Download as pdf or txt
Download as pdf or txt
You are on page 1of 7

Journal of Computer Science Engineering and Software Testing

e-ISSN: 2581-6969
Volume 5 Issue 3

Blockchain Based E-Voting System for India Using UIDAI’s


Aadhaar
Spurthi Anjan*1, Johnson P Sequeira2
1
Assistant Professor, Department of Computer Science and Engineering, PES University, Bengaluru,
Karnataka, India
2
Founder, PawsNYou International B.V., Bengaluru, Karnataka, India
Email: *spurtianjan16@gmail.com
DOI:

Abstract
With the current rise in the demand and usage of the blockchain technology for a variety of
purposes, ranging from finance, medical, identification amongst others, major focus has been
dedicated towards its legal implications rather than leveraging on the practical applications
in administration. In this paper, we discuss the concepts of blockchain and how it can be
implemented as an efficient solution towards public voting while aiming to destroy the
disadvantages of the current voting system in India, at the same time providing a better, more
reliable, secure and transparent means of public governance. We also aim to provide an
exemplified voting solution for India with the integration of the current Aadhaar
identification system as implemented by UIDAI.

Keywords: Aadhaar, blockchain, blockchain voting, decentralized, distributed ledger, e-


voting, uidai

INTRODUCTION Apart from this, other issues concerning


Voting in India has always been a topic of the current voting system in India include,
high controversy, whether with the initial amongst the least, lack of transparency,
“Balloting System”, implemented in the fake voter IDs, prone to political
1951−52 General Elections or the recent manipulation in remote locations, as well
“Electronic Voting Machines”, as delay in the result declaration. All these
implemented extensively since 1998. [1] identified issues can be well resolved by
In the balloting system, a voter casts their replacing any current voting option with a
vote on a pre-printed ballot paper, in the blockchain based electronic-voting system
presence of an appointed voting official which operates on a user level capturing
and the cumulative votes are captured in a
the votes on a distributed interface
physical box and transported to a
centralized vote counting location. The (web/mobile).
issues with this system as evident enough
were mitigated by replacing them with an Blockchain technologies are often
electronic voting system where votes are implemented where there is a need for
captured on an electronic balloting unit transparency or a decentralized
and transported across to a centralized authentication/identification of entities,
location for calculation using the control whether currency, intellectual property or
unit. Votes cast on an EVM are assumed to otherwise. This encrypted, decentralized
be tamperproof to a great extent. However, and agile strategy for data storing lead by a
the other obvious issues with this system government blockchain record will result
were the reliance on an authority for the in a progressively responsive and easy to
purpose of monitoring the voting process use administrative cooperation. In this
as well as allegations of influence by paper, we aim to establish the efficiency of
political parties to support their cause. a blockchain based digital voting system

26 Page 26-32 © MAT Journals 2019. All Rights Reserved


Journal of Computer Science Engineering and Software Testing
e-ISSN: 2581-6969
Volume 5 Issue 3

with higher security and complete case-study with a blockchain secured


transparency integrated with UIDAI’s voting system targeting proof-of-work to
Aadhaar identification system. The replace the issue of multiple voting, which
purpose of integrating UIDAI’s Aadhaar is similar to “double spending” in Bitcoin.
with the Voter ID of citizen is to mitigate [7] With the help of unique, anonymous
the duplicate/fake voter ID issues evident Bitcoin addresses, this system ensures the
in our current infrastructure. voting is completely transparent, while
being authenticated using the U.S. based
LITERATURE SURVEY social security number. They have also
Earlier noted versions of an electronic created a proof-of-concept on a shared
system of voting have been attributed to instance which can be accessible as a web
David Chaum, who created a system with application [7].
a public key cryptography for the purpose
of vote casting, while keeping the voters Other notable electronic/digital voting
anonymous, with the use of the Blind systems include the Estonian internet
Signature Theorem. [2] Post which a lot of voting system [8].
research has been conducted with other
methods of electronic voting systems. The system was setup using the Estonian
[3−6] national identification card, which was
used to generate a SHA1/SHA2 signature,
Kaspersky Labs has conducted their own as a private key (Fig. 1).

Figure 1: Vote casting process in the i-voting system [8].

27 Page 26-32 © MAT Journals 2019. All Rights Reserved


Journal of Computer Science Engineering and Software Testing
e-ISSN: 2581-6969
Volume 5 Issue 3

Along with the election’s public key, this of the informal capitals of the blockchain
was used to encrypt the vote and send to a industry.
private server hosted with the government.
One key feature of the same was that WHAT IS BLOCKCHAIN?
voters were allowed to vote multiple times, A blockchain is a distributed leger of data
while only the last vote was considered to gathered through a system that sits over
be valid [9]. the web. It is the means by which this data
is recorded that gives blockchain its
While a few nations and urban weighty potential. Blockchain, by itself,
communities effectively seek after various isn't an organization, nor is it an
implementations of blockchain to address application, yet rather a completely
their administration issues, a chosen few different approach for archiving
are wagering on blockchain for a information on the web by means of a
decentralized government. For instance, distributed ledger. It can be utilized to
the princely state of Dubai is already create applications, for example, for the
planning to exchange their whole purpose of authentication, identification,
legislative foundation and economy to a social networks, messaging, financials
blockchain based system, consequently management, security, and on the basic
making this United Arab Emirates city one level for other ledger-based
implementations (Fig. 2).

Figure 2: Hashing of previous block in a blockchain.

The data recorded on a block in the link the current block with the previous block
blockchain can take any form and a block by means of hashing. Hashing takes an input
can be used to store a transaction, entry or string of varying length to output a
any other chunk of data. cryptographic string of fixed length, by
means of a mathematical algorithm (SHA,
HOW DOES IT WORK? AES, etc.) This generated hash is then used as
Blockchain works by means of creating an identifier in the next block of the
blocks of data with a particular identifier, to blockchain, linking it to the previous block.

Figure 3: Hashing process.

28 Page 26-32 © MAT Journals 2019. All Rights Reserved


Journal of Computer Science Engineering and Software Testing
e-ISSN: 2581-6969
Volume 5 Issue 3

Hashed data can never be traversed in the hash for the next block as well as the
opposite direction, nor can it be decoded encryption of the user’s identifiable data.
(Fig. 3). Also, the hash for a specific input The entire system rests on a standalone
will always remain the same, over any blockchain powered by cloud
number of iterations. infrastructure. The proof-of-concept
protocol is used for consensus of the
ARCHITECTURE blockchain.
In our model, we use the UIDAI’s
Aadhaar, which is a unique ID generated METHODOLOGY
for every registered citizen of India, as a Voting UI (Web / Mobile App)
private key, along with the public key The voting UI will be designed to allow
assigned to an election, to generate a the user to authenticate themselves using
digital signature for the purpose of voting. their unique Aadhaar ID and then selecting
This along with the vote of the individual, the election for which they wish to cast
is then used to generate a hash used to their vote. Once the user selects the
reserve / block the vote for that particular election, they can cast their vote for the
individual. The voting mechanism will desired candidate. The vote along with the
take place over a government authorized Aadhaar ID (as a private key), will be used
portal (web/mobile) and the votes are to generated a digital signature sent across
captured on a tamperproof instance to the blockchain to create a new block.
available openly for the public to verify This UI will be designed keeping in mind
and validate. the accessibility options for the disabled
SHA-256 algorithm is used to generate the (Fig. 4).

Figure 4: System architecture.

Accessing Aadhaar API election. Standard Aadhaar


The UIDAI’s Aadhaar API will be authentication using OTP/biometrics as
accessed using a standalone API from available within the voting UI will be
the voting UI validating the current user used to authenticate the user (Fig. 5)
as a valid / invalid voter for the given [10].

29 Page 26-32 © MAT Journals 2019. All Rights Reserved


Journal of Computer Science Engineering and Software Testing
e-ISSN: 2581-6969
Volume 5 Issue 3

Figure 5: Mock UIDAI database used.

The Aadhaar API will validate the user including their name, address, photograph
and return the basic information of the user and validity for voting (Fig. 6).

Figure 6: Validate voter API endpoint.

30 Page 26-32 © MAT Journals 2019. All Rights Reserved


Journal of Computer Science Engineering and Software Testing
e-ISSN: 2581-6969
Volume 5 Issue 3

E-voting Blockchain advanced alternatives. At the same time


The blockchain will be setup on a ensuring that our efforts are applied in the
standalone instance available publicly for direction of added user flexibility, security
validating the vote count as well as adding and complete transparency. This model of
votes. electronic voting system ensures the same
while adding further benefits of instant
For the purpose of adding the vote, a electoral count, transparent and open-
private function add Vote is called from source voting platforms, while also
the Voting UI. The function creates a new providing the user the flexibility to vote
block with the supplied data, and with a from their convenience. The Election
SHA256 generated hash of the user’s data commission of India reportedly spent INR
in the current block and the SHA256 35000 crores in polling for the 2014 Lok
generated hash of the previous block in the Sabha Elections [11]. A major chunk of
header of the current block. This this amount is spent in arranging and setup
completed block is then verified and added of the voting booths across all locations in
to the chain. Since the hashing process is a the country. With a digital implementation
one-way transaction, no one will be able to of the voting system, a huge amount of the
reverse it. This will ensure that there is no taxpayer’s money can be saved, which can
way the user’s identity is revealed, then be utilized for other welfare projects.
although the vote count is available
publicly. For the purpose of vote count, a REFERENCES
private function display Vote Count can be 1. Election Commission of India,
called from the voting UI or from any https://eci.gov.in/.
authorized implementation of this publicly 2. DL Chaum (1981), “Untraceable
available endpoint. The function returns of Electronic Mail, Return Addresses, and
the full details of vote count along with Digital Pseudonyms”, Communication
party wise breakdown and can be further of the ACM, Volume 24, Issue 2.
modified to provide location wise 3. T ElGamal (1985), “A public Key
breakdown as well. Cryptosystem and a Signature Scheme
Based on Discrete Logarithms”, IEEE
Since blockchain works on a broadcast Trans. Info. Theory, Volume 31.
mechanism, as opposed to traditional 4. S Ibrahim, M Kamat, M Salleh, SR A,
databases, the authenticity of votes Aziz (14−15 January, 2003), “Secure E-
captured is always ensured. As long as a Voting with Blind Signature”,
particular block is valid, it is authentic. Proceeding of the 4th National
Additionally, instead of being a Conference of Communication
completely decentralized blockchain Technology, Johor, Malaysia.
voting platform, this model incorporates 5. J Jan, Y Chen, Y Lin (16−19 October,
the advantages of blockchain by having 2001), “The Design of Protocol for e-
the nodes authenticate using a centralized Voting on the Internet”, Proceedings
permission (private key) for every node IEEE 35th Annual 2001 International
and then approving the addition of the Carnahan Conference on Security
block to the chain. Technology, London, England.
6. DL Dill, AD Rubin (2004), “E-Voting
CONCLUSION Security”, Security and Privacy
At the current rate of development our Magazine, Volume 2, Issue 1.
country is going through, it is imperative 7. Kaspersky, Eugene (2016), “Cyber
that traditional methods of administration Security Case Study Competition-
must be replaced with newer more Kaspersky”, The Economist, Volume

31 Page 26-32 © MAT Journals 2019. All Rights Reserved


Journal of Computer Science Engineering and Software Testing
e-ISSN: 2581-6969
Volume 5 Issue 3

15, Accessed on December 14. 2016. pdates/aadh


http://www.economist.com/sites/default/ aar_authentication_api_2_0.pdf.
files/drexel.pdf. 11 Bloomberg, “Why India’s election is
8 D Springall, T Finkenauer, Z among the world’s most expensive”,
Durumeric, J Kitcat, H Hursti, M The Economic Times, Accessed on Apr
MacAlpine, JA Halderman (2014), 7 2019, Available From
“Security Analysis of the Estonian https://economictimes.indiatimes.com/n
Internet Voting System”, Proceedings ews/elections /lok-sabha/india/why-
of the 2014 ACM SIGSAC Conference indias-election-is-among-the-worlds-
on Computer and Communications most-
Security. expensive/articleshow/68367262.cms.
9 Trueb Baltic, “Estonian Electronic ID –
Card Application Specification Cite this article as:
Prerequisites to the Smart Card
Differentiation to previous Version of
EstEID Card Application”, Available
From http://www.id.ee/public/TBSPEC-
EstEID-Chip-App-v3_5-20140327.pdf.
10 UIDAI Aadhaar API, Available From
https://uidai.gov.in/images/FrontPageU

32 Page 26-32 © MAT Journals 2019. All Rights Reserved

You might also like