Abstract
Cryptography has been applied to ballot voting in computer networks. Several proposals satisfy the objectives of privacy protection and sound security management. Social acceptance is another challenge to meet if this application is to be moved from theory to practice. In this paper cryptographic instruments are inserted into the conventional secret-voting procedure: preparing, distributing, casting, accumulating, and tabulating ballot papers. The conventional approach has a better chance of gaining social acceptance due to adequate social controls. Moreover, the scheme removes the assumption of existent anonymous-communication channels necessary for implementing several previous proposals, while using cryptographic instruments which are intelligible to usual voters and officials.
| Original language | English |
|---|---|
| Pages (from-to) | 249-262 |
| Number of pages | 14 |
| Journal | Computers and Security |
| Volume | 15 |
| Issue number | 3 |
| DOIs | |
| State | Published - 1996 |
| Externally published | Yes |
Keywords
- Ballot's confidentiality
- Computer networks
- Cryptography
- Digital signature
- Electronic voting protocol
- Group decision support systems
- Social acceptance