Browse by author
Lookup NU author(s): Professor Peter Ryan, Thea Peacock
Full text for this publication is not currently held within this repository. Alternative links are provided below where available.
Cryptographic voting schemes strive to provide high assurance of accuracy and secrecy with minimal trust assumptions, in particular, avoiding the need to trust software, hardware, suppliers, officials etc. Ideally we would like to make a voting process as transparent as possible and so base our assurance purely on the vigilance of the electorate at large, via suitable cryptographic algorithms and protocols. However, it is important to recognize that election systems are above all socio-technical systems: they must be usable by the electorate at large. As a result, it may be necessary to trade-off technical perfection against simplicity and usability. We illustrate this tension via design decisions in the Prêt à Voter scheme. © 2009 Springer-Verlag Berlin Heidelberg.
Author(s): Ryan P, Peacock T
Publication type: Conference Proceedings (inc. Abstract)
Publication status: Published
Conference Name: Security Protocols: 14th International Workshop
Year of Conference: 2009
Pages: 13-19
ISSN: 0302-9743 (Print) 1611-3349 (Online)
Publisher: Springer
URL: http://dx.doi.org/10.1007/978-3-642-04904-0_3
DOI: 10.1007/978-3-642-04904-0_3
Library holdings: Search Newcastle University Library for this item
Series Title: Lecture Notes in Computer Science
ISBN: 9783642049033