Filters








37,322 Hits in 5.9 sec

A secure voting scheme based on rational self-interest

Jayadev Misra
2012 Formal Aspects of Computing  
We propose a scheme for secure voting that involves the candidates themselves in implementing the voting system.  ...  It exploits the competing interests (rivalry) and mutual distrust among the candidates to force an honest election.  ...  Special thanks to David Zuckerman for discussions about cryptographically secure pseudo-random number generators.  ... 
doi:10.1007/s00165-012-0248-1 fatcat:46zlxtzaq5dkrj5d4cpzjsjmha

The Motivation of Electronic Voting towards Game Theory

Lirong Qiu
2015 International Journal of u- and e- Service, Science and Technology  
There are lots of security requirements in electronic voting such as privacy, verifiability, fairness and robustness etc.  ...  There, most works assume that parties are honest who will follow the protocol or malicious who will arbitrarily break the security of the protocol.  ...  ] and (4) voting scheme based on homomorphic encryption [13] [14] [15] .  ... 
doi:10.14257/ijunesst.2015.8.5.35 fatcat:3gvgdw4eivdktnieahkbz6vx5a

Completing Rawls's arguments for equal political liberty and its fair value: the argument from self-respect

Meena Krishnamurthy
2013 Canadian Journal of Philosophy  
needed to ensure a secure a sense of self-respect.  ...  Word Count: 10 962 John Rawls bases his support for the moral importance of democracy on a conception of citizens' higher-order interests.  ...  My case for supporting equal political liberty and its fair value has largely been based on the importance of securing the liberty to vote.  ... 
doi:10.1080/00455091.2013.816177 fatcat:kbxgrtha3zfqfpqhwikruu4l2i

Game theoretical analysis of incentives for large-scale, fully decentralized collaboration networks

Thomas Bocek, Michael Shann, David Hausheer, Burkhard Stiller
2008 Proceedings, International Parallel and Distributed Processing Symposium (IPDPS)  
The incentive scheme is based on a reputation system that assigns a reputation value to every peer reflecting its previous behavior in the network.  ...  The incentive scheme is based on a reputation system that assigns a reputation value to every peer reflecting its previous behavior in the network.  ...  In a simulation with self-learning agents, the scheme was shown to be very robust, but moderately effective with regard to resource sharing.  ... 
doi:10.1109/ipdps.2008.4536195 dblp:conf/ipps/BocekSHS08 fatcat:7rloojnhkzenhnzx2w5peg5y4m

Myopia, redistribution and pensions

Helmuth Cremer, Pierre Pestieau
2011 European Economic Review  
In particular we deal with situations where labor disutility or preferences for consumption are subject to "habit formation" and where sin goods have a detrimental effect on second period health.  ...  The main part of the paper is devoted to the issue of pension design when myopic individual do not save "enough" for their retirement because their "myopic self" (with a high discount rate) emerges when  ...  Frogneux (2009) builds a model in which the agents vote on the tax rate and on the generosity of the early retirement scheme.  ... 
doi:10.1016/j.euroecorev.2010.07.002 fatcat:uaqkkbkhjfffxkdaeinih33l3e

Security of Property as a Public Good: Institutions, Socio-Political Environment and Experimental Behavior in Five Countries

Francisco Campos-Ortiz, Louis G. Putterman, T. K. Ahn, Loukas Balafoutas, Mongoljin Batsaikhan, Matthias Sutter
2012 Social Science Research Network  
security, trust and quality of government.  ...  Our main results are that the security of property varies with experimental institutions, and that our subject pools exhibit significantly different behaviors that correlate with country-level property  ...  A trembling hand perfection argument can similarly be enlisted in favor of the prediction of uniform voting for the mandatory scheme. 10 requires only self-interested rationality to operate.  ... 
doi:10.2139/ssrn.2172473 fatcat:xw6zd2ecvven5c35whhxo3k2ma

The empty intersection: why so little public choice in political science?

Randy T. Simmons, Ryan M. Yonk
2015 Public Choice  
Starting from this public choice perspective, students intuitively grasp vote maximizing, bureaucratic self-interest, interest group strategies, and rationally ignorant voters.  ...  Rational self-interest and the median voter Among those cited by Rowley as founders of Public Choice, Anthony Downs is the one we believe to be the most cited scholar in political science courses generally  ... 
doi:10.1007/s11127-015-0265-8 fatcat:ml5txqmfzzhdnm3bkph3dl5xp4

Climate change: a rational choice politics view

Geoffrey Brennan
2009 Australian Journal of Agricultural and Resource Economics  
Both elements -elite interests and popular (expressive) opinion -are quasi-constraints on politically viable policy.  ...  One aspect of the explanation lies in the construction of policy instruments that redistribute strategically in favour of relevant interests.  ...  Specifically, the connection between an individual's voting behaviour and her material self-interest is a purely contingent and empirical one. 24 Of course, interests may play a role in electoral politics  ... 
doi:10.1111/j.1467-8489.2009.00457.x fatcat:dewawtlb4vb2xcc52r4znctnle

The Aftermath of Baker v. Carr. An Adventure in Judicial Experimentation

James B. Atleson
1963 California Law Review  
by approving a scheme which included no provision for subsequent alterations based on population changes.  ...  rational basis for their schemes. 1 42 One interest which has been recognized is the desire to give recognized political units at least minimal representation.  ... 
doi:10.2307/3478969 fatcat:iusd5ysuojaj5dohzbq6asnsfa

A Register Access Control Scheme for SNR System to Counter CPA Attack Based on Malicious User Blacklist

Jia Shi, Xuewen Zeng, Yang Li
2021 Future Internet  
To address the challenge, a register access control scheme for an SNR system based on a malicious user blacklist query is proposed.  ...  A neighbor voting algorithm is designed to discover possible attacks in the network quickly and build a blacklist of malicious users reasonably.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/fi13100262 fatcat:koayegldsvah3k4fntsgusdkwy

Reputation estimation and query in peer-to-peer networks

Xing Jin, S.-H.G. Chan
2010 IEEE Communications Magazine  
To detect malicious peers or reward well behaved ones, a reputation system is often used.  ...  DHT also has its own security threats and vulnerabilities, and there are many targeted attacks on its routing scheme, data placement scheme, IP mapping scheme, and so on.  ...  Therefore, no secure reputation computing or delivery can be guaranteed. Furthermore, searching or voting on an unstructured overlay is based on flooding, which incurs heavy traffic in the network.  ... 
doi:10.1109/mcom.2010.5439085 fatcat:kz44dig2gbfxpjcbh36ot4ou54

Secure Data Collaborative Computing Scheme Based on Blockchain

Tao Feng, Xusheng Wang, Chunyan Liu, Junli Fang, Debiao He
2021 Security and Communication Networks  
A secure multiparty computation based on secret sharing is introduced. The problem of identity and vote privacy in electronic voting is solved.  ...  In this paper, in order to achieve the fairness of data security sharing and collaborative computing, a security data collaborative computing scheme based on blockchain is proposed.  ...  To solve the above problems, our proposed multiparty computing electronic voting election scheme based on blockchain ensures the anonymity of identity and the security of ballot data. e whole voting process  ... 
doi:10.1155/2021/6630291 fatcat:vrsrcq7frfbu5k76mhh2hcjgsa

Secure Computation from Random Error Correcting Codes [chapter]

Hao Chen, Ronald Cramer, Shafi Goldwasser, Robbert de Haan, Vinod Vaikuntanathan
2007 Lecture Notes in Computer Science  
We also present a new method for constructing high information rate ramp schemes based on arbitrary codes, and in particular we give a new construction based on algebraic geometry codes.  ...  We demonstrate that threshold secure computation in the secure channels model can be based on arbitrary codes.  ...  We are especially interested in self-dual codes, because secret sharing schemes based on self-dual codes do not suffer from the 1/2 information rate loss that occurs in the general case.  ... 
doi:10.1007/978-3-540-72540-4_17 fatcat:2ovfkqgvxfg6toub2i7xuhqlcu

State or Nature? Formal vs. Informal Sanctioning in the Voluntary Provision of Public Goods

Kenju Kamei, Louis G. Putterman, Jean-Robert Tyran
2011 Social Science Research Network  
Allowing informal sanctions, by contrast, not only comes with a danger that punishments will be misapplied, but also should have no efficiency benefit under standard assumptions of self-interested agents  ...  It is in the self-interest of voters and is often favorably contrasted with letting citizens take punishment into their own hands.  ...  rationale behind the various treatments, and theoretical predictions both under the assumption of common knowledge of rationality and self-interest and under alternative behavioral assumptions.  ... 
doi:10.2139/ssrn.1752266 fatcat:3nbbdm67nbh4bnv6jamwjsbuxq

State or Nature? Formal vs. Informal Sanctioning in the Voluntary Provision of Public Goods

Kenju Kamei, Louis G. Putterman, Jean-Robert Tyran
2011 Social Science Research Network  
Allowing informal sanctions, by contrast, not only comes with a danger that punishments will be misapplied, but also should have no efficiency benefit under standard assumptions of self-interested agents  ...  It is in the self-interest of voters and is often favorably contrasted with letting citizens take punishment into their own hands.  ...  rationale behind the various treatments, and theoretical predictions both under the assumption of common knowledge of rationality and self-interest and under alternative behavioral assumptions.  ... 
doi:10.2139/ssrn.1756791 fatcat:dslmljpjhzbwpfy6ktpgiajfry
« Previous Showing results 1 — 15 out of 37,322 results