Learn Before
Concept

Proof-of-authority (PoA) Applied to Ethereum E-Voting System

Validators are chosen after thorough inspection from a trusted and specified group such as the entity that controls the election. Identity values are used forcing validators to use their reputations to create or write new data blocks. Transitions and blocks are verified by system moderators who are approved participants. The algorithm is secured by selecting the validation node as a trustworthy entity allowing mores security from clash attacks.

0

1

Updated 2022-01-16

Contributors are:

Who are from:

Tags

Cryptoeconomics

Economics

Social Science

Empirical Science

Science