This chapter explores the application of cryptography in voting technologies. It suggests that the widespread adoption of these technologies are likely to face similar difficulties as the cryptographic signature model because they are designed based on similar assumptions. It also highlights the need for cryptographers to address the design blind spots in order to help reinvigorate their sociotechnical agenda.
MIT Press Scholarship Online requires a subscription or purchase to access the full text of books within the service. Public users can however freely search the site and view the abstracts and keywords for each book and chapter.
If you think you should have access to this title, please contact your librarian.
To troubleshoot, please check our FAQs, and if you can't find the answer there, please contact us.