Citation: | YIN Hong-jian, ZHU Yan, WANG Jing, GUO Guang-lai, CHEN E. Design and implementation of a smart-contract voting system based on zero-knowledge proof[J]. Chinese Journal of Engineering, 2023, 45(4): 632-642. doi: 10.13374/j.issn2095-9389.2022.07.07.001 |
[1] |
王迪, 朱巖, 陳娥, 等. 智能法律合約及其研究進展. 工程科學學報, 2022, 44(1):68
Wang D, Zhu Y, Chen E, et al. Smart legal contract and its research progress. Chin J Eng, 2022, 44(1): 68
|
[2] |
Wang S, Ouyang L, Yuan Y, et al. Blockchain-enabled smart contracts: Architecture, applications, and future trends. IEEE Trans Syst Man Cybern Syst, 2019, 49(11): 2266 doi: 10.1109/TSMC.2019.2895123
|
[3] |
朱巖, 王巧石, 秦博涵, 等. 區塊鏈技術及其研究進展. 工程科學學報, 2019, 41(11):1361
Zhu Y, Wang Q S, Qin B H, et al. Survey of blockchain technology and its advances. Chin J Eng, 2019, 41(11): 1361
|
[4] |
朱巖, 秦博涵, 陳娥, 等. 一種高級智能合約轉化方法及競買合約設計與實現. 計算機學報, 2021, 44(3):652 doi: 10.11897/SP.J.1016.2021.00652
Zhu Y, Qin B H, Chen E, et al. An advanced smart contract conversion and its design and implementation for auction contract. Chin J Comput, 2021, 44(3): 652 doi: 10.11897/SP.J.1016.2021.00652
|
[5] |
Hewa T, Ylianttila M, Liyanage M. Survey on blockchain based smart contracts: Applications, opportunities and challenges. J Netw Comput Appl, 2021, 177: 102857 doi: 10.1016/j.jnca.2020.102857
|
[6] |
Buterin V. A next-generation smart contract and decentralized application platform [R/OL]. Ethereum (2014-12-01) [2022-07-07].https://ethereum.org/669c9e2e2027310b6b3cdce6e1c52962/Ethereum_Whitepaper_-_Buterin_2014.pdf
|
[7] |
Lerner S D. RSK Bitcoin powered smart contracts [R/OL]. Sciencepaper Online (2015-11-19) [2022-07-07]. http://cryptochainuni.com/wp-content/uploads/Rootstock-WhitePaper-v9-Overview.pdf
|
[8] |
Androulaki E, Barger A, Bortnikov V, et al. Hyperledger fabric: A distributed operating system for permissioned blockchains // Proceedings of the Thirteenth EuroSys Conference. Portugal, 2018: 1
|
[9] |
Chaum D L. Untraceable electronic mail, return addresses, and digital pseudonyms. Commun ACM, 1981, 24(2): 84 doi: 10.1145/358549.358563
|
[10] |
張鵬, 喻建平, 劉宏偉. 同態簽密方案及其在電子投票中的應用. 深圳大學學報(理工版), 2011, 28(6):489
Zhang P, Yu J P, Liu H W. A homomorphic signcryption scheme and its application in electronic voting. J Shenzhen Univ Sci Eng, 2011, 28(6): 489
|
[11] |
孫萌, 王昀飚. 基于區塊鏈的可追蹤匿名電子投票方案. 網絡空間安全, 2019, 10(9):85 doi: 10.3969/j.issn.1674-9456.2019.09.011
Sun M, Wang Y B. Traceable anonymous electronic voting scheme based on blockchain. Cyberspace Secur, 2019, 10(9): 85 doi: 10.3969/j.issn.1674-9456.2019.09.011
|
[12] |
鄭劍, 賴恒財. 基于一次性環簽名的區塊鏈電子投票方案. 計算機應用研究, 2020, 37(11):3378
Zheng J, Lai H C. Blockchain e-voting scheme based on one-time ring signature. Appl Res Comput, 2020, 37(11): 3378
|
[13] |
Satizábal C, Páez R, Forné J. Secure Internet Voting Protocol (SIVP): A secure option for electoral processes. J King Saud Univ Comput Inf Sci, 2022, 34(6): 3647
|
[14] |
Wang K H, Mondal S K, Chan K, et al. A review of contemporary e-voting: Requirements, technology, systems and usability. Data Sci Pattern Recognit, 2017, 1(1): 31
|
[15] |
Alvarez R M, Hall T E, Trechsel A H. Internet voting in comparative perspective: The case of Estonia. PS Political Sci Politics, 2009, 42(3): 497 doi: 10.1017/S1049096509090787
|
[16] |
Zhao Z C, Chan T H H. How to vote privately using bitcoin // International Conference on Information and Communications Security. Beijing, 2015: 82
|
[17] |
Tarasov P, Tewari H. Internet voting using zcash [R/OL]. Sciencepaper Online (2017-06-20) [2022-07-07].https://eprint.iacr.org/2017/585
|
[18] |
McCorry P, Shahandashti S F, Hao F. A smart contract for boardroom voting with maximum voter privacy // International Conference on Financial Cryptography and Data Security. Sliema, 2017: 357
|
[19] |
Yu B, Liu J K, Sakzad A, et al. Platform-independent secure blockchain-based voting system // International Conference on Information Security. Guildford, 2018: 369
|
[20] |
Camenisch J, Chaabouni R, Shelat A. Efficient protocols for set membership and range proofs // International Conference on the Theory and Application of Cryptology and Information Security. Melbourne, 2008: 234
|
[21] |
Morais E, Koens T, Van W C, et al. A survey on zero knowledge range proofs and applications. SN Appl Sci, 2019, 1(8): 946 doi: 10.1007/s42452-019-0989-z
|
[22] |
Boneh D, Boyen X. Short signatures without random oracles // International Conference on the Theory and Applications of Cryptographic Techniques. Interlaken, 2004: 56
|
[23] |
Yin H J, Chen E, Zhu Y, et al. An efficient zero-knowledge dual membership proof supporting pos-and-neg membership decision. Mathematics, 2022, 10(17): 3217 doi: 10.3390/math10173217
|
[24] |
De Caro A, Iovino V. jPBC: Java pairing based cryptography // 2011 IEEE Symposium on Computers and Communications. Corfu, 2011: 850
|
[25] |
He X, Qin B H, Zhu Y, et al. SPESC: A specification language for smart contracts // 2018 IEEE 42nd Annual Computer Software and Applications Conference. Tokyo, 2018, 1: 132
|
[26] |
Boneh D, Goh E J, Nissim K. Evaluating 2-DNF formulas on ciphertexts // Proceedings of the 2005 Second International Conference on Theory of Cryptography. Spain, 2005: 325
|
[27] |
Kumar M, Chand S, Katti C P. A secure end-to-end verifiable internet-voting system using identity-based blind signature. IEEE Syst J, 2020, 14(2): 2032 doi: 10.1109/JSYST.2019.2940474
|