{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T23:48:39Z","timestamp":1773013719067,"version":"3.50.1"},"reference-count":42,"publisher":"Institution of Engineering and Technology (IET)","issue":"1","license":[{"start":{"date-parts":[[2025,8,5]],"date-time":"2025-08-05T00:00:00Z","timestamp":1754352000000},"content-version":"vor","delay-in-days":216,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"funder":[{"DOI":"10.13039\/501100009102","name":"Education Department of Jiangxi Province","doi-asserted-by":"publisher","award":["GJJ2201037"],"award-info":[{"award-number":["GJJ2201037"]}],"id":[{"id":"10.13039\/501100009102","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["ietresearch.onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["IET Information Security"],"published-print":{"date-parts":[[2025,1]]},"abstract":"<jats:p>Blockchain technology has become a popular choice for electronic voting systems due to its transparency, security, and decentralization. However, it is not a perfect solution, as its inherent immutability poses challenges in blockchain\u2010based e\u2010voting systems. Specifically, without the physical security provided by traditional polling stations, preventing bribery and coercion becomes more difficult. Additionally, because of blockchain\u2019s immutability, voters who are coerced or mistakenly vote cannot correct their choice. To address these issues, this paper proposes a secure blockchain\u2010based voting system with editable ballots. The system uses chameleon hashes with ephemeral trapdoors and a timestamp mechanism, allowing voters to modify their ballots within a legitimate timeframe. Additionally, a modified Paillier cryptosystem and blind signature technology are used to ensure that any modifications leave no trace. We simulate and evaluate the system using Fabric 2.2, focusing on computational complexity and system stability. Analysis of experimental results shows that the blockchain\u2010based voting system with an editable ballot mechanism proposed in this article has good computational cost and stability performance under normal use pressure.<\/jats:p>","DOI":"10.1049\/ise2\/3915638","type":"journal-article","created":{"date-parts":[[2025,8,5]],"date-time":"2025-08-05T07:34:57Z","timestamp":1754379297000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Secure and Editable: A Blockchain Voting System Based on Chameleon Hash With Ephemeral Trapdoors"],"prefix":"10.1049","volume":"2025","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-0670-3331","authenticated-orcid":false,"given":"Qiankun","family":"Zheng","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-1638-6604","authenticated-orcid":false,"given":"Junyao","family":"Ye","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9237-9764","authenticated-orcid":false,"given":"Peng","family":"Li","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5780-8463","authenticated-orcid":false,"given":"Junzuo","family":"Lai","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"265","published-online":{"date-parts":[[2025,8,5]]},"reference":[{"key":"e_1_2_12_1_2","volume-title":"Government 2.0: Using Technology to Improve Education, Cut Red Tape, Reduce Gridlock, and Enhance Democracy","author":"Eggers W. D.","year":"2007"},{"key":"e_1_2_12_2_2","doi-asserted-by":"publisher","DOI":"10.3390\/fi4040900"},{"key":"e_1_2_12_3_2","doi-asserted-by":"crossref","unstructured":"AbuidrisY. KumarR. andWenyongW. A Survey of Blockchain Based on E-Voting Systems Proceedings of the 2019 2nd International Conference on Blockchain Technology and Applications 2019 ACM 99\u2013104.","DOI":"10.1145\/3376044.3376060"},{"key":"e_1_2_12_4_2","doi-asserted-by":"publisher","DOI":"10.5121\/ijnsa.2017.9301"},{"key":"e_1_2_12_5_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-3444-0"},{"key":"e_1_2_12_6_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11704-023-2701-0"},{"key":"e_1_2_12_7_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11704-021-0593-4"},{"key":"e_1_2_12_8_2","doi-asserted-by":"publisher","DOI":"10.13005\/ojcst11.01.01"},{"key":"e_1_2_12_9_2","doi-asserted-by":"crossref","unstructured":"GargK. SaraswatP. BishtS. AggarwalS. K. KothuriS. K. andGuptaS. A Comparitive Analysis on E-Voting System Using Blockchain 2019 4th International Conference on Internet of Things: Smart Innovation and Usages (IoT-SIU) 2019 IEEE 1\u20134.","DOI":"10.1109\/IoT-SIU.2019.8777627"},{"key":"e_1_2_12_10_2","unstructured":"AdidaB.andHeliosB. Web-Based Open-Audit Voting Proceedings of the 17th USENIX Security Symposium 2008 ACM 335\u2013348."},{"key":"e_1_2_12_11_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70972-7_20"},{"key":"e_1_2_12_12_2","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2008.0127"},{"key":"e_1_2_12_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.2979856"},{"key":"e_1_2_12_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3108494"},{"key":"e_1_2_12_15_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53890-6_19"},{"key":"e_1_2_12_16_2","doi-asserted-by":"crossref","unstructured":"IovinoV. RialA. R\u00f8nneP. B. andRyanP. Y. A. Universal Unconditional Verifiability in E-Voting Without Trusted Parties Proceedings of the 33th IEEE Computer Security Foundations Symposium (CSF \u201920) 2020 New York NY USA IEEE Press 33\u201348.","DOI":"10.1109\/CSF49147.2020.00011"},{"key":"e_1_2_12_17_2","doi-asserted-by":"crossref","unstructured":"HuberN. K\u00fcstersR. andKripsT. et al.Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (CCS \u201922) Kryvos: Publicly Tally-Hiding Verifiable E-Voting 2022 New York NY USA ACM Press 1443\u20131457.","DOI":"10.1145\/3548606.3560701"},{"key":"e_1_2_12_18_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"e_1_2_12_19_2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48405-1_10"},{"key":"e_1_2_12_20_2","unstructured":"JakobssonM. JuelsA. andRivestR. L. Making Mix Nets Robust for Electronic Voting by Randomized Partial Checking Proceedings of the 11th USENIX Security Symposium (USS \u201902) 2002 Berkeley CA USA USENIX Association Press 339\u2013353."},{"key":"e_1_2_12_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2019.2940474"},{"key":"e_1_2_12_22_2","doi-asserted-by":"publisher","DOI":"10.5815\/ijmecs.2017.10.06"},{"key":"e_1_2_12_23_2","doi-asserted-by":"crossref","unstructured":"CarciaJ. C. P. BenslimaneA. andBoutalbiS. Blockchain-Based System for E-Voting Using Blind Signature Protocol Proceedings of the 2021 IEEE Global Communications Conference(GLOBECOM \u201921) 2021 Madrid Spain IEEE Press 01\u201306.","DOI":"10.1109\/GLOBECOM46510.2021.9685189"},{"key":"e_1_2_12_24_2","doi-asserted-by":"crossref","unstructured":"MalinaL. SmrzJ. HajnyJ. andVrbaK. Secure Electronic Voting Based on Group Signatures Proceedings of the 2015 38th International Conference on Telecommunications and Signal Processing (TSP \u201915) 2015 Prague Czech Republic IEEE Press 06\u201310.","DOI":"10.1109\/TSP.2015.7296214"},{"key":"e_1_2_12_25_2","unstructured":"ZhaiE. WolinskyD. I. ChenR. SytaE. TengC. andFordB. AnonRep: Towards Tracking-Resistant Anonymous Reputation Proceedings of the 13th Usenix Conference on Networked Systems Design and Implementation (NSDI \u201916) 2016 USA USENIX Association Press 583\u2013596."},{"key":"e_1_2_12_26_2","doi-asserted-by":"crossref","unstructured":"CortierV. Dr\u0103ganC. C. DupressoirF. SchmidtB. StrubP. Y. andWarinschiB. Machine-Checked Proofs of Privacy for Electronic Voting Protocols 2017 IEEE Symposium on Security and Privacy (SP) 2017 IEEE 993\u20131008.","DOI":"10.1109\/SP.2017.28"},{"key":"e_1_2_12_27_2","doi-asserted-by":"crossref","unstructured":"ChaumD. Blind Signatures for Untraceable Payments Proceedings of the Advances in Cryptology: Proceedings of Crypto 82 (Crypto \u201982) 1983 New York USA Plenum Press 199\u2013203.","DOI":"10.1007\/978-1-4757-0602-4_18"},{"key":"e_1_2_12_28_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30574-3_11"},{"key":"e_1_2_12_29_2","first-page":"1","article-title":"PIWS: Private Intersection Weighted Sum Protocol for Privacy-Preserving Score-Based Voting With Perfect Ballot Secrecy","volume":"2022","author":"Lu S.","year":"2022","journal-title":"IEEE Transactions on Computational Social Systems"},{"key":"e_1_2_12_30_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2020.3011928"},{"key":"e_1_2_12_31_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2021.103165"},{"key":"e_1_2_12_32_2","unstructured":"DassoA.andFunesA. A Model for E-Voting Systems Evaluation 2011 V Simposio de Inform\u00e1tica en el Estado (SIE 2011)(XL JAIIO C\u00f3rdoba 29 de agosto al 2 de septiembre de 2011)."},{"key":"e_1_2_12_33_2","unstructured":"Technical Guidelines Development Committee Voluntary Voting System Guidelines Recommendations to the Election Assistance Commission 2007."},{"key":"e_1_2_12_34_2","doi-asserted-by":"crossref","unstructured":"HardwickF. S. GioulisA. AkramR. N. andMarkantonakisK. E-Voting With Blockchain: An E-Voting Protocol with Decentralisation and Voter Privacy 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData) 2018 IEEE 1561\u20131567.","DOI":"10.1109\/Cybermatics_2018.2018.00262"},{"key":"e_1_2_12_35_2","doi-asserted-by":"crossref","unstructured":"AtenieseG. MagriB. VenturiD. andAndradeE. Redactable Blockchain-or-Rewriting History in Bitcoin and Friends 2017 IEEE European Symposium on Security and Privacy (EuroS&P) 2017 IEEE.","DOI":"10.1109\/EuroSP.2017.37"},{"key":"e_1_2_12_36_2","doi-asserted-by":"crossref","unstructured":"YiX.andLamK. Y. A New Blind ECDSA Scheme for Bitcoin Transaction Anonymity Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security 2019 ACM 613\u2013620.","DOI":"10.1145\/3321705.3329816"},{"key":"e_1_2_12_37_2","doi-asserted-by":"crossref","unstructured":"TianY. LiN. LiY. SzalachowskiP. andZhouJ. Annual Computer Security Applications Conference Policy-Based Chameleon Hash for Blockchain Rewriting With Black-box Accountability 2020 IEEE 813\u2013828.","DOI":"10.1145\/3427228.3427247"},{"key":"e_1_2_12_38_2","article-title":"E-Voting System Using Hyperledger Fabric Blockchain and Smart Contracts","volume":"7","author":"D\u00edaz-Santiso J.","year":"2021","journal-title":"Engineering Proceedings"},{"key":"e_1_2_12_39_2","doi-asserted-by":"publisher","DOI":"10.18280\/ria.360410"},{"key":"e_1_2_12_40_2","doi-asserted-by":"crossref","first-page":"737","DOI":"10.18280\/isi.270506","article-title":"Iraqi Paradigm E-Voting System Based on Hyperledger Fabric Blockchain Platform","volume":"27","author":"Saeed S. H.","year":"2022","journal-title":"Ing\u00e9nierie des Syst\u00e8mes d\u2019Information"},{"key":"e_1_2_12_41_2","doi-asserted-by":"publisher","DOI":"10.3390\/fi16110388"},{"key":"e_1_2_12_42_2","doi-asserted-by":"publisher","DOI":"10.3390\/app13021096"}],"container-title":["IET Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/ise2\/3915638","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/full-xml\/10.1049\/ise2\/3915638","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/ise2\/3915638","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T22:33:28Z","timestamp":1773009208000},"score":1,"resource":{"primary":{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/10.1049\/ise2\/3915638"}},"subtitle":[],"editor":[{"given":"Yong","family":"Yu","sequence":"additional","affiliation":[],"role":[{"role":"editor","vocabulary":"crossref"}]}],"short-title":[],"issued":{"date-parts":[[2025,1]]},"references-count":42,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1]]}},"alternative-id":["10.1049\/ise2\/3915638"],"URL":"https:\/\/doi.org\/10.1049\/ise2\/3915638","archive":["Portico"],"relation":{},"ISSN":["1751-8709","1751-8717"],"issn-type":[{"value":"1751-8709","type":"print"},{"value":"1751-8717","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1]]},"assertion":[{"value":"2024-05-14","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-07-09","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-08-05","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"3915638"}}