Dilandu wrote:
Isolated network & quantum-based encryption. Each voter has his own tangled particles encryption pattern. No possible way to break without having access to one of two particles.
Congratulations on making a system that might be secure, but is impossible to audit by a lay person without a strong background in computer science, cryptography and information security.
The main security feature of paper ballots is that there are so few moving parts, and the movement is so simple, that you can secure an election using relatively trivial methods. To undermine a traditional election, you need to subvert dozens, probably hundreds and possibly thousands of people who all need to act in concert and who all need to know how to keep their mouths shut.
To undermine electronic voting systems, you only need to subvert a handful of people (to wit, anyone who's holding the encryption keys to the firmware or people with write access to the relevant source code repositories). One is a massive conspiracy. The other isn't. I, for one, think that small conspiracies have a much greater chance of success than large ones; therefore, making huge and unwieldy (and insecure) conspiracies necessary is a feature.