Putting the Human back in Voting Protocols (2006)

Author(s): Ryan PYA, Peacock T

    Abstract: Cryptographic voting schemes strive to provide high assurance of accuracy and secrecy with minimal trust assumptions, in particular, avoiding the need to trust software, hardware, suppliers, officials etc. Ideally we would like to make a voting process as transparent as possible and so base out assurance purely on the vigilance of the electorate at large, via suitable cryptographic algorithms and protocols. However, it is important to recognize that election systems are above all socio-technical systems: they must be usable by the electorate at large. As a result, it may be necessary to trade-off technical perfection against simplicity and usability. We illustrate this tension via design decisions in the Pr\^{e}t \`{a} Voter scheme.

      • Date: June 2006
      • Series Title: School of Computing Science Technical Report Series
      • Pages: 10
      • Institution: School of Computing Science, University of Newcastle upon Tyne
      • Publication type: Report
      • Bibliographic status: Published

      Keywords: voting protocols, socio-technical analysis

      Staff

      Professor Peter Ryan