 It's really nice to visit for a really nice city of so many years. We cannot not actually be kind of for this presentation, that you see another version of the content at the end of the presentation, but you might guess this is about the program, how to organize good elections by using some program. So there are many challenges that you are organizing, but there are many challenges. First challenge is about the privacy. You want to keep the word from everybody and try it. There is no need to know about how important it is. So, of course, it's technically only important. Also, it's very important what can be changed. So, of course, what you do should be good and friendly. You have not to be very sophisticated. Otherwise, people cannot vote. And also, of course, it's also very important is the assurance. So you can, how you are, how you can verify that you are taking the vote. Actually, what the privacy and assurance, these two things are comparison to each other. So you want to keep the vote and try it, but also you want them to be verified. Somehow it's very hard to vote. So, the first thing, the first challenge, you want to make sure that that's what we're telling. So if you want to know, then what we're going to do, yes, are we going to vote. So there is some bad guys, and since we can change your vote somehow. So, they say, yes, you must know. So, this is what bad guys have played, like us. So, also, I'm not going to count in disgusting. So, if it was a yes or a no this game, but the way how they wanted to vote, it was like one extra vote. So, and then, who are the potential suspects? So, politicians, they want to fix the results somehow in their favor. So, it's obvious, but to somewhere else, and for somebody, in case of an issue, election officials also can go through cheaters as well, and voting some of them, maybe some of the people inside are in the software. So, actually, we can see that almost everybody in voting the next person can be a cheater. So, you know, pictographers and pictographers are going to do that everywhere. This is not the case in real life, but you always think the best side, okay? So, are you voting system manufacturers? The first thing that you are voting system provides end-to-end 25 million. So, you can't verify it. You're not, first, you're not the end-to-end. So, which means vote. So, each vote should be able to verify that this vote is correctly discussed, okay? So, everyone can verify that all votes are counted as voting. The speed things is then end-to-end 25 million. So, the voting system, if you think about it, provides privacy. So, no more privacy by language during all election process. So, in spite of the system, you can't verify that all votes are counted as voting. You can't verify that all votes are counted as voting. So, in spite of existing voting, I think it's a chance to discuss the vote. So, you make sure that there will be a voting system for all votes. So, yeah, we can use some technology from... So, suppose we have four candidates. So, in our system, each candidate has a trustee. Trustee keeps some public key. And, so, and also, they are also saying that some public keys are allowed to put this as a rule of election trustee. The vote is usually in mathematics because some assumptions it, but these assumptions is quite realistic. We assume that at least one of them is honest. So, I'm not sure that all the trustees are right. But this is, I think, a pretty realistic assumption because usually, well, the trustees are the candidates which are right to each other. So, these all these trustees are one of them. Otherwise, I don't think the privacy of the vote will be revealed. So, only this will happen, but this will not happen at the moment. So, the trustees are responsible for these things. Of course, nobody will know how to use this. This is what I already said. And in the periodic system, step what is happening. So, these four candidates jointly construct election public keys. Election public keys from which you vote. And that's through the voting steps. So, when the vote that comes to the, to the screen, because this vote, this is the list of the candidates here. Like, we are four candidates. Alice, Robert, Karen, and Robert, Lisa, Lisa, usually passes in photography, but maybe in real life, we have some other cases. So, we have this candidate list. So, and then you say, okay, he gets the message, Chris is back, and we show him the candidates in the bathroom. And then, he's having a shock somehow. And then, Chris is in another bathroom, doing all the candidates, arguing in the, in the shock, and then he comes on his seat by me. And then, he presses the button. Other than that, we have to choose. We have two parts for all of you. So, all these things are happening. Just, well, it is possible, but you see the cursive three times. The button, you can press just one time, because, but you know, from a typical point of view, it can be some holes there. So, that's why we don't know yet how to do that, but we assume that the voter can read something and press the buttons. He just, and then he chooses one. He can't just read with it. So, he just pushes one of the buttons. For example, two, for example. And then, he chooses his candidate on the first part. He chooses the candidate, because he sees Alice, and he reads both. And then, when he chooses the both, and then the receipt comes over here. Then, she press the button to pass to the voter, and then you get the receipt. So, after pushing the button couple of times, you get some receipt. So, this is your ballot, how it goes there. And then, this is your, how it goes there. And then, this is your receipt. So, this receipt is good. The third is always this receipt. This is the receipt. The later on, you can check how your voter will come. So, this is the receipt ballot. And then, the other election was the database. Everyone had access to the election of the database. The election of the only database that you see, you see the balance. Okay, so, why do we need that only part? Because, well, this is to control that there was not cheating out there after the voting. So, voting machine eclipse your second reputation on the other view. And you cannot verify if the country is being violated and cannot be verified. But that's why we asked the voting machine to change their rotations. And then, we select one of them to be voted. Okay, so, to be sure, I think, this way, we can fix the cheating that you voted one or one-half. For this 0.5, we can fix the cheating, okay? So, if you can, if you can't, then you can choose any one and then check the process. If you're voting one-half, you can catch the cheating, okay? And then, well, what actions you should do, this is we don't have your receipt. So, we don't discuss how you can catch the cheating, okay? So, why do we need the receipt? Because we have a receipt. We use a kind of question as a thing of the information to check the internet that our ballot signs the text and what we want to have. And we use the only information to check the voting machine to let it fit in our 6th interpretation without cheating. We have our chosen index of the receipts. So, we can check the internet that the same index stays on the ballot and on our ballot which must be counted. So, this time we can cheat. And then we have certified the receipt. So, we can complain it. We can take some corrections in our ballot. Okay, now we go to the counting process because in MEPA this is full of justice. They do counting on the votes. Then we have our election from the MEPA, there will be an excess. And then what goes to these counters, so this part is a little from the ballot. And then only this part goes to the counters. So, they have some sub-site and then they should shortly be shipped the other part of the of the ballot. So, they can count who gets this vote. Because we cannot say anything from here. So, this is how this was put like. So, this is what you got. Now, on another non-faceted some sort of mixing phase. So, there are MEPA 100,000 votes there. So, in the mixing phase you only think about tribes or the voting. That's why you need to do some mixing here. So, the trustees cannot trace how how the sub-person vote is sold. In the mixing process so, we are let's say you have couple of trustees and you think trust is what's happening is happening some kind of mixing which is just simply totally landed. We are heading to to hide to hide to hide to hide this process of so you cannot trace trace how the vote was voted. So, in the mixing process usually it's like all the votes are mixing but it doesn't reflect actually the result of counting as a result of this mixing the mixing. Only it is for hiding the tribes for the vote. Only that. So, it's the mixing proof between the two trustees and there is interactive in terms of vote it can be true that there was no division or no insertion or no duplication so it was fair so it's it's hard to explain now how it's done but there's some part in what the vote is involved. So, you can have some it's it can be true that not happen in this mixing process and finally comes a vote count so you have a vote start after this mixing so so all candidates we have a big shift in the cyber-text a little bit of representation and it shows that okay, I get the vote for that particular for the particular for we actually get the vote and so on for everything is count so then finally so we I want to this is another version of my presentation a dirty dream for Armenian reality and question is are elections possible? Yes, I say yes because of cryptography