Secret Ballot Elections
Verifiable secret sharing can be used to build an end-to-end auditable voting systems.
Using the technique of verifiable secret sharing one can satisfy the election problem that will be describe here.
In the election problem each voter can vote 0 (to oppose) or 1 (for favor), and the sum of all votes will determine election's result. For the election to execute, it is needed to make sure that the following conditions will fulfill:
- The voters' privacy should not be compromised.
- The election administrator must verify that no voter committed fraud.
If using verifiable secret sharing, n tellers will replace the single election administrator. Each voter will distribute one share of its secret vote to every one of the n tellers. This way the privacy of the voter is preserved and the first condition is satisfied.
Reconstruction of the election's result is easy, if there exist enough k
Read more about this topic: Verifiable Secret Sharing
Famous quotes containing the words secret, ballot and/or elections:
“The vanity of being known to be trusted with a secret is generally one of the chief motives to disclose it.”
—Samuel Johnson (17091784)
“The ballot is stronger than the bullet.”
—Abraham Lincoln (18091865)
“Apparently, a democracy is a place where numerous elections are held at great cost without issues and with interchangeable candidates.”
—Gore Vidal (b. 1925)