-limiting audits (RLAs) based on Bernoulli sampling: ballots are included in the sample with probability p, independently. Bernoulli sampling has several advantages: (1) it does not require a ballot manifest; (2) it can be conducted independently at different locations, rather than requiring a central authority to select the sample from the whole population of cast ballots or requiring stratified sampling; (3) it can start in polling places on election night, before margins are known. If the reported margins for the 2016 U.S. Presidential election are correct, a Bernoulli ballot-polling audit with a risk limit of 5% and a sampling rate of \(p_0=1\%\) would have had at least a 99% probability of confirming the outcome in 42 states. (The other states were more likely to have needed to examine additional ballots). Logistical and security advantages that auditing in the polling place affords may outweigh the cost of examining more ballots than some other methods might require.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
The current method uses the reported results to construct the alternative hypothesis. A variant of the method does not require the reported results. We do not present that method here; it is related to ClipAudit (Rivest 2017).
- 2.
The same general approach works for some preferential voting schemes, such as Borda count and range voting, and for proportional representation schemes such as D’Hondt (Stark and Teague 2014). We do not consider instant-runoff voting (IRV).
- 3.
For instance, for a majority contest, one simply pools the votes for all the reported losers into a single “pseudo-candidate” who reportedly lost.
- 4.
The alternative hypothesis is that the reported results are correct; as mentioned above, there are other approaches one could use that do not involve the reported results, but we do not present them here.
- 5.
Once ballots are aggregated in a precinct or scanned centrally, it is unlikely that they will stay in the same order.
- 6.
The distribution of the sample size is skewed to the right: the expected sample size is generally larger than the median sample size.
- 7.
http://openelections.net/, last visited 8/5/19.
References
Aslam, J.A., Popa, R.A., Rivest, R.L.: On auditing elections when precincts have different sizes. In: 2008 USENIX/ACCURATE Electronic Voting Technology Workshop, San Jose, CA, 28–29 July 2008
Blaze, M., Braun, J., Hursti, H., Lorenzo Hall, J., MacAlpine, M., Moss, J.: DEFCON 25 Voting Village Report, September 2017. https://www.defcon.org/images/defcon-25/DEF%20CON%2025%20voting%20village%20report.pdf
Blaze, M., Braun, J., Hursti, H., Jefferson, D., MacAlpine, M., Moss, J.: DEFCON 26 Voting Village Report, September 2018. https://www.defcon.org/images/defcon-26/DEF%20CON%2026%20voting%20village%20report.pdf
Bowen, D.: Top-to-bottom review of voting machines certified for use in California. Technical report, California Secretary of State (2007). https://www.sos.ca.gov/elections/voting-systems/oversight/top-bottom-review/
Cochran, W.G.: Sampling Techniques, 3rd edn. Wiley, Hoboken (1977)
Lindeman, M., Stark, P.B.: A gentle introduction to risk-limiting audits. IEEE Secur. Priv. 10, 42–49 (2012)
Lindeman, M., Stark, P.B., Yates, V.: BRAVO: ballot-polling risk-limiting audits to verify outcomes. In: 2011 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections (EVT/WOTE 2012). USENIX (2012)
Lindeman, M., McBurnett, N., Ottoboni, K., Stark, P.B.: Next steps for the colorado risk-limiting audit (CORLA) program, March 2018. https://arxiv.org/pdf/1803.00698.pdf
Lohr, S.: Sampling: Design and Analysis. Nelson Education, Toronto (2009)
McDaniel, P., Blaze, M., Vigna, G.: EVEREST: evaluation and validation of election-related equipment, standards and testing. Technical report, Ohio Secretary of State (2007). http://siis.cse.psu.edu/everest.html
Ottoboni, K., Stark, P.B., Lindeman, M., McBurnett, N.: Risk-limiting audits by stratified union-intersection tests of elections (SUITE). In: Krimmer, R., et al. (eds.) E-Vote-ID 2018. LNCS, vol. 11143, pp. 174–188. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-00419-4_12
Panel on Nonstandard Mixtures of Distributions: Statistical Models and Analysis in Auditing: A Study of Statistical Models and Methods for Analyzing Nonstandard Mixtures of Distributions in Auditing. National Academy Press, Washington, D.C. (1988)
Rivest, R.L.: ClipAudit: a simple risk-limiting post-election audit (2017). https://arxiv.org/abs/1701.08312
Särndal, C.-E., Swensson, B., Wretman, J.: Model Assisted Survey Sampling. Springer Series in Statistics. Springer, New York (2003)
Stark, P.B.: Conservative statistical post-election audits. Ann. Appl. Stat. 2(2), 550–581 (2008)
Stark, P.B., Teague, V.: Verifiable European elections: risk-limiting audits for D’Hondt and its relatives. JETS USENIX J. Election Technol. Syst. 3(1), 18–39 (2014)
Thompson, M.: Theory of Sample Surveys, Monographs on Statistics and Applied Probability, vol. 74. Chapman & Hall, London (1997)
U.S. Senate Select Committee on Intelligence: Russian targeting of election infrastructure during the 2016 election: Summary of initial findings and recommendations, May 2018. www.burr.senate.gov/imo/media/doc/RussRptInstlmt1-%20ElecSec%20Findings,Recs2.pdf
Wald, A.: Sequential tests of statistical hypotheses. Ann. Math. Stat. 16, 117–186 (1945)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 International Financial Cryptography Association
About this paper
Cite this paper
Ottoboni, K., Bernhard, M., Halderman, J.A., Rivest, R.L., Stark, P.B. (2020). Bernoulli Ballot Polling: A Manifest Improvement for Risk-Limiting Audits. In: Bracciali, A., Clark, J., Pintore, F., Rønne, P., Sala, M. (eds) Financial Cryptography and Data Security. FC 2019. Lecture Notes in Computer Science(), vol 11599. Springer, Cham. https://doi.org/10.1007/978-3-030-43725-1_16
Download citation
DOI: https://doi.org/10.1007/978-3-030-43725-1_16
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-43724-4
Online ISBN: 978-3-030-43725-1
eBook Packages: Computer ScienceComputer Science (R0)