Jingjuan Yu, Shundong Li, Ping Luo, et al., “Decentralized self-tallying verifiable referendum based on blockchain,” Chinese Journal of Electronics, vol. x, no. x, pp. 1–16, xxxx. DOI: 10.23919/cje.2024.00.118
Citation: Jingjuan Yu, Shundong Li, Ping Luo, et al., “Decentralized self-tallying verifiable referendum based on blockchain,” Chinese Journal of Electronics, vol. x, no. x, pp. 1–16, xxxx. DOI: 10.23919/cje.2024.00.118

Decentralized Self-tallying Verifiable Referendum Based on Blockchain

  • Elections and referendums play a vital role in a democratic society, which enable individuals to make collective decisions. In the Internet information era, electronic voting has replaced traditional paper voting. However, the centralized architecture of the electronic voting system is vulnerable to attacks and the voting records can be easily changed or even deleted. Blockchain, as a decentralized and trustworthy distributed network, offers new means for electronic voting systems. Current blockchain-based voting systems still face some challenges: they cannot achieve full verifiability in self-tallying, cannot tolerate invalid or abstained ballots, and cannot prevent Sybil attacks either. To address these challenges, we use some cryptographic primitives to construct a blockchain-based decentralized self-tallying verifiable referendum scheme to provide a transparent and secure remote electronic voting system. First, we use range zero-knowledge proofs to verify the ballot content, and for the first time, propose a novel method using bilinear pairing to verify decryption results, which significantly reduces computational burden and gas consumption during verification. Second, we ingeniously combine a threshold decryption system with a blockchain-based deposit mechanism: invalid or abstained ballots are excluded from the tally, and voters who cast such ballots are incentivized to publish their partial private keys via the deposit mechanism, ensuring their exit from the decryption process without disrupting the election. We also establish an innovative access mechanism for smart contract that effectively prevents Sybil attacks. Theoretical analysis and experimental results demonstrate that our system is secure, feasible and efficient.
  • loading

Catalog

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return