Let's talk about voting today

Voting behavior exists in many scenarios in the blockchain. The narrow sense of protocol proposal governance and the broad sense of PoS consensus achievement all involve voting

But in reality, because the blockchain is open and transparent, voting is actually completely open. We can see which voting options have more attention, and we can also see which options the "big players" have chosen.

This leads to a problem. We are not actually voting for real, but are affected by the environment.

Whether it is bribed or coerced, once the vote cannot express the truth, it may cause damage.

For example, in decentralized AI projects, nodes can control voting and screen out the desired large model, thereby replacing the fair iteration of the large model itself.

In order to avoid this problem, encrypted voting appears.

Encrypted voting is more suitable for application on blockchain. Because the blockchain cannot be tampered with, we can accurately and in detail the results of each vote.

Add cryptography, encrypt voting behavior, we can do encrypted voting without permission, maintain relative fairness, but it is essentially a procedural justice.

Voting mainly includes: determining voting rights, voting, counting votes, publishing and other main results

1. The most direct manifestation of voting rights in blockchain is PoS, that is, obtaining voting rights by staking certain tokens.

2. Participating in voting is more about entrusting to nodes, etc.

3. Counting votes mainly uses FHE technology, because only FHE can calculate encrypted data

4. After the counting is completed, since the ciphertext results are published, it is also necessary to decide whether to use the key to decrypt and publish the plaintext results.

Of course, ZK technology can be considered here to prove the voting results without revealing the number of votes and specific details.

To sum up:

1. Voting is an interaction that is often seen but ignored in blockchain

2. Cryptography methods such as ZK and FHE can help encrypt voting behavior

3. Encrypted voting seems to only encrypt voting, but it actually provides support for the entire system security