Skip to main content

BatchVote: Voting Rules Designed for Auditability

  • Conference paper
  • First Online:
Financial Cryptography and Data Security (FC 2017)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10323))

Included in the following conference series:

  • 4377 Accesses

Abstract

We propose a family of novel social choice functions. Our goal is to explore social choice functions for which ease of auditing is a primary design goal, instead of being ignored or left as a puzzle to solve later.

Our proposal, “BatchVote,” creates a social choice function f from an arbitrary “inner” social choice function g, such as instant-runoff voting (IRV), and an integer B, the number of batches.

We aim to preserve flexibility by allowing g to be arbitrary, while providing the ease of auditing of a plurality election.

To compute the winner of an election of n votes, the social choice function f partitions the votes into B batches of roughly the same size, pseudorandomly. The social choice function g is applied to each batch. The election winner, according to f, is the weighted plurality winner for the B outcomes, where the weight of each batch is the number of votes it contains. The social choice function f may be viewed as an “interpolation” between plurality (which is easily auditable) and g (which need not be).

Auditing is simple by design: we can view f as being a (weighted) plurality election by Bsupervoters,” where the bth supervoter’s vote is determined by applying g to the votes in batch b, and the weight of her vote is the number of votes in her batch. Since plurality elections are easy to audit, the election output can be audited by checking a random sample of “supervotes” against the corresponding paper records.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    https://en.wikipedia.org/wiki/Voting_system.

  2. 2.

    The GitHub repo is https://github.com/ron-rivest/2016-batchvote-code. This is currently private, but will be made public.

  3. 3.

    Real data sets available at: http://rangevoting.org/TidemanData.html.

References

  1. Benaloh, J., Jones, D., Lazarus, E., Lindeman, M., Stark, P.B.: SOBA: secrecy-preserving observable ballot-level audit. In: Proceedings of 2011 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections (EVT/WOTE 2011), (2011). http://static.usenix.org/events/evtwote11/tech/final_files/Benaloh.pdf

  2. Bretschneider, J., Flaherty, S., Goodman, S., Halvorson, M., Johnston, R., Lindeman, M., Rivest, R.L., Smith, P., Stark, P.B.: Risk-limiting post-election audits: why and how? (ver. 1.1), October 2012. http://people.csail.mit.edu/rivest/pubs.html#RLAWG12

  3. Checkoway, S., Sarwate, A., Shacham, H.: Single-ballot risk-limiting audits using convex optimization. In: Jones, D., Quisquater, J.-J., Rescorla, E. (eds.) Proceedings of 2010 EVT/WOTE Conference. USENIX/ACCURATE/IAVoSS, August 2010

    Google Scholar 

  4. Faliszewski, P., Hemaspaandra, E., Hemaspaandra, L.A.: Using complexity to protect elections. CACM 53(11), 74–82 (2010)

    Article  Google Scholar 

  5. Hall, J.L., Miratrix, L.W., Stark, P.B., Briones, M., Ginnold, E., Oakley, F., Peaden, M., Pellerin, G., Stanionis, T., Webber. T.: Implementing risk-limiting post-election audits in California. In: Proceedings of 2009 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections (EVT/WOTE 2009, Montreal, Canada). USENIX, August 2009. http://www.usenix.org/event/evtwote09/tech/full_papers/hall.pdf

  6. Johnson, K.: Election verification by statistical audit of voter-verified paper ballots. http://ssrn.com/abstract=640943. Accessed 31 Oct 2004

  7. Lindeman, M., Halvorseon, M., Smith, P., Garland, L., Addona, V., McCrea, D.: Principle and best practices for post-election audits (2008). www.electionaudits.org/files/best%20practices%20final_0.pdf

  8. Lindeman, M., Stark, P.B.: A gentle introduction to risk-limiting audits. IEEE Secur. Priv. 10, 42–49 (2012)

    Article  Google Scholar 

  9. Lindeman, M., Stark, P.B., Yates, V.S.: BRAVO: ballot-polling risk-limiting audits to verify outcomes. In: Halderman, A., Pereira, O. (eds.) Proceedings of 2012 EVT/WOTE Conference (2012)

    Google Scholar 

  10. Norden, L., Burstein, A., Hall, J.L., Chen, M.: Post-election audits: restoring trust in elections. Technical report, Brennan Center for Justice and Samuelson Law, Technology & Public Policy Clinic (2007)

    Google Scholar 

  11. California Secretary of State. Post-election risk-limiting audit pilot program (2011–2013). http://www.sos.ca.gov/elections/voting-systems/oversight/post-election-auditing-regulations-and-reports/post-election-risk-limiting-audit-pilot-program/

  12. Sarwate, A.D., Checkoway, S., Shacham, H.: Risk-limiting audits and the margin of victory in nonplurality elections. Polit. Policy 3(3), 29–64 (2013)

    Google Scholar 

  13. Schulze, M.: A new monotonic, clone-independent, reversal symmetric, and condorcet-consistent single-winner election method. Soc. Choice Welf. 36(2), 267–303 (2011)

    Article  MathSciNet  MATH  Google Scholar 

  14. Stark, P.B.: Risk-limiting vote-tabulation audits: the importance of cluster size. Chance 23(3), 9–12 (2010)

    Article  Google Scholar 

  15. Stark, P.B., Wagner, D.A.: Evidence-based elections. IEEE Secur. Priv. 10(05), 33–41 (2012)

    Article  Google Scholar 

  16. Stark, P.B.: Conservative statistical post-election audits. Ann. Appl. Stat. 2, 550–581 (2008)

    Article  MathSciNet  MATH  Google Scholar 

  17. Stark, P.B.: A sharper discrepancy measure for post-election audits. Ann. Appl. Stat. 2, 982–985 (2008)

    Article  MathSciNet  MATH  Google Scholar 

  18. Stark, P.B.: Auditing a collection of races simultaneously (2009). https://arxiv.org/abs/0905.1422v1

  19. Stark, P.B.: CAST: canvass audits by sampling and testing. IEEE Trans. Inf. Forensics Secur. 4(4), 708–717 (2009)

    Article  Google Scholar 

  20. Stark, P.B.: Efficient post-election audits of multiple contests: 2009 California tests. In: 2009 Conference on Empirical Legal Studies (2009). http://ssrn.com/abstracts=1443314

  21. Stark, P.B.: Risk-limiting post-election audits: P-values from common probability inequalities. IEEE Trans. Inf. Forensics Secur. 4, 1005–1014 (2009)

    Article  Google Scholar 

  22. Stark, P.B.: Super-simple simultaneous single-ballot risk-limiting audits. In: Proceedings of 2010 EVT/WOTE Workshop (2010). http://www.usenix.org/events/evtwote10/tech/full_papers/Stark.pdf

  23. Stark, P.B.: Tools for comparison risk-limiting election audits (2015). http://www.stat.berkeley.edu/~stark/Vote/auditTools.htm

  24. Stark, P.B., Teague, V.: Verifiable European elections: risk-limiting audits for D’Hondt and its relatives. USENIX J. Elect. Technol. Syst. (JETS) 1(3), 18–39 (2014)

    Google Scholar 

  25. Tideman, T.N.: Independence of clones as a criterion for voting rules. Soc. Choice Welf. 4(3), 185–206 (1987)

    Article  MathSciNet  MATH  Google Scholar 

  26. Wald, A.: Sequential tests of statistical hypotheses. Ann. Math. Stat. 16(2), 117–186 (1945)

    Article  MathSciNet  MATH  Google Scholar 

  27. Wald, A.: Sequential Analysis. Dover, Mineola (2004)

    MATH  Google Scholar 

  28. Wikipedia: Voting system. https://en.wikipedia.org/wiki/Voting_system

  29. Xia, L.: Computing the margin of victory for various voting rules. In: Proceedings of 13th ACM Conference on Electronic Commerce (EC-2012) (2012)

    Google Scholar 

Download references

Acknowledgments

Ronald L. Rivest gratefully acknowledges support for his work on this project received from the Center for Science of Information (CSoI), an NSF Science and Technology Center, under grant agreement CCF-0939370, and from the Department of Statistics, University of California, Berkeley, which hosted his sabbatical visit when this work began.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ronald L. Rivest .

Editor information

Editors and Affiliations

Appendices

Appendix A. Possible Details of Batch Assignment Method

We illustrate the proposed procedure with an example. Suppose the random seed K is the string of 24 decimal digits

$$ K = \texttt {067541877022641091953584} $$

and suppose that a ballot has the 37-character ballot ID

$$ \text {ID} = \texttt {2016-11-08-maricopa-az-1562-7631-5515} . $$

Then the batch to which this ballot is assigned is starting with the concatenation of these two strings—that is:

$$ K || ID = \texttt {0675418770226410919535842016-11-08-maricopa-az-1562-7631-5515} . $$

Applying SHA256 to this byte string yields the hexadecimal result

$$ \texttt {db5d8603dcf6e4e122e7b0ff231d4069cb4626f45ab1686cb1b6dd9d424480d9} $$

which, when interpreted as a base-16 integer, yields

$$ \texttt {99221755554920309225844359348330608520995333449296550547451312649783275192537} $$

(decimal). Finally, we take the result modulo B, the number of batches, and add one. Suppose \(B=10000\). Then the batch number for this ballot is

$$ \texttt {2538}\ . $$

Because the result is obtained modulo B, plus one, the batches are numbered 1 to B, inclusive.

Appendix B. Guidelines for Breaking Ties

We provide each of the B invocations of g with its own random number seed to use in tie-breaking. Suppose the overall election-random seed is

$$ \texttt {067541877022641091953584}. $$

Suppose we wish to provide the 15th invocation of g with its own tie-breaking seed. Then the tie-breaking seed \(K^{(b)}\) provided will be

$$ K^{(b)} = \texttt {067541877022641091953584:batch:15}. $$

That is, the overall election seed, followed by “:batch:”, followed by the batch number b in decimal, for \(b=1, 2, \ldots , B\). This seed can be concatenated with other values within g to break ties, and then SHA256 may be applied to the result.

Of course, the specification of g needs to clearly specify how ties are to be broken, given the tie-breaking seed \(K^{(b)}\). (We have, for example, python code that illustrates this for various social choice functions g.)

Each instance of g receives a different tie-breaking seed \(K^{(b)}\), to remove the possibility of obviously correlated tie-breaking between the various batches. Although the seeds for different batches are related, they are nonetheless different, and the pseudo-random character of SHA256 makes it computationally infeasible to find statistical correlations in their tie-breaking use.

Notation

This note summarizes notational conventions we use in this paper.

  • B Number of batches.

  • b A particular batch. \(b = 1, 2, \ldots , B\).

  • \(\mathcal {C}\) The set of candidates.

  • C Number of candidates (possible election outcomes.

  • c A particular candidate. (Also w, \(\ell \) sometimes, for winner, loser.)

  • n Number of cast votes.

  • T Replication factor; how many times each vote is replicated.

  • N Number of ballots being tabulated; \(N = nT\).

  • \(N^{(b)}\) Number of ballots in batch b (so \(\sum _b N^{(b)} = N\)).

  • \(\lambda \) Average batch size (\(\lambda = N/B\)).

  • \(R_c\) Total reported tabulation in favor of candidate c. (i.e. electronic tabulation)

  • \(A_c\) Total actual tabulation in favor of candidate c (i.e. paper ballot tabulation)

  • \(R_c^{(b)}\) Reported tabulation for candidate c in batch b (Either \(N^{(b)}\) or 0).

  • \(A_c^{(b)}\) Actual tabulation for candidate c in batch b. (Either \(N^{(b)}\) or 0).

  • \(R_{w\ell }\) Reported margin of candidate w over candidate \(\ell \) (\(R_{w\ell } = R_w - R_\ell \)).

  • \(A_{w\ell }\) Actual margin of candidate w over candidate \(\ell \) (\(A_{w\ell } = A_w - A_\ell \)).

  • \(R_{w\ell }^{(b)}, A_{w\ell }^{(b)}\) Margins particularized to batch b.

  • \(t^{(b)}\) True winner of batch b.

  • \(w^{(b)}\) Reported winner of batch b.

  • K Random number seed for the election.

  • \(K^{(b)}\) Random number seed for batch b.

  • \(\mathbb B\) A randomly selected batch, with \(\Pr \{\mathbb B= b\} = N^{(b)}/N\).

Rights and permissions

Reprints and permissions

Copyright information

© 2017 International Financial Cryptography Association

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Rivest, R.L., Stark, P.B., Perumal, Z. (2017). BatchVote: Voting Rules Designed for Auditability. In: Brenner, M., et al. Financial Cryptography and Data Security. FC 2017. Lecture Notes in Computer Science(), vol 10323. Springer, Cham. https://doi.org/10.1007/978-3-319-70278-0_20

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-70278-0_20

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-70277-3

  • Online ISBN: 978-3-319-70278-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics