Broadcast distributed voting algorithm in population protocols
نویسندگان
چکیده
منابع مشابه
Broadcast Protocols for Distributed Systems
We present an innovative approach to the design of faultprocessors agree on exactly the same sequence of broadcast tolerant distributed systems that avoids the several rounds of message exchange required by current protocols for consensus agreement. The messages. approach is based on broadcast communication over a local area It is easy to demonstrate that placing a total order on network, such ...
متن کاملDistributed Protocols at the Rescue for Trustworthy Online Voting
While online services emerge in all areas of life, the voting procedure in many democracies remains paper-based as the security of current online voting technology is highly disputed. We address the issue of trustworthy online voting protocols and recall therefore their security concepts with its trust assumptions. Inspired by the Bitcoin protocol, the prospects of distributed online voting pro...
متن کاملA Decentralized Voting Algorithm for Increasing Dependability in Distributed Systems
Replication and majority voting are well-known and widely-used methods for achieving fault-tolerance in distributed systems. An open area of investigation is coordinating the voting in a secure manner, so as to withstand malicious attacks. The Timed-Buffer Distributed Voting Algorithm (TB-DVA), a secure distributed voting protocol, is introduced for this purpose. It is contrasted with several o...
متن کاملAnonymity in E-voting Protocols
Voter anonymity, also known as unlinkability, is the basic requirement in order to satisfy privacy in electronic voting (e-voting) protocols, which means that a particular vote is not linkable to any voter. In other words, the relationship between voter identity and the related cast vote should be private to that particular voter and it should not be revealed or proved in any way. Many e-voting...
متن کاملSecure Electronic Voting Protocols
This chapter gives a summary of cryptographic e-voting protocols. We start with a motivation and an overview of some aspects of traditional elections. We then outline the security requirements of e-voting and present in detail two approaches to cryptographic e-voting, based on homomorphic encryption and mix networks. We finish the chapter with a list of open problems.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IET Signal Processing
سال: 2020
ISSN: 1751-9675,1751-9683
DOI: 10.1049/iet-spr.2020.0297