EconPapers    
Economics at your fingertips  
 

A comparative overview ofcryptographic voting protocols

Hannu Nurmi and Arto Salomaa

Annals of Operations Research, 1998, vol. 84, issue 0, 29-43

Abstract: We shall deal with cryptosystems based on public-key cryptography and their applications to secret ballot elections. Six secret balloting schemes are discussed. These are compared with respect to criteria related to the possibility of voters to check that their votes have been correctly assigned, to the vulnerability of the protocols to electoral fraud of various sorts, and to the vulnerability of protocols to vote selling. Copyright Kluwer Academic Publishers 1998

Date: 1998
References: Add references at CitEc
Citations:

Downloads: (external link)
http://hdl.handle.net/10.1023/A:1018945021759 (text/html)
Access to full text is restricted to subscribers.

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:spr:annopr:v:84:y:1998:i:0:p:29-43:10.1023/a:1018945021759

Ordering information: This journal article can be ordered from
http://www.springer.com/journal/10479

DOI: 10.1023/A:1018945021759

Access Statistics for this article

Annals of Operations Research is currently edited by Endre Boros

More articles in Annals of Operations Research from Springer
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().

 
Page updated 2025-03-20
Handle: RePEc:spr:annopr:v:84:y:1998:i:0:p:29-43:10.1023/a:1018945021759