Comment on page
However, this paper proposes to secure electronic election protocols with threshold cryptography and blind signatures as a more cost-effective alternative. Threshold cryptography and blind signatures aren't only less expensive and provide better confidentiality, accuracy, and reliability.
Voting participants are an initiator, a voter, and vote counters. The procedure uses threshold encryption to protect the confidentiality and accuracy of votes against the dishonesty of the election initiator, the voters, and the vote counter. If done well, it can ensure the verifiability, fairness, and validity of the election process, and neither the election initiator, voters, nor the vote counter can lead to a miscount, influence the election results, or spoiler disrupts the election.