Abstract
In recent years, blockchain technology has affected to a large extent all aspects of life, however, until now paper-based elections have been practiced. It is time to upgrade the election scenario using modern technology such as blockchain and advanced cryptography methods. Actually, both of Estonia and New South Wales have been using i-voting systems, but after developing an example software of their systems for the purpose of analysis, it is discovered that it has weaknesses against many kinds of attacks, such as malwares, network attacks, and servers attacks. The fact that the blockchain technology has demonstrated infinite immutability and resistance against hacking, so it is possible to use it to secure election results from fraud by saving every single piece of data, record or transaction with unchangeable history. By abandoning the traditional database and compensating it with two blockchains instead of one ensures voter/vote privacy, as well as, safeguards the results from manipulation. Also, using blockchain’s distributed network reduces the load on the network. Finally, solutions to problems of impersonation and vote selling are suggested. The technology behind the digital voting system design is explained in terms of the processes involved, such as ID creation, authentication, voting, and vote tallying.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Brightwell, I., Cucurull, J., Galindo, D., Guasch, S.: An overview of the iVote 2015 voting system, New South Wales Electoral Commission, Australia, Scytl Secure Electronic Voting, Spain (2015)
Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21, 120–126 (1978)
Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008). http://bitcoin.org/bitcoin.pdf
Glaser, F.: Pervasive decentralisation of digital infrastructures: a framework for blockchain enabled system and use case analysis. In: Hawaii International Conference on System Sciences, Goethe University Frankfurt, Hawaii (2017)
Kizhakkedathil, N.: A Study into the Prospects of Implementing End-To-End Verifiability in Estonia Voting. Tallinn University Of Technology, Faculty of Information Technology, Department of Computer Science, Tallinn (2016)
Zyskind, G., Nathan, O., Pantland, A.: Decentralizing privacy: using blockchain to protect personal data. In: IEEE CS Security and Privacy Workshops (2015)
Lyon, D.: National IDs in a global world: surveillance, security, and citizenship. Case West. Reserve J. Int. Law 44, 607–623 (2010)
Johnson, D., Menezes, A.: The elliptic curve digital signature algorithm (ECDSA). Technical report CORR 99–34, Department of C&O, University of Waterloo, Canada (1999)
M’Raihi, D., Machani, S., Pei, M., Rydell, J.: TOTP: time-based one-time password algorithm. Internet Engineering Task Force (IETF) (2011)
Dunphy, P., Adleman, L.: A First look at identity management schemes on the blockchain. In: IEEE, VASCO Data Security (2018)
Hastings, N., Peralta, R., Popoveniuc, S., Regenscheid, A.: Security considerations for remote electronic UOCAVA voting. National Institute of Standards and Technology, NISTIR 7770 (2011)
Springall, D., Finkenauer, T., Durumeric, Z., Kitcat, J., Hursti, H., MacAlpine, M., Halderman, J.J.: Security Analysis of the Estonian Internet Voting System, University of Michigan, Open Rights Group. ACM, New York (2014)
Halderman, J.A., Teague, V.: The New South Wales iVote System: Security Failures and Verification Flaws in a Live Online Election. University of Michigan, University of Melbourne [cs.CR]. arXiv:1504.05646v2 (2015)
Adrian, D., Bhargavan, K., Durumeric, Z., Gaudry, P., Green, M., Halderman, J.A., Heninger, N., Springall, D., Thome, E., Valenta, L., VanderSloot, B., Wustrow, E., Zanella-Beeguelin, S., Zimmermann, P.: Imperfect forward secrecy: how Diffie-Hellman fails in practice (2015)
Durumeric, Z., Adrian, D., Mirian, A., Bailey, M., Halderman, J.A.: Tracking the FREAK attack. https://freakattack.com/
Mckay, R.: Flaws in iVote’s re-vote process which attempts to defeat coercers. http://www.bigpulse.com/governmentelections#changevoteaw
Jones, D.W., Simons, B.: Broken ballots: will your vote count? Stanford University Center for the Study of Language and Information, California (2012)
Cross-Site Scripting. http://shiflett.org/articles/cross-site-scripting
Parsovs, A.: Practical issues with TLS client certificate authentication, University of Tartu, Software Technology and Applications Competence Center, Estonia (2014)
Moura, T., Gomes, A.: Blockchain voting and its effects on election transparency and voter confidence. In: Proceedings of the 18th Annual International Conference on Digital Government Research, USA, pp. 574–575. ACM (2017)
McCorry, P., Shahandashti, S.F., Hao, F.: A smart contract for boardroom voting with maximum voter privacy. In: International Conference on Financial Cryptography and Data Security. Springer, pp. 357–375 (2017)
Danchev, D.: Study finds the average price for renting a botnet, ZDNet, May 2010. http://www.zdnet.com/blog/security/study-finds-theaverage-price-for-renting-a-otnet/6528
Vonnegut, S.: Preventing XSS: 3 Ways to Keep Cross-Site Scripting Out of Your Apps, October 2017. http://www.zdnet.com/blog/security/study-finds-theaverage-price-for-renting-a-otnet/6528
Vonnegut, M.: FREAK Attack: What You Need to Know, March 2015. http://www.zdnet.com/blog/security/study-finds-theaverage-price-for-renting-a-otnet/6528
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Al-Rawy, M., Elci, A. (2019). A Design for Blockchain-Based Digital Voting System. In: Antipova, T., Rocha, A. (eds) Digital Science. DSIC18 2018. Advances in Intelligent Systems and Computing, vol 850. Springer, Cham. https://doi.org/10.1007/978-3-030-02351-5_45
Download citation
DOI: https://doi.org/10.1007/978-3-030-02351-5_45
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-02350-8
Online ISBN: 978-3-030-02351-5
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)