Punchscan is an Marksense vote counting system invented by cryptographer David Chaum. Punchscan is designed to offer integrity, privacy, and transparency. The system is voter-verifiable, provides an end-to-end (E2E) audit mechanism, and issues a ballot receipt to each voter. The system won grand prize at the 2007 University Voting Systems Competition.
The computer software which Punchscan incorporates is open-source; the source code was released on 2 November 2006 under a revised BSD licence. Punchscan School Election System Goes Open Source . IT Business Edge However, Punchscan is software independent; it draws its security from cryptographic functions instead of relying on software security like DRE voting machines. For this reason, Punchscan can be run on closed source , like Microsoft Windows, and still maintain unconditional integrity.
The Punchscan team, with additional contributors, has since developed Scantegrity.
To cast a vote for a candidate, the voter must locate the hole with the symbol corresponding to the symbol beside the candidate's name. This hole is marked with a Bingo-style ink dauber, which is purposely larger than the hole. The voter then separates the ballot, chooses either the top or the bottom layer to keep as a receipt, and Paper shredder the other layer. The receipt is Optical reader at the polling station for tabulation.
The order of the symbols beside the candidate names is generated randomly for each ballot, and thus differs from ballot to ballot. Likewise for the order of the symbols in the holes. For this reason, the receipt does not contain enough information to determine which candidate the vote was cast for. If the top layer is kept, the order of the symbols through the holes is unknown. If the bottom layer is kept, the order of the symbols beside the candidates name is unknown. Therefore, the voter cannot prove to someone else how they voted, which prevents Electoral fraud or voter intimidation.
: order of symbols beside candidate list,
Likewise we can generalize for other parts of a ballot:
: order of symbols through the holes,
: which hole is marked,
: result of the ballot,
Note that the order of the candidates' names are fixed across all ballots. The result of a ballot can be calculated directly as,
However, when one layer of the ballot is shredded, either or is destroyed. Therefore, there is insufficient information to calculate from the receipt (which is scanned). In order to calculate the election results, an electronic database is used.
Before the election, the database is created with a series of columns as such. Each row in the database represents a ballot, and the order that the ballots are stored in the database is shuffled (using a cryptographic key that each candidate can contribute to). The first column, , has the shuffled order of the serial numbers. contains a pseudorandom bitstream generated from the key, and it will act as a stream cipher. will store an intermediate result. contains a bit such that:
The result of each ballot will be stored in a separate column, , where the order of the ballots will be reshuffled again. Thus contains the row number in the column where the result will be placed.
After the election is run and the values have been scanned in, is calculated as:
And the result is calculated as,
This is equivalent to equation 1,
The result column is published and given the ballots have been shuffled (twice), the order of the results column does not indicate which result is from which ballot number. Thus the election authority cannot trace votes to serial numbers.
Any voter or interested party can also inspect part of the database to ensure the results were calculated correctly. They cannot inspect the whole database, otherwise they could link votes to ballot serial numbers. However, half of the database can be safely inspected without breaking privacy. A random choice is made between opening or (this choice can be derived from the secret key or from a true random source, such as diceArel Cordero, David Wagner, and David Dill. The Role of Dice in Election Audits -- Extended Abstract. or the stock marketJeremy Clark, Aleks Essex, Carlisle Adams. Secure and Observable Auditing of Electronic Voting Systems using Stock Indices.). This procedure allows the voter to be confident that the set of all ballots were counted as cast.
If all ballots are counted as cast and cast as intended, then all ballots are counted as intended. Therefore, the integrity of the election can be proven to a very high probability.
|
|