A Blockchain-Based Verifiable Decentralized Mechanism for Digital Voting System
DOI:
10.51519/journalita.v4i3.480Keywords:
Digital voting, Blockchain, Ethereum, Decentralized app, Web 3.0Abstract
Digital voting systems have garnered significant attention in recent years due to their potential to increase accessibility and transparency in elections. However, concerns about security, transparency, and verifiability have limited their widespread adoption. This paper proposes a blockchain-based verifiable decentralized mechanism for digital voting systems, aiming to address these concerns. By leveraging blockchain technology, cryptographic techniques, and decentralized consensus, our proposed mechanism offers a secure and transparent platform for conducting digital elections. This paper outlines the architecture, components, and benefits of our system, highlighting its potential to revolutionize the way we conduct elections. The proposed mechanism incorporates advanced encryption algorithms to secure the privacy of individual votes. This privacy-centric approach safeguards voter anonymity while still allowing for transparent verification of the overall election results. Security analysis underscores the effectiveness of the blockchain-based verifiable decentralized mechanism in addressing key concerns surrounding digital voting systems. By leveraging innovative technologies and cryptographic principles, the proposed system exhibits a high degree of resilience, transparency, and protection against potential threats, making it a promising solution for secure and trustworthy digital elections.
References
Nakamoto, Satoshi, and A. Bitcoin. "A peer-to-peer electronic cash system." Bitcoin.–URL: https://bitcoin. org/bitcoin. vol. 4, no. 2, 2008.
M. Tejedor-Romero, D. Orden, I. Marsa-Maestre, J. Junquera-Sanchez, and J. M. Gimenez-Guzman, “Distributed remote e-voting system based on shamir’s secret sharing scheme,” Electronics (Switzerland), vol. 10, no. 24, Dec. 2021, doi: 10.3390/electronics10243075.
Delgado-Segura S, Pérez-Sola C, Navarro-Arribas G, Herrera-Joancomartí J. Analysis of the bitcoin utxo set. InFinancial Cryptography and Data Security: FC 2018 International Workshops, BITCOIN, VOTING, and WTSC, Nieuwpoort, Curaçao, March 2, 2018, Revised Selected Papers 22 2019 (pp. 78-91). Springer Berlin Heidelberg.
D. Efanov and P. Roschin, “The All-Pervasiveness of the Blockchain Technology,” Procedia Comput Sci, vol. 123, pp. 116–121, 2018, doi: https://doi.org/10.1016/j.procs.2018.01.019.
Y. Alemami, M. A. Mohamed, and S. Atiewi, “Research on various cryptography techniques,” International Journal of Recent Technology and Engineering, vol. 8, no. 2 Special Issue 3, pp. 395–405, Jul. 2019, doi: 10.35940/ijrte.B1069.0782S319.
C. Chen et al., “When Digital Economy Meets Web3.0: Applications and Challenges,” IEEE Open Journal of the Computer Society, vol. 3, pp. 233–245, 2022, doi: 10.1109/OJCS.2022.3217565.
Buterin V. A next-generation smart contract and decentralized application platform. white paper. 2014 Jan 14;3(37):2-1.
Buterin, Vitalik. "Ethereum: platform review." Opportunities and Challenges for Private and Consortium Blockchains 45 (2016).
S. S. Kushwaha, S. Joshi, D. Singh, M. Kaur, and H. N. Lee, “Systematic Review of Security Vulnerabilities in Ethereum Blockchain Smart Contract,” IEEE Access, vol. 10. Institute of Electrical and Electronics Engineers Inc., pp. 6605–6621, 2022. doi: 10.1109/ACCESS.2021.3140091.
C. Dannen, “Solidity Programming,” in Introducing Ethereum and Solidity, Apress, 2017, pp. 69–88. doi: 10.1007/978-1-4842-2535-6_4.
Bauer, D.P. (2022). Solidity. In: Getting Started with Ethereum. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-8045-4_2
S. Hwang and S. Ryu, “Gap between theory and practice: An empirical study of security patches in solidity,” in Proceedings - International Conference on Software Engineering, IEEE Computer Society, Jun. 2020, pp. 542–553. doi: 10.1145/3377811.3380424.
S. T. Alvi, M. N. Uddin, L. Islam, and S. Ahamed, “DVTChain: A blockchain-based decentralized mechanism to ensure the security of digital voting system voting system,” Journal of King Saud University - Computer and Information Sciences, vol. 34, no. 9, pp. 6855–6871, Oct. 2022, doi: 10.1016/j.jksuci.2022.06.014.
J. Sadowski and K. Beegle, “Expansive and extractive networks of Web3,” Big Data Soc, vol. 10, no. 1, p. 20539517231159628, Jan. 2023, doi: 10.1177/20539517231159629.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 Rini Deviani
This work is licensed under a Creative Commons Attribution 4.0 International License.