Abstract
We propose a family of novel social choice functions. Our goal is to explore social choice functions for which ease of auditing is a primary design goal, instead of being ignored or left as a puzzle to solve later.
Our proposal, “BatchVote,” creates a social choice function f from an arbitrary “inner” social choice function g, such as instant-runoff voting (IRV), and an integer B, the number of batches.
We aim to preserve flexibility by allowing g to be arbitrary, while providing the ease of auditing of a plurality election.
To compute the winner of an election of n votes, the social choice function f partitions the votes into B batches of roughly the same size, pseudorandomly. The social choice function g is applied to each batch. The election winner, according to f, is the weighted plurality winner for the B outcomes, where the weight of each batch is the number of votes it contains. The social choice function f may be viewed as an “interpolation” between plurality (which is easily auditable) and g (which need not be).
Auditing is simple by design: we can view f as being a (weighted) plurality election by B “supervoters,” where the bth supervoter’s vote is determined by applying g to the votes in batch b, and the weight of her vote is the number of votes in her batch. Since plurality elections are easy to audit, the election output can be audited by checking a random sample of “supervotes” against the corresponding paper records.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
- 2.
The GitHub repo is https://github.com/ron-rivest/2016-batchvote-code. This is currently private, but will be made public.
- 3.
Real data sets available at: http://rangevoting.org/TidemanData.html.
References
Benaloh, J., Jones, D., Lazarus, E., Lindeman, M., Stark, P.B.: SOBA: secrecy-preserving observable ballot-level audit. In: Proceedings of 2011 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections (EVT/WOTE 2011), (2011). http://static.usenix.org/events/evtwote11/tech/final_files/Benaloh.pdf
Bretschneider, J., Flaherty, S., Goodman, S., Halvorson, M., Johnston, R., Lindeman, M., Rivest, R.L., Smith, P., Stark, P.B.: Risk-limiting post-election audits: why and how? (ver. 1.1), October 2012. http://people.csail.mit.edu/rivest/pubs.html#RLAWG12
Checkoway, S., Sarwate, A., Shacham, H.: Single-ballot risk-limiting audits using convex optimization. In: Jones, D., Quisquater, J.-J., Rescorla, E. (eds.) Proceedings of 2010 EVT/WOTE Conference. USENIX/ACCURATE/IAVoSS, August 2010
Faliszewski, P., Hemaspaandra, E., Hemaspaandra, L.A.: Using complexity to protect elections. CACM 53(11), 74–82 (2010)
Hall, J.L., Miratrix, L.W., Stark, P.B., Briones, M., Ginnold, E., Oakley, F., Peaden, M., Pellerin, G., Stanionis, T., Webber. T.: Implementing risk-limiting post-election audits in California. In: Proceedings of 2009 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections (EVT/WOTE 2009, Montreal, Canada). USENIX, August 2009. http://www.usenix.org/event/evtwote09/tech/full_papers/hall.pdf
Johnson, K.: Election verification by statistical audit of voter-verified paper ballots. http://ssrn.com/abstract=640943. Accessed 31 Oct 2004
Lindeman, M., Halvorseon, M., Smith, P., Garland, L., Addona, V., McCrea, D.: Principle and best practices for post-election audits (2008). www.electionaudits.org/files/best%20practices%20final_0.pdf
Lindeman, M., Stark, P.B.: A gentle introduction to risk-limiting audits. IEEE Secur. Priv. 10, 42–49 (2012)
Lindeman, M., Stark, P.B., Yates, V.S.: BRAVO: ballot-polling risk-limiting audits to verify outcomes. In: Halderman, A., Pereira, O. (eds.) Proceedings of 2012 EVT/WOTE Conference (2012)
Norden, L., Burstein, A., Hall, J.L., Chen, M.: Post-election audits: restoring trust in elections. Technical report, Brennan Center for Justice and Samuelson Law, Technology & Public Policy Clinic (2007)
California Secretary of State. Post-election risk-limiting audit pilot program (2011–2013). http://www.sos.ca.gov/elections/voting-systems/oversight/post-election-auditing-regulations-and-reports/post-election-risk-limiting-audit-pilot-program/
Sarwate, A.D., Checkoway, S., Shacham, H.: Risk-limiting audits and the margin of victory in nonplurality elections. Polit. Policy 3(3), 29–64 (2013)
Schulze, M.: A new monotonic, clone-independent, reversal symmetric, and condorcet-consistent single-winner election method. Soc. Choice Welf. 36(2), 267–303 (2011)
Stark, P.B.: Risk-limiting vote-tabulation audits: the importance of cluster size. Chance 23(3), 9–12 (2010)
Stark, P.B., Wagner, D.A.: Evidence-based elections. IEEE Secur. Priv. 10(05), 33–41 (2012)
Stark, P.B.: Conservative statistical post-election audits. Ann. Appl. Stat. 2, 550–581 (2008)
Stark, P.B.: A sharper discrepancy measure for post-election audits. Ann. Appl. Stat. 2, 982–985 (2008)
Stark, P.B.: Auditing a collection of races simultaneously (2009). https://arxiv.org/abs/0905.1422v1
Stark, P.B.: CAST: canvass audits by sampling and testing. IEEE Trans. Inf. Forensics Secur. 4(4), 708–717 (2009)
Stark, P.B.: Efficient post-election audits of multiple contests: 2009 California tests. In: 2009 Conference on Empirical Legal Studies (2009). http://ssrn.com/abstracts=1443314
Stark, P.B.: Risk-limiting post-election audits: P-values from common probability inequalities. IEEE Trans. Inf. Forensics Secur. 4, 1005–1014 (2009)
Stark, P.B.: Super-simple simultaneous single-ballot risk-limiting audits. In: Proceedings of 2010 EVT/WOTE Workshop (2010). http://www.usenix.org/events/evtwote10/tech/full_papers/Stark.pdf
Stark, P.B.: Tools for comparison risk-limiting election audits (2015). http://www.stat.berkeley.edu/~stark/Vote/auditTools.htm
Stark, P.B., Teague, V.: Verifiable European elections: risk-limiting audits for D’Hondt and its relatives. USENIX J. Elect. Technol. Syst. (JETS) 1(3), 18–39 (2014)
Tideman, T.N.: Independence of clones as a criterion for voting rules. Soc. Choice Welf. 4(3), 185–206 (1987)
Wald, A.: Sequential tests of statistical hypotheses. Ann. Math. Stat. 16(2), 117–186 (1945)
Wald, A.: Sequential Analysis. Dover, Mineola (2004)
Wikipedia: Voting system. https://en.wikipedia.org/wiki/Voting_system
Xia, L.: Computing the margin of victory for various voting rules. In: Proceedings of 13th ACM Conference on Electronic Commerce (EC-2012) (2012)
Acknowledgments
Ronald L. Rivest gratefully acknowledges support for his work on this project received from the Center for Science of Information (CSoI), an NSF Science and Technology Center, under grant agreement CCF-0939370, and from the Department of Statistics, University of California, Berkeley, which hosted his sabbatical visit when this work began.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Appendices
Appendix A. Possible Details of Batch Assignment Method
We illustrate the proposed procedure with an example. Suppose the random seed K is the string of 24 decimal digits
and suppose that a ballot has the 37-character ballot ID
Then the batch to which this ballot is assigned is starting with the concatenation of these two strings—that is:
Applying SHA256 to this byte string yields the hexadecimal result
which, when interpreted as a base-16 integer, yields
(decimal). Finally, we take the result modulo B, the number of batches, and add one. Suppose \(B=10000\). Then the batch number for this ballot is
Because the result is obtained modulo B, plus one, the batches are numbered 1 to B, inclusive.
Appendix B. Guidelines for Breaking Ties
We provide each of the B invocations of g with its own random number seed to use in tie-breaking. Suppose the overall election-random seed is
Suppose we wish to provide the 15th invocation of g with its own tie-breaking seed. Then the tie-breaking seed \(K^{(b)}\) provided will be
That is, the overall election seed, followed by “:batch:”, followed by the batch number b in decimal, for \(b=1, 2, \ldots , B\). This seed can be concatenated with other values within g to break ties, and then SHA256 may be applied to the result.
Of course, the specification of g needs to clearly specify how ties are to be broken, given the tie-breaking seed \(K^{(b)}\). (We have, for example, python code that illustrates this for various social choice functions g.)
Each instance of g receives a different tie-breaking seed \(K^{(b)}\), to remove the possibility of obviously correlated tie-breaking between the various batches. Although the seeds for different batches are related, they are nonetheless different, and the pseudo-random character of SHA256 makes it computationally infeasible to find statistical correlations in their tie-breaking use.
Notation
This note summarizes notational conventions we use in this paper.
-
B Number of batches.
-
b A particular batch. \(b = 1, 2, \ldots , B\).
-
\(\mathcal {C}\) The set of candidates.
-
C Number of candidates (possible election outcomes.
-
c A particular candidate. (Also w, \(\ell \) sometimes, for winner, loser.)
-
n Number of cast votes.
-
T Replication factor; how many times each vote is replicated.
-
N Number of ballots being tabulated; \(N = nT\).
-
\(N^{(b)}\) Number of ballots in batch b (so \(\sum _b N^{(b)} = N\)).
-
\(\lambda \) Average batch size (\(\lambda = N/B\)).
-
\(R_c\) Total reported tabulation in favor of candidate c. (i.e. electronic tabulation)
-
\(A_c\) Total actual tabulation in favor of candidate c (i.e. paper ballot tabulation)
-
\(R_c^{(b)}\) Reported tabulation for candidate c in batch b (Either \(N^{(b)}\) or 0).
-
\(A_c^{(b)}\) Actual tabulation for candidate c in batch b. (Either \(N^{(b)}\) or 0).
-
\(R_{w\ell }\) Reported margin of candidate w over candidate \(\ell \) (\(R_{w\ell } = R_w - R_\ell \)).
-
\(A_{w\ell }\) Actual margin of candidate w over candidate \(\ell \) (\(A_{w\ell } = A_w - A_\ell \)).
-
\(R_{w\ell }^{(b)}, A_{w\ell }^{(b)}\) Margins particularized to batch b.
-
\(t^{(b)}\) True winner of batch b.
-
\(w^{(b)}\) Reported winner of batch b.
-
K Random number seed for the election.
-
\(K^{(b)}\) Random number seed for batch b.
-
\(\mathbb B\) A randomly selected batch, with \(\Pr \{\mathbb B= b\} = N^{(b)}/N\).
Rights and permissions
Copyright information
© 2017 International Financial Cryptography Association
About this paper
Cite this paper
Rivest, R.L., Stark, P.B., Perumal, Z. (2017). BatchVote: Voting Rules Designed for Auditability. In: Brenner, M., et al. Financial Cryptography and Data Security. FC 2017. Lecture Notes in Computer Science(), vol 10323. Springer, Cham. https://doi.org/10.1007/978-3-319-70278-0_20
Download citation
DOI: https://doi.org/10.1007/978-3-319-70278-0_20
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-70277-3
Online ISBN: 978-3-319-70278-0
eBook Packages: Computer ScienceComputer Science (R0)