Verifiable Democracy a Protocol to Secure an Electronic Legislature
暂无分享,去创建一个
The manner in which a legislature votes is similar to a threshold signature scheme, and the power to sign legislation is similar to possessing shares to sign. The threshold k denotes the quorum number, the minimum number of legislators required to be present in order for legislature to be passed. Here we discuss techniques to ensure a secure electronic legislature.
[1] Yvo Desmedt,et al. Verifiable Democracy , 1999, Communications and Multimedia Security.
[2] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[3] Adi Shamir,et al. How to share a secret , 1979, CACM.
[4] Hossein Ghodosi,et al. Democratic Systems , 2001, ACISP.
[5] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.