Professional Documents
Culture Documents
An Exploratory Literature Study On Homomorphic Encryption in Electronic Voting Using Blockchain Technology
An Exploratory Literature Study On Homomorphic Encryption in Electronic Voting Using Blockchain Technology
ISSN No:-2456-2165
Abstract:-Over the years, there has been a increase in Adding Two Ciphers in a Homomorphic
the usage of distributed ledger technology (DLT), such as Manner:
blockchain. In the storage and sharing of personal Given two cipher c1= Encryption(Key,
information, privacy is a fundamental concern. plaintext1) and c2 = Encryption(Key, plaintext2) for
Homomorphic en- cryption is a method of securely two plain texts p1 and p2, addition = c1 (A) c2 =
sending and storing private data between and inside Encryption(Key, p1+p2).
computer systems. Homomorphic encryption has
emerged as a potential solution , in which a client’s data Adding Cipher and Plain texts in a
is encrypted in such a way that some search and Homomorphic Manner:
manipulation operations can be performed without the Given two cipher c1=Encryption(Key,
need for proper decryption . A lot of researchers have plaintext1) and a plain text p1, addition = c1 (A)
been working or trying to identify real-life usecases of c2=Encryption(Key, p1+p2).
Blockchain technology since peo- ple discovered its
potential in several fields . As a consequence of this Multiplication of Two Ciphers in a
study, it was discovered that blockchain systems can help Homomorphic Manner:
solve some of the issues that now plague election systems Given two cipher c1 = Encryption(Key,
. In this study, we give a thorough survey of plaintext1) and c2 = Encryption(Key, plaintext2) for
homomorphic encryption research papers or research two plain texts p1 and p2, addition = c1 (M) c2 =
articles that have been published in the blockchain based Encryption(Key, p1 × p2).
e-voting . The primary purpose of this exploratory
research article is to assess the current state of Multiplication of Cipher and Plain Texts in a
blockchain-based voting research, as well as associated Homomorphic Manner:
possible roadblocks , in order to forecast future trends. Given two cipher c1 = Encryption(Key,
plaintext1) and a plain text p1, multi- plication=c1
Keywords:- Blockchain; E-voting system; Encryption; (M) c2 = Encryption(Key, p1 × p2).
Homomorphic Encryption; Privacy.
Blockchain technology has developed vastly in the
I. INTRODUCTION past years. Blockchain tech- nology has continued to
evolve, expanding its scope to include a wide range of
Homomorphic encryption is a technique or a method applications and exceeding even its developers’ hopes.
of encrypting text which allows for arbitrary calculations It’s capable of generating trustworthy transactions
and returns the output in encrypted form . Homomorphic amongst parties who don’t trust one other. The use of
encryption methods have a particular trait called cryptographic algorithms in blockchain has increased the
homomorphic evaluation and can be asymmetric or data’s security.These are bundled or packed together as
symmetric key encryption techniques . It includes blocks and this is the reason they tamper- proof.
functions for evaluation , decryption , encryption and key
generation [26].
Consortium Blockchain:
A consortium blockchain (e.g., the HyperLedger)
is the one in which the consensus procedure or process
Fig 2 Graph Representing Year-Wise Trend which is based on pre- selected grouping of nodes.
Public Blockchain :
Public blockchain (such as Ethereum or Bitcoin)
is one that anyone can submit the transations,read the
transactions and to check if the added blocks are genuine.
Public blockchain are completely transparent ledger in
nature.
Private Blockchain:
In all key attributes, a private type of or catergory
of blockchain is the opposite of a public type of or
catergory blockchain, where the rights to write are kept
centralised to one organisation and the read rights can
be restricted or public to an arbitrary extent. Finally,
the term ”private blockchain” refers to anything that
isn’t totally public. It allows you a lot of flexibility in
terms of governance and management.
Fig 3 Top Five Countries in on the Blockchain based E-voting has a number of advantages over
Electronic Voting System that Published Articles and
traditional voting systems, including reduced human
Proceedings
error, lower operating costs, and speedier results.
Furthermore, due to the accessibility of the elderly and
The contribution to the number of articles and the reticent adolescents, online voting developments are
research done in this domain of block-chain e-voting improving voter engagement. Furthermore, voters who
published by China and India are remarkable. So, this
live abroad or in other countries are permitted to vote
can be considered as the new blooming era in the field of more freely. Furthermore, voters who live abroad or in
Blockchain based secure e-Voting.
other countries are permitted to vote more freely. E-
voting systems, on the other hand, have the potential to
Background vulnerabilities like software, hardware and infrastructure
A P2P(peer-to-peer) network’s nodes maintain a [75]. Furthermore,practically all election systems have
blockchain. The blockchain’s basic structure might be
the possibility for insider assaults.
divided into three levels: databases,the underlying
P2P(peer-to-peer) network,and various applications. The The following are the most critical features of an ideal
P2P(peer-to-peer) network is in-charge of ensuring that electronic voting sys- tem:
blockchain nodes can easily communi- cate with one
another, despite the fact that they are geographically
Accuracy:
scattered and yet equally privileged participants in the
The electronic voting system should be capable of
application. In a P2P network, there is no centralised
accurately count- ing and recording each ballot.[41]
server, and each node is both an information consumer
and a source of information.The P2P network’s ”flat”
topology is a crucial foun- dation of the blockchain’s Nonrepeatability :
decentralized characteristic [34]. The main objective of A voter can caste only one vote.[31]
blockchain is to send messages consistently and securely
between account addresses. The global ledger is in
charge of this. The account address which is an non-
Sybil Attacks:
It is a cyber assault wherein an attacker subverts a
P2P net- work’s recognition machine with the aid of
producing a large wide variety of pseudonymous
identities and making use of them to attain an unfair Fig 4 Graph Informing the Increase in Bitcoin
advantage. In phrases of blockchain de-anonymization, Transactions (10 years).
Sybil assaults may want to harm or block decentralised Source : Blockgeeks.com
Literature Survey
Its uses are introduced first, followed by information [6]. Elham Akbari, Qing Wu, Wenbing Zhao,
on current e-voting sys- tems using the homomorphic Hamid R Arabnia, and Mary Qu Yang. From
encryption scheme. The inadequacies in present e-voting blockchain to internet-based voting. In 2017
systems are then highlighted and examined, as well as the International Con- ference on Computational
potential of the blockchain idea to improve e-voting, Science and Computational Intelligence (CSCI),
current solutions for blockchain-based e-voting, and pages 218–221. IEEE, 2017.
prospective research paths on blockchain-based e-voting [7]. Basharat Ali, Fawad Iqbal, Irshad Hussain, and
systems. Muhammad Younas. An efficient e-voting
algorithm and dapp using blockchain technology.
At the end, considering the scope of the [8]. Syada Tasmia Alvi, Mohammed Nasir Uddin,
blockchain based e-voting systems, it is necessary to Linta Islam, and Sajib Ahamed. Classification
transition to this type of system but slowly and keeping in of blockchain based voting: Challenges and so-
mind the scalability issues and the security issues. There lutions. In 2020 IEEE Asia-Pacific Conference
is still more to be achieved in this domain. It is a long on Computer Science and Data Engineering
way to come for the governments as well as the (CSDE), pages 1–6. IEEE, 2020.
developers and the researchers to look into the [9]. Ch Anwar ul Hassan, Muhammad Hammad,
shortcommings of the system. Jawaid Iqbal, Saddam Hus- sain, Syed Sajid
Ullah, Hussain AlSalman, Mogeeb AA Mosleh,
REFERENCES and Muhammad Arif. A liquid democracy enabled
blockchain-based electronic voting system.
[1]. Nurul Hanis Abd Rasid. Blockchain technology Scientific Programming, 2022, 2022.
in e-voting: Comparative study. [10]. Neha S Aswale, Manasi S Mali, Shraddha S
[2]. Jacob Abegunde. Adeva: A decentralized Irale, Saakshi S Dhoka, Tan- ishqua H Mudaliar,
electronic voting application using blockchain Gurunath G Machhale, and Rahul G Sonkamble.
technology. 2022. Privacy preserved e-voting system using
[3]. Taiwo Adekeye. Securing the electoral e-voting blockchain. Available at SSRN 3852951, 2021.
system using blockchain technology. [11]. Ankita Bansal, Abha Jain, and Pardeep Kumar.
[4]. Yasser Asrul Ahmad, Muhammad Fadhil Ensuring security of digi- tal voting through
Shaharuddin, Teddy Surya Gu- nawan, and blockchain technology. In A Fusion of Artificial
Fatchul Arifin. Implementation of an e-voting Intelli- gence and Internet of Things for Emerging
prototype using ethereum blockchain in ganache Cyber Systems, pages 317–331. Springer, 2022.
network. In 2022 IEEE 18th International [12]. Albin Benny. Blockchain based e-voting
Colloquium on Signal Processing & system. Available at SSRN 3648870, 2020.
Applications (CSPA), pages 111–115. IEEE, [13]. LC Bollinger and MA McRobbie. Ensuring the
2022. integrity of elections. Se- curing the Vote:
[5]. Lukman Adewale Ajao, Buhari Ugbede Umar, Protecting American Democracy; National
Daniel Oluwaseun Olajide, and Sanjay Misra. Academies of Sciences: Washington, DC, USA,
Application of crypto-blockchain technology for pages 103–105, 2018.
securing electronic voting systems. In [14]. Vanessa Bracamonte, Shigeichiro Yamasaki, and
Blockchain Applications in the Smart Era, pages Hitoshi Okada. A dis- cussion of issues related to
85–105. Springer, 2022. electronic voting systems based on blockchain
technology. 2016.