diff -r 6ba55ba5b588 -r 0db764174afb hws/hw02.tex --- a/hws/hw02.tex Fri Oct 10 15:49:23 2014 +0100 +++ b/hws/hw02.tex Fri Oct 10 16:14:55 2014 +0100 @@ -21,19 +21,21 @@ \item[$\Box$] Availability \end{itemize} +\item Explain how an attacker can use chain voting in order to + influence the outcome of a poll using paper ballots. -\item Explain how an attacker can use chain voting in order to influence the outcome of a -poll using paper ballots. - -\item Which of the following mechanisms help with defending against chain voting? Check all -that apply. Give a brief reason for each defence that mitigates chain voting attacks. +\item Which of the following mechanisms help with defending against + chain voting? Check all that apply. Give a brief reason for each + defence that mitigates chain voting attacks. \begin{itemize} \item[$\Box$] Using a glass ballot box to make it clear there are no ballots in the box before the start of the election. \item[$\Box$] Distributing ballots publicly before the election. \item[$\Box$] Checking that a voter's ID (drivers license, passport) matches the voter. -\item[$\Box$] Each ballot has a unique ID. When a voter is given a ballot, the ID is recorded. When the voter submits his or her ballot, this ID is checked against the record. +\item[$\Box$] Each ballot has a unique ID. When a voter is given a + ballot, the ID is recorded. When the voter submits his or her + ballot, this ID is checked against the record. \end{itemize} \item In the Estonian general election, votes can be cast via Internet