Now we see that the most straightforward way of casting may be that the
voters sign their ballots with their voting key and submit their ballots
with the signature.
Here, however, we divide the voting and tallying phase into two
sub-phases, as mentioned in section 2. Instead of send the ballots
directly, voters
just submit encrypted ballots with a signature in the first sub-phase.
Before the voters submit their keys to decrypt the encrypted ballots, the
tallier publishes all the encrypted ballots with the attached signatures,
so that every voter can
check whether his or her ballot has been counted. Thus voters would have
a chance to correct miscounted ballots without revealing the ballot.
Voter V:
Tallier T:
Voter V:
to the election community.
Note: If no ballot is miscounted, the protocol continues to the next sub-phase.
Voter V:
Tallier T:
for universal verification.