Abstract
Electronic Voting Machines (EVMs) used in the 2019 General Elections in India were fitted with printers to produce Voter-Verifiable Paper Audit Trails (VVPATs). VVPATs allow voters to check whether their votes were recorded as they intended. However, confidence in election results requires more: VVPATs must be preserved inviolate and then actually used to check the reported election result in a trustworthy way that the public can verify. A full manual tally from the VVPATs could be prohibitively expensive and time-consuming; moreover, it is difficult for the public to determine whether a full hand count was conducted accurately. We show how Risk-Limiting Audits (RLAs) can provide high confidence in Indian election results. Compared to full hand recounts, RLAs typically require manually inspecting far fewer VVPATs when the outcome is correct, and are much easier for the electorate to observe in adequate detail to determine whether the result is trustworthy.
We show how to apply two RLA strategies, ballot-level comparison and ballot polling, to General Elections in India. Our main result is a novel method for combining RLAs in constituencies to obtain an RLA of the overall parliamentary election result.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsNotes
- 1.
- 2.
- 3.
- 4.
Sequentially valid means that the chance that the infimum of the P-value over all sample sizes is less than or equal to \(\alpha \) is itself less than or equal to \(\alpha \) if the null hypothesis is true. In contrast, standard hypothesis tests are designed for sample sizes that are fixed ahead of time: expanding the sample and re-calculating the P-value for such tests generally produces type I error rates far larger than the nominal significance level, because it does not account for multiplicity.
- 5.
Prof. Sandeep Shukla of IIT Kanpur has pointed out that the current Indian VVPAT design does not protect against the EVM adding electronic votes and corresponding VVPATs when voters are not looking, because there is no publicly observable mechanism to ensure that at most one VVPAT is inserted into the box per voter. This needs to be addressed by improving the physical design in a way that is beyond the scope of this paper.
- 6.
Indian EVMs (as far as we know) do not produce blank votes. However, if they did they could be accommodated easily. A 1-vote overstatement occurs if we find a blank vote in the reported winner’s pile. A neutral error would occur when there were at least three candidates and we found a blank vote in a reported loser’s pile. A one-vote understatement would occur when there were exactly two candidates and we found a blank vote in the reported loser’s pile.
- 7.
There are other ballot-polling methods that do not use the reported results at all.
- 8.
- 9.
See, e.g., [9].
References
Bañuelos, J., Stark, P.: Limiting risk by turning manifest phantoms into evil zombies. arXiv preprint arXiv:1207.3413 (2012)
Benaloh, J., Jones, D., Lazarus, E., Lindeman, M., Stark, P.: SOBA: secrecy-preserving observable ballot-level audit. EVT/WOTE 11 (2011)
Calandrino, J., Halderman, J., Felten, E.: Machine-assisted election auditing. EVT 7, 9 (2007)
Hall, J., et al.: Implementing risk-limiting audits in California. EVT/WOTE (2009)
Kroll, J.A., Halderman, A., Felten, E.: Efficiently auditing multi-level elections. Ann Arbor 1001, 48109 (2014)
Lindeman, M., Stark, P.: A gentle introduction to risk-limiting audits. EEE Secur. Priv. 10(5), 42–49 (2012)
Lindeman, M., Stark, P., Yates, V.: BRAVO: ballot-polling risk-limiting audits to verify outcomes (2012)
Ottoboni, K., Bernhard, M., Halderman, A., Rivest, R., Stark, P.: Bernoulli ballot polling: a manifest improvement for risk- limiting audits. In: Voting 2019 (2019)
Ottoboni, K., Stark, P.B., Lindeman, M., McBurnett, N.: Risk-limiting audits by stratified union-intersection tests of elections (SUITE). In: Krimmer, R., et al. (eds.) E-Vote-ID 2018. LNCS, vol. 11143, pp. 174–188. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-00419-4_12
Schürmann, C.: A risk-limiting audit in Denmark: a pilot. In: Krimmer, R., et al. (eds.) E-Vote-ID 2016. LNCS, vol. 10141, pp. 192–202. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-52240-1_12
Stark, P.: Conservative statistical post-election audits. Ann. Appl. Stat. 2(2), 550–581 (2008)
Stark, P.: Risk-limiting post-election audits: \(P\)-values from common probability inequalities. IEEE Trans. Inf. Forensics Secur. 4, 1005–1014 (2009)
Stark, P.: Super-simple simultaneous single-ballot risk-limiting audits. USENIX Association Berkeley, CA, USA ©2010 (2010)
Stark, P.: An introduction to risk-limiting audits and evidence-based elections: testimony to the Little Hoover Commission (2018)
Stark, P., Teague, V.: Verifiable European elections: risk-limiting audits for d’hondt and its relatives. USENIX J. Election Technol. Syst. (JETS) 1(3), 18–39 (2014)
Stark, P., Wagner, D.: Evidence-based elections. IEEE Secur. Priv. 10(5), 33–41 (2012)
Supreme Court of India: Civil appeal no. 9093 of 2013–Dr. Subramanian Swamy vs. Election Commission of India, October 2013
Wald, A.: Sequential tests of statistical hypotheses. Ann. Appl. Stat. 16(2), 117–186 (1945)
Wolchok, S., et al.: Security analysis of India’s electronic voting machines. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, pp. 1–14. ACM (2010)
Acknowledgments
Many thanks to Andrew Conway, Archanaa Krishnan, Chittaranjan Mandal, Sandeep Shukla, Nicholas Akinyokun, Peter Stuckey and Poorvi Vora for valuable suggestions on this work.
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Mohanty, V., Culnane, C., Stark, P.B., Teague, V. (2019). Auditing Indian Elections. In: Krimmer, R., et al. Electronic Voting. E-Vote-ID 2019. Lecture Notes in Computer Science(), vol 11759. Springer, Cham. https://doi.org/10.1007/978-3-030-30625-0_10
Download citation
DOI: https://doi.org/10.1007/978-3-030-30625-0_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-30624-3
Online ISBN: 978-3-030-30625-0
eBook Packages: Computer ScienceComputer Science (R0)