CN113066221B - Network voting method and device - Google Patents

Network voting method and device Download PDF

Info

Publication number
CN113066221B
CN113066221B CN202110306706.0A CN202110306706A CN113066221B CN 113066221 B CN113066221 B CN 113066221B CN 202110306706 A CN202110306706 A CN 202110306706A CN 113066221 B CN113066221 B CN 113066221B
Authority
CN
China
Prior art keywords
voting
plaintext
hash
stage
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110306706.0A
Other languages
Chinese (zh)
Other versions
CN113066221A (en
Inventor
黄弘林
余东
李思倩
方小明
罗少峰
方敏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangu Sunnest Brand Management Guangzhou Co ltd
Original Assignee
Hangu Sunnest Brand Management Guangzhou Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangu Sunnest Brand Management Guangzhou Co ltd filed Critical Hangu Sunnest Brand Management Guangzhou Co ltd
Priority to CN202110306706.0A priority Critical patent/CN113066221B/en
Publication of CN113066221A publication Critical patent/CN113066221A/en
Application granted granted Critical
Publication of CN113066221B publication Critical patent/CN113066221B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C13/00Voting apparatus
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/46Secure multiparty computation, e.g. millionaire problem
    • H04L2209/463Electronic voting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Abstract

A network voting method and a device belong to the field of Internet and aim to solve the problem that the fairness of voting is influenced due to the fact that a voting center cheats or makes a fake. The network voting method comprises the following steps: the data center receives and stores voting hash of ciphertext form sent by at least one user device in a first stage, wherein the voting hash sent by one user device is a unique feature code of the user device, and the voting hash is generated based on a voting plaintext and a hash algorithm; the data center receives a voting plaintext sent by the at least one user device in the second stage, wherein the voting plaintext is generated based on a voting value of a user; the data center verifies whether the voting plaintext and the voting hash from the same user equipment are matched or not; and under the condition that the voting plaintext and the voting hash from the same user equipment are matched, the data center identifies the voting plaintext and the voting hash from the same user equipment as qualified votes.

Description

Network voting method and device
Technical Field
The present application relates to the internet field, and in particular, to a network voting method and apparatus.
Background
Voting is one way of group decision-making, where each voter exercises his or her decision-making power through a choice on the vote.
With the development of computer technology, the network voting mode is more and more popular, the process of the network voting mode is similar to the field voting mode, and voters submit their own options, namely voting values, directly to a vote counting center through a network through terminal equipment and then are counted by the vote counting center in a unified manner.
However, the network voting method has the disadvantage that the vote counting center can know the voting value in advance before the result is disclosed, so that the situation that the vote counting center cheats or makes a fake can occur, and the fairness of voting is influenced.
Disclosure of Invention
The embodiment of the application provides a network voting method and a network voting device, which are used for solving the problem that the fairness of voting is influenced due to the fact that a voting center cheats or makes a fake.
In one aspect, a network voting method is provided, where the network voting method includes:
the data center receives and stores voting hash of ciphertext form sent by at least one user device in a first stage, wherein the voting hash sent by one user device is a unique feature code of the user device, and the voting hash is generated based on a voting plaintext and a hash algorithm;
the data center receives a voting plaintext sent by the at least one user device in the second stage, wherein the voting plaintext is generated based on a voting value of a user;
the data center verifies whether the voting plaintext and the voting hash from the same user equipment are matched;
and under the condition that the voting plaintext and the voting hash from the same user equipment are matched, the data center identifies the voting plaintext and the voting hash from the same user equipment as qualified votes.
In another aspect, a network voting apparatus comprises:
the receiving module is used for receiving voting hash of ciphertext form sent by at least one user device in a first stage, wherein the voting hash sent by one user device is a unique feature code of the user device, and the voting hash is generated based on a voting plaintext and a hash algorithm; receiving a voting plaintext sent by the at least one user device in the second stage, wherein the voting plaintext is generated based on a voting value of a user;
the storage module is used for storing the voting hash of the ciphertext form sent by the at least one user device in the first stage;
the processing module is used for verifying whether the voting plaintext and the voting hash from the same user equipment are matched or not; and under the condition that the voting plaintext and the voting hash from the same user equipment are matched, identifying the voting plaintext and the voting hash from the same user equipment as qualified votes
The technical scheme provided by the embodiment of the application has the following beneficial effects:
the voting process is divided into two stages; the method comprises a first stage and a second stage, wherein the user equipment provides voting hash in a ciphertext form to a data center in the first stage, but does not provide voting plaintext, and the user equipment provides the voting plaintext to the data center in the second stage; the data center identifies the voting plaintext and the voting hash from the same user equipment as qualified voting by verifying whether the voting plaintext and the voting hash from the same user equipment are matched or not under the condition that the voting plaintext and the voting hash from the same user equipment are matched. In the process, the voting hash obtained by the data center in the first stage is in a ciphertext form and can not be identified, and the voting plaintext is obtained in the second stage. Therefore, the situation of cheating or counterfeiting of the voting center can be solved to a certain extent, and the fairness of voting is influenced.
Drawings
Fig. 1 is a flowchart of a network voting method provided in an embodiment of the present application;
fig. 2 is a flowchart of a network voting method provided in an embodiment of the present application;
fig. 3 is a block diagram of a network voting apparatus according to an embodiment of the present application.
Detailed Description
To make the objects, technical solutions and advantages of the present invention more apparent, embodiments of the present invention will be described in detail with reference to the accompanying drawings.
Fig. 1 is a flowchart of a network voting method provided in an embodiment of the present application. Referring to fig. 1, a network voting method provided in an embodiment of the present application may include steps 110 to 140. The execution subject of steps 110 to 140 may be a server. It is noted that the data center referred to hereinafter may be a server.
These steps are explained below one by one.
Step 110, the data center receives and stores voting hashes in a ciphertext form sent by at least one user device in a first stage, wherein the voting hashes sent by one user device are unique feature codes of the user device, and the voting hashes are generated based on a voting plaintext and a hash algorithm.
A Hash algorithm (translated into a Hash algorithm or a Hash algorithm) in computer technology is to transform an input with an arbitrary length (also called a pre-map) into an output with a fixed length through a Hash algorithm, where the output is a Hash value. Hash algorithms, in general, have two features: (1) the same input will output the same hash value; but if the input changes slightly, it will result in a different hash value; (2) the input cannot be deduced inversely from the hash value.
And step 120, the data center receives the voting plaintext sent by the at least one user device in the second stage, where the voting plaintext is generated based on the voting value of the user.
Step 130, the data center verifies whether the voting plaintext and the voting hash from the same user equipment match.
Step 140, in the case that the voting plaintext and the voting hash from the same user equipment match, the data center identifies the voting plaintext and the voting hash from the same user equipment as qualified votes.
In the embodiment of the present application, the result of the options on each vote, i.e. the vote value, is named as: the vote is in plain text. By using a hash algorithm, the voting plaintext can be transformed into a hash value, which is named as: and (6) voting and hashing. According to the characteristics of the hash algorithm, the voting plaintext and the voting hash have the following characteristics: (1) The same voting plaintext can output the same voting hash; different voting plaintexts can output different voting hashes; (2) the voting plaintext cannot be deduced from the voting hash in reverse. Thus, the ticket counting center can be prevented from cheating or counterfeiting to a certain extent.
The voting process in the embodiment of the present application may be an atmosphere first stage and a second stage. The two phases are explained below.
In the first stage, only voting hash is submitted, and the voting center (namely, the data center) cannot know the voting plaintext in advance.
The process comprises the following steps: the user equipment synthesizes the voting value, the ID, the timestamp and other information into a data value (namely the voting plaintext which is a unique value and is not repeated) according to a "voting plaintext synthesis rule", and stores the data value on the current user equipment, wherein care needs to be taken here that the data value is only stored on the current user equipment and cannot be submitted to a data center (namely a vote counting center). The data value is submitted and stored in a data center after generating voting hash (ciphertext) through a hash algorithm.
And in the second stage, submitting the voting plaintext corresponding to the voting hash. Only the voting hash and the voting plaintext match are eligible votes.
The process comprises the following steps: the same user equipment submits a data value (namely, voting plaintext) stored on the current user equipment to a data center, the data center obtains voting hash (ciphertext) according to a hash algorithm, and the obtained voting hash is compared with the voting plaintext. And comparing the information and the information to be matched, namely representing that the voting is qualified, and storing the voting information in a data center and showing the voting information to the outside.
The voting plaintext synthesis rule refers to: the voting value may be the same, if the voting value is only used as the voting plaintext input, the same voting hash may be caused, and to avoid this, the information of the voter ID, the voting timestamp, etc. may be added to combine into the voting plaintext. The rule for forming the voting plaintext based on at least one of the voting value and the voter ID and the voting timestamp is a voting plaintext synthesis rule.
In the network voting method provided by the embodiment of the application, the voting process is divided into two stages; the method comprises a first stage and a second stage, wherein the user equipment provides voting hash in a ciphertext form to the data center in the first stage, and does not provide voting plaintext, and the user equipment provides the voting plaintext to the data center in the second stage; the data center identifies the voting plaintext and the voting hash from the same user equipment as qualified voting by verifying whether the voting plaintext and the voting hash from the same user equipment are matched or not under the condition that the voting plaintext and the voting hash from the same user equipment are matched. In the process, the voting hash obtained by the data center in the first stage is in a ciphertext form and can not be identified, and the voting plaintext is obtained in the second stage. Therefore, the situation of cheating or counterfeiting of the voting center can be solved to a certain extent, and the fairness of voting is influenced.
Optionally, in an embodiment, the network voting method provided in the embodiment of the present application further includes:
the target user equipment generates a voting plaintext based on the voting value of the user, wherein the voting plaintext is a unique identifier corresponding to the user;
the target user equipment generates a voting hash in a ciphertext form based on the voting plaintext and a hash algorithm;
the target user equipment sends the voting hash to a data center in a first stage;
the target user equipment sends the voting plaintext to a data center in a second stage;
wherein the target user equipment is any one of the at least one user equipment.
The network voting method provided by the embodiment of the application decomposes the one-time voting behavior into two stages: and the voting hash is submitted first, and then the voting plaintext is submitted, so that fake cheating after the voting value is known in advance is prevented. However, this method cannot completely prevent the fraud and cheating of the ticket counting center to some extent, and the ticket counting center cannot clear the ticket by self. Therefore, chains of credentialing blocks can be added and disclosed in the basic steps above.
Optionally, in an embodiment, after the step 110 of receiving and storing, by the data center, the ciphertext-form voting hash sent by at least one user device in the first stage, the network voting method provided in the embodiment of the present application further includes: the data center records the submission voting hash behavior onto the blockchain.
Optionally, in an embodiment, after the data center receives, in step 120, plaintext of the vote sent by the at least one user equipment in the second stage, the network voting method provided in this embodiment further includes: the data center records submission voting plaintext behavior onto the blockchain.
In the embodiment of the application, the data center records the submission voting hash behavior on the blockchain and records the submission voting plaintext behavior on the blockchain, and the recording behavior is unchangeable and unique. Therefore, the ticket counting center can clear the ticket by self, and further prevent the ticket counting center from making fake cheating.
The evidence storing method in the embodiment of the application may store all relevant contents, or store the hash of the relevant contents by using a hash function, and then name the rule as: storing the evidence and synthesizing rules.
Optionally, in an embodiment, the network voting method provided in the embodiment of the present application further includes:
and under the condition that the deadline of the first stage is reached, the data center packs and synthesizes all voting hashes according to a storage certificate synthesis rule, and then records the voting hashes on a block chain. Therefore, the ticket counting center can clear the ticket by self, and further prevent the ticket counting center from making fake cheating.
Optionally, in an embodiment, the network voting method provided in the embodiment of the present application further includes:
and under the condition that the deadline of the second stage is reached, the data center packs and synthesizes all voting plaintext according to the evidence storage synthesis rule, and then records the voting plaintext on the block chain. Therefore, the ticket counting center can clear and whiten the ticket by self, and further prevent the ticket counting center from making fake cheats.
Fig. 2 is a flowchart of a network voting method provided in an embodiment of the present application. Referring to fig. 2, the network voting method provided by the embodiment of the present application may include steps 210 to 295.
Step 210, the target user equipment generates a voting plaintext based on the voting value of the user; and based on the voting plaintext and the Hash algorithm, the voting Hash of the ciphertext form is produced;
step 220, after the first stage begins, the target user equipment submits a voting hash to the data center;
step 230, storing voting hash in the data center;
step 240, the data center records the submitted voting hash behavior to a block chain;
step 250, when the deadline time of the first stage is reached, the data center packs and synthesizes all voting hashes according to the evidence storage synthesis rule, and records the voting hashes on a block chain;
step 260, after the second phase starts, the target user equipment submits a voting plaintext to the data center;
step 270, the data center verifies whether the voting plaintext and the voting hash from the same user equipment are matched; if the two are matched, the voting is qualified;
step 280, the data center records the act of submitting the voting plaintext to the block chain;
step 290, when the deadline time of the second stage is reached, the data center packs and synthesizes all voting plaintext according to the evidence storage synthesis rule, and records the voting plaintext on the block chain;
in step 295, the data center calculates and publicizes the voting results.
The process shown in fig. 3 is explained in further detail below. The ticket counting center hereinafter may be a data center. The process shown in fig. 3 can be subdivided into:
1. the method comprises the steps that a ticket counting center starts a first stage and starts to receive voting hash;
2. the voter inputs the voting option, namely the voting value, of the voter on the voting terminal;
3. the voting terminal synthesizes the voting value into a voting plaintext according to a voting plaintext synthesis rule, and generates a unique feature code by using a hash algorithm, namely, voting hash;
4. the voter submits voting hash to a vote counting center through a voting terminal;
5. the vote counting center records the voting hash behavior submitted this time to the block chain according to the evidence storage synthesis rule;
6. when the expiration time of the first voting stage is up, the vote counting center does not receive voting hash any more;
7. the vote counting center packs and synthesizes all voting hashes according to a deposit certificate synthesis rule, and then records the voting hashes on a block chain;
8. the second stage is started by the vote counting center, and the voting plaintext is received;
9. the voter submits a voting plaintext corresponding to the voting hash to a vote counting center through a voting terminal;
10. the vote counting center verifies the voting plaintext and the voting hash, and the matching of the voting plaintext and the voting hash is qualified voting;
11. the vote counting center records the behavior of submitting the voting plaintext to the block chain according to a deposit evidence synthesis rule;
12. when the expiration time of the second voting stage is up, the vote counting center does not receive the voting plaintext any more;
13. the vote counting center packs and synthesizes all voting cleartexts according to the deposit and evidence synthesis rule and records the voting cleartexts on the block chain;
14. and the vote counting center counts the votes according to the number of the qualified votes and discloses the voting result.
The voting process is divided into two stages; the method comprises a first stage and a second stage, wherein the user equipment provides voting hash in a ciphertext form to the data center in the first stage, and does not provide voting plaintext, and the user equipment provides the voting plaintext to the data center in the second stage; the data center identifies the voting plaintext and the voting hash from the same user equipment as qualified voting by verifying whether the voting plaintext and the voting hash from the same user equipment are matched or not under the condition that the voting plaintext and the voting hash from the same user equipment are matched. In the process, the voting hash obtained by the data center in the first stage is in a ciphertext form and can not be identified, and the voting plaintext is obtained in the second stage. Therefore, the situation of cheating or counterfeiting of the voting center can be solved to a certain extent, and the fairness of voting is influenced.
Meanwhile, the voting hash submitting behavior is recorded on the block chain according to the evidence storage synthesis rule, the voting plaintext submitting behavior is recorded on the block chain according to the evidence storage synthesis rule, all the voting hashes are packed and synthesized according to the evidence storage synthesis rule, and then recorded on the block chain, and all the voting plaintext is packed and synthesized according to the evidence storage synthesis rule and then recorded on the block chain, so that the fraud and cheating of the ticket counting center can be prevented more thoroughly, the fraud or fake situation of the ticket counting center is solved fundamentally, and the fairness of voting is influenced.
Fig. 3 is a flowchart of a network voting apparatus according to an embodiment of the present application. Referring to fig. 1, a network voting apparatus provided in an embodiment of the present application may include: a receiving module 310, a storage module 320, and a processing module 330. Wherein:
a receiving module 310, configured to receive a voting hash in a ciphertext form sent by at least one user device in a first stage, where the voting hash sent by one user device is a unique feature code of the user device, and the voting hash is generated based on a voting plaintext and a hash algorithm; and receiving a plaintext vote sent by the at least one user device in the second stage, wherein the plaintext vote is generated based on a vote value of the user;
a storage module 320, configured to store a voting hash of a ciphertext form sent by the at least one user equipment in the first stage;
the processing module 330 is configured to verify whether the voting plaintext and the voting hash from the same user equipment match; and under the condition that the voting plaintext and the voting hash from the same user equipment are matched, identifying the voting plaintext and the voting hash from the same user equipment as qualified votes.
The network voting device provided by the embodiment of the application divides the voting process into two stages; the method comprises a first stage and a second stage, wherein the user equipment provides voting hash in a ciphertext form to the data center in the first stage, and does not provide voting plaintext, and the user equipment provides the voting plaintext to the data center in the second stage; the data center identifies the voting plaintext and the voting hash from the same user equipment as qualified voting by verifying whether the voting plaintext and the voting hash from the same user equipment are matched or not under the condition that the voting plaintext and the voting hash from the same user equipment are matched. In the process, the voting hash obtained by the data center in the first stage is in a ciphertext form and can not be identified, and the voting plaintext is obtained in the second stage. Therefore, the situation of cheating or counterfeiting of the voting center can be solved to a certain extent, and the fairness of voting is influenced.
Optionally, in an embodiment of the present application, the network voting apparatus further includes:
and the recording module is used for recording the submitted voting hash behavior to the block chain after the storage module stores the voting hash of the ciphertext form sent by at least one user device in the first stage.
Optionally, in an embodiment of the present application, the network voting apparatus further includes:
and the recording module is used for recording the submitted voting plaintext behavior to the block chain after the receiving module receives the voting plaintext sent by the at least one user device in the second stage.
Optionally, in an embodiment of the present application, the network voting apparatus further includes:
the recording module is used for recording all voting hashes to a block chain after being packed and synthesized according to a storage certificate synthesis rule under the condition that the deadline time of the first stage is reached; and/or, under the condition that the deadline of the second stage is reached, all voting plaintext is packed and synthesized according to the evidence-storing synthesis rule, and then is recorded on the block chain.
It should be understood that the network voting method described above can be applied to the network voting device provided in the embodiments of the present application, and therefore, reference may be made to the description of the above method section for the content of the network voting device.
With the above description of embodiments, it should be apparent to those skilled in the art that embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus, and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrases "comprising a component of' 8230; \8230;" does not exclude the presence of another like element in a process, method, article, or apparatus that comprises the element.
While the present embodiments have been described with reference to the accompanying drawings, it is to be understood that the present embodiments are not limited to those precise embodiments, which are intended to be illustrative rather than restrictive, and that various changes and modifications may be effected therein by one skilled in the art without departing from the scope of the appended claims.

Claims (10)

1. A network voting method, characterized in that the network voting method comprises:
the data center receives and stores voting hash of ciphertext form sent by at least one user device in a first stage, wherein the voting hash sent by one user device is a unique-feature code of the user device, and the voting hash is generated based on voting plaintext and a hash algorithm;
the data center receives a voting plaintext sent by the at least one user device in the second stage, wherein the voting plaintext is generated based on a voting value of a user;
the data center verifies whether the voting plaintext and the voting hash from the same user equipment are matched;
under the condition that the voting plaintext and the voting hash from the same user equipment are matched, the data center identifies the voting plaintext and the voting hash from the same user equipment as qualified votes;
and when the expiration time of the first stage is up, the data center does not receive the voting hash any more, and the data center starts to receive the voting plaintext in the second stage.
2. A network voting method according to claim 1, wherein the network voting method further comprises:
the target user equipment generates a voting plaintext based on a voting value of a user, wherein the voting plaintext is a unique identifier corresponding to the user;
the target user equipment generates voting hash in a ciphertext form based on the voting plaintext and a hash algorithm;
the target user equipment sends the voting hash to a data center in a first stage;
the target user equipment sends the voting plaintext to a data center in a second stage;
wherein the target user equipment is any one of the at least one user equipment.
3. A network voting method according to claim 1, wherein after the data center receives and stores the voting hash of the ciphertext form transmitted by the at least one user device in the first stage, the network voting method further comprises:
the data center records the submission voting hash behavior onto the blockchain.
4. A network voting method according to claim 1 or claim 3, wherein after the data center receives the plaintext vote sent by the at least one user device in the second stage, the network voting method further comprises:
the data center records the submission of the voting plaintext behavior onto the blockchain.
5. A network voting method according to claim 1, wherein the network voting method further comprises:
and under the condition that the deadline of the first stage is reached, the data center packs and synthesizes all voting hashes according to a storage certificate synthesis rule, and then records the voting hashes on a block chain.
6. A network voting method according to claim 1 or 5, wherein the network voting method further comprises:
and under the condition that the deadline of the second stage is reached, the data center packs and synthesizes all voting plaintext according to a certificate-storing synthesis rule, and then records the voting plaintext on a block chain.
7. A network voting apparatus, characterized in that the network voting apparatus comprises:
the receiving module is used for receiving the voting hash of the ciphertext form sent by at least one user device in the first stage, wherein the voting hash sent by one user device is the unique-feature code of the user device, and the voting hash is generated based on a voting plaintext and a hash algorithm; and receiving a plaintext vote sent by the at least one user device in the second stage, wherein the plaintext vote is generated based on a vote value of the user;
the storage module is used for storing the voting hash of the ciphertext form sent by the at least one user device in the first stage;
the processing module is used for verifying whether the voting plaintext and the voting hash from the same user equipment are matched or not; and under the condition that the voting plaintext and the voting hash from the same user equipment are matched, identifying the voting plaintext and the voting hash from the same user equipment as qualified voting;
when the expiration time of the first phase is up, the network voting device does not receive the voting hash any more, and starts to receive the voting plaintext in the second phase.
8. A network voting apparatus according to claim 7, wherein the network voting apparatus further comprises:
and the recording module is used for recording the submitted voting hash behavior to the block chain after the storage module stores the voting hash of the ciphertext form sent by at least one user device in the first stage.
9. A network voting apparatus according to claim 7 or 8, wherein the network voting apparatus further comprises:
and the recording module is used for recording the submitted voting plaintext behavior to the block chain after the receiving module receives the voting plaintext sent by the at least one user device in the second stage.
10. A network voting apparatus according to claim 7, wherein the network voting apparatus further comprises:
the recording module is used for recording all voting hashes to a block chain after being packed and synthesized according to a storage certificate synthesis rule under the condition that the deadline time of the first stage is reached; and/or, under the condition that the deadline of the second stage is reached, all voting plaintext is packed and synthesized according to a certificate-storing synthesis rule, and then the voting plaintext is recorded on a block chain.
CN202110306706.0A 2021-03-23 2021-03-23 Network voting method and device Active CN113066221B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110306706.0A CN113066221B (en) 2021-03-23 2021-03-23 Network voting method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110306706.0A CN113066221B (en) 2021-03-23 2021-03-23 Network voting method and device

Publications (2)

Publication Number Publication Date
CN113066221A CN113066221A (en) 2021-07-02
CN113066221B true CN113066221B (en) 2022-11-11

Family

ID=76562990

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110306706.0A Active CN113066221B (en) 2021-03-23 2021-03-23 Network voting method and device

Country Status (1)

Country Link
CN (1) CN113066221B (en)

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003067532A (en) * 2001-08-24 2003-03-07 Nec Soft Ltd Electronic voting system and method
CN108809624A (en) * 2018-07-18 2018-11-13 杭州安恒信息技术股份有限公司 A kind of electronic voting method, system, equipment and computer readable storage medium
CN109934988B (en) * 2019-02-15 2021-05-28 三亚哈尔滨工程大学南海创新发展基地 Electronic voting method based on block chain
CN110309672B (en) * 2019-07-01 2020-12-22 北京理工大学 Block chain based privacy protection controllable data management method
CN110555933B (en) * 2019-07-31 2021-04-30 中钞信用卡产业发展有限公司杭州区块链技术研究院 Electronic voting method, device, equipment and computer storage medium
CN110738783A (en) * 2019-10-15 2020-01-31 腾讯科技(深圳)有限公司 System, method, device, equipment and readable storage medium for updating voting data
CN111476571B (en) * 2020-04-02 2023-09-15 百度国际科技(深圳)有限公司 Asset processing method, device, equipment and storage medium based on blockchain
CN111600721B (en) * 2020-05-26 2023-06-16 牛津(海南)区块链研究院有限公司 Asset management system, method and device based on multi-person voting mechanism

Also Published As

Publication number Publication date
CN113066221A (en) 2021-07-02

Similar Documents

Publication Publication Date Title
CN110348231B (en) Data homomorphic encryption and decryption method and device for realizing privacy protection
CN108667632B (en) Credit record sharing method and device based on block chain and electronic equipment
CN108764870B (en) Transaction processing method and device based on block chain and electronic equipment
CN109360091B (en) Random object selection method and device based on block chain
CN110032880B (en) Screen recording evidence obtaining method and system based on block chain and electronic equipment
US20210314167A1 (en) Methods and systems for consensus in blockchains
CN110189122B (en) Method and device for anchoring time for data on block chain and electronic equipment
CN111935075A (en) Block chain-based digital identity signing and issuing method, equipment and medium
CN109785132A (en) A kind of anti-fake source tracing method, device and storage medium based on block chain
US11290256B2 (en) Blockchain-based advertisement monitoring method and apparatus, and electronic device
CN112118100B (en) Improved linkable ring signature method, verification method, device, electronic apparatus and medium
CN113810465A (en) Asynchronous binary consensus method and device
CN112288555A (en) Anonymous auction method, device and medium based on block chain
CN112613601A (en) Neural network model updating method, device and computer storage medium
CN110990790B (en) Data processing method and equipment
CN113066220B (en) Auxiliary voting method and network voting system
CN113066221B (en) Network voting method and device
CN112967119A (en) Bidding method, device and medium based on block chain
CN110990456A (en) Block chain-based information reading and converting method, device and medium
CN113901424A (en) Method and device for selectively disclosing digital identity attribute
CN112070342B (en) Microservice evaluation method and device, electronic equipment and computer readable storage medium
CN113407156A (en) Method and system for generating random number based on decentralized verifiable delay function
CN113949508B (en) Process data processing method and device based on random number consensus mechanism
CN116961925B (en) Signature method, signature system, electronic equipment and storage medium
CN116346349B (en) Digital blind box management method and system based on block chain and NFT

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant