Article ID: | iaor19993067 |
Country: | Netherlands |
Volume: | 84 |
Issue: | 1 |
Start Page Number: | 29 |
End Page Number: | 43 |
Publication Date: | Dec 1998 |
Journal: | Annals of Operations Research |
Authors: | Nurmi Hannu, Salomaa Arto |
Keywords: | voting |
We shall deal with cryptosystems based on public-key cryptography and their applications to secret ballot elections. Six secret balloting schemes are discussed. These are compared with respect to criteria related to the possibility of voters to check that their votes have been correctly assigned, to the vulnerability of the protocols to electoral fraud of various sorts, and to the vulnerability of protocols to vote selling.