Trustless, Censorship-Resilient and Scalable Votings in the Permission-Based Blockchain Model

被引:0
|
作者
Gajek, Sebastian [1 ]
Lewandowsky, Marco [1 ]
机构
[1] Flensburg Univ Appl Sci, Flensburg, Germany
来源
EURO-PAR 2020: PARALLEL PROCESSING WORKSHOPS | 2021年 / 12480卷
关键词
Voting; Functional encryption; Blockchain; Hyperledger;
D O I
10.1007/978-3-030-71593-9_5
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Voting systems are the tool of choice when it comes to settle an agreement of different opinions. We propose a solution for a trustless, censorship-resilient and scalable electronic voting platform. By leveraging the blockchain together with the functional encryption paradigm, we fully decentralize the system and reduce the risks that a voting provider, like a corrupt government, does censor or manipulate the outcome.
引用
收藏
页码:54 / 65
页数:12
相关论文
共 18 条
  • [1] Model-based design and analysis of permission-based security
    Jürjens, J
    Lehrhuber, M
    Wimmel, G
    ICECCS 2005: 10TH IEEE INTERNATIONAL CONFERENCE ON ENGINEERING OF COMPLEX COMPUTER SYSTEMS, PROCEEDINGS, 2005, : 224 - 233
  • [2] Towards Formal Analysis of the Permission-based Security Model for Android
    Shin, Wook
    Kiyomoto, Shinsaku
    Fukushima, Kazuhide
    Tanaka, Toshiaki
    ICWMC: 2009 FIFTH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMMUNICATIONS, 2009, : 87 - 92
  • [3] The Permission-Based Malicious Behaviors Monitoring Model for the Android OS
    Park, Min-Woo
    Choi, Young-Hyun
    Eom, Jung-Ho
    Chung, Tai-Myoung
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS, PT I, 2013, 7971 : 382 - 395
  • [4] Formal Analysis of Android's Permission-Based Security Model
    Betarte, Gustavo
    Campo, Juan
    Luna, Carlos
    Romano, Agustin
    SCIENTIFIC ANNALS OF COMPUTER SCIENCE, 2016, 26 (01) : 27 - 68
  • [5] A Blockchain-Based Framework for Scalable and Trustless Delegation of Cyber Threat Intelligence
    Dunnett, Kealan
    Pal, Shantanu
    Jadidi, Zahra
    Jurdak, Raja
    2023 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN AND CRYPTOCURRENCY, ICBC, 2023,
  • [6] Permission-Based Separation of Duty in Dynamic Role-Based Access Control Model
    Aftab, Muhammad Umar
    Qin, Zhiguang
    Hundera, Negalign Wake
    Ariyo, Oluwasanmi
    Zakria
    Ngo Tung Son
    Dinh, Tran Van
    SYMMETRY-BASEL, 2019, 11 (05):
  • [7] Injecting a Permission-based Delegation Model to Secure Web-based Workflow Systems
    Wang, Xiaoran
    Bayrak, Coskun
    ISI: 2009 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS, 2009, : 101 - 106
  • [8] Explainable Classification Model for Android Malware Analysis Using API and Permission-Based Features
    Aslam, Nida
    Khan, Irfan Ullah
    Bader, Salma Abdulrahman
    Alansari, Aisha
    Alaqeel, Lama Abdullah
    Khormy, Razan Mohammed
    Alkubaish, Zahra Abdultawab
    Hussain, Tariq
    CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 76 (03): : 3167 - 3188
  • [9] Accept - Maybe - Decline: Introducing Partial Consent for the Permission-based Access Control Model of Android
    Momen, Nurul
    Bock, Sven
    Fritsch, Lothar
    SACMAT'20: PROCEEDINGS OF THE 25TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2020, : 71 - 80
  • [10] Blockchain-based Scalable Ubiquitous Code Allocation Method Resilient to Congestion
    Seike, Hirotsugu
    Aoki, Yasukazu
    Koshizuka, Noboru
    2021 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN (BLOCKCHAIN 2021), 2021, : 272 - 279