Publicly verifiable delegative democracy with secret voting power

02/28/2023
by   Dimitrios Karoukis, et al.
0

We use a commitment scheme to track every individual's voting power on a public ledger with the ability to validate transfers and transitive, reversible delegations of it between them without sacrificing their privacy. Every unit of voting power is represented by the Merkle root of a tree consisting of its latest owner's public key, a random nonce and the Merkle root of the tree of its previous owner's public key and random nonce and so on. Transfers and delegations mention the input units, their owner's public keys, the hashes of their nonces and the output units, which are the Merkle roots of the new owners' public keys, new random nonces and the previous units' identifiers. In case of a delegation, the receiver provides the sender with the hashed random nonces and the hashed public keys whose secret keys they control. In case of a transfer, only the hashes of these hashes' concatenations are provided. To reverse a delegation, a historical owner reveals the individual hashes that resulted the subsequent units. In voting, the owner reveals the actual nonces and public keys of the units.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/14/2019

Breaking the encryption scheme of the Moscow internet voting system

In September 2019, voters for the election at the Parliament of the city...
research
01/01/2023

Time-Entanglement QKD: Secret Key Rates and Information Reconciliation Coding

In time entanglement-based quantum key distribution (QKD), Alice and Bob...
research
06/29/2022

Biometric Identification Systems With Both Chosen and Generated Secret Keys by Allowing Correlation

We propose a biometric identification system where the chosen- and gener...
research
12/19/2019

A Restrained Paillier Cryptosystem and Its Applications for Access Control of Common Secret

The modified Paillier cryptosystem has become extremely popular and appl...
research
09/14/2020

Biased RSA private keys: Origin attribution of GCD-factorable keys

In 2016, Svenda et al. (USENIX 2016, The Million-key Question) reported ...
research
05/27/2020

A post-quantum key exchange protocol from the intersection of quadric surfaces

In this paper we present a key exchange protocol in which Alice and Bob ...
research
12/26/2018

Use the Keys Pre-Distribution KDP-scheme for Mandatory Access Control Implementation

The possibility of use the keys preliminary distribution KDP-scheme for ...

Please sign up or login with your details

Forgot password? Click here to reset