Open Journal Systems

Blockchain-Based Voting System

Jiayang Yao, Lan Wei, Tianqi Liu

Abstract

The advantage of electronic voting is that the voting is convenient and quick and the counting of votes is simple, but it is difficult to meet the requirements of both high security and large-scale application. This paper proposes an electronic voting protocol and system based on blockchain technology. The blockchain layer will use the P2P network to build a distributed database, use digital signature algorithms and encryption technologies to ensure that the data cannot be tampered with, and consensus algorithms to ensure the consistency of the data in the network, and use time stamping technology to connect the data blocks end to end chain structure preservation. And the application of Ethereum fully integrates different functional modules as a whole, achieves consensus through a proof-of-work mechanism, miners mine, and the new network protocol is formulated to achieve synchronous operation of the blockchain. Finally, the smart contract deployed on Ethereum runs on an Ethereum-specific virtual machine, and interacts with the underlying blockchain through the Ethereum virtual machine and RPC interface.


Keywords

Voting System; Blockchain; Smart Contract; Encryption Algorithm

Full Text:

PDF

References

Yan C. Research and design of block chain-based secure voting system (in Chinese). Hangzhou Dianzi University; 2018.

Huang Z, Li X, Lai X, et al. Block chain technology and its application (in Chinese). Information Security Research.

Chen H. Design and implementation of IMIX transmission system based on block chain (in Chinese). 2016.

Ma A, Pan X, Wu L, et al. Overview of research on the basis and application of block chain technology (in Chinese). Information Security Research 2017; 3(11).

Dong Y, Zhai J, Sun T, et al. Electronic voting system based on privacy protection. Computer Application 2016; (s2): 73-76.

Hu H. Design and development of blockchain-based voting system. Nanjing University of Posts and Telecommunications.

Zhang H. Research on trust mechanism based on node information exchange in P2P network environment. Network Security Technology and Application 2016; (11). doi: 10.3969/j.issn.1009-6833.2016.11.035.

Han X, Liu Y. Research on consensus mechanism in block chain technology. Information Network Security 2017; (9). doi: 10.3969/j.issn.1671-1122.2017.09.034.

Gervais A, Karame GO, Wüst K, et al. On the security and performance of proof of work blockchains. The 2016 ACM SIGSAC Conference; ACM 2016. doi: 10.1145/2976749.2978341.

Buldas A, Niitsoo M. Can we construct unbounded time-stamping schemes from collision-free hash functions? Provable Security, Second International Conference; ProvSec 2008; 2008 Oct 30-Nov 1; Proceedings. Springer-Verlag, 2008. doi: 10.1007/978-3-540-88733-1_18.


DOI: http://dx.doi.org/10.18063/csnt.v3i1.1146
(16 Abstract Views, 4 PDF Downloads)

Refbacks

  • There are currently no refbacks.


Copyright (c) 2020 Jiayang Yao

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.