University of Surrey

Test tubes in the lab Research in the ATI Dance Research

Verifiable Voting Systems

Peacock, T, Ryan, PYA, Schneider, S and Xia, Z (2013) Verifiable Voting Systems Computer and Information Security Handbook. pp. 1103-1125.

VVS2013.pdf - ["content_typename_UNSPECIFIED" not defined]
Available under License : See the attached licence file.

Download (599kB) | Preview
Text (licence)
Available under License : See the attached licence file.

Download (33kB) | Preview


The introduction of technology into voting systems can bring a number of benefits, such as improving accessibility, remote voting, and efficient, accurate processing of votes. A voting system that uses electronic technology in any part of processing the votes, from vote capture and transfer through to vote tallying, is known as an e-voting system. In addition to the undoubted benefits, the introduction of such technology introduces particular security challenges, some of which are unique to voting systems because of their specific nature and requirements. The key role that voting systems play in democratic elections means that such systems must not only be secure and trustworthy, but must be seen by the electorate to be secure and trustworthy. This chapter emphasizes the challenge to reconcile the secrecy of the ballot, with demonstrable correctness of the result. © 2013 Copyright © 2013 Elsevier Inc. All rights reserved.

Item Type: Article
Divisions : Faculty of Engineering and Physical Sciences > Computing Science
Authors :
Peacock, T
Ryan, PYA
Schneider, S
Xia, Z
Date : 2013
DOI : 10.1016/B978-0-12-394397-2.00069-6
Additional Information : NOTICE: this is the author’s version of a work that was accepted for publication in Computer and Information Security Handbook. Changes resulting from the publishing process, such as peer review, editing, corrections, structural formatting, and other quality control mechanisms may not be reflected in this document. Changes may have been made to this work since it was submitted for publication. A definitive version was subsequently published in Computer and Information Security Handbook, 2nd Ed. 2013 DOI 10.1016/B978-0-12-394397-2.00069-6.
Depositing User : Symplectic Elements
Date Deposited : 25 Apr 2014 15:34
Last Modified : 31 Oct 2017 16:42

Actions (login required)

View Item View Item


Downloads per month over past year

Information about this web site

© The University of Surrey, Guildford, Surrey, GU2 7XH, United Kingdom.
+44 (0)1483 300800