Distributed Computing Systems, 1992: Proceedings of the 12th International Conference on Distributed Computing Systems, 1992, 1992G. Agrawal and P. Jalote, "An efficient protocol for voting in distributed system
E-voting protocolRobustnessLarge scaleUniversal verifiabilityBlockchainSmart contractBlockchain-enabled voting (BEV) systems have emerged as the next generation of modern electronic voting (e-voting) systems, because the immutable property of the blockchain has made itself a perfect distributed ballot box...
In recent years, with the application of blockchain technology in electronic voting, the voting process has been simplified, and reliance on third-party institutions has been reduced. For the first time, an electronic voting protocol based on Bitcoin is proposed [7]. This scheme achieves voting ...
system that can be deployed on any blockchain that supports an execution of a smart contract. But, administrator has the authority to decrypt ballots in advance to get an intermediate result of the vote. Yang et al. (2020) proposed a voting protocol based on homomorphic encryption in 2020. ...
To cover both the uniform-proposer and rejector-proposes protocols, we consider a general protocol in which the first rejector of a proposal is chosen to be the next proposer with probability μ∈ [0, 1], and with probability 1-μ, another uncommitted agent is equiprobably chosen to be the...
Decred provides a unique way to upgrade their network through their governance system. First, the Decred development team hardcodes the changes into the protocol, yet stipulate they only become active once a super majority of 75 percent is met. DCR owners then go through a round of voting. ...
Also, in each phase, the computational load is distributed between 2 or more entities, so the number of cryptographic operations is not so high per entity. If we compare authentication phase of SIVP and Li, Hwang, Lai, our protocol carries out a less number of cryptographic operations. In ...
The central idea is to use an interactive challenge–response protocol, where only the voter knows the commitment (in Fig. 8, the claimed values of the decryptions of ai). As such, only the voter is convinced. More specifically, the voting authority publishes a series of pairs (ai,bi),...
54.The system of claim 48, wherein the means for downloading the encrypted ballot viewer object includes means for downloading through the use of a secure transmission protocol. 55.The system of claim 48, wherein the means for downloading the encrypted ballot viewer object includes means for con...
In some implementations, some of the functionality of the data processing center described above may be omitted or provided in a different manner, such as via a distributed system. Additionally, the functionality of the various servers in data processing center 222 may be combined or divided differ...