Skip to content

clarifications about ballot checking that is not a Benaloh challenge #4

@kiniry

Description

@kiniry

Description

A computer scientist asked via email:

If possible I'd like to get clarification on these points today. Can you explain what has replaced the Benaloh challenge?

In looking about your conops.md (and similarly on other documents), it looks like after the voter chooses "check" and does the flow through "receive ballot checking code" ... "view passkey" ... etc., they can then submit that ballot. My specific questions are:

  1. How does the fact that "Passkeys Match" prove to the voter that the encrypted ballot contains the votes they intended?

  2. Can the voter prove to someone else how they voted by replaying the trace (including data such as submission hash, BCA public key, randomizers, etc?
    2a. If the answer is yes, then doesn't this lose the "strong secret ballot" property of the Benaloh challenge, that even with the collusion of the voter, the voter can't prove how they voted?
    2b. If no (if for example in step 12 of "8.4 Voter Ballot Check Sequence" the randomizers are not known to the voter), then doesn't that mean the voter has to the software and cannot really repeat all the steps using independent software?

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions