Skip to main content

Electronic Voting Schemes

  • Reference work entry
Encyclopedia of Cryptography and Security
  • 200 Accesses

A system is called an electronic voting system when ballots are directly recorded electronically. Standards for such systems have been set by the Federal Election Commission. In most such systems used today, voters go to designated polling places, and cast their votes electronically after being identified and authorized by conventional, non-electronic means. In the near future, we envision systems in which voters securely send their ballots to the authorities over a network. Current research on electronic voting schemes is concerned with maintaining the privacy of the ballots while ensuring their validity, and with reliably verifying the final tally.

The general technique of secure multiparty computation can be applied to solve this problem in theory. However, such a solution places a heavy computational load on the voter's computer, and requires transaction with all other voters, making it impractical. A more realistic approach is to establish voting authorities and develop protocols...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  1. Chaum, D. (1981). “Untraceable electronic mail, return addresses, and digital pseudonyms.” Communications of the ACM, 24 (2), 84–88.

    Google Scholar 

  2. Chaum, D. (1985). “Security without identification: Transaction systems to make big brother obsolete.” Communications of the ACM, 28 (10), 1030–1044.

    Google Scholar 

  3. Cramer, R., R. Gennaro, and B. Schoenmakers (1997). “A secure and optimally efficient multi-authority election scheme.” European Transactions on Telecommunications, 8, 481–489. Preliminary version in Advances in CryptologyEUROCRYPT'97.

    Google Scholar 

  4. Fujioka, A., T. Okamoto, and K. Ohta (1992). “A practical secret voting scheme for large scale elections.” Advances in Cryptology—AUSCRYPT'92, Lecture Notes in Computer Science, vol. 718, ed. T. Okamoto. Springer-Verlag, Berlin, 244–251.

    Google Scholar 

  5. Hirt, M. and K. Sako (2000). “Efficient receipt-free voting based on homomorphic encryption.” Advances in Cryptology—EUROCRYPT 2000, Lecture Notes in Computer Science, vol. 1807, ed. B. Preneel. Springer-Verlag, Berlin, 539–556.

    Google Scholar 

Download references

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 International Federation for Information Processing

About this entry

Cite this entry

Sako, K. (2005). Electronic Voting Schemes. In: van Tilborg, H.C.A. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA . https://doi.org/10.1007/0-387-23483-7_126

Download citation

Publish with us

Policies and ethics