Towards Trustworthy Elections

New Directions in Electronic Voting

  • David Chaum
  • Markus Jakobsson
  • Ronald L. Rivest
  • Peter Y. A. Ryan
  • Josh Benaloh
  • Miroslaw Kutylowski
  • Ben Adida

Part of the Lecture Notes in Computer Science book series (LNCS, volume 6000)

Table of contents

  1. Front Matter
  2. Ed Gerck
    Pages 1-36
  3. Ari Juels, Dario Catalano, Markus Jakobsson
    Pages 37-63
  4. Jonathan A. Goler, Edwin J. Selker
    Pages 83-96
  5. Shuki Bruck, David Jefferson, Ronald L. Rivest
    Pages 97-106
  6. Akira Otsuka, Hideki Imai
    Pages 107-123
  7. Pedro A. D. Rezende
    Pages 124-140
  8. Aggelos Kiayias, Moti Yung
    Pages 155-174
  9. Douglas W. Jones
    Pages 175-190
  10. Benoît Chevallier-Mames, Pierre-Alain Fouque, David Pointcheval, Julien Stern, Jacques Traoré
    Pages 191-199
  11. Peter Y. A. Ryan, Thea Peacock
    Pages 200-215
  12. Hugo Jonker, Wolter Pieters
    Pages 216-230
  13. Stefan Popoveniuc, Ben Hosp
    Pages 242-259
  14. David Lundin
    Pages 260-273
  15. Roberto Araújo, Ricardo Felipe Custódio, Jeroen van de Graaf
    Pages 274-288
  16. Stéphanie Delaune, Steve Kremer, Mark Ryan
    Pages 289-309
  17. Rui Joaquim, Carlos Ribeiro, Paulo Ferreira
    Pages 310-329
  18. Roberto Araújo, Sébastien Foulle, Jacques Traoré
    Pages 330-342
  19. Mirosław Kutyłowski, Filip Zagórski
    Pages 343-356
  20. Stefan Popoveniuc, Jeremy Clark, Richard Carback, Aleks Essex, David Chaum
    Pages 357-369
  21. John Kelsey, Andrew Regenscheid, Tal Moran, David Chaum
    Pages 370-387
  22. Aleks Essex, Jeremy Clark, Carlisle Adams
    Pages 388-401
  23. Back Matter

About this book


For many years now, cryptography has been keeping messages secure for senders, irrespective of the routing to the destination. This same technology can be used to keep votes secure for voters, from the casting of the vote all the way through to the inclusion of the vote in the final tally. This state-of-the-art survey addresses the challenges faced in establishing a trustworthy electronic voting system. The 24 contributions included in the volume were carefully reviewed and selected from the presentations given during a series of workshops on trustworthy elections held over the last decade. Topics addresses range from foundational and theoretical aspects to algorithms and systems issues, as well as applications in various fields.


Internet Routing algorithms anonymity cryptography electronic voting privacy secret ballot security trust trustworthy elections uncontrolled voting platform voting security

Editors and affiliations

  • David Chaum
    • 1
  • Markus Jakobsson
    • 2
  • Ronald L. Rivest
    • 3
  • Peter Y. A. Ryan
    • 4
  • Josh Benaloh
    • 5
  • Miroslaw Kutylowski
    • 6
  • Ben Adida
    • 7
  1. 1.Independent researcher 
  2. 2.Palo Alto Research CenterUSA
  3. 3.Massachusetts Institute of TechnologyCambridgeUSA
  4. 4.University of LuxembourgLuxembourg
  5. 5.Microsoft Research CenterRedmondUSA
  6. 6.Wroclaw University of TechnologyPoland
  7. 7.Harvard Center for Research on Computation and SocietyBostonUSA

Bibliographic information

  • DOI
  • Copyright Information IAVOSS/Springer-Verlag Berlin Heidelberg 2010
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science Computer Science (R0)
  • Print ISBN 978-3-642-12979-7
  • Online ISBN 978-3-642-12980-3
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
IT & Software
Finance, Business & Banking