scholarly journals Shuffling Public Keys (A Peer-to-peer Voting Algorithm)

2021 ◽  
Author(s):  
Santi J. Vives

A peer-to-peer, permissionless, and distributed cryptographic voting system that relies only on the existence of generic digital signatures and encryption.

Author(s):  
Ashmita Pandey

Abstract: A decentralised, Secure, Peer-to-Peer Multi-Voting System on Ethereum Blockchain is a distributed ledger technology (DLT) that permits virtual votes to be transacted in a peer-to-peer decentralized network. Those transactions are validated and registered through every node of the network, so creating a transparent and immutable series of registered events whose truthfulness is supplied through a consensus protocol. Smart contract automates the execution of agreement that runs routinely as soon as the conditions are satisfied. Smart contract would not need any third parties consequently prevents time loss. By Eliminating the requirement for third parties, consequently, allows numerous processes to be extra efficient and economical. The system is secure, reliable, and anonymous. Smart contract is enforced for the Ethereum network using the Ethereum wallets and also the Solidity language. Users are capable of submit their votes immediately from their Ethereum wallets, and those transaction requests is handled with the consensus of each single Ethereum node. This creates a transparent environment for evoting. A lot of concerning efficiency of the peer-to-peer decentralized electoral system on Ethereum network along with application and the outcomes of implementation are provided in this paper. Keywords: Blockchain, Distributed Ledger Technology (DLT), Consensus Protocol, Smart Contracts, Ethereum, Solidity


This paper describes a decentralized electronic voting system using blockchain technology with peer-to-peer network rather than the centralized voting system of server-client structure. In the proposed system, an Ethereum-based private blockchain network is configured and decentralized applications are implemented to store and distribute voting data to all nodes participating in the network to create secure and reliable electronic voting system. Smart contracts for electronic voting are implemented using the Solidity language and distributed to a configured network so that all users can view and vote on elections, and voting data are shared and contrasted by all users in the network, which makes it possible to build a safer and more reliable electronic voting system without third party involvement.


2019 ◽  
Vol 16 (9) ◽  
pp. 3774-3777
Author(s):  
Kailash Kumar ◽  
Avinash Sharma

Creating an environment to fulfill the basic requirement of E-Voting is indeed a challenge for long time. Blockchain, distributed peer to peer technology has wide range of applications from financial to non-financial sectors. It can be utilized in E-Voting system as well. Electronic casting a ballot or e-casting a ballot has been in existence since seventies. The E-Voting system and its requirements are identified in this paper along with some limitations of the Blockchain in E-Voting system. The blockchain has obvious advantages of increased efficiency, increased productivity and less prone to error over paper based voting system. This paper presents the potential benefits of using the blockchain which can effectively be used in e-casting the votes. The proposed model is based on the fundamental requirements of e-casting to the verification of voters. The limitations of the blockchain with regards to E-Voting is also presented in this paper.


SinkrOn ◽  
2019 ◽  
Vol 4 (1) ◽  
pp. 185 ◽  
Author(s):  
Christnatalis HS ◽  
Amir Mahmud Husein

Increasing application of digital signatures in legitimate authentication of administrative documents in both public and private environments is one of the points of concern, especially the issue of security and integrity of ownership of signatures. Digital signature is a mathematical scheme, which a unit to identify and prove the authenticity of the owner of the message or document. The study aims to analyze security patterns and identification of digital signatures on documents using the RSA-AES-Blowfish hybrid cryptographic method approach for securing digital signatures, while the Kohonen SOM method is applied to identify ownership recognition of signature images. The analysis framework used in this study is each signature will be stored in the form of a digital image file that has been encrypted using hybrid method of AES-Blowfish with the SHA 256 hash function. Process of forming private keys and public keys in the signature image using the RSA algorithm. Authentic verification of the use of digital signatures on the document has 2 (two) stages, the first stage is signature will be valid used on the document if the result of hashing the selected signature image is the same based on the private key and public key entered by the user, while the second stage identification is done using the Kohonen SOM method to validate the similarity of the chosen signature with the ownership of the signature.


2021 ◽  
Vol 21 (11-12) ◽  
pp. 955-973
Author(s):  
Boris Skoric

We introduce a variant of quantum signatures in which nonbinary symbols are signed instead of bits. The public keys are fingerprinting states, just as in the scheme of Gottesman and Chuang \cite{GC2001}, but we allow for multiple ways to reveal the private key partially. The effect of this modification is a reduction of the number of qubits expended per message bit. Asymptotically the expenditure becomes as low as one qubit per message bit. We give a security proof, and we present numerical results that show how the improvement in public key size depends on the message length.


PADUA ◽  
2016 ◽  
Vol 11 (1) ◽  
pp. 65-71 ◽  
Author(s):  
Jörg Haslbeck

Zusammenfassung. In der Gesundheitsversorgung von Menschen, die mit chronischen Krankheiten leben, wird soziale Unterstützung durch «peers» immer bedeutsamer, d. h. durch Personen, die aufgrund ähnlicher Krankheits- und Alltagserfahrungen in einer vergleichbaren Lebenssituation sind. Welche Potenziale, Chancen sowie Grenzen hat «peer-to-peer healthcare» im Kontext von Selbstmanagementförderung? Der Beitrag diskutiert dies anhand von Erfahrungen mit dem Stanford Kursprogramm «Gesund und aktiv leben».


2019 ◽  
Vol 16 (1) ◽  
pp. 28-41
Author(s):  
Charles Upchurch

A number of proposals have been put forward in recent years by historians in both the British and American academies for increasing the audience for academic history. In part this is due to the significant reduction in support for history programmes in both countries since the 2008 financial crisis. Absent from those proposals, however, is a call to use the popular interest generated by programmes such as Downton Abbey to foster an appreciation for academic history outside the university. Drawing on theories of fan culture developed within media and cultural studies, this article argues for the compatibility of academic history and communities created by fans. It discusses my experience of using Downton Abbey to lecture on the pre-First World War British voting system, utilising the biographies of the show's characters to demonstrate the ways in which British voting was far more restricted in practice than it seemed. The article argues that even those committed to the most traditional forms of academic history can take advantage of opportunities presented by shows like Downton Abbey. It then explores the connections between this method of public engagement and Judith Butler's arguments in Undoing Gender, which examine how conditions for recognition and communication across ideological and cultural divisions can be created.


Sign in / Sign up

Export Citation Format

Share Document