A comparative overview ofcryptographic voting protocols
Hannu Nurmi and
Arto Salomaa
Annals of Operations Research, 1998, vol. 84, issue 0, 29-43
Abstract:
We shall deal with cryptosystems based on public-key cryptography and their applications to secret ballot elections. Six secret balloting schemes are discussed. These are compared with respect to criteria related to the possibility of voters to check that their votes have been correctly assigned, to the vulnerability of the protocols to electoral fraud of various sorts, and to the vulnerability of protocols to vote selling. Copyright Kluwer Academic Publishers 1998
Date: 1998
References: Add references at CitEc
Citations:
Downloads: (external link)
http://hdl.handle.net/10.1023/A:1018945021759 (text/html)
Access to full text is restricted to subscribers.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:spr:annopr:v:84:y:1998:i:0:p:29-43:10.1023/a:1018945021759
Ordering information: This journal article can be ordered from
http://www.springer.com/journal/10479
DOI: 10.1023/A:1018945021759
Access Statistics for this article
Annals of Operations Research is currently edited by Endre Boros
More articles in Annals of Operations Research from Springer
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().