next up previous
Next: Voting and Tallying Protocol Up: Protocols Previous: Registration Protocol

Tallying Key Submission Protocol

In this protocol, the voters submit tallier T their tallying keys attached by the signature blindly signed by authority A. Hereafter, the tallying keys will be used to verify the validity of ballots.
Voter:

  1. Sends to the tallier T: tex2html_wrap_inline340 .

Tallier T:

  1. Checks the authenticity of V's tallying key by computing:

    displaymath336

  2. If the equation holds, the tallying key, tex2html_wrap_inline346 , is authorized.

Note: At the deadline of submission, tallier publishes all the authorized tallying keys.



Qi He
Thu Dec 25 16:06:46 EST 1997