Secret Ballot Elections
Verifiable secret sharing can be used to build an end-to-end auditable voting systems.
Using the technique of verifiable secret sharing one can satisfy the election problem that will be describe here.
In the election problem each voter can vote 0 (to oppose) or 1 (for favor), and the sum of all votes will determine election's result. For the election to execute, it is needed to make sure that the following conditions will fulfill:
- The voters' privacy should not be compromised.
- The election administrator must verify that no voter committed fraud.
If using verifiable secret sharing, n tellers will replace the single election administrator. Each voter will distribute one share of its secret vote to every one of the n tellers. This way the privacy of the voter is preserved and the first condition is satisfied.
Reconstruction of the election's result is easy, if there exist enough k
Read more about this topic: Verifiable Secret Sharing
Famous quotes containing the words secret, ballot and/or elections:
“Coles Hill was the scene of the secret night burials of those who died during the first year of the settlement. Corn was planted over their graves so that the Indians should not know how many of their number had perished.”
—For the State of Massachusetts, U.S. public relief program (1935-1943)
“Perhaps the fact that I am not a Radical or a believer in the all powerful ballot for women to right her wrongs and that I do not scorn womanly duties, but claim it as a privilege to clean up and sort of supervise the room and sew things, etc., is winning me stronger allies than anything else.”
—Ellen Henrietta Swallow Richards (18421911)
“Apparently, a democracy is a place where numerous elections are held at great cost without issues and with interchangeable candidates.”
—Gore Vidal (b. 1925)