Toggle Main Menu Toggle Search

Open Access padlockePrints

Putting the Human Back in Voting Protocols

Lookup NU author(s): Professor Peter Ryan, Thea Peacock

Downloads

Full text for this publication is not currently held within this repository. Alternative links are provided below where available.


Abstract

Cryptographic voting schemes strive to provide high assurance of accuracy and secrecy with minimal trust assumptions, in particular, avoiding the need to trust software, hardware, suppliers, officials etc. Ideally we would like to make a voting process as transparent as possible and so base our assurance purely on the vigilance of the electorate at large, via suitable cryptographic algorithms and protocols. However, it is important to recognize that election systems are above all socio-technical systems: they must be usable by the electorate at large. As a result, it may be necessary to trade-off technical perfection against simplicity and usability. We illustrate this tension via design decisions in the Pret a Voter scheme.


Publication metadata

Author(s): Ryan PYA, Peacock T

Editor(s): Christianson, B., Crispo, B., Malcolm, J.A., Roe, M.

Publication type: Conference Proceedings (inc. Abstract)

Publication status: Published

Conference Name: Security Protocols: 14th International Workshop on Security Protocols

Year of Conference: 2009

Pages: 13-19

ISSN: 0302-9743 (print) 1611-3349 (online)

Publisher: Springer

URL: http://dx.doi.org/10.1007/978-3-642-04904-0

DOI: 10.1007/978-3-642-04904-0

Library holdings: Search Newcastle University Library for this item

Series Title: Lecture Notes in Computer Science

ISBN: 9783642049033


Share