Blockchain-Based Electronic Voting Protocol

Clement Zheng Wei - University Tun Hussein Onn Malaysia, Johor, Malaysia
Chuah Wen - University Tun Hussein Onn Malaysia, Johor, Malaysia

Citation Format:



Current electronic voting protocol require a centralized system to control the whole procedure from ballot inputs to result outputs and election monitoring. Meanwhile, blockchain technology provide a decentralized system which open across the whole network of untrusted participants. Applying blockchain technology into electronic voting protocol through a proper architecture can instil characteristic such as data confidentiality, data integrity and data authenticity. In this paper, we going to discuss a proposed method on how to leverage the advantages from blockchain into electronic voting protocol. This blockchain-based electronic voting protocol promise to provide a secure electronic election process given the proposed system works. We implement a protocol using blockchain to turn election protocol into an automated control system without relying any single point of entity. Lastly, we discuss the characteristics of our proposed blockchain-based electronic voting protocol in this paper. However, there are also emerging challenges and limitations awaiting to overcome. This paper gives a comprehensive overview of our proposed protocol.


electronic voting; blockchain; blockchain e-voting; decentralized system

Full Text:



A.-G. Tsahkna, “E-voting: lessons from Estonia,” Eur. View, vol. 12, no. 1, pp. 59–66, 2013.

D. A. Gritzalis, “Principles and requirements for a secure e-voting system,” Comput. Secur., vol. 21, no. 6, pp. 539–556, 2002.

A. Al-Ameen and S. Talab, “The technical feasibility and security of E-Voting,” Int. Arab J. Inf. Technol., vol. 10, no. 4, 2013.

C. D. De Faveri, A. Moreira, J. Araújo, and V. Amaral, “Towards security modeling of E-voting systems,” in Proceedings - 2016 IEEE 24th International Requirements Engineering Conference Workshops, REW 2016, 2017, pp. 145–154.

A. Kiayias, M. Korman, and D. Walluck, “An internet voting system supporting user privacy,” in Proceedings - Annual Computer Security Applications Conference, ACSAC, 2006, pp. 165–174.

D. P. Moynihan, “Building secure elections: E-voting, security, and systems theory,” Public Administration Review, vol. 64, no. 5. pp. 515–528, 2004.

T. W. Lauer, “The Risk of e-Voting,” Electron. J. e-Government, vol. 2, no. April, pp. 177–186, 2004.

S. Nakamoto and B. Alice, “What is a blockchain ?,” Deloitte, pp. 4–7, 2016.

G. Zyskind, O. Nathan, and A. S. Pentland, “Decentralizing privacy: Using blockchain to protect personal data,” in Proceedings - 2015 IEEE Security and Privacy Workshops, SPW 2015, 2015, pp. 180–184.

A. Ben Ayed, “A Conceptual Secure Blockchain Based Electronic Voting System,” Int. J. Netw. Secur. Its Appl., vol. 9, no. 3, pp. 01–09, 2017.

G. Z. Qadah and R. Taha, “Electronic voting systems: Requirements, design, and implementation,” Comput. Stand. Interfaces, vol. 29, no.3, pp. 376–386, 2007.

M. Rudner, “The Malaysian General Election of 1969: A Political Analysis1,” Mod. Asian Stud., vol. 4, no. 1, pp. 1–21, 1970.

D. Springall et al., “Security Analysis of the Estonian Internet Voting System,” in Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security - CCS ’14, 2014, pp. 703–715.

J. A. Halderman and V. Teague, “The New South Wales iVote system: Security failures and verification flaws in a live online election,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2015, vol. 9269, pp. 35–53.

M. P. Evans and S. M. Furnell, “Internet-based security incidents and the potential for false alarms,” Internet Res., vol. 10, no. 3, pp. 238–245, 2000.

J. Hoffstein, J. Pipher, and J. H. Silverman, An Introduction to Cryptography, vol. XVI. 2008.

A. Lewis, “Blockchain Technology Explained,” Blockchain Technol., pp. 1–27, 2015.

M. Gupta, Blockchain for dummies. 2017.

M. Pilkington, “Blockchain Technology: Principles and Applications,” Res. Handb. Digit. Transform., pp. 1–39, 2015.

P. Standards, “The Digital Signature Standard (DSS),” Processing, pp. 1–119, 2009.

NIST., “FIPS 186-3: Digital Signature Standard (DSS),” 2009.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

JOIV : International Journal on Informatics Visualization
ISSN 2549-9610  (print) | 2549-9904 (online)
Organized by Department of Information Technology - Politeknik Negeri Padang, and Institute of Visual Informatics - UKM and Soft Computing and Data Mining Centre - UTHM
W :
E :,,

View JOIV Stats

Creative Commons License is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.