We shall deal with cryptosystems based on public-key cryptography and their
applications to secret ballot elections. Six secret balloting schemes are
discussed. These are compared with respect to criteria related to the possi
bility of voters to check that their votes have been correctly assigned, to
the vulnerability of the protocols to electoral fraud of various sorts, an
d to the vulnerability of protocols to vote selling.