Ictbs 211
Ictbs 211
Abstract—Secure voting systems face numerous crucial security features that can be bolstered through the
challenges, including concerns related to transparency, implementation of blockchain technology. While integrating
tampering, and trust. While traditional methods have a new technology into an existing system can be a significant
struggled to address these issues effectively, blockchain challenge, adapting to new technologies and methods is
technology offers a promising solution. This paper conducts essential for enhancing security features and addressing
a comparative analysis of existing solutions and proposed vulnerabilities within the system.
innovations in secure voting systems, with a focus on
leveraging blockchain technology. We first review current
approaches to secure voting systems, including II. OVERVIEW OF EXISTING VOTING SYSTEM
cryptographic protocols, paper trails, and electronic voting Electronic Voting Machines (EVMs) are the standard
machines, highlighting their strengths and limitations. means of conducting elections in India. The EVM system
Subsequently, we explore the potential of blockchain was developed by the Election Commission of India (ECI) in
technology to revolutionize voting systems by providing
collaboration with state-owned electronics companies Bharat
transparency, immutability, and decentralization. Through
Electronics Limited (BEL) and Electronics Corporation of
case studies and empirical evidence, we evaluate the
effectiveness of blockchain-based solutions in addressing India Limited (ECIL). [2]
key challenges such as voter fraud and lack of verifiability. The EVM consists of two main units - a Balloting Unit
(BU) and a Control Unit (CU). The BU is placed inside the
Keywords—Blockchain Technology,Secure Voting voting compartment where the voter casts their vote, while
Systems, Zero-Knowledge Proofs, Decentralized Identity the CU is with the polling officer. The two units are
Management, Secure Multiparty Computation
connected by a 5-meter cable.
I. INTRODUCTION
Traditional Electronic Voting Machines (EVMs) have
several vulnerabilities and lack transparency. The new
generation of EVMs typically uses EEPROM (Electrically
Erasable Programmable Read-Only Memory) and
microcontrollers to store vote count. This architecture can be
easily manipulated, making any tampering of the EVM
difficult to identify. The underlying mechanism of EVMs is
not transparent, which undermines public trust in the voting
process. Traditional EVMs lack the transparency, security,
and integration of new technologies that are necessary for a
robust and trustworthy voting system. [1]
While the introduction of Voter Verifiable Paper Audit
Trail (VVPAT) systems aims to enhance security, experts Figure 1. Existing Electronic Voting Machine
argue that VVPAT alone does not address underlying issues, The BU has buttons for each candidate, with their name
especially the lack of simultaneous parallel counting of votes and party symbol displayed. When a voter presses the button
in EVMs and VVPAT slips at all polling booths, for their chosen candidate, the vote is registered in the CU.
compromising the voter's ability to ensure the safety of their The CU keeps a running tally of all votes cast.
cast vote until the end of the election process.
The EVM runs on a 6-volt single alkaline battery fixed in
Using blockchain technology in the traditional voting the CU, allowing it to function even in areas without
system may present challenges, but the integration of these electricity. The machines are self-contained, with no wireless
two can offer enhanced security and transparency in the or internet connectivity. [3]
voting process. Traditional voting machines often lack
Prior to election day, a mock poll is conducted where a transparency and independent auditing would be crucial to
predetermined number of test votes are cast on each EVM in ensuring the public's trust in the electoral system.
the presence of political party representatives. The results of
this mock poll are then matched with the expected results to III. INTEGRATION OF BLOCK CHAIN IN VOTING SYSTEM
ensure the EVM is functioning properly.
Unlike traditional data structures, blockchain technology
On election day, the polling officer activates the EVM by offers a unique advantage in the context of voting systems.
pressing the 'Ballot' button on the CU, which enables the Unlike other systems where an administrator can freely add,
voter to cast their vote on the BU. After the voter presses the delete, or update data, blockchain's immutable nature
button for their chosen candidate, a paper slip is printed by prevents such tampering. Once a block is added to the
the Voter Verifiable Paper Audit Trail (VVPAT) machine blockchain, it cannot be deleted or modified under any
attached to the EVM. This slip is visible to the voter for 7 circumstances. Even if an intruder attempts to attack a node,
seconds before being cut and dropped into a sealed box in the surrounding nodes will detect the discrepancy and
the VVPAT. automatically rebuild the damaged node, preserving the
The VVPAT provides a physical record of the voter's chain's integrity. [7] The decentralized nature of blockchain
choice, allowing them to verify that their vote was registered networks means the voting system is not dependent on any
correctly. It also enables a physical audit of the electronic single computing node. Even if one or more nodes become
votes in case of any discrepancies. [4] [3] unavailable or are attacked, the overall voting process can
continue uninterrupted, ensuring reliability and resilience. [8]
After voting concludes, the CU is sealed and stored
securely. On counting day, the CU is unsealed and the final A. Decentralized Block chain network
vote tally is displayed. The VVPAT slips are also counted in
Modify the existing EVMs to communicate with a
a random sample of polling stations to verify the EVM
decentralized blockchain network for secure storage and
results.
verification of voting data. Implement cryptographic hashing
to ensure the integrity and immutability of votes recorded on
II. ISSUES AND VULNERABILITIES OF EXISITING SYSTEM the blockchain.[9] A decentralized blockchain operates
The M3 Electronic Voting Machines (EVMs) used in without a central authority, distributing control among its
India have several security features, but there are also participants in a peer-to-peer fashion. Utilizing a sequential
potential vulnerabilities that raise concerns about chain of blocks linked by cryptographic hashes, it maintains
transparency and verifiability. [5] an immutable ledger of transactions accessible to all network
nodes. Consensus mechanisms, such as Proof of Work or
One key issue is the software used in the ballot unit Proof of Stake, ensure transaction validation and ledger
of the EVM. The software is programmed directly agreement. Smart contracts, self-executing agreements coded
into the microcontrollers, which are one-time into the blockchain, automate processes without
programmable (OTP). This means the software intermediaries.[8] Cryptocurrencies native to these networks
cannot be altered or verified after manufacturing, as it facilitate transactions and incentivize participants. Overall,
is essentially "burned" into the hardware. This lack of decentralized blockchains offer transparency, security, and
visibility into the software raises questions about censorship resistance, enabling trustless transactions and
whether the same software is consistently contract execution.
implemented across all EVMs.
However, there is no way for independent parties to
verify that the correct software has been fabricated
into these microcontrollers. This lack of transparency
is a significant concern, as it makes it difficult to
ensure the integrity of the voting process.
Another potential vulnerability is the handshake
process between the various components of the EVM.
While the EVM has tamper-proof and unauthorized
detection modules, the details of how these features
work are not fully disclosed. This lack of
transparency makes it challenging for the public to
have confidence in the security measures
implemented. [6]
Despite the ECI's claims of advanced security
features in the M3 EVMs, such as tamper detection
and self-diagnostics, the underlying technical details
and the extent of their effectiveness are not publicly
available. This lack of transparency is a significant Figure 2. Voting System Architecture
concern, as it prevents independent verification and
auditing of the EVM system. B. How vote is added to decentralized block chain
In conclusion, while the M3 EVMs incorporate various The voting process begins with the voter casting their
security features, the lack of transparency around the vote through a Ballot unit. This vote is then converted into a
software, hardware, and security mechanisms raises valid digital format, which is typically represented as a unique
concerns about the overall integrity and verifiability of the identifier or a hash value. [10]
voting process. Addressing these issues through increased
The digital vote is then hashed using a The control unit in the proposed voting system
cryptographic hash function, such as SHA-256, to generates a checksum for the vote data. This
create a unique digital fingerprint. This hash is used checksum is a digital fingerprint that ensures the
to ensure the integrity and authenticity of the vote. integrity of the vote by detecting any changes or
Additionally, the vote is encrypted using a public errors in the data. The checksum is typically
key encryption algorithm, such as RSA, to protect generated using a cryptographic hash function, such
the vote from unauthorized access. [11] as SHA-256, which is a strong one-way function
that generates a unique hash value for the input
The hashed and encrypted vote is then packaged
data. This hash value is then used to verify the
into a transaction, which is a fundamental unit of
integrity of the vote data. [14]
data in a blockchain. The transaction includes the
vote itself. This transaction is then broadcast to the The blockchain unit in the system also generates a
network of nodes participating in the blockchain. checksum for the vote data. This checksum is used
to ensure that the vote data is correctly recorded and
stored on the blockchain. The blockchain unit uses a
similar hash function to generate the checksum,
ensuring that the integrity of the vote data is
maintained throughout the process.
The verification of checksums in the voting system
involves comparing the checksum generated by the control
unit with the checksum generated by the blockchain unit. If
the checksums match, it indicates that the vote data has been
correctly recorded and stored on the blockchain.