Skip to main content

Verifiable Democracy a Protocol to Secure an Electronic Legislature

  • Conference paper
  • First Online:
Book cover Electronic Government

Part of the book series: Lecture Notes in Computer Science ((volume 2456))

Abstract

The manner in which a legislature votes is similar to a threshold signature scheme, and the power to sign legislation is similar to possessing shares to sign. The threshold k denotes the quorum number, the minimum number of legislators required to be present in order for legislature to be passed. Here we discuss techniques to ensure a secure electronic legislature.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Y. Desmedt and B. King. Verifiable democracy. IFIP TC6/TC11 Joint Working Conference on Communications and Multimedia Security (CMS’99), Kluwer Academic Publishers, 1999, pages 53–70.

    Google Scholar 

  2. Taher El Gamal: A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms.CRYPTO 1984, pages 10–18.

    Google Scholar 

  3. H. Ghodosi and J. Pieprzyk. Democratic Systems. ACISP 2001,pages 392–402

    Google Scholar 

  4. R. Rivest, A. Shamir, and L. Adelman. A method for obtaining digital signatures and public key cryptosystems. Commun. ACM, 21, pages 120–126, 1978.

    Article  MATH  Google Scholar 

  5. A. Shamir. How to share a secret. Commun. ACM, 22, pages 612–613, Nov., 1979.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2002 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Desmedt, Y., King, B. (2002). Verifiable Democracy a Protocol to Secure an Electronic Legislature. In: Traunmüller, R., Lenk, K. (eds) Electronic Government. Lecture Notes in Computer Science, vol 2456. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-46138-8_74

Download citation

  • DOI: https://doi.org/10.1007/3-540-46138-8_74

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-44121-2

  • Online ISBN: 978-3-540-46138-8

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics