Skip to main content

Blockchain-Based Cardinal E-Voting System Using Biometrics, Watermarked QR Code and Partial Homomorphic Encryption

  • Conference paper
  • First Online:
Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media

Part of the book series: Springer Proceedings in Complexity ((SPCOM))

  • 592 Accesses

Abstract

A robust democracy cannot be concn. Therefore, we propose a privacy-preserving, cost-effective and verifiable blockchain-based electronic score voting scheme. Our framework is premised on a watermarked quick response (QR) code-based secure identification mechanism for creating a tamper-resistant biometric voter ID card. Two watermarked image shares, namely, owner and master shares, are created through XOR-based visual cryptography (VC) which are managed by the ID owner and a semi-trusted constituency authority (CA). Election Commission officer (ECO) commences the cryptographic system setup by distributing the secret key shares amongst all the CAs. First, voters show their share for their details verification and biometric authentication. If successful, they use the modified ElGamal homomorphic encryption to enable additive computations on their score votes while ensuring their secrecy. The integrity and validity of the encrypted vote are ensured through a non-interactive partial knowledge range proof (NIPKRP) based on the Pederson commitment protocol. On the counting day, the vote ciphertext en route to CA is subjected to progressive aggregation. This intra-constituency level computation follows the range voting paradigm. Then, CAs decrypt the resultant encrypted ballots and determine the winner for their respective constituencies after comparing the obtained scores. Accordingly, each CA creates and transmits an encrypted binary vector to ECO for pluralistic inter-constituency aggregation. Finally, ECO uses its secret key to decrypt the final encrypted aggregate vector to determine the majority winning party. If at least two maximum scores or seat counts come out to be identical, most significant bit (MSB) is given priority to break the tie. CAs can collaborate to verify the results by using their secret shares. Our proposed scheme facilitates secure, tamperproof and decentralized score aggregation for e-voting with a suitable tie-breaker. The efficacy and usability of the scheme have been reported with experimental results and security proofs.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Gibson, J.P., Krimmer, R., Teague, V., Pomares, J.: A review of e-voting: The past, present and future. Ann. Telecommun. 71, 279–286 (2016)

    Google Scholar 

  2. https://www.wionews.com/india-news/indias-new-electoral-reform-bill-linking-aadhaar-to-voter-ids-438840

  3. Ethereum: A Next-Generation Smart Contract and Decentralized Application Platform, Jun ’20, online: https://github.com/Ethereum/wiki/wiki

  4. Underwood, S.: Blockchain beyond bitcoin. Commun. ACM 59(11), 15–17 (2016). (WISE’18), pp 18–35, Nov

    Google Scholar 

  5. Zhang, W. et al.: A privacy-preserving voting protocol on blockchain. In: 2018 IEEE 11t ICCC (CLOUD), (2018), pp. 401–408

    Google Scholar 

  6. Yu, B. et al.: Platform-independent secure blockchain-based voting system. In: Proceedings of the International Conference on Information and Security, pp. 369–386 (2018)

    Google Scholar 

  7. Kim, T., Oh, Y., Kim, H.: Efficient privacy-preserving fingerprint-based authentication system using fully homomorphic encryption. SCN 11 (2020)

    Google Scholar 

  8. Karabat, C., Kiraz, M.S., Erdogan, H., et al.: THRIVE: threshold homomorphic encryption based secure and privacy preserving biometric verification system. EURASIP J. Adv. Signal Process. 2015, 71 (2015)

    Google Scholar 

  9. Catak, F.O., Yildirim Yayilgan, S., Abomhara, M.: A privacy-preserving fully homomorphic encryption and parallel computation based biometric data matching. Preprints (2020)

    Google Scholar 

  10. Ross, A., Othman, A.: Visual cryptography for biometric privacy. IEEE Trans. Inform. Forensics Secur. 6(1), 70–81 (2011). https://doi.org/10.1109/TIFS.2010.2097252

    Article  Google Scholar 

  11. Naor, M., Shamir, A.: Visual cryptography. In: Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques, Saint-Malo, pp. 1–12 (1995)

    Google Scholar 

  12. Hartung, F., Kutter, M.: Multimedia watermarking techniques. Proc. IEEE 87(7), 1079–1107 (1999)

    Article  Google Scholar 

  13. Hämmerle-Uhl, J., Raab, K., Uhl, A.: Watermarking as a means to enhance biometric systems: a critical survey. In: Information Hiding: Lecture Notes in Computer Science, vol. 6958. Springer, Berlin, Heidelberg (2011)

    Google Scholar 

  14. Vashistha, A., Joshi, A.M.: Fingerprint based biometric watermarking architecture using integer DCT. In: 2016 IEEE Region 10 Conference (TENCON), pp. 2818–2821 (2016). https://doi.org/10.1109/TENCON.2016.7848556

  15. Jain, A.K., Uludag, U.: Hiding biometric data. IEEE Trans. Pattern Anal. Mach. Intell. 25(11), 1494–1498 (2003)

    Article  Google Scholar 

  16. Gunjal, B.L., Mali, S.N.: Secure E-voting system with biometric and wavelet based watermarking technique in YCgCb color space. In: IET International Conference on Information Science and Control Engineering 2012 (ICISCE 2012), pp. 1–6 (2012)

    Google Scholar 

  17. Olaniyi, O.M., Folorunso, T.A., Aliyu, A., Olugbenga, J.: Design of secure electronic voting system using fingerprint biometrics and crypto-watermarking approach. Int. J. Inform. Eng. Electron. Bus. 8(5), 9 (2016)

    Google Scholar 

  18. Bousnina, N., Ghouzali, S., Mikram, M., Abdul, W.: DTCWT-DCT watermarking method for multimodal biometric authentication. In: Proceedings of the 2nd International Conference on Networking, Information Systems & Security (NISS19), pp. 1–7. Association for Computing Machinery, New York, NY, USA (2019)

    Google Scholar 

  19. Chow, Y., Susilo, W., Tonien, J., Zong, W.: A QR code watermarking approach based on the DWT-DCT technique. ACISP 2017, Auckland, New Zealand (2017)

    Google Scholar 

  20. Agrawal, A., Sethi, K., Bera, P.: IoT-based aggregate smart grid energy data extraction using image recognition and partial homomorphic encryption. In: IEEE International Conference on Advanced Networks and Telecommunications Systems (pp. 322–327) (2021)

    Google Scholar 

  21. Knirsch, F., Unterweger, A., Unterrainer, M., Engel, D.: Comparison of the Paillier and ElGamal Cryptosystems for Smart Grid Aggregation Protocols. ICISSP (2020)

    Google Scholar 

  22. Liu, Y.N., Zhao, Q.Y.: E-voting scheme using secret sharing and k-anonymity. World Wide Web 2, 1657–1667 (2018)

    Google Scholar 

  23. Li, Y.J., Ma, C.G., Huang, L.S.: An electronic voting scheme(in Chinese). J. Softw. 16(10), 1805–1810 (2005)

    Article  MathSciNet  MATH  Google Scholar 

  24. Using the following range voting system the green party of Utah elected a new slate of officers. Independent Political Rep (2017)

    Google Scholar 

  25. Cruz, J.P., Kaji, Y.: E-voting system based on the bitcoin protocol and blind signatures. Trans. Math. Model. 10(1), 14–22 (2017)

    Google Scholar 

  26. Jonker, H., Mauw, S., Pang, J.: Privacy and verifiability in voting systems: methods, developments and trends. Comput. Sci. Rev. 10, 1–30 (2013)

    Article  MATH  Google Scholar 

  27. Chaum, D.L.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24(2), 84–90 (1981)

    Article  Google Scholar 

  28. Aziz, A.A., Qunoo, H.N., Samra, A.A.: Using homomorphic cryptographic solutions on e-voting systems. Int. J. Comput. Netw. Inform. Secur. 10(1), 44–59 (2018)

    Google Scholar 

  29. Jabbar, I., Saad, N.A.: Design and implementation of secure remote e-voting system using homomorphic encryption. Int. J. Netw. Secur. 19(5), 694–703 (2017)

    Google Scholar 

  30. Hirt, M., Sako, K.: Efficient receipt-free voting based on homomorphic encryption. (EUROCRYPT’00), pp. 539–556 (2000)

    Google Scholar 

  31. Kiayias, A., Yung, M.: Self-tallying elections and perfect ballot secrecy. In: Proceedings International Workshop Public Key Cryptography, pp. 141–158 (2002)

    Google Scholar 

  32. Wu, W.C., Lin, Z.W., Wong, W.T.: Application of QR-code steganography using data embedding technique. In: Information Technology Convergence, pp. 597–605. Springer: Berlin, Germany (2013)

    Google Scholar 

  33. Seenivasagam, V., Velumani, R.: A QR code based zero-watermarking scheme for authentication of medical images in teleradiology cloud. Comput. Math. Methods Med. 516465, 16 (2013)

    Google Scholar 

  34. Kang, Q., Li, K., Yang, J.: A digital watermarking approach based on DCT domain combining qr code and chaotic theory. In: 2014 Eleventh International Conference on WOCN, pp. 1–7 (2014)

    Google Scholar 

  35. Cardamone, N., d’Amore, F.: DWT and QR Code Based Watermarking for Document DRM. IWDW

    Google Scholar 

  36. Tkachenko, I., Puech, W., Destruel, C., Strauss, O., Gaudin, J., Guichard, C.: Two level QR code for private message sharing and document authentication. IEEE Trans. IFS 11(3), 571–583 (2016)

    Google Scholar 

  37. Barmawi, A.M., Yulianto, F.A.: Watermarking QR Code. In: 2015 2nd International Conference on Information Science and Security (ICISS) (2015) pp. 1–4. https://doi.org/10.1109/ICISSEC.2015.7371041

  38. Chow, Y., Susilo, W., Tonien, J., Vlahu-Gjorgievska, E., Yang, G.: Cooperative secret sharing using QR codes and symmetric keys. Symmetry 10(4), 95 (2018)

    Google Scholar 

  39. Fathimal M., Jansirani A.: New fool proof examination system through color visual cryptography and signature authentication. Int. Arab J. Inf. Technol. 16, 66–71

    Google Scholar 

  40. Wang, D., Zhang, L., Ma, N., Li, X.: Two secret sharing schemes based on Boolean operations. Pattern Recogn. 40(10), 2776–2785 (2007)

    Article  ADS  MATH  Google Scholar 

  41. Nir, K., Jeffrey, V.: Blockchain-enabled e-voting. IEEE Softw. 35(4), 95–99 (2018)

    Article  Google Scholar 

  42. Li, Y. et al.: A blockchain-based self-tallying voting protocol in decentralized IoT. IEEE Trans. Depend. Sec. Comput. (2020)

    Google Scholar 

  43. Lee, K., James, J.I., Ejeta, T.G., Kim, H.J.: Electronic voting service using block-chain. J. Digit. Forensics, Secur. Law 11(2), 123–136 (2016)

    Google Scholar 

  44. Zhao, Z., Chan, T.H.: How to vote privately using bitcoin. 9543, pp. 82–96 (2015). https://doi.org/10.1007/978-3-319-29814-6_8

  45. Linh, V.C.T., Khoi, C.M., Chuong, D.L.B., Tuan, A.N.: Votereum: an ethereum-based evoting system. In: IEEE-RIVF’19, pp. 1–6 (2019)

    Google Scholar 

  46. Mccorry, P., Shahandashti, S.F., Hao, F.: A smart contract for boardroom voting with maximum voter privacy. In: FC’17, pp. 357–375 (2017)

    Google Scholar 

  47. Revenkar, P.S., Anjum, A., Gandhare, W.Z.: Survey of visual cryptography schemes. Int. J. Secur. Appl. 4 (2010)

    Google Scholar 

  48. Nakamoto, S.: Bitcoin: A Peer-to-Peer Electronic Cash System. BN Publishing: Hawthorne, CA, USA (2019)

    Google Scholar 

  49. ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory 31(4), 469–472 (1985)

    Google Scholar 

  50. Score Voting (2021). https://en.wikipedia.org/wiki/Scorevoting

  51. Fiat, A., Shamir, A.: How to prove yourself: Practical solutions to identification and signature problems. In: Proceedings of the Conference on the Theory and Application of Cryptographic Techniques, pp. 186–194 (1986)

    Google Scholar 

  52. Akinyele, J.A., Garman, C., Miers, I., Pagano, M.W., Rushanan, M., Green, M., Rubin, A.D.: Charm: a framework for rapidly prototyping cryptosystems. J. Crypt. Eng. pp. 111-128 (2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kamalakanta Sethi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Agrawal, A., Sethi, K., Bera, P. (2023). Blockchain-Based Cardinal E-Voting System Using Biometrics, Watermarked QR Code and Partial Homomorphic Encryption. In: Onwubiko, C., et al. Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media. Springer Proceedings in Complexity. Springer, Singapore. https://doi.org/10.1007/978-981-19-6414-5_23

Download citation

Publish with us

Policies and ethics