Learn Before
Concept
Proof-of-authority (PoA) Applied to Ethereum E-Voting System
Validators are chosen after thorough inspection from a trusted and specified group such as the entity that controls the election. Identity values are used forcing validators to use their reputations to create or write new data blocks. Transitions and blocks are verified by system moderators who are approved participants. The algorithm is secured by selecting the validation node as a trustworthy entity allowing mores security from clash attacks.
0
1
Updated 2022-01-16
Tags
Cryptoeconomics
Economics
Social Science
Empirical Science
Science