-

@ Brunswick
2025-02-25 19:22:18
Updated whitepaper ---
Voter-Generated Ephemeral Keys (the voter, not the authority, generates the key).
Blind Signatures from the Election Authority (EA) to authorize that ephemeral key.
Homomorphic or Mix-Net Encryption to protect ballot secrecy.
OpenTimestamps-style proofs to give each ballot (and any re-cast ballot) a tamper-proof, verifiable time anchor.
Re-Voting until the cutoff, allowing a voter to replace a previously cast ballot.
This design emphasizes privacy, integrity, verifiability, and resilience in a decentralized setting using Nostr.
nostr:nevent1qqs2v97d45pr3940tpma2ugv53vstxw383hdec50k9sav4r54v0ayhspz3mhxw309akx7cmpd35x7um58g6rsd3e9upzps0f4va9dg4tdjjta06yafjt9ldyptrrz85gdw5xk3jjz6wt266rqvzqqqqqqya5t84u