Sensors: Blockchain For Electronic Voting System-Review and Open Research Challenges
Sensors: Blockchain For Electronic Voting System-Review and Open Research Challenges
Sensors: Blockchain For Electronic Voting System-Review and Open Research Challenges
Review
Blockchain for Electronic Voting System—Review and Open
Research Challenges
Uzma Jafar * , Mohd Juzaiddin Ab Aziz and Zarina Shukur
Faculty of Information Science and Technology, The National University of Malaysia, Bangi 43600, Malaysia;
juzaiddin@ukm.edu.my (M.J.A.A.); zarinashukur@ukm.edu.my (Z.S.)
* Correspondence: uzmajafar@gmail.com
Abstract: Online voting is a trend that is gaining momentum in modern society. It has great potential
to decrease organizational costs and increase voter turnout. It eliminates the need to print ballot
papers or open polling stations—voters can vote from wherever there is an Internet connection.
Despite these benefits, online voting solutions are viewed with a great deal of caution because
they introduce new threats. A single vulnerability can lead to large-scale manipulations of votes.
Electronic voting systems must be legitimate, accurate, safe, and convenient when used for elections.
Nonetheless, adoption may be limited by potential problems associated with electronic voting sys-
tems. Blockchain technology came into the ground to overcome these issues and offers decentralized
nodes for electronic voting and is used to produce electronic voting systems mainly because of
their end-to-end verification advantages. This technology is a beautiful replacement for traditional
electronic voting solutions with distributed, non-repudiation, and security protection characteristics.
The following article gives an overview of electronic voting systems based on blockchain technology.
The main goal of this analysis was to examine the current status of blockchain-based voting research
and online voting systems and any related difficulties to predict future developments. This study
provides a conceptual description of the intended blockchain-based electronic voting application and
Citation: Jafar, U.; Aziz, M.J.A.;
Shukur, Z. Blockchain for Electronic
an introduction to the fundamental structure and characteristics of the blockchain in connection to
Voting System—Review and Open electronic voting. As a consequence of this study, it was discovered that blockchain systems may
Research Challenges. Sensors 2021, 21, help solve some of the issues that now plague election systems. On the other hand, the most often
5874. https://doi.org/10.3390/ mentioned issues in blockchain applications are privacy protection and transaction speed. For a
s21175874 sustainable blockchain-based electronic voting system, the security of remote participation must
be viable, and for scalability, transaction speed must be addressed. Due to these concerns, it was
Academic Editors: Hong-Ning Dai, determined that the existing frameworks need to be improved to be utilized in voting systems.
Jiajing Wu and Hao Wang
2. Background
The first things that come to mind about the blockchain are cryptocurrencies and
2. Background
smart contracts because of the well-known initiatives in Bitcoin and Ethereum. Bitcoin
was the first crypto-currency
The first things solution
that comethat toused
mind a blockchain data structure.
about the blockchain Ethereum
are cryptocurrencies and
introduced smart
smart contracts
contractsbecause
that leverage the power ofinitiatives
of the well-known blockchain immutability
in Bitcoin and dis-Bitcoin was
and Ethereum.
the first while
tributed consensus crypto-currency solution that used
offering a crypto-currency a blockchain
solution comparabledata structure.
to Bitcoin.Ethereum
The intro-
ducedcontracts
concept of smart smart contracts that leverage
was introduced much the power
earlier byofNick
blockchain
Szabo in immutability
the 1990s and andis distributed
described asconsensus while offering
“a set of promises, a crypto-currency
specified in digital form,solution comparable
including protocolsto Bitcoin.
within The concept of
which
the parties perform on these promises” [16]. In Ethereum, a smart contract is a piece ofis described
smart contracts was introduced much earlier by Nick Szabo in the 1990s and
code deployed as “atosetthe
of network
promises,so specified in digital
that everyone hasform, including
access protocols
to it. The result within which the parties
of executing
this code is perform
verified onby these promises”
a consensus [16]. In Ethereum,
mechanism and by every a smart
membercontract is anetwork
of the piece ofascode
a deployed
whole [17]. to the network so that everyone has access to it. The result of executing this code is verified
Today,by weacall
consensus mechanism
a blockchain a set ofand by every combining
technologies member of the the blockchain
network asdata a whole [17].
struc-
Today, we call a blockchain a set of technologies
ture itself, distributed consensus algorithm, public key cryptography, and smart contracts combining the blockchain data
structure itself, distributed consensus
[18]. Below we describe these technologies in more detail. algorithm, public key cryptography, and smart
contracts
Blockchain creates[18]. Belowofwe
a series describe
blocks these technologies
replicated in more
on a peer-to-peer detail. Any block
network.
in blockchain has Blockchain creates ahash
a cryptographic seriesandof blocks replicated
timestamp addedonto a peer-to-peer
the previousnetwork.
block, as Any block in
shown in Figure 1. A block contains the Merkle tree block header and several transactions as shown
blockchain has a cryptographic hash and timestamp added to the previous block,
in Figure
[19]. It is a secure 1. A blockmethod
networking containsthatthe Merkle
combines treecomputer
block header and and
science several transactions [19]. It is
mathematics
to hide data and information from others that is called cryptography. It allows the data toto hide data
a secure networking method that combines computer science and mathematics
be transmittedand securely
information from
across theothers that isnetwork,
insecure called cryptography.
in encryptedItand allows the dataforms
decrypted to be transmitted
[20,21]. securely across the insecure network, in encrypted and decrypted forms [20,21].
Figure 3.Figure
Characteristics of blockchain
3. Characteristics architecture.
of blockchain architecture.
3.Figure
How 3.Blockchain
Characteristics of blockchain architecture.
Can Transform the Electronic Voting System
Blockchain technology fixed shortcomings in today’s method in elections made the
polling mechanism clear and accessible, stopped illegal voting, strengthened the data
protection, and checked the outcome of the polling. The implementation of the electronic
voting method in blockchain is very significant [35]. However, electronic voting carries
significant risks such as if an electronic voting system is compromised, all cast votes can
probably be manipulated and misused. Electronic voting has thus not yet been adopted on
3. How Blockchain Can Transform the Electronic Voting System
Blockchain technology fixed shortcomings in today’s method in elections made the
polling mechanism clear and accessible, stopped illegal voting, strengthened the data pro-
tection, and checked the outcome of the polling. The implementation of the electronic vot-
Sensors 2021, 21, 5874 ing method in blockchain is very significant [35]. However, electronic voting carries sig- 6 of 22
nificant risks such as if an electronic voting system is compromised, all cast votes can
probably be manipulated and misused. Electronic voting has thus not yet been adopted
on a national scale,
a national considering
scale, consideringallall
itsitspossible
possibleadvantages.
advantages.Today,
Today,there
there is
is aa viable
viable solu-
solution to
tion toovercome
overcomethe therisks
risksand
andelectronic
electronicvoting,
voting,which
whichisisblockchain
blockchaintechnology.
technology.In InFigure
Figure4, one
4, onecan
cansee
seethe
themain
maindifference
differencebetween
betweenboth bothofof the
the systems.
systems. InIn traditional
traditional voting
voting sys- we
systems,
tems, have
we have a central
a central authority
authority to cast
to cast a vote.
a vote. If someone
If someone wants
wants to to modify
modify oror change
change the
the record,
record, theycan
they candodoititquickly;
quickly;nonoone
one knows
knows howhow toto verify
verify that
thatrecord.
record.OneOnedoes doesnot
nothave
have the
the central authority;
central authority;thethedata
dataare
arestored
storedin inmultiple
multiple nodes.
nodes. It
It is not possible
is not possible to tohack
hackallallnodes
nodesandandchange
changethethedata.
data.Thus,
Thus,inin this
this way,
way,one
onecannot
cannotdestroy
destroythethevotes
votesand
andefficiently
efficientlyverify
verifythe
thevotes
votesbybytally
tallywith
withother
othernodes.
nodes.
FigureFigure 4. Traditional
4. Traditional vs. blockchain
vs. blockchain votingvoting system.
system.
If the Iftechnology
the technology
is usedis correctly,
used correctly, the blockchain
the blockchain is a digital,
is a digital, decentralized,
decentralized, en- en-
crypted, transparent ledger that can withstand manipulation and fraud. Because of theof the
crypted, transparent ledger that can withstand manipulation and fraud. Because
distributed
distributed structure
structure of the of the blockchain,
blockchain, a Bitcoin
a Bitcoin electronic
electronic votingvoting
systemsystem reduces
reduces the risks
the risks
involved with electronic voting and allows for a tamper-proof for the
involved with electronic voting and allows for a tamper-proof for the voting system. A voting system. A
blockchain-based electronic voting system requires a wholly distributed voting infrastruc-
blockchain-based electronic voting system requires a wholly distributed voting infrastruc-
ture. Electronic voting based on blockchain will only work where the online voting system
ture. Electronic voting based on blockchain will only work where the online voting system
is fully controlled by no single body, not even the government [36]. To sum-up, elections
is fully controlled by no single body, not even the government [36]. To sum-up, elections
can only be free and fair when there is a broad belief in the legitimacy of the power held
can only be free and fair when there is a broad belief in the legitimacy of the power held
by those in positions of authority. The literature review for this field of study and other
by those in positions of authority. The literature review for this field of study and other
related experiments may be seen as a good path for making voting more efficient in terms
related experiments may be seen as a good path for making voting more efficient in terms
of administration and participation. However, the idea of using blockchain offered a new
of administration and participation. However, the idea of using blockchain offered a new
model for electronic voting.
model for electronic voting.
4. Problems and Solutions of Developing Online Voting Systems
4. Problems and Solutions of Developing Online Voting Systems
Whether talking about traditional paper-based voting, voting via digital voting ma-
Whether
chines, ortalking about
an online traditional
voting system,paper-based voting, need
several conditions votingto via digital voting ma-
be satisfied:
chines, or an online voting system, several conditions need to be satisfied:
• Eligibility: Only legitimate voters should be able to take part in voting;
• Eligibility:
• Only legitimate
Unreusability: voters
Each voter canshould be able
vote only to take part in voting;
once;
• Unreusability:
• Each voter can vote only once;
Privacy: No one except the voter can obtain information about the voter’s choice;
• Privacy:
• No oneNo
Fairness: except the obtain
one can voter can obtain information
intermediate about the voter’s choice;
voting results;
• Soundness: Invalid ballots should be detected and not taken into account during
tallying;
• Completeness: All valid ballots should be tallied correctly.
Below is a brief overview of the solutions for satisfying these properties in online
voting systems.
Sensors 2021, 21, 5874 7 of 22
4.1. Eligibility
The solution to the issue of eligibility is rather apparent. To take part in online
voting, voters need to identify themselves using a recognized identification system. The
identifiers of all legitimate voters need to be added to the list of participants. But there
are threats: Firstly, all modifications made to the participation list need to be checked so
that no illegitimate voters can be added, and secondly, the identification system should be
both trusted and secure so that a voter’s account cannot be stolen or used by an intruder.
Building such an identification system is a complex task in itself [37]. However, because
this sort of system is necessary for a wide range of other contexts, especially related to
digital government services, researchers believe it is best to use an existing identification
system, and the question of creating one is beyond the scope of work.
4.2. Unreusability
At first, glance, implementing unreusability may seem straightforward—when a voter
casts their vote, all that needs to be done is to place a mark in the participation list and not
allow them to vote a second time. But privacy needs to be taken into consideration; thus,
providing both unreusability and voter anonymity is tricky. Moreover, it may be necessary
to allow the voter to re-vote, making the task even more complex [38]. A brief overview
of unreusability techniques will be provided below in conjunction with the outline on
implementing privacy.
4.3. Privacy
Privacy in the context of online voting means that no one except the voter knows
how a participant has voted. Achieving this property mainly relies on one (or more) of the
following techniques: blind signatures, homomorphic encryption, and mix-networks [39].
Blind signature is a method of signing data when the signer does not know what they
are signing. It is achieved by using a blinding function so that blinding and signing
functions are commutative–Blind(Sign(message)) = Sign(Blind(message)). The requester
blinds (applies blinding function to) their message and sends it for signing. After obtaining
a signature for a blinded message, they use their knowledge of blinding parameters to
derive a signature for an unblinded message. Blind signatures mathematically prevent
anyone except the requester from linking a blinded message and a corresponding signature
pair with an unblinded one [40].
The voting scheme proposed by Fujioka, Okamoto, and Ohta in 1992 [41] uses a blind
signature: An eligible voter blinds his ballot and sends it to the validator. The validator
verifies that the voter is allowed to participate, signs the blinded ballot, and returns it to
the voter. The voter then derives a signature for the unblinded vote and sends it to the
tallier, and the tallier verifies the validator’s signature before accepting the ballot.
Many online voting protocols have evolved from this scheme, improving usability
(in the original method, the voter had to wait till the end of the election and send a ballot
decryption key), allowing re-voting, or implementing coercion resistance. The main threat
here is the power of the signer: There must be a verifiable log of all emitted signatures;
this information logically corresponds to the receiving of a ballot by the voter, so it should
be verified that only eligible voters receive signatures from the signer [42]. It should also
be verifiable that accounts of voters who are permitted to vote but have not taken part in
voting are not utilized by an intruder. To truly break the link between voter and ballot, the
ballot and the signature need to be sent through an anonymous channel [43].
Homomorphic encryption is a form of encryption that allows mathematical operations
to be performed on encrypted data without decryption, for example, the addition
Enc(a) + Enc(b) = Enc(a + b); or multiplication Enc(a) × Enc(b) = Enc(a × b). In the
context of online voting, additive homomorphic encryption allows us to calculate the sum
of all the voters’ choices before decryption.
It is worth mentioning here that multiplicative homomorphic encryption can generally
be used as an additive. For example, if we have choices x and y and multiplicative
Sensors 2021, 21, 5874 8 of 22
4.4. Fairness
Fairness in terms of no one obtaining intermediate results is achieved straightfor-
wardly: Voters encrypt their choices before sending, and those choices are decrypted at the
end of the voting process. The critical thing to remember here is that if someone owns a
decryption key with access to encrypted decisions, they can obtain intermediate results.
This problem is solved by distributing the key among several keyholders [41]. A system
where all the key holders are required for decryption is unreliable—if one of the key hold-
ers does not participate, decryption cannot be performed. Therefore, threshold schemes
are used whereby a specific number of key holders are required to perform decryption.
There are two main approaches for distributing the key: secret sharing, where a trusted
dealer divides the generated key into parts and distributes them among key holders (e.g.,
Shamir’s Secret Sharing protocol); and distributed key generation, where no trusted dealer
is needed, and all parties contribute to the calculation of the key (for example, Pedersen’s
Distributed Key Generation protocol).
The properties described above are the bare minimum for any voting solution. But
all the technologies mentioned above are useless if there is no trust in the system itself.
A voting system needs to be fully verifiable to earn this trust, i.e., everyone involved can
ensure that the system complies with the stated properties. Ensuring verifiability can
be split into two tasks: personal, when the voter can verify that their ballot is correctly
recorded and tallied; and universal, when everyone can prove that the system as a whole
works precisely [47]. This entails the inputs and outputs of the voting protocol stages being
published and proof of correct execution. For example, mix-networks rely on proof of
correct shuffling (a type of zero-knowledge proof), while proof of correct decryption is
also used in mix-networks and threshold decryption. The more processes that are open to
public scrutiny, the more verifiable the system is. However, online voting makes extensive
use of cryptography, and the more complex the cryptography, the more obscure it is for
most system users [48]. It may take a considerable amount of time to study the protocol
and even more to identify any vulnerabilities or backdoors, and even if the entire system is
carefully researched, there is no guarantee that the same code is used in real-time.
Last but not least are problems associated with coercion and vote-buying. Online
voting brings these problems to the next level: As ballots are cast remotely from an
uncontrolled environment, coercers and vote buyers can operate on a large scale [49]. That
is why one of the desired properties of an online voting system is coercion resistance. It is
called resistance because nothing can stop the coercer from standing behind the voter and
controlling its actions. The point here is to do as much as possible to lower the risk of mass
interference. Both kinds of malefactors—coercers and vote buyers—demand proof of how
a voter voted. That is why many types of coercion resistance voting schemes introduce the
concept of receipt-freeness.
The voter cannot create a receipt that proves how they voted. The approaches to
implementing receipt-freeness generally rely on a trusted party—either a system or device
that hides the unique parameters used to form a ballot from the voter, so the voter cannot
prove that a particular ballot belongs to them [50]. The reverse side of this approach is that
if a voter claims that their vote is recorded or tallied incorrectly, they simply cannot prove
it due to a lack of evidence.
An overview of technologies used to meet the necessary properties of online vot-
ing systems and analysis deliberately considered the properties separately [51]. When
it comes to assembling the whole protocol, most solutions introduce a trade-off. For ex-
ample, as noted for the blind signature, there is a risk that non-eligible voters will vote,
receipt-freeness contradicts verifiability, a more complex protocol can dramatically reduce
usability, etc. Furthermore, the fundamental principles of developing the solution, but
many additional aspects must be considered in a real-world system like security and
reliability of the communication protocols, system deployment procedure, access to system
components [52]. At present, no protocol satisfies all the desired properties and, therefore,
no 100% truly robust online voting system exists.
5.1. Anonymity
Throughout the polling process, the voting turnout must be secured from external
interpretation. Any correlation between registered votes and voter identities inside the
electoral structure shall be unknown [20,53].
2021, 21, 5874 10 of 23
Anonymity Accessibilit
Recoverabilit
y and
y and
Identification Reassuran
ce
Auditabilit
Availability
y and and Mobility
Accuracy
Security
Democrac Transparenc
y/Singulari y and
ty Fairness
Verifiable
participation
Vote-Privacy
/
Authenticity
Robustness Voters
and Integrity Verifiability
Main Features
Online Voting Cryptographic Consensus (Online Blockchain Voting System)
Framework Language
Platforms Algorithm Protocol Verifiability Accuracy/
Audit Anonymity Integrity Accessibility Scalability Affordability
by Voter Correctness
Follow My
Bitcoin C++/Python ECC PoW X X X X X 7 X X
Vote
Voatz Hyperledger Fabric Go/JavaScript AES/GCM PBFT X X X X X 7 X X
Private/local
Polyas NP ECC PET X X X X X 7 X NA
Blockchains
Luxoft Hyperledger Fabric Go/JavaScript ECC/ElGamal PBFT X X X X X 7 X X
Shamir’s Secret
Polys Ethereum Solidity PoW X X X X X 7 X X
Sharing
Agora Bitcoin Python ElGamal BFT-r X X X X X 7 X X
7.2. Voatz
This company established a smartphone-based voting system on blockchain to vote
remotely and anonymously and verify that the vote was counted correctly [70]. Voters
confirm their applicants and themselves on the application and give proof by an image
and their identification to include biometric confirmation that either a distinctive signature
such as fingerprints or retinal scans.
7.3. Polyas
It was founded in Finland in 1996. The company employs blockchain technology to
provide the public and private sectors with an electronic voting system [71]. Polyas has
been accredited as secure enough by the German Federal Office for Information Security for
electronic voting applications in 2016. Many significant companies throughout Germany
use Polyas to perform electronic voting systems. Polyas now has customers throughout
the United States and Europe.
7.4. Luxoft
The first customized blockchain electronic voting system used by a significant industry
was developed by the global I.T. service provider Luxoft Harding, Inc., in partnership with
the City of Zug and Lucerne University of Applied Sciences of Switzerland [72]. To drive
government adoption of blockchain-based services, Luxoft announces its commitment to
open source this platform and establishes a Government Alliance Blockchain to promote
blockchain use in public institutions.
7.5. Polys
Polys is a blockchain-based online voting platform and backed with transparent
crypto algorithms. Kaspersky Lab powers them. Polys supports the organization of polls
by student councils, unions, and associations and helps them spread electoral information
to the students [73]. Online elections with Polys lead to productivity in a community,
improve contact with group leaders, and attract new supporters [74]. Polys aims to reduce
time and money for local authorities, state governments, and other organizations by helping
them to focus on collecting and preparing proposals.
7.6. Agora
It is a group that has introduced a blockchain digital voting platform. It was estab-
lished in 2015 and partially implemented in the presidential election in Sierra Leone in
March 2018. Agora’s architecture is built on several technological innovations: a custom
blockchain, unique participatory security, and a legitimate consensus mechanism [75]. The
vote is the native token in Agora’s ecosystem. It encourages citizens and chosen bodies,
serving as writers of elections worldwide to commit to a secure and transparent electoral
process. The vote is the Agora ecosystem’s universal token.
The open vote network (OVN) was presented by [76], which is the first deployment of
a transparent and self-tallying internet voting protocol with total user privacy by using
Ethereum. In OVN, the voting size was limited to 50–60 electors by the framework. The
OVN is unable to stop fraudulent miners from corrupting the system. A fraudulent voter
may also circumvent the voting process by sending an invalid vote. The protocol does
nothing to guarantee the resistance to violence, and the electoral administrator wants to
trust [77,78].
Furthermore, since solidity does not support elliptic curve cryptography, they used an
external library to do the computation [79]. After the library was added, the voting contract
became too big to be stored on the blockchain. Since it has occurred throughout the history
of the Bitcoin network, OVN is susceptible to a denial-of-service attack [80]. Table 3 shows
the main comparison of selected electronic voting schemes based on blockchain.
Lai et al. [81] suggested a decentralized anonymous transparent electronic voting
system (DATE) requiring a minimal degree of confidence between participants. They think
that for large-scale electronic elections, the current DATE voting method is appropriate.
Unfortunately, their proposed system is not strong enough to secure from DoS attacks
because there was no third-party authority on the scheme responsible for auditing the
vote after the election process. This system is suitable only for small scales because of
the limitation of the platform [8]. Although using Ring Signature keeps the privacy of
individual voters, it is hard to manage and coordinate several signer entities. They also
use PoW consensus, which has significant drawbacks such as energy consumption: the
“supercomputers” of miners monitor a million computations a second, which is happening
worldwide. Because this arrangement requires high computational power, it is expensive
and energy-consuming.
Shahzad et al. [2] proposed the BSJC proof of completeness as a reliable electronic
voting method. They used a process model to describe the whole system’s structure. On
a smaller scale, it also attempted to address anonymity, privacy, and security problems
in the election. However, many additional problems have been highlighted. The proof of
labor, for example, is a mathematically vast and challenging job that requires a tremendous
amount of energy to complete. Another problem is the participation of a third party since
there is a significant risk of data tampering, leakage, and unfair tabulated results, all of
which may impact end-to-end verification. On a large scale, generating and sealing the
block may cause the polling process to be delayed [8].
Gao et al. [8] has suggested a blockchain-based anti-quantum electronic voting proto-
col with an audit function. They have also made modifications to the code-based Niederre-
iter algorithm to make it more resistant to quantum assaults. The Key Generation Center
(KGC) is a certificateless cryptosystem that serves as a regulator. It not only recognizes the
voter’s anonymity but also facilitates the audit’s functioning. However, an examination
of their system reveals that, even if the number of voters is modest, the security and effi-
ciency benefits are substantial for a small-scale election. If the number is high, some of the
efficiency is reduced to provide better security [82].
Yi [83] presented the blockchain-based electronic voting Scheme (BES) that offered
methods for improving electronic voting security in the peer-to-peer network using
blockchain technology. A BES is based on the distributed ledger (DLT) may be employed
to avoid vote falsification. The system was tested and designed on Linux systems in a
P2P network. In this technique, counter-measurement assaults constitute a significant
issue. This method necessitates the involvement of responsible third parties and is not
well suited to centralized usage in a system with many agents. A distributed process, i.e.,
the utilization of secure multipart computers, may address the problem. However, in this
situation, computing expenses are more significant and maybe prohibitive if the calculation
function is complex and there are too many participants. [84,85].
Sensors 2021, 21, 5874 16 of 22
Security Requirements
(Measuring on a Large Scale)
Accuracy/Correctness
Verifiability by Voter
Affordability
Consensus Hashing
Accessibility
Counting
Anonymity
Scalability
Authors Voting Scheme BC Type Framework Cryptographic Algorithm
Integrity
Algorithm Algorithm Method
Audit
Shahzad and
BSJC Private PoW Bitcoin Not specified SHA-256 3rd Party X X 7 X X 7 X 7
Crowcroft [2]
Certificateless Traceable Ring Double
Gao, Zheng [8] Anti-Quantum Public PBFT Bitcoin Self-tally X X 7 X X 7 X 7
Signature, Code-Based, ECC SHA-256
McCorry, 2 Round-zero
OVN Public Ethereum ECC Not specified Self-tally X 7 7 X 7 7 X X
Shahandashti [76] Knowledge Proof
Ring Signature, ECC,
Lai, Hsieh [81] DATE Public PoW Ethereum SHA-3 Self-tally X 7 7 X 7 X X X
Diffie-Hellman
Yi [83] BES Public PoW Bitcoin ECC SHA-256 NA X X 7 X 7 7 X X
Khan, K.M. [86] BEA Private/Public PoW Multichain Not specified Not specified NA 7 X 7 X 7 X X 7
Sensors 2021, 21, 5874 17 of 22
Khan, K.M. [86] has proposed block-based e-voting architecture (BEA) that conducted
strict experimentation with permissioned and permissionless blockchain architectures
through different scenarios involving voting population, block size, block generation rate,
and block transaction speed. Their experiments also uncovered fascinating findings of
how these parameters influence the overall scalability and reliability of the electronic
voting model, including interchanges between different parameters and protection and
performance measures inside the organization alone. In their scheme, the electoral process
requires the generation of voter addresses and candidate addresses. These addresses are
then used to cast votes from voters to candidates. The mining group updates the ledger of
the main blockchain to keep track of votes cast and the status of the vote. The voting status
remains unconfirmed until a miner updates the main ledger. The vote is then cast using
the voting machine at the polling station.
However, in this model, there are some flaws found. There is no regulatory authority
to restrict invalid voters from casting a vote, and it is not secure from quantum attach. Their
model is not accurate and did not care about voter’s integrity. Moreover, their scheme using
Distributed consensus in which testimonies (data and facts) can be organized into cartels
because fewer people keep the network active, a “51%” attack becomes easier to organize.
This attack is potentially more concentrated and did not discuss scalability and delays in
electronic voting, which are the main concerns about the blockchain voting system. They
have used the Multichain framework, a private blockchain derived from Bitcoin, which is
unsuitable for the nationwide voting process. As the authors mentioned, their system is
efficient for small and medium-sized voting environments only.
system due to the presence of the transactions involved. For this purpose, a third-party
authority required but not centralized, this third-party authority should check and balance
on privacy.
9.5. Immatureness
Blockchain is a revolutionary technology that symbolizes a complete shift to a de-
centralized network. It has the potential to revolutionize businesses in terms of strategy,
structure, processes, and culture. The current implementation of blockchain is not without
flaws. The technology is presently useless, and there is little public or professional under-
standing about it, making it impossible to evaluate its future potential. All present technical
issues in blockchain adoption are usually caused by the technology’s immaturity [94].
9.6. Acceptableness
While blockchain excels at delivering accuracy and security, people’s confidence and
trust are critical components of effective blockchain electronic voting [95]. The intricacy of
blockchain may make it difficult for people to accept blockchain-based electronic voting,
and it can be a significant barrier to ultimately adopting blockchain-based electronic voting
in general public acceptance [96]. A big marketing campaign needed for this purpose to
provide awareness to people about the benefits of blockchain voting systems, so that it will
be easy for them to accept this new technology.
10. Conclusions
The goal of this research is to analyze and evaluate current research on blockchain-
based electronic voting systems. The article discusses recent electronic voting research using
blockchain technology. The blockchain concept and its uses are presented first, followed by
existing electronic voting systems. Then, a set of deficiencies in existing electronic voting
systems are identified and addressed. The blockchain’s potential is fundamental to enhance
electronic voting, current solutions for blockchain-based electronic voting, and possible
research paths on blockchain-based electronic voting systems. Numerous experts believe
that blockchain may be a good fit for a decentralized electronic voting system.
Furthermore, all voters and impartial observers may see the voting records kept in
these suggested systems. On the other hand, researchers discovered that most publications
on blockchain-based electronic voting identified and addressed similar issues. There have
been many study gaps in electronic voting that need to be addressed in future studies.
Scalability attacks, lack of transparency, reliance on untrustworthy systems, and resistance
to compulsion are all potential drawbacks that must be addressed. As further research
is required, we are not entirely aware of all the risks connected with the security and
scalability of blockchain-based electronic voting systems. Adopting blockchain voting
methods may expose users to unforeseen security risks and flaws. Blockchain technologies
require a more sophisticated software architecture as well as managerial expertise. The
above-mentioned crucial concerns should be addressed in more depth during actual voting
Sensors 2021, 21, 5874 19 of 22
Author Contributions: Conceptualization, U.J., M.J.A.A. and Z.S.; methodology, U.J., M.J.A.A. and
Z.S.; formal analysis, U.J., M.J.A.A. and Z.S.; writing—original draft preparation, U.J. and M.J.A.A.;
writing—review and editing, U.J.; supervision, M.J.A.A. and Z.S. All authors have read and agreed
to the published version of the manuscript.
Funding: This research received no external funding.
Institutional Review Board Statement: Not applicable.
Informed Consent Statement: Not applicable.
Data Availability Statement: Not applicable.
Acknowledgments: This research was funded by the Malaysia Ministry of Education (FRGS/1/2019/
ICT01/UKM/01/2) and Universiti Kebangsaan Malaysia (PP-FTSM-2021)
Conflicts of Interest: The authors declare no conflict of interest.
References
1. Liu, Y.; Wang, Q. An E-voting Protocol Based on Blockchain. IACR Cryptol. Eprint Arch. 2017, 2017, 1043.
2. Shahzad, B.; Crowcroft, J. Trustworthy Electronic Voting Using Adjusted Blockchain Technology. IEEE Access 2019, 7, 24477–24488.
[CrossRef]
3. Racsko, P. Blockchain and Democracy. Soc. Econ. 2019, 41, 353–369. [CrossRef]
4. Yaga, D.; Mell, P.; Roby, N.; Scarfone, K. Blockchain technology overview. arXiv 2019, arXiv:1906.11078.
5. The Economist. EIU Democracy Index. 2017. Available online: https://infographics.economist.com/2018/DemocracyIndex/
(accessed on 18 January 2020).
6. Cullen, R.; Houghton, C. Democracy online: An assessment of New Zealand government web sites. Gov. Inf. Q. 2000, 17, 243–267.
[CrossRef]
7. Schinckus, C. The good, the bad and the ugly: An overview of the sustainability of blockchain technology. Energy Res. Soc. Sci.
2020, 69, 101614. [CrossRef]
8. Gao, S.; Zheng, D.; Guo, R.; Jing, C.; Hu, C. An Anti-Quantum E-Voting Protocol in Blockchain with Audit Function. IEEE Access
2019, 7, 115304–115316. [CrossRef]
9. Kim, T.; Ochoa, J.; Faika, T.; Mantooth, A.; Di, J.; Li, Q.; Lee, Y. An overview of cyber-physical security of battery management
systems and adoption of blockchain technology. IEEE J. Emerg. Sel. Top. Power Electron. 2020. [CrossRef]
10. Hang, L.; Kim, D.-H. Design and implementation of an integrated iot blockchain platform for sensing data integrity. Sensors 2019,
19, 2228. [CrossRef] [PubMed]
11. Chang, V.; Baudier, P.; Zhang, H.; Xu, Q.; Zhang, J.; Arami, M. How Blockchain can impact financial services–The overview,
challenges and recommendations from expert interviewees. Technol. Forecast. Soc. Chang. 2020, 158, 120166. [CrossRef] [PubMed]
12. Wang, B.; Sun, J.; He, Y.; Pang, D.; Lu, N. Large-scale election based on blockchain. Procedia Comput. Sci. 2018, 129, 234–237.
[CrossRef]
13. Ometov, A.; Bardinova, Y.; Afanasyeva, A.; Masek, P.; Zhidanov, K.; Vanurin, S.; Sayfullin, M.; Shubina, V.; Komarov, M.;
Bezzateev, S. An Overview on Blockchain for Smartphones: State-of-the-Art, Consensus, Implementation, Challenges and Future
Trends. IEEE Access 2020, 8, 103994–104015. [CrossRef]
14. Hakak, S.; Khan, W.Z.; Gilkar, G.A.; Imran, M.; Guizani, N. Securing smart cities through blockchain technology: Architecture,
requirements, and challenges. IEEE Netw. 2020, 34, 8–14. [CrossRef]
15. Çabuk, U.C.; Adiguzel, E.; Karaarslan, E. A survey on feasibility and suitability of blockchain techniques for the e-voting systems.
arXiv 2020, arXiv:2002.07175. [CrossRef]
16. Szabo, N. Formalizing and securing relationships on public networks. First Monday 1997, 2, 9. [CrossRef]
17. Wood, G. Ethereum: A secure decentralised generalised transaction ledger. Ethereum Proj. Yellow Pap. 2014, 151, 1–32.
18. Tan, W.; Zhu, H.; Tan, J.; Zhao, Y.; Da Xu, L.; Guo, K. A novel service level agreement model using blockchain and smart contract
for cloud manufacturing in industry 4.0. Enterp. Inf.Syst. 2021. [CrossRef]
Sensors 2021, 21, 5874 20 of 22
19. Nakamoto, S. Bitcoin: A Peer-to-Peer Electronic Cash System. Available online: https://bitcoin.org/bitcoin.pdf. (accessed on 28
July 2020).
20. Garg, K.; Saraswat, P.; Bisht, S.; Aggarwal, S.K.; Kothuri, S.K.; Gupta, S. A Comparitive Analysis on E-Voting System Using
Blockchain. In Proceedings of the 2019 4th International Conference on Internet of Things: Smart Innovation and Usages (IoT-SIU),
Ghaziabad, India, 18–19 April 2019.
21. Kamil, S.; Ayob, M.; Sheikhabdullah, S.N.H.; Ahmad, Z. Challenges in multi-layer data security for video steganography revisited.
Asia-Pacific J. Inf. Technol. Multimed 2018, 7, 53–62. [CrossRef]
22. Jaffal, R.; Mohd, B.J.; Al-Shayeji, M. An analysis and evaluation of lightweight hash functions for blockchain-based IoT devices.
Clust. Comput. 2021. [CrossRef]
23. Nofer, M.; Gomber, P.; Hinz, O.; Schiereck, D. Blockchain. Bus. Inf. Syst. Eng. 2017, 59, 183–187. [CrossRef]
24. Zhang, L.; Peng, M.; Wang, W.; Jin, Z.; Su, Y.; Chen, H. Secure and efficient data storage and sharing scheme for blockchain—Based
mobile—Edge computing. Trans. Emerg. Telecommun. Technol. 2021. [CrossRef]
25. Castro, M.; Liskov, B. Practical Byzantine Fault Tolerance. Available online: https://www.usenix.org/legacy/publications/
library/proceedings/osdi99/full_papers/castro/castro_html/castro.html. (accessed on 28 July 2020).
26. Laurie, B.; Clayton, R. Proof-of-Work Proves Not to Work. Available online: http://www.infosecon.net/workshop/downloads/
2004/pdf/clayton.pdf (accessed on 28 July 2020).
27. Prashar, D.; Jha, N.; Jha, S.; Joshi, G.; Seo, C. Integrating IOT and blockchain for ensuring road safety: An unconventional
approach. Sensors 2020, 20, 3296. [CrossRef]
28. Froomkin, A.M. Anonymity and Its Enmities. Available online: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2715621
(accessed on 28 July 2020).
29. Pawlak, M.; Poniszewska-Marańda, A. Implementation of Auditable Blockchain Voting System with Hyperledger Fabric. In
International Conference on Computational Science; Springer: Berlin/Heidelberg, Germany, 2021.
30. Jalal, I.; Shukur, Z.; Bakar, K.A.A. A Study on Public Blockchain Consensus Algorithms: A Systematic Literature Review. Preprints
2020. [CrossRef]
31. Mohanta, B.K.; Jena, D.; Panda, S.S.; Sobhanayak, S. Blockchain technology: A survey on applications and security privacy
challenges. Internet Things 2019, 8, 100107. [CrossRef]
32. Zheng, Z.; Xie, S.; Dai, H.-N.; Chen, W.; Chen, X.; Weng, J.; Imran, M. An overview on smart contracts: Challenges, advances and
platforms. Future Gener. Comput. Syst. 2020, 105, 475–491. [CrossRef]
33. Oliveira, M.T.; Carrara, G.R.; Fernandes, N.C.; Albuquerque, C.; Carrano, R.C.; Medeiros, D.S.V.; Mattos, D. Towards a
performance evaluation of private blockchain frameworks using a realistic workload. In Proceedings of the 2019 22nd Conference
on Innovation in Clouds, Internet and Networks and Workshops (ICIN), Paris, France, 19–21 February 2019.
34. Hussain, H.A.; Mansor, Z.; Shukur, Z. Comprehensive Survey And Research Directions On Blockchain Iot Access Control. Int. J.
Adv. Comput. Sci. Applications. 2021, 12, 239–244. [CrossRef]
35. Xiao, S.; Wang, X.A.; Wang, W.; Wang, H. Survey on Blockchain-Based Electronic Voting. In Proceedings of the International
Conference on Intelligent Networking and Collaborative Systems, Oita, Japan, 5–7 September 2019.
36. Imperial, M. The Democracy to Come? An Enquiry into the Vision of Blockchain-Powered E-Voting Start-Ups. Front. Blockchain
2021, 4, 17. [CrossRef]
37. Oliver, J.E. The effects of eligibility restrictions and party activity on absentee voting and overall turnout. Am. J. Political Sci. 1996,
40, 498–513. [CrossRef]
38. Ziegler, R. Voting eligibility: Strasbourg’s timidity. In the UK and European Human Rights: A Strained Relationship; Bloomsbury
Publishing: London, UK, 2015; pp. 165–191.
39. Gao, W.; Chen, L.; Rong, C.; Liang, K.; Zheng, X.; Yu, J. Security Analysis and Improvement of a Redactable Consortium
Blockchain for Industrial Internet-of-Things. Comput. J. 2021. [CrossRef]
40. Wang, W.; Xu, H.; Alazab, M.; Gadekallu, T.R.; Han, Z.; Su, C. Blockchain-Based Reliable and Efficient Certificateless Signature
for IIoT Devices. IEEE Trans. Ind. Inform. 2021. [CrossRef]
41. Fujioka, A.; Okamoto, T.; Ohta, K. A practical secret voting scheme for large scale elections. In Proceedings of the International
Workshop on the Theory and Application of Cryptographic Techniques, Queensland, Australia, 13–16 December 1992.
42. Haenni, R.; Spycher, O. Secure Internet Voting on Limited Devices with Anonymized DSA Public Keys. In Proceedings of the
2011 Conference on Electronic Voting Technology/Workshop on Trustworthy Elections, Francisco, CA, USA, 8–9 August 2011.
43. Wang, Q.; Chen, S.; Xiang, Y. Anonymous Blockchain-based System for Consortium. ACM Trans. Manag. Inf. Syst. 2021, 12, 1–25.
44. Gentry, C. A Fully Homomorphic Encryption Scheme; Stanford University: Stanford, CA, USA, 2009; Volume 20.
45. Hussien, H.; Aboelnaga, H. Design of a secured e-voting system. In Proceedings of the 2013 International Conference on
Computer Applications Technology (ICCAT), Sousse, Tunisia, 20–22 January 2013.
46. Goldreich, O.; Oren, Y. Definitions and properties of zero-knowledge proof systems. J. Cryptol. 1994, 7, 1–32. [CrossRef]
47. De Faveri, C.; Moreira, A.; Araújo, J.; Amaral, V. Towards security modeling of e-voting systems. In Proceedings of the 2016 IEEE
24th International Requirements Engineering Conference Workshops (REW), Beijing, China, 12–16 September 2016.
48. Chan, S.; Chu, J.; Zhang, Y.; Nadarajah, S. Blockchain and Cryptocurrencies. J. Risk Financ. Manag. 2020, 13, 227. [CrossRef]
49. Rawat, D.B.; Chaudhary, V.; Doku, R. Blockchain technology: Emerging applications and use cases for secure and trustworthy
smart systems. J. Cybersecur. Priv. 2021, 1, 4–18. [CrossRef]
Sensors 2021, 21, 5874 21 of 22
50. Liaw, H.-T. A secure electronic voting protocol for general elections. Comput. Secur. 2004, 23, 107–119. [CrossRef]
51. Siyal, A.A.; Junejo, A.Z.; Zawish, M.; Ahmed, K.; Khalil, A.; Soursou, G. Applications of blockchain technology in medicine and
healthcare: Challenges and future perspectives. Cryptography 2019, 3, 3. [CrossRef]
52. Ma, X.; Zhou, J.; Yang, X.; Liu, G. A Blockchain Voting System Based on the Feedback Mechanism and Wilson Score. Information
2020, 11, 552. [CrossRef]
53. Zhou, Y.; Liu, Y.; Jiang, C.; Wang, S. An improved FOO voting scheme using blockchain. Int. J. Inf. Secur. 2020, 19, 303–310.
[CrossRef]
54. Sadia, K.; Masuduzzaman, M.; Paul, R.K.; Islam, A. Blockchain-based secure e-voting with the assistance of smart contract. In
IC-BCT 2019; Springer: Berlin/Heidelberg, Germany, 2020; pp. 161–176.
55. Adeshina, S.A.; Ojo, A. Maintaining voting integrity using Blockchain. In Proceedings of the 2019 15th International Conference
on Electronics, Computer and Computation (ICECCO), Abuja, Nigeria, 10–12 December 2019.
56. Augoye, V.; Tomlinson, A. Analysis of Electronic Voting Schemes in the Real World. Available online: https://aisel.aisnet.org/
cgi/viewcontent.cgi?article=1013&context=ukais2018 (accessed on 28 July 2020).
57. Singh, N.; Vardhan, M. Multi-objective optimization of block size based on CPU power and network bandwidth for blockchain
applications. In Proceedings of the Fourth International Conference on Microelectronics, Computing and Communication
Systems, Ranchi, India, 11–12 May 2019.
58. Wei, P.; Wang, D.; Zhao, Y.; Tyagi, S.K.S.; Kumar, N. Blockchain data-based cloud data integrity protection mechanism. Future
Gener. Comput. Syst. 2020, 102, 902–911. [CrossRef]
59. Feng, Q.; He, D.; Zeadally, S.; Khan, M.K.; Kumar, N. A survey on privacy protection in blockchain system. J. Netw. Comput. Appl.
2019, 126, 45–58. [CrossRef]
60. Poniszewska-Marańda, A.; Pawlak, M.; Guziur, J. Auditable blockchain voting system-the blockchain technology toward the
electronic voting process. Int. J. Web Grid Serv. 2020, 16, 1–21. [CrossRef]
61. Okediran, O.O.; Sijuade, A.A.; Wahab, W.B. Secure Electronic Voting Using a Hybrid Cryptosystem and Steganography. J. Adv.
Math. Comput. Sci. 2019, 34, 1–26. [CrossRef]
62. Jafar, U.; Aziz, M.J.A. A State of the Art Survey and Research Directions on Blockchain Based Electronic Voting System. In
Proceedings of the International Conference on Advances in Cyber Security, Penang, Malaysia, 8–9 December 2020.
63. Dagher, G.G.; Marella, P.B.; Milojkovic, M.; Mohler, J. Broncovote: Secure Voting System Using Ethereum’s Blockchain. In
Proceedings of the 4th International Conference on Information Systems Security and Privacy, Funchal, Madeira, Portugal, 22–24
January 2018.
64. Sree, T.U.; Yerukala, N.; Tentu, A.N.; Rao, A.A. Secret Sharing Scheme Using Identity Based Signatures. In Proceedings of the
2019 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT), Tamil Nadu, India,
20–22 February 2019.
65. Meyer, M.; Smyth, B. Exploiting re-voting in the Helios election system. Inf. Process. Lett. 2019, 143, 14–19. [CrossRef]
66. Yavuz, E.; Koç, A.K.; Çabuk, U.C.; Dalkılıç, G. Towards secure e-voting using ethereum blockchain. In Proceedings of the 2018
6th International Symposium on Digital Forensic and Security (ISDFS), Antalya, Turkey, 22–25 March 2018.
67. Hanifatunnisa, R.; Rahardjo, B. Blockchain based e-voting recording system design. In Proceedings of the 2017 11th International
Conference on Telecommunication Systems Services and Applications (TSSA), Bali, Indonesia, 26–27 October 2017.
68. Hardwick, F.S.; Gioulis, A.; Akram, R.N.; Markantonakis, K. E-voting with blockchain: An e-voting protocol with decentralisation
and voter privacy. In Proceedings of the 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green
Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data
(SmartData), Halifax, NS, Canada, 30 July–3 August 2018.
69. Vote, F.M. The Secure Mobile Voting Platform Of The Future—Follow My Vote. 2020. Available online: https://followmyvote.
com/ (accessed on 26 July 2021).
70. Voatz. Voatz—Voting Redefined ®®. 2020. Available online: https://voatz.com (accessed on 28 July 2020).
71. Polyas. Polyas. 2015. Available online: https://www.polyas.com (accessed on 28 July 2020).
72. Luxoft. Luxoft. Available online: https://www.luxoft.com/ (accessed on 28 July 2020).
73. Sayyad, S.F.; Pawar, M.; Patil, A.; Pathare, V.; Poduval, P.; Sayyad, S.; Pawar, M.; Patil, A.; Pathare, V.; Poduval, P. Features of
Blockchain Voting: A Survey. Int. J. 2019, 5, 12–14.
74. Polys. Polys—Online Voting System. 2020. Available online: https://polys.me/ (accessed on 28 July 2020).
75. Agora. Agora. 2020. Available online: https://www.agora.vote (accessed on 28 July 2020).
76. McCorry, P.; Shahandashti, S.F.; Hao, F. A smart contract for boardroom voting with maximum voter privacy. In Proceedings of
the International Conference on Financial Cryptography and Data Security, Sliema, Malta, 3–7 April 2017.
77. Zhang, S.; Wang, L.; Xiong, H. Chaintegrity: Blockchain-enabled large-scale e-voting system with robustness and universal
verifiability. Int. J. Inf. Secur. 2019, 19, 323–341. [CrossRef]
78. Chaieb, M.; Koscina, M.; Yousfi, S.; Lafourcade, P.; Robbana, R. DABSTERS: Distributed Authorities Using Blind Signature to
Effect Robust Security in E-Voting. Available online: https://hal.archives-ouvertes.fr/hal-02145809/document (accessed on 28
July 2020).
79. Woda, M.; Huzaini, Z. A Proposal to Use Elliptical Curves to Secure the Block in E-voting System Based on Blockchain Mechanism.
In Proceedings of the International Conference on Dependability and Complex Systems, Wrocław, Poland, 28 June–2 July 2021.
Sensors 2021, 21, 5874 22 of 22
80. Hjálmarsson, F.Þ.; Hreiðarsson, G.K.; Hamdaqa, M.; Hjálmtýsson, G. Blockchain-based e-voting system. In Proceedings of the
2018 IEEE 11th International Conference on Cloud Computing (CLOUD), San Francisco, CA, USA, 2–7 July 2018.
81. Lai, W.J.; Hsieh, Y.C.; Hsueh, C.W.; Wu, J.L. Date: A decentralized, anonymous, and transparent e-voting system. In Proceedings
of the 2018 1st IEEE International Conference on Hot Information-Centric Networking (HotICN), Shenzhen, China, 15–17 August
2018.
82. Fernández-Caramés, T.M.; Fraga-Lamas, P. Towards Post-Quantum Blockchain: A Review on Blockchain Cryptography Resistant
to Quantum Computing Attacks. IEEE Access 2020, 8, 21091–21116. [CrossRef]
83. Yi, H. Securing e-voting based on blockchain in P2P network. EURASIP J. Wirel. Commun. Netw. 2019, 2019, 137. [CrossRef]
84. Torra, V. Random dictatorship for privacy-preserving social choice. Int. J. Inf. Secur. 2019, 19, 537–543. [CrossRef]
85. Alaya, B.; Laouamer, L.; Msilini, N. Homomorphic encryption systems statement: Trends and challenges. Comput. Sci. Rev. 2020,
36, 100235. [CrossRef]
86. Khan, K.M.; Arshad, J.; Khan, M.M. Investigating performance constraints for blockchain based secure e-voting system. Future
Gener. Comput.Syst. 2020, 105, 13–26. [CrossRef]
87. Song, J.-G.; Moon, S.-J.; Jang, J.-W. A Scalable Implementation of Anonymous Voting over Ethereum Blockchain. Sensors 2021, 21,
3958. [CrossRef] [PubMed]
88. Pawlak, M.; Poniszewska-Marańda, A.; Kryvinska, N. Towards the intelligent agents for blockchain e-voting system. Procedia
Comput.Sci. 2018, 141, 239–246. [CrossRef]
89. Ghani, A.T.A.; Zakaria, M.S. Method for designing scalable microservice-based application systematically: A case study. Int. J.
Adv. Comput. Sci. Appl. 2018, 9, 125–135. [CrossRef]
90. Javed, I.; Alharbi, F.; Bellaj, B.; Margaria, T.; Crespi, N.; Qureshi, K. Health-ID: A Blockchain-Based Decentralized Identity
Management for Remote Healthcare. Healthcare 2021, 9, 712. [CrossRef]
91. Bernabe, J.B.; Canovas, J.L.; Hernandez-Ramos, J.L.; Moreno, R.T.; Skarmeta, A. Privacy-preserving solutions for blockchain:
Review and challenges. IEEE Access 2019, 7, 164908–164940. [CrossRef]
92. Dimitriou, T. Efficient, coercion-free and universally verifiable blockchain-based voting. Comput. Netw. 2020, 174, 107234.
[CrossRef]
93. Jalal, I.; Shukur, Z.; Bakar, K.A.B.A. Validators Performance Efficiency Consensus (VPEC): A Public Blockchain. Test Eng. Manag.
2020, 83, 17530–17539.
94. Saheb, T.; Mamaghani, F.H. Exploring the barriers and organizational values of blockchain adoption in the banking industry. J.
High Technol. Manag. Res. 2021, 32, 100417. [CrossRef]
95. Wang, Y.; Gou, G.; Liu, C.; Cui, M.; Li, Z.; Xiong, G. Survey of security supervision on blockchain from the perspective of
technology. J. Inf. Secur. Appl. 2021, 60, 102859.
96. Kshetri, N.; Voas, J. Blockchain-enabled e-voting. IEEE Softw. 2018, 35, 95–99. [CrossRef]
97. Krishnan, A. Blockchain Empowers Social Resistance and Terrorism through Decentralized Autonomous Organizations. J. Strateg.
Secur. 2020, 13, 41–58. [CrossRef]