{"620313":{"#nid":"620313","#data":{"type":"event","title":"ARC-IISP Colloquium: Richard DeMillo (Georgia Tech)","body":[{"value":"\u003Cp align=\u0022center\u0022\u003E\u003Ca href=\u0022http:\/\/arc.gatech.edu\u0022\u003E\u003Cstrong\u003EAlgorithms \u0026amp; Randomness Center (ARC)\u003C\/strong\u003E\u003C\/a\u003E and\u003C\/p\u003E\r\n\r\n\u003Cp align=\u0022center\u0022\u003E\u003Ca href=\u0022http:\/\/cyber.gatech.edu\/\u0022\u003E\u003Cstrong\u003EInstitute for Information Security \u0026amp; Privacy (IISP)\u003C\/strong\u003E\u003C\/a\u003E\u0026nbsp;\u003Cstrong\u003E Colloquium\u003C\/strong\u003E\u003C\/p\u003E\r\n\r\n\u003Cp align=\u0022center\u0022\u003E\u003Cstrong\u003ERichard A. DeMillo (Georgia Tech)\u003C\/strong\u003E\u003C\/p\u003E\r\n\r\n\u003Cp align=\u0022center\u0022\u003E\u003Cstrong\u003EMonday, May 13, 2019\u003C\/strong\u003E\u003C\/p\u003E\r\n\r\n\u003Cp align=\u0022center\u0022\u003E\u003Cstrong\u003EMiRC Pettit 102 -- 11am\u003C\/strong\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Ca href=\u0022http:\/\/arc.gatech.edu\/node\/349\u0022\u003EPowerpoint of slides from Rich DeMillo\u0027s May 13, 2019 colloquium\u003C\/a\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cstrong\u003ETitle: \u0026nbsp;\u003C\/strong\u003EThe Difficult Problem of Simply Voting\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cstrong\u003EAbstract:\u0026nbsp;\u0026nbsp;\u003C\/strong\u003EElections seem pretty simple: People show up on election day to vote for one candidate or another. A good election system has to accurately count the number of votes for each candidate and report the totals to the public while ensuring that\u003C\/p\u003E\r\n\r\n\u003Cp\u003EV1\u0026nbsp; Elections are fair\u003Cbr \/\u003E\r\nV2\u0026nbsp; Everyone\u0026#39;s votes are secret,\u003Cbr \/\u003E\r\nV3\u0026nbsp; Only eligible votes are counted\u003Cbr \/\u003E\r\nV4\u0026nbsp; No one votes more than once\u003Cbr \/\u003E\r\nV5\u0026nbsp; Ballots, once cast, are not altered, lost, or destroyed\u003C\/p\u003E\r\n\r\n\u003Cp\u003EMany people believe that, in an Internet-enabled world, secure, safe voting should be easy to achieve. For example, using known cryptographically secure protocols (maybe even blockchains), a secure website might be developed to relieve voters of the burden of driving to a polling place on election day. While we\u0026#39;re at it, we can probably improve on the election algorithm itself, since there is a rich literature on fair voting schemes that more accurately and reliably reflect actual voter preferences.\u003C\/p\u003E\r\n\r\n\u003Cp\u003EExcept that:\u003C\/p\u003E\r\n\r\n\u003Cp\u003EE1\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp; There is no one in charge of elections. The U.S. Constitution delegates that authority to states and localities. A national election is more than 10,000 independent elections, each one operating autonomously, using its own rules.\u003Cbr \/\u003E\r\n\u003Cbr \/\u003E\r\nE2\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp; Because casting,\u0026nbsp; recording and counting votes is an error-prone human process, the losing candidate is often not convinced that the result is accurate. Although no one trusts anyone else, elections should generate public evidence to convince those who voted for the loser that another candidate won.\u003Cbr \/\u003E\r\n\u003Cbr \/\u003E\r\nE3\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp; The scale and complexity of American elections require computerization of the voting process, and computers can be hacked or misprogrammed\u003Cbr \/\u003E\r\n\u003Cbr \/\u003E\r\nE4\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp; The only known methods for protecting voting computers rely on math and technology, but the average voter does not understand math or technology\u003Cbr \/\u003E\r\n\u003Cbr \/\u003E\r\nWe now know that there are active, well-funded adversaries who are trying to disrupt elections with information and cyber attacks on election systems. E1-E4 prohibit many security-enhancing simplifications and therefore complicate the problem of conducting modern elections in such an environment.\u003C\/p\u003E\r\n\r\n\u003Cp\u003EThe most widely accepted method for ensuring that errors in tabulating votes (whether malicious or inadvertent) is the Risk-Limiting Audit (RLA), a post-election, sequential sampling process that for some predetermined risk limit \u0026alpha;: confirms an error-free tabulation with probability 1 and fails to confirm an incorrect tabulation with probability at least 1-\u0026alpha;. The most widely accepted necessary condition for securely marking and tabulating ballots is software independence (an undetected error in voting software cannot result in an undetectable change in reported vote totals).\u003C\/p\u003E\r\n\r\n\u003Cp\u003ETwo competing election systems purport to be auditable and software independent: hand-marked paper ballots and paper ballots printed by machines called Ballot Marking Devices (BMDs). In this talk, I will discuss recent work with Andrew Appel and Philip Stark, arguing that BMDs are neither software\u003Cbr \/\u003E\r\nindependent nor meaningfully auditable by RLAs. We also introduce two new conditions called contestability and defensibility that are necessary for an audit to confirm election results.\u003C\/p\u003E\r\n\r\n\u003Cp\u003E----------------------------------\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Ca href=\u0022http:\/\/www.c21u.gatech.edu\/team\/faculty\/demillo\u0022\u003ESpeaker\u0026#39;s Webpage\u003C\/a\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cem\u003EVideos of recent talks are available at:\u0026nbsp;\u003C\/em\u003E\u003Ca href=\u0022https:\/\/smartech.gatech.edu\/handle\/1853\/46836\u0022\u003E\u003Cem\u003Ehttps:\/\/smartech.gatech.edu\/handle\/1853\/46836\u003C\/em\u003E\u003C\/a\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Ca href=\u0022https:\/\/mailman.cc.gatech.edu\/mailman\/listinfo\/arc-colloq\u0022\u003E\u003Cem\u003EClick here to subscribe to the seminar email list: arc-colloq@cc.gatech.edu\u003C\/em\u003E\u003C\/a\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":[{"value":"The Difficult Problem of Simply Voting - MiRC Pettit 102 at 11am"}],"uid":"32895","created_gmt":"2019-04-11 13:43:32","changed_gmt":"2019-05-21 18:55:14","author":"Eric Vigoda","boilerplate_text":"","field_publication":"","field_article_url":"","field_event_time":{"event_time_start":"2019-05-13T12:00:00-04:00","event_time_end":"2019-05-13T13:00:00-04:00","event_time_end_last":"2019-05-13T13:00:00-04:00","gmt_time_start":"2019-05-13 16:00:00","gmt_time_end":"2019-05-13 17:00:00","gmt_time_end_last":"2019-05-13 17:00:00","rrule":null,"timezone":"America\/New_York"},"extras":[],"groups":[{"id":"70263","name":"ARC"}],"categories":[],"keywords":[],"core_research_areas":[],"news_room_topics":[],"event_categories":[{"id":"1795","name":"Seminar\/Lecture\/Colloquium"}],"invited_audience":[{"id":"78761","name":"Faculty\/Staff"},{"id":"177814","name":"Postdoc"},{"id":"78771","name":"Public"},{"id":"174045","name":"Graduate students"},{"id":"78751","name":"Undergraduate students"}],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}}}