Management

Electronic voting (including YAR DAO)

According to Gallegos-Garcia et al. in a 2009 paper, the security of electronic voting protocols must evolve to ensure true democracy. Previous security algorithms for electronic elections were always based on public-key procedures.

However, this paper proposes to secure electronic election protocols with threshold cryptography and blind signatures as a more cost-effective alternative. Threshold cryptography and blind signatures aren't only less expensive and provide better confidentiality, accuracy, and reliability.

Another paper "Practical Electronic Voting Protocol Using Threshold Schemes", presents a new secret ballot voting procedure that fully meets the requirements of large-scale elections.

Voting participants are an initiator, a voter, and vote counters. The procedure uses threshold encryption to protect the confidentiality and accuracy of votes against the dishonesty of the election initiator, the voters, and the vote counter. If done well, it can ensure the verifiability, fairness, and validity of the election process, and neither the election initiator, voters, nor the vote counter can lead to a miscount, influence the election results, or spoiler disrupts the election.

Last updated