基于区块链的电子投票协议

E. K., V. B.
{"title":"基于区块链的电子投票协议","authors":"E. K., V. B.","doi":"10.52589/bjcnit-7lst204k","DOIUrl":null,"url":null,"abstract":"SQL injection attack is now the most common server-side attack in web applications whereby malicious codes are injected into the database through user input fields by unauthorized users and this could lead to data loss or in the worst case, to database hijacking. The utilization of Blockchain technology in e-voting applications is not a new thing. Many systems have been proposed using cryptography and other security techniques. In those systems, minimal involvement of third party is observed, a problem of coercion resistance and transparency maintenance at the same time is observed and most processes have not been implemented to evaluate the systems further. This paper applies the cryptographic signatures to validate the origin and integrity of the votes by preserving the voter’s choices during the election process. Furthermore, authors provide several possible extensions and improvements that can be made as an addition to the scope of this research.","PeriodicalId":326452,"journal":{"name":"British Journal of Computer, Networking and Information Technology","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2022-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Blockchain Based Electronic Voting Protocol\",\"authors\":\"E. K., V. B.\",\"doi\":\"10.52589/bjcnit-7lst204k\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"SQL injection attack is now the most common server-side attack in web applications whereby malicious codes are injected into the database through user input fields by unauthorized users and this could lead to data loss or in the worst case, to database hijacking. The utilization of Blockchain technology in e-voting applications is not a new thing. Many systems have been proposed using cryptography and other security techniques. In those systems, minimal involvement of third party is observed, a problem of coercion resistance and transparency maintenance at the same time is observed and most processes have not been implemented to evaluate the systems further. This paper applies the cryptographic signatures to validate the origin and integrity of the votes by preserving the voter’s choices during the election process. Furthermore, authors provide several possible extensions and improvements that can be made as an addition to the scope of this research.\",\"PeriodicalId\":326452,\"journal\":{\"name\":\"British Journal of Computer, Networking and Information Technology\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-06-05\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"British Journal of Computer, Networking and Information Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.52589/bjcnit-7lst204k\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"British Journal of Computer, Networking and Information Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.52589/bjcnit-7lst204k","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

SQL注入攻击现在是web应用程序中最常见的服务器端攻击,未经授权的用户通过用户输入字段将恶意代码注入数据库,这可能导致数据丢失,或者在最坏的情况下导致数据库劫持。区块链技术在电子投票应用中的应用并不是一件新鲜事。许多系统已经提出使用密码学和其他安全技术。在这些系统中,观察到第三方的参与最少,同时观察到抵制强制和保持透明度的问题,并且大多数过程没有实施以进一步评估系统。本文通过保留选民在选举过程中的选择,应用加密签名来验证选票的来源和完整性。此外,作者提供了几个可能的扩展和改进,可以作为本研究范围的补充。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Blockchain Based Electronic Voting Protocol
SQL injection attack is now the most common server-side attack in web applications whereby malicious codes are injected into the database through user input fields by unauthorized users and this could lead to data loss or in the worst case, to database hijacking. The utilization of Blockchain technology in e-voting applications is not a new thing. Many systems have been proposed using cryptography and other security techniques. In those systems, minimal involvement of third party is observed, a problem of coercion resistance and transparency maintenance at the same time is observed and most processes have not been implemented to evaluate the systems further. This paper applies the cryptographic signatures to validate the origin and integrity of the votes by preserving the voter’s choices during the election process. Furthermore, authors provide several possible extensions and improvements that can be made as an addition to the scope of this research.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Curbing the Effect of Climate Change for Sustainable Development through Digital Transformation and Environmental Sustainability An Efficient Security Routing Protocol for Cloud-Based Networks Using Cisco Packet Tracer Fake News Detection System Using Logistic Regression, Decision Tree and Random Forest Automation of a Complaint Management System Using RPA Information Systems and Operational Efficiency of Maritime Firms in Port Harcourt
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1