Cryptography Reference
In-Depth Information
8 Epilogue
1. http://politicalticker.blogs.cnn.com/2010/08/04/cnnopinion-research-poll
-obama-birth (accessed June 15, 2011).
2. John Crowley, “Uses and Abuses of the Secret Ballot in the American Age of
Reform,” in
Cultures of Voting: The Hidden History of the Secret Ballot
, ed. Romain
Bertrand, Jean-Louis Briquet, and Peter Pels (London: Hurst & Co., 2007), 54.
3. Chaum, “Untraceable Electronic Mail, Return Addresses, and Digital
Pseudonyms.”
4. CalTech MIT Voting Technology Project,
Voting: What Is, What Could Be
(2001),
22, http://www.vote.caltech.edu/drupal/node/10 (accessed June 23, 2011).
5. David Jefferson, Aviel D. Rubin, Barbara Simons, and David Wagner, “Analyzing
Internet Voting Security,”
Communications of the ACM
47, no. 10 (October 2004):
64.
6. Tadayoshi Kohno, Adam Stubblefield, Aviel D. Rubin, and Dan S. Wallach, “Anal-
ysis of An Electronic Voting System,” in
2004 IEEE Symposium on Security & Privacy
(Berkeley, May 9-12, 2004), 27. Indeed, Roberta Mercuri, a computer scientist, had
come to this very conclusion in her 2000 PhD thesis
—
see Roberta Mercuri, “A Better
Ballot Box?”
IEEE Spectrum
39, no. 10 (2002): 46-50.
7. See, for example, David Chaum et al., eds.,
Towards Trustworthy Elections: New
Directions in Electronic Voting
(Berlin: Springer, 2010). Specific proposals include
“PunchScan,” see David Chaum, “Secret-Ballot Receipts: True Voter-Verifiable Elec-
tions,”
IEEE Security & Privacy
2, no. 1 (2004): 38-47; “Prêt à Voter,” see Peter Y. A.
Ryan, “The Computer Ate My Vote,” in
Formal Methods: State of the Art and New
Directions
, ed. Paul Boca, Jonathan P. Bowen, and Jawed Siddiqi (Berlin: Springer,
2010), 147-184; “Scratch and Vote,” see Ben Adida and Ron L. Rivest, “Scratch and
Vote: Self-Contained Paper-Based Cryptographic Voting,” in
Proceedings of the 5th
ACM Workshop on Privacy in Electronic Society
, ed. Ben Adida and Ron L. Rivest (New
York: ACM Press, 2006), 29-40; “ThreeBallot,” see Ron L. Rivest and Warren D.
Smith, “Three Voting Protocols: Threeballot, VAV, and Twin,” in
Proceedings of the
USENIX Workshop on Accurate Electronic Voting Technology
(Berkeley: USENIX Associa-
tion, 2007), 16-16; and “Scantegrity I” and “Scantegrity II,” see David Chaum et al.,
“Scantegrity II: End-to-End Verifiability by Voters of Optical Scan Elections through
Confirmation Codes,”
IEEE Transactions on Information Forensics and Security
4, no.
4 (December 2009): 611-627.
8. Goldreich, “On Post-Modern Cryptography,” 8.
9. Even defining the functionality of material artifacts is far from a simple task
—
see
Beth Preston, “Why Is a Wing Like a Spoon? A Pluralist Theory of Function,”
The