Cryptographic voting — a gentle introduction

6Citations
Citations of this article
39Readers
Mendeley users who have this article in their library.
Get full text

Abstract

These lecture notes survey some of the main ideas and techniques used in cryptographic voting systems. The write-up is geared towards readers with little knowledge of cryptography and it focuses on the broad principles that guide the design and analysis of cryptographic systems, especially the need for properly designed security models. We use a system proposed by Fujioka, Okamoto and Ohta as starting example to introduce some basic building blocks and desirable security properties. We then slowly build towards a comprehensive description of the Helios voting system, one of the few systems deployed in practice and briefly discuss a few of its security properties.

Cite

CITATION STYLE

APA

Bernhard, D., & Warinschi, B. (2014). Cryptographic voting — a gentle introduction. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8604, 167–211. https://doi.org/10.1007/978-3-319-10082-1_7

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free