Skip to main content

A Design for Blockchain-Based Digital Voting System

  • Conference paper
  • First Online:
Digital Science (DSIC18 2018)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 850))

Included in the following conference series:

Abstract

In recent years, blockchain technology has affected to a large extent all aspects of life, however, until now paper-based elections have been practiced. It is time to upgrade the election scenario using modern technology such as blockchain and advanced cryptography methods. Actually, both of Estonia and New South Wales have been using i-voting systems, but after developing an example software of their systems for the purpose of analysis, it is discovered that it has weaknesses against many kinds of attacks, such as malwares, network attacks, and servers attacks. The fact that the blockchain technology has demonstrated infinite immutability and resistance against hacking, so it is possible to use it to secure election results from fraud by saving every single piece of data, record or transaction with unchangeable history. By abandoning the traditional database and compensating it with two blockchains instead of one ensures voter/vote privacy, as well as, safeguards the results from manipulation. Also, using blockchain’s distributed network reduces the load on the network. Finally, solutions to problems of impersonation and vote selling are suggested. The technology behind the digital voting system design is explained in terms of the processes involved, such as ID creation, authentication, voting, and vote tallying.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Brightwell, I., Cucurull, J., Galindo, D., Guasch, S.: An overview of the iVote 2015 voting system, New South Wales Electoral Commission, Australia, Scytl Secure Electronic Voting, Spain (2015)

    Google Scholar 

  2. Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21, 120–126 (1978)

    Article  MathSciNet  Google Scholar 

  3. Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008). http://bitcoin.org/bitcoin.pdf

  4. Glaser, F.: Pervasive decentralisation of digital infrastructures: a framework for blockchain enabled system and use case analysis. In: Hawaii International Conference on System Sciences, Goethe University Frankfurt, Hawaii (2017)

    Google Scholar 

  5. Kizhakkedathil, N.: A Study into the Prospects of Implementing End-To-End Verifiability in Estonia Voting. Tallinn University Of Technology, Faculty of Information Technology, Department of Computer Science, Tallinn (2016)

    Google Scholar 

  6. Zyskind, G., Nathan, O., Pantland, A.: Decentralizing privacy: using blockchain to protect personal data. In: IEEE CS Security and Privacy Workshops (2015)

    Google Scholar 

  7. Lyon, D.: National IDs in a global world: surveillance, security, and citizenship. Case West. Reserve J. Int. Law 44, 607–623 (2010)

    Google Scholar 

  8. Johnson, D., Menezes, A.: The elliptic curve digital signature algorithm (ECDSA). Technical report CORR 99–34, Department of C&O, University of Waterloo, Canada (1999)

    Google Scholar 

  9. M’Raihi, D., Machani, S., Pei, M., Rydell, J.: TOTP: time-based one-time password algorithm. Internet Engineering Task Force (IETF) (2011)

    Google Scholar 

  10. Dunphy, P., Adleman, L.: A First look at identity management schemes on the blockchain. In: IEEE, VASCO Data Security (2018)

    Article  Google Scholar 

  11. Hastings, N., Peralta, R., Popoveniuc, S., Regenscheid, A.: Security considerations for remote electronic UOCAVA voting. National Institute of Standards and Technology, NISTIR 7770 (2011)

    Google Scholar 

  12. Springall, D., Finkenauer, T., Durumeric, Z., Kitcat, J., Hursti, H., MacAlpine, M., Halderman, J.J.: Security Analysis of the Estonian Internet Voting System, University of Michigan, Open Rights Group. ACM, New York (2014)

    Google Scholar 

  13. Halderman, J.A., Teague, V.: The New South Wales iVote System: Security Failures and Verification Flaws in a Live Online Election. University of Michigan, University of Melbourne [cs.CR]. arXiv:1504.05646v2 (2015)

    Google Scholar 

  14. Adrian, D., Bhargavan, K., Durumeric, Z., Gaudry, P., Green, M., Halderman, J.A., Heninger, N., Springall, D., Thome, E., Valenta, L., VanderSloot, B., Wustrow, E., Zanella-Beeguelin, S., Zimmermann, P.: Imperfect forward secrecy: how Diffie-Hellman fails in practice (2015)

    Google Scholar 

  15. Durumeric, Z., Adrian, D., Mirian, A., Bailey, M., Halderman, J.A.: Tracking the FREAK attack. https://freakattack.com/

  16. Mckay, R.: Flaws in iVote’s re-vote process which attempts to defeat coercers. http://www.bigpulse.com/governmentelections#changevoteaw

  17. Jones, D.W., Simons, B.: Broken ballots: will your vote count? Stanford University Center for the Study of Language and Information, California (2012)

    Google Scholar 

  18. Cross-Site Scripting. http://shiflett.org/articles/cross-site-scripting

  19. Parsovs, A.: Practical issues with TLS client certificate authentication, University of Tartu, Software Technology and Applications Competence Center, Estonia (2014)

    Google Scholar 

  20. Moura, T., Gomes, A.: Blockchain voting and its effects on election transparency and voter confidence. In: Proceedings of the 18th Annual International Conference on Digital Government Research, USA, pp. 574–575. ACM (2017)

    Google Scholar 

  21. McCorry, P., Shahandashti, S.F., Hao, F.: A smart contract for boardroom voting with maximum voter privacy. In: International Conference on Financial Cryptography and Data Security. Springer, pp. 357–375 (2017)

    Google Scholar 

  22. Danchev, D.: Study finds the average price for renting a botnet, ZDNet, May 2010. http://www.zdnet.com/blog/security/study-finds-theaverage-price-for-renting-a-otnet/6528

  23. Vonnegut, S.: Preventing XSS: 3 Ways to Keep Cross-Site Scripting Out of Your Apps, October 2017. http://www.zdnet.com/blog/security/study-finds-theaverage-price-for-renting-a-otnet/6528

  24. Vonnegut, M.: FREAK Attack: What You Need to Know, March 2015. http://www.zdnet.com/blog/security/study-finds-theaverage-price-for-renting-a-otnet/6528

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mahmoud Al-Rawy .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Al-Rawy, M., Elci, A. (2019). A Design for Blockchain-Based Digital Voting System. In: Antipova, T., Rocha, A. (eds) Digital Science. DSIC18 2018. Advances in Intelligent Systems and Computing, vol 850. Springer, Cham. https://doi.org/10.1007/978-3-030-02351-5_45

Download citation

Publish with us

Policies and ethics