Author(s): Ryan PYA, Peacock T
Abstract: We discuss some vulnerabilities, threats and counter-measures for voter-verifiable, cryptographic election schemes: Chaum , Neff  and Pret a Voter schemes . Our analysis shows that such schemes are potentially prey to a wide variety of threats, both technical and socio-technical. On the other hand, counter-measures can be deployed to all the threats identified. This paper strives to take initial steps towards a more systematic threat analysis for such schemes. We briefly address the issue of how to ensure such threat analyses are as systematic and complete as possible.
Keywords: cryptographic voting schemes, threat analysis