Travelling Ballot Based Protocol: Difference between revisions

Jump to navigation Jump to search
no edit summary
(Created page with "This example protocol implements the task of Quantum Electronic Voting| Quantum E-voting. The protocol uses two entangled qudits, one as a blank ballot that travels from vot...")
 
No edit summary
Line 23: Line 23:
This type of protocol is subject to double voting and privacy attacks when several voters are colluding.
This type of protocol is subject to double voting and privacy attacks when several voters are colluding.
* Double voting: A corrupted voter can apply the “yes” unitary operation many times without being detected.
* Double voting: A corrupted voter can apply the “yes” unitary operation many times without being detected.
* Privacy attack: An adversary that corrupts voters <math>V_{k−1}</math> and <math>V_{k+1}</math> can learn how voter <math>V_k</math> voted with probability 1.
* Privacy attack: An adversary that corrupts voters <math>V_{k-1}</math> and <math>V_{k+1}</math> can learn how voter <math>V_k</math> voted with probability 1.
 
==Protocol Description==
 
 
==Further Information==
 
<div style='text-align: right;'>''*contributed by Sara Sarfaraz''</div>

Navigation menu