-

PaperBallotchain Whitepaper


A Verifiable & Transparent Voting System

PaperBallotchain is a paper-first ballot custody and verification system that strengthens election integrity through transparent, auditable chain-of-custody controls without replacing existing voting processes.

VOTING PROBLEMS:  Paper ballots are essential to election security, but slow to count and prone to costly disputes, while electronic voting is fast to count, but vulnerable to hacking and risks voter anonymity.  How do we get the best of both systems?


VOTING PROBLEMS:  Paper ballots are essential to a secure voting system because they provide a tamper-evident trail and thwart large-scale ballot tampering, but the counting method  (by hand or by scanner)  is  slow, prone to inaccuracies, vulnerable to manipulation, minimally transparent, unable to give voters confirmation that their ballot was included in the count, and  often results in disputes, costly and time-consuming audits, court cases, and destabilizing delays in voting results; meanwhile electronic voting is fast to count, but risks compromising voter anonymity and is vulnerable to hacking that is large-scale and potentially undetectable. 

VOTING SOLUTION:  PaperBallotchain pairs paper ballots and blockchain technology to provide the first-ever cryptographically-secure, voter-verifiable, yet still anonymous, near-instant-count, paper-ballot voting system. 

(Patent No. 12132827)


VOTING SOLUTION:  PaperBallotchain  pairs paper ballots and blockchain technology to provide  the first-ever cryptographically-secure, voter-verifiable, yet still anonymous vote-casting system  and the first-ever fully transparent, perfectly accurate, near instantaneous, and publicly-verifiable vote-counting system—solving the critical technical vulnerabilities of blockchain voting  described by MIT and blockchain experts that have justifiably caused them to strenuously warn against blockchain voting. 

(This system holds both the credibility and innovation of a patent:  Patent No. 12132827)

PaperBallotchain is not  a cryptocurrency or internet-based voting platform—PaperBallotchain is a paper-first chain-of-custody and verification framework designed to strengthen existing election laws and procedures.


You don’t need to understand blockchain technology to trust PaperBallotchain

because you can privately verify that your scanned paper ballot has

been added to the blockchain using your Paper Ballot ID#.


(Meanwhile, bad actors can’t verify which ballot you cast because

your Paper Ballot ID# could be any Paper Ballot ID# cast onto the

blockchain around the same time as yours from the same polling station.)    


But if you're interested...


A blockchain is a specialized type of database—a cryptographically secure, transparent, immutable, tamper-evident, distributed, digital ledger.


Contents

What PaperBallotchain can solve for you

(Back to Contents)


Vote-Casting Problems

Solution:  PaperBallotchain's vote-casting pairs paper ballots and  blockchain technology with only open-source code that

  • enables cryptographic verification of ballots
  • enables individual voters to privately verify that their scanned paper ballot has been added to independent stakeholder blockchains,
  • yet obfuscates bad actor efforts to verify which ballots were cast by which voters.

 This vote-casting method includes solutions to critical technical vulnerabilities of blockchain voting identified by MIT and blockchain experts.


Vote-Counting Problems

Solution:  PaperBallotchain's vote-counting of all cryptographically verified ballots on the independent stakeholder blockchains is

  • fully transparent,
  • perfectly accurate, and
  • near instantaneous.

This vote-counting method includes solutions to critical technical vulnerabilities of blockchain voting identified by MIT and blockchain experts.


(Blockchain: a specialized type of database—a cryptographically secure, transparent, immutable, tamper-evident, distributed, digital ledger.)

Compare Voting Methods

(Back to Contents)

Summary


The Hybrid Paper-Ballot-to-Blockchain Voting method(the PaperBallotchain solution) has more strengths than the methods using only paper ballots or electronic ballots.


Solutions to problems in a system often come with tradeoffs.

But in comparison to traditional paper-ballot voting (which is the second best-rated system after PaperBallotchain), PaperBallotchain brings 9 rating improvements (out of 15 categories) and no rating decreases or tradeoffs, shifting 9 categories from ‘weakness,’ ‘minor strength,’ or ‘strength,’  to 'strength' or 'major strength’

Additionally, in comparison to electronic-ballot-to-blockchain voting, PaperBallotchain makes only one trade-off on the speed/ease of vote casting, favoring security, while bringing 8 rating improvements (out of 15 categories), shifting 8 categories from 'major weakness’ or ‘weakness’  to 'strength' or 'major strength’

Moreover, “online voting may not increase turnout. Studies on online voting’s impact on voter turnout have ranged from finding no impact on turnout (e.g., Switzerland [1]) to finding that online voting slightly decreases turnout (e.g., Belgium [2]) to finding that online voting slightly increases turnout but is nonetheless “unlikely to solve the low turnout crisis” (e.g., Canada [3]).1[4] Studies of Estonian elections have also suggested that turnout changes due to online voting may favor higher-income and higher-education demographics [5]. Recent US studies demonstrate significant demographic disparities in smartphone ownership (e.g., in gender, income, and education) [6].” ( Source: Going from bad to worse: from Internet voting to blockchain voting | Journal of Cybersecurity)

                                  Rating Scale

Voters experience minimal change in paper-ballot-to-blockchain voting. Voters receive and cast paper ballots as they have done before. The main difference for voters is that they have the option to immediately look up their Ballot ID# on the live blockchain vote tallies report to confirm their ballot is included in the tallies—while giving voters plausible deniability about which Ballot ID# they cast because their Ballot ID# could be any Ballot ID# cast onto the blockchain around the same time as theirs from the same polling station, which would obfuscate bad actor efforts to verify which ballots were cast by which voters when seeking to buy or coerce votes.   .

Compare Blockchain Voting Methods

(Back to Contents)

On the surface, blockchain voting appears to be the optimal solution to voting-system problems because... 

  • it can enable convenient casting of electronic ballots from mobile devices 
  • to a public, cryptographically secure, transparent, immutable, tamper-evident, decentralized, digital ledger (a blockchain), 
  • where the ballots can be automatically counted perfectly and nearly instantly. 

However, MIT and other blockchain experts have justifiably strenuously warned against blockchain voting, explaining...

  • although data is highly secure and tamper-evident once on a robust blockchain, 
  • blockchain voting has three critical technical vulnerabilities (problems), 
  • and paper ballots are vital to a secure voting system. 

For more details, see

Thus, if only we could transfer paper ballot data onto a blockchain securely, then the ballot data could be safely and transparently stored and counted on the blockchain, but how can we do that?    A key problem is that a paper ballot would need to be scanned, and that scanned ballot data would be subject to the same vulnerabilities as the electronic ballot  in its creation and on its path from the scanner to the blockchain. The PaperBallotchain patent solves that problem. 

MIT and other Blockchain experts describe at least 14 key problems with electronic only blockchain voting. The first three problems (critical technical vulnerabilities) and PaperBallotchain’s solutions are described here. A description of the other 11 technical problems and PaperBallotchain’s solutions are available upon request.

Problems (Critical Technical Vulnerabilities)

in Traditional

Electronic-Ballot-to-Blockchain Voting

Solutions (Low-Tech & Non-Tech)

in New

Paper-Ballot-to-Blockchain Voting

The traditional electronic-ballot-to-blockchian voting method is vulnerable to undetectable and large-scale hacks and would require a whole new election if the electronic ballots or blockchain were hacked because no paper ballots would exist for a hand-count or otherwise.

This new paper-ballot-to-blockchian voting method is not vulnerable to undetectable or large-scale hacks and would not require a whole new election if the scanned ballots or blockchains were hacked because paper ballots would exist in official custody for a hand-count or otherwise.

1.  Jeopardizes ballot integrity (Critical Technical Vulnerability):  “If vote-casting is entirely software-based, a malicious system could fool the voter about how the vote was actually recorded”—and that system would be prone to large-scale error and hacks that could overturn the election results in undetectable ways, or if detected, would require a whole new election.  (Sources: 1)  MIT experts: no, don’t use blockchain to vote | MIT CSAIL.  2) Would Voting Be Better On A Blockchain - YouTube.)

2. Jeopardizes voter anonymity (Critical Technical Vulnerability):  The software required to simultaneously 

1) verify voter identity, 

2) ensure voter anonymity (remove voter identity when casting the ballot), and 

3) remember voter identity to prevent voters from casting multiple ballots

—has not yet been developed/solved, and even if it were developed/solved—it would be prone to large-scale error and hacks that could compromise voter anonymity on a large scale and could enable casting of fraudulent ballots on a large scale that could overturn election results in undetectable ways, or if detected, would require a whole new election.  (Source:  Would Voting Be Better On A Blockchain - YouTube.)


If using coins to vote: “it does not provide a secret ballot: all votes are public, and users can prove to a third party how they voted, enabling coercion and vote-selling.”


If using zero- knowledge proofs: 

  • “While this would mean that transaction data would no longer be publicly visible, the resulting scheme would still be far from providing ballot secrecy.”
  • If the software were hacked, voter anonymity would be compromised on a large scale.
  • They are “designed for a setting where the party with secret information wants to keep it secret…—they generally do not prevent that party from revealing information voluntarily.”

(Source: Going from bad to worse: from Internet voting to blockchain voting | Journal of Cybersecurity | Oxford Academic.)


3. New Blockchain Database Vulnerability (Critical Technical Vulnerability):   New blockchain databases typically have a small number of computer node participants, which makes them inherently vulnerable to “51% attacks,” in which a bad actor gains control of the majority of the blockchain nodes/computers, enabling them to “create multiple versions of the blockchain to show different people, sowing discord.”  Even though the hack would be detectible, it would require a whole new election. ( Source: Going from bad to worse: from Internet voting to blockchain voting | Journal of Cybersecurity | Oxford Academic.)

1. Low-tech solution in two steps:  

_

Step 1) Create folded, sealed, tamper-evident paper ballots, each with the following printed and hidden inside them:  

  • a Ballot Private Key (unique number) to create a ballot digital signature on a scanned-ballot datafile that will be cast onto multiple independent-stakeholder blockchains and verified using a corresponding Ballot Public Key that is published before the election, 
  • a unique Ballot ID# to enable a voter to look up their scanned paper ballot on the independent-stakeholder blockchains, 
  • machine readable code that causes a ballot-scanner-set assembly to shred the ballot private key after each independent-stakeholder scanner in the scanner-set assembly transmits its independently scanned-ballot datafile to all the independent-stakeholder blockchains, thereby preventing someone from altering and/or recasting the ballot with a valid ballot digital signature.   

Step 2) Then scan each voter-marked paper ballot using a scanner-set assembly containing multiple independent-stakeholder transmitting scanners (each with a unidirectional data diode) that can each separately create and apply a stakeholder-scanner digital signature to a scanned-ballot datafile that can be verified by the public and a blockchain using a corresponding pre-election-published Stakeholder Scanner Public Key.  


Those two steps are the foundation of a paper-ballot-to-blockchain voting system that:

  • Preserves the tamper-evident, auditable paper trail of paper ballots.
  • Enables the public and the independent stakeholder blockchains to verify the integrity of each scanned-ballot datafile using the corresponding pre-election-published Ballot Public Key and pre-election-published Stakeholder Scanner Public Keys. 
  • Makes it impossible to re-cast an altered or unaltered marked-paper ballot onto the blockchain because the Ballot Private Key is destroyed/shredded when it travels through the scanner set assembly.
  • Enables each voter to nearly instantly verify their paper ballot data has been cast onto a blockchain and is currently included in the vote count—using the Ballot ID#.  (Yet, gives a voter plausible deniability about which Ballot ID# they cast because their Ballot ID# could be any Ballot ID# cast onto the blockchain around the same time as theirs from the same polling station, which would obfuscate bad actor efforts to verify which ballots were cast by which voters when seeking to buy or coerce votes.)
  • Physically prevents bad actors from sending malware into the transmitting scanners from the internet because each scanner's unidirectional data diode physically guarantees that data can only exit (not enter) the transmitting scanner.
  • Makes a large-scale hack of scanner devices nearly impossible because each competing stakeholder maintains hundreds of unconnected unidirectional data diode scanners in hundreds of different locations.

2. Non-tech solution: The voting system software never knows the voter’s identity.  After election officials verify voter identity in whichever manner they choose, they provide a folded, sealed, tamper-evident paper ballot to the voter that 

  • 1) is not tied to voter identity, 
  • 2) is folded and sealed in a tamper-evident way that conceals the ballot contents until the voter opens it in private, and 
  • 3) contains a Ballot ID# and a Ballot Private Key that are not linked to a human identity (thereby preserving voter anonymity) and enable the ballot to function with blockchain technology in a cryptographically secure and anonymous way. 

Optional use of Ballot Vending Machines:  Instead of election officials selecting which folded, sealed, tamper-evident paper ballot to give to each voter, each voter can select a ballot from a Ballot Vending Machine, so election officials won’t know which ballot the voter will get.  


Additionally, the voter has plausible deniability about which Ballot ID# they cast because their Ballot ID# could be any Ballot ID# cast onto the blockchain around the same time as theirs from the same polling station, which would obfuscate bad actor efforts to verify which ballots were cast by which voters when seeking to buy or coerce votes.

3. Low-tech solution: The digitally-signed, scanned-ballot datafile is stored in multiple competing  independent-stakeholder ballot blockchains (each redundantly backed up) that stakeholders centrally build/control (but are duplicated & validated in many places by members of the public to reveal any tampering), so there’s no possibility of a 51% attack.  This system instead uses the competitive nature of the stakeholders; comparison of their blockchains; and public and stakeholder validator computers (running opensource blockchain building software) to duplicate and check the integrity of the information on the blockchains.       


Alternatively, the digitally-signed, scanned-ballot datafile is stored with a third party blockchain database service that saves the scanned-ballot datafile itself or a link to the scanned-ballot datafile as a non-fungible token (NFT)—in either a layer-2 sidechain database of the Bitcoin blockchain database or a different third party Blockchain Database—that is already essentially invulnerable to a 51% attack. The Bitcoin blockchain is widely considered the most secure public blockchain in the world due to 1) its network size—it has the largest number of nodes/participants (tens of thousands) and enormous mining power securing it, which makes a 51% attack extremely difficult; 2) its simplicity—its design is simpler than many newer blockchains, reducing potential attack surfaces; 3) its maturity—it has operated since 2009 without a successful attack on its core protocol, despite over a decade of hacking efforts; and 4) its economic incentives—miners are financially motivated to secure the network honestly, since attacking it would be enormously costly and likely worthless.


Key Steps 
in PaperBallotchain

(Back to Contents)

Key Security Layers

in PaperBallotchain

(Back to Contents)

Security Layers that Ensure Voter Anonymity

Security Layers that Protect Ballot Integrity and Authenticity


Note: "Integrity" means the data has not been altered. 


Note: "Authenticity" means the data can be verified as coming from an expected source
(in this case, verified cryptographically by 1) a Ballot Public Key that determines whether the ballot digital signature (created from the Ballot Private Key) is valid and 2) a Scanner Public Key that determines whether the scanner digital signature (created from the stakeholder Scanner Private Key) is valid).

Key Records

in PaperBallotchain

(Back to Contents)