Abstract
Since the issue of using e-voting in both corporate and government voting has not yet been fully resolved, there remains a wide scope for improving existing approaches and proposing new protocols enabling the voting system to be resistant to various kinds of attacks. Due to the rapid development of distributed ledger technologies and their potential for solving existing problems we propose a modified protocol of the published earlier voting scheme which is complemented by blockchain technology to increase trust between participants. This approach allows carrying out combined voting of both traditional paper voting and e-voting. In this paper we describe the architecture of our solution, discuss its implementation based on Hyperledger Fabric platform and demonstrate its functionality.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Madise, U., Martens, T.: E-voting in Estonia 2005. The first practice of country-wide binding internet voting in the world. In: Krimmer, R. (ed.): Electronic Voting 2006: 2nd International Workshop, Co-organized by Council of Europe, ESF TED, IFIP WG 8.6 and E-Voting.CC, August, 2nd - 4th, 2006 in Castle Hofen, Bregenz, Austria. LNI., GI, vol. 86, pp. 15–26 (2006)
Brightwell, I., Cucurull, J., Galindo, D., Guasch, S.: An overview of the ivote 2015 voting system (2015)
Springall, D., et al.: Security analysis of the estonian internet voting system. In: Ahn, G., Yung, M., Li, N. (eds.) Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3–7, 2014, pp. 703–715. ACM (2014)
Halderman, J.A., Teague, V.: The new south wales ivote system: security failures and verification flaws in a live online election. In: Haenni, R., Koenig, R.E., Wikström, D. (eds.) VOTELID 2015. LNCS, vol. 9269, pp. 35–53. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-22270-7_3
Schneier, B.: Applied Cryptography - Protocols, Algorithms, and Source Code in C, 2nd edn. Wiley, New York (1996)
Sheer, H., Freya, G., Apostolos, A., Raja, N., Markantonakis, K.: E-Voting with blockchain: an E-voting protocol with decentralisation and voter privacy (2018)
Hjálmarsson, F., Hrei\(\eth \)arsson, G., Hamdaqa, M., Hjálmtýsson, G.: Blockchain-based e-voting system. In: 11th International Conference on Cloud Computing (CLOUD), San Francisco, CA, 2018, pp. 983–986. IEEE (2018). https://doi.org/10.1109/CLOUD.2018.00151
Koç, A.K., Yavuz, E., Çabuk, U.C., Dalkılıç, G.: Towards Secure e-voting using ethereum blockchain. In: 6th International Symposium on Digital Forensic and Security (ISDFS), Antalya, 22–25 March 2018. https://doi.org/10.1109/ISDFS.2018.8355340
Liu, Y., Wang, Q.: An E-voting Protocol Based on Blockchain. IACR Cryptology ePrint Archive (2017)
Yu, B., Liu, J.K., Sakzad, A., Nepal, S., Steinfeld, R., Rimba, P., Au, M.H.: Platform-independent secure blockchain-based voting system. In: Chen, L., Manulis, M., Schneider, S. (eds.) ISC 2018. LNCS, vol. 11060, pp. 369–386. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-99136-8_20
Chaum, D.: Blind signatures for untraceable payments. In: Chaum, D., Rivest, R.L., Sherman, A.T. (eds.) Advances in Cryptology, pp. 199–203. Springer, Boston (1983). https://doi.org/10.1007/978-1-4757-0602-4_18
Chaum, D.: Security without identification: transaction systems to make big brother obsolete. Commun. ACM 28, 1030–1044 (1985)
Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21, 120–126 (1978). https://doi.org/10.1145/357980.358017
Blakley, G.R., Chaum, D. (eds.): CRYPTO 1984. LNCS, vol. 196. Springer, Heidelberg (1985). https://doi.org/10.1007/3-540-39568-7
Camenisch, J., Lysyanskaya, A.: Signature schemes and anonymous credentials from bilinear maps. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 56–72. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-28628-8_4
Au, M.H., Susilo, W., Mu, Y.: Constant-size dynamic k-TAA. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, vol. 4116, pp. 111–125. Springer, Heidelberg (2006). https://doi.org/10.1007/11832072_8
Camenisch, J., Drijvers, M., Lehmann, A.: Anonymous Attestation Using the Strong Diffie Hellman Assumption Revisited. Cryptology ePrint Archive, IACR (2016)
He, Q., Su, Z.: A new practical secure e-voting scheme. In: 14th International Information Security Conference (SEC 1998), IFIP/SEC (1998)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Kirillov, D., Korkhov, V., Petrunin, V., Makarov, M., Khamitov, I.M., Dostov, V. (2019). Implementation of an E-Voting Scheme Using Hyperledger Fabric Permissioned Blockchain. In: Misra, S., et al. Computational Science and Its Applications – ICCSA 2019. ICCSA 2019. Lecture Notes in Computer Science(), vol 11620. Springer, Cham. https://doi.org/10.1007/978-3-030-24296-1_40
Download citation
DOI: https://doi.org/10.1007/978-3-030-24296-1_40
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-24295-4
Online ISBN: 978-3-030-24296-1
eBook Packages: Computer ScienceComputer Science (R0)