Ensuring Trust and Integrity: A Revolutionary Approach to Electronic Voting Through Blockchain

(1) * HM Misni Mail (Universitas Mercu Buana, Indonesia)
(2) Bambang Jokonowoa Mail (Universitas Mercu Buana, Indonesia)
(3) Hadi Santoso Mail (Universitas Mercu Buana, Indonesia)
*corresponding author

Abstract


The voting method has recently been a subject of continuous discourse in numerous countries. Nevertheless, the utilization of electronic voting systems raises apprehensions about several security aspects, including but not limited to eligibility, anonymity, privacy, integrity, accuracy, and impartiality. This paper introduces an innovative strategy for augmenting the security and dependability of an electronic voting system by utilizing Blockchain technology. By eliminating the requirement for physical receipts, countering coercion (specifically, vote-selling), and guaranteeing universal verifiability, this approach aims to mitigate voter distrust in the government or governing body. This technology effectively upholds the principles of voter secrecy and verifiability. Election transparency is upheld through Blockchain technology, which serves as a secure repository for all voting transactions. Concurrently, individual voters' anonymity is preserved through a sophisticated procedure that integrates ring and within-blind signatures. In addition, the system has incorporated sophisticated card-based voter authentication and security procedures, which have been implemented with the assistance of the governing body and executed through the Dapp platform. This technology will provide a comprehensive solution and provide more excellent compatibility for elections conducted on a large scale.

Keywords


E-voting, Blockchain, Smart Contract, Public Key Cryptoghraphy

   

DOI

https://doi.org/10.29099/ijair.v7i1.1.1034
      

Article metrics

10.29099/ijair.v7i1.1.1034 Abstract views : 929 | PDF views : 153

   

Cite

   

Full Text

Download

References


D. L. Chaum, “Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms,†Commun. ACM, vol. 24, no. 2, pp. 84–90, 1981, doi: 10.1145/358549.358563.

U. M. Qabs and F. M. Al-Naima, “Design and implementation of a smart card simulator,†in 2008 International Conference on Computer and Communication Engineering, 2008, pp. 217–220.

S. C. Alliance, “Card Payments Roadmap in the United States: How Will EMV Impact the Future Payments Infrastructure?,†White Pap. Febr., 2011.

F. Hao, P. Y. A. Ryan, and P. Zieliński, “Anonymous voting by two-round public discussion,†IET Inf. Secur., vol. 4, no. 2, pp. 62–67, 2010, doi: 10.1049/iet-ifs.2008.0127.

M. Kadam, P. Jha, and S. Jaiswal, “Double spending prevention in bitcoins network,†Int. J. Comput. Eng. Appl., vol. 9, no. VIII, 2015.

M. Rockwell, “Bitcongress–Process for block voting and law,†Retrieved December, 2017.

L. Rura, B. Issac, and M. K. Haldar, “z,†Int. J. Electron. Gov. Res., vol. 12, no. 3, pp. 71–93, 2016.

Z. Zhao and T.-H. H. Chan, “How to vote privately using bitcoin,†in Information and Communications Security: 17th International Conference, ICICS 2015, Beijing, China, December 9–11, 2015, Revised Selected Papers 17, 2016, pp. 82–96.

K. Lee, J. I. James, T. G. Ejeta, and H. J. Kim, “Electronic voting service using block-chain,†J. Digit. Forensics, Secur. Law, vol. 11, no. 2, p. 8, 2016.

M. Gasson, M. Meints, and K. Warwick, “D3. 2: A study on PKI and biometrics,†FIDIS Deliv., vol. 2, 2005.

H. Garg, M. Singh, V. Sharma, and M. Agarwal, “Decentralized Application (DAPP) to enable E-voting system using Blockchain Technology,†in 2022 Second International Conference on Computer Science, Engineering and Applications (ICCSEA), 2022, pp. 1–6.

A. M. Al-Madani, A. T. Gaikwad, V. Mahale, and Z. A. T. Ahmed, “Decentralized E-voting system based on Smart Contract by using Blockchain Technology,†in 2020 International Conference on Smart Innovations in Design, Environment, Management, Planning and Computing (ICSIDEMPC), 2020, pp. 176–180.

J. Díaz-Santiso and P. Fraga-Lamas, “E-Voting System Using Hyperledger Fabric Blockchain and Smart Contracts,†Eng. Proc., vol. 7, no. 1, p. 11, 2021.

V. Buterin, “Ethereum white paper,†GitHub Repos., vol. 1, pp. 22–23, 2013.

A. Wicaksana, “Towards secure and auditable e-voting system with go ethereum,†Turkish J. Comput. Math. Educ., vol. 12, no. 10, pp. 3006–3012, 2021.

A. Bhawiyuga, A. Basuki, and N. W. Tiera, “An Ethereum Based Distributed Application for Ensuring the Integrity of Stored E-Voting Data,†in Proceedings of the 6th International Conference on Sustainable Information Engineering and Technology, 2021, pp. 235–239.

G. Gallegos-Garcia, R. Gómez-Cárdenas, and G. I. Duchén-Sánchez, “Identity-based threshold cryptography for electronic voting,†2009.

G. Gallegos-García, R. Gómez-Cárdenas, and G. I. Duchén-Sánchez, “Identity based threshold cryptography and blind signatures for electronic voting,†WSEAS Trans. Comput., vol. 9, no. 1, pp. 62–71, 2010.

E. Blanchard and T. Selker, “Origami voting: A non-cryptographic approach to transparent ballot verification,†Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 12063 LNCS, pp. 273–290, 2020, doi: 10.1007/978-3-030-54455-3_20.

K. Mehboob Khan, J. Arshad, and M. M. Khan, “Secure Digital Voting System based on Blockchain Technology.â€

K. Isirova, A. Kiian, M. Rodinko, and A. Kuznetsov, “Decentralized electronic voting system based on blockchain technology developing principals.,†in CMIS, 2020, pp. 211–223.

H. D. Park, “A decentralized e-voting system based on blockchain network,†Int. J. Innov. Technol. Explor. Eng., vol. 8, 2019.

A. Priyadharshini, M. Prasad, R. Joshua Samuel Raj, and S. Geetha, “An Authenticated E-Voting System Using Biometrics and Blockchain,†in Intelligence in Big Data Technologies—Beyond the Hype: Proceedings of ICBDCC 2019, 2021, pp. 535–542.

D. Rangelov, B. S. K. Subudhi, P. Lämmel, M. Boerger, N. Tcholtchev, and J. Khan, “Design and Specification of a Blockchain-based P2P Energy Trading Platform,†in 2021 IEEE 21st International Conference on Software Quality, Reliability and Security Companion (QRS-C), 2021, pp. 636–643.

M. Saim, M. Mamoon, I. Shah, and A. Samad, “E-Voting via Upgradable Smart Contracts on Blockchain,†in 2022 International Conference on Futuristic Technologies (INCOFT), 2022, pp. 1–6.

L. T. A. N. Brandão, N. Mouha, and A. Vassilev, “Draft NISTIR 8214 Threshold Schemes for Cryptographic Primitives Challenges and Opportunities in Standardization and,†vol. 8214, 2019.

M. Davidson, “NIST Roadmap Toward Criteria for Threshold Schemes for Cryptographic Primitives NIST Roadmap Toward Criteria for Threshold Schemes for Cryptographic Primitives.â€

W. J. Caelli, E. P. Dawson, and S. A. Rea, “PKI , Elliptic Curve Cryptography , and Digital Signatures ’,†vol. 18, pp. 47–66, 1999.

C. A. Lara-nino, A. Diaz-perez, and M. Morales-sandoval, “Elliptic Curve Lightweight Cryptography : A Survey,†IEEE Access, vol. 6, pp.

–72550, 2018, doi: 10.1109/ACCESS.2018.2881444.

G. Kaim et al., “Post-quantum Online Voting Scheme To cite this version : HAL Id : hal-03355875 Post-Quantum Online Voting Scheme,†2021.

U. Feige, A. Fiat, and A. Shamir, “Zero Knowledge Proofs of Identity 2 . Interactive proofs of knowledge,†pp. 210–217, 1987, doi: 10.1145/28395.28419.

O. Goldreich and Y. Oren, “Definitions and Properties of Zero-Knowledge Proof Systems *,†pp. 1–32, 1994.

T. A. Silde, Doctoral thesis Tjerand Aga Silde Privacy-Preserving Cryptography from Zero- Knowledge Proofs. 2022.

P. Ioannis and P. Chaidos, “Zero Knowledge Protocols and Applications,†2017.

N. R. Pradhan, A. P. Singh, N. Kumar, M. M. Hassan, and D. S. Roy, “A flexible permission ascription (FPA)-based blockchain framework for peer-to-peer energy trading with performance evaluation,†IEEE Trans. Ind. Informatics, vol. 18, no. 4, pp. 2465–2475, 2021.

S. Baloglu, S. Bursuc, S. Mauw, and J. Pang, “Election verifiability revisited: Automated security proofs and attacks on Helios and Belenios,†in 2021 IEEE 34th Computer Security Foundations Symposium (CSF), 2021, pp. 1–15.

A. Juels, D. Catalano, and M. Jakobsson, “Coercion-resistant electronic elections,†Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 6000 LNCS, pp. 37–63, 2010, doi: 10.1007/978-3-642-12980-3_2.

P. resistance in a practical secret voting scheme for large scale elections Grontas, A. Pagourtzis, and A. Zacharakis, “Coercion resistance in a practical secret voting scheme for large scale elections,†in 2017 14th International Symposium on Pervasive Systems, Algorithms and Networks & 2017 11th International Conference on Frontier of Computer Science and Technology & 2017 Third International Symposium of Creative Computing (ISPAN-FCST-ISCC), 2017, pp. 514–519.

Y. Ruan and X. Zou, “Receipt-freeness and coercion resistance in remote E-voting systems,†Int. J. Secur. Networks, vol. 12, no. 2, pp. 120–133, 2017, doi: 10.1504/IJSN.2017.083836.

S. Pooja, L. K. Raju, and U. Chhapekar, “Face detection using deep learning to ensure a coercion resistant blockchain-based electronic voting,†Eng. Sci., vol. 16, pp. 341–353, 2021.

K. Krips and J. Willemson, “On practical aspects of coercion-resistant remote voting systems,†Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 11759 LNCS, no. September, pp. 216–232, 2019, doi: 10.1007/978-3-030-30625-0_14.

C. Kempka, “Matters of coercion-resistance in cryptographic voting schemes.†Karlsruhe, Karlsruher Institut für Technologie (KIT), Diss., 2014, 2014.

K. Braunlich and R. Grimm, “Formalization of receipt-freeness in the context of electronic voting,†in 2011 Sixth International Conference on Availability, Reliability and Security, 2011, pp. 119–126.

S. Delaune and S. Kremer, “Formalising security properties in electronic voting protocols,†Deliv. AVOTE, vol. 1, p. 151, 2010.

H. N. Oo and A. M. Aung, “Design and formal analysis of electronic voting protocol using AVISPA,†in 2017 2nd International Conference for Convergence in Technology (I2CT), 2017, pp. 1–8.

N. Chondros et al., “Distributed, end-to-end verifiable, and privacy-preserving internet voting systems,†Comput. Secur., vol. 83, no. August, pp. 268–299, 2019, doi: 10.1016/j.cose.2019.03.001.

I. Brightwell, J. Cucurull, D. Galindo, and S. Guasch, “An overview of the iVote 2015 voting system.â€

F. Waismann and F. Waismann, “Verifiability,†How I see Philos., pp. 39–66, 1968.

N. F. Liu, T. Zhang, and P. Liang, “Evaluating verifiability in generative search engines,†arXiv Prepr. arXiv2304.09848, 2023.

F. Petroni et al., “Improving wikipedia verifiability with ai,†Nat. Mach. Intell., vol. 5, no. 10, pp. 1142–1148, 2023.

B. Koc, C. Mou, H. Liu, Z. Wang, G. Rozza, and T. Iliescu, “Verifiability of the data-driven variational multiscale reduced order model,†J. Sci. Comput., vol. 93, no. 2, p. 54, 2022.

M. Kumar and S. Chand, “A secure and efficient cloud-centric internet-of-medical-things-enabled smart healthcare system with public verifiability,†IEEE Internet Things J., vol. 7, no. 10, pp. 10650–10659, 2020.

J. Viana et al., “Deep Attention Recognition for Attack Identification in 5G UAV scenarios: Novel Architecture and End-to-End Evaluation,†IEEE Trans. Veh. Technol., pp. 1–17, 2023, doi: 10.1109/TVT.2023.3302814.

C. Killer et al., “Provotum: A blockchain-based and end-to-end verifiable remote electronic voting system,†in 2020 IEEE 45th Conference on Local Computer Networks (LCN), 2020, pp. 172–183.

C. Killer, M. Eck, B. Rodrigues, J. von der Assen, R. Staubli, and B. Stiller, “ProvotuMN: Decentralized, Mix-Net-based, and Receipt-free Voting System,†in 2022 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), 2022, pp. 1–9.




Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

________________________________________________________

The International Journal of Artificial Intelligence Research

Organized by: Prodi Teknik Informatika Fakultas Teknologi Bisnis dan Sains
Published by: Universitas Dharma Wacana
Jl. Kenanga No. 03 Mulyojati 16C Metro Barat Kota Metro Lampung

Email: jurnal.ijair@gmail.com

View IJAIR Statcounter

Creative Commons License
This work is licensed under  Creative Commons Attribution-ShareAlike 4.0 International License.