Beyond Prêt à Voter
Peter Y. A. Ryan (University of Newcastle)
I will briefly outline the key ingredients of the Prêt à Voter voter-verifiable scheme. I then describe some extensions such as the use of re-encryption mixes in place of the decryption mixes and adaptations to the remote voting context. I will then discuss some of the weak spots in the current scheme, including:
I will outline some possible countermeasures to these threats.
The need to trust “The Authority” that generated the ballot forms to keep to the ballot form information secret.
Vulnerability to chain-voting attacks
The need to ensure the destruction of the LH strips (candidate list) after the voter selection has been made.