YAR Docs
  • TestNet Instruction
    • Introduction
    • Add YARchain TestNet
    • Add a few others TestNets
    • YAR v.1.0beta — Rewarding Usage Experience
  • DEV DOCS
    • Protocol
    • Fees
    • Use cases
    • Hello world!
  • WhitePaper
    • Introduction
    • YAR architecture
      • YAR objective
      • YARchain architecture
      • Connectors architecture
    • Project mechanics
      • Nodes
      • Chain Connection
      • Witness operations
      • Consensus on transactions
      • Threshold Signature Scheme (TSS)
      • Scaling
      • Management
      • Voting in YAR DAO
      • Supported networks
      • Protocol updates
      • Use cases
      • $YAR Utilization
      • Transaction fee and cross-chain calls discount
    • Conclusion
    • LEGAL DISCLAIMER
Powered by GitBook
On this page

Was this helpful?

  1. WhitePaper
  2. Project mechanics

Management

PreviousScalingNextVoting in YAR DAO

Last updated 2 years ago

Was this helpful?

Electronic voting (including YAR DAO)

According to in a 2009 , the security of electronic voting protocols must evolve to ensure true democracy. Previous security algorithms for electronic elections were always based on public-key procedures.

However, this paper proposes to secure electronic election protocols with threshold cryptography and blind signatures as a more cost-effective alternative. Threshold cryptography and blind signatures aren't only less expensive and provide better confidentiality, accuracy, and reliability.

Another paper "", presents a new secret ballot voting procedure that fully meets the requirements of large-scale elections.

Voting participants are an initiator, a voter, and vote counters. The procedure uses threshold encryption to protect the confidentiality and accuracy of votes against the dishonesty of the election initiator, the voters, and the vote counter. If done well, it can ensure the verifiability, fairness, and validity of the election process, and neither the election initiator, voters, nor the vote counter can lead to a miscount, influence the election results, or spoiler disrupts the election.

Gallegos-Garcia et al.
paper
Practical Electronic Voting Protocol Using Threshold Schemes