scispace - formally typeset
Book ChapterDOI

Platform-Independent Secure Blockchain-Based Voting System

TLDR
This work proposes a practical platform-independent secure and verifiable voting system that can be deployed on any blockchain that supports an execution of a smart contract and analyzes the correctness and coercion-resistance of the proposed voting system.
Abstract
Cryptographic techniques are employed to ensure the security of voting systems in order to increase its wide adoption. However, in such electronic voting systems, the public bulletin board that is hosted by the third party for publishing and auditing the voting results should be trusted by all participants. Recently a number of blockchain-based solutions have been proposed to address this issue. However, these systems are impractical to use due to the limitations on the voter and candidate numbers supported, and their security framework, which highly depends on the underlying blockchain protocol and suffers from potential attacks (e.g., force-abstention attacks). To deal with two aforementioned issues, we propose a practical platform-independent secure and verifiable voting system that can be deployed on any blockchain that supports an execution of a smart contract. Verifiability is inherently provided by the underlying blockchain platform, whereas cryptographic techniques like Paillier encryption, proof-of-knowledge, and linkable ring signature are employed to provide a framework for system security and user-privacy that are independent from the security and privacy features of the blockchain platform. We analyse the correctness and coercion-resistance of our proposed voting system. We employ Hyperledger Fabric to deploy our voting system and analyse the performance of our deployed scheme numerically.

read more

Citations
More filters
Journal Article

Blockchain-based Systems and Applications: A Survey

TL;DR: This paper summarizes the existing blockchain-based systems and applications, including the applications of blockchain traceability technology in various fields, the blockchain decentralized applications, and other blockchain applications in data security protection, respectively.
Journal ArticleDOI

A Systematic Review of Challenges and Opportunities of Blockchain for E-Voting

Ruhi Tas, +1 more
- 09 Aug 2020 - 
TL;DR: It was determined that blockchain systems can provide solutions to certain problems that prevail in current election systems and security of remote participation and scalability should be improved for sustainable blockchain based e-voting.
Journal ArticleDOI

Chaintegrity: blockchain-enabled large-scale e-voting system with robustness and universal verifiability

TL;DR: This work proposes a novel BEV system, named Chaintegrity, that fulfills all the specified desiderata and proposes a hybrid data structure which combines the counting Bloom filter and the Merkle hash tree for fast authentication.
Journal ArticleDOI

Efficient, Coercion-free and Universally Verifiable Blockchain-based Voting

TL;DR: In this article, the authors propose a blockchain-based voting system which achieves all the properties expected from secure elections without requiring too much from the voter, such as coercion resistance and receipt-freeness, by means of a randomizer token.
Proceedings ArticleDOI

A Comparitive Analysis on E-Voting System Using Blockchain

TL;DR: A literature review on the papers and the techniques used to tackle voting challenges in Decentralized System and focus is drifting towards making Voting Process simple, secure and anonymity in the hand of the public.
References
More filters
Journal ArticleDOI

Untraceable electronic mail, return addresses, and digital pseudonyms

TL;DR: A technique based on public key cryptography is presented that allows an electronic mail system to hide who a participant communicates with as well as the content of the communication - in spite of an unsecured underlying telecommunication system.

A fully homomorphic encryption scheme

TL;DR: This work designs a somewhat homomorphic "boostrappable" encryption scheme that works when the function f is the scheme's own decryption function, and shows how, through recursive self-embedding, bootstrappable encryption gives fully homomorphic encryption.
Journal ArticleDOI

Practical byzantine fault tolerance and proactive recovery

TL;DR: A new replication algorithm, BFT, is described that can be used to build highly available systems that tolerate Byzantine faults and is used to implement the first Byzantine-fault-tolerant NFS file system, BFS.