Hardekopf, B., Kwiat, K., Upadhyaya, S.: A decentralized voting algorithm for increasing dependability in distributed systems. In: Proceedings of the 7th International Conference on Information System Analysis
Research on voting algorithm in NMR and NVP systemNMR及NVP系统中表决算法分析与研究*容错表决算法N模冗余N版本编程技术三模冗余In N-modular redundant(NMR) and N-version programming(NVP)system,the fault of the subsystem(component),the Byzantine failures of the distributed computing systems,clock ...
4.2.1 Cluster-based similarity partitioning algorithm (CSPA) In the CSPA method, for each single clustering result, the similarity is defined as 1 if two cells belong to the same cluster (i.e., same cell label) and 0 if the opposite is true. Therefore, each base clustering partition can...
1.1 Revisiting the Distortion of Distributed Voting A first observation about the results of [7] is that there is a-priori no reason to restrict our attention to only mechanisms in the class Plurality-of-f, as using other over-districts rules could potentially lead to better distortion. Indeed...
Encryption AlgorithmEn(pk,M,r): This algorithm takes the public keypk, plaintext messageM, and system parameterωas inputs, and outputs the ciphertextC. Decryption AlgorithmDe(sk,C): This algorithm takes the private keyskand the ciphertextCas inputs, outputs the plaintextM, otherwise it fai...
Electobox's vote anonymization algorithm provides mathematical proofs that all votes had been anonymized before counted. Voters and organizers can validate these proofs and make sure that the voting process was impeccable. Vote integrity & correctness After the encryption and submission of their vote, ...
It is known that every homogeneous game can be represented by a QOBDD with size O(n2), and that from its weighted representations, this QOBDD can be computed in O(n2⋅logn) time (Bolus, 2012). Therefore, applying Algorithm 3 to the QOBDD, we obtain a BDD representation. Therefore...
In this paper, an aggregated blind signatures scheme based on blockchain smart contracts is designed using the BLS signature algorithm (Boneh et al.2002). The scheme decentralizes the signature rights to multiple participants and aggregates the signature fragments to generate the final signature via...
where the device may be selected from the group consisting of a smart card, an optical storage device, and a magnetic storage device. The voter identification information may be hashed, i.e., processed by a conventional hashing algorithm, and compared against voter input data that has been has...
An intelligent voting node for a multiple node, fault tolerant, distributed intelligence control system having a plurality of optically isolated relays for connecting a power source to a load device a