Safwan Conf Almost Final
Safwan Conf Almost Final
1
Associate Professor, Dr. Mahalingam College of Engineering and Technology,
Pollachi, India,[email protected]
2
B. Tech student, Dr. Mahalingam College of Engineering and Technology,
Pollachi, India,[email protected]
3
B. Tech student Dr. Mahalingam College of Engineering and Technology,
Pollachi, India,[email protected]
4
B.Tech student Dr. Mahalingam College of Engineering and Technology,
Pollachi, India,[email protected]
1 Introduction
Traditional voting methods face problems like security threats and leaks of
transparency, so introducing a voting system leverages blockchain innovation to drive
user-friendly voting with high standards of straightforwardness and improved
security. A blockchain could be a list of records, called pieces, connected using
cryptography. This brings a new way to vote where we use a computer or phone to
vote, and instead of storing the votes on a single computer, the votes are recorded on
many computers in a chain. This chain keeps the vote safe and makes it nearly
impossible to change it without everyone noticing. Blockchain are supervised by a
peer-to-peer network, which ensures that they are decentralised and not controlled by
any single entity.
Imagine an election system where every voter is given a digital ballot and can vote
securely online from anywhere. Behind the scenes, this system uses blockchain
technology, which acts as an immutable and unalterable ledger to securely record
every vote. Using a blockchain ensures that once a vote is cast, it cannot be tampered
with, thus making the voting process more reliable. Additionally, the system uses the
Elliptic Curve Digital Signature Algorithm (ECDSA) to authenticate the identity of
voters to ensure the authenticity of each vote, adding additional security and
reliability to the voting process [1,2].
2 Literature Review
Mohammed Hamdaqa et al [6] proposed a secure electronic voting system that offers
the fairness and privacy of current voting schemes, while providing the transparency
and flexibility offered by electronic systems has been a challenge for a long time. In
this work-in-progress work, this work evaluates an application of blockchain as a
service to implement distributed electronic voting systems.
Jason Paul Cruz et al [7] Based on the blockchain, homomorphic ElGamal encryption
and ring signature, an electronic voting scheme based on blockchain is proposed for
large-scale voting, which has the properties of decentralization, self-management,
non-interactive and free-receipt, furthermore the one-time ring signature ensures the
anonymity of the vote trading in the blockchain.
Ryan Osgood et al [8] Blockchain voting could have many tangible benefits and could
be the catalyst needed to propel voting to the 21st century. This work will first analyze
the problems with current voting techniques and showcase the vulnerabilities of a
current voting machine.
Teongenes Moura et al [9] give an overview of Blockchain itself and other uses
focused on societal problems and their respective analysis. Analysis is done on how
the adoption of Blockchain into a digital government repertoire can contribute to
common e-voting issues and also promote elections transparency, increase
auditability, enhance voter confidence and strengthen democracy.
Michael Spectre et al [10] blockchain-based voting would come at the cost of losing
meaningful assurance that votes have been counted as they were cast, and not
undetectably altered or discarded. This state of affairs will continue as long as
standard tactics such as malware, zero day, and denial-of-service attacks continue to
be effective.
F. Sheer Hardwick et al [11] proposes potential new e-voting protocol that utilizes the
blockchain as a transparent ballot box. The protocol has been designed to adhere to
fundamental e-voting properties as well as offer a degree of decentralization and allow
for the voter to change/update their vote (within the permissible voting period.
Kanika Garg et al [12] states that even though the use of e-voting through the
electronic medium, the work has to face well-known problems of maintenance and
fraud. Currently, various researches are conducting in-order to make secure and
reliable voting system while tackling issues of anonymity and security. Through
Decentralized System, focus is drifting towards making Voting Process simple, secure
and anonymity in the hand of the public.
The aim of the proposed system is to automate the manual voting process and
also reduce human error and vulnerability during voting. The main goal is to
reduce the time delay for the voting process. The proposed methodology
adapted blockchain technology to overcome the above-mentioned issues as
well as improve the performance of the voting process. The system also
serves to improve the security and authenticity of the overall process.
3 Proposed System
In this section, outline the proposed methodology for addressing bit falls in the
existing system that is meant to improve on efficiency and safety. It is confirmed by
electronic voting system based on the individual signatures of voters. It contains an
extensive ledger that stores all activities and their past records. These transactions
have individual items which are about the payee, payer, token, transaction timestamp,
hash of preceding block, nonce, signature, payee and payer related identifiers. In
addition to that it incorporates open keys of entities for ECDSA (Elliptic Curve
Digital Signature Algorithm) signature verification and payee authentication. In the
context of this suggested approach, there are 2 types of users, the Admin and the
Voter. The admin who is organizing the Election has the role to add the candidates
who are participating in the election. The admin can also check who is in the lead of
the election. Also, the admin has the access rights to check chain. The Voter first has
to login with their credentials and also registered with the website to login. The voter
also has the access rights to check chain and check the lead of the election to promote
the transparency of the election.
The main methodology comes here with the security. While adding a
candidate, a wallet is being created for the candidate. This wallet creates a Private
Key and Public Key. This Key Pair is created by using ECDSA algorithm with
Private Key Encoding type of ‘ski’ and Public Key Encoding with ‘sec1’ which uses
a cryptographic curve of ‘secp256k1’. This cryptographic curve is known for its
efficiency and security properties. The security properties include the authenticity
and integrities of votes and identities. While casting a vote, the Voter chooses the
candidate and submit the vote. The voter will also have the wallet generated while
registration as a voter. The Voter’s Public Key and the Candidate’s Private key
which has been chosen by the voter, will initiate a transaction between them as Payee
and Payer. A session key is generated and stored in the database which is used to
5
access the voter’s public-private key pair. Then signing of the transaction is initiated
using SHA256 algorithm, i.e., it will create a digital signature for the transaction.
This signature will be updated with the content of the transaction after converting it
into the string. This process essentially hashes the data. Then a digital signature is
created using the Payee’s Private Key. The Private Key is used to sign the hashed
transaction data, creating a unique signature that can be verified with the
corresponding public Key. In this regard, digital signature mechanism helps to
authenticate the source of the message; guarantees that its integrity has not been
compromised since signing and prevents sender’s rejection. The Blockchain initially
contain an empty data block. The transaction which is created, along with the Voter’s
Public Key and the signature created in the previous step to a blockchain is used to
create a block. These transactions and other information will add as a block, this
block will be added to the Blockchain.
The term “view chain” in project framework reveals viewing and interacting with
blockchain components. These constituents may include nonce, previous hash, as
well as transactions that are stored within each block. It is necessary for
understanding and attesting to the legitimacy, safety or transparency of blockchain-
based systems specifically relating to voting platforms.
3.3 EVALUATION:
The system begins with a voter database that stores registered voters, which is
essential for ensuring voter eligibility. This database is connected to the voting block
chain, which makes it easier to verify voter credentials and updates the blockchain
with recorded votes, hence voting information is accurate and current blockchain of
8
sorted blocks is done function as an immutable ledger for recording elections. Each
new idea is added to a block which is then validated through a process called
"mining," which is carried out by miners. These miners validate and add blocks to the
blockchain and communicate with users to confirm that votes have been correctly
recorded and provide updates on the voting process. This system ensures that every
step from voting to the final tally is transparent, secure, and verifiable, and applies
basic principles of blockchain technology to election scenarios.
Diffie-Hellman ECDSA
6 Conclusion
The aim of the proposed system is to improve the efficiency of voting process and
also enhance the security and integrity of the system. Using blockchain technology to
construct a ballot-based voting system is a promising way to improve the security,
transparency, and integrity of electoral processes. This system makes sure that every
vote is safely recorded and cannot be tampered or altered by using the decentralized
ledger of blockchain technology, cryptographic hashing, and consensus processes.
Additionally, voters are able to independently confirm the integrity of the election
results as well as enhance the transparency that blockchain provides. Because of the
blockchain's immutability, votes are guaranteed to stay unaltered and unmanipulated
by a single party after they are cast. The blockchain-based voting framework enabled
us to accurately record and verify each vote, ensuring the reliability and authenticity
of the electoral data. The proposed system also automates the traditional voting
system which will be applicable for all kinds of online voting process.
References
11
1. Muhammad Aurangzeb, Yifei Wang, Sheeraz Iqbal, Ausnain Naveed, Zeeshan Ahmed,
Mohammed Alenezi, Mokhtar Shoura, Enhancing cybersecurity in smart grids: Deep
black box adversarial attacks and quantum voting ensemble models for blockchain
privacy-preserving storage,Energy Reports, Volume 11,2024,Pages 2493-2515,ISSN
2352-4847.
2. Beulah Jayakumari, S Lilly Sheeba, Maya Eapen, Jani Anbarasi, Vinayakumar Ravi, A.
Suganya, Malathy Jawahar, E-voting system using cloud-based hybrid blockchain
technology, Journal of Safety Science and Resilience, Volume 5, Issue 1, 2024,Pages 102-
109,ISSN 2666-4496,
3. Y. Li, W. Susilo, G. Yang, Y. Yu, D. Liu, X. Du, M. Guiana, A blockchain based self-
tallying voting protocol in decentralized IoT, IEEE Trans. Dependable Secure Comput. 19
(1) (2022) 119–130, http://dx.doi.org/10.1109/TDSC.2020. 2979856.
4. Y. Cao, J. Wei, F. Zhang, Y. Xiang, X. Chen, Efficient public-key authenticated deniable
encryption schemes, Comput. Stand. Interfaces 82 (C) (2022) http:
//dx.doi.org/10.1016/j.csi.2022.103620.
5. B. Bera, A. Vangala, A.K. Das, P. Lorenz, M.K. Khan, Private blockchain envisioned
drones-assisted authentication scheme in IoT-enabled agricultural environment, Comput.
Stand. Interfaces 80 (2022) 103567, http://dx.doi.org/ 10.1016/j.csi.2021.103567, URL
https://www.sciencedirect.com/science/article/ pii/S0920548921000623.
6. Y. Yang, J. Wu, C. Long, W. Liang, Y.-B. Lin, Blockchain-enabled multiparty
computation for privacy preserving and public audit in industrial IoT, IEEE Trans. Ind.
Inform. 18 (12) (2022) 9259–9267, http://dx.doi.org/10.1109/TII. 2022.3177630.
7. K. Salta, K. Paschalidou, M. Tsetseri, D. Koulougliotis, Shift from a traditional to a
distance learning environment during the COVID-19 pandemic, Science & Education 31
(1) (2022) 93–122.
8. Y.-X. Kho, S.-H. Heng, J.-J. Chin, A review of cryptographic electronic voting, Symmetry
14 (5) (2022) 858.sd.
9. X. Wang, P. Jiang, T. Baker, T. Li, L. Zhu, Enabling privacy and leakage resistance for
dynamic blockchain-based access control systems, Comput. Stand. Interfaces 84 (2023)
103690, http://dx.doi.org/10.1016/j.csi.2022.103690.
10. M. Xie, Y. Yu, R. Chen, H. Li, J. Wei, Q. Sun, Accountable outsourcing data storage atop
blockchain, Comput. Stand. Interfaces 82 (2022) 103628,URL https://www-sciencedirect-
com-s.hubu.yitlink.com:443/science/article/pii/ S0920548922000095.
11. C. Zhang, Y. Xu, Y. Hu, J. Wu, J. Ren, Y. Zhang, A blockchain-based multi-cloud storage
data auditing scheme to locate faults, IEEE Trans. Cloud Comput. 10 (4) (2022) 2252–
2263, http://dx.doi.org/10.1109/TCC.2021.3057771.
12. Nikhilesh Lalam, M.Shri Nithinn, Dr. R. Jebakumar, ‘BEVS-Blockchain Based E-
Voting System’, Vol. 29 No. 9s (2020): Vol. 29 No. 9s (2020) Special Issue.