scholarly journals A Blockchain-Based Voting System for E-Elections in Totalitarian States

2021 ◽  
pp. 77-93
Author(s):  
Mohammad Hossin shafiabadi ◽  
◽  
◽  
Mohammad Hossin shafiabadi

The purpose of the present research was to introduce a blockchain-based voting system so that any state, including totalitarian states, can show interest in using it. In this method, a hybrid voting system with two centralized and distributed systems was used. Its centralized system is one of the most common voter identification and polling models, and its distributed system, which is designed with Ethereum public blockchain, is voting for voters. Totalitarian states are not interested in announcing the results online. Also, the lack of trust in E-voting systems by both states and voters has led to E-voting in important political elections in most states as support for manual or paper voting. Based on the results of field research with this voting system, it was possible to create a 7 min break between the end of the voting process and the announcement of the results for political considerations. This break can be increased by agreement. The results of the votes cannot be manipulated in any way. Survey results should also be communicated to voters before the voting process. This voting system can improve the level of democracy and maximum participation. It is hoped that the spread of distributed technologies, especially the blockchain, will pave the way for the spread of justice and democracy around the world.

Author(s):  
B U Umar ◽  
O M Olaniyi ◽  
L A Ajao ◽  
D Maliki ◽  
I C Okeke

            Democratic government in the world today rely on electronic voting as the foremost means of providing credible, transparent and fair elections for the electorate. There is a need for developed electronic voting systems to be security enhanced to ensure the authenticity of the developed system. Traditional paper balloting systems suffer from vote tampering, multiple voting and illegal voting by unregistered voters. They are also, susceptible to under aged voting due to the difficulty in authenticating the identity of prospective voters. Manual collation and publication of vote results also leads to slow response times and inaccuracies in published results. This research paper proposes a system to combat the current challenges through the development of a fingerprint biometric authentication system for secure electronic voting machines. It uses a fingerprint biometric sensor, integrated via Python to verify users of the system. The inclusion of biometrics improves the security features of the system. The secure voting system is built using PHP and easy to use Graphical User Interface was designed using HTML and CSS. Users are required to interact with the machine via a 7” touchscreen interface. From the results, it shows that the developed machine has a minimum response time of 0.6 seconds for specific operation, an FAR of 2%, FRR of 10% and overall system accuracy of 94%. The developed machine is able to combat the challenges of authentication of users, thereby guaranteeing the transparency, credibility, integrity and vote authenticity of the elections.


Author(s):  
Nahida Nigar ◽  
Mohan Lal Nath ◽  
MD. Toufiqul Islam

The objective of this project is to improve the existing voting system that will be accurate, transparent, and faster and will ensure a single vote for a single person. Our proposed system has covered all of these issues successfully. This product is affordable by many organizations where preferential elections conducted. The product is a prototype and can be implemented for vast use. Voting is an onerous task for the election commission to conduct free and fair polls in our country, the largest democracy in the world. A lot of money has been spent on this to make sure that the elections are rampage free. But, now- a -days it has become very usual for some forces to indulge in rigging which may eventually lead to a result contrary to the actual verdict given by the people. In order to provide inexpensive solutions to the above, this project is implemented with the biometric system i.e. fingerprint scanning. This is used to ensure the security to avoid fake, repeated voting, etc. It also enhances the accuracy and speed of the process. The system uses a thumb impression for voter identification as we know that the thumb impression of every human being has a unique pattern. Thus it would have an edge over the present-day voting systems. The purpose of such a system is to ensure that the voting rights are accessed only by a legitimate user and no one else. In this, creation of a database consisting of the thumb impressions of all the eligible voters in a constituency is done as a pre-poll procedure. During elections, the thumb impression of a voter is entered as input to the system. This is then compared with the available records in the database. If the particular pattern matches with anyone in the available record, access to cast a vote is granted. But in case the pattern doesn’t match with the records of the database or in case of repetition, access to cast a vote is denied or the vote gets rejected. The result is instantaneous and counting is done. The overall cost for conducting elections gets reduced and so does the maintenance cost of the systems.


2020 ◽  
Vol 17 (11) ◽  
pp. 4890-4896
Author(s):  
S. Mahalakshmi ◽  
N. Archana ◽  
B. Sundarambal ◽  
A. Dineshkumar

Nowadays the growth of digital technology has increased since it is more helpful for people. The main threats in the general ballot system are security and transparency. The current voting system is a centralized system based on a single organization. Main issue in the ordinary method is that only one organization maintains the entire database since it is centralized. The problem is that the organization can make unauthorized access to the database and alter the data or remove the data from the database which leads to loss/change of data. The better solution for this problem is making the existing election system decentralized. For making the database decentralized we use block chain technology. By using this technology we can make the datas more secure and not accessed by anyone. So there is no loss/change of data. Implementing blockchain in e-voting systems can reduce the unauthorized database manipulations. AES algorithm can be used to encrypt the data from the fingerprint sensor. This paper also presents various studies on the existing e-voting systems and shows how our voting system is better and different from the former.


Author(s):  
Prof. Mrunal Pathak ◽  
Amol Suradkar ◽  
Ajinkya Kadam ◽  
Akansha Ghodeswar ◽  
Prashant Parde

Increasingly digital technology in the present helped many people lives. Unlike the electoral system, there are many conventional uses of paper in its implementation. The aspect of security and transparency is a threat from still widespread election with the conventional system (offline). General elections still use a centralized system, there is one organization that manages it. Some of the problems that can occur in traditional electoral systems is with an organization that has full control over the database and system, it is possible to tamper with the database of considerable opportunities. Blockchain technology is one of solutions, because it embraces a decentralized system and the entire database are owned by many users. Blockchain itself has been used in the Bitcoin system known as the decentralized Bank system. By adopting blockchain in the distribution of databases on e-voting systems can reduce one of the cheating sources of database manipulation. This research discusses the recording of voting result using blockchain algorithm from every place of election. Unlike Bitcoin with its Proof of Work, this thesis proposed a method based on a predetermined turn on the system for each node in the built of blockchain


2020 ◽  
Vol 15 (1) ◽  
pp. 195-199
Author(s):  
Raj Shrestha ◽  
Rajiv Sah ◽  
Sabin Shrestha ◽  
Shailja Sarawagi ◽  
Nanda Bikram Adhikari

   National elections are a big deal which has a major role in the development and progress of a country. The security of an election is in fact the matter of national security. Current voting systems in the context of Nepal and other parts of the world are still traditional and insecure. From the dawn of democracy, elections are still based on pen and papers. While there are new electronic voting machines, these systems have a high risk of rigging and are prone to failure, crashes, and attacks from intruders. The stated problems can be addressed through the implementation of new technology namely Blockchain for a transparent and reliable voting process. A blockchain based voting platform has been built to make the voting process digital, secure, reliable and intuitive. The votes casted by voters are stored in the blockchain, thus making it immutable and secure. The system can be scaled based on the requirements of an election. Voters can login to the system with the help of encrypted identification. This encrypted identification will lead to secure voting process. A separate portal for both voters and the election commission reduces the election hassle and time. So, in this system, it is demonstrated how the use of blockchain platform could contribute to modern elections using Ethereum, smart contracts and distributed systems to provide voters with secure, transparent and reliable voting platform.


2017 ◽  
Vol 36 (04) ◽  
pp. 245-250
Author(s):  
A. Speckhard

SummaryAs a terror tactic, suicide terrorism is one of the most lethal as it relies on a human being to deliver and detonate the device. Suicide terrorism is not confined to a single region or religion. On the contrary, it has a global appeal, and in countries such as Syria, Iraq, Afghanistan, and Pakistan it has come to represent an almost daily reality as it has become the weapon of choice for some of the most dreaded terrorist organizations in the world, such as ISIS and al-Qaeda. Drawing on over two decades of extensive field research in five distinct world regions, specifically the Middle East, Western Europe, North America, Russia, and the Balkans, the author discusses the origins of modern day suicide terrorism, motivational factors behind suicide terrorism, its global migration, and its appeal to modern-day terrorist groups to embrace it as a tactic.


Author(s):  
Nicole Curato

Misery rarely features in conversations about democracy. And yet, in the past decades, global audiences are increasingly confronted with spectacles of human pain. The world is more stressed, worried, and sad today than we have ever seen it, a Gallup poll finds. Does democracy stand a chance in a time of widespread suffering? Drawing on three years of field research among communities affected by Typhoon Haiyan in the Philippines, this book offers ethnographic portraits of how collective suffering, trauma, and dispossession enlivens democratic action. It argues that emotional forms of communication create publics that assert voice and visibility at a time when attention is the scarcest resource, whilst also creating hierarchies of misery among suffering communities. Democracy in a Time of Misery investigates the ethical and political value of democracy in the most trying of times and reimagines how the virtues of deliberative practice can be valued in the context of widespread suffering.


Author(s):  
Ronald L Rivest

This paper defines and explores the notion of ‘software independence’ in voting systems: ‘A voting system is software independent if an (undetected) change or error in its software cannot cause an undetectable change or error in an election outcome’. For example, optical scan and some cryptographically based voting systems are software independent. Variations and implications of this definition are explored. It is proposed that software-independent voting systems should be preferred, and software-dependent voting systems should be avoided. An initial version of this paper was prepared for use by the Technical Guidelines Development Committee in their development of the Voluntary Voting System Guidelines, which will specify the requirements that the USA voting systems must meet to receive certification.


2011 ◽  
Vol 38 ◽  
pp. 103-122 ◽  
Author(s):  
Jan Jansen

Literacy is a personally acquired skill, and the way it is taught to a person changes how that person thinks. Thanks to David Henige historians of Africa are much more aware of how literacy influences memory and historical imagination, and particularly how literacy systems introduce linear concepts of time and space. This essay will deal with these two aspects in relation to Africa's most famous epic: Sunjata. This epic has gained a major literary status worldwide—text editions are taught as part of undergraduate courses at universities all over the world—but there has been little extensive field research into the epic. The present essay focuses on an even less studied aspect of Sunjata, namely how Sunjata is experienced by local people.Central to my argument is an idea put forward by Peter Geschiere, who links the upheaval of autochthony claims in Africa (and beyond) to issues of citizenship and processes of exclusion. He analyzes these as the product of feelings of “belonging.” Geschiere argues that issues of belonging should be studied at a local level if we are to understand how individuals experience autochthony. Analytically, Geschiere proposes shifting away from ”identity” by drawing from Birgit Meyer's work ideas on the aesthetics of religious experience and emotion; Meyer's ideas are useful to explain “how some (religious) images can convince, while other do not.”


2018 ◽  
Vol 55 (3) ◽  
pp. 251-271 ◽  
Author(s):  
Tien-Chin Tan ◽  
Alan Bairner ◽  
Yu-Wen Chen

With the problems of doping in sport becoming more serious, the World Anti-Doping Code was drafted by the World Anti-Doping Agency in 2003 and became effective one year later. Since its passage, the Code has been renewed four times, with the fourth and latest version promulgated in January 2015. The Code was intended to tackle the problems of doping in sports through cooperation with governments to ensure fair competition as well as the health of athletes. To understand China’s strategies for managing compliance with the Code and also the implications behind those strategies, this study borrows ideas from theories of compliance. China’s high levels of performance in sport, judged by medal success, have undoubtedly placed the country near the top of the global sports field. Therefore, how China acts in relation to international organizations, and especially how it responds to the World Anti-Doping Agency, is highly significant for the future of elite sport and for the world anti-doping regime. Through painstaking efforts, the researchers visited Beijing to conduct field research four times and interviewed a total of 22 key sports personnel, including officials at the General Administration of Sports of China, the China Anti-Doping Agency, and individual sport associations, as well as sport scholars and leading officials of China’s professional sports leagues. In response to the World Anti-Doping Agency, China developed strategies related to seven institutional factors: ‘monitoring’, ‘verification’, ‘horizontal linkages’, ‘nesting’, ‘capacity building’, ‘national concern’ and ‘institutional profile’. As for the implications, the Chinese government is willing and able to comply with the World Anti-Doping Agency Code. In other words, the Chinese government is willing to pay a high price in terms of money, manpower and material resources so that it can recover from the disgrace suffered as a result of doping scandals in the 1990s. The government wants to ensure that China’s prospects as a participant, bidder and host of mega sporting events are not compromised, especially as the host of the 2022 Winter Olympics in Beijing.


Sign in / Sign up

Export Citation Format

Share Document