CN112784305A - Encrypted voting method, computer device, and storage medium - Google Patents

Encrypted voting method, computer device, and storage medium Download PDF

Info

Publication number
CN112784305A
CN112784305A CN202110137327.3A CN202110137327A CN112784305A CN 112784305 A CN112784305 A CN 112784305A CN 202110137327 A CN202110137327 A CN 202110137327A CN 112784305 A CN112784305 A CN 112784305A
Authority
CN
China
Prior art keywords
voting
transaction
contract
public key
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110137327.3A
Other languages
Chinese (zh)
Inventor
何正军
李斌
王志文
吴思进
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Fuzamei Technology Co Ltd
Original Assignee
Hangzhou Fuzamei Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Fuzamei Technology Co Ltd filed Critical Hangzhou Fuzamei Technology Co Ltd
Priority to CN202110137327.3A priority Critical patent/CN112784305A/en
Publication of CN112784305A publication Critical patent/CN112784305A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Abstract

The invention provides an encrypted voting method, a computer device and a storage medium, wherein the method comprises the following steps: executing a voting registration transaction through a voting contract, and recording a first public key of a first vote on a block chain; executing a first voting transaction through a voting contract, and recording corresponding first encrypted voting information into the voting contract when the execution is successful; executing a voting settlement transaction including a first private key corresponding to the first public key through the voting contract: decrypting the corresponding first encrypted voting information according to the first private key and the second public key of each voting user respectively to obtain corresponding voting content; and settling the first vote according to the acquired voting content. The invention realizes the security of all voting contents in the voting process, and can decrypt and acquire all the voting contents according to the first private key and the public key of each voting account by only providing the first private key through the voting settlement transaction so as to finish the settlement of the voting.

Description

Encrypted voting method, computer device, and storage medium
Technical Field
The present application relates to the field of internet technologies, and in particular, to an encrypted voting method, a computer device, and a storage medium.
Background
In the current block chain voting scheme, the voting content of each vote is recorded in a block chain in a public manner, because if each voter encrypts the voting content of the voter, each voter needs to provide the decrypted voting content and a verification mode when the vote is settled, which results in a tedious voting process. Therefore, the existing block chain voting scheme is difficult to meet the service requirement of keeping the voting content secret in the voting process.
Disclosure of Invention
In view of the above-mentioned shortcomings or drawbacks of the prior art, it is desirable to provide an encrypted voting method, a computer device and a storage medium, which can keep the voting contents secret during the block chain voting process and can settle the votes conveniently.
In a first aspect, the present invention provides an encrypted voting method applied to a blockchain node, where a blockchain is configured with a voting contract, the method including:
executing a voting registration transaction through a voting contract, and recording a first public key of a first vote on a block chain for each user end participating in the first vote:
acquiring a first public key;
encrypting the voting content by a Diffie-Hellman algorithm according to a second private key and a first public key of the current voting account to generate first encrypted voting information;
generating a first voting transaction comprising first encrypted voting information and sending the first voting transaction to a blockchain network;
executing a first voting transaction through a voting contract, and recording corresponding first encrypted voting information into the voting contract when the execution is successful;
executing a voting settlement transaction including a first private key corresponding to the first public key through the voting contract:
decrypting the corresponding first encrypted voting information according to the first private key and the second public key of each voting user respectively to obtain corresponding voting content;
and settling the first vote according to the acquired voting content.
In a second aspect, the present invention provides an encrypted voting method applicable to a user side, where a block chain is configured with a voting contract, the method including:
generating a first private key and a corresponding first public key for a first vote to be registered;
generating a voting registration transaction comprising a first public key and sending the voting registration transaction to a block chain network, so that a block chain node executes through a voting contract, and recording the first public key of the first vote to a block chain, so that each user end participating in the first vote can:
acquiring a first public key;
encrypting the voting content by a Diffie-Hellman algorithm according to a second private key and a first public key of the current voting account to generate first encrypted voting information;
generating a first voting transaction comprising first encrypted voting information and sending the first voting transaction to a block chain network so as to be executed by a block chain node through a voting contract, and recording the first encrypted voting information into the voting contract when the execution is successful;
generating and sending a voting settlement transaction comprising the first private key to the blockchain network for the blockchain nodes to execute through the voting contract:
decrypting the corresponding first encrypted voting information according to the first private key and the second public key of each voting user respectively to obtain corresponding voting content;
and settling the first vote according to the acquired voting content.
In a third aspect, the present invention provides another encrypted voting method applicable to a user side, where a block chain is configured with a voting contract, the method including:
acquiring a first public key of a first vote recorded on a block chain; the first public key is recorded on the block chain after the voting registration transaction is successfully executed by the block chain link point through the voting contract;
encrypting the voting content by a Diffie-Hellman algorithm according to a second private key and a first public key of the current voting account to generate first encrypted voting information;
and generating a first voting transaction comprising first encrypted voting information and sending the first voting transaction to the block chain network so as to be executed by the block chain node through the voting contract, and recording the first encrypted voting information into the voting contract when the execution is successful.
The voting contract is further for executing a voting settlement transaction that includes a first private key to which the first public key corresponds:
decrypting the corresponding first encrypted voting information according to the first private key and the second public key of each voting user respectively to obtain corresponding voting content;
and settling the first vote according to the acquired voting content.
In a fourth aspect, the present invention also provides an apparatus comprising one or more processors and a memory, wherein the memory contains instructions executable by the one or more processors to cause the one or more processors to perform a method of encrypted voting provided according to embodiments of the present invention.
In a fifth aspect, the present invention also provides a storage medium storing a computer program that causes a computer to execute the encrypted voting method provided according to the embodiments of the present invention.
The encrypted voting method, the computer device and the storage medium provided by the embodiments of the present invention record the first public key in the block chain during the registration voting, and the user end of the voting encrypts the voting content through the Diffie-Hellman algorithm according to the private key of the voting account and the first public key, so that all the voting content is kept secret during the voting process, and all the voting content can be obtained by respectively decrypting the first private key and the public key of each voting account through the voting settlement transaction, so as to complete the settlement of the voting.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the following detailed description of non-limiting embodiments thereof, made with reference to the accompanying drawings in which:
fig. 1 is a flowchart of an encrypted voting method according to an embodiment of the present invention.
Fig. 2 is a flowchart of another encrypted voting method according to an embodiment of the present invention.
Fig. 3 is a flowchart of another encrypted voting method according to an embodiment of the present invention.
Fig. 4 is a schematic structural diagram of an apparatus according to an embodiment of the present invention.
Detailed Description
The present application will be described in further detail with reference to the following drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the relevant invention and not restrictive of the invention. It should be noted that, for convenience of description, only the portions related to the present invention are shown in the drawings.
It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The present application will be described in detail below with reference to the embodiments with reference to the attached drawings.
Fig. 1 is a flowchart of an encrypted voting method according to an embodiment of the present invention.
As shown in fig. 1, in this embodiment, the present invention provides an encrypted voting method, including:
s11: executing a voting registration transaction through a voting contract, and recording a first public key of a first vote on a block chain for each user end participating in the first vote:
acquiring a first public key;
encrypting the voting content by a Diffie-Hellman algorithm according to a second private key and a first public key of the current voting account to generate first encrypted voting information;
generating a first voting transaction comprising first encrypted voting information and sending the first voting transaction to a blockchain network;
s13: executing a first voting transaction through a voting contract, and recording corresponding first encrypted voting information into the voting contract when the execution is successful;
s15: executing a voting settlement transaction including a first private key corresponding to the first public key through the voting contract:
s151: decrypting the corresponding first encrypted voting information according to the first private key and the second public key of each voting user respectively to obtain corresponding voting content;
s153: and settling the first vote according to the acquired voting content.
It should be noted that, the voting schemes claimed in the present application only encrypt the voting content, and the voting accounts are public, i.e. not anonymous; in other applications filed contemporaneously by the applicant, schemes are set forth for both encrypting the voting content and anonymizing the voting account, or schemes that are anonymous only and do not encrypt the voting content.
The above method is exemplified below by the case where user a registers a vote and user BCDEF participates in the vote.
First, the user end of user A generates a first private key p for the vote to be registered1And a corresponding first public key P1
After generating the public and private key pair, user A generates a public key P1Registers the transaction tx1 and sends it to the blockchain network.
In step S11, the blockchain node receives, broadcasts, packages, executes tx1 through a voting contract, and combines the vote with the first public key P1The corresponding relation of (2) is recorded on the block chain.
In this embodiment, the vote registered by user a is voted only by the voting account having the voting right. After registering the vote, the user end of user a also generates a voting authority configuration transaction tx2 that includes the voting account information (e.g., account ID, public key, or address of the voting account, etc.) of user BCDEF, and sends tx2 to the blockchain network.
The blockchain node receives, broadcasts, packages, executes tx2 through a voting contract in which it is recorded that the voting account of the user BCDEF has the voting right of the vote.
Take user B voting as an example:
the user end of the user B acquires the first public key P of the vote from the block chain1With P1*p2-BEncrypting the voting content vote _ B by a Diffie-Hellman algorithm as an encryption key to generate first encrypted voting information E (vote _ B), regenerating a first voting transaction tx3 including the first encrypted voting information E (vote _ B), and sending tx3 to the blockchainA network. Wherein p is2-BThe private key of the voting account of user B.
Similarly, the user terminals of users C-F generate the first voting transactions tx4-tx7, respectively, and send tx4-tx7 to the blockchain network, respectively.
In step S13, take the example of tx 3:
the blockchain node receives, broadcasts, packages, executes tx3 through the voting contract, verifies whether the voting account has the voting right of the vote according to the signature of tx 3:
if not, the tx3 fails to execute, and the vote of tx3 is not recorded;
if yes, the first encrypted voting information E (vote _ B) is recorded in the voting contract.
the implementation of tx4-tx7 is the same as tx3, and is not described in detail.
After the expiration of the voting period or after the user A sees that the users B-F recorded on the blockchain have voted, the user end of the user A generates the first private key p1To the vote settlement transaction tx8, tx8 is sent to the blockchain network.
In step S15, the blockchain node receives, broadcasts, packages, executes tx7 through a voting contract:
in step S151, the public key P of the voting account of the user B is found2-BWith p1*P2-BE (vote _ B) is decrypted by a Diffie-Hellman algorithm as a decryption key to obtain vote content vote _ B;
finding out public key P of user C voting account2-CWith p1*P2-CE (vote _ C) is decrypted by a Diffie-Hellman algorithm as a decryption key to obtain vote content vote _ C;
……;
finding out public key P of user F voting account2-FWith p1*P2-FE (vote _ F) is decrypted by a Diffie-Hellman algorithm as a decryption key to obtain vote content vote _ F;
in step S153, the votes are settled according to the respective vote contents vote _ B-vote _ F decrypted and acquired in step S151, and the settlement results are recorded in the voting contract.
In the above embodiment, the registered votes are configured to require voting right to vote, the users who register votes need to configure the voting right of each voting account in the voting contract by sending a transaction, and the voting contract needs to verify whether the voting account has the voting right or not at the time of executing the voting transaction;
in another embodiment, the registered votes may be configured to be voted for any registered account, the voting right of the voting account does not need to be configured in the voting contract, and the voting contract only needs to verify whether the voting account is the registered user account (it is guaranteed that the public key can be found during decryption) and does not need to verify whether the voting account has the voting right, so that the same technical effect can be achieved.
In the embodiment, the first public key is recorded on the block chain during the registration and voting, and the voting content is encrypted by the voting user end through the Diffie-Hellman algorithm according to the private key and the first public key of the voting account, so that all the voting content is kept secret in the voting process, and all the voting content can be obtained by respectively decrypting according to the first private key and the public key of each voting account only through the voting settlement transaction, so as to complete the settlement of the votes.
In a preferred embodiment, the executing the first voting transaction by the voting contract further comprises:
judging whether the current time exceeds the voting cut-off time or not, or whether the current block height exceeds the voting cut-off height or not: if so, the first voting transaction execution fails.
Specifically, the registrant of the vote may configure the voting deadline or the voting deadline height in the voting registration transaction, or may set or modify the voting deadline or the voting deadline height by sending a voting configuration transaction after the voting is registered.
Fig. 2 is a flowchart of another encrypted voting method according to an embodiment of the present invention. The method illustrated in fig. 2 may be performed in conjunction with the method illustrated in fig. 1.
As shown in fig. 2, in this embodiment, the present invention further provides an encrypted voting method applicable to a user side, where a block chain is configured with a voting contract, and the method includes:
s21: generating a first private key and a corresponding first public key for a first vote to be registered;
s23: generating a voting registration transaction comprising a first public key and sending the voting registration transaction to a block chain network, so that a block chain node executes through a voting contract, and recording the first public key of the first vote to a block chain, so that each user end participating in the first vote can:
acquiring a first public key;
encrypting the voting content by a Diffie-Hellman algorithm according to a second private key and a first public key of the current voting account to generate first encrypted voting information;
generating a first voting transaction comprising first encrypted voting information and sending the first voting transaction to a block chain network so as to be executed by a block chain node through a voting contract, and recording the first encrypted voting information into the voting contract when the execution is successful;
s25: generating and sending a voting settlement transaction comprising the first private key to the blockchain network for the blockchain nodes to execute through the voting contract:
decrypting the corresponding first encrypted voting information according to the first private key and the second public key of each voting user respectively to obtain corresponding voting content;
and settling the first vote according to the acquired voting content.
Preferably, executing the first voting transaction via the voting contract further comprises:
judging whether the current time exceeds the voting cut-off time or not, or whether the current block height exceeds the voting cut-off height or not: if so, the first voting transaction execution fails.
The principle of encrypted voting in the method shown in fig. 2 can refer to the method shown in fig. 1, and is not described in detail.
Fig. 3 is a flowchart of another encrypted voting method according to an embodiment of the present invention. The method illustrated in fig. 3 may be performed in conjunction with the methods illustrated in fig. 1-2.
As shown in fig. 3, in this embodiment, the present invention further provides another encrypted voting method suitable for a user side, where a block chain is configured with a voting contract, and the method includes:
s31: acquiring a first public key of a first vote recorded on a block chain; the first public key is recorded on the block chain after the voting registration transaction is successfully executed by the block chain link point through the voting contract;
s33: encrypting the voting content by a Diffie-Hellman algorithm according to a second private key and a first public key of the current voting account to generate first encrypted voting information;
s35: and generating a first voting transaction comprising first encrypted voting information and sending the first voting transaction to the block chain network so as to be executed by the block chain node through the voting contract, and recording the first encrypted voting information into the voting contract when the execution is successful.
The voting contract is further for executing a voting settlement transaction that includes a first private key to which the first public key corresponds:
decrypting the corresponding first encrypted voting information according to the first private key and the second public key of each voting user respectively to obtain corresponding voting content;
and settling the first vote according to the acquired voting content.
Preferably, executing the first voting transaction via the voting contract further comprises:
judging whether the current time exceeds the voting cut-off time or not, or whether the current block height exceeds the voting cut-off height or not: if so, the first voting transaction execution fails.
The principle of encrypted voting in the method shown in fig. 3 can also refer to the method shown in fig. 1, and is not described in detail.
Fig. 4 is a schematic structural diagram of an apparatus according to an embodiment of the present invention.
As shown in fig. 4, as another aspect, the present application also provides an apparatus 400 including one or more Central Processing Units (CPUs) 401 that can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM)402 or a program loaded from a storage section 408 into a Random Access Memory (RAM) 403. In the RAM403, various programs and data necessary for the operation of the device 400 are also stored. The CPU401, ROM402, and RAM403 are connected to each other via a bus 404. An input/output (I/O) interface 405 is also connected to bus 404.
The following components are connected to the I/O interface 405: an input section 406 including a keyboard, a mouse, and the like; an output section 407 including a display device such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker; a storage section 408 including a hard disk and the like; and a communication section 409 including a network interface card such as a LAN card, a modem, or the like. The communication section 409 performs communication processing via a network such as the internet. A driver 410 is also connected to the I/O interface 405 as needed. A removable medium 411 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 410 as necessary, so that a computer program read out therefrom is mounted into the storage section 408 as necessary.
In particular, according to an embodiment of the present disclosure, the method described in any of the above embodiments may be implemented as a computer software program. For example, embodiments of the present disclosure include a computer program product comprising a computer program tangibly embodied on a machine-readable medium, the computer program comprising program code for performing any of the methods described above. In such an embodiment, the computer program may be downloaded and installed from a network through the communication section 409, and/or installed from the removable medium 411.
As yet another aspect, the present application also provides a computer-readable storage medium, which may be the computer-readable storage medium included in the apparatus of the above-described embodiment; or it may be a separate computer readable storage medium not incorporated into the device. The computer readable storage medium stores one or more programs for use by one or more processors in performing the methods described in the present application.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units or modules described in the embodiments of the present application may be implemented by software or hardware. The described units or modules may also be provided in a processor, for example, each unit may be a software program provided in a computer or a mobile intelligent device, or may be a separately configured hardware device. Wherein the designation of a unit or module does not in some way constitute a limitation of the unit or module itself.
The above description is only a preferred embodiment of the application and is illustrative of the principles of the technology employed. It will be appreciated by those skilled in the art that the scope of the invention herein disclosed is not limited to the particular combination of features described above, but also encompasses other arrangements formed by any combination of the above features or their equivalents without departing from the spirit of the present application. For example, the above features may be replaced with (but not limited to) features having similar functions disclosed in the present application.

Claims (8)

1. An encrypted voting method, wherein a blockchain is configured with a voting contract, and the method is applicable to a blockchain node, and the method comprises:
executing a voting registration transaction through the voting contract, and recording a first public key of a first vote on a block chain, so that each user end participating in the first vote can:
acquiring the first public key;
encrypting the voting content by a Diffie-Hellman algorithm according to a second private key of the current voting account and the first public key to generate first encrypted voting information;
generating a first voting transaction comprising the first encrypted voting information and sending the first voting transaction to a blockchain network;
executing the first voting transaction through the voting contract, and recording corresponding first encrypted voting information into the voting contract when the execution is successful;
executing, by the voting contract, a voting settlement transaction that includes a first private key to which the first public key corresponds:
decrypting the corresponding first encrypted voting information according to the first private key and the second public key of each voting user respectively to obtain corresponding voting content;
and settling the first vote according to the acquired voting content.
2. The method of claim 1, wherein said executing the first voting transaction via the voting contract further comprises:
judging whether the current time exceeds the voting cut-off time or not, or whether the current block height exceeds the voting cut-off height or not:
if so, the first voting transaction fails to execute.
3. An encrypted voting method, wherein a block chain is configured with a voting contract, and the method is applicable to a user side, and the method comprises:
generating a first private key and a corresponding first public key for a first vote to be registered;
generating a voting registration transaction comprising the first public key and sending the voting registration transaction to a blockchain network, so that blockchain nodes execute through the voting contract, and recording the first public key of the first vote on a blockchain, so that each user end participating in the first vote can:
acquiring the first public key;
encrypting the voting content by a Diffie-Hellman algorithm according to a second private key of the current voting account and the first public key to generate first encrypted voting information;
generating a first voting transaction comprising the first encrypted voting information and sending the first voting transaction to a block chain network so as to be executed by a block chain node through the voting contract, and recording the first encrypted voting information into the voting contract when the execution is successful;
generating and sending a voting settlement transaction including the first private key to a blockchain network for blockchain nodes to execute through the voting contract:
decrypting the corresponding first encrypted voting information according to the first private key and the second public key of each voting user respectively to obtain corresponding voting content;
and settling the first vote according to the acquired voting content.
4. The method of claim 3, wherein executing the first voting transaction via the voting contract further comprises:
judging whether the current time exceeds the voting cut-off time or not, or whether the current block height exceeds the voting cut-off height or not:
if so, the first voting transaction fails to execute.
5. An encrypted voting method, wherein a block chain is configured with a voting contract, and the method is applicable to a user side, and the method comprises:
acquiring a first public key of a first vote recorded on a block chain; the first public key is recorded on the block chain after the voting registration transaction is successfully executed by the block chain link point through the voting contract;
encrypting the voting content by a Diffie-Hellman algorithm according to a second private key of the current voting account and the first public key to generate first encrypted voting information;
generating a first voting transaction comprising the first encrypted voting information and sending the first voting transaction to a block chain network so as to be executed by a block chain node through the voting contract, and recording the first encrypted voting information into the voting contract when the execution is successful;
the voting contract is further for executing a voting settlement transaction that includes a first private key to which the first public key corresponds:
decrypting the corresponding first encrypted voting information according to the first private key and the second public key of each voting user respectively to obtain corresponding voting content;
and settling the first vote according to the acquired voting content.
6. The method of claim 5, wherein executing the first voting transaction via the voting contract further comprises:
judging whether the current time exceeds the voting cut-off time or not, or whether the current block height exceeds the voting cut-off height or not:
if so, the first voting transaction fails to execute.
7. A computer device, the device comprising:
one or more processors;
a memory for storing one or more programs,
the one or more programs, when executed by the one or more processors, cause the one or more processors to perform the method recited in any of claims 1-6.
8. A storage medium storing a computer program, characterized in that the program, when executed by a processor, implements the method according to any one of claims 1-6.
CN202110137327.3A 2021-02-01 2021-02-01 Encrypted voting method, computer device, and storage medium Pending CN112784305A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110137327.3A CN112784305A (en) 2021-02-01 2021-02-01 Encrypted voting method, computer device, and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110137327.3A CN112784305A (en) 2021-02-01 2021-02-01 Encrypted voting method, computer device, and storage medium

Publications (1)

Publication Number Publication Date
CN112784305A true CN112784305A (en) 2021-05-11

Family

ID=75760270

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110137327.3A Pending CN112784305A (en) 2021-02-01 2021-02-01 Encrypted voting method, computer device, and storage medium

Country Status (1)

Country Link
CN (1) CN112784305A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117040928A (en) * 2023-10-08 2023-11-10 广州市悦智计算机有限公司 Method for realizing voting right privacy distribution based on blockchain intelligent contract
CN117061089A (en) * 2023-10-12 2023-11-14 腾讯科技(深圳)有限公司 Voting management method, device, equipment and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108768607A (en) * 2018-05-14 2018-11-06 中钞信用卡产业发展有限公司杭州区块链技术研究院 A kind of voting method, device, equipment and medium based on block chain
CN109523683A (en) * 2018-12-29 2019-03-26 杭州趣链科技有限公司 A kind of blank electronic voting method based on block chain technology
CN110110555A (en) * 2019-04-24 2019-08-09 深圳前海微众银行股份有限公司 Voting method and device in a kind of block chain
CN110224993A (en) * 2019-05-16 2019-09-10 暨南大学 Anonymous Electronic Voting method and system of calling to account based on block chain
CN110391911A (en) * 2019-07-23 2019-10-29 中国工商银行股份有限公司 Block chain votes anonymously system and method
CN111353827A (en) * 2020-03-13 2020-06-30 杭州复杂美科技有限公司 Block chain voting method, equipment and storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108768607A (en) * 2018-05-14 2018-11-06 中钞信用卡产业发展有限公司杭州区块链技术研究院 A kind of voting method, device, equipment and medium based on block chain
CN109523683A (en) * 2018-12-29 2019-03-26 杭州趣链科技有限公司 A kind of blank electronic voting method based on block chain technology
CN110110555A (en) * 2019-04-24 2019-08-09 深圳前海微众银行股份有限公司 Voting method and device in a kind of block chain
CN110224993A (en) * 2019-05-16 2019-09-10 暨南大学 Anonymous Electronic Voting method and system of calling to account based on block chain
CN110391911A (en) * 2019-07-23 2019-10-29 中国工商银行股份有限公司 Block chain votes anonymously system and method
CN111353827A (en) * 2020-03-13 2020-06-30 杭州复杂美科技有限公司 Block chain voting method, equipment and storage medium

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117040928A (en) * 2023-10-08 2023-11-10 广州市悦智计算机有限公司 Method for realizing voting right privacy distribution based on blockchain intelligent contract
CN117040928B (en) * 2023-10-08 2024-02-09 广州市悦智计算机有限公司 Method for realizing voting right privacy distribution based on blockchain intelligent contract
CN117061089A (en) * 2023-10-12 2023-11-14 腾讯科技(深圳)有限公司 Voting management method, device, equipment and storage medium
CN117061089B (en) * 2023-10-12 2024-02-06 腾讯科技(深圳)有限公司 Voting management method, device, equipment and storage medium

Similar Documents

Publication Publication Date Title
KR102180991B1 (en) Regulation of confidential blockchain transactions
CN110084068B (en) Block chain system and data processing method for block chain system
EP3424177B1 (en) Systems and methods for distributed identity verification
EP3673609B1 (en) Method and apparatus for obtaining input of secure multiparty computation protocol
US20210319132A1 (en) Methods and Devices For Managing User Identity Authentication Data
US11017122B2 (en) Method and server for authenticating and verifying file
EP3761203A1 (en) Information processing method, blockchain node, and electronic apparatus
CN110601816B (en) Lightweight node control method and device in block chain system
JP2014518416A (en) Data manager and curation system
CN108769010B (en) Method and device for node invited registration
US20130305054A1 (en) Truly anonymous cloud key broker
CN112861102B (en) Method and system for processing electronic file based on block chain
CN112784305A (en) Encrypted voting method, computer device, and storage medium
CN113472720A (en) Digital certificate key processing method and device, terminal equipment and storage medium
CN111683082A (en) Data sharing method and system based on block chain and electronic equipment
US20090083739A1 (en) Network resource access control methods and systems using transactional artifacts
CN108471403B (en) Account migration method and device, terminal equipment and storage medium
CN106934732A (en) A kind of science service provides method
JP2023535040A (en) Master key escrow process
WO2021114495A1 (en) Supply chain transaction privacy protection system and method based on blockchain, and related device
CN110737905B (en) Data authorization method, data authorization device and computer storage medium
TWI734729B (en) Method and device for realizing electronic signature and signature server
US20220398299A1 (en) Cross-session issuance of verifiable credential
CN109818965B (en) Personal identity verification device and method
CN111861462A (en) Financial product transaction method and device based on block chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210511

RJ01 Rejection of invention patent application after publication