• Home
  • Submit Paper
  • Check Paper Status
  • Download Certificate/Paper
  • FAQs
  • Feedback
  • Contact Us
Email: ijraset@gmail.com
IJRASET Logo
Journal Statistics & Approval Details
Recent Published Paper
Our Author's Feedback
 •  ISRA Impact Factor 7.894       •  SJIF Impact Factor: 7.538       •  Hard Copy of Certificates to All Authors       •  DOI by Crossref for all Published Papers       •  Soft Copy of Certificates- Within 04 Hours       •  Authors helpline No: +91-8813907089(Whatsapp)       •  No Publication Fee for Paper Submission       •  Hard Copy of Certificates to all Authors       •  UGC Approved Journal: IJRASET- Click here to Check     
  • About Us
    • About Us
    • Aim & Scope
  • Editorial Board
  • Impact Factor
  • Call For Papers
    • Submit Paper Online
    • Current Issue
    • Special Issue
  • For Authors
    • Instructions for Authors
    • Submit Paper
    • Download Certificates
    • Check Paper Status
    • Paper Format
    • Copyright Form
    • Membership
    • Peer Review
  • Past Issue
    • Monthly Issue
    • Special Issue
  • Pay Fee
    • Indian Authors
    • International Authors
  • Topics
ISSN: 2321-9653
Estd : 2013
IJRASET - Logo
  • Home
  • About Us
    • About Us
    • Aim & Scope
  • Editorial Board
  • Impact Factor
  • Call For Papers
    • Submit Paper Online
    • Current Issue
    • Special Issue
  • For Authors
    • Instructions for Authors
    • Submit Paper
    • Download Certificates
    • Check Paper Status
    • Paper Format
    • Copyright Form
    • Membership
    • Peer Review
  • Past Issue
    • Monthly Issue
    • Special Issue
  • Pay Fee
    • Indian Authors
    • International Authors
  • Topics

Ijraset Journal For Research in Applied Science and Engineering Technology

  • Home / Ijraset
  • On This Page
  • Abstract
  • Introduction
  • Conclusion
  • References
  • Copyright

E-voting System Using Block-Chain

Authors: Yutesh Mohadikar, Sumedh Wasnik, Sarthak Malpani, Abhilasha Lokhande, Ashwini Shinde, Priya Sudewad

DOI Link: https://doi.org/10.22214/ijraset.2022.44702

Certificate: View Certificate

Abstract

This paper presents the E-voting system using block chain, which is a multiplatform interface designed to cast votes which promises secure and transparent elections. The block chain provides a doubly linked hash structure of every vote cast, hence any tempering to it results in a new different structure so we can say that the links are immutable. Every vote cast is counted as a transaction with a unique hash address. A collection of rules known as smart contract is stored on block chain to speed the transaction. At the end, the total number of transactions are counted which turns out to be the actual results of the elections. This unique combination allows secure and user-friendly experience to the users at the same time.

Introduction

I. INTRODUCTION

An easy-to-use electronic voting mobile application that allows for safe, secure, and transparent elections. Only one vote may be cast per user. The results are shown in real-time. The e-voting system guarantees the following characteristics: A voter may only vote if he or she has been authorized. Each voter can cast only one vote (Uniqueness). Votes must be recorded accurately (Precision). The integrity of the voting system requires that no change or loss of voting data take place that could compromise the integrity of the system. Systems should be designed in such a way that they can remain stable after failures and loss of Internet access. A convenient system that requires a limited amount of skill. Block chains are distributed ledgers that are immutable, and incontrovertible. Since the distributed log exists in many places, there is no any point of breakdown in its maintenance. The United Nations has distributed management as transactions are added to the ledger. In order to avoid tampering with earlier entries, any proposed "new block" adds a reference to the previous ledger version, creating a fixed chain from anywhere the block chain gets its name. Before a latest block of arrival is permanently added to the ledger, maximum part of the network nodes should come to a consensus.

II. LITERATURE SURVEY

Various techniques and methodologies are used to make changes in electronic and online voting systems. The security of the system may be guaranteed to some extent by some of them, but the voting data and process still should be controlled and managed by ultra-modern structure that ensure and guarantee the confidentiality of the electorate and information about the electorate.

Usual approaches for E-voting: Various cryptographic techniques are used to ensure the security of thedata activity in systems that are developed to conduct voting using connected gateways and computerized machines.

A. Homomorphic Encryption Technique:

In addition to being a powerful technique with many applications, homomorphic encryption has been around for quite some time. Online voting is an example of its use recently. With this encryption, the voting system uses the exponential El Gamal cryptosystem. Using the exponential El Gamal encryption, the details of every vote cast in the ballot are ciphered before submission. Because of this crypto system's additive homomorphism property, ciphered ballots can be computed straight without being decrypted.

B. Centralized architecture:

The data is, however, converted into a coded format in order to prevent manipulation while being sent over the network. Having the correct data in the database also requires a high level of trust and security after the correct data are stored. As long as the data is regarded as valuable, centralized storage is inconvenient since unauthorized access or hacker attacks will undermine the system's reliability.

III. METHODOLOGY

Firstly, we are going to do the registration process which will add the user to database and admin will approve the addition to the data base and each time the user tries to login it will first check the database about the voter then grant the access. We are going to Recognition devices & valid identity card number to cross check whether the user is present in the database or not /whether he is eligible to vote or not.

After that, a unique hash address is given to the voter using which he can cast a vote. Each hash is supplied with Ethers by which he can cast vote once. On the voting day, voter will be given the election code and he/she will login using the credentials and it will verify whether it is the valid user and then using the address given to him he/she will cast a vote then he will
be automatically logged out. The voters will also get live status of voting.

The final application accurately tells the winner after the voting. It is secure and hence nobody can hack the software. Nobody is able to alter the outcomes of the voting. Voter data and details of voter’s choice is secured and is not accessible by unauthorized person.

Conclusion

A block chain based electronic voting system was examined in this paper, and its advantages compared with traditional voting methods were discussed. Choosing the right leader for the country is crucial for a country with a low voting percentage The proposed system provides secure data and makes E-voting trustworthy amongst citizens of a democracy. Bitcoin\'s decentralized system of banks is based on the blockchain technology. The adoption of block chain in the distribution of databases on e-voting systems reduces cheating sources Information about voters and their choices will be secure so they cannot be accessed by unauthorized persons. Ultimately, the software will be secure so that no one can hack it.

References

[1] Mohammad Hosam Sedky and Essam M. Ramzy Hamed, “A Secure e- Government\'s e-Voting System”. [2] Himanshu Agarwal and G. N. Pandey, “A Secure eGovernment\'s e- Voting System”. [3] Prof. Anita A. Lahane, “Blockchain technology-based e-voting system”. [4] Rockwell, M. (2017) “Bitcongress – Process for block voting and law”, http://bitcongress.org/ last accessed: December 2017. [5] Rura L., Issac B., and Haldar M. K. (2016) “Implementation and evaluation of steganography based online voting, International Journal of Electronic Government Research” [6] Multichain (2017) Open platform for blockchain applications. Available at: www.multichain.com last accessed: December 2017.

Copyright

Copyright © 2022 Yutesh Mohadikar, Sumedh Wasnik, Sarthak Malpani, Abhilasha Lokhande, Ashwini Shinde, Priya Sudewad. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

IJRASET44702

Download Paper

Authors : Yutesh Mohadikar

Paper Id : IJRASET44702

Publish Date : 2022-06-22

ISSN : 2321-9653

Publisher Name : IJRASET

DOI Link : Click Here

About Us

International Journal for Research in Applied Science and Engineering Technology (IJRASET) is an international peer reviewed, online journal published for the enhancement of research in various disciplines of Applied Science & Engineering Technologies.

Quick links
  • Privacy Policy
  • Refund & Cancellation Policy
  • Shipping Policy
  • Terms & Conditions
Quick links
  • Home
  • About us
  • Editorial Board
  • Impact Factor
  • Submit Paper
  • Current Issue
  • Special Issue
  • Pay Fee
  • Topics
Journals for publication of research paper | Research paper publishers | Paper publication sites | Best journal to publish research paper | Research paper publication sites | Journals for paper publication | Best international journal for paper publication | Best journals to publish papers in India | Journal paper publishing sites | International journal to publish research paper | Online paper publishing journal

© 2022, International Journal for Research in Applied Science and Engineering Technology All rights reserved. | Designed by EVG Software Solutions