Toggle Main Menu Toggle Search

Open Access padlockePrints

Putting the human back in voting protocols

Lookup NU author(s): Professor Peter Ryan, Thea Peacock


Full text for this publication is not currently held within this repository. Alternative links are provided below where available.


Cryptographic voting schemes strive to provide high assurance of accuracy and secrecy with minimal trust assumptions, in particular, avoiding the need to trust software, hardware, suppliers, officials etc. Ideally we would like to make a voting process as transparent as possible and so base our assurance purely on the vigilance of the electorate at large, via suitable cryptographic algorithms and protocols. However, it is important to recognize that election systems are above all socio-technical systems: they must be usable by the electorate at large. As a result, it may be necessary to trade-off technical perfection against simplicity and usability. We illustrate this tension via design decisions in the Prêt à Voter scheme. © 2009 Springer-Verlag Berlin Heidelberg.

Publication metadata

Author(s): Ryan P, Peacock T

Publication type: Conference Proceedings (inc. Abstract)

Publication status: Published

Conference Name: Security Protocols: 14th International Workshop

Year of Conference: 2009

Pages: 13-19

ISSN: 0302-9743 (Print) 1611-3349 (Online)

Publisher: Springer


DOI: 10.1007/978-3-642-04904-0_3

Library holdings: Search Newcastle University Library for this item

Series Title: Lecture Notes in Computer Science

ISBN: 9783642049033