RE: voting

2004-04-16 Thread Bill Frantz
One area we are not addressing in voting security is absentee ballots.  The
use of absentee ballots is rising in US elections, and is even being
advocated as a way for individuals to get a printed ballot in jurisdictions
which use electronic-only voting machines.  Political parties are
encouraging their supporters to vote absentee.  I believe that one election
in Oregon was recently held entirely with absentee ballots.

For classic polling place elections, one strength of an electronic system
which prints paper ballots is that there are two separate paths for the
counts.  The machine can keep its own totals and report them at the end of
the election.  These totals can then be compared with the totals generated
for that precinct by counting the paper ballots.  This redundancy seems to
me to provide higher security than either system alone.

Cheers - Bill


-
Bill Frantz| There's nothing so clear as a | Periwinkle
(408)356-8506  | vague idea you haven't written | 16345 Englewood Ave
www.pwpconsult.com | down yet. -- Dean Tribble | Los Gatos, CA 95032


-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


RE: voting

2004-04-16 Thread Trei, Peter
 Ed Gerck[SMTP:[EMAIL PROTECTED]
 
 John Kelsey wrote:
  
  At 11:05 AM 4/9/04 -0400, Trei, Peter wrote:
  
  1. The use of receipts which a voter takes from the voting place to
 'verify'
  that their vote was correctly included in the total opens the way for
 voter
  coercion.
  
  I think the VoteHere scheme and David Chaum's scheme both claim to solve
  this problem.  The voting machine gives you a receipt that convinces you
  (based on other information you get) that your vote was counted as cast,
  but which doesn't leak any information at all about who you voted for to
  anyone else.  Anyone can take that receipt, and prove to themselves that
  your vote was counted (if it was) or was not counted (if it wasn't). 
 
 The flaw in *both* cases is that it reduces the level of privacy
 protection
 currently provided by paper ballots.
 
 Currently, voter privacy is absolute in the US and does not depend
 even on the will of the courts. For example,  there is no way for a
 judge to assure that a voter under oath is telling the truth about how
 they voted, or not. This effectively protects the secrecy of the ballot
 and prevents coercion and intimidation in all cases.
 
 
I'd pretty much dropped this topic after it became clear that Mr. Leichter's
only response to the problems that people pointed out in VoteHere's
scheme (in particular, its vulnerability to vote coercion, and lack of
recountability) was to attempt to redefine them as non-problems. 
However, since the topic has arisen again.

Ed's got a very good point. I always prefer security which relies for
its integrity on the laws of nature, rather than on people behaving
with integrity.

Peter Trei






-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: eCompute ECC2-109 Project has PROBABLE solution (now official)

2004-04-16 Thread Anne Lynn Wheeler
At 11:24 PM 4/8/2004, Anne  Lynn Wheeler wrote:
http://www.ecompute.org/ecc2/
it is now official

eCompute ECC2-109 Project

We have received unofficial  OFFICIAL word that the solution is valid!

As a result, the DP server has been closed and we’re working on finalizing 
the final stats. No further DP values will be accepted and the DP server 
will remain closed.

A little later today we’ll be posting complete information regarding the 
solution, some project stats, and other final information. Until then…

We wish to thank everyone who has contributed to this project. With your 
help, it was a success. Without your help, it never could have happened!

The solution was achieved through a collision of points provided by:

  glenon from Ars Technica Team Vodka Martini

Maximum_Confusion from TechIMO

The following was written by Chris Monico to describe the solution achieved.

... snip ..





--
Anne  Lynn Wheelerhttp://www.garlic.com/~lynn/
Internet trivia 20th anv http://www.garlic.com/~lynn/rfcietff.htm
  

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]