Methods and Software Complex Development for Remote Electronic Voting Based on Ethereum Blockchain Platform

2021 ◽  
Vol 26 (6) ◽  
pp. 565-579
Author(s):  
V. Pascari ◽  
◽  
L.G. Gagarina ◽  
V.V. Sliusar ◽  
◽  
...  

The most promising way to increase voters’ confidence in the remote electronic voting (REV) procedure is a voting method based on Ethereum blockchain platform. However, the existing solutions using this method faced a range of problems: ensuring the secrecy of the vote and openness of the procedure for society, pressure on the voter and a guarantee of the reliability of the whole system. In this work, a method for constructing a REV is proposed that solves these problems. It is similar in structure to the traditional voting method, using the same principle and processes. The Ethereum blockchain based REV process is described in detail. It was shown that received votes are securely stored in the Ethereum blockchain network, and the correctness of the vote addressing to the selected candidate can always be checked in real time. The description of smart contract algorithm that implements the transfer of vote from voter to candidate using transactions and determines the winner who received the highest number of votes was provided. It was demonstrated that keccak256 hashing algorithm and secp256k1 elliptic curve signatures ensure transactions’ maximum protection, reliability, and non-rollability. The developed REV technique based on Ethereum blockchain platform increases the efficiency of data security and confidentiality, transparency and anonymity of the voting procedure, and solves the problem of coercion. The results of the work have been implemented programmatically and can be used not only in the electoral system, but also wherever there is need of remote voting.

Internet of Things(IoT) is playing a pivotal role in our daily life as well as in various fields like Health, agriculture, industries etc. In the go, the data in the various IoT applications will be easily available to the physical dominion and thus the process of ensuringthe security of the data will be a major concern. For the extensive implementation of the numerous applications of IoT , the data security is a critical component. In our work, we have developed an encryption technique to secure the data of IoT. With the help of Merkle-Hellman encryption the data collected from the various IoT devices are first of all encrypted and then the secret message is generated with the help of Elliptic Curve Cryptography.


2015 ◽  
pp. 557-570
Author(s):  
Dashbalbar Gangabaatar

Mongolia introduced a new electronic voting system for the first time for the 2012 parliamentary election. E-voting empowers citizens by making voting simpler and providing better opportunities for certain groups of citizens to participate in the election process. The electoral reform was one of the major steps the parliament carried out in order to restore public trust lost in the violent protests against the 2008 parliamentary election results. A free, transparent, and fair electoral system was important to correct the fraud in the old election system. This chapter examines the effectiveness of the mixed system of election, the electronic voting system, and other changes to the electoral system in Mongolia.


Author(s):  
Dashbalbar Gangabaatar

Mongolia introduced a new electronic voting system for the first time for the 2012 parliamentary election. E-voting empowers citizens by making voting simpler and providing better opportunities for certain groups of citizens to participate in the election process. The electoral reform was one of the major steps the parliament carried out in order to restore public trust lost in the violent protests against the 2008 parliamentary election results. A free, transparent, and fair electoral system was important to correct the fraud in the old election system. This chapter examines the effectiveness of the mixed system of election, the electronic voting system, the constitutionality of the electoral systems, and other changes to the electoral system in Mongolia.


Author(s):  
Geetanjali Rathee ◽  
Hemraj Saini

India is the largest democracy in the world, and in spite of that, it faces various challenges on a daily basis that hinder its growth like corruption and human rights violations. One of the ugliest phases of corruption and political mayhem is visible during the election process where no stone is kept unturned in order to gain power. However, it is the common citizen who suffers most in terms of clarity as well as security when it comes to his/her vote. Blockchain can play a very important role in ensuring that the voters registering their votes are legit and the counting of votes is not manipulated in any way. It is also needed in today's times where the world is available to people in their smart phones to also give them the opportunity to register their votes hassle free via their smart phones without having to worry about the system getting hacked. Therefore, in this chapter, the proposed layout will be based on a smart contract, using Ethereum software to create an e-voting app. In this chapter, the authors have proposed a secure e-voting framework through blockchain mechanism.


2020 ◽  
Vol 8 (5) ◽  
pp. 5560-5563

Wireless Sensor Network (WSN) extends the advantages of small price, quick employment, and shared transaction medium, although it induces a lot of security and secrecy challenges. In this paper, the Elliptic Curve Cryptography based Secure Data Communication and Enhance sensor Reliability (SDER) in WSN. In this scheme, an Elliptic Curve Cryptography (ECC) Weierstrass function is used to verify the sensor reliability, and ECC cryptography technique is useful for providing the data security in the network. The simulation result demonstrates that the SDER reduces both the packet loss rate and the network delay.


A blockchain is decentralized immutable ledger technology maintaining integrity. So to conduct tamperproof election it’s one of the approach towards it. Smart contracts are Self executed code that is written on Ethereum platform in blockchain. An E-voting system should be completely secure and does not allow voting twice that is double spending in blockchain. So it should be completely transparent. In research work electronic voting application is implemented and tested using smart contract on Ethereum platform with the help of metamask wallet. The results of ballots and votes will be stored on Ethereum blockchain with the help of consensus algorithm proof of stake. This consensus is used in validating a transaction with concept of majority approval. Current electronic voting system requires a centralized authority to control the procedure from ballot input to result output and for monitoring of election. While blockchain technology provide decentralized system which is open across connected nodes. Blockchain assets provide increased level of system security from hacking and fraud. Every transaction in blockchain is time-stamped and signed digitally with the help of cryptographic algorithms, and it assigns unique hash value to every block so it can be trace easily. Blockchain technology is one of solutions because it embraces a decentralized system and the entire databases are owned by many users. The blockchain technology also has much vulnerability due to which many attacks like 51% attack, Double Spending attack, DDOS attack, Sybil attack, Eclipse attack and Routing attack can be performed on it.


2019 ◽  
Vol 8 (1) ◽  
pp. 53-61
Author(s):  
S. Hendry Leo Kanickam ◽  
L. Jayasimman

Cloud computing is ensuring the security of stored data in cloud computing servers is one of the mainly demanding issues. In Cloud numerous security issues arises such as authentication, integrity and confidentiality. Different encryption techniques attempt to overcome these data security issues to an enormous extent. Hashing algorithm plays an important role in data integrity, message authentication, and digital signature in modern information security. For security purpose using encryption algorithm like ECC (Elliptic Curve Cryptography) and Authentication of data integrity using hashing algorithms like MD5, and SHA-512. This combination method provides data security, authentication and verification for secure cloud computing.


2021 ◽  
Vol 5 (1) ◽  
pp. 148-154
Author(s):  
Fiqar Aprialim ◽  
Adnan ◽  
Ady Wahyudi Paundu

The existing crowdfunding platforms still operate using centralized system. While centralized system can operate well, it requires a third party intermediary in order to operate and thus does not completely provide data security and transparency of crowdfunding activities. In addition, the existence of a third party intermediary in a crowdfunding activity also causes the existing processing costs to be expensive. Therefore, the crowdfunding system needs to be built in a decentralized manner so that it eliminates the need for third parties as intermediaries in the crowdfunding process. This study proposes a prototype of decentralized crowdfunding system using Ethereum blockchain and smart contract technology. The result of system functionality test using black box testing method shows that all functionality of the crowdfunding system can run properly while operate in decentralized architecture.  


2019 ◽  
Vol 17 (3) ◽  
pp. 386-393
Author(s):  
Safdar Shaheen ◽  
Muhammad Yousaf ◽  
Mudassar Jalil

Free and fair elections are indispensable to quantify the sentiments of the populace for forming the government of representatives in democratic countries. Due to its procedural variation from country to country and complexity, to maneuverer, it is a challenging task. Since the Orthodox paper-based electoral systems are slow and error-prone, therefore, a secure and efficient electoral system always remained a key area of research. Although a lot of literature is available on this topic. However, due to reported anomalies and weaknesses in American and France election in 2016, it once again has become a pivotal subject of research. In this article, we proposed a new secure and efficient electronic voting scheme based on public key cryptosystem dubbed as Number Theory Research Unit (NTRU). Furthermore, an efficient and robust three factors authentication protocol based on a personalized memorable password, a smartcard, and bioHash is proposed to validate the legitimacy of a voter for casting a legal vote. NTRU based blind signatures are used to preserve the anonymity and privacy of vote and voters, whereas the proficiency of secure and efficient counting of votes is achieved through NTRU based homomorphic tally. Non-coercibility and individual verifiability are attained through Mark Pledge scheme. The proposed applied electronic voting scheme is, secure, transparent and efficient for large scale elections.


Sign in / Sign up

Export Citation Format

Share Document