Delegated Democracy - Part 4
I've been discussing delegated democracy with Coriolinus and Yev here and at Coriolinus's blog, and think I've got a good next iteration of the idea. The entire system as I originally proposed it was extremely overcomplicated, and now have a three-part process that I think cuts to the core of the idea.
Part one: Registration
Part one: Registration
- Citizen enters the party HQ, checked for bugs & weapons.
- Citizen registers, gets a username and provides a passphrase, then leaves.
- Passphrase -> cryptographic hash function -> key generation function -> decode key, stored at party HQ.
- Voters would also have the option of providing their own decode key directly, in the event that they want a higher entropy or don't trust the polling authority with their encode key.
- Citizen composes vote, then runs encryption program, entering passphrase, stored briefly in memory.
- Passphrase -> cryptographic hash function -> key generation function -> encode key, stored briefly in memory.
- Vote is encrypted with encode key, saved, then passphrase and key are wiped from memory.
- The voters mentioned above who opted to provide their keys will skip straight to the encryption step.
- Encrypted vote is emailed to party HQ.
- Party HQ receives citizen's email.
- Email is decrypted with decode key. If successful, this verifies the citizen's identity and that (s)he was not coerced.
- Vote is added to tally for given question.
- scale,
- voter fatigue,
- complexity, and
- manipulation by time framing.
- demagoguery, which I think exists now in any form of democracy (direct or otherwise), and
- self-interest, of which I also think everyone, including present-day politicians, is guilty.
Labels: politics, technology, voting