A comparative overview of cryptographic voting protocols

A comparative overview of cryptographic voting protocols

0.00 Avg rating0 Votes
Article ID: iaor19993067
Country: Netherlands
Volume: 84
Issue: 1
Start Page Number: 29
End Page Number: 43
Publication Date: Dec 1998
Journal: Annals of Operations Research
Authors: ,
Keywords: voting
Abstract:

We shall deal with cryptosystems based on public-key cryptography and their applications to secret ballot elections. Six secret balloting schemes are discussed. These are compared with respect to criteria related to the possibility of voters to check that their votes have been correctly assigned, to the vulnerability of the protocols to electoral fraud of various sorts, and to the vulnerability of protocols to vote selling.

Reviews

Required fields are marked *. Your email address will not be published.