46
edits
(Created page with "This example protocol implements the task of Quantum Electronic Voting| Quantum E-voting. The protocol uses two entangled qudits, one as a blank ballot that travels from vot...") |
No edit summary |
||
Line 23: | Line 23: | ||
This type of protocol is subject to double voting and privacy attacks when several voters are colluding. | This type of protocol is subject to double voting and privacy attacks when several voters are colluding. | ||
* Double voting: A corrupted voter can apply the “yes” unitary operation many times without being detected. | * Double voting: A corrupted voter can apply the “yes” unitary operation many times without being detected. | ||
* Privacy attack: An adversary that corrupts voters <math>V_{ | * Privacy attack: An adversary that corrupts voters <math>V_{k-1}</math> and <math>V_{k+1}</math> can learn how voter <math>V_k</math> voted with probability 1. | ||
==Protocol Description== | |||
==Further Information== | |||
<div style='text-align: right;'>''*contributed by Sara Sarfaraz''</div> |