Comment What is the Security Architecture? (Score 3, Insightful) 65
I am not familiar with it, and I assume that so are you. So, fantasies...
There might be nonces or other tokens attached to a vote that must remain secret (proof of voting only once, etc.). Another use of encryption is avoiding claims along the lines "The results published by authorities are false! Here is the true copy which cannot be validated because dem computors are broken! But everyone knows that the copy is REALLY TRUE!" With the present system, if dem computors are broken, there cannot be any alternative results.
The architecture, BTW, must be a public knowledge, otherwise it cannot be trusted. I believe that you can find it somewhere if this is a matter of interest to you.