Computer Engineering

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 15

Marathwada Mitra Mandal Polytechnic

College Address 34/4/17, Sector No. 34, Pimpri Colony, Pimpri-chinchwad,


Maharashtra 411017

College Telephone
020-65106968
Number

College Phone
+91 96045 2818
Number

College web site http://mmpolytechnic.edu.in/index.php/contact-us

Principal/Director’s PROF. MRS. GEETA JOSHI, joshigs@mmplotechnic.com


Name, Email id, +91 7030198980
Contact Number

Computer Engineering
Academic year 2022-2023
BlockChain Technology
Sl. No Name of Participant Photo of Email id Mobile
Participant Number
1 Mahesh Raskar mahesh_2003
76@mmpolyte
chnic.com
2 Aishwarya Salgar aishwarya_200
376@mmpolyt
echnic.com

3 Shraddha Dhanwate shraddha_200


Name of Head of the Department: Vikas Solanke
376@mmpolyt
Email Id: solankevs@mmpolytechnic.com
Mobile Number: 020 9604528182 echnic.com

Department Name
Academic year 2022-2023
Paste Paste
Participant 2 Id Participant 3 Id
Card Scan Card Scan
copy copy

Computer Engineering
Academic year 2022-2023
Contents
• Introduction
• Related Work
• Literature Survey
• Gap Analysis
• Issues and Challenges
• Proposed Work
• Results and Discussion
• Conclusion
• References
Introduction
• Digital Voting System Using Blockchain Technology
• Voting System Election Frauds

• Solution:

Using blockchain, the voting process can be made


more secure, transparent, immutable, and reliable.
Blockchain Voting Works

• Explains How Blockchain Voting Works.


Related Work
• Data security
• Data management.
• Blockchain protocol
LITERATURE SURVEY
 First Paper has the same idea for system design he also suggests that there must be an
public, private key infrastructure, and the electoral commission (or another election
manager) generates a key-pair for the election (PE; SE) which later is used for
encrypting and decrypting messages of voters. Then, each voter needs to generate their
own key pair. (PV X; SV X) denote the key pair of voter X. This key pair is later used
for signing the message created by the voter herself.
 Second Paper has another idea Voters need to register their public key PV X to the
electoral commission for their voting eligibility using a designated valid ID. The
electoral commission then verifies each voter’s ID and registers the corresponding
public key PV X to a public list; or rejects it if the voter is not eligible. It is crucial that
each voter keeps their public key secret in this scheme and only sends it to the
governing body.
 Third Paper has another idea he has a plan to use 6 digit pin for voters that voter can
use for voter authentication, Each individual is identified and authenticated by the
system by presenting an electronic ID from Auokenni and the corresponding 6-digit
PIN in the voting booth. Without supervision, an individual could vote for multiple
people, if the individual had knowledge of the PIN for each corresponding electronic
ID he has.
Gap Analysis

• The ability to trust the vote tallying process


• Upon casting their vote successfully, a user is
provided with their unique transaction ID in
the form of a cryptographic hash.
• A user can use this transaction ID to track if
their vote was included in the tallying process.
Issues and Challenges

• Voting data security


• Voting data management
• Security and privacy challenges
• Regulations
Proposed Work
• The system has been designed to support a voting application in the real-
world environment taking into account specific requirements such as
privacy, receipt freeness and verifiability.
• The proposed system aims to achieve secure digital voting without
compromising its usability.
• The system is designed using a web-based interface to facilitate user
engagement with measures such as hash id printing to protect against
double voting.
• The cryptographic hash of the transaction (ID) is emailed to the voter as
proof that the vote has been cast which may, later on, be tracked.
Result and Discussion
• The cryptographic hash of the transaction (ID) is
emailed to the voter as a proof that the vote has
been casted which may later on be tracked .
• The proposed system aims to achieve secure digital
voting without compromising its usability.
• Voting data security
Conclusion
• In continuation of this work, we are focused at
improving the resistance of blockchain technology
To ‘double spending’ problem which will translate
as ‘double voting’ for e-voting systems
• The cryptographic hash of the transaction (ID) is
emailed to the voter as a proof that the vote has
been casted which may later on be tracked.
References
1.https://www.1kosmos.com/blockchain/decentralized-web
2. https://ieeexplore.ieee.org
3. https://www.researchgate.net
4. https://www.blockchain-council.org
5. https://101blockchains.com
Thank You

You might also like