Julie M. Haney (National Institute of Standards and Technology, Gaithersburg, Maryland), Shanee Dawkins (National Institute of Standards and Technology, Gaithersburg, Maryland), Sandra Spickard Prettyman (Cultural Catalyst LLC, Chicago), Mary F. Theofanos (National Institute of Standards and Technology, Gaithersburg, Maryland), Kristen K. Greene (National Institute of Standards and Technology, Gaithersburg, Maryland), Kristin L. Kelly Koskey (Cultural Catalyst LLC, Chicago), Jody L. Jacobs (National Institute of Standards and Technology, Gaithersburg, Maryland)

By using cryptographic techniques, end-to-end verifiable (E2EV) voting systems have been proposed as a way to increase voter trust and confidence in elections by providing the public with direct evidence of the integrity of election systems and outcomes. However, it is unclear as to whether the path to E2EV adoption for in-person elections in the United States is feasible given the confluence of factors impacting voter trust and technology adoption. Our research addresses this gap with a first-of-its-kind interview study with 33 election experts in four areas: accessibility, cybersecurity, usability, and general elections. We found that participants’ understanding of and opinions on E2EV diverged. While E2EV was lauded by some for increased security and transparency, others described it does not address major challenges to voter trust in U.S. elections and might actually have a negative impact due to complexity and limitations. Overall, participants recognized that the feasibility of widescale E2EV adoption hinges on not just the strength and security of the technology, but also on consideration of the people and process issues surrounding it. Based on our results, we offer suggestions for future work towards informing decisions about whether to adopt E2EV systems more widely.

View More Papers

SoK: Analysis of Accelerator TEE Designs

Chenxu Wang (Southern University of Science and Technology (SUSTech) and The Hong Kong Polytechnic University), Junjie Huang (Southern University of Science and Technology (SUSTech)), Yujun Liang (Southern University of Science and Technology (SUSTech)), Xuanyao Peng (Southern University of Science and Technology (SUSTech) and University of Chinese Academy of Sciences), Yuqun Zhang (Southern University of Science…

Read More

PortRush: Detect Write Port Contention Side-Channel Vulnerabilities via Hardware...

Peihong Lin (National University of Defense Technology), Pengfei Wang (National University of Defense Technology), Lei Zhou (National University of Defense Technology), Gen Zhang (National University of Defense Technology), Xu Zhou (National University of Defense Technology), Wei Xie (National University of Defense Technology), Zhiyuan Jiang (National University of Defense Technology), Kai Lu (National University of Defense…

Read More

Identifying Logical Vulnerabilities in QUIC Implementations

Kaihua Wang (Tsinghua University), Jianjun Chen (Tsinghua University), Pinji Chen (Tsinghua University), Jianwei Zhuge (Tsinghua University), Jiaju Bai (Beihang University), Haixin Duan (Tsinghua University)

Read More