Verifiable Democracy a Protocol to Secure an Electronic Legislature

The manner in which a legislature votes is similar to a threshold signature scheme, and the power to sign legislation is similar to possessing shares to sign. The threshold k denotes the quorum number, the minimum number of legislators required to be present in order for legislature to be passed. Here we discuss techniques to ensure a secure electronic legislature.

[1]  Yvo Desmedt,et al.  Verifiable Democracy , 1999, Communications and Multimedia Security.

[2]  T. Elgamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.

[3]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[4]  Hossein Ghodosi,et al.  Democratic Systems , 2001, ACISP.

[5]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.