University of Surrey

Test tubes in the lab Research in the ATI Dance Research

Verifiable Voting Systems

Peacock, T, Ryan, PYA, Schneider, S and Xia, Z (2013) Verifiable Voting Systems Computer and Information Security Handbook. pp. 1103-1125.

[img]
Preview
Text
VVS2013.pdf - ["content_typename_UNSPECIFIED" not defined]
Available under License : See the attached licence file.

Download (599kB) | Preview
[img]
Preview
PDF (licence)
SRI_deposit_agreement.pdf
Available under License : See the attached licence file.

Download (33kB) | Preview

Abstract

The introduction of technology into voting systems can bring a number of benefits, such as improving accessibility, remote voting, and efficient, accurate processing of votes. A voting system that uses electronic technology in any part of processing the votes, from vote capture and transfer through to vote tallying, is known as an e-voting system. In addition to the undoubted benefits, the introduction of such technology introduces particular security challenges, some of which are unique to voting systems because of their specific nature and requirements. The key role that voting systems play in democratic elections means that such systems must not only be secure and trustworthy, but must be seen by the electorate to be secure and trustworthy. This chapter emphasizes the challenge to reconcile the secrecy of the ballot, with demonstrable correctness of the result. © 2013 Copyright © 2013 Elsevier Inc. All rights reserved.

Item Type: Article
Divisions : Faculty of Engineering and Physical Sciences > Computing Science
Authors :
AuthorsEmailORCID
Peacock, TUNSPECIFIEDUNSPECIFIED
Ryan, PYAUNSPECIFIEDUNSPECIFIED
Schneider, SUNSPECIFIEDUNSPECIFIED
Xia, ZUNSPECIFIEDUNSPECIFIED
Date : 2013
Identification Number : 10.1016/B978-0-12-394397-2.00069-6
Additional Information : NOTICE: this is the author’s version of a work that was accepted for publication in Computer and Information Security Handbook. Changes resulting from the publishing process, such as peer review, editing, corrections, structural formatting, and other quality control mechanisms may not be reflected in this document. Changes may have been made to this work since it was submitted for publication. A definitive version was subsequently published in Computer and Information Security Handbook, 2nd Ed. 2013 DOI 10.1016/B978-0-12-394397-2.00069-6.
Depositing User : Symplectic Elements
Date Deposited : 25 Apr 2014 15:34
Last Modified : 09 Jun 2014 13:58
URI: http://epubs.surrey.ac.uk/id/eprint/805393

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year


Information about this web site

© The University of Surrey, Guildford, Surrey, GU2 7XH, United Kingdom.
+44 (0)1483 300800