next up previous
Next: Unreusability and Unduplicatability Up: Security Observation Previous: Security Observation

Eligibility, Verifiability and Unchangeability

With the public key of the authority, the authenticity of every tallying key is verified in 3.2 by checking the signature on it. And from 3.3, with the published validated tallying keys, the signatures on encrypted ballot tex2html_wrap_inline402 , and on key tex2html_wrap_inline404 can also be verified universally, especially by the tallier. So, only the voters who hold the validated voting keys, of which the corresponding tallying keys are signed by the authority in registration phase, can cast valid ballots.
Without the voting key tex2html_wrap_inline406 , none can change the ballot associated with the corresponding published tallying key tex2html_wrap_inline408 , unless voter V who holds tex2html_wrap_inline412 want to change his or her mind in voting period if the election policy allow voters to change their minds within a certain period of time. Miscounting a ballot can will be discovered by the voter in 3.3 without revealing the ballot.
Moreover, since the validated tallying keys are published, none can cast votes for abstaining voters.



Qi He
Thu Dec 25 16:06:46 EST 1997