You are on page 1of 8

E-Voting Enabled Using BlockChain

Technology
1
Akash Chauhan 2Ankit Garg 3Ayush Agarwal 4Ravi Pathak

ABSTRACT: E-voting is among the key KEYWORDS: Voter access, Voter


public sectors that can be disrupted by fraud, immutable, tamperproof.
Blockchain technology. The idea in
Blockchain enabled e-voting (BEV) is 1. INTRODUCTION
simple. To use a digital-currency analogy, Free and fair elections are a central feature
BEV issues each voter a “wallet” of democracy. As the world becomes more
containing a user credential. Each voter digital and mobile phones more widespread,
gets a single “coin” representing one online voting and blockchain technology
opportunity to vote. Casting a vote transfers have the potential to make voting more
the voter’s coin to a candidate’s wallet. A accessible and improve election integrity.
voter can spend his or her coin only once. Although at an early stage, these blockchain
Blockchain might address two of the most initiatives demonstrate that blockchain can
prevalent concerns in voting today: voter be used to create secure, online voting in
access and voter fraud. The idea is as government and private elections. The
follows. Eligible voters cast a ballot potential benefits are huge given the current
anonymously using a computer or problems relating to election integrity and
smartphone. BEV employs an encrypted key accessibility around the world.
and tamperproof personal IDs. For On the other hand, voting and cyber security
example, the mobile e-voting platform of the experts have strong concerns about whether
Boston-based startup Voatz employs smart online voting can be secure and whether
biometrics and real-time ID verification. blockchain technology is necessary for
The public ledger ties each cast ballot to an online voting. To better understand these
individual voter and establishes a issues, it is necessary to separate the
permanent, immutable record. No bad actor concerns into two parts. Firstly, I explore
can engage in nefarious activities because governance and privacy issues within
such activities will be evident on the ledger blockchain voting systems. Different
or corrected by a peer-to peer consensus blockchain architectures can affect who
network. To compromise the network, controls, validates and views data on the
hackers would need to successfully hack blockchain. Examining how these case
most of the blocks (files with transaction studies address governance and privacy
records) before new blocks were introduced. issues in their blockchain platforms can help
The Blockchain audit trail ensures that no us understand the current criticisms of
vote has been changed or removed and that blockchain technology in online voting.
no fraudulent and illegitimate votes have Secondly, I look at security issues relating to
been added. Simply, Blockchain enables the the use of personal mobile phones and
creation of tamper-proof audit trails for computers for online voting. Blockchain
voting.
technology is often one part of the
end-to-end solution in electronic voting. servers. Just a bunch of computers that talk
Cyber security issues relating to how users to one another on the same network.
access voting systems affect blockchain as Instead of a centralized database, all the
well as non-blockchain voting systems. To transaction data that is shared across the
separate these cyber security issues from nodes in the blockchain is contained in
blockchain technology, I look at two online bundles of records called blocks, which are
voting case studies that do not use chained together to create the public ledger.
blockchain technology. Interestingly, This public ledger represents all the data in
although cyber security concerns are very the blockchain. All the data in the public
real, these case studies demonstrate the ledger is secured by cryptographic hashing,
viability and long-term use of secure online and validated by a consensus algorithm.
voting, including the case in Estonia where Nodes on the network participate to ensure
online voting has been used for government that all copies of the data distributed across
elections since 2005. the network are the same.
While all the blockchain case studies appear
to successfully address the security concerns PILLARS OF BLOCKCHAIN:
relating to online voting; only Voatz and The three main properties of Blockchain
Votem believe they have addressed Technology which have helped it gain
governance and privacy issues. Smart matic- widespread acclaim are as follows:
Cybernetica believes these issues need 1. Decentralization
further examination and continue to research 2. Transparency
these issues as part of a European 3. Immutability
consortium. These differences highlight the
fact that blockchain technology in online 1. Decentralization: Before Bitcoin
voting is still early stage and we need and BitTorrent came along, we were
significantly more testing and validating more used to centralized services.
before it can become mainstream. It is worth The idea is very simple. You have a
noting that blockchain technology has centralized entity that stores all the
already moved at a quicker pace than most data and you‟d have to interact
people anticipated. The current applications solely with this entity to get
are really impressive and it promises to whatever information you require.
solve some really big problems. Another example of a centralized
system is the banks. They store all
BLOCKCHAIN your money, and the only way that
A blockchain is a peer-to-peer network of you can pay someone by going
computers, called nodes that share all the through the bank. In a decentralized
data and the code in the network. So, if system, the information is not stored
you‟re a device connected to the blockchain, by one single entity. In fact,
you are a node in the network, and you talk everyone in the network
to all the other computer nodes in the owns the information. In a
network. You now have a copy of all the decentralized network, if you want to
data and the code on the blockchain. There interact with your friend then you
are no more central can do so directly without going
through a third party. That was the In simple terms, hashing means
main ideology behind Bitcoins. You taking an input string of any length
and only you alone are in charge of and giving out an output of a fixed
your money. You can send your length. In the context of
money to anyone you want without cryptocurrencies like bitcoin, the
having to go through a bank. transactions are taken as input and
2. Transparency: One of the most run through a hashing algorithm
interesting and misunderstood (Bitcoin uses SHA-256) which gives
concepts in blockchain is an output of a fixed length.
“transparency. A person‟s identity is The blockchain is a linked list that
hidden via complex cryptography contains data and a hash pointer that
and represented only by their public points to its previous block, hence
address. So, if you were to look up a creating the chain. What is a hash
person‟s transaction history, you
pointer? A hash pointer is similar to
will not see “Bob sent 1 BTC”
a pointer, but instead of just
instead you will see
containing the address of the
“1MF1bhsFLkBzzz9vpFYEmvwT2
previous block it also contains the
TbyCt7NZJ sent 1 BTC”. So, while
hash of the data inside the previous
the person‟s real identity is secure,
block. This one small tweak is what
you will still see all the transactions
makes blockchains so amazingly
that were done by their public
reliable and trailblazing.
address. This level of transparency
has never existed before within a
financial system. It adds that extra, ASSETS OF BLOCKCHAIN
and much needed level of The blockchain network gives internet users
accountability which is required by the ability to create value and authenticates
some of these biggest institutions. digital information. Here are some assets of
Speaking purely from the point of blockchain:
view of cryptocurrency, if you know 1. Smart contracts: Distributed ledger
the public address of one of these big technology enables the coding of simple
companies, you can simply pop it in contracts that will execute when specified
an explorer and look at all the conditions are met. Ethereum is an open-
transactions that they have engaged source blockchain project that was built
in. This forces them to be honest, specifically to realize this possibility.
something that they have never had 2. The sharing economy: By enabling
to deal with before. peer-to-peer payments, the blockchain opens
3. Immutability: Immutability, in the the door to direct interaction between parties
context of the blockchain, means that — a truly decentralized sharing economy
once something has been entered results.
into the blockchain, it cannot be 3. Crowdfunding: Crowdfunding initiatives
tampered with. The reason why the like Kickstarter and Gofundme are doing the
blockchain gets this property is that advance work for the emerging peer-to-peer
of the cryptographic hash function. economy. The popularity of these sites
suggests people want to have a direct say in
product development. Blockchains take this interest to the next level, potentially creating
crowd-sourced venture capital funds. 9. Internet of Things (IoT): What is the
4. Governance: By making the results fully IoT? The network-controlled management
transparent and publicly accessible, of certain types of electronic devices — for
distributed database technology could bring instance, the monitoring of air temperature
full transparency to elections or any other in a storage facility. Smart contracts make
kind of poll taking. Ethereum-based smart the automation of remote systems
contracts help to automate the process. management possible. A combination of
5. Supply chain auditing: Consumers software, sensors, and the network
increasingly want to know that the ethical facilitates an exchange of data between
claims companies make about their products objects and mechanisms. The result
are real. Distributed ledgers provide an easy increases system efficiency and improves
way to certify that the backstories of the cost monitoring.
things we buy are genuine. Transparency 10. Neighbourhood Microgrids:
comes with blockchain-based timestamping Blockchain technologies enables the buying
of a date and location — on ethical and selling of the renewable energy
diamonds, for instance — that corresponds generated by neighborhood microgrids.
to a product number. When solar panels make excess energy,
6. File storage: Decentralizing file storage Ethereum-based smart contracts
on the internet brings clear benefits. automatically redistribute it. Similar types of
Distributing data throughout the network smart contract automation will have many
protects files from getting hacked or lost. other applications as the IoT becomes a
7. Prediction markets: The crowdsourcing reality.
of predictions on event probability is proven 11. Identity management: There is a
to have a high degree of accuracy. definite need for better identity management
Averaging opinions cancels out the on the web. The ability to verify your
unexamined biases that distort judgment. identity is the lynchpin of financial
Prediction markets that payout according to transactions that happen online. However,
event outcomes are already active. remedies for the security risks that come
8. Protection of intellectual property: As with web commerce are imperfect at best.
is well known, digital information can be Distributed ledgers offer enhanced methods
infinitely reproduced — and distributed for proving who you are, along with the
widely thanks to the internet. This has given possibility to digitize personal documents.
web users globally a goldmine of free Having a secure identity will also be
content. However, copyright holders have important for online interactions.
not been so lucky, losing control over their 12. AML and KYC: Anti-money
intellectual property and suffering laundering (AML) and know your customer
financially as a consequence. Smart (KYC) practices have a strong potential for
contracts can protect copyright and automate being adapted to the blockchain. Currently,
the sale of creative works online, financial institutions must perform a labor-
eliminating the risk of file copying and intensive multi-step process for each new
redistribution. customer. KYC costs could be reduced
through cross-institution client verification
and at the same time increase monitoring 13. Data management: Today, in exchange
and analysis effectiveness. for their personal data people can use social
media platforms like Facebook for free. In platform to vote for the 2018 inductee into
the future, users will have the ability to the Rock and Roll Hall of Fame. Votem
manage and sell the data their online activity processed over 1.8 million votes without
generates. Because it can be easily fraud, compromise, attacks or hacking of
distributed in small fractional amounts. any kind, marking it the largest use of online
14. Land title registration: As Publicly- voting using blockchain technology to
accessible ledgers, blockchains can make all date.The Votem system was recently used
kinds of record-keeping more efficient. for the 2018 Inductee Vote.
Property titles are a case in point. They tend Case Study 3: Smartmatic-Cybernetica —
to be susceptible to fraud, as well as costly Utah Republican Party, 2016 Presidential
and labor-intensive to administer. Candidate
15. Stock trading: The potential for added Election, USA
efficiency in share settlement makes a strong Smartmatic-Cybernetica delivered the
use case for blockchains in stock trading. world‟s first online election using
When executed peer-to-peer, trade blockchain technology for the Utah
confirmations become almost instantaneous Republican party caucus in 2016. Nearly
(as opposed to taking three days for 90% of voters registered to vote online. The
clearance). platform enabled 24,486 voters.

2. EXISTING SYSTEM 3. PROPOSED SYSTEM


Case Study 1: Voatz — State of West In ideal condition as occurs with paper
Virginia, 2018 Federal Elections, USA ballot voting, information about whom the
In the first use of blockchain technology in a voter voted is kept secret. This information
U.S. federal election, the State of West is not even known to the election
Virginia used Voatz‟s mobile voting commission. This security aspect is very
application to enable overseas voters to vote central to the electronic voting system. The
in the 2018 U.S. midterm elections. A total system should be secure enough that no one
of 144 voters from 31 countries participated should be able to know whom the voter
in the pilot. The Voatz application relies on voted for and tamper with it at later stages.
blockchain technology to create an Also, there should be efforts to ensure the
immutable record of the votes cast. It also anonymity of the voter. To maintain voting
uses cybersecurity software to detect data confidentiality, trusted third party(TTP)
malware on smartphones, and biometrics for can be used. TTP acts as an agent between
identification and authentication. the voter and the election commission to
Case Study 2: Votem — Rock and Roll authenticate the voter to vote during
Hall of Fame, 2017 & 2018 Inductee elections. Without TTP, it is difficult to
Voting, USA incorporate security and data confidentiality.
In 2017, music fans were able to use
Votem‟s blockchain-based mobile voting BEFORE VOTING: The election
commission should provide a user interface
to the voter to express his intention for
voting. The voter can be identified with any
of the unique identification numbers
assigned by the election commission. This consistently throughout the process. In the
identification number must be used registration process, the voter submits a
secret message. As a response to the secret verification, the election commission returns
message, the client site web page generates a the validity of the voter to a trusted third
unique random reference number to the party.
voter which has to be noted for future
reference during voting.

A voter identified as valid will be taken to


the voting page. There, a list of candidates
An internally hash secret message and
will be shown based on constituency.
reference number is generated and stored in
During this process, a trusted third party
the election commission database. It‟s
generates a public key for the voter using the
important that voter not share this secret
message and reference multi-chain network and stores this
number with the election commission. information against the hash of the secret
Otherwise, the election commission writes message and reference number of the voter.
to get to know who voted for whom and The same is depicted in above. There are
potentially manipulate the whole voting cases where a voter might try to vote
process at later stages of voting. multiple times for the same contestant or for
the multiple contestants. In either case of the
DURING VOTING: In the real world, system guards against such malicious
voting happens during the stipulated period. voting. This safeguarding is made possible
The same procedure is followed here. in a multi-chain by restricting the number of
However, the duration of voting can be transactions between 2 parties to one.
extended. During voting, the voter has to Hence, even if the voter does more than one
submit the same secret message and transaction/votes, those will be invalidated
reference number that has been generated by multi-chain.
during voter registration to the trusted third
party. Trusted third party has to send the AFTER VOTING: Since it is an electronic
message hash to the election commission to voting system, reports can be generated in
verify that the voter is a valid voter. Upon real time. However, the real time report of
who is leading and who is lagging should
not be made public as it might affect public
sentiment and could bais to a particular
party or candidate.
After the voting completeness, detailed results, constituency results etc. can be easily
report about a candidate‟s results party-wise prepared using any BI tool b coming data
from multi-chain and data stored in Election 4. Algorithm: Decentralized app needs
Commission records. to have a consensus mechanism that
portrays proof of value in the
dApps: The Ultimate Open Source cryptographic system. Essentially,
Revolution this endows value to the
The dApp concept is still in its nascent cryptographic token and creates a
stage. Explaining the same in a single line is consensus protocol that users agree
tough because no upon to generate valuable crypto
a specific definition seems to fit all the tokens.
attributes that make an application a
decentralized app. As dApps, an application 4. RESULT ANALYSIS
is required to exhibit the following four E-voting is still a controversial topic within
characteristics: both political and scientific circles. Despite
1. Open Source: The first and the existence of a few very good examples,
foremost attribute is that such apps most of which are still in use; many more
should make their core source code attempts were either failed to provide the
available to everyone. As the core security and privacy features of a traditional
characteristic of dApps is autonomy election or have serious usability and
and unanimous consensus, scalability issues. On the contrary,
essentially the changes must be blockchain-based e-voting solutions,
decided by all or the majority of the including the one we have implemented
users. Also, the code should be using the smart contracts and the Ethereum
available to everyone for checking network, address (or may address with
out. relevant modifications) almost all of the
2. Decentralized Nature: As the name security concerns, like privacy of voters,
suggests, decentralized applications integrity, verification and non-repudiation of
store everything on a decentralized votes, and transparency of counting. Yet,
blockchain or any cryptographic there are also some properties that cannot be
technology to save the app from addressed solely using the blockchain, for
perils of centralized authority and example authentication of voters (on the
emphasize on autonomous nature. personal level, not on the account level)
3. Incentivization: As the app is based requires additional mechanisms to be
on the decentralized blockchain, the integrated, such as use of biometric factors.
validators of the records on the
network must be 5. CONCLUSION
rewarded/incentivized with In this project, we introduced a blockchain-
cryptographic tokens or any form of based electronic voting system that utilizes
digital asset that has value. smart contracts to enable secure and cost-
efficient election while guaranteeing voters
privacy. We have shown that blockchain
technology offers a new possibility to
overcome the limitations and adoption
barriers of electronic voting systems which
ensures the election security
and integrity and lays the ground for transparency. Using an Ethereum private
blockchain, it is possible to send hundreds of 6. S. Holder, “Can the Blockchain Tame
transactions per Moscow‟s Wild Politics?,” CityLab, 22
second onto the blockchain, utilizing every Dec. 2017;
aspect of the smart contract to ease the load https://www.citylab.com/life/2017/12/can-th
on the blockchain. e-blockchain
For countries of greater size, some -tame-moscows-wild-politics/547973.
additional measures would be needed to 7. “A South Korean Province Used
support greater throughput of Blockchain Tech for Resident Vot- ing,”
transactions per second. CCN.com, 8 Mar.
In future to make the Voting application 2017; https://www.ccn.com/south-korean
more secure we would like to add more -province-used-blockchain-tech
authentication systems like biometrics, face 8. https://ethereum.org/
ID and other authentication units. This way 9. https://www.trufflesuite.com/
we can provide more security and ensure 10. https://www.trufflesuite.com/ganache
that the vote is being casted by the voter 11. https://www.chaijs.com/
themselves. 12. https://mochajs.org/
13. https://solidity.readthedocs.io/en/v0.5.3
REFERENCES:
1. Digital Home Blockchain Voting
System,ActiveCitizen in Moscow Opens,
“BitcoinExchangeGuide.com”.
2. “How Estonia Brought Blockchain Closer
to Citizens: GovTech Case Studies,”
Cointelegraph, 7 Mar.
2017; http://cointelegraph
3. “South Korea Uses Blockchain
Technology for elections,” KryptoMoney, 2
may 2017;
http://KrytoMoney.com/south-korea-uses-Bl
ockchain-technology-for-elections.
4. M.D. Castillo, “Russia Is Leading the
Push for Blockchain Democracy,”
CoinDesk, 2018; https://www
.coindesk.com/russias-capital
-leading-charge-blockchain -democracy.
5. B. Kimathi, “Why You Shouldn‟t Get
Carried Away by Sierra Leone‟s Blockchain
Elections,” Crypto-
Lines, 13 Mar. 2018;
https://crypto-lines.com/2018/03/13/blockch
ain -elections.

You might also like