1. Manthan Topic: Fairness at Play
Vote From Wherever You Are
“Innovating Democracy”
Rishi Bhutada (Team Co-ordinator)
Kunal Patil Suraj Jachak
Pankaj Jadhav Kunal Kashelani
2. Voting Statistics in India of last 8
Lok Sabha Elections
You can clearly see that the voting percentage is just only
HALF of the population is towards the success of democracy.
3. Reasons for less voting percentage
in India
1. Students going their home constituency for studies and
jobs.(The Youth of India who have miss this procedure)
2. Temporary Migration of working people from time to time.
3. Some people don’t go to vote as they feel searching their
respective centers and standing in the queue tedious and
lazy.
4. Some people move permanently from their respective
constituency to new constituency but don’t get registration
of new constituency in time.(Ex. Married women, some
working people)
4. Our Model For Electoral Reforms
Proposed System
On the day of elections, any person at any city, town or village will go
to the nearest and convenient polling booth to cast his/her vote.
The person can show his/her Aadhar Card with any other identity
proof.
From his/her UID system will recognize person’s constituency and
with respect to that he will be provided with the candidates
contesting election from that respective constituency.
On the basis of these options he/she will cast his vote and this vote of
his/her will be stored automatically to that respective constituency's
database.
Also there will be a website continuously showing brief details of
candidate contesting elections at all constituency.
5. Protection of the votes:
-Protection of partial results
-Integrity of the ballot box
-Fully auditable results
-Universal verifiability
Protection against
internal attacks
(End-to-end security
from the voter to the
Electoral Board)
Electoral Board
Voter at any polling booth
Digital ballot box
End-to-end security
System
Administrator
State of the art E-Voting security:
-Cast as Intended
-Recorded as Cast
-Counted as Cast
-Voter self verification
-Voter privacy
-Zero trust Client
Our Model For Electoral Reforms
6. Technical view of our model
Network encryption:
Voting options are only encrypted while transmitted over the network but processed in
clear at the voting server: they are vulnerable to attackers that have access to the server.
High Risk: Voter privacy compromise, vote tampering, intermediate results and voter
coercion
Application level encryption:
Voting options are encrypted at the voting terminal and remain encrypted until the
electoral board decrypts them: they are not vulnerable to server attacks.
Low Risk: Voter privacy compromise, vote tampering, intermediate results and voter
coercion
7. Economies of scale:
Avoiding elevated storage
and maintenance costs
Allowing to reuse existing
infrastructure
Eliminating printing,
postage & mailing costs
The use of remote
electronic voting
technologies is the ultimate
answer to voter
enfranchisement, allowing
overseas and remotely
located voters to exercise
their right to vote.
Cost-effective Speed Enfranchisement
Speed-up the counting
process by electronically
receiving the results from
all the polling places,
automatically consolidate
them and assign the
corresponding
mandates.
Impact of this Model
8. Benefits
1. Straightforward increase in percentage on voting.
2. Help to save time and money of individuals.
3. Lead towards fair competition between contestants of
election.
4. Very easy to get brief and every minute statistics of the
election very easily.
5. Police department will be very relived as it will be a very
easy to give security as there will be only one database
which will save all the votes, police department will have a
less tedious job than what it is today.
6. No one can misuse the voting process by offering a
computer (voting point) to derive profit from it.
7. Improves the dissemination of information to the public .
8. Increases transparency and public outreach.
9. Advanced tamper-proof
security measures using
ground-breaking and
highly advanced
cryptography to prevent
attacks from anyone,
including hackers or
system administrators
with privileged access.
Can be audited by
independent experts
before, during and after
the election day.
Voters are provided with
a voting receipt that
allows them to check
that their vote has been
counted.
Votes are encrypted in
the voters' voting device
before they are cast. Only
the Electoral Board can
decrypt the votes. The
decryption of the votes is
carried out by breaking
the correlation between
the voters' identity and
their vote.
Integrity Auditability Privacy
Benefits
10. Challenges and Risks
1. To provide Aadhar cards to all valid voters of India.
2. To provide uninterrupted internet facility in all rural and
remote areas.
3. Spread awareness and knowledge regarding new systems
among all the voters specially to illiterate and poor people.
4. To train all the Election Commission officials regarding the
new system.
5. To prevent database and networks from hackers and other
anti social elements.
6. To maintain the integrity of the database where casted votes
are stored.
11. References
• Report of the national election watch and association for
democratic reforms: ANALYSIS OF CRIMINAL AND FINANCIAL
DETAILS MPs OF 15th LOK SABHA(2009).
Websites:
• http://www.idea.int/vt/countryview.cfm?id=105
(IDEA-Institute for Democracy and Electoral Assistance)
• Wikipedia- http://en.wikipedia.org/wiki/Electoral_reform