Voting System Based on Blockchain
Source: By:Author(s)
DOI: https://doi.org/10.30564/jcsr.v3i2.2797
Abstract:Online ballot box system has the advantages of high efficiency and environmental protection, but the existing network voting technology still has a lot of matter. Almost all electronic voting system could be proved to be intrusion. The administrator of the system could tamper with the data for benefit, and the system may be attacked by hackers. The safety and fairness of the existing network voting system depend entirely on the safety and credibility of the website itself, but these cannot guarantee the fairness of voting. Make full use of blockchain technology, so that voting, even if there are malicious participants, but also to ensure the correctness and safety of the vote. The introduction of block chain technology, block chain has decentralized, data tampering and other characteristics. P2P network is applied in the block chain layer to construct a distributed database, digital signature algorithm and encryption technology are used to ensure that the data cannot be tampered with, consensus network algorithm is used to ensure the consistency of the data in the network, and timestamp technology is applied to save the data blocks in a chain structure connected end to end. It paper focuses on the implementation of P2P network networking mode, node block synchronization, data and block verification mechanism and consensus mechanism to ensure data consistency in the network layer of block chain layer. Using time stamp, Merkle tree, asymmetric encryption and other technologies to design data blocks and use chain structure to store data blocks. Combined with the characteristics of blockchain, a fair and transparent voting system is constructed. Model aims to apply the block chain technology to the voting scenario and design a secure block chain voting architecture. It system is designed and developed based on the block chain system. It makes full use of its decentralization, removes the dependence of electronic voting on trusted third parties, and protects the privacy of voters and candidates. Data cannot be tampered with. Once the data are stored in the block chain, it cannot be tampered with. It provides a real and credible database.
References:[1] Yuan Yong, Wang Feiyue. Current situation and Prospect of blockchain technology. Acta Automatics Sinica,2016,42(4):481-494. [2] Swan M. Blockchain: Blueprint for a New Economy. USA:O'Reilly Media Inc., 2015. [3] Ding Wei. Block chain based instrument data management system. China Instrumentation, 2015, (10): 15-17. [4] Zhao He, Li Xiao-Feng, ZhanLi-Kui, Wu ZhongCheng. Data integrity protection method for microorganism sampling robots based on blockchain technology. Journal of Huazhong University of Science and Technology (Natural Science Edition), 2015, 43(Zl): 216-219. [5] Swan M.Blockchain thinking: the brain as a decentralized autonomous corporation. IEEE Technology and Society Magazine, 2015, 34(4): 41-52. [6] Sarr Idrissa, Naacke Gueye Ibrahima. Blockchain-based model for social transactions procedureing. DATA 2015-4th International Conference on Data Management Technologies and Applieations. 2015:309-315. [7] H.Watanabe, S. Fujimura, A. Nakadaira, etc. Blockchain contract: Securing a blockchain applied to smart contracts. IEEE International Conference on Consumer Electronics (ICCE)、2016:467-468. [8] Zhu Yan, Gan Guohua, Deng Di and other key technologies of blockchain security research. Information security research, 2016,(12):1090-1097. [9] Shen Xin, Pei Qingqi, Liu Xuefeng. Overview of blockchain technology. Journal of network and information security, 2016,(11) :11-20. [10] Jia Liping. Theory, practice and influence of bitcoin. International financial research, 2013, (12) :14- 25. [11] National Institute of Standards and Technology (NIST), Secure hash standard. Federal Information Procuring Standards Publication (FIPS PUB)180, May 1993. [12] National Institute of Standards and Technology (NIST) Computer Systems Laboratory, Secure hash standard. Federal Information Procuring Standards Publication (FIPS PUB)180-1, April 1995. [13] National Institute of Standards and Technology (NIST) Computer Systems Laboratory, Secure Hash Standard. Federal Information Procuring Standards Publication (FIPS PUB)180-2, August 2002. [14] Rivets R. The MD4 message digest algorithm. In Advances in Cryptology, Crypto'90 volume 537 of LNCS, pages 303-311.Springer-Verlag, 1991.