nVotes Blog

Anonymity and e-participation: Pros and Cons

In two previous posts we discussed cryptographic techniques that allow maintaining privacy and anonymity in e-participation platforms. That was the how, but what about the why? In this post we review the main points made in the decidim report regarding the suitability...

3 crypto schemes for liquid democracy (III)

In part 1 and part 2 we showed two schemes supporting liquid democracy. Scheme Mixnet/Mixnet combined results from two tallies to obtain each election result. Scheme Homomorphic/Mixnet differed from Mixnet/Mixnet in that the tally of votes for delegates (votes to...

Secure voting – a definition

What do we mean by secure voting? The expression is overloaded and ambiguous. Part of the ambiguity stems from the different contexts where the term is used. On one hand, we can speak about secure voting in the general context of cybersecurity and the internet. On the...

Privacy-preserving e-participation with nMix

In this post we describe a concrete design enabling privacy for e-participation platforms falling under the category of social information filtering systems. This is an extension of work presented in the User Anonymization for Decidim Barcelona report. Although this...

Elements of a distributed voting system

In this post we describe a high-level design for a voting system resulting from combining two protocols, ipfs and nMix. Ipfs is, from wikipedia: InterPlanetary File System (IPFS) is a protocol designed to create a permanent and decentralized method of storing and...