PL434378A1 - Wspomagany komputerowo sposób przeprowadzania anonimowych głosowań i urządzenie do głosowania anonimowego - Google Patents

Wspomagany komputerowo sposób przeprowadzania anonimowych głosowań i urządzenie do głosowania anonimowego

Info

Publication number
PL434378A1
PL434378A1 PL434378A PL43437820A PL434378A1 PL 434378 A1 PL434378 A1 PL 434378A1 PL 434378 A PL434378 A PL 434378A PL 43437820 A PL43437820 A PL 43437820A PL 434378 A1 PL434378 A1 PL 434378A1
Authority
PL
Poland
Prior art keywords
voting
anonymous voting
computer
anonymous
conducting
Prior art date
Application number
PL434378A
Other languages
English (en)
Inventor
Rafał Maj
Damian Babula
Tomasz Księżak
Original Assignee
Damian Babula
Rafał Maj
Tomasz Księżak
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Damian Babula, Rafał Maj, Tomasz Księżak filed Critical Damian Babula
Priority to PL434378A priority Critical patent/PL434378A1/pl
Publication of PL434378A1 publication Critical patent/PL434378A1/pl
Priority to EP21180718.5A priority patent/EP3952206A3/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/42Anonymization, e.g. involving pseudonyms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/46Secure multiparty computation, e.g. millionaire problem
    • H04L2209/463Electronic voting

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Time Recorders, Dirve Recorders, Access Control (AREA)

Abstract

Przedmiotem wynalazku jest wspomagany komputerowo sposób przeprowadzania anonimowych głosowań, w szczególności głosowań zdalnych umożliwiający ich przeprowadzenie w sposób powszechny, tajny i ograniczający możliwość sprzedaży głosu lub wpłynięcia przez osoby trzecie na sposób jego oddania oraz urządzenie do głosowania anonimowego. Rozwiązanie obejmuje w szczególności sposób nadawania uprawnień do głosowania, anonimizacji podmiotu oddającego głos, oddanie głosów i ich sumowanie, a także przewiduje możliwość kontroli poprawności przeprowadzenia procesu głosowania przez każdego z jego uczestników.
PL434378A 2020-06-19 2020-06-19 Wspomagany komputerowo sposób przeprowadzania anonimowych głosowań i urządzenie do głosowania anonimowego PL434378A1 (pl)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PL434378A PL434378A1 (pl) 2020-06-19 2020-06-19 Wspomagany komputerowo sposób przeprowadzania anonimowych głosowań i urządzenie do głosowania anonimowego
EP21180718.5A EP3952206A3 (en) 2020-06-19 2021-06-21 Anonymized voting method and a device for anonymous voting

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PL434378A PL434378A1 (pl) 2020-06-19 2020-06-19 Wspomagany komputerowo sposób przeprowadzania anonimowych głosowań i urządzenie do głosowania anonimowego

Publications (1)

Publication Number Publication Date
PL434378A1 true PL434378A1 (pl) 2021-05-17

Family

ID=75882868

Family Applications (1)

Application Number Title Priority Date Filing Date
PL434378A PL434378A1 (pl) 2020-06-19 2020-06-19 Wspomagany komputerowo sposób przeprowadzania anonimowych głosowań i urządzenie do głosowania anonimowego

Country Status (2)

Country Link
EP (1) EP3952206A3 (pl)
PL (1) PL434378A1 (pl)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113691512A (zh) * 2021-08-13 2021-11-23 北京理工大学 一种结合区块链与洋葱网络的数据隐蔽传输系统及方法

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115632777B (zh) * 2022-12-12 2023-03-31 中电长城网际系统应用有限公司 数据处理方法及电子设备

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
SG11201806780PA (en) 2016-02-23 2018-09-27 Nchain Holdings Ltd Agent-based turing complete transactions integrating feedback within a blockchain system
AU2017395785B2 (en) * 2017-01-30 2023-12-21 EXO One Pty Ltd Voting system and method

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113691512A (zh) * 2021-08-13 2021-11-23 北京理工大学 一种结合区块链与洋葱网络的数据隐蔽传输系统及方法

Also Published As

Publication number Publication date
EP3952206A2 (en) 2022-02-09
EP3952206A3 (en) 2022-04-20

Similar Documents

Publication Publication Date Title
PL434378A1 (pl) Wspomagany komputerowo sposób przeprowadzania anonimowych głosowań i urządzenie do głosowania anonimowego
CN106682530A (zh) 一种基于区块链技术的医疗信息共享隐私保护方法及装置
Rotenberg Schrems II, from Snowden to China: Toward a new alignment on transatlantic data protection
Barsdorf et al. Access to treatment in HIV prevention trials: perspectives from a South African community
Guo et al. Hemodialysis nurse burnout in 31 provinces in mainland China: A cross‐sectional survey
Polat et al. Does social support affect menopausal symptoms in menopausal women?
Kollias et al. Defence and Non‐Defence Spending in the USA: Stimuli to Economic Growth? Comparative Findings from a Semiparametric Approach
Unger Katz and COVID-19: how a pandemic changed the reasonable expectation of privacy
Cakal et al. Workplace violence and turnover intentions among nurses: the moderating roles of invulnerability and organisational support–A cross‐sectional study
Kim et al. Design and implementation of a personal health record platform based on patient-consent blockchain technology
Abel Keeping Families Together, Saving Money, and Other Motivations Behind New Civil Right to Counsel Laws
Mistry et al. Availability of active therapeutic hypothermia at birth for neonatal hypoxic ischaemic encephalopathy: a UK population study from 2011 to 2018
TW201626284A (zh) 隱私資料流程安全與儲存保護方法及其系統
Chen et al. Internet addiction and academic anxiety among chinese college students during COVID-19: The mediating role of psychological contract
Giri et al. Utilization of adolescent friendly health services and its associated factors in Dang district of Nepal
Zou et al. Predicting COVID-19 vaccination intentions: the roles of threat appraisal, coping appraisal, subjective norms, and negative affect
KR102201085B1 (ko) 전자투표시스템 및 전자투표방법
Fenwick et al. Managing dyspnea in individuals with idiopathic pulmonary fibrosis
Ademola et al. An improved e-voting system using blockchain technology
Habitu et al. Level of implementation fidelity of youth-friendly services in Northwest Ethiopia
Miao Coded Social Control: China's Normalization of Biometric Surveillance in the Post COVID-19 Era
Schillo Commercialization and Public Good: Conflict, Complement, or Critical Component?
Andreu‐Pejó et al. Perinatal mental e‐health: What is the profile of pregnant women interested in online assessment of their emotional state?
Olsson Challenges with the GDPR: A Software Developing Organization’s Guide to GDPR Compliance
Anderson Effective Communication and Teamwork Improve Patient Safety