Browse by author
Lookup NU author(s): Professor Peter Ryan, Thea Peacock
Full text for this publication is not currently held within this repository. Alternative links are provided below where available.
Cryptographic voting schemes strive to provide high assurance of accuracy and secrecy with minimal trust assumptions, in particular, avoiding the need to trust software, hardware, suppliers, officials etc. Ideally we would like to make a voting process as transparent as possible and so base our assurance purely on the vigilance of the electorate at large, via suitable cryptographic algorithms and protocols. However, it is important to recognize that election systems are above all socio-technical systems: they must be usable by the electorate at large. As a result, it may be necessary to trade-off technical perfection against simplicity and usability. We illustrate this tension via design decisions in the Pret a Voter scheme.
Author(s): Ryan PYA, Peacock T
Editor(s): Christianson, B., Crispo, B., Malcolm, J.A., Roe, M.
Publication type: Conference Proceedings (inc. Abstract)
Publication status: Published
Conference Name: Security Protocols: 14th International Workshop on Security Protocols
Year of Conference: 2009
Pages: 13-19
ISSN: 0302-9743 (print) 1611-3349 (online)
Publisher: Springer
URL: http://dx.doi.org/10.1007/978-3-642-04904-0
DOI: 10.1007/978-3-642-04904-0
Library holdings: Search Newcastle University Library for this item
Series Title: Lecture Notes in Computer Science
ISBN: 9783642049033