Thwarting Vote Buying Through Decoy Ballots
نویسندگان
چکیده
There is increasing interest in promoting participatory democracy, in particular by allowing voting by mail or internet and through random-sample elections. A pernicious concern, though, is that of vote buying, which occurs when a bad actor seeks to buy ballots, paying someone to vote against their own intent. This becomes possible whenever a voter is able to sell evidence of which way she voted. We show how to thwart vote buying through decoy ballots, which are not counted but are indistinguishable from real ballots to a buyer. We show that an Election Authority can significantly reduce the power of vote buying through a small number of optimally distributed decoys, and model societal processes by which decoys could be distributed.
منابع مشابه
A Model of Vote-buying with an Incumbency Advantage
Vote-buying, i.e., gifts given to voters before the elections in exchange for their votes, is a frequent practice during electoral campaigns in many parts of the world. However, in the presence of secret ballots, it is not clear whether and how vote-buying drives voting behavior. This paper proposes a simple model of vote-buying with two candidates where (i) the level of enforcement of vote-buy...
متن کاملSophisticated Attacks on Decoy Ballots: The Devil's Menu and the Market for Lemons
Decoy ballots do not count in election outcomes, but otherwise they are indistinguishable from real ballots. By means of a game-theoretical model, we show that decoy ballots may not provide effective protection against a malevolent adversary trying to buy real ballots. If the citizenry is divided into subgroups (or districts), the adversary can construct a so-called “Devil’s Menu” consisting of...
متن کاملAn Efficient Mixnet-based Voting Scheme
Receipt-freeness is an essential security property in electronic voting to prevent vote buying, selling or coercion. In this paper, we propose an efficient mixnet-based receipt-free voting scheme by modifying a voting scheme of Lee et al. The receipt-freeness property is obtained through the randomization service given by a trusted administrator, and assuming that two-way untappable channel is ...
متن کاملThe ThreeBallot Voting System
We present a new paper-based voting method with interesting security properties. The attempt here is to see if one can achieve the same security properties of recently proposed cryptographic voting protocols, but without using any cryptography, using only paper ballots. We partially succeed. (Initially, I thought the proposal accomplished this goal, but several readers discovered a vote-buying ...
متن کاملLosing Votes by Mail
INTRODUCTION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 573 R I. THE VOTING PIPELINE AND LOST VOTES, 2000 TO 2008. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 576 R II. THE VOTE-BY-MAIL PIPELINE . . . . . . . . . . . . . . . . . . . . . . . . 579 R III. THE RISE OF VOTE-BY-MAIL SINCE 1972 . . . . ...
متن کامل