{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:27:43Z","timestamp":1767338863155,"version":"build-2065373602"},"reference-count":28,"publisher":"MDPI AG","issue":"2","license":[{"start":{"date-parts":[[2023,5,15]],"date-time":"2023-05-15T00:00:00Z","timestamp":1684108800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Base Funding","award":["UIDB\/00027\/2020"],"award-info":[{"award-number":["UIDB\/00027\/2020"]}]},{"name":"Artificial Intelligence and Computer Science Laboratory","award":["UIDB\/00027\/2020"],"award-info":[{"award-number":["UIDB\/00027\/2020"]}]},{"name":"LIACC","award":["UIDB\/00027\/2020"],"award-info":[{"award-number":["UIDB\/00027\/2020"]}]},{"name":"FCT\/MCTES","award":["UIDB\/00027\/2020"],"award-info":[{"award-number":["UIDB\/00027\/2020"]}]},{"name":"PIDDAC","award":["UIDB\/00027\/2020"],"award-info":[{"award-number":["UIDB\/00027\/2020"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cryptography"],"abstract":"<jats:p>Since its appearance in 2008, blockchain technology has found multiple uses in fields such as banking, supply chain management, and healthcare. One of the most intriguing uses of blockchain is in voting systems, where the technology can overcome the security and transparency concerns that plague traditional voting systems. This paper provides a thorough examination of the implementation of a blockchain-based voting system. The proposed system employs cryptographic methods to protect voters\u2019 privacy and anonymity while ensuring the verifiability and integrity of election results. Digital signatures, homomorphic encryption (He), zero-knowledge proofs (ZKPs), and the Byzantine fault-tolerant consensus method underpin the system. A review of the literature on the use of blockchain technology for voting systems supports the analysis and the technical and logistical constraints connected with implementing the suggested system. The study suggests solutions to problems such as managing voter identification and authentication, ensuring accessibility for all voters, and dealing with network latency and scalability. The suggested blockchain-based voting system can provide a safe and transparent platform for casting and counting votes, ensuring election results\u2019 privacy, anonymity, and verifiability. The implementation of blockchain technology can overcome traditional voting systems\u2019 security and transparency shortcomings while also delivering a high level of integrity and traceability.<\/jats:p>","DOI":"10.3390\/cryptography7020027","type":"journal-article","created":{"date-parts":[[2023,5,15]],"date-time":"2023-05-15T03:40:26Z","timestamp":1684122026000},"page":"27","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Blockchain-Based Electronic Voting: A Secure and Transparent Solution"],"prefix":"10.3390","volume":"7","author":[{"given":"Bruno Miguel Batista","family":"Pereira","sequence":"first","affiliation":[{"name":"Intelligent Sensing and Ubiquitous Systems Group (ISUS), University Fernando Pessoa, Pra\u00e7a 9 de Abril, 4249-004 Porto, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8280-1324","authenticated-orcid":false,"given":"Jos\u00e9 Manuel","family":"Torres","sequence":"additional","affiliation":[{"name":"Intelligent Sensing and Ubiquitous Systems Group (ISUS), University Fernando Pessoa, Pra\u00e7a 9 de Abril, 4249-004 Porto, Portugal"},{"name":"Artificial Intelligence and Computer Science Laboratory (LIACC), University of Porto, 4150-181 Porto, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7146-4545","authenticated-orcid":false,"given":"Pedro Miguel","family":"Sobral","sequence":"additional","affiliation":[{"name":"Intelligent Sensing and Ubiquitous Systems Group (ISUS), University Fernando Pessoa, Pra\u00e7a 9 de Abril, 4249-004 Porto, Portugal"},{"name":"Artificial Intelligence and Computer Science Laboratory (LIACC), University of Porto, 4150-181 Porto, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4123-0983","authenticated-orcid":false,"given":"Rui Silva","family":"Moreira","sequence":"additional","affiliation":[{"name":"Intelligent Sensing and Ubiquitous Systems Group (ISUS), University Fernando Pessoa, Pra\u00e7a 9 de Abril, 4249-004 Porto, Portugal"},{"name":"Artificial Intelligence and Computer Science Laboratory (LIACC), University of Porto, 4150-181 Porto, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0382-879X","authenticated-orcid":false,"given":"Christophe Pinto de Almeida","family":"Soares","sequence":"additional","affiliation":[{"name":"Intelligent Sensing and Ubiquitous Systems Group (ISUS), University Fernando Pessoa, Pra\u00e7a 9 de Abril, 4249-004 Porto, Portugal"},{"name":"Artificial Intelligence and Computer Science Laboratory (LIACC), University of Porto, 4150-181 Porto, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5440-3225","authenticated-orcid":false,"given":"Ivo","family":"Pereira","sequence":"additional","affiliation":[{"name":"Intelligent Sensing and Ubiquitous Systems Group (ISUS), University Fernando Pessoa, Pra\u00e7a 9 de Abril, 4249-004 Porto, Portugal"},{"name":"Interdisciplinary Studies Research Center (ISRC), Instituto Superior de Engenharia do Porto (ISEP), Polytechnic of Porto, 4249-015 Porto, Portugal"}]}],"member":"1968","published-online":{"date-parts":[[2023,5,15]]},"reference":[{"unstructured":"Nakamoto, S. (2023, January 01). Bitcoin: A Peer-to-Peer Electronic Cash System. Available online: https:\/\/www.bitcoinpaper.info\/bitcoinpaper-html\/.","key":"ref_1"},{"unstructured":"Kasabov, N.K., Kozma, R., Ko, K., O\u2019Shea, R., Coghill, G.G., and Gedeon, T. (1997, January 24\u201328). Genetic Algorithms Applied to University Exam Scheduling. Proceedings of the 1997 International Conference on Neural Information Processing and Intelligent Information Systems, InICONIP, Dunedin, New Zealand.","key":"ref_2"},{"unstructured":"Kasabov, N.K., Kozma, R., Ko, K., O\u2019Shea, R., Coghill, G., and Gedeon, T. (1997, January 24\u201328). A Constraint-Directed Genetic Algorithm for University Timetable Planning. Proceedings of the 1997 International Conference on Neural Information Processing and Intelligent Information Systems, InICONIP, Dunedin, New Zealand.","key":"ref_3"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"53","DOI":"10.4018\/IJEGR.2018010103","article-title":"Secure Digital Voting System Based on Blockchain Technology","volume":"14","author":"Khan","year":"2018","journal-title":"Int. J. Electron. Gov. Res."},{"key":"ref_5","first-page":"245","article-title":"Maintaining Security of Electronic voting data through Block chains","volume":"4","author":"Patange","year":"2020","journal-title":"Int. J. Trend Sci. Res. Dev."},{"doi-asserted-by":"crossref","unstructured":"Tanana, D. (2019, January 3\u20136). Avalanche blockchain protocol for distributed computing security. Proceedings of the 2019 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom), Sochi, Russia.","key":"ref_6","DOI":"10.1109\/BlackSeaCom.2019.8812863"},{"unstructured":"Hegadekatti, K. (2016). Democracy 3.0: Voting Through the Blockchain. SSRN Electron. J., 2889291.","key":"ref_7"},{"unstructured":"(2023, March 08). Agora\u2014Bringing Voting Systems into the Digital Age. Available online: https:\/\/www.agora.vote\/.","key":"ref_8"},{"doi-asserted-by":"crossref","unstructured":"Chauhan, A., Malviya, O.P., Verma, M., and Mor, T.S. (2018, January 16\u201320). Blockchain and Scalability. Proceedings of the 2018 IEEE International Conference on Software Quality, Reliability and Security Companion, QRS Companion 2018, Lisbon, Portugal.","key":"ref_9","DOI":"10.1109\/QRS-C.2018.00034"},{"key":"ref_10","first-page":"1237","article-title":"Design and Analysis of Chain Block System for Evaluation of Brake Load","volume":"1","author":"Jaiswal","year":"2017","journal-title":"Int. J. Trend Sci. Res. Dev."},{"key":"ref_11","first-page":"1138","article-title":"A Hybrid Blockchain System Based on Parallel Distributed Architecture for Central Bank Digital Currency","volume":"Volume 320","year":"2019","journal-title":"Fuzzy Systems and Data Mining V"},{"doi-asserted-by":"crossref","unstructured":"Moubarak, J., Filiol, E., and Chamoun, M. (2018, January 18\u201320). On blockchain security and relevant attacks. Proceedings of the 2018 IEEE Middle East and North Africa Communications Conference (MENACOMM), Jounieh, Lebanon.","key":"ref_12","DOI":"10.1109\/MENACOMM.2018.8371010"},{"unstructured":"Skella, J., and Naamani, N. (2023, January 08). Horizon State\u2014The Future of Digital Voting. Available online: https:\/\/horizonstate.com\/.","key":"ref_13"},{"unstructured":"Ernest, A., and Hourt, N. (2023, March 08). Follow My Vote\u2014A Transparent and Secure Voting System. Available online: https:\/\/followmyvote.com\/.","key":"ref_14"},{"unstructured":"Sawhney, N. (2023, March 08). Voatz\u2014A Secure Mobile Voting Platform. Available online: https:\/\/www.voatz.com\/.","key":"ref_15"},{"key":"ref_16","first-page":"874","article-title":"Puranik, Nandan Chitale, Yogeshchandra Blockchain and Beyond","volume":"5","author":"Chitale","year":"2021","journal-title":"Int. J. Trend Sci. Res. Dev."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"101227","DOI":"10.1016\/j.pmcj.2020.101227","article-title":"Verification of smart contracts: A survey","volume":"67","author":"Almakhour","year":"2020","journal-title":"Pervasive Mob. Comput."},{"doi-asserted-by":"crossref","unstructured":"Krichen, M., Lahami, M., and Al-Haija, Q.A. (2022, January 11\u201313). Formal Methods for the Verification of Smart Contracts: A Review. Proceedings of the 2022 15th International Conference on Security of Information and Networks (SIN), Sousse, Tunisia.","key":"ref_18","DOI":"10.1109\/SIN56466.2022.9970534"},{"doi-asserted-by":"crossref","unstructured":"Singh, K., Heulot, N., and Hamida, E.B. (August, January 30). Towards Anonymous, Unlinkable, and Confidential Transactions in Blockchain. Proceedings of the 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Halifax, NS, Canada.","key":"ref_19","DOI":"10.1109\/Cybermatics_2018.2018.00274"},{"key":"ref_20","first-page":"241","article-title":"A Memetic Algorithm for University Exam Timetabling","volume":"Volume 1153","author":"Burke","year":"1995","journal-title":"Practice and Theory of Automated Timetabling, Proceedings of the First International Conference, Edinburgh, UK, 29 August\u20131 September 1995"},{"doi-asserted-by":"crossref","unstructured":"Wang, K., Shang, W., Liu, M., Lin, W., and Fu, H. (2018, January 6\u20138). A Greedy and Genetic Fusion Algorithm for Solving Course Timetabling Problem. Proceedings of the IEEE\/ACIS 17th International Conference on Computer and Information Science (ICIS), Singapore.","key":"ref_21","DOI":"10.1109\/ICIS.2018.8466405"},{"key":"ref_22","first-page":"2","article-title":"Docker: Lightweight Linux Containers for Consistent Development and Deployment","volume":"239","author":"Merkel","year":"2014","journal-title":"Linux J."},{"unstructured":"Mindel, M., Lyons, K., and Wigglesworth, J. (2017). CASCON \u201917: Proceedings of the 27th Annual International Conference on Computer Science and Software Engineering, Markham, ON, Canada, 6\u20138 November 2017, IBM Corp.","key":"ref_23"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"502","DOI":"10.1016\/j.procs.2013.09.310","article-title":"Homomorphic Encryption","volume":"20","author":"Ogburn","year":"2013","journal-title":"Procedia Comput. Sci."},{"key":"ref_25","first-page":"65","article-title":"Zero-knowledge Proofs","volume":"20","author":"Zitnik","year":"2013","journal-title":"ACM Crossroads"},{"key":"ref_26","first-page":"171","article-title":"How to Prove all NP-Statements in Zero-Knowledge, and a Methodology of Cryptographic Protocol Design","volume":"Volume 263","author":"Odlyzko","year":"1986","journal-title":"Advances in Cryptology, Proceedings of the CRYPTO\u201986, 6th Annual International Cryptology Conference, Santa Barbara, CA, USA, 11\u201315 August 1986"},{"key":"ref_27","first-page":"552","article-title":"How to Leak a Secret","volume":"Volume 2248","author":"Boyd","year":"2001","journal-title":"Advances in Cryptology, Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security Gold Coast, Australia, 9\u201313 December 2001"},{"doi-asserted-by":"crossref","unstructured":"Chen, L. (2012, January 25\u201327). Ring Group Signatures. Proceedings of the 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, Liverpool, UK.","key":"ref_28","DOI":"10.1109\/TrustCom.2012.246"}],"container-title":["Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2410-387X\/7\/2\/27\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T19:35:03Z","timestamp":1760124903000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2410-387X\/7\/2\/27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,15]]},"references-count":28,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2023,6]]}},"alternative-id":["cryptography7020027"],"URL":"https:\/\/doi.org\/10.3390\/cryptography7020027","relation":{},"ISSN":["2410-387X"],"issn-type":[{"type":"electronic","value":"2410-387X"}],"subject":[],"published":{"date-parts":[[2023,5,15]]}}}