end-to-end (E2E) auditable voting system
Invented by Ron Rivest, co-author of RSA,
RC4/RC5 (Rivest Cipher) and MD5.
Published in October 2006 at MIT
Each voter casts three paper ballots, with
certain restrictions on how they may be ﬁlled
Vote should be at same time
anonymous and verifiable.
1. Each voter's vote is secret, preventing vote-selling and
2. Each voter can verify that his vote was not discarded,
and was correctly used and not altered, in the computation
of the election result.
3. Everybody can verify the election result was computed
4. Everybody can verify that extra fake "voters" were not
added, and the full list of voters is publicly known.
1. You can't leave row unfilled
2. You can't fill all three circle in the row
3. For candidate - two circles in row
4. Against candidate - at least on circle in row
5. For vote - at most one candidate per race
6. You may vote against all candidates
7. Voter makes copy on of the ballot with
unique identifier at the bottom
1. Adding ballots
2. Modifying ballots
3. Vote selling
4. Three pattern attack
5. Take photos of ballot
Other voting system
1. Plurality voting
2. Approval voting
3. Range voting