SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 06 | Jun 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2583
Blockchain Based Electronic Ballot System
Mohammed Sanaullah1, Tanmayi D2, Adhnan Manzis3, Adithi Mahesh4
1,2,3,4Atria Institute of Technology, Bengaluru, Karnataka, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract – Ever since the advent of the Internet,
broadcasting one’s thoughtsandopinionsthroughoutthe
world was made possible. This newfound power gaverise
to a plethora of applications powered by the web; Skype,
Gmail, YouTube are a few prominent examples. The
Internet as we know it began itsevolution,beginningwith
web of cognition (web1.0) followed by web of
communication (web2.0) and now web3.0 the web of
decentralization. The Ethereum blockchain broughtforth
the idea of decentralized applications (DApps) andpaved
way for zero-trust, peer-to-peer systems. Online voting, a
controversial subject of discussion earlier could now see
the light of day due to the web3.0 mindset. The paper
provides an online alternative to the ballot.
Key Words: Electronic Voting, Ethereum, Ganache,
Cryptography,Blockchain,DecentralizedApplication,Voting,
Anonymity, Elliptic Curve Cryptography, Hashing, Smart
Contract, Proof-of-work, Security, Privacy, Transparency,
End-to-end verifiable, Transactions.
1. INTRODUCTION
Online voting is a popular yet controversial concept in the
modern world. It decreases the cost of physical
infrastructure and participation of voters increases because
of the ease. It also allows people to vote from the comfort of
one’s own home instead of travelling to voting booths and
standing in the queues forlonghours.Althoughonlinevoting
has many benefits, it is not widely adopted among people
since a single vulnerability can lead to a large-scale
manipulation of votes. Online voting system should be
accurate, reliable, transparent, legitimate, and votes should
be kept secret and immutable. Blockchain technology helps
solve quite a few of the issues such as true decentralization,
immutability, unanimous, consensus etc.,[1]Thus, wehavea
viable reason to utilize the Ethereum blockchainasa reliable
data store due to its support for RPCs along with features
such as Smart-Contracts [2] and Proof-of-stakewhichmakes
it much more sustainable [3]. By keeping the application
software open source, trust of users can be upheld whilst
any minor tweaks or bugs that may seep through the cracks
can be identified and resolved by the populous.
1.1 Contribution
The proposed system contains interaction between 4
major entities, namely:
 Client
 Server
 Host
 Blockchain
The Database (DB) used for this system is relational in
nature and contains the following tables:
 User
 Election
 Candidate
 Participate
The smart-contract (SC) code is written in solidity using
the Remix-ide and deployed on the Ganache blockchain.
There exists a Class which consists of the following fields:
 encryptionKey (private, string)
 decryptionKey (private, string)
 voterArray (public, array of addresses)
 votes (public, dictionary (address, vote))
The methods of the Class are as follows:
 setEncryptionKey (private)
 setDecryptionKey (private)
 castVote (private)
 addVoter (private)
 showEncryptionKey (public)
 showDecryptionKey (public)
 showVote (public)
 showVoters (public)
The “private”access-specifierensuresthatonlytheowner
of thesmart-contractcanmodify/accesssuchfields,methods.
1.2 Organization
The rest of the paper is organized as follows: In Section II,
we have the terminologies and basic definitions related to
the scheme are mentioned along with a symbol-definition
table for quick reference. We have discussed our
implementation in Section III. In the next Section IV, we’ve
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 06 | Jun 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2584
put the results and discussion of this system. Section V
contains the conclusion of this system. Section VI wraps up
the paper with the acknowledgment.
2. Terminologies
The definition of symbols used in thispaperarementionedin
the following table. Rivest, Shamir,Adlemanasymmetric-key
encryption (RSA) will be used for encryption/decryption of
votes.
Table -1: Symbol Table
Symbol Type Definition
Ser Entity Server
Cli Entity Client
Hos Entity Host
Blo Entity Blockchain
USR Table User-Table-DB
PAR Table Participate-Table-DB
ELE Table Election-Table-DB
uid String/Number Unique-ID
ipu Address User-Public-Address
ipr Address User-Private-Address
eid String/Number Election-ID
sig Variable Signature
enc Variable RSA-Public-Key
dec Variable RSA-Private-Key
vot Variable Vote
vts Dictionary votes-SC
var Array voterArray-SC
tok Random Integer Verification-Token
3. Procedures
The following are the pre-requisites:
 Every election has its own SC.
 Meta-data of the respective SC must be stored in
ELE.
 The field enc of every activeelection’sSCmustbe
initialized.
 The candidates participating in an election must
be stored in a different table with their
references present inside ELE.
3.1 User Registration
The Cli must first generatean Ethereum account(ipu,ipr)by
using Meta-Mask [4], borrowfromGanacheorgenerateusing
web3-library [5].
The next step begins with Clisending (uid, ipu) to the Ser,
if ipu doesn’t exist in USR, (uid, ipu) is added to it. Else, the
Ser throws an error to Cli stating that, “User already exists!”.
Fig -1: User registration sequence diagram
3.2 Voting
Cli first chooses an election and gets eid and its Hos. Cli
signs uid with ipr to make sig [6] and sends (sig, uid) to the
Hos. Hos extracts ipu from the pair [7] sent by Cli. Hos sends
(ipu, eid) to Ser and waits for a response.
Ser first verifies whether ipu is registered by looking up
USR. If ipu is registered, then it checks PAR for (ipu, eid)
pair’s existing. If the pair (ipu, eid) is unique and notexisting
in PAR, Ser will add the pair (ipu, eid) to PAR and sends
“success” to Hos. If any of the conditions fail, the Hos is
greeted with “failed”.
Hos upon receiving “success” from Ser will proceed with
adding ipu to var [8]. Hos will generate a random integer
called nonce and records it as (nonce, ipu) [9]. Finally voting
access is granted to Cli by sending it (enc, nonce).
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 06 | Jun 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2585
Cli will choose the preferred candidate-id and encrypt it
using enc [10]. The cipher generated is vot and the pair (ipu,
vot, nonce) is sent to Hos.
Hos will verify nonce in its records, if it exists the
corresponding ipu is extracted from its records and the
entry is deleted [8]. Hos then proceeds to add (ipu, vot) as
key-value pair in vts [11]. Finally, Hos sends “success” to
Cli. If failure of any condition occurs, the Cli is greeted with
“failure”.
Fig -2: Voting sequence diagram
3.3 Voting Results
The respective election SC has certain methods with
public access, utilizing these methodsthelistof participating
voters can be fetched (showVoters).Foreachofthesevoters,
their respective votes can be fetched (showVote). The value
of dec if null results in displaying encrypted votes.
Thus, when Hos initializes dec equates to endingtheelection.
Interested parties may use dec to verify results of the
election, knowing the fact that data fetched or stored on the
blockchain is immutable and non-fungible.
Fig -3: Voting results sequence diagram
4. RESULTS AND DISCUSSION
RSA is mathematically easy to understand and implement
compared to other algorithms. Since RSA is relatively old
[12], it has withstood the test of time ever since and has
becomea defacto standardforasymmetric-keyencryptionin
modern times [12]. RSA is second only to ECC in terms of
efficiency and security [comparison between ECC, RSA]. Due
to lack of proper library or documentation for ECC based
encryption compared to ECC based signatures, RSA was a
much more enticing and suitable choice.
Chart -1: Key generation time of algorithms [13]
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 06 | Jun 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2586
Chart -2: Compromise tolerance [13]
Public Key Size Key Size
Ratio
Protection
from
Security
Bits
DSA RSA ECC ECC to
RSA/DSA
Attack
80 1024 1024 160-233 1:6 Until 2010
112 2048 2048 224-225 1:9 Until 2030
128 3072 3072 256-383 1:12 Beyond
2031
192 7680 7680 384-541 1:20
Table -2: Security comparison [13]
5. CONCLUSION
The evidence is quite clear, blockchain approach is the best
possible tool we have at present to resolvethechallengethat
is Online Electronic Voting System. Thepaperhopestostand
testament to this statement and provide ample evidence to
the efficacy of blockchain and a good starting point for
building much secure, scalable and efficient solutions.
Ethereum 2.0 brings about much more promise by
implementing proof-of-stake over the proof-of-work for
consensus, which could have energy savings of up to 99% [].
6. ACKNOWLEDGEMENT
Special thanks and gratitude to Prof. G Srinivasacharat Atria
Institute of Technology, who generously provided
constructive discussions on paper and helped us with
prototyping the application.
REFERENCES
[1] S.Nakamoto, “Bitcoin: A peer-to-peer electronic cash
system”, 2008.
[2] Vitalik Buterin, “Ethereum: A Next-Generation Smart
Contract and DecentralizedApplicationPlatform”,2014.
[3] Ralph Giles and Hannah Jones, “Proof of Stake - The
Environmental Impact”, 2022.
[4] Joseph Lubin, “meta-mask: trailblazing tool enabling
user interactions and experience on Web3.”, 2016
[5] Matthew Dangerfield,“web3js:TheEthereum JavaScript
API which connects to the Generic JSON-RPC spec.”,
2014
[6] Web3.js,
https://web3js.readthedocs.io/en/v1.7.4/web3-eth-
personal.html#sign, 2014.
[7] Web3.js,
https://web3js.readthedocs.io/en/v1.7.4/web3-eth-
personal.html#ecrecover, 2014.
[8] Changxia Sun, Xia Zeng, et al., “Research andApplication
of Data Exchange based on JSON”, 2020
[9] Phillip Rogaway, “Nonce-Based SymmetricEncryption”,
2004
[10] Mohit Gupta, “RSA Algorithm in Cryptography”, 2022
[11] Web3.js,
https://web3js.readthedocs.io/en/v1.7.4/web3-eth-
contract.html#web3-eth-contract, 2014.
[12] Shireen Nisha, Mohammed Farik, “RSA Public Key
Cryptography Algorithm – A Review”, 2017
[13] Parwinder Kaur Dhillon and Sheetal Kalra, “Elliptic
curve cryptography for real time embedded systems in
IoT networks”, 2016.

More Related Content

Similar to Blockchain Based Electronic Ballot System

Similar to Blockchain Based Electronic Ballot System (20)

IRJET- Survey on Blockchain based Digital Certificate System
IRJET- Survey on Blockchain based Digital Certificate SystemIRJET- Survey on Blockchain based Digital Certificate System
IRJET- Survey on Blockchain based Digital Certificate System
 
IRJET- Three Step Password Verification by using Random Key Order
IRJET- Three Step Password Verification by using Random Key OrderIRJET- Three Step Password Verification by using Random Key Order
IRJET- Three Step Password Verification by using Random Key Order
 
A Survey on Use of Blockchain Technology in Introducing Transparency in Charity
A Survey on Use of Blockchain Technology in Introducing Transparency in CharityA Survey on Use of Blockchain Technology in Introducing Transparency in Charity
A Survey on Use of Blockchain Technology in Introducing Transparency in Charity
 
REAL TIME POLLING SYSTEM
REAL TIME POLLING SYSTEMREAL TIME POLLING SYSTEM
REAL TIME POLLING SYSTEM
 
A dynamic data encryption method based on addressing the data importance on ...
A dynamic data encryption method based on addressing the  data importance on ...A dynamic data encryption method based on addressing the  data importance on ...
A dynamic data encryption method based on addressing the data importance on ...
 
Blockchain Based Online Voting System
Blockchain Based Online Voting SystemBlockchain Based Online Voting System
Blockchain Based Online Voting System
 
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET-  	  Revisiting Security Aspects of Internet of Things for Self-Managed...IRJET-  	  Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
 
IRJET- Blockchain based Certificate Issuing and Validation
IRJET-  	  Blockchain based Certificate Issuing and ValidationIRJET-  	  Blockchain based Certificate Issuing and Validation
IRJET- Blockchain based Certificate Issuing and Validation
 
IRJET- Preventing Fake Page from Blackhat’s In Mobile Web Browsers using ...
IRJET-  	  Preventing Fake Page from Blackhat’s In Mobile Web Browsers using ...IRJET-  	  Preventing Fake Page from Blackhat’s In Mobile Web Browsers using ...
IRJET- Preventing Fake Page from Blackhat’s In Mobile Web Browsers using ...
 
IRJET- Device Authentication Wireless Netework for Secured Communication
IRJET- Device Authentication Wireless Netework for Secured CommunicationIRJET- Device Authentication Wireless Netework for Secured Communication
IRJET- Device Authentication Wireless Netework for Secured Communication
 
IRJET- Secured Real Estate Transactions using Blockchain Technology
IRJET-  	  Secured Real Estate Transactions using Blockchain TechnologyIRJET-  	  Secured Real Estate Transactions using Blockchain Technology
IRJET- Secured Real Estate Transactions using Blockchain Technology
 
DECENTRALIZED BLOCKCHAIN SERVICES USING CARDANO NETWORK
DECENTRALIZED BLOCKCHAIN SERVICES USING CARDANO NETWORKDECENTRALIZED BLOCKCHAIN SERVICES USING CARDANO NETWORK
DECENTRALIZED BLOCKCHAIN SERVICES USING CARDANO NETWORK
 
IRJET- Data Security in Cloud Computing through AES under Drivehq
IRJET- Data Security in Cloud Computing through AES under DrivehqIRJET- Data Security in Cloud Computing through AES under Drivehq
IRJET- Data Security in Cloud Computing through AES under Drivehq
 
IRJET- Secure Kerberos System in Distributed Environment
IRJET- Secure Kerberos System in Distributed EnvironmentIRJET- Secure Kerberos System in Distributed Environment
IRJET- Secure Kerberos System in Distributed Environment
 
IRJET - Decentralized E-Voting System using Blockchain
IRJET - Decentralized E-Voting System using BlockchainIRJET - Decentralized E-Voting System using Blockchain
IRJET - Decentralized E-Voting System using Blockchain
 
Active Directory Golden Ticket Attack Detection
Active Directory Golden Ticket Attack DetectionActive Directory Golden Ticket Attack Detection
Active Directory Golden Ticket Attack Detection
 
IRJET- Efficient Geometric Range Search on RTREE Occupying Encrypted Spatial ...
IRJET- Efficient Geometric Range Search on RTREE Occupying Encrypted Spatial ...IRJET- Efficient Geometric Range Search on RTREE Occupying Encrypted Spatial ...
IRJET- Efficient Geometric Range Search on RTREE Occupying Encrypted Spatial ...
 
IRJET- Detection of Intrinsic Intrusion and Auspice System by Utilizing Data ...
IRJET- Detection of Intrinsic Intrusion and Auspice System by Utilizing Data ...IRJET- Detection of Intrinsic Intrusion and Auspice System by Utilizing Data ...
IRJET- Detection of Intrinsic Intrusion and Auspice System by Utilizing Data ...
 
Authentication system with Decentralized chat app
Authentication system with Decentralized chat appAuthentication system with Decentralized chat app
Authentication system with Decentralized chat app
 
IRJET- Consensus Mechanism on Secure Challenges in Blockchain Networks
IRJET-  	  Consensus Mechanism on Secure Challenges in Blockchain NetworksIRJET-  	  Consensus Mechanism on Secure Challenges in Blockchain Networks
IRJET- Consensus Mechanism on Secure Challenges in Blockchain Networks
 

More from IRJET Journal

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Final DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manualFinal DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manual
BalamuruganV28
 
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
drjose256
 
21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx
rahulmanepalli02
 
Seizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networksSeizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networks
IJECEIAES
 

Recently uploaded (20)

Interfacing Analog to Digital Data Converters ee3404.pdf
Interfacing Analog to Digital Data Converters ee3404.pdfInterfacing Analog to Digital Data Converters ee3404.pdf
Interfacing Analog to Digital Data Converters ee3404.pdf
 
Final DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manualFinal DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manual
 
Filters for Electromagnetic Compatibility Applications
Filters for Electromagnetic Compatibility ApplicationsFilters for Electromagnetic Compatibility Applications
Filters for Electromagnetic Compatibility Applications
 
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdflitvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
 
15-Minute City: A Completely New Horizon
15-Minute City: A Completely New Horizon15-Minute City: A Completely New Horizon
15-Minute City: A Completely New Horizon
 
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas SachpazisSeismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
 
Adsorption (mass transfer operations 2) ppt
Adsorption (mass transfer operations 2) pptAdsorption (mass transfer operations 2) ppt
Adsorption (mass transfer operations 2) ppt
 
Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...
 
CLOUD COMPUTING SERVICES - Cloud Reference Modal
CLOUD COMPUTING SERVICES - Cloud Reference ModalCLOUD COMPUTING SERVICES - Cloud Reference Modal
CLOUD COMPUTING SERVICES - Cloud Reference Modal
 
Independent Solar-Powered Electric Vehicle Charging Station
Independent Solar-Powered Electric Vehicle Charging StationIndependent Solar-Powered Electric Vehicle Charging Station
Independent Solar-Powered Electric Vehicle Charging Station
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
 
Software Engineering Practical File Front Pages.pdf
Software Engineering Practical File Front Pages.pdfSoftware Engineering Practical File Front Pages.pdf
Software Engineering Practical File Front Pages.pdf
 
Working Principle of Echo Sounder and Doppler Effect.pdf
Working Principle of Echo Sounder and Doppler Effect.pdfWorking Principle of Echo Sounder and Doppler Effect.pdf
Working Principle of Echo Sounder and Doppler Effect.pdf
 
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
 
5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...
 
Augmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxAugmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptx
 
21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx
 
Seizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networksSeizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networks
 
SLIDESHARE PPT-DECISION MAKING METHODS.pptx
SLIDESHARE PPT-DECISION MAKING METHODS.pptxSLIDESHARE PPT-DECISION MAKING METHODS.pptx
SLIDESHARE PPT-DECISION MAKING METHODS.pptx
 
History of Indian Railways - the story of Growth & Modernization
History of Indian Railways - the story of Growth & ModernizationHistory of Indian Railways - the story of Growth & Modernization
History of Indian Railways - the story of Growth & Modernization
 

Blockchain Based Electronic Ballot System

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 06 | Jun 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2583 Blockchain Based Electronic Ballot System Mohammed Sanaullah1, Tanmayi D2, Adhnan Manzis3, Adithi Mahesh4 1,2,3,4Atria Institute of Technology, Bengaluru, Karnataka, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract – Ever since the advent of the Internet, broadcasting one’s thoughtsandopinionsthroughoutthe world was made possible. This newfound power gaverise to a plethora of applications powered by the web; Skype, Gmail, YouTube are a few prominent examples. The Internet as we know it began itsevolution,beginningwith web of cognition (web1.0) followed by web of communication (web2.0) and now web3.0 the web of decentralization. The Ethereum blockchain broughtforth the idea of decentralized applications (DApps) andpaved way for zero-trust, peer-to-peer systems. Online voting, a controversial subject of discussion earlier could now see the light of day due to the web3.0 mindset. The paper provides an online alternative to the ballot. Key Words: Electronic Voting, Ethereum, Ganache, Cryptography,Blockchain,DecentralizedApplication,Voting, Anonymity, Elliptic Curve Cryptography, Hashing, Smart Contract, Proof-of-work, Security, Privacy, Transparency, End-to-end verifiable, Transactions. 1. INTRODUCTION Online voting is a popular yet controversial concept in the modern world. It decreases the cost of physical infrastructure and participation of voters increases because of the ease. It also allows people to vote from the comfort of one’s own home instead of travelling to voting booths and standing in the queues forlonghours.Althoughonlinevoting has many benefits, it is not widely adopted among people since a single vulnerability can lead to a large-scale manipulation of votes. Online voting system should be accurate, reliable, transparent, legitimate, and votes should be kept secret and immutable. Blockchain technology helps solve quite a few of the issues such as true decentralization, immutability, unanimous, consensus etc.,[1]Thus, wehavea viable reason to utilize the Ethereum blockchainasa reliable data store due to its support for RPCs along with features such as Smart-Contracts [2] and Proof-of-stakewhichmakes it much more sustainable [3]. By keeping the application software open source, trust of users can be upheld whilst any minor tweaks or bugs that may seep through the cracks can be identified and resolved by the populous. 1.1 Contribution The proposed system contains interaction between 4 major entities, namely:  Client  Server  Host  Blockchain The Database (DB) used for this system is relational in nature and contains the following tables:  User  Election  Candidate  Participate The smart-contract (SC) code is written in solidity using the Remix-ide and deployed on the Ganache blockchain. There exists a Class which consists of the following fields:  encryptionKey (private, string)  decryptionKey (private, string)  voterArray (public, array of addresses)  votes (public, dictionary (address, vote)) The methods of the Class are as follows:  setEncryptionKey (private)  setDecryptionKey (private)  castVote (private)  addVoter (private)  showEncryptionKey (public)  showDecryptionKey (public)  showVote (public)  showVoters (public) The “private”access-specifierensuresthatonlytheowner of thesmart-contractcanmodify/accesssuchfields,methods. 1.2 Organization The rest of the paper is organized as follows: In Section II, we have the terminologies and basic definitions related to the scheme are mentioned along with a symbol-definition table for quick reference. We have discussed our implementation in Section III. In the next Section IV, we’ve
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 06 | Jun 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2584 put the results and discussion of this system. Section V contains the conclusion of this system. Section VI wraps up the paper with the acknowledgment. 2. Terminologies The definition of symbols used in thispaperarementionedin the following table. Rivest, Shamir,Adlemanasymmetric-key encryption (RSA) will be used for encryption/decryption of votes. Table -1: Symbol Table Symbol Type Definition Ser Entity Server Cli Entity Client Hos Entity Host Blo Entity Blockchain USR Table User-Table-DB PAR Table Participate-Table-DB ELE Table Election-Table-DB uid String/Number Unique-ID ipu Address User-Public-Address ipr Address User-Private-Address eid String/Number Election-ID sig Variable Signature enc Variable RSA-Public-Key dec Variable RSA-Private-Key vot Variable Vote vts Dictionary votes-SC var Array voterArray-SC tok Random Integer Verification-Token 3. Procedures The following are the pre-requisites:  Every election has its own SC.  Meta-data of the respective SC must be stored in ELE.  The field enc of every activeelection’sSCmustbe initialized.  The candidates participating in an election must be stored in a different table with their references present inside ELE. 3.1 User Registration The Cli must first generatean Ethereum account(ipu,ipr)by using Meta-Mask [4], borrowfromGanacheorgenerateusing web3-library [5]. The next step begins with Clisending (uid, ipu) to the Ser, if ipu doesn’t exist in USR, (uid, ipu) is added to it. Else, the Ser throws an error to Cli stating that, “User already exists!”. Fig -1: User registration sequence diagram 3.2 Voting Cli first chooses an election and gets eid and its Hos. Cli signs uid with ipr to make sig [6] and sends (sig, uid) to the Hos. Hos extracts ipu from the pair [7] sent by Cli. Hos sends (ipu, eid) to Ser and waits for a response. Ser first verifies whether ipu is registered by looking up USR. If ipu is registered, then it checks PAR for (ipu, eid) pair’s existing. If the pair (ipu, eid) is unique and notexisting in PAR, Ser will add the pair (ipu, eid) to PAR and sends “success” to Hos. If any of the conditions fail, the Hos is greeted with “failed”. Hos upon receiving “success” from Ser will proceed with adding ipu to var [8]. Hos will generate a random integer called nonce and records it as (nonce, ipu) [9]. Finally voting access is granted to Cli by sending it (enc, nonce).
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 06 | Jun 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2585 Cli will choose the preferred candidate-id and encrypt it using enc [10]. The cipher generated is vot and the pair (ipu, vot, nonce) is sent to Hos. Hos will verify nonce in its records, if it exists the corresponding ipu is extracted from its records and the entry is deleted [8]. Hos then proceeds to add (ipu, vot) as key-value pair in vts [11]. Finally, Hos sends “success” to Cli. If failure of any condition occurs, the Cli is greeted with “failure”. Fig -2: Voting sequence diagram 3.3 Voting Results The respective election SC has certain methods with public access, utilizing these methodsthelistof participating voters can be fetched (showVoters).Foreachofthesevoters, their respective votes can be fetched (showVote). The value of dec if null results in displaying encrypted votes. Thus, when Hos initializes dec equates to endingtheelection. Interested parties may use dec to verify results of the election, knowing the fact that data fetched or stored on the blockchain is immutable and non-fungible. Fig -3: Voting results sequence diagram 4. RESULTS AND DISCUSSION RSA is mathematically easy to understand and implement compared to other algorithms. Since RSA is relatively old [12], it has withstood the test of time ever since and has becomea defacto standardforasymmetric-keyencryptionin modern times [12]. RSA is second only to ECC in terms of efficiency and security [comparison between ECC, RSA]. Due to lack of proper library or documentation for ECC based encryption compared to ECC based signatures, RSA was a much more enticing and suitable choice. Chart -1: Key generation time of algorithms [13]
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 06 | Jun 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2586 Chart -2: Compromise tolerance [13] Public Key Size Key Size Ratio Protection from Security Bits DSA RSA ECC ECC to RSA/DSA Attack 80 1024 1024 160-233 1:6 Until 2010 112 2048 2048 224-225 1:9 Until 2030 128 3072 3072 256-383 1:12 Beyond 2031 192 7680 7680 384-541 1:20 Table -2: Security comparison [13] 5. CONCLUSION The evidence is quite clear, blockchain approach is the best possible tool we have at present to resolvethechallengethat is Online Electronic Voting System. Thepaperhopestostand testament to this statement and provide ample evidence to the efficacy of blockchain and a good starting point for building much secure, scalable and efficient solutions. Ethereum 2.0 brings about much more promise by implementing proof-of-stake over the proof-of-work for consensus, which could have energy savings of up to 99% []. 6. ACKNOWLEDGEMENT Special thanks and gratitude to Prof. G Srinivasacharat Atria Institute of Technology, who generously provided constructive discussions on paper and helped us with prototyping the application. REFERENCES [1] S.Nakamoto, “Bitcoin: A peer-to-peer electronic cash system”, 2008. [2] Vitalik Buterin, “Ethereum: A Next-Generation Smart Contract and DecentralizedApplicationPlatform”,2014. [3] Ralph Giles and Hannah Jones, “Proof of Stake - The Environmental Impact”, 2022. [4] Joseph Lubin, “meta-mask: trailblazing tool enabling user interactions and experience on Web3.”, 2016 [5] Matthew Dangerfield,“web3js:TheEthereum JavaScript API which connects to the Generic JSON-RPC spec.”, 2014 [6] Web3.js, https://web3js.readthedocs.io/en/v1.7.4/web3-eth- personal.html#sign, 2014. [7] Web3.js, https://web3js.readthedocs.io/en/v1.7.4/web3-eth- personal.html#ecrecover, 2014. [8] Changxia Sun, Xia Zeng, et al., “Research andApplication of Data Exchange based on JSON”, 2020 [9] Phillip Rogaway, “Nonce-Based SymmetricEncryption”, 2004 [10] Mohit Gupta, “RSA Algorithm in Cryptography”, 2022 [11] Web3.js, https://web3js.readthedocs.io/en/v1.7.4/web3-eth- contract.html#web3-eth-contract, 2014. [12] Shireen Nisha, Mohammed Farik, “RSA Public Key Cryptography Algorithm – A Review”, 2017 [13] Parwinder Kaur Dhillon and Sheetal Kalra, “Elliptic curve cryptography for real time embedded systems in IoT networks”, 2016.