Threat Analyses for Voting System Categories

A Workshop on Rating Voting Methods

VSRW 06

8-9 June 2006

The George Washington University

Partially Funded by NSF


Home

Call for Submissions

Submit a paper

Schedule

Registration

Accepted Papers

Workshop Format

Location

Technical Committee


NIST Threat Analysis Workshop


Workshop Format

Day 1

Session I (Plenary): Background
Invited presentations on existing taxonomies of voting systems, an overview of cryptographic voting systems. A submitted paper on an information-theoretic view of voting.

Session II (Plenary): Straw models
(a) cryptographic PunchScan voting system, including demo (b) Open Voting Consortium's system.

Session III (Breakout): Two groups, on privacy and integrity.
Each group will hear two presentations: one on a rating system, and one on vulnerabilities. Each group will begin to rate the two straw models and paper voting.

End of Day 1 (Plenary): Wrap-up Day 1
Group leaders will present, in a plenary session, on progress so far.

Informal Pizza Session (Plenary): Discussions continued over pizza.

Day 2

Session IV (Plenary): Invited talks and panel
High assurance security measures and applications to voting, Maryland's voter verification study, security issues in voting.

Session V (Breakout): Two groups, on privacy and integrity.
Each group will rework its rating system(s) and rank the (three) voting models for its desirable property.

Session VI (Plenary): Workshop Wrap-up
Presentations by two group leaders on the ratings method(s) used and the results. Invited presentations on privacy and transparency challenges, and on the uses of ratings.