Please read the links I referenced, especially the ADDER paper.<div>The current proposals for secret electronic voting are usually based on zero-knowledge proofs, homomorphic addition and plain old assymetric cryptography, which even give you options to check the results thereof and can perfectly calculate it's reliability (if you leave out the social engineering part).</div>
<div>I'm not a proponent of electronic voting. I rather play the advocatus diaboli to that as I assume that they will be common one day or another.</div><div><br></div><div>-pat</div><div><br><div class="gmail_quote">
On Fri, Jul 13, 2012 at 11:17 AM, Justus Römeth <span dir="ltr"><<a href="mailto:squig@dfpx.de" target="_blank">squig@dfpx.de</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
<div class="im"><div class="gmail_quote">On Fri, Jul 13, 2012 at 2:19 AM, Richard Stallman <span dir="ltr"><<a href="mailto:rms@gnu.org" target="_blank">rms@gnu.org</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
<div>For traditional voting systems, we have some idea of how</div>
vulnerable they are -- from simple experience. For new proposed<br>
computerized systems, we don't have experience to go by.<br>
They are surely less than 100% reliable, but are they<br>
less than 10% reliable? We don't know, and actually using<br>
them gives us little information, since we cannot check<br>
the official results they give.</blockquote></div><br></div><div>I would argue that we can, if we have non-secret voting, so e-voting is 'only' unusable in votes where we do not want people to be able to track our votes (which are the more important votes, obviously).</div>
</blockquote></div><br></div>