基于区块链和门限密码的安全投票系统(Python+Django+Node+web3+SQLite3) 毕业论文+文献综述+方案对比+图形源文件+参考文献+项目源码
2022年1月28日,中国创建首个区块链与隐私计算科技创新平台,为解决多方协作和多方信任等安全性问题提供了有力支持。区块链实现数据可信存储,隐私计算保护实体秘密提供可信计算,如果将隐私计算的数据部署到区块链,并由智能合约触发,那么可以解决传统领域各种实际问题。本文基于区块链和隐私计算技术构建了安全的去中化的电子投票应用以解决传统投票系统中的安全隐私问题。本文提出一种安全电子投票方案。在可信数据安全
摘要
2022年1月28日,中国创建首个区块链与隐私计算科技创新平台,为解决多方协作和多方信任等安全性问题提供了有力支持。区块链实现数据可信存储,隐私计算保护实体秘密提供可信计算,如果将隐私计算的数据部署到区块链,并由智能合约触发,那么可以解决传统领域各种实际问题。本文基于区块链和隐私计算技术构建了安全的去中化的电子投票应用以解决传统投票系统中的安全隐私问题。
本文提出一种安全电子投票方案。在可信数据安全存储方面,使用区块链及其上运行的智能合约提供信息安全的运行环境。区块链上的信息公开可访问,确保投票记录的公开透明性;智能合约满足条件就自动触发计算,避免人为的干涉。在可信计算安全执行方面,使用基于门限密码体制的盲签名协议和同态解密算法。首先引入Schnorr盲签名协议,投票签名不完全依赖于单一签名机构,而是由所有签名机构与投票者共同生成。其次,计票统计在不公开解密私钥情况下执行安全计算,同时零知识证明保证计票机构发布信息的可验证性,增强了方案的健壮性。最后,证明了所提方案满足电子方案的基本安全要求,并具有去中心化及鲁棒的特性。
本文设计了一个基于以太坊安全的电子投票系统。首先在python中实现了本方案核心算法,然后在以太坊开发环境完成整个投票系统的搭建与部署,最后通实验数据综合分析系统的性能,并证明所提方案可应用于大规模的选举活动。
关键词:电子投票;门限密码体制;盲签名;区块链;隐私计算
Abstract
On January 28, 2022, China created the first technology innovation platform
for blockchain and privacy computing, providing strong support for solving
security issues such as multi-party collaboration and multi-party trust.
Blockchain realizes trusted storage of data, and privacy computing protects
entity secrets and provides trusted computing. If the data of privacy
computing is deployed to the blockchain and triggered by smart contracts,
various practical problems in the traditional field can be solved. This paper
builds a secure decentralized electronic voting application based on
blockchain and privacy computing technology to solve the security and privacy
issues in traditional voting systems.
This paper proposes a secure electronic voting scheme. In terms of secure
storage of trusted data, the blockchain and the smart contracts running on it
are used to provide a safe operating environment for information. The
information on the blockchain is publicly accessible to ensure the openness
and transparency of voting records; the smart contract will automatically
trigger calculations to avoid human intervention. In terms of secure execution
of trusted computing, blind signature protocols and homomorphic decryption
algorithms based on threshold cryptosystems are used. First, the Schnorr blind
signature protocol is introduced. The voting signature is not completely
dependent on a single signature agency, but is jointly generated by all
signature agencies and voters. Secondly, the voting statistics perform secure
calculations without disclosing the private key for decryption.At the same
time zero-knowledge proof ensures the verifiability of the information
released by the counting agency and enhances the robustness of the scheme.
Finally, it is proved that the proposed scheme meets the basic security
requirements of the electronic scheme, and has the characteristics of
decentralization and robustness.
This paper designs a secure electronic voting system based on Ethereum. First,
the core algorithm of this scheme is implemented in python, then the
construction and deployment of the entire voting system is completed in the
Ethereum development environment, and finally the performance of the system is
comprehensively analyzed through experimental data, and it is proved that the
proposed scheme can be applied to large-scale election activities.
Key words: electronic voting; threshold cryptosystem; blind signature;
blockchain; privacy computing
目录
![](https://img-
blog.csdnimg.cn/img_convert/984cc36ca8ed06176bf13cfe47d1285c.png)
![](https://img-
blog.csdnimg.cn/img_convert/53294988728f94ae9da91b74359b77e3.png)
![](https://img-
blog.csdnimg.cn/img_convert/538ffa3b6a6063c69a58456f4c79abaf.png)
![](https://img-
blog.csdnimg.cn/img_convert/14f9ce6545b28bd579944558ee4ece03.png)
![](https://img-
blog.csdnimg.cn/img_convert/17b53e426b3d64bd22989e2258e77718.png)
![](https://img-
blog.csdnimg.cn/img_convert/a25ec2ea335af0e0c834773ce2d95552.png)
![](https://img-
blog.csdnimg.cn/img_convert/4b75259c3b297734da8d4a1d32abe2b5.png)
![](https://img-
blog.csdnimg.cn/img_convert/b26214cfac07b351c87edb508d92919e.png)
![](https://img-
blog.csdnimg.cn/img_convert/2b2af35ec64abf186301f5771ad869d3.png)
![](https://img-
blog.csdnimg.cn/img_convert/e0e2cb2c5a39c4e7ad48adf3bb7914e7.png)
![](https://img-
blog.csdnimg.cn/img_convert/c949568a1faca909250f3a2e0400de3c.png)
![](https://img-
blog.csdnimg.cn/img_convert/4d65d7398294956ca80c54447e466fdd.png)
![](https://img-
blog.csdnimg.cn/img_convert/76e9a0841d26c8604f3368b8d2105761.png)
![](https://img-
blog.csdnimg.cn/img_convert/d5956697dcb5f08a3865854eab80f196.png)
![](https://img-
blog.csdnimg.cn/img_convert/7fd5105815849a2476135aa6ca8fa675.png)
最后
从时代发展的角度看,网络安全的知识是学不完的,而且以后要学的会更多,同学们要摆正心态,既然选择入门网络安全,就不能仅仅只是入门程度而已,能力越强机会才越多。
因为入门学习阶段知识点比较杂,所以我讲得比较笼统,大家如果有不懂的地方可以找我咨询,我保证知无不言言无不尽,需要相关资料也可以找我要,我的网盘里一大堆资料都在吃灰呢。
干货主要有:
①1000+CTF历届题库(主流和经典的应该都有了)
②CTF技术文档(最全中文版)
③项目源码(四五十个有趣且经典的练手项目及源码)
④ CTF大赛、web安全、渗透测试方面的视频(适合小白学习)
⑤ 网络安全学习路线图(告别不入流的学习)
⑥ CTF/渗透测试工具镜像文件大全
⑦ 2023密码学/隐身术/PWN技术手册大全
如果你对网络安全入门感兴趣,那么你需要的话可以点击这里👉网络安全重磅福利:入门&进阶全套282G学习资源包免费分享!
扫码领取
更多推荐
所有评论(0)