CN111862440A - Voting system based on block chain technology - Google Patents
Voting system based on block chain technology Download PDFInfo
- Publication number
- CN111862440A CN111862440A CN202010794430.0A CN202010794430A CN111862440A CN 111862440 A CN111862440 A CN 111862440A CN 202010794430 A CN202010794430 A CN 202010794430A CN 111862440 A CN111862440 A CN 111862440A
- Authority
- CN
- China
- Prior art keywords
- voting
- block chain
- encryption
- management
- module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C13/00—Voting apparatus
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0407—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
- H04L63/0421—Anonymous communication, i.e. the party's identifiers are hidden from the other party or parties, e.g. using an anonymizer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/008—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving homomorphic encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/42—Anonymization, e.g. involving pseudonyms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/46—Secure multiparty computation, e.g. millionaire problem
- H04L2209/463—Electronic voting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
Abstract
The invention relates to the field of voting, and provides a voting system which combines new technologies such as block chain and homomorphic encryption with voting of a democratic method, and the voting system comprises a user client, and an application framework of short message verification service, block chain voting process service and homomorphic data encryption service; the identity of a user is ensured through short message verification, the block chain technology is utilized to ensure that the stream voting process is not falsifiable, revocable, traceable and verifiable, and homomorphic encryption means is utilized to ensure the anonymity of the user voting information and the data confidentiality; the invention solves the technical problems of fairness, anonymity, efficiency and the like in the traditional voting process at present.
Description
Technical Field
The invention relates to the technical field of block chains, in particular to a voting system based on a block chain technology.
Background
With the continuous improvement of the modernization level of the national treatment system and the treatment capability, the progress of the democratic law treatment is continuously promoted, and the basic democratics are continuously developed, but the fair election of 'unrecognized name, high efficiency, low cost and safety guarantee' is still in the distance of 'the last kilometer'. How to guarantee that the voting process on line can not be tampered and overturned is a problem which is not effectively solved at present.
The key technology in the traditional electronic voting system is voter identity identification, data extraction, encryption, storage and security. The traditional electronic voting system uses a centralized server to realize the requirements, which has more potential safety hazards, low trust degree and the like. In the aspect of safety, for the traditional electronic voting system, hackers can attack the central server in a centralized manner, the malicious success rate is high, the malicious cost is low, and system collapse and data tampering are easily caused. Meanwhile, even if a series of high-cost security measures are used to ensure that the system is safe from being infringed by hackers and the centralized system breaks down, the system can miss-remember and wrongly remember the voting data, and even the system and the administrator can not distinguish the authenticity of the data. In the trust aspect, the traditional electronic voting system is controlled by a central mechanism, and workers of the central mechanism have the capacity of tampering data, so that the operation of a dark box is easily caused. The voting record and the statistical result are processed by the central server, and the disclosed voting result needs to be endorsed by a central organization to ensure the authenticity and is difficult to be convinced by the public.
Disclosure of Invention
Aiming at the defects of the method, the invention provides the voting system based on the block chain technology, which has multiple function settings and can realize an online voting system with ' no name, high efficiency, low cost and security ' fair voting '.
The technical scheme adopted by the invention for solving the technical problem is as follows: the voting system based on the block chain technology comprises a user client and an application architecture of a verification service, a block chain voting process service and a homomorphic data encryption service, and is characterized in that: the method comprises the following steps:
the method comprises the following steps: a host logs in a user client to create a campaign and customizes a voting rule, initiates a voting campaign, and shares a verification code to a mobile terminal of a voting participant;
step two: the voting participants participate in the voting activities by using the mobile terminal, and authorization authentication of the relevant voting activity personnel is carried out through the verification codes, including the confirmation of self sign-in through hand-written signature, so that the participation of other non-voters is avoided;
step three: the system automatically forms a voting chain for the voting result of the voter by using a block chain technology after voting, and carries out asymmetric encryption on the personal information of the voter, each voter obtains a unique block chain code as a private key, and the private key can be used for traceability and verification in the later period;
step four: the system automatically encrypts the voting content of each voter, and counts the voting result, so as to ensure the anonymity of the information and the confidentiality of the data of the voters in the whole process;
step five: and the host confirms the voting result and links the statistical result by using the block chain technology again, so that the statistical result cannot be overturned, tampered and revoked.
Preferably, the homomorphic encryption technology comprises the following encryption process steps:
the method comprises the following steps: selecting two safe big prime numbers P and Q (the lengths of the two numbers are close to 512 bits at present, which is safe);
step two: calculating the product N ═ PxQ; and generates a random number R1;
step three: grouping the message M into a plurality of message packets M with the length L (the length of L should be less than P), wherein the message packets M are M1M2M3 … mt;
step four: using the encryption algorithm ci ═ (mi + P × R1) mod N, the ciphertext C ═ C1C2C3 … ct is calculated.
Preferably, the voting rules include a voting object, a number of votes of participants, whether the same participant can vote for the same object multiple times, an initiation time, a duration, and an exposure time.
Preferably, the client comprises an identification module, a display module, a voting synchronous display module, an encryption module and a result statistics module, wherein the identification module, the display module, the voting module and the voting synchronous display module can be set through voting rules, and the encryption module and the result statistics module are carried by the system and cannot be changed in operation.
Preferably, the client comprises a front end and a back end, the permission of the front end for common users comprises voting management of election, voting management of country governance, participation of self, initiation of self, customized activities, democratic recommendation, voting management of evaluation and optimization and management of cadre voting management, and the main permission of the back end is used by staff for activity management and role management.
The personal information is encrypted through asymmetric encryption of a block chain technology, a public key of the personal information belongs to a voting system, a private key is generated through encryption every time and is stored in each user, the private key can be checked through a private key set by the user and fingerprint verification decryption, and the private key is prevented from being leaked by means of hackers.
Compared with the traditional electronic voting system, the small program system can customize the voting activity flexibly by actively setting the voting rule through the initiative of the initiator, forms the voting chain by using the block chain technology, enables each participant to obtain a unique block chain code as a private key, adopts a homomorphic encryption technology to encrypt the voting activity, automatically counts the voting result on the premise of not revealing the contents of the voting process, ensures that the data of the voting activity cannot be falsified and revoked through the encryption processing, can trace the source and verify the information by combining the private key in hands with a decryption means, and ensures the public justice of the voting activity.
Compared with the prior art, the invention has the following beneficial technical effects:
the invention adopts a block chain and homomorphic encryption technology, provides functions of user management, authority management, democratic election voting management, evaluation and optimization voting management, country management voting management, cadre election voting management and the like, and ensures that voters are effective and real through a short message verification code of a mobile phone; the voting activity is encrypted by using the block chain and the homomorphic encryption technology, so that the voting data is guaranteed to be untrustworthy, unrevoyable, verifiable, traceable and agnostic, and the public justice of the voting activity is guaranteed.
Therefore, legal compliance in the voting process is solved, the user satisfaction is improved, and the democratic interest of voters is guaranteed to the maximum extent.
Drawings
FIG. 1 is a diagram of the logic architecture of the voting system based on the block chain technique according to the present invention;
FIG. 2 is a diagram of the encryption logic of the present invention;
FIG. 3 is a diagram of a business architecture of an embodiment of the present invention;
FIG. 4 is a schematic diagram of a check-in page of a WeChat applet to which the present solution is applied according to an embodiment of the present invention;
fig. 5 is a schematic diagram of a trustee voting validation page to which the present solution is applied.
Detailed Description
In order that the above objects, features and advantages of the present invention can be more clearly understood, a more particular description of the invention will be rendered by reference to the appended drawings. It should be noted that the embodiments and features of the embodiments of the present application may be combined with each other without conflicting with each other.
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention, however, the present invention may be practiced in other ways than those specifically described and thus the scope of the present invention is not limited by the specific embodiments disclosed below.
The scheme of the invention is further explained by combining the attached drawings 1-5: the voting system based on the block chain technology comprises a user client and an application architecture of a verification service, a block chain voting process service and a homomorphic data encryption service, and is characterized in that: the method comprises the following steps:
the method comprises the following steps: a host logs in a user client to create a campaign and customizes a voting rule, initiates a voting campaign, and shares a verification code to a mobile terminal of a voting participant;
step two: the voting participants participate in the voting activities by using the mobile terminal, and authorization authentication of the relevant voting activity personnel is carried out through the verification codes, including the confirmation of self sign-in through hand-written signature, so that the participation of other non-voters is avoided;
step three: the system automatically forms a voting chain for the voting result of the voter by using a block chain technology after voting, and carries out asymmetric encryption on the personal information of the voter, each voter obtains a unique block chain code as a private key, and the private key can be used for traceability and verification in the later period;
step four: the system automatically encrypts the voting content of each voter, and counts the voting result, so as to ensure the anonymity of the information and the confidentiality of the data of the voters in the whole process;
step five: and the host confirms the voting result and links the statistical result by using the block chain technology again, so that the statistical result cannot be overturned, tampered and revoked.
Preferably, the homomorphic encryption technology comprises the following encryption process steps:
the method comprises the following steps: selecting two safe big prime numbers P and Q (the lengths of the two numbers are close to 512 bits at present, which is safe);
step two: calculating the product N ═ PxQ; and generates a random number R1;
step three: grouping the message M into a plurality of message packets M with the length L (the length of L should be less than P), wherein the message packets M are M1M2M3 … mt;
step four: using the encryption algorithm ci ═ (mi + P × R1) mod N, the ciphertext C ═ C1C2C3 … ct is calculated.
Preferably, the voting rules include a voting object, a number of votes of participants, whether the same participant can vote for the same object multiple times, an initiation time, a duration, and an exposure time.
Preferably, the client comprises an identification module, a display module, a voting synchronous display module, an encryption module and a result statistics module, wherein the identification module, the display module, the voting module and the voting synchronous display module can be set through voting rules, and the encryption module and the result statistics module are carried by the system and cannot be changed in operation.
Preferably, the client comprises a front end and a back end, the permission of the front end for common users comprises voting management of election, voting management of country governance, participation of self, initiation of self, customized activities, democratic recommendation, voting management of evaluation and optimization and management of cadre voting management, and the main permission of the back end is used by staff for activity management and role management.
Compared with the traditional electronic voting system, the small program system can customize the voting activity flexibly by actively setting the voting rule through the initiative of the initiator, forms the voting chain by using the block chain technology, ensures that each participant obtains a unique block chain code as a private key to protect user information, encrypts the voting activity by using a homomorphic encryption technology, automatically counts the voting result on the premise of not revealing the contents of the voting process, ensures that the data of the voting activity cannot be falsified, irrevocable and unknown in content through the encryption processing, traces the source and verifies the information through a decryption means, and ensures the public justice of the voting activity.
Example 1: a voting WeChat small program applied to a voting system based on a block chain technology comprises the following steps: anonymous voting process and rules in midway of conference
1. The user opens a voting program, clicks a creating activity, enters an activity information maintenance page, an identification module in the process judges that a creator is a host, a voting system authorizes the authority of the host, the host starts a voting module to initiate a voting activity, and a voting rule is formulated:
activity title: voting without remembering the name;
the candidate: if a plurality of candidates exist, adding in sequence by clicking a [ add candidate ] button;
several items are selected at most: filling the final elected committee total number (2 in 3) in [ several items selected at most ];
selecting a person: if a plurality of optional people exist, adding the optional people in sequence by clicking (adding other optional people) buttons;
the participants: all participants;
and (3) displaying time: after the voting is ended;
the voting rule is as follows: firstly, praise and disapprove and abandon right;
uploading the votes to be unchangeable immediately after the votes are submitted;
2. clicking to generate a motion code, sharing through a motor, and aiming at the sharing of participants, carrying out authorization verification on the voting system by the participants through the motion code through an identification module;
3. the participators participate in the voting after being authorized by the identification module, click the (my) button and then click the (my participation) button to display the participated voting activity list;
4. all participants have strong voting activities, and need to click a check-in button, input a handwritten name in a handwriting area to ensure that the activity participates as the self, and can start entering a voting link after the completion of the check-in and waiting for the start of the voting, a host can display a checked-in personnel list by clicking the check-in button of the conference check-in personnel, check the personnel participating in the activity, but only check the check-in information, and encrypt the rest information by an encryption module;
5. the voting system adopts the block chain technology to form a voting chain through an encryption module, each voter obtains a private key of a unique block chain code to protect personal information of the voter, and the information of all the voters is asymmetrically encrypted through a background public key of the voting system after the voting event begins and a user logs in;
6. the voting result is encrypted by a homomorphic encryption technology, and the voting number is counted by a result counting module while the voting content is not leaked;
7. the voter and the voter synchronously check the number of the votes automatically counted by the result counting module, compare the number with the number of the participators, confirm whether the votes are consistent, and ensure that all the votes finish voting or determine the abandon right in the system;
8. when the voter and the voter confirm that the data is correct and approve the voting result user, clicking a button (finishing the activity) to finish the activity;
9. after the confirmation, the encrypted voting content is uploaded to a voting system for storage, and a final voting result is displayed for all the authorized users by a display module.
Note: the voting sequence is: the ticket monitoring person, the ticket counting person, the host and the other persons are sequentially carried out, the person with the previous authority does not vote, and the person with the next authority cannot carry out the voting.
Authority of the ticket supervisor: firstly, finding that a candidate does not meet the condition, clicking a [ vote pause ] button to pause the voting activity, and generating again by a host; secondly, clicking a [ result valid ] button when the number of votes obtained by the candidate meets the requirement, and clicking a [ result invalid ] button when the number of votes obtained by the candidate does not meet the requirement;
the authority of the ticket counter: firstly, the number of votes obtained by a candidate meets the requirement, a [ result valid ] button is clicked, the number of votes obtained by the candidate does not meet the requirement, and a [ result invalid ] button is clicked;
and (5) checking the result details after the public notice: step 1: entering a voting homepage through a WeChat applet, clicking a (my) button, and then clicking the (my participation) button to display a participated voting activity list; step 2: clicking one of the activities can check the voting data of the participated activities; and step 3: click the [ tally result ] button to check the detail data.
The personal information is encrypted through asymmetric encryption of a block chain technology, a public key of the personal information belongs to a voting system, a private key is generated through encryption every time and is stored in each user, the private key can be checked through a private key set by the user and fingerprint verification decryption, and the private key is prevented from being leaked by means of hackers.
The encryption steps of the homomorphic encryption technology are as follows:
the method comprises the following steps: selecting two safe big prime numbers P and Q (the lengths of the two numbers are close to 512 bits at present, which is safe);
step two: calculating the product N ═ PxQ; and generates a random number R1;
step three: grouping the message M into a plurality of message packets M with the length L (the length of L should be less than P), wherein the message packets M are M1M2M3 … mt;
step four: using the encryption algorithm ci ═ (mi + P × R1) mod N, the ciphertext C ═ C1C2C3 … ct is calculated.
The small program in the scheme of the invention can select different activity basic rules according to the application scene when the movable plate is created.
The invention adopts a block chain and homomorphic encryption technology, and ensures the validity and the trueness of voting personnel through the verification code; the voting activity is encrypted by using the block chain and homomorphic encryption technology, so that the voting data can not be tampered, the source can be traced, the voting content can not be known, and the public justice of the voting activity is guaranteed.
Therefore, legal compliance in the voting process is solved, the user satisfaction degree is improved, the democratic interest of voters is guaranteed to the greatest extent, the privacy of multiple anonymous voting is guaranteed to the greatest extent, the votes are subjected to block chain and homomorphic encryption technology, the voting content is unknown by the aid of multiple encryption technology, the voting content can be traced through an encryption private key mastered by the voters, the voting content is stored in a database and cannot be tampered, and the justice is further guaranteed, so that the voting result is more in line with the democratic interest.
While preferred embodiments of the present invention have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all such alterations and modifications as fall within the scope of the invention.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.
Claims (5)
1. The voting system based on the block chain technology comprises a user client and an application architecture of a verification service, a block chain voting process service and a homomorphic data encryption service, and is characterized in that: the method comprises the following steps:
the method comprises the following steps: a host logs in a user client to create a campaign and customizes a voting rule, initiates a voting campaign, and shares a verification code to a mobile terminal of a voting participant;
step two: the voting participants participate in the voting activities by using the mobile terminal, and authorization authentication of the relevant voting activity personnel is carried out through the verification codes, including the confirmation of self sign-in through hand-written signature, so that the participation of other non-voters is avoided;
step three: the system automatically forms a voting chain for the voting result of the voter by using a block chain technology after voting, and carries out asymmetric encryption on the personal information of the voter, each voter obtains a unique block chain code as a private key, and the private key can be used for traceability and verification in the later period;
step four: the system automatically encrypts the voting content of each voter, and counts the voting result, so as to ensure the anonymity of the information and the confidentiality of the data of the voters in the whole process;
step five: and the host confirms the voting result and links the statistical result by using the block chain technology again, so that the statistical result cannot be overturned, tampered and revoked.
2. A voting system according to claim 1, wherein: the homomorphic encryption technology comprises the following encryption process steps:
the method comprises the following steps: selecting two safe big prime numbers P and Q (the lengths of the two numbers are close to 512 bits at present, which is safe);
step two: calculating the product N ═ PxQ; and generates a random number R1;
step three: grouping the message M into a plurality of message packets M with the length L (the length of L should be less than P), wherein the message packets M are M1M2M3 … mt;
step four: using the encryption algorithm ci ═ (mi + P × R1) mod N, the ciphertext C ═ C1C2C3 … ct is calculated.
3. A voting system according to claim 1, wherein: the voting rules include the voting object, the number of votes by the participants, whether the same participant can vote on the same object multiple times, the initiation time, the duration, and the exposure time.
4. A voting system according to claim 1, wherein: the client comprises an identification module, a display module, a voting synchronous display module, an encryption module and a result counting module, wherein the identification module, the display module, the voting module and the voting synchronous display module can be set through voting rules, and the encryption module and the result counting module are carried by the system and cannot be changed in operation.
5. A voting system according to claim 1, wherein: the client comprises a front end and a rear end, the front end has the authority which can be used by common users and comprises the functions of voting management, country governance voting management, participation of I, initiation of I, customized activities, democratic recommendation voting management, evaluation and optimization voting management and cadre voting management, and the rear end is used by working personnel to use the main authority of the rear end for activity management and role management.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010794430.0A CN111862440A (en) | 2020-08-10 | 2020-08-10 | Voting system based on block chain technology |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010794430.0A CN111862440A (en) | 2020-08-10 | 2020-08-10 | Voting system based on block chain technology |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111862440A true CN111862440A (en) | 2020-10-30 |
Family
ID=72972685
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010794430.0A Pending CN111862440A (en) | 2020-08-10 | 2020-08-10 | Voting system based on block chain technology |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111862440A (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112598843A (en) * | 2020-12-04 | 2021-04-02 | 光大科技有限公司 | Voting data processing method and device and storage medium |
CN112907811A (en) * | 2021-01-29 | 2021-06-04 | 山西特信环宇信息技术有限公司 | Election system and voting method for cone block chain |
CN113037827A (en) * | 2021-03-02 | 2021-06-25 | 上海旺链信息科技有限公司 | Voting method based on block chain, self-organization management method and computer equipment |
CN114399865A (en) * | 2022-01-17 | 2022-04-26 | 安徽恒科信息技术有限公司 | Task voting management system based on small program |
CN115001785A (en) * | 2022-05-26 | 2022-09-02 | 平安普惠企业管理有限公司 | Signature service method and device based on voting, electronic equipment and storage medium |
CN115083061A (en) * | 2022-07-25 | 2022-09-20 | 西南民族大学 | Personalized customization-oriented multi-mode intelligent election voting system and voting method thereof |
CN116456051A (en) * | 2023-02-24 | 2023-07-18 | 坚持一下(杭州)控股有限公司 | Online live conference sign-in, voting and data evidence-storing system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109523683A (en) * | 2018-12-29 | 2019-03-26 | 杭州趣链科技有限公司 | A kind of blank electronic voting method based on block chain technology |
CN110162996A (en) * | 2019-04-23 | 2019-08-23 | 上海链度科技有限公司 | Ballot system, method and voting terminal based on block chain |
CN110245183A (en) * | 2019-05-05 | 2019-09-17 | 上海链度科技有限公司 | A kind of encrypted electronic voting system and method based on alliance's block chain technology |
CN110400410A (en) * | 2019-07-31 | 2019-11-01 | 中钞信用卡产业发展有限公司杭州区块链技术研究院 | A kind of electronic voting system |
CN110958107A (en) * | 2019-12-05 | 2020-04-03 | 全链通有限公司 | Electronic voting method, device and storage medium based on block chain |
-
2020
- 2020-08-10 CN CN202010794430.0A patent/CN111862440A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109523683A (en) * | 2018-12-29 | 2019-03-26 | 杭州趣链科技有限公司 | A kind of blank electronic voting method based on block chain technology |
CN110162996A (en) * | 2019-04-23 | 2019-08-23 | 上海链度科技有限公司 | Ballot system, method and voting terminal based on block chain |
CN110245183A (en) * | 2019-05-05 | 2019-09-17 | 上海链度科技有限公司 | A kind of encrypted electronic voting system and method based on alliance's block chain technology |
CN110400410A (en) * | 2019-07-31 | 2019-11-01 | 中钞信用卡产业发展有限公司杭州区块链技术研究院 | A kind of electronic voting system |
CN110958107A (en) * | 2019-12-05 | 2020-04-03 | 全链通有限公司 | Electronic voting method, device and storage medium based on block chain |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112598843A (en) * | 2020-12-04 | 2021-04-02 | 光大科技有限公司 | Voting data processing method and device and storage medium |
CN112907811A (en) * | 2021-01-29 | 2021-06-04 | 山西特信环宇信息技术有限公司 | Election system and voting method for cone block chain |
CN113037827A (en) * | 2021-03-02 | 2021-06-25 | 上海旺链信息科技有限公司 | Voting method based on block chain, self-organization management method and computer equipment |
CN114399865A (en) * | 2022-01-17 | 2022-04-26 | 安徽恒科信息技术有限公司 | Task voting management system based on small program |
CN115001785A (en) * | 2022-05-26 | 2022-09-02 | 平安普惠企业管理有限公司 | Signature service method and device based on voting, electronic equipment and storage medium |
CN115083061A (en) * | 2022-07-25 | 2022-09-20 | 西南民族大学 | Personalized customization-oriented multi-mode intelligent election voting system and voting method thereof |
CN115083061B (en) * | 2022-07-25 | 2023-03-17 | 西南民族大学 | Multi-mode intelligent election voting system oriented to personalized customization and voting method thereof |
CN116456051A (en) * | 2023-02-24 | 2023-07-18 | 坚持一下(杭州)控股有限公司 | Online live conference sign-in, voting and data evidence-storing system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111862440A (en) | Voting system based on block chain technology | |
US9824520B2 (en) | Method and system of electronic voting implemented in a portable device | |
Sadia et al. | Blockchain-based secure e-voting with the assistance of smart contract | |
Shah et al. | Blockchain enabled online-voting system | |
Khelifi et al. | M-Vote: a reliable and highly secure mobile voting system | |
US20160086408A1 (en) | System and method for fully encrypted remote web-based voting | |
Pathak et al. | Blockchain based e-voting system | |
Islam et al. | Blockchain Based New E-voting Protocol System without Trusted Tallying Authorities | |
Nasir et al. | Study on e-voting systems: A blockchain based approach | |
Choi et al. | design of Blockchain based e-Voting System for Vote Requirements | |
Hossain et al. | E-voting system using blockchain technology | |
Oprea et al. | Conceptual architecture of a blockchain solution for E-voting in elections at the university level | |
Sadia et al. | Blockchain based secured e-voting by using the assistance of smart contract | |
CN112907811A (en) | Election system and voting method for cone block chain | |
Khairnar et al. | Survey on secure online voting system | |
KR102457915B1 (en) | Electronic vote system using smart contract of blockchain and method thereof | |
Memon et al. | Next generation a secure e-voting system based on biometric fingerprint method | |
KR20100109001A (en) | Electronic polling system confirmable own ballot by unique identification on line | |
CN114584357A (en) | Anonymous safe voting method based on non-homogeneous Token | |
Rizwan | Decentralized Voting System Based on Regions Using Facial Recognition | |
KR102308528B1 (en) | Electronic voting system and Electronic voting method | |
Hermstrüwer | The limits of blockchain democracy: A transatlantic perspective on blockchain voting systems | |
Sharma et al. | Blockchain based E-Voting | |
Suharsono et al. | Individual Verifiability Metric in e-Voting System | |
Averin et al. | Review of e-voting systems based on blockchain technology |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20201030 |