PL434378A1 - Wspomagany komputerowo sposób przeprowadzania anonimowych głosowań i urządzenie do głosowania anonimowego - Google Patents

Wspomagany komputerowo sposób przeprowadzania anonimowych głosowań i urządzenie do głosowania anonimowego

Info

Publication number
PL434378A1
PL434378A1 PL434378A PL43437820A PL434378A1 PL 434378 A1 PL434378 A1 PL 434378A1 PL 434378 A PL434378 A PL 434378A PL 43437820 A PL43437820 A PL 43437820A PL 434378 A1 PL434378 A1 PL 434378A1
Authority
PL
Poland
Prior art keywords
voting
anonymous voting
computer
anonymous
conducting
Prior art date
Application number
PL434378A
Other languages
English (en)
Inventor
Rafał Maj
Damian Babula
Tomasz Księżak
Original Assignee
Damian Babula
Rafał Maj
Tomasz Księżak
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Damian Babula, Rafał Maj, Tomasz Księżak filed Critical Damian Babula
Priority to PL434378A priority Critical patent/PL434378A1/pl
Publication of PL434378A1 publication Critical patent/PL434378A1/pl
Priority to EP21180718.5A priority patent/EP3952206A3/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/42Anonymization, e.g. involving pseudonyms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/46Secure multiparty computation, e.g. millionaire problem
    • H04L2209/463Electronic voting

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Time Recorders, Dirve Recorders, Access Control (AREA)

Abstract

Przedmiotem wynalazku jest wspomagany komputerowo sposób przeprowadzania anonimowych głosowań, w szczególności głosowań zdalnych umożliwiający ich przeprowadzenie w sposób powszechny, tajny i ograniczający możliwość sprzedaży głosu lub wpłynięcia przez osoby trzecie na sposób jego oddania oraz urządzenie do głosowania anonimowego. Rozwiązanie obejmuje w szczególności sposób nadawania uprawnień do głosowania, anonimizacji podmiotu oddającego głos, oddanie głosów i ich sumowanie, a także przewiduje możliwość kontroli poprawności przeprowadzenia procesu głosowania przez każdego z jego uczestników.
PL434378A 2020-06-19 2020-06-19 Wspomagany komputerowo sposób przeprowadzania anonimowych głosowań i urządzenie do głosowania anonimowego PL434378A1 (pl)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PL434378A PL434378A1 (pl) 2020-06-19 2020-06-19 Wspomagany komputerowo sposób przeprowadzania anonimowych głosowań i urządzenie do głosowania anonimowego
EP21180718.5A EP3952206A3 (en) 2020-06-19 2021-06-21 Anonymized voting method and a device for anonymous voting

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PL434378A PL434378A1 (pl) 2020-06-19 2020-06-19 Wspomagany komputerowo sposób przeprowadzania anonimowych głosowań i urządzenie do głosowania anonimowego

Publications (1)

Publication Number Publication Date
PL434378A1 true PL434378A1 (pl) 2021-05-17

Family

ID=75882868

Family Applications (1)

Application Number Title Priority Date Filing Date
PL434378A PL434378A1 (pl) 2020-06-19 2020-06-19 Wspomagany komputerowo sposób przeprowadzania anonimowych głosowań i urządzenie do głosowania anonimowego

Country Status (2)

Country Link
EP (1) EP3952206A3 (pl)
PL (1) PL434378A1 (pl)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113691512A (zh) * 2021-08-13 2021-11-23 北京理工大学 一种结合区块链与洋葱网络的数据隐蔽传输***及方法

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115632777B (zh) * 2022-12-12 2023-03-31 中电长城网际***应用有限公司 数据处理方法及电子设备

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
SG10202109555WA (en) 2016-02-23 2021-09-29 Nchain Holdings Ltd Agent-based turing complete transactions integrating feedback within a blockchain system
US20190371106A1 (en) * 2017-01-30 2019-12-05 EXO One Pty Ltd Voting system and method

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113691512A (zh) * 2021-08-13 2021-11-23 北京理工大学 一种结合区块链与洋葱网络的数据隐蔽传输***及方法

Also Published As

Publication number Publication date
EP3952206A2 (en) 2022-02-09
EP3952206A3 (en) 2022-04-20

Similar Documents

Publication Publication Date Title
PL434378A1 (pl) Wspomagany komputerowo sposób przeprowadzania anonimowych głosowań i urządzenie do głosowania anonimowego
CN106682530A (zh) 一种基于区块链技术的医疗信息共享隐私保护方法及装置
He et al. Conversational agent interventions for mental health problems: systematic review and meta-analysis of randomized controlled trials
Sanchez Urribarri et al. Explaining changes to rights litigation: Testing a multivariate model in a comparative framework
Rotenberg Schrems II, from Snowden to China: Toward a new alignment on transatlantic data protection
Barsdorf et al. Access to treatment in HIV prevention trials: perspectives from a South African community
Guo et al. Hemodialysis nurse burnout in 31 provinces in mainland China: A cross‐sectional survey
Polat et al. Does social support affect menopausal symptoms in menopausal women?
Kollias et al. Defence and Non‐Defence Spending in the USA: Stimuli to Economic Growth? Comparative Findings from a Semiparametric Approach
Unger Katz and COVID-19: how a pandemic changed the reasonable expectation of privacy
Kim et al. Design and implementation of a personal health record platform based on patient-consent blockchain technology
Abel Keeping Families Together, Saving Money, and Other Motivations Behind New Civil Right to Counsel Laws
Zou et al. Predicting COVID-19 vaccination intentions: the roles of threat appraisal, coping appraisal, subjective norms, and negative affect
Chen et al. Internet addiction and academic anxiety among chinese college students during COVID-19: The mediating role of psychological contract
Giri et al. Utilization of adolescent friendly health services and its associated factors in Dang district of Nepal
KR102201085B1 (ko) 전자투표시스템 및 전자투표방법
Fenwick et al. Managing dyspnea in individuals with idiopathic pulmonary fibrosis
Ademola et al. An improved e-voting system using blockchain technology
Cao et al. Coping strategies and needs among women married to men who have sex with men living with HIV in China
Habitu et al. Level of implementation fidelity of youth-friendly services in Northwest Ethiopia
Miao Coded Social Control: China's Normalization of Biometric Surveillance in the Post COVID-19 Era
Schillo Commercialization and Public Good: Conflict, Complement, or Critical Component?
Ghamari et al. Disclosing personal information to social networking site providers: The role of trust, risk and perceived benefits
Andreu‐Pejó et al. Perinatal mental e‐health: What is the profile of pregnant women interested in online assessment of their emotional state?
Olsson Challenges with the GDPR: A Software Developing Organization’s Guide to GDPR Compliance