{"title":"Improving the End-to-End Protection in E-Voting Using BVM—Blockchain-Based E-Voting Mechanism","authors":"Sweta Gupta, Kamlesh Kumar Gupta, Piyush Kumar Shukla","doi":"10.1002/cpe.8324","DOIUrl":null,"url":null,"abstract":"<div>\n \n <p>Voting has always been a crucial topic of public attention for democratic reasons. The ease of use and low cost are the result of e-voting being frequently used for such important decision outcomes. However, the tremendous authority and intervening data in current e-voting systems make it risky and difficult to achieve correct equity and clarity in e-voting. So, by combining e-voting with blockchain technology, these issues can be resolved while providing reorganization and intervention-resistant characteristics. A voter's improper manipulation, frequent voting, or non-party voting, may also undermine fairness. A verifier is therefore required to check the e-voting mechanism in order to ensure its effectiveness and control the process equality and fairness. In this paper, a Blockchain-based e-Voting Mechanism (BVM) is developed for providing the end to end security and fairness for transparent voting. This mechanism also provides a zero-knowledge proof (ZP) based verifier to inspect the voting procedure against voter's mis-operations and uses a novel Improved Master-key Administration (IMA) based public key cryptography to attack prevention. The utilization of blockchain technology ensures transparency, anonymity, confidentiality, authentication, tamper resistance, and a high level of data integrity, making it a promising choice for modernizing and enhancing the electoral process. Also, the performance of BVM has been compared with similar voting mechanisms and analyzed based on time complexity, security analysis, performance factors like delay and throughput, and anti-attack examination.</p>\n </div>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"37 2","pages":""},"PeriodicalIF":1.5000,"publicationDate":"2024-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Concurrency and Computation-Practice & Experience","FirstCategoryId":"94","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1002/cpe.8324","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, SOFTWARE ENGINEERING","Score":null,"Total":0}
引用次数: 0
Abstract
Voting has always been a crucial topic of public attention for democratic reasons. The ease of use and low cost are the result of e-voting being frequently used for such important decision outcomes. However, the tremendous authority and intervening data in current e-voting systems make it risky and difficult to achieve correct equity and clarity in e-voting. So, by combining e-voting with blockchain technology, these issues can be resolved while providing reorganization and intervention-resistant characteristics. A voter's improper manipulation, frequent voting, or non-party voting, may also undermine fairness. A verifier is therefore required to check the e-voting mechanism in order to ensure its effectiveness and control the process equality and fairness. In this paper, a Blockchain-based e-Voting Mechanism (BVM) is developed for providing the end to end security and fairness for transparent voting. This mechanism also provides a zero-knowledge proof (ZP) based verifier to inspect the voting procedure against voter's mis-operations and uses a novel Improved Master-key Administration (IMA) based public key cryptography to attack prevention. The utilization of blockchain technology ensures transparency, anonymity, confidentiality, authentication, tamper resistance, and a high level of data integrity, making it a promising choice for modernizing and enhancing the electoral process. Also, the performance of BVM has been compared with similar voting mechanisms and analyzed based on time complexity, security analysis, performance factors like delay and throughput, and anti-attack examination.
期刊介绍:
Concurrency and Computation: Practice and Experience (CCPE) publishes high-quality, original research papers, and authoritative research review papers, in the overlapping fields of:
Parallel and distributed computing;
High-performance computing;
Computational and data science;
Artificial intelligence and machine learning;
Big data applications, algorithms, and systems;
Network science;
Ontologies and semantics;
Security and privacy;
Cloud/edge/fog computing;
Green computing; and
Quantum computing.