Skip to main content
Log in

A comparative overview ofcryptographic voting protocols

  • Published:
Annals of Operations Research Aims and scope Submit manuscript

Abstract

We shall deal with cryptosystems based on public-key cryptography and their applications to secret ballot elections. Six secret balloting schemes are discussed. These are compared with respect to criteria related to the possibility of voters to check that their votes have been correctly assigned, to the vulnerability of the protocols to electoral fraud of various sorts, and to the vulnerability of protocols to vote selling.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. J. Benaloh, Verifiable secret-ballot elections, Technical Report 561, Computer Science Department, Yale University, 1987.

  2. J. Benaloh and D. Tuinstra, Receipt-free secret-ballot elections, in: Proceedings STOC-94, 1994, pp. 544–553.

  3. D. Chaum, Untraceable electronic mail, return addresses, and digital pseudonyms, Communications of the ACM 24(1981)84–88.

    Article  Google Scholar 

  4. D. Chaum, Elections with unconditionally-secret ballots and disruption equivalent to breaking RSA, in: Advances in Cryptology – EUROCRYPT '88, ed. C. Gunther, Lecture Notes in Computer Science, vol. 330, Springer, Berlin, 1988, pp. 177–182.

    Google Scholar 

  5. J.D. Cohen and M.J. Fischer, A robust and verifiable cryptographically secure election scheme, extended abstract, Technical Report YALEU/DCS/TR-454, Yale University, 1985.

  6. W. Diffie and M. Hellman, New directions in cryptography, IEEE Transactions on Information Theory IT-22(1976)644–654.

    Article  Google Scholar 

  7. K.R. Iversen, A cryptographic scheme for computerized general elections, in: Advances in Cryptology – Crypto '91, Lecture Notes in Computer Science, vol. 718, Springer, Berlin, 1992, pp. 405–419.

    Google Scholar 

  8. H. Moulin, The Strategy of Social Choice, North-Holland, 1983

  9. V. Niemi and A. Renvall, Efficient voting with no selling of votes, manuscript, 1996.

  10. H. Nurmi and A. Salomaa, A cryptographic approach to the secret ballot, Behavioral Science 36 (1991)34–40.

    Google Scholar 

  11. H. Nurmi and A. Salomaa, Secret ballot elections and public-key cryptosystems, European Journal of Political Economy 8(1992)295–303.

    Article  Google Scholar 

  12. H. Nurmi and A. Salomaa, Cancellation and reassignment of votes in secret ballot elections, European Journal of Political Economy 9(1993)427–435.

    Article  Google Scholar 

  13. H. Nurmi, A. Salomaa and L. Santean, Secret ballot elections in computer networks, Computers & Security 10(1991)553–560.

    Article  Google Scholar 

  14. B. Peleg, Game-Theoretic Analysis of Voting in Committees, Cambridge University Press, 1984.

  15. A. Renvall, Cryptographic protocols and techniques for communication, Doctoral Dissertation, University of Turku, 1994.

  16. R. Rivest, A. Shamir and L. Adleman, A method for obtaining digital signatures and public-key cryptosystems, ACM Communications 21(1978)120–126.

    Article  Google Scholar 

  17. A. Salomaa, Computation and Automata, Cambridge University Press, 1985.

  18. A. Salomaa, Public-Key Cryptography, Springer, Berlin/Heidelberg/New York, 1990.

    Google Scholar 

  19. A. Salomaa and L. Santean, Secret selling of secrets with many players, EATCS Bulletin 42(1990) 178–186.

    Google Scholar 

  20. A. Shamir, How to share a secret, Communications of the ACM 22(1979)612–613.

    Article  Google Scholar 

Download references

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

Nurmi, H., Salomaa, A. A comparative overview ofcryptographic voting protocols. Annals of Operations Research 84, 29–43 (1998). https://doi.org/10.1023/A:1018945021759

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1023/A:1018945021759

Keywords

Navigation