Abstract
Electronic voting systems are inextricably bound to security and cryptographic techniques. Over the last decades, countless techniques have been proposed to face the dangers of electronic voting systems with mathematical precision. Certainly, the majority of these works address secrecy and verifiability. In this chapter security and cryptographic techniques are analyzed with respect to those security properties that can be evaluated on the basis of these techniques, namely secrecy, fairness, integrity, and verifiability. Furthermore, we shortly discuss their adequacy to ensure further relevant properties like eligibility and uniqueness, and evaluate security and cryptographic techniques with respect to the costs that come along with their real-world application. We conclude the chapter with a summary of the evaluation results, which can serve as guideline for decision-makers.