nVotes Blog

A privacy attack on weighted voting

In the previous post we suggested an extension to degree of anonymity of (Diaz 2002) to voting. Recall the suggested definition for degree of privacy where we also mentioned that this extension could be useful for weighted voting, because in that case results leak...

Degree of privacy in voting

In this post we show a natural extension of the degree of the anonymity model from (Diaz 2002) for voting. The result is simple, but may be useful for complex cases such as weighted voting, where privacy concerns are not limited to the standard...

Election Methods: A typed classification

From wikipedia Electoral systems consist of sets of rules that govern all aspects of the voting process: when elections occur, who is allowed to vote, who can stand as a candidate, how ballots are marked and cast, how the ballots are counted (electoral method), limits...

Anonymity and e-participation: Pros and Cons

In two previous posts we discussed cryptographic techniques that allow maintaining privacy and anonymity in e-participation platforms. That was the how, but what about the why? In this post we review the main points made in the decidim report regarding the suitability...

3 crypto schemes for liquid democracy (III)

In part 1 and part 2 we showed two schemes supporting liquid democracy. Scheme Mixnet/Mixnet combined results from two tallies to obtain each election result. Scheme Homomorphic/Mixnet differed from Mixnet/Mixnet in that the tally of votes for delegates (votes to...

Secure voting – a definition

What do we mean by secure voting? The expression is overloaded and ambiguous. Part of the ambiguity stems from the different contexts where the term is used. On one hand, we can speak about secure voting in the general context of cybersecurity. On the other, secure...