Description
A computer scientist asked via email:
If possible I'd like to get clarification on these points today. Can you explain what has replaced the Benaloh challenge?
In looking about your conops.md (and similarly on other documents), it looks like after the voter chooses "check" and does the flow through "receive ballot checking code" ... "view passkey" ... etc., they can then submit that ballot. My specific questions are:
-
How does the fact that "Passkeys Match" prove to the voter that the encrypted ballot contains the votes they intended?
-
Can the voter prove to someone else how they voted by replaying the trace (including data such as submission hash, BCA public key, randomizers, etc?
2a. If the answer is yes, then doesn't this lose the "strong secret ballot" property of the Benaloh challenge, that even with the collusion of the voter, the voter can't prove how they voted?
2b. If no (if for example in step 12 of "8.4 Voter Ballot Check Sequence" the randomizers are not known to the voter), then doesn't that mean the voter has to the software and cannot really repeat all the steps using independent software?