Logo - springer
Slogan - springer

Computer Science - Security and Cryptology | Towards Trustworthy Elections - New Directions in Electronic Voting

Towards Trustworthy Elections

New Directions in Electronic Voting

Chaum, D., Jakobsson, M., Rivest, R.L., Ryan, P., Benaloh, J., Kutylowski, M., Adida, B. (Eds.)

2010, VIII, 403p. 60 illus..

Available Formats:

Springer eBooks may be purchased by end-customers only and are sold without copy protection (DRM free). Instead, all eBooks include personalized watermarks. This means you can read the Springer eBooks across numerous devices such as Laptops, eReaders, and tablets.

You can pay for Springer eBooks with Visa, Mastercard, American Express or Paypal.

After the purchase you can directly download the eBook file or read it online in our Springer eBook Reader. Furthermore your eBook will be stored in your MySpringer account. So you can always re-download your eBooks.


(net) price for USA

ISBN 978-3-642-12980-3

digitally watermarked, no DRM

Included Format: PDF

download immediately after purchase

learn more about Springer eBooks

add to marked items


Softcover (also known as softback) version.

You can pay for Springer Books with Visa, Mastercard, American Express or Paypal.

Standard shipping is free of charge for individual customers.


(net) price for USA

ISBN 978-3-642-12979-7

free shipping for individuals worldwide

The book title is in reprint. You can already preorder it.

add to marked items

  • Up-to-date survey of research work on electronic voting
  • Discusses the problems and challenges of finding practical tools for secure electronic elections
  • Presents real-world findings on voting security
For many years now, cryptography has been keeping messages secure for senders, irrespective of the routing to the destination. This same technology can be used to keep votes secure for voters, from the casting of the vote all the way through to the inclusion of the vote in the final tally. This state-of-the-art survey addresses the challenges faced in establishing a trustworthy electronic voting system. The 24 contributions included in the volume were carefully reviewed and selected from the presentations given during a series of workshops on trustworthy elections held over the last decade. Topics addresses range from foundational and theoretical aspects to algorithms and systems issues, as well as applications in various fields.

Content Level » Research

Keywords » Internet - Routing - algorithms - anonymity - cryptography - electronic voting - privacy - secret ballot - security - trust - trustworthy elections - uncontrolled voting platform - voting security

Related subjects » Communication Networks - Database Management & Information Retrieval - General Issues - Security and Cryptology - Software Engineering - Theoretical Computer Science

Table of contents 

The Witness-Voting System.- Coercion-Resistant Electronic Elections.- Receipt-Free K-out-of-L Voting Based on ElGamal Encryption.- A Secure Architecture for Voting Electronically (SAVE).- A Modular Voting Architecture (“Frog Voting”).- Unconditionally Secure Electronic Voting.- Electronic Elections: A Balancing Act.- An Implementation of a Mix-Net Based Network Voting Scheme and Its Use in a Private Organization.- The Vector-Ballot Approach for Online Voting Procedures.- On Optical Mark-Sense Scanning.- On Some Incompatible Properties of Voting Schemes.- A Threat Analysis of Prêt à Voter.- Anonymity in Voting Revisited.- Anonymous One-Time Broadcast Using Non-interactive Dining Cryptographer Nets with Applications to Voting.- An Introduction to PunchScan.- Component Based Electronic Voting Systems.- A Verifiable Voting Protocol Based on Farnel.- Verifying Privacy-Type Properties of Electronic Voting Protocols: A Taster.- Improving Remote Voting Security with CodeVoting.- A Practical and Secure Coercion-Resistant Scheme for Internet Voting.- Scratch, Click & Vote: E2E Voting over the Internet.- Securing Optical-Scan Voting.- Attacking Paper-Based E2E Voting Systems.- Aperio: High Integrity Elections for Developing Countries.

Popular Content within this publication 



Read this Book on Springerlink

Services for this book

New Book Alert

Get alerted on new Springer publications in the subject area of Data Encryption.