English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  Items with full text/Total items : 110944/141864 (78%)
Visitors : 48024696      Online Users : 1030
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    政大機構典藏 > 商學院 > 資訊管理學系 > 期刊論文 >  Item 140.119/143133
    Please use this identifier to cite or link to this item: https://nccur.lib.nccu.edu.tw/handle/140.119/143133


    Title: 以區塊鏈技術、流程安全與選民隱私設計之去中心化投票架構
    A Decentralized Voting Framework with Blockchain Technology, Voting Process Security and Voter Privacy
    Authors: 蕭舜文
    Hsiao, Shun-wen
    黃建勛
    Huang, Chien-shiun
    Contributors: 資管系
    Keywords: 區塊鏈;投票;生物辨識;去中心化;隱私
    Blockchain;I-voting;Bio recognition;Decentralization;Privacy
    Date: 2022-04
    Issue Date: 2023-01-31 16:33:03 (UTC+8)
    Abstract: 利用網路取代實體投票的倡議已經被提出,同時也有數個國家與地區(如愛沙尼亞與挪威)嘗試實現網路投票,但由於資安與隱私的疑慮,導致網路投票至今仍沒有大規模地採用。而區塊鏈技術的公開、不可否認、可追溯性等特性,正適合用於網路投票。本研究分析過去網路投票案例與導入區塊鏈之網路投票文獻,認為當下的區塊鏈投票機制,面臨安全性、匿名性與便利性的取捨難題。目前區塊鏈投票機制主要有三大問題,第一是多數文獻提出的投票機制都屬於權力中心化的架構,一旦中心化架構遭受攻擊則投票流程或結果將會出現問題。第二,多數投票機制也只在流程末端與區塊鏈互動,即便區塊鏈的資料難以竄改,但仍無法保證數位(區塊鏈資料)與實體(投票行為)之間的完整性與一致性,進而造成損害選民的匿名性、代替投票與選票竄改等問題。第三,因為區塊鏈透明與公開的特性,若直接把選務資料與投票內容上鏈則違反投票匿名的準則。本研究參考各文獻的投票機制後,提出一個使用生物辨識與區塊鏈技術的網路投票機制。針對問題一,本研究將投票五個階段之工作交給不同角色來執行與監督。在分權結構之下,任意一方受到全然的控制都無法完全改變投票的結果,進而降低受攻擊之風險。針對問題二,本研究的區塊鏈架構包含選民註冊、選民驗證與投票、選票挖礦與加密、選票解鎖與驗證及選票結果統計與追溯,為更完善的區塊鏈設計。問題三為解決選票隱私的問題,本研究基於生物特徵資訊的雜湊值設計選票,讓選票既可追蹤驗證也可保護隱私。本研究也討論與列舉可能之受攻擊風險,並確保本架構能有效避免遭受攻擊。
    In the modern era of advanced Internet technology, the initiative to use the Internet to vote has been proposed. At the same time, several countries and regions (such as Estonia and Norway) have tried to implement online voting. However, due to many information security and privacy concerns, online voting has not been massively adopted. Blockchain technology has the characteristics of openness, immutable, traceability, these features are just suitable for supporting electronic voting. This research analyzes the past online voting cases and the online voting proposal studies introduced with blockchain. The current voting mechanism establishing a credible third party or system faces difficulty choosing between security, anonymity, and convenience. The popular blockchain voting mechanisms have three major problems. First, most of the voting structures proposed in the literature belong to a centralized power administration. Once the centralized administration is attacked, the voting process and results will be inaccurate. Second, most of the voting mechanisms only interact with the blockchain at the end of the voting process. Even if the blockchain guarantees that the data on the chain is difficult to tamper with, it still cannot guarantee the virtual (blockchain data) and reality (voting behavior) integrity and consistency, causing problems of damaging voter`s anonymity, voter impersonation, and ballot tampering. Third, Because of the openness and transparency of blockchain, uploading the election information and ballot on blockchain violate the anonymity of voting. After referring to the voting mechanism of various studies, this research proposes an online voting framework using biometrics and blockchain technology. For the first problem, the five voting stages are assigned to different roles for execution and supervision. Under decentralization administration, any party cannot alter the election results, thereby reducing the attack risk. For the second problem, this research proposes a more comprehensive blockchain voting framework that includes Voter Register, Voter Verify & Vote, Ballot Mining & Encryption, Ballot Decryption & Verify, and Ballot Counting & Tracing. For the third problem to solve ballot privacy, this research introduces biometric technology and hashing ballot to solve voting privacy and vote tracing. This research also discusses the attack risk and ensures that the proposed framework could avoid being attacked.
    Relation: 資訊管理學報, Vol.29, No.2, pp.133-159
    Data Type: article
    Appears in Collections:[資訊管理學系] 期刊論文

    Files in This Item:

    File Description SizeFormat
    index.html0KbHTML2131View/Open


    All items in 政大典藏 are protected by copyright, with all rights reserved.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback