A conventional approach to secret balloting in computer networks

  • Jing Jang Hwang*
  • *Corresponding author for this work

Research output: Contribution to journalJournal Article peer-review

3 Scopus citations

Abstract

Cryptography has been applied to ballot voting in computer networks. Several proposals satisfy the objectives of privacy protection and sound security management. Social acceptance is another challenge to meet if this application is to be moved from theory to practice. In this paper cryptographic instruments are inserted into the conventional secret-voting procedure: preparing, distributing, casting, accumulating, and tabulating ballot papers. The conventional approach has a better chance of gaining social acceptance due to adequate social controls. Moreover, the scheme removes the assumption of existent anonymous-communication channels necessary for implementing several previous proposals, while using cryptographic instruments which are intelligible to usual voters and officials.

Original languageEnglish
Pages (from-to)249-262
Number of pages14
JournalComputers and Security
Volume15
Issue number3
DOIs
StatePublished - 1996
Externally publishedYes

Keywords

  • Ballot's confidentiality
  • Computer networks
  • Cryptography
  • Digital signature
  • Electronic voting protocol
  • Group decision support systems
  • Social acceptance

Fingerprint

Dive into the research topics of 'A conventional approach to secret balloting in computer networks'. Together they form a unique fingerprint.

Cite this