This article provides information on what results can be achieved by using blockchain in electronic voting. Authorities use blockchain technology to implement secure voting procedures without the need for a central authority. Blockchain-based voting systems are also more robust, tamper-proof (no changes to the vote by the voter or other third parties), and cost-effective. There has been extensive research into electronic voting systems that allow voters to vote, which are mostly systems that can be implemented using a mobile phone, computer, or other electronic device. These systems are immune to threats that could affect the integrity of the voting process. The article proposes a secure and robust electronic voting system using blockchain, aimed at ensuring the anonymity of voters and the transparency of the process
This article provides information on what results can be achieved by using blockchain in electronic voting. Authorities use blockchain technology to implement secure voting procedures without the need for a central authority. Blockchain-based voting systems are also more robust, tamper-proof (no changes to the vote by the voter or other third parties), and cost-effective. There has been extensive research into electronic voting systems that allow voters to vote, which are mostly systems that can be implemented using a mobile phone, computer, or other electronic device. These systems are immune to threats that could affect the integrity of the voting process. The article proposes a secure and robust electronic voting system using blockchain, aimed at ensuring the anonymity of voters and the transparency of the process
№ | Муаллифнинг исми | Лавозими | Ташкилот номи |
---|---|---|---|
1 | Tojiakbarova U.U. | teacher | TUIT |
2 | Kadirov M.M. | teacher | TSTU |
№ | Ҳавола номи |
---|---|
1 | S. Wang. Study on the Application of Computer Security Technology in E-commerce “Journal of physics: conference series. IOP publishing”, 2021. 42044. |
2 | B.Ge., J. Xu. Analysis of computer network security technology and preventive measures under the information environment. “2020 5th International Conference on Mechanical, Control and Computer Engineering (ICMCCE)”, 2020. 1978. |
3 | T. Green. An assessment of the limits of detection, sensitivity and specificity of three devices for public health-based drug checking of fentanyl in street-acquired samples. “International journal of drug policy”, 2020. 102661. |
4 | K. Lee K. Electronic voting service using block-chain. “Journal of digital forensics, security and law”, 2016. 8. |
5 | B. Vivekanadam. Analysis of recent trend and applications in block chain technology. “Journal of ISMAC”, 2020. 200. |
6 | P. Fan. “Identity management security authentication based on blockchain technologies”, 2019. 912 |
7 | R. Addad. Network slice mobility in next generation mobile systems. “Challenges and potential solutions //IEEE Network”, 2020. 84. |
8 | D. Jiang. A trusted third-party E-payment protocol based on locally indistinguishable orthogonal product states. “International journal of theoretical physics”, 2020. 1442 |
9 | M.U. Ashraf., K.M. Jambi., R. Qayyum., H. Ejaz., I. Ilyas. IDP: a privacy provisioning framework for tip attributes in trusted third party-based location-based services systems. “International Journal of Advanced Computer Science and Applications (IJACSA)”, 2020. 604 |
10 | M.M. Puigserver., M.A. Cabot-Nadal., M.M. Payeras-Capellà. Removing the trusted third party in a confidential multiparty registered a delivery protocol using blockchain. IEEE Access”, 2020. 106855. |
11 | A. Javaid. “Electronic voting system security available at SSRN 2393158”, 2014. |
12 | M. Sagatov., D. Irgasheva., K. Mirhusan. Construction Hardware Protection Infocommunication Systems from Network Attacks //Proceedings of International Conference on Application of Information and Communication Technology and Statistics in Economy and Education (ICAICTSEE). “International Conference on Application of Information and Communication Technology and Statistics and Economy and Education (ICAICTSEE)”, 2015. 271. |
13 | M. Sagatov., D. Irgasheva., K. Mirhusan. Construction Hardware Protection Infocommunication Systems from Network Attacks //Proceedings of International Conference on Application of Information and Communication Technology and Statistics in Economy and Education (ICAICTSEE). “International Conference on Application of Information and Communication Technology and Statistics and Economy and Education (ICAICTSEE)”, 2015. 271. |
14 | I. Brown. Cybersecurity for elections: “Commonwealth guide on best practice”, 2020 |
15 | V. Subramanian. Decentralized device authentication model using the trust score and blockchain technology for dynamic networks //2020 “IEEE International Conference on Blockchain”, 2020. 116. |
16 | X. Yang. Blockchain voting: Publicly verifiable online voting protocol without trusted tallying authorities. “Future generation computer systems”, 2020. 859. |