Professional Documents
Culture Documents
IJCRT2305284
IJCRT2305284
IJCRT2305284
org © 2023 IJCRT | Volume 11, Issue 5 May 2023 | ISSN: 2320-2882
B. Digital Identity
In most cases, symmetric key cryptography involves two
people communicating with one another using a single shared
secret key. It is challenging to keep a secret key between each
group of network participants in an open peer-to-peer network
where everyone on the network can connect with everyone
else. As a result, we employ asymmetric key cryptography for
digital signatures and key creation. In our suggested approach,
Fig. 1 Flow of execution we employ the Elliptic Curve Digital Signature Algorithm
(ECDSA). When a new user (who might be either an investor
or a developer) joins the bitfund network, the ECDSA
technique is used to produce both a private key and a public
V. PROPOSED MODEL FOR
key. To begin with, the user must be aware of his private key
DECENTRALIZED CROWD FUNDING in order to send any communications or sign any
Most of the existing crowdfunding platforms are transactions.A huge random number is generated using a
dependent on a small number of key institutions. These random number generator and used as the private key d. With
centralized organizations oversee the entire project the use of point multiplication and the equation Q(X; y) = d
allocation procedure and keep track of all project-related G(X; y), the public key may be calculated from the random
paperwork. When shared with an organization, such private key. Here, the domain parameter is G(x, y), and Q(x,
information that is confidential runs the danger of being y) serves as the user's public key. The public key is disclosed
leaked. In order to connect developers and investors, the to all intended users in order to verify the signed transaction,
central organizations impose a steep fee. We can keep all while the private key is kept secret from all users and used
private papers on a single chain using blockchain. Using to digitally sign transactions. A user's digital identity is formed
whenever they want to participate in the decentralized
cryptographic hash functions, the documents can be hashed
crowdfunding model, either as investors or developers.
such that only the necessary participants can access
Developers use their digital identities for all transactions
them.Both presenting the ideas to potential investors and linked to project request submission by investors and iterative
soliciting bids from developers are free of charge. The data bids by developers to win the project.
on the chain can be verified by anyone, and once the data
has been committed, no attacker can change it.
C. Consensus Algorithm
We create a network model with numerous project
developers, financiers, and investors. The investors put
forward the project in which they are interested, along with the
Software Requirement Specification (SRS) document, the
anticipated time, cost, and length of maintenance needed once
the product is deployed.
Developers that are interested in the project submit bids with
details about the time, money, and maintenance assistance
they can offer. The nodes can come to an understanding
through consensus. The transaction cannot be changed later
Figure 2: Smart Contract System [17] after it has been put to the block. It must first be confirmed. In
a conventional approach, outside parties like crowdfunding
A. Block platforms see to it that each developer is
To prevent tampering, all transactions or agreements are confirmed. A peer-to-peer system lacks a centralized
kept in a series of blocks that are linked together. All final controlling entity. To check the validity of the data being fed
obligations from the winning developer and investor are into the network by the nodes, distributed systems use a
saved on the blockchain as a smart contract. Each block variety of consensus procedures. To come to an agreement
consists of a cryptographic hash value, the transaction's regarding the developers' veracity, we employ the Proof of
timestamp, transaction information, and the prior block's Virtual Voting (POVV) technique. The conventional real
hash value. The total number of transactions contained voting algorithms have scalability restrictions in terms ofthe
within a block is determined by the size of the transaction number of nodes, despite being the best for achieving a final
and the previously defined size of a block. Because of the consensus. Though highly scalable in terms of the number of
use of cryptographic hashing and hash chaining, it is nodes, the proof-of-work mechanism used by bitcoin never
difficult for a malicious user to tamper with the information
achieves a definitive consensus, making it a probabilistic and
that has already been devoted to the chain.
randomized protocol. In contrast to generic voting algorithms,
IJCRT2305284 International Journal of Creative Research Thoughts (IJCRT) www.ijcrt.org c208
www.ijcrt.org © 2023 IJCRT | Volume 11, Issue 5 May 2023 | ISSN: 2320-2882
the proposed POVV method gives the votes to the developers securities laws in various ways, and critics typically lament
based on mathematical calculations rather than message the lack of a reasonable process for doing it where one truly
forwarding. As opposed to the standard systems' time holds a stake inside the underlying company. Crowdfunding
complexity of O(n2) or O(n3), the POVV algorithm operates platforms like Swarm provide non-monetary incentives like
with a time complexity of O(1). A developer receives a instant access to apps, memberships, freebies, and other non-
favorable vote from the network each time he or she monetary incentives to address problems with equity-based
completes a project. It should be emphasized that winning an crowdfunding. However, this can be misleading even though,
iteration does not guarantee success on a project. In the in many cases, the marketing still seems to be selling assets
subsequent part, we go over the specifics of the bidding
procedure. The number of votes that each developer has VII. RESULTS
received is used to determine their merit. The developer's This project has given a significant outcomes which
vote is taken into account as an input parameter in addition to includes a simple and easy to use user interface. Using the
the disparities between the investor and developer's bids in Ethereum wallet, its easy to do transaction as well.
terms of time, cost, and support duration. A high vote will
increase the likelihood that the developer will win the bid.
D. Digital Signature
Every transaction has the investor's and the developer's
digital signatures attached to prevent non-repudiation. The
transaction is digitally signed using the private key created
in the previous section, and the other intended users can
verify it using the public key. Every bid submitted by
Journal Pre-proof the developer must be digitally signed by
him or her because any bid throughout the auctioning
process could end up being the winning one. Once the
developer has won the auction, he or she must digitally sign
the winning bid with their private key in order to accept it.
This stops the developers from submitting just irrational bid
prices in an effort to win the auction.
Fig. 3 User Interface
VI. INTEGRATION OF BLOCKCHAIN AND
CROWD FUNDING
Matic
deducted from user’s account and credit can be seen in
the account of organization who has created this
platform. The target amount and current amount raised
is also shown on thescreen.
Dates
VIII. CONCLUSION
Transactions become more transparent when blockchain
technology is included into a crowdfunding platform. Users
may feel more comfortable making donations to a campaign
as a result. Contributors may benefit from knowing how
their money is being used thanks to the usage of smart
contracts on expenditure requests. With the help of this
platform built on the blockchain, transaction transparency
Dates may be preserved. Users who make financial contributions
can be sure that their funds are in good hands. This platform
Fig.5 Funds raised by user 1 offers a history of all transactions together with the
addresses of the accounts that are making donations and
receiving payments, eliminating the chance of fraud as well.
IX. ACKNOWLEDGEMENT
X. REFERENCES
Dates
[1] Lorenzo Grassi, Dmitry Khovratovich, Christian
Rechberger, Arnab Roy, and Markus Schofnegger.
Fig.6 Funds raised by user 2 Poseidon: “A new hash function for zero-
knowledge proof systems. In USENIX Security
Symposium, 2021”.
[2] Constantine Xipolitopoulos, Maria Nefeli
Nikiforos, Maria Malakopoulou, and Adamantia
Pateli. “Success factors for crowd-funding
campaigns with machine learning techniques. 09
2020”.
[3] Hasnan Baber. “Blockchain-Based Crowdfunding,
pages 117–130. 01 2020”.
[4] Crystals - kyber: “A cca-secure module-lattice-
based kem. In 2018 IEEE European Symposium on
Security and Privacy (EuroSP)”
[5] T. Dannberg, ‘Advantages and disadvantages with
crowdfunding : - and who are the users?’,
Dissertation, 2017.