Voting Mechanisms

The network accommodates multiple voting mechanisms to meet distinct privacy and security requirements:

  • Public and decentralised On-Chain Voting: Offers supreme security and transparency to users.

  • Private On-Chain Voting: Employs advanced cryptography, balancing high security with user scalability and long-term cryptographic reliability.

  • Private Off-Chain Voting: Utilizes cryptography with low-trust vote custodians, providing scalable private voting but with reduced security assurances.

Different voting strategies are also offered in modules. These can be configured at the policy proposal level or applied to all policies based on whether there is the option to vote on one policy at a time or between a selection of options:

Voting strategies for single policy voting:

  • Binary Choice: Typically, voters are presented with a yes/no or approve/reject option for the proposal.

  • Quorum Requirements: A minimum number of participants (quorum) may be required for the vote to be valid. This can be based on total membership or only active participants.

  • Counting Absences: Depending on the rules, absentees may be counted as implicit approvals, rejections, or not counted at all.

Voting strategies for multi-option policies:

  • Multiple Candidates/Options: Voters select from more than two options, which could be candidates, policies, or proposals.

  • Voting Systems: Can use a variety of methods like first-past-the-post, preferential (ranked-choice) voting, proportional representation, etc.

  • Majority or Plurality: Depending on the system, the winner may need a majority (more than 50%) or simply a plurality (the most votes).

  • Budget Based: Users are allocated a budget which they can spend on proposals which each have been assigned a cost.

Sequential Elimination: In some methods like instant-runoff voting, options with the fewest votes are eliminated in rounds until a winner emerges.

Last updated