Security against malicious hardware and software used by a voter %TT is due to the fact that a voter's computer does not get any knowledge about the voter's choice. Moreover, it can change successfully a voter's ballot only with a small probability.
As a side result, we present a modification of the ThreeBallot that eliminates Strauss'-like attacks on this scheme.
Category / Keywords: cryptographic protocols / electronic voting, election schemes, bit commitment, oblivious transfer Date: received 20 Jul 2008, last revised 23 Oct 2008 Contact author: filipz at im pwr wroc pl Available format(s): PDF | BibTeX Citation Note: New, simplified version of the protocol. Version: 20081023:123657 (All versions of this report) Short URL: ia.cr/2008/314 Discussion forum: Show discussion | Start new discussion