Encryption

Encrypted Receipts for Voter-Verified Elections Using Homomorphic Encryption

Working Paper No.: 
41
Date Published: 
11/30/2008
Author(s): 
Joy Forsythe
Voters are now demanding the ability to verify that their votes are cast and counted as intended. Most existing cryptographic election protocols do not treat the voter as a computationally-limited entity separate from the voting booth, and therefore do not ensure that the voting booth records the correct vote. David Chaum and Andrew Neff have proposed mixnet schemes that do provide this assurance, but little research has been done that combines voter verification with homomorphic encryption.

Encrypted Receipts for Voter-Verified Elections Using Homomorphic Encryption

Date Published: 
11/30/2008
Author(s): 
Joy Forsythe
Voters are now demanding the ability to verify that their votes are cast and counted as intended. Most existing cryptographic election protocols do not treat the voter as a computationally-limited entity separate from the voting booth, and therefore do not ensure that the voting booth records the correct vote. David Chaum and Andrew Neff have proposed mixnet schemes that do provide this assurance, but little research has been done that combines voter verification with homomorphic encryption.
Subscribe to RSS - Encryption