Abstract
The manner in which a legislature votes is similar to a threshold signature scheme, and the power to sign legislation is similar to possessing shares to sign. The threshold k denotes the quorum number, the minimum number of legislators required to be present in order for legislature to be passed. Here we discuss techniques to ensure a secure electronic legislature.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Y. Desmedt and B. King. Verifiable democracy. IFIP TC6/TC11 Joint Working Conference on Communications and Multimedia Security (CMS’99), Kluwer Academic Publishers, 1999, pages 53–70.
Taher El Gamal: A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms.CRYPTO 1984, pages 10–18.
H. Ghodosi and J. Pieprzyk. Democratic Systems. ACISP 2001,pages 392–402
R. Rivest, A. Shamir, and L. Adelman. A method for obtaining digital signatures and public key cryptosystems. Commun. ACM, 21, pages 120–126, 1978.
A. Shamir. How to share a secret. Commun. ACM, 22, pages 612–613, Nov., 1979.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Desmedt, Y., King, B. (2002). Verifiable Democracy a Protocol to Secure an Electronic Legislature. In: Traunmüller, R., Lenk, K. (eds) Electronic Government. Lecture Notes in Computer Science, vol 2456. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-46138-8_74
Download citation
DOI: https://doi.org/10.1007/3-540-46138-8_74
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-44121-2
Online ISBN: 978-3-540-46138-8
eBook Packages: Springer Book Archive