[15279] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Firm invites experts to punch holes in ballot software

daemon@ATHENA.MIT.EDU (R. Hirschfeld)
Fri Apr 9 11:17:45 2004

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Fri, 9 Apr 2004 02:38:21 +0200
From: "R. Hirschfeld" <ray@unipay.nl>
To: iang@systemics.com
Cc: ptrei@rsasecurity.com, mv@cdc.gov, cryptography@metzdowd.com,
	cypherpunks@al-qaeda.net
In-reply-to: <407459B7.2030609@systemics.com> (message from Ian Grigg on Wed,
	07 Apr 2004 15:42:47 -0400)
Reply-To: ray@unipay.nl

> Date: Wed, 07 Apr 2004 15:42:47 -0400
> From: Ian Grigg <iang@systemics.com>
> 
> It seems to me that the requirement for after-the-vote
> verification ("to prove your vote was counted") clashes
> rather directly with the requirement to protect voters
> from coercion ("I can't prove I voted in a particular
> way.") or other incentives-based attacks.
> 
> You can have one, or the other, but not both, right?

What you can have is for the voter to be able to verify that his/her
vote was properly counted without being able to prove it to anybody
else.

In that case, an individual claim that a vote was improperly counted
wouldn't be convincing, but a wide enough outcry might trigger a
recount.

I think this would add unnecessary and undesired complexity to a
political election voting system, though.

Ray

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post