Workshop Format
Day 1
Session I (Plenary): Background
Invited presentations on existing taxonomies of voting systems, an
overview of cryptographic voting systems. A submitted paper on an
information-theoretic view of voting.
Session II (Plenary): Straw models
(a) cryptographic PunchScan voting system, including demo (b) Open
Voting Consortium's system.
Session III (Breakout): Two groups, on privacy and
integrity.
Each group will hear two presentations: one on a rating system, and one
on vulnerabilities. Each group will begin to rate the two straw models
and paper voting.
End of Day 1 (Plenary): Wrap-up Day 1
Group leaders will present, in a plenary session, on progress so far.
Informal Pizza Session (Plenary): Discussions continued
over pizza.
Day 2
Session IV (Plenary): Invited talks and panel
High assurance security measures and applications to voting, Maryland's
voter verification study, security issues in voting.
Session V (Breakout): Two groups, on privacy and
integrity.
Each group will rework its rating system(s) and rank the (three) voting
models for its desirable property.
Session VI (Plenary): Workshop Wrap-up
Presentations by two group leaders on the ratings method(s) used and
the results. Invited presentations on privacy and transparency
challenges, and on the uses of ratings.
|