<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.3 20070202//EN" "journalpublishing.dtd">
<article article-type="research-article" dtd-version="2.3" xml:lang="EN" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">
<front>
<journal-meta>
<journal-id journal-id-type="publisher-id">Front. Blockchain</journal-id>
<journal-title>Frontiers in Blockchain</journal-title>
<abbrev-journal-title abbrev-type="pubmed">Front. Blockchain</abbrev-journal-title>
<issn pub-type="epub">2624-7852</issn>
<publisher>
<publisher-name>Frontiers Media S.A.</publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="publisher-id">927013</article-id>
<article-id pub-id-type="doi">10.3389/fbloc.2022.927013</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Blockchain</subject>
<subj-group>
<subject>Original Research</subject>
</subj-group>
</subj-group>
</article-categories>
<title-group>
<article-title>Paillier Cryptosystem Based ChainNode for Secure Electronic Voting</article-title>
<alt-title alt-title-type="left-running-head">Umar et al.</alt-title>
<alt-title alt-title-type="right-running-head">Paillier Cryptosystem Based Secure E-Voting</alt-title>
</title-group>
<contrib-group>
<contrib contrib-type="author" corresp="yes">
<name>
<surname>Umar</surname>
<given-names>Buhari Ugbede</given-names>
</name>
<xref ref-type="corresp" rid="c001">&#x2a;</xref>
<uri xlink:href="https://loop.frontiersin.org/people/1668828/overview"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Olaniyi</surname>
<given-names>Olayemi Mikail</given-names>
</name>
<xref ref-type="corresp" rid="c001">&#x2a;</xref>
<uri xlink:href="https://loop.frontiersin.org/people/1673627/overview"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Olajide</surname>
<given-names>Daniel Oluwaseun</given-names>
</name>
<uri xlink:href="https://loop.frontiersin.org/people/1805838/overview"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Dogo</surname>
<given-names>Eustace Manayi</given-names>
</name>
<uri xlink:href="https://loop.frontiersin.org/people/1805618/overview"/>
</contrib>
</contrib-group>
<aff>
<institution>Department of Computer Engineering</institution>, <institution>Federal University of Technology</institution>, <addr-line>Minna</addr-line>, <country>Nigeria</country>
</aff>
<author-notes>
<fn fn-type="edited-by">
<p>
<bold>Edited by:</bold> <ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/1445443/overview">Kavita Saini</ext-link>, Galgotias University, India</p>
</fn>
<fn fn-type="edited-by">
<p>
<bold>Reviewed by:</bold> <ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/1790641/overview">Manju Khari</ext-link>, Jawaharlal Nehru University, India</p>
<p>
<ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/1792309/overview">Chellammal Surianarayanan</ext-link>, Bharathidasan University, India</p>
</fn>
<corresp id="c001">&#x2a;Correspondence: Buhari Ugbede Umar, <email>buhariumar@futminna.edu.ng</email>
</corresp>
<fn fn-type="other">
<p>This article was submitted to Blockchain Technologies, a section of the journal Frontiers in Blockchain</p>
</fn>
</author-notes>
<pub-date pub-type="epub">
<day>16</day>
<month>06</month>
<year>2022</year>
</pub-date>
<pub-date pub-type="collection">
<year>2022</year>
</pub-date>
<volume>5</volume>
<elocation-id>927013</elocation-id>
<history>
<date date-type="received">
<day>23</day>
<month>04</month>
<year>2022</year>
</date>
<date date-type="accepted">
<day>18</day>
<month>05</month>
<year>2022</year>
</date>
</history>
<permissions>
<copyright-statement>Copyright &#xa9; 2022 Umar, Olaniyi, Olajide and Dogo.</copyright-statement>
<copyright-year>2022</copyright-year>
<copyright-holder>Umar, Olaniyi, Olajide and Dogo</copyright-holder>
<license xlink:href="http://creativecommons.org/licenses/by/4.0/">
<p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.</p>
</license>
</permissions>
<abstract>
<p>Blockchain is a distributed and decentralized ledger of transactions that are linked together cryptographically leading to immutability and tamper-resistance, thereby ensuring the integrity of data. Due to the ability of blockchain to guarantee the integrity of data, it has found wide-range adoption in electronic voting (e-voting) systems in recent years, this is in a bid to prevent manipulation of votes. However, due to the distributed nature of the blockchain, opportunities arise for privacy intrusion of the data being secured. The translation of this privacy flaw in blockchain to e-voting systems is the possibility of violation of the privacy of the electorates. Consequently, in a bid to achieve integrity and privacy of votes in e-voting, this study presents the use of an open-source blockchain system, coupled with a privacy-oriented cryptosystem known as the Paillier cryptosystem, towards addressing the privacy concerns of the blockchain. The performance of the system was evaluated and a transaction throughput of 1424 tps was obtained for ten thousand simulated ballot transactions. Further evaluation was carried out on the system, by increasing the number of system transactions. This showed that the mining time of the blockchain increased by an average factor of 0.18&#xa0;s for every thousand increases in the number of transactions. Also, the response time of the system to a range of user actions was evaluated over an increasing number of voters. Results obtained showed that the response time of the system for vote casting operations increased by an average of 0.33&#xa0;min per thousand voters while for vote tallying there was an increase in response time by an average of 0.848&#xa0;min per thousand voters. The scientific value of this study is the development of an integrity and privacy-preserving e-voting system consisting of an open-source nodechain coupled with a privacy-oriented cryptosystem known as the Paillier cryptosystem following the security requirements of e-voting systems. The proposed system addresses the issue of integrity in e-voting while still maintaining the privacy of the electorates.</p>
</abstract>
<kwd-group>
<kwd>e-voting</kwd>
<kwd>blockchain</kwd>
<kwd>homomorphic encryption</kwd>
<kwd>proof-of-work</kwd>
<kwd>ballot</kwd>
</kwd-group>
</article-meta>
</front>
<body>
<sec id="s1">
<title>1 Introduction</title>
<p>Electronic Voting (e-voting) is the adoption of electronic systems in aiding and supporting electoral processes, such as casting and counting votes (<xref ref-type="bibr" rid="B49">Prashantha et al., 2018</xref>). The advantages introduced into an electoral process by e-voting ranges from cost-effectiveness to efficient organization of elections (<xref ref-type="bibr" rid="B2">Alguliyev et al., 2019</xref>). Over the years, several e-voting systems have been proposed and developed by various researchers, while some have even been adopted by individuals, organizations, and countries. These e-voting systems are tending towards replacing existing conventional schemes of conducting elections (<xref ref-type="bibr" rid="B51">Risnanto et al., 2019</xref>). However, despite the merits introduced by e-voting in electoral processes, there exists a series of challenges that accompany e-voting systems. Some of these challenges include security attacks, lack of transparency, and in some cases, complexity and non-user-friendliness (<xref ref-type="bibr" rid="B30">Heiberg et al., 2015</xref>). In a bid to address the various challenges of e-voting systems, several studies have been carried out and several systems have been developed under the guidance of various functional and security requirements as established by Bungale and Sridhar (<xref ref-type="bibr" rid="B14">Bungale and Sridhar, 2016</xref>). Several technologies have been adopted by researchers in a bid to satisfy the various requirements. Cryptography is a field in mathematics and computer science, focused on the adoption of techniques for rendering data in an obfuscated manner, to allow for secure exchange between two or more parties (<xref ref-type="bibr" rid="B9">Barakat et al., 2018</xref>). It is one of the technologies that has been adopted in various forms, over the years in e-voting systems, towards achieving voter anonymity and privacy (<xref ref-type="bibr" rid="B54">Sarker et al., 2020</xref>; <xref ref-type="bibr" rid="B55">Sharma, 2016</xref>; <xref ref-type="bibr" rid="B69">Zhang et al., 2018</xref>), as well as vote auditability and verifiability (<xref ref-type="bibr" rid="B24">Gao et al., 2019</xref>; <xref ref-type="bibr" rid="B7">Bag et al., 2019</xref>; <xref ref-type="bibr" rid="B26">George et al., 2019</xref>; <xref ref-type="bibr" rid="B37">Kiayias et al., 2017</xref>).</p>
<p>In the field of computing, a technology being adopted for the protection of privacy is cryptography. Cryptography is the adoption of mathematical operations for the representation of information, in ways that are not readily usable and accessible by anyone which the information is not intended for (<xref ref-type="bibr" rid="B28">Halunen and Latvala, 2021</xref>). It has been adopted in various forms by researchers for various implementation of e-voting systems by encryption of the high-value data (votes), as can be seen in the case of (<xref ref-type="bibr" rid="B17">Darwish and Gendy, 2017</xref>; <xref ref-type="bibr" rid="B3">Almimi et al., 2019</xref>; <xref ref-type="bibr" rid="B4">Arnob et al., 2020a</xref>). However, at the point when votes are to be tallied and counted, these systems require that the encrypted data be decrypted for any meaningful computation to be carried out. This process is prone to security attacks and also a privacy flaw, hence the need for the adoption of a scheme, known as homomorphic encryption; which is a privacy-oriented scheme and can be integrated with the blockchain to help preserve the privacy of decentralized data through encryption, and at the same time allowing computations to be carried out on encrypted data without the need for the data to first of all undergo decryption. Also, e-voting systems require a <italic>&#x201c;next level of security&#x201d;</italic> which cryptography alone has not been able to provide. This <italic>&#x201c;next-level security&#x201d;</italic> is the integrity and immutability of data provided by blockchain technology (<xref ref-type="bibr" rid="B15">Christyono et al., 2021</xref>).</p>
<p>Blockchain is a distributed ledger of transactions, stored in blocks of data that are linked together cryptographically and are decentralized among various participants, resulting in the resistance to attack and immutability of such transactions (data) (<xref ref-type="bibr" rid="B29">Hanifatunnisa and Rahardjo, 2017</xref>; <xref ref-type="bibr" rid="B1">Abuidris et al., 2019</xref>; <xref ref-type="bibr" rid="B73">Zheng et al., 2017</xref>; <xref ref-type="bibr" rid="B58">Sugandh et al., 2021</xref>; <xref ref-type="bibr" rid="B18">Dayal et al., 2021</xref>; <xref ref-type="bibr" rid="B57">Nigam et al., 2022</xref>) by forcing trust among the various actors on the blockchain with the enablement of full transparency of transaction records (<xref ref-type="bibr" rid="B31">Hellani et al., 2020</xref>). Blockchain provides an improvement in the security and transparency of data records (<xref ref-type="bibr" rid="B44">Panwar et al., 2022</xref>). It is a technology being adopted in e-voting towards ensuring the integrity of electoral processes. Various implementations of blockchain technology in e-voting exists in literature, such as Ethereum (<xref ref-type="bibr" rid="B65">Yavuz et al., 2018</xref>), (<xref ref-type="bibr" rid="B50">Puneet et al., 2021</xref>), Hyperledger fabric (<xref ref-type="bibr" rid="B74">Zhou et al., 2020</xref>; <xref ref-type="bibr" rid="B16">Daramola, 2020</xref>), as well as open-source (<xref ref-type="bibr" rid="B36">Khan et al., 2018</xref>; <xref ref-type="bibr" rid="B5">Arnob et al., 2020b</xref>). Though these studies achieved immutability and integrity of the electoral process, they failed to consider the need to protect the privacy of electorates, as compensation for the privacy flaw of the blockchain (<xref ref-type="bibr" rid="B62">Wang et al., 2020</xref>).</p>
<p>Baskaran et al. in (<xref ref-type="bibr" rid="B10">Baskaran et al., 2020</xref>) established that the decentralized nature of a blockchain system provides an opportunity for identification of how transactions have taken place, which is a privacy flaw in voting. The translation of this privacy concern of the blockchain to e-voting systems is the possibility of determining how a particular electorate may have voted, which is a violation of the confidentiality and privacy requirements of e-voting systems. Therefore in the adoption of blockchain in e-voting systems, there is the need to put in place a scheme for the protection of voter privacy.</p>
<p>The contribution of this study is the proposition of an integrity and privacy-preserving e-voting system consisting of an open-source node chain coupled with a privacy-oriented cryptosystem known as the Paillier cryptosystem following the security requirements of e-voting systems (<xref ref-type="bibr" rid="B14">Bungale and Sridhar, 2016</xref>). This study takes into consideration the various techniques through which blockchain can be adopted in e-voting systems and provides insight into a suitable technique for preserving both integrity and privacy in e-voting.</p>
<p>The remaining section of the paper is organized as follows: <xref ref-type="sec" rid="s2">Section 2</xref> presents a review of existing literature together with the fundamental concepts in the adoption of blockchain for electronic voting, with emphasis on the categories of blockchain implementation in e-voting systems, as well as an analysis of the various means by which privacy can be preserved on the blockchain, as well as a review of existing literature. <xref ref-type="sec" rid="s3">Section 3</xref> gives the research method, with an illustration of the cooperation functionality of the various adopted schemes, as well as an overview of the performance metrics adopted for performance evaluation of the proposed system. <xref ref-type="sec" rid="s4">Section 4</xref> presents the results obtained from the performance evaluation, as well as the implication of the results obtained, while <xref ref-type="sec" rid="s5">Section 5</xref> lays the conclusion on findings from the study, stating the scientific contribution of the study, its limitation as well as recommendation for future research scope.</p>
</sec>
<sec id="s2">
<title>2 Fundamental Concepts and Literature Review</title>
<p>This section presents fundamental concepts in the adoption of blockchain in e-voting systems.</p>
<sec id="s2-1">
<title>2.1 E-Voting</title>
<p>E-Voting is the adoption of information and communication technology systems for supporting the casting, recording, and counting of votes in an electoral process. E-Voting systems introduce the advantages of increased voter convenience, electoral result accuracy as well as fast tabulation and counting of votes (<xref ref-type="bibr" rid="B22">for and Idea, 2011</xref>). For an e-voting system to be acceptable for use, it must satisfy some security and functional requirements, some of these requirements are (<xref ref-type="bibr" rid="B40">Liu and Wang, 2017</xref>; <xref ref-type="bibr" rid="B14">Bungale and Sridhar, 2016</xref>);<list list-type="simple">
<list-item>
<p>a. Confidentiality and Privacy: implies that the e-voting system must ensure that it is impossible to identify how or whom an electorate voted for.</p>
</list-item>
<list-item>
<p>b. Integrity: implies that the e-voting system must ensure that votes or any part of the electoral process are manipulated or compromised in any manner.</p>
</list-item>
<list-item>
<p>c. Voter Authenticity: implies that the e-voting system must adopt a mechanism for verifying the identity of an electorate.</p>
</list-item>
<list-item>
<p>d. Authority Distribution: implies that the regulatory power over the e-voting system should not depend on just one entity.</p>
</list-item>
<list-item>
<p>e. Transparency: implies that the electorates should have a general knowledge of the operation of the system and balloting procedure.</p>
</list-item>
</list>
</p>
</sec>
<sec id="s2-2">
<title>2.2 Blockchain in E-Voting</title>
<p>Blockchain is a distributed ledger system of transactions, stored in blocks of data that are linked together cryptographically and are decentralized among various participants, resulting in the resistance to attack and immutability of such transactions (data) (<xref ref-type="bibr" rid="B29">Hanifatunnisa and Rahardjo, 2017</xref>) (<xref ref-type="bibr" rid="B1">Abuidris et al., 2019</xref>; <xref ref-type="bibr" rid="B73">Zheng et al., 2017</xref>). Blockchain technology has found wide adoption in e-voting systems. The various e-voting system implementations that are based on the blockchain can be classified into three categories (<xref ref-type="bibr" rid="B67">Yu et al., 2018</xref>);</p>
</sec>
<sec id="s2-3">
<title>2.2.1 E-Voting as Smart Contracts</title>
<p>Smart contracts in blockchain refer to computer programs written to facilitate contractual terms, which are deployed on the blockchain for execution when certain predefined conditions and requirements are satisfied (<xref ref-type="bibr" rid="B33">Hu et al., 2018</xref>). Various e-voting systems have been developed as smart contracts and deployed on various blockchain platforms, as in the case of (<xref ref-type="bibr" rid="B65">Yavuz et al., 2018</xref>; <xref ref-type="bibr" rid="B32">Hj&#xe1;lmarsson et al., 2018</xref>; <xref ref-type="bibr" rid="B47">Patidar and Jain, 2019</xref>) that put forward e-voting systems as smart contracts using the Solidity language provided by the Ethereum blockchain network. Also, (<xref ref-type="bibr" rid="B38">Kirillov et al., 2019</xref>; <xref ref-type="bibr" rid="B39">Kost&#x2019;al et al., 2019</xref>; <xref ref-type="bibr" rid="B60">Vivek and Yashank, 2020</xref>), proposed e-voting systems deployed as smart contracts using the Hyperledger blockchain framework. Though the various systems offered integrity and immutability of records, however, the adoption of smart contracts entails having to maintain a public ledger that is visible to every participant in the blockchain network and translates to a privacy issue (<xref ref-type="bibr" rid="B43">Nzuva, 2019</xref>). The implication of this to its adoption in e-voting systems is the possibility of compromising voter privacy. Also, there is the issue of resistance of smart contracts to the amendment of contractual terms and conditions, which does not allow for the reflection of real-life dynamics and changing conditions (<xref ref-type="bibr" rid="B43">Nzuva, 2019</xref>). The translation of this to the various e-voting systems that have adopted this approach, is the inability to introduce into the system, the dynamics that may occur in electoral processes.</p>
</sec>
<sec id="s2-4">
<title>2.2.2 E-Voting Through Cryptocurrency</title>
<p>Cryptocurrencies are assets based on a blockchain system, which adopt cryptography for securing the exchange and transfer of such assets, between the participants of the blockchain system (<xref ref-type="bibr" rid="B27">Giudici et al., 2019</xref>). E-Voting protocols have also been developed to adopt the use of cryptocurrency in electoral processes, as in the case of (<xref ref-type="bibr" rid="B72">Zhao and Chan, 2016</xref>; <xref ref-type="bibr" rid="B35">Jason and Yuichi, 2016</xref>; <xref ref-type="bibr" rid="B8">Bao et al., 2018</xref>) that adopted the bitcoin for developing an e-voting system protocol, as well as (<xref ref-type="bibr" rid="B23">Fusco et al., 2018</xref>) that adopted cryptocurrency from a permissioned blockchain system to support e-voting. These systems achieved decentralization of authority, immutability as well as public verifiability of the electoral process. However, the adoption of cryptocurrency in e-voting does not protect the privacy of electorates (<xref ref-type="bibr" rid="B21">Fleder et al., 2015</xref>). Also, the adoption of cryptocurrency introduces a bottleneck in the number of transactions (votes) that can be processed at a time by the system, as in the case of bitcoin, due to its slow transaction rate (<xref ref-type="bibr" rid="B53">S&#xe4;nger, 2019</xref>).</p>
</sec>
<sec id="s2-5">
<title>2.2.3 E-Voting With Blockchain as Ballot-Box</title>
<p>In traditional voting systems, ballot-box refers to storage boxes into which ballots are cast by electorates during an electoral process. There are e-voting systems that have adopted a seemingly ballot-box approach in the adoption of blockchain for securing the electoral process. In such e-voting systems, votes (ballots) are digital messages of a predefined structure, which are sent as transactions to the blockchain (<xref ref-type="bibr" rid="B56">Sheer Hardwick et al., 2018</xref>). Various researchers have adopted this approach in developing blockchain-based e-voting systems as in the case of (<xref ref-type="bibr" rid="B56">Sheer Hardwick et al., 2018</xref>; <xref ref-type="bibr" rid="B61">Wang et al., 2018</xref>). This approach allows for the blockchain-based e-voting system to be developed to reflect real-life features and dynamics of e-voting systems, as well as an avenue for coupling a privacy-oriented encryption scheme with the blockchain system (<xref ref-type="bibr" rid="B11">Bellini et al., 2020</xref>). As such this study goes on to adopt this approach in developing an e-voting system.</p>
</sec>
<sec id="s2-6">
<title>2.3 Privacy Protection in Blockchain</title>
<p>Several schemes have been developed to address the privacy concerns of the blockchain. These schemes are classified into two main categories (<xref ref-type="bibr" rid="B20">Feng et al., 2019</xref>):</p>
</sec>
<sec id="s2-7">
<title>2.3.1 Identity Privacy Preservation Schemes</title>
<p>This is the category of blockchain privacy preservation schemes are aimed at the protection of addresses (identity) of senders and receivers of assets (such as cryptocurrency) exchanged on a blockchain system (<xref ref-type="bibr" rid="B20">Feng et al., 2019</xref>). Schemes under this approach include; Ring signature, Non-interactive Zero-Knowledge proof (NIZKP), and Mixing services. This category of schemes is not suitable for the preservation of privacy in a blockchain as a ballot-box e-voting system.</p>
</sec>
<sec id="s2-8">
<title>2.3.2 Transaction Privacy Preservation Schemes</title>
<p>This category of blockchain privacy preservation schemes aims at protecting the actual content of the transactions that take place on a blockchain system (<xref ref-type="bibr" rid="B20">Feng et al., 2019</xref>). Privacy preservation schemes in this category are:<list list-type="simple">
<list-item>
<p>a. Non-Interactive Zero-Knowledge Proof (NIZKP): is a scheme that allows for a party (prover) to prove to another party (verifier), the validity of a statement, without having to reveal any other information, through a process that does not involve interaction between the two parties (<xref ref-type="bibr" rid="B13">Blazy, 2012</xref>; <xref ref-type="bibr" rid="B46">Partala et al., 2020</xref>). NIZKP has been adopted in several blockchain-based e-voting systems (<xref ref-type="bibr" rid="B52">Sallal, 2019</xref>; <xref ref-type="bibr" rid="B32">Hj&#xe1;lmarsson et al., 2018</xref>). Though these systems guaranteed security, transparency as well as protection of voter privacy in e-voting, however, these approach suffers from scalability issues due to the enormous and massive computation cost requirements of generating the proofs (<xref ref-type="bibr" rid="B25">George and Samman, 2016</xref>; <xref ref-type="bibr" rid="B12">Bhardwaj, 2020</xref>).</p>
</list-item>
<list-item>
<p>b. Homomorphic Encryption: is a cryptographic scheme that allows certain computations to be carried out directly on ciphertext, without the need for initial decryption. The results obtained from such computations is a ciphertext which when decrypted, produces identical results as when the computations are performed on the plaintext (<xref ref-type="bibr" rid="B71">Zhang et al., 2020</xref>). Homomorphic encryption schemes can be classified into two categories, which are; Partially Homomorphic Encryption and Fully Homomorphic Encryption. Because the e-voting system would require only the addition of the ballots, a partially homomorphic encryption scheme is suitable for adoption in this study, due to the performance and protection it offers in place of utility functionality (<xref ref-type="bibr" rid="B63">Will and Ko, 2015</xref>).</p>
</list-item>
</list>
</p>
</sec>
<sec id="s2-9">
<title>2.4. Literature Review</title>
<p>(<xref ref-type="bibr" rid="B34">Jabbar and Alsaad, 2017</xref>) proposed a remote electronic voting system using the ElGamal cryptosystem for ensuring the security of votes. The system ensured the preservation of ballot privacy. However, the adopted ElGamal cryptosystem was, slow in performance during the encryption of votes. Also, (<xref ref-type="bibr" rid="B42">Mustafa and Waheed, 2021</xref>), developed an e-voting system using the permissioned Hyperledger Fabric (HLF) platform. The system adopted a blind signature scheme and Zero-Knowledge Proof (ZKP) to establish security, transparency, and privacy. However, the adoption of multiple identities obscuring schemes meant that the system traded performance for voter privacy. Also, an e-voting system with a universal verifiable voting vector was proposed by (<xref ref-type="bibr" rid="B75">Zou et al., 2017</xref>) to allow for the verification of ballots. The system ensured transparency and auditability of the entire ballot process. The system however failed to put in place modalities for the protection of voter privacy and confidentiality. (<xref ref-type="bibr" rid="B48">Pawlak et al., 2018</xref>) proposed a schema for the development of auditable and end-to-end verifiable e-voting systems through the adoption of multiple intelligent agent nodes, namely; super-node, polling stations, and trusted nodes. At the end of the election, the votes at the trusted and super-node chain are tallied and counted accordingly. The system allowed for suitability of the electoral process, however, it prioritized certain nodes in the blockchain network over others, causing some nodes to have outsized influence over the entire network, leaving room for manipulation of the electoral process. Wu, (<xref ref-type="bibr" rid="B64">Wu, 2017</xref>), implemented an e-voting system based on a private blockchain system with a three-entity model, namely the voters, registration authority, and election authority, all subject to public supervision. It also implemented ring signature together with RSA cryptosystem for unforgeability of ballots. The system ensured ballot anonymity. However, due to the decentralized nature of the blockchain system, it would be possible for the permitted participants of the blockchain to view the ledger of the blockchain and find out how voters had voted. Consequently, Liu and Wang, (<xref ref-type="bibr" rid="B40">Liu and Wang, 2017</xref>), proposed an e-voting system based on Proof-of-Stake (PoS) consensus Blockchain, with a blind signature. The system ensured, transparency and immutability of ballots. The adoption of Proof-of-Stake consensus by the system meant the need to prioritize some nodes of the blockchain over others, meaning that some nodes would have an outsized influence on the network (<xref ref-type="bibr" rid="B68">Zamostin, 2019</xref>). Similarly, Zhang et al. (<xref ref-type="bibr" rid="B70">Zhang et al., 2019</xref>) introduced an e-voting system based on the public Ethereum Blockchain system with message authentication and transmission mechanism, to prevent forging of ballots, together with Blind signature, for validation of message authenticity. The system ensured the prevention of vote manipulation with proper decentralization of authority. However, the adoption of public Ethereum meant that payments had to be made (in gas) equivalent to the amount of work done in mining the e-voting smart contract, thus, incurring additional expenses for the conduct of elections.</p>
<p>Yi, (<xref ref-type="bibr" rid="B66">Yi, 2019</xref>), also designed an e-voting system based on a private blockchain using a synchronized model of distributed ledger technology (DLT) for the prevention of ballot forgery and elliptic curve encryption of voter credentials, to provide authentication and non-repudiation. The distributed nature of the blockchain ledger however meant that the permitted participants of the blockchain were able to view how voters have voted, which is a privacy flaw. Consequently, Mohammedali and Al-Sherbaz, (<xref ref-type="bibr" rid="B41">Mohammedali and Al-Sherbaz, 2019</xref>), put forward an e-voting framework based on a private blockchain, coupled with an elliptic curve algorithm. The system achieved transparent balloting (casting of votes), there was, however, no proper decentralization of authority which gives room for manipulation of the integrity of ballots. Arun et al., (<xref ref-type="bibr" rid="B6">Arun, 2019</xref>), developed an e-voting system based on the currency transaction approach on the Ethereum blockchain, by the allocation of a digital coin to cryptographic wallets assigned to each voter. The system achieved audibility and transparency with the immutability of votes, however, failed to put in place considerations for the protection of the confidentiality of votes. Thereafter, Park, (<xref ref-type="bibr" rid="B45">Park, 2019</xref>), put forward the adoption of a decentralized Proof-of-Work (PoW) consensus-based blockchain for decentralization in an e-voting system. Though the system achieved immutability of votes, the permissioned nodes on the blockchain could probe the ledger of transactions to see how electorates had voted, thereby compromising the privacy of the electorates.</p>
<p>After a careful review of the literature, it can be seen that the adoption of blockchain in e-voting systems guarantees integrity with the possibility of compromising the confidentiality of electorates. There is therefore the need to adopt a technique that ensures the protection of the confidentiality of the blockchain system. The following section, therefore, describes the technique adopted in this study for achieving the goal of protection of confidentiality with integrity in e-voting.</p>
</sec>
</sec>
<sec id="s3">
<title>3 Research Method</title>
<p>This section describes the technique adopted in developing the e-voting system, with emphasis on the open-source blockchain system, the proof-of-work consensus, privacy preservation through the Paillier homomorphic encryption, the system architecture, deployment, as well as the metrics for evaluation of its performance.</p>
<sec id="s3-1">
<title>3.1 Ballot Structure</title>
<p>
<xref ref-type="fig" rid="F1">Figure 1</xref> gives an illustration of the structure of the ballots which will be passed as transactions to the blockchain serving as a ballot box. Consider an election with contestants <italic>A, B, &#x2026; , P</italic> and electorates, <italic>W, X, Y, Z.</italic>
</p>
<fig id="F1" position="float">
<label>FIGURE 1</label>
<caption>
<p>Ballot structure.</p>
</caption>
<graphic xlink:href="fbloc-05-927013-g001.tif"/>
</fig>
<p>The ballot cast by each of the electorates is structured such that a voter cast a value of one for the contestant of their choice, and casts a value of zero for all of the other contestants in an array. Meaning that the ballot cast by each of the electorates is an array with a length equal to the number of contestants, <italic>P</italic> in the election. Taking an electorate, <italic>W</italic> that cast a ballot, <italic>B</italic>
<sub>
<italic>WN</italic>,</sub> for a candidate, <italic>C</italic>
<sub>
<italic>S</italic>
</sub> then;<disp-formula id="e1">
<mml:math id="m1">
<mml:mrow>
<mml:msub>
<mml:mi mathvariant="bold-italic">B</mml:mi>
<mml:mrow>
<mml:mi mathvariant="bold-italic">WN</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mi mathvariant="bold-italic">&#xa0;&#xa0;</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mi mathvariant="bold-italic">&#xa0;</mml:mi>
<mml:mrow>
<mml:mo>[</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mi mathvariant="bold-italic">V</mml:mi>
<mml:mrow>
<mml:mi mathvariant="bold-italic">WA</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:mi mathvariant="bold-italic">&#xa0;</mml:mi>
<mml:msub>
<mml:mi mathvariant="bold-italic">V</mml:mi>
<mml:mrow>
<mml:mi mathvariant="bold-italic">WB</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:mi mathvariant="bold-italic">&#xa0;</mml:mi>
<mml:mo>&#x2026;</mml:mo>
<mml:mo>,</mml:mo>
<mml:mi mathvariant="bold-italic">&#xa0;</mml:mi>
<mml:msub>
<mml:mi mathvariant="bold-italic">V</mml:mi>
<mml:mrow>
<mml:mi mathvariant="bold-italic">WP&#xa0;</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mo>]</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
<label>(1)</label>
</disp-formula>such that; <disp-formula id="e2">
<mml:math id="m2">
<mml:mrow>
<mml:mrow>
<mml:mo>&#x7c;</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mi mathvariant="bold-italic">B</mml:mi>
<mml:mrow>
<mml:mi mathvariant="bold-italic">WN</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mo>&#x7c;</mml:mo>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:mi mathvariant="bold-italic">P</mml:mi>
</mml:mrow>
</mml:math>
<label>(2)</label>
</disp-formula>and; <disp-formula id="e3">
<mml:math id="m3">
<mml:mrow>
<mml:msub>
<mml:mi mathvariant="bold-italic">B</mml:mi>
<mml:mrow>
<mml:mi mathvariant="bold-italic">WN</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mi mathvariant="bold-italic">&#xa0;</mml:mi>
<mml:mrow>
<mml:mo>{</mml:mo>
<mml:mrow>
<mml:mtable>
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:mn mathvariant="bold">0</mml:mn>
<mml:mo>&#xa0;</mml:mo>
<mml:mo>;</mml:mo>
<mml:mo>&#xa0;</mml:mo>
<mml:mi mathvariant="bold-italic">N</mml:mi>
<mml:mo>&#xa0;</mml:mo>
<mml:mo>&#x2260;</mml:mo>
<mml:msub>
<mml:mi mathvariant="bold-italic">C</mml:mi>
<mml:mi mathvariant="bold-italic">s</mml:mi>
</mml:msub>
</mml:mrow>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:mn mathvariant="bold">1</mml:mn>
<mml:mo>&#xa0;</mml:mo>
<mml:mo>;</mml:mo>
<mml:mi mathvariant="bold-italic">N</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:msub>
<mml:mi mathvariant="bold-italic">C</mml:mi>
<mml:mi mathvariant="bold-italic">s</mml:mi>
</mml:msub>
</mml:mrow>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mrow>
</mml:mrow>
</mml:mrow>
</mml:math>
<label>(3)</label>
</disp-formula>
</p>
<p>After a voter has cast their ballot, <italic>B</italic>
<sub>
<italic>WN,</italic>
</sub> there is a need to preserve the confidentiality of the ballot through the process of encryption. This is done by the adoption of Paillier homomorphic encryption, which provides additive homomorphism needed to tally and sum together the encrypted votes. <xref ref-type="sec" rid="s3-2">Section 3.2</xref> provides insight into how this is achieved.</p>
</sec>
<sec id="s3-2">
<title>3.2 Paillier Homomorphic Encryption</title>
<p>Paillier homomorphic encryption is a partially homomorphic encryption scheme that supports additive homomorphism, which is an operation that allows two ciphertexts to be multiplied, resulting in a ciphertext whose decryption is a sum of the corresponding plaintexts. Consider a scenario with two data, <italic>D</italic>
<sub>
<italic>1</italic>
</sub> and <italic>D</italic>
<sub>
<italic>2</italic>
</sub>, both subjected to Paillier encryption operation, <italic>E</italic>, using a public encryption key (<italic>n, g</italic>), thereby producing two separate ciphertext values, C<sub>D1</sub> and C<sub>D2,</sub> such that;<disp-formula id="e4">
<mml:math id="m4">
<mml:mrow>
<mml:msub>
<mml:mi mathvariant="bold-italic">C</mml:mi>
<mml:mrow>
<mml:mi mathvariant="bold-italic">D</mml:mi>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mi mathvariant="bold-italic">E</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mi mathvariant="bold-italic">D</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:mi mathvariant="bold-italic">&#xa0;</mml:mi>
<mml:msub>
<mml:mi mathvariant="bold-italic">S</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
<label>(4)</label>
</disp-formula>and;<disp-formula id="e5">
<mml:math id="m5">
<mml:mrow>
<mml:msub>
<mml:mi mathvariant="bold-italic">C</mml:mi>
<mml:mrow>
<mml:mi mathvariant="bold-italic">D</mml:mi>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mi mathvariant="bold-italic">E</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mi mathvariant="bold-italic">D</mml:mi>
<mml:mn>2</mml:mn>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:mi mathvariant="bold-italic">&#xa0;</mml:mi>
<mml:msub>
<mml:mi mathvariant="bold-italic">S</mml:mi>
<mml:mn>2</mml:mn>
</mml:msub>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
<label>(5)</label>
</disp-formula>where; <italic>S</italic>
<sub>
<italic>1</italic>
</sub> and <italic>S</italic>
<sub>
<italic>2</italic>
</sub> are two randomly selected integer values, such that;<disp-formula id="e6">
<mml:math id="m6">
<mml:mrow>
<mml:mn>0</mml:mn>
<mml:mi mathvariant="bold-italic">&#xa0;</mml:mi>
<mml:mo>&#x3c;</mml:mo>
<mml:mi mathvariant="bold-italic">&#xa0;S&#xa0;</mml:mi>
<mml:mo>&#x3c;</mml:mo>
<mml:mi mathvariant="bold-italic">&#xa0;n</mml:mi>
</mml:mrow>
</mml:math>
<label>(6)</label>
</disp-formula>
</p>
<p>This encryption protocol is adopted for the encryption of each voter ballot, <italic>B</italic>
<sub>
<italic>WN</italic>
</sub>, as specified in <xref ref-type="disp-formula" rid="e1">Eq. 1</xref>, such that encryption of the ballot of an electorate, <italic>W</italic> is given by;<disp-formula id="e7">
<mml:math id="m7">
<mml:mrow>
<mml:mi mathvariant="bold-italic">&#xa0;</mml:mi>
<mml:msub>
<mml:mi mathvariant="bold-italic">C</mml:mi>
<mml:mrow>
<mml:mi mathvariant="bold-italic">DWN</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mi mathvariant="bold-italic">E&#xa0;</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:msub>
<mml:mi mathvariant="bold-italic">B</mml:mi>
<mml:mrow>
<mml:mi mathvariant="bold-italic">WN</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mi mathvariant="bold-italic">&#xa0;</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi mathvariant="bold-italic">&#xa0;S</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
<label>(7)</label>
</disp-formula>
<disp-formula id="e8">
<mml:math id="m8">
<mml:mrow>
<mml:msub>
<mml:mi mathvariant="bold-italic">C</mml:mi>
<mml:mrow>
<mml:mi mathvariant="bold-italic">DWN</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mrow>
<mml:mo>[</mml:mo>
<mml:mi mathvariant="bold-italic">E</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mrow>
<mml:mo>[</mml:mo>
<mml:mrow>
<mml:mi mathvariant="bold-italic">&#xa0;</mml:mi>
<mml:msub>
<mml:mi mathvariant="bold-italic">V</mml:mi>
<mml:mrow>
<mml:mi mathvariant="bold-italic">WA</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mo>]</mml:mo>
</mml:mrow>
</mml:mrow>
<mml:mo>,</mml:mo>
<mml:mi mathvariant="bold-italic">&#xa0;S</mml:mi>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>,</mml:mo>
<mml:mi mathvariant="bold-italic">&#xa0;E</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mrow>
<mml:mo>[</mml:mo>
<mml:mrow>
<mml:mi mathvariant="bold-italic">&#xa0;</mml:mi>
<mml:msub>
<mml:mi mathvariant="bold-italic">V</mml:mi>
<mml:mrow>
<mml:mi mathvariant="bold-italic">WB</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mo>]</mml:mo>
</mml:mrow>
<mml:mo>,</mml:mo>
<mml:mi mathvariant="bold-italic">&#xa0;S</mml:mi>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>,</mml:mo>
<mml:mi mathvariant="bold-italic">&#xa0;</mml:mi>
<mml:mo>&#x2026;</mml:mo>
<mml:mo>,</mml:mo>
<mml:mi mathvariant="bold-italic">&#xa0;E</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mrow>
<mml:mo>[</mml:mo>
<mml:mrow>
<mml:mi mathvariant="bold-italic">&#xa0;</mml:mi>
<mml:msub>
<mml:mi mathvariant="bold-italic">V</mml:mi>
<mml:mrow>
<mml:mi mathvariant="bold-italic">WP</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mo>]</mml:mo>
</mml:mrow>
<mml:mo>,</mml:mo>
<mml:mi mathvariant="bold-italic">&#xa0;S</mml:mi>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>]</mml:mo>
</mml:mrow>
</mml:math>
<label>(8)</label>
</disp-formula>
</p>
<p>The value of <italic>C</italic>
<sub>
<italic>DWN</italic>,</sub> as specified in <xref ref-type="disp-formula" rid="e8">Eq. 8</xref> is the ballot transaction that is then sent by each electorate to the blockchain system which serves as a ballot box for e-voting.</p>
<p>After encrypting the ballots and committing the encrypted ballots to the blockchain, at the end of the electoral process, there is a need to tally and count the casted votes. Since the votes have been encrypted homomorphically, the Paillier cryptosystem provides additive homomorphism which allows computations to be carried out on encrypted data without the need for initial decryption. <xref ref-type="sec" rid="s3-2-1">Section 3.2.1</xref> provides further insight into how additive homomorphism is achieved.</p>
<sec id="s3-2-1">
<title>3.2.1 Additive Homomorphism Protocol</title>
<p>At the end of the electoral process, the encrypted voter ballot transactions are obtained from the blockchain ballot box and aligned for homomorphic addition. <xref ref-type="fig" rid="F2">Figure 2</xref> illustrates the process of homomorphic addition of the ballots.</p>
<fig id="F2" position="float">
<label>FIGURE 2</label>
<caption>
<p>Additive homomorphism.</p>
</caption>
<graphic xlink:href="fbloc-05-927013-g002.tif"/>
</fig>
<p>The encrypted ballots are aligned and summed together through additive homomorphism, thereby obtaining a final encrypted sum, which is then decrypted to get the results of the election. The integrity and decentralization of the entire electoral process are achieved by the adoption of an open-source blockchain system as further described in <xref ref-type="sec" rid="s3-3">section 3.3</xref>.</p>
</sec>
</sec>
<sec id="s3-3">
<title>3.3 Node.js Open-Source Blockchain</title>
<p>Open source blockchain repository provided by (<xref ref-type="bibr" rid="B19">Emiceli, 2019</xref>; <xref ref-type="bibr" rid="B59">Traub, 2018</xref>), both implemented using Node. js (a back-end and cross-platform runtime environment), were adopted for developing a private blockchain system on which the e-voting system is based. In the blockchain, transactions are placed in blocks that contain;<list list-type="simple">
<list-item>
<p>a. A pseudonymous blockchain address of an electorate, with the prefix, 0x00FUTMCPE.</p>
</list-item>
<list-item>
<p>b. The pseudonymous blockchain address of the electorate authority, admin.</p>
</list-item>
<list-item>
<p>c. SHA256 digest (hash) of the previous block of transaction.</p>
</list-item>
<list-item>
<p>d. Transaction ID.</p>
</list-item>
<list-item>
<p>e. Nonce.</p>
</list-item>
<list-item>
<p>f. Ballot transactions in the form illustrated in (8).</p>
</list-item>
<list-item>
<p>g. SHA256 digest (hash) of the new block of transaction.</p>
</list-item>
</list>
</p>
<p>The blockchain system verifies the authenticity of transactions being carried out through the adoption of a consensus protocol. This consensus protocol is the backbone of the blockchain which helps prevent bad actors (nodes) from tampering with the blockchain. The consensus protocol in use in the adopted blockchain is further described in <xref ref-type="sec" rid="s3-3-1">Section 3.3.1</xref>.</p>
<sec id="s3-3-1">
<title>3.3.1 Blockchain Proof-Of-Work Consensus and Mining Protocol</title>
<p>The blockchain system adopts the Proof-of-Work consensus mechanism. <xref ref-type="fig" rid="F3">Figure 3</xref> gives an illustration of the consensus mechanism used in mining new blocks of transactions.</p>
<fig id="F3" position="float">
<label>FIGURE 3</label>
<caption>
<p>Proof-of-work (PoW) consensus.</p>
</caption>
<graphic xlink:href="fbloc-05-927013-g003.tif"/>
</fig>
<p>The process begins by combining the hash of the previous block with the hash of the new block, together with a nonce value, which increments successively, until the prefix value of the SHA256 function is equal to the required hash prefix. If the process is not successful, then the nonce value is incremented, and the process is repeated until the process is successful. Then the nonce value is returned by the consensus, and the new block of the transaction can be added to the ledger of the blockchain. The various schemes adopted for the realization of the e-voting system are carefully put together following the system architecture laid out in <xref ref-type="sec" rid="s3-4">section 3.4</xref>.</p>
</sec>
</sec>
<sec id="s3-4">
<title>3.4. System Architecture</title>
<p>
<xref ref-type="fig" rid="F4">Figure 4</xref> shows the architecture of the system. At the core is the blockchain private blockchain system, which maintains a ledger. At the polling unit, the voters (electorates) cast their ballots, in the form specified in <xref ref-type="disp-formula" rid="e1">Eq. 1</xref>, after which the ballots are encrypted homomorphically, thereby transforming the ballots into the structure specified in <xref ref-type="disp-formula" rid="e8">Eq. 8</xref>. A new block of the transaction is then created, containing; the encrypted ballots, the pseudonymous address of the voter and the admin, the timestamp of the block creation, the hash of the previous block of the transaction, as well as the hash of the current block. Then the new block of the transaction is mined using the consensus mechanism as illustrated in <xref ref-type="fig" rid="F3">Figure 3</xref>. After mining, the new block is committed to the ledger of the blockchain.</p>
<fig id="F4" position="float">
<label>FIGURE 4</label>
<caption>
<p>System architecture.</p>
</caption>
<graphic xlink:href="fbloc-05-927013-g004.tif"/>
</fig>
<p>This process continues, until the end of the election when the electoral authority decides to end the election. Then the admin, by additive homomorphism, tallies the encrypted votes, thereby obtaining a final encrypted sum that can be decrypted to obtain the results of the election. The electoral authority can then proceed to make the result of the election public, by sending it to the email address of all the electorates that voted in the election.</p>
<sec id="s3-4-1">
<title>3.4.1. Heroku Free-Tier Server Deployment</title>
<p>The blockchain was deployed on the cloud as a web app on the Heroku cloud application platform, using free tier hosting, which provides 512&#xa0;MB of RAM with two process types. The block ledger of the blockchain is made public and can be accessed from anywhere, over the internet using the link, <ext-link ext-link-type="uri" xlink:href="https://cpemachines.herokuapp.com/blockledger">https://cpemachines.herokuapp.com/blockledger</ext-link>.</p>
</sec>
</sec>
<sec id="s3-5">
<title>3.5. System Testing</title>
<p>This section explains how the performance of the system was evaluated in terms of the transaction throughput of the blockchain, as well as the system&#x2019;s response time to various user actions. The sequence of actions taken to test and evaluate the performance of the system is given below; <list list-type="simple">
<list-item>
<p>Step -1: An API endpoint was developed on the blockchain, to allow for simulation of a varying number of transactions, which is accessed through a webpage interface as can be seen in <xref ref-type="fig" rid="F5">Figure 5</xref>.</p>
</list-item>
<list-item>
<p>Step -2: The console output function was invoked within the API to provide a real-time indication of the time taken to mine the various number of transactions.</p>
</list-item>
<list-item>
<p>Step -3: The command-line interface (CLI) window of the cloud-hosted e-voting platform was opened as shown in <xref ref-type="fig" rid="F6">Figure 6</xref>.</p>
</list-item>
<list-item>
<p>Step -4: The simulation webpage interface is opened up and by using the provided input section, values for a varying number of transactions were entered, with simulation carried out repeatedly and the average for the various repetitions was computed.</p>
</list-item>
<list-item>
<p>Step -5: By subjecting the obtained values to a graph plotting software (Origin pro), the results obtained from the testing are shown in <xref ref-type="fig" rid="F7">Figure 7</xref>.</p>
</list-item>
<list-item>
<p>Step -6: Also, the response time values for the various user actions were noted from the CLI window, with the average value computed for each time the simulation for carried out.</p>
</list-item>
<list-item>
<p>Step -7: The obtained response time values for the user operations are summarized in <xref ref-type="table" rid="T1">Table 1</xref>.</p>
</list-item>
</list>
</p>
<fig id="F5" position="float">
<label>FIGURE 5</label>
<caption>
<p>System testing interface.</p>
</caption>
<graphic xlink:href="fbloc-05-927013-g005.tif"/>
</fig>
<fig id="F6" position="float">
<label>FIGURE 6</label>
<caption>
<p>Heroku CLI window of the developed system.</p>
</caption>
<graphic xlink:href="fbloc-05-927013-g006.tif"/>
</fig>
<fig id="F7" position="float">
<label>FIGURE 7</label>
<caption>
<p>Blockchain transaction throughput.</p>
</caption>
<graphic xlink:href="fbloc-05-927013-g007.tif"/>
</fig>
<table-wrap id="T1" position="float">
<label>TABLE 1</label>
<caption>
<p>System Response Time for various user actions.</p>
</caption>
<table>
<thead valign="top">
<tr>
<th align="left">Number of voters</th>
<th align="center">Vote casting (min)</th>
<th align="center">Vote tallying (min)</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td align="left">1,000</td>
<td align="char" char=".">0.01</td>
<td align="char" char=".">0.17</td>
</tr>
<tr>
<td align="left">2,000</td>
<td align="char" char=".">0.04</td>
<td align="char" char=".">0.23</td>
</tr>
<tr>
<td align="left">3,000</td>
<td align="char" char=".">0.08</td>
<td align="char" char=".">0.46</td>
</tr>
<tr>
<td align="left">4,000</td>
<td align="char" char=".">0.12</td>
<td align="char" char=".">0.53</td>
</tr>
<tr>
<td align="left">5,000</td>
<td align="char" char=".">0.23</td>
<td align="char" char=".">0.78</td>
</tr>
<tr>
<td align="left">6,000</td>
<td align="char" char=".">0.34</td>
<td align="char" char=".">0.81</td>
</tr>
<tr>
<td align="left">7,000</td>
<td align="char" char=".">0.45</td>
<td align="char" char=".">1.20</td>
</tr>
<tr>
<td align="left">8,000</td>
<td align="char" char=".">0.62</td>
<td align="char" char=".">1.33</td>
</tr>
<tr>
<td align="left">9,000</td>
<td align="char" char=".">0.68</td>
<td align="char" char=".">1.41</td>
</tr>
<tr>
<td align="left">10,000</td>
<td align="char" char=".">0.73</td>
<td align="char" char=".">1.56</td>
</tr>
</tbody>
</table>
</table-wrap>
<sec id="s3-5-1">
<title>3.5.1. Blockchain Transaction Throughput</title>
<p>This is the measure of the rate at which the blockchain system mines and commits transactions to the ledger. It is calculated using <xref ref-type="disp-formula" rid="e9">Equation 9</xref> and measure in transactions per second (tps).<disp-formula id="e9">
<mml:math id="m9">
<mml:mrow>
<mml:mi mathvariant="bold-italic">&#x3b8;</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mi mathvariant="bold-italic">&#xa0;</mml:mi>
<mml:mfrac>
<mml:mi mathvariant="bold-italic">n</mml:mi>
<mml:mi mathvariant="bold-italic">m</mml:mi>
</mml:mfrac>
</mml:mrow>
</mml:math>
<label>(9)</label>
</disp-formula>where; n is the number of transactions and; m is the mining time.</p>
</sec>
<sec id="s3-5-2">
<title>3.5.2. Response Time</title>
<p>This is the measure of the time that elapses between the initiation of an action by a user and the time when the results are displayed by the system to the user. The response time of the system was measured for varying user actions and presented accordingly in <xref ref-type="table" rid="T1">Table 1</xref>.</p>
</sec>
</sec>
</sec>
<sec sec-type="results|discussion" id="s4">
<title>4 Results and Discussion</title>
<p>By the developed API endpoint, as explained in <xref ref-type="sec" rid="s3-5">section 3.5</xref>, the various number of transactions were generated and the time taken for the transactions to be mined was recorded accordingly. The blockchain transaction throughput of the blockchain system was then calculated using <xref ref-type="disp-formula" rid="e9">Eq. 9</xref>. <xref ref-type="fig" rid="F7">Figure 7</xref> shows the graphical representation of the transaction throughput value.<disp-formula id="equ1">
<mml:math id="m10">
<mml:mrow>
<mml:mi>A</mml:mi>
<mml:mi>v</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>r</mml:mi>
<mml:mi>a</mml:mi>
<mml:mi>g</mml:mi>
<mml:mi>e</mml:mi>
<mml:mo>&#xa0;</mml:mo>
<mml:mi>s</mml:mi>
<mml:mi>y</mml:mi>
<mml:mi>s</mml:mi>
<mml:mi>t</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>m</mml:mi>
<mml:mo>&#xa0;</mml:mo>
<mml:mi>r</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>s</mml:mi>
<mml:mi>p</mml:mi>
<mml:mi>o</mml:mi>
<mml:mi>n</mml:mi>
<mml:mi>s</mml:mi>
<mml:mi>e</mml:mi>
<mml:mo>&#xa0;</mml:mo>
<mml:mi>t</mml:mi>
<mml:mi>i</mml:mi>
<mml:mi>m</mml:mi>
<mml:mi>e</mml:mi>
<mml:mo>&#xa0;</mml:mo>
<mml:mo>&#x3d;</mml:mo>
<mml:mo>&#xa0;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mi>S</mml:mi>
<mml:mi>u</mml:mi>
<mml:mi>m</mml:mi>
<mml:mo>&#xa0;</mml:mo>
<mml:mi>o</mml:mi>
<mml:mi>f</mml:mi>
<mml:mo>&#xa0;</mml:mo>
<mml:mi>a</mml:mi>
<mml:mi>l</mml:mi>
<mml:mi>l</mml:mi>
<mml:mo>&#xa0;</mml:mo>
<mml:mi>r</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>s</mml:mi>
<mml:mi>p</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>c</mml:mi>
<mml:mi>t</mml:mi>
<mml:mi>i</mml:mi>
<mml:mi>v</mml:mi>
<mml:mi>e</mml:mi>
<mml:mo>&#xa0;</mml:mo>
<mml:mi>t</mml:mi>
<mml:mi>i</mml:mi>
<mml:mi>m</mml:mi>
<mml:mi>e</mml:mi>
<mml:mo>&#xa0;</mml:mo>
<mml:mi>t</mml:mi>
<mml:mi>a</mml:mi>
<mml:mi>k</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>n</mml:mi>
<mml:mo>&#xa0;</mml:mo>
<mml:mi>t</mml:mi>
<mml:mi>o</mml:mi>
<mml:mo>&#xa0;</mml:mo>
<mml:mi>c</mml:mi>
<mml:mi>o</mml:mi>
<mml:mi>m</mml:mi>
<mml:mi>p</mml:mi>
<mml:mi>l</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>t</mml:mi>
<mml:mi>e</mml:mi>
<mml:mo>&#xa0;</mml:mo>
<mml:mi>u</mml:mi>
<mml:mi>s</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>r</mml:mi>
<mml:mo>&#xa0;</mml:mo>
<mml:mi>a</mml:mi>
<mml:mi>c</mml:mi>
<mml:mi>t</mml:mi>
<mml:mi>i</mml:mi>
<mml:mi>o</mml:mi>
<mml:mi>n</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>n</mml:mi>
<mml:mi>u</mml:mi>
<mml:mi>m</mml:mi>
<mml:mi>b</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>r</mml:mi>
<mml:mo>&#xa0;</mml:mo>
<mml:mi>o</mml:mi>
<mml:mi>f</mml:mi>
<mml:mo>&#xa0;</mml:mo>
<mml:mi>t</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>s</mml:mi>
<mml:mi>t</mml:mi>
<mml:mi>s</mml:mi>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
</mml:math>
</disp-formula>
<disp-formula id="equ2">
<mml:math id="m11">
<mml:mrow>
<mml:mi>A</mml:mi>
<mml:mi>v</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>r</mml:mi>
<mml:mi>a</mml:mi>
<mml:mi>g</mml:mi>
<mml:mi>e</mml:mi>
<mml:mo>&#xa0;</mml:mo>
<mml:mi>v</mml:mi>
<mml:mi>o</mml:mi>
<mml:mi>t</mml:mi>
<mml:mi>e</mml:mi>
<mml:mo>&#xa0;</mml:mo>
<mml:mi>c</mml:mi>
<mml:mi>a</mml:mi>
<mml:mi>s</mml:mi>
<mml:mi>t</mml:mi>
<mml:mi>i</mml:mi>
<mml:mi>n</mml:mi>
<mml:mi>g</mml:mi>
<mml:mo>&#xa0;</mml:mo>
<mml:mi>t</mml:mi>
<mml:mi>i</mml:mi>
<mml:mi>m</mml:mi>
<mml:mi>e</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mo>&#xa0;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mn>0.01</mml:mn>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>0.04</mml:mn>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>0.08</mml:mn>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>0.12</mml:mn>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>0.23</mml:mn>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>0.34</mml:mn>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>0.45</mml:mn>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>0.62</mml:mn>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>0.68</mml:mn>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>0.73</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mn>10</mml:mn>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
</mml:math>
</disp-formula>
<disp-formula id="equ3">
<mml:math id="m12">
<mml:mrow>
<mml:mi>A</mml:mi>
<mml:mi>v</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>r</mml:mi>
<mml:mi>a</mml:mi>
<mml:mi>g</mml:mi>
<mml:mi>e</mml:mi>
<mml:mo>&#xa0;</mml:mo>
<mml:mi>v</mml:mi>
<mml:mi>o</mml:mi>
<mml:mi>t</mml:mi>
<mml:mi>e</mml:mi>
<mml:mo>&#xa0;</mml:mo>
<mml:mi>c</mml:mi>
<mml:mi>a</mml:mi>
<mml:mi>s</mml:mi>
<mml:mi>t</mml:mi>
<mml:mi>i</mml:mi>
<mml:mi>n</mml:mi>
<mml:mi>g</mml:mi>
<mml:mo>&#xa0;</mml:mo>
<mml:mi>t</mml:mi>
<mml:mi>i</mml:mi>
<mml:mi>m</mml:mi>
<mml:mi>e</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mo>&#xa0;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mn>3.3</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mn>10</mml:mn>
</mml:mrow>
</mml:mfrac>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0.33</mml:mn>
</mml:mrow>
</mml:math>
</disp-formula>
<disp-formula id="equ4">
<mml:math id="m13">
<mml:mrow>
<mml:mi>A</mml:mi>
<mml:mi>v</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>r</mml:mi>
<mml:mi>a</mml:mi>
<mml:mi>g</mml:mi>
<mml:mi>e</mml:mi>
<mml:mo>&#xa0;</mml:mo>
<mml:mi>v</mml:mi>
<mml:mi>o</mml:mi>
<mml:mi>t</mml:mi>
<mml:mi>e</mml:mi>
<mml:mo>&#xa0;</mml:mo>
<mml:mi>t</mml:mi>
<mml:mi>a</mml:mi>
<mml:mi>l</mml:mi>
<mml:mi>l</mml:mi>
<mml:mi>y</mml:mi>
<mml:mi>i</mml:mi>
<mml:mi>n</mml:mi>
<mml:mi>g</mml:mi>
<mml:mo>&#xa0;</mml:mo>
<mml:mi>t</mml:mi>
<mml:mi>i</mml:mi>
<mml:mi>m</mml:mi>
<mml:mi>e</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mo>&#xa0;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mn>0.17</mml:mn>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>0.23</mml:mn>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>0.46</mml:mn>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>0.53</mml:mn>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>0.78</mml:mn>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>0.81</mml:mn>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>1.20</mml:mn>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>1.33</mml:mn>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>1.41</mml:mn>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>1.56</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mn>10</mml:mn>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
</mml:math>
</disp-formula>
<disp-formula id="equ5">
<mml:math id="m14">
<mml:mrow>
<mml:mi>A</mml:mi>
<mml:mi>v</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>r</mml:mi>
<mml:mi>a</mml:mi>
<mml:mi>g</mml:mi>
<mml:mi>e</mml:mi>
<mml:mo>&#xa0;</mml:mo>
<mml:mi>v</mml:mi>
<mml:mi>o</mml:mi>
<mml:mi>t</mml:mi>
<mml:mi>e</mml:mi>
<mml:mo>&#xa0;</mml:mo>
<mml:mi>t</mml:mi>
<mml:mi>a</mml:mi>
<mml:mi>l</mml:mi>
<mml:mi>l</mml:mi>
<mml:mi>y</mml:mi>
<mml:mi>i</mml:mi>
<mml:mi>n</mml:mi>
<mml:mi>g</mml:mi>
<mml:mo>&#xa0;</mml:mo>
<mml:mi>t</mml:mi>
<mml:mi>i</mml:mi>
<mml:mi>m</mml:mi>
<mml:mi>e</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mo>&#xa0;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mn>8.48</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mn>10</mml:mn>
</mml:mrow>
</mml:mfrac>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0.848</mml:mn>
</mml:mrow>
</mml:math>
</disp-formula>
</p>
<p>From calculations, the mining time of the blockchain increased by an average factor of 0.18&#xa0;s for every thousand increases in the number of transactions. Also, the response time of the system to a range of user actions was evaluated over an increasing number of voters. Results obtained showed that the response time of the system for vote casting operations increased by an average of 0.33&#xa0;min per thousand voters while for vote tallying there was an increase in response time by an average of 0.848&#xa0;min per thousand voters.</p>
<p>Also, as can be seen in <xref ref-type="fig" rid="F7">Figure 7</xref>, it was observed that the mining time increased steadily by an average factor of 0.18&#xa0;s for every thousand increments in the number of transactions, up until the six thousand marks, when the mining time suddenly increased sharply to about 10 times the steady increment value. This is a result of the difficulty in calculating the nonce value for the PoW at that instant of time when the transactions were to be mined. This transaction throughput readings reflect in the response time of the system to actions that involve committing a change to the ledger of the blockchain. To measure the implication of the transaction throughput on the system, the response time of the system is measured for various user actions. The user actions include; vote casting and vote tallying operations through the process highlighted in <xref ref-type="sec" rid="s3-5-2">section 3.5.2</xref>. The results obtained for the system response time are summarized in <xref ref-type="table" rid="T1">Table 1</xref>.</p>
<p>From <xref ref-type="table" rid="T1">Table 1</xref>, it can be seen that the response time of the system for vote-tallying operations increased linearly by a factor of 9.2&#xa0;s for every thousand increments in the number of voters, while for vote casting, the response time increased linearly by an average factor of 4.8&#xa0;s. The response time increment factor for the vote casting is less than that of vote tallying because, the process of vote casting involves only encryption of the ballots of voters, while the vote tallying process involves aligning, homomorphic addition, and final sum decryption of the encrypted ballots. The implication of these response time readings in <xref ref-type="table" rid="T1">Table 1</xref> is that increase in the number of voters and nodes in the blockchain system results in an increase in the time taken for the blockchain to process the various transactions.</p>
</sec>
<sec id="s5">
<title>5 Conclusion and Future Scope</title>
<p>In this study, the focus was on the preservation of privacy and integrity in e-voting by the adoption of blockchain and Paillier homomorphic encryption. This study has successfully combined the Paillier homomorphic encryption with an open-source blockchain system and was tested using a testing endpoint that simulated a varying number of transactions and voters. The mining time of the blockchain system for ten thousand simulated ballot transactions was 7.02&#xa0;s, which translates to a transaction throughput of 1424 tps. The system achieved integrity and immutability of ballots through the blockchain system and also achieved protection of voter confidentiality through the Paillier cryptosystem.</p>
<p>The scientific contribution made by this study is first an assessment of the impact of blockchain technology on the bid to achieve electoral integrity in e-voting systems, with a reflection of a research gap existent in violation of confidentiality in e-voting as a result of the decentralized nature of the blockchain, resulting in the proposition to address the discovered research gap by coupling an open-source private blockchain system with Paillier homomorphic encryption. The applicability of this study spans from small-scale balloting activities to large-scale national elections.</p>
<p>The limitation of this study is a throttled performance resulting from deployment on a free-tier cloud server. In the future, this study looks forward to deploying the system on a paid-tier cloud server which will provide more computing resources and will therefore allow for faster mining of transactions, as well as faster response time.</p>
<p>Aside from the protection of integrity and protection of voter privacy, there is also the need to provide a means for verification of electorate authenticity. This study will therefore also, look into the adoption of a multi-factor biometric authentication mechanism in the future to help authenticate electorates and prevent irregularities associated with the process.</p>
</sec>
</body>
<back>
<sec id="s6">
<title>Data Availability Statement</title>
<p>The original contributions presented in the study are included in the article/Supplementary Material, further inquiries can be directed to the corresponding authors.</p>
</sec>
<sec id="s7">
<title>Author Contributions</title>
<p>BU reviewed and modified the content of this manuscript. OO wrote <xref ref-type="sec" rid="s1">sections 1</xref>, and <xref ref-type="sec" rid="s2">2</xref>, References, and the formatting of the manuscript. DO wrote <xref ref-type="sec" rid="s3">sections 3</xref>, and <xref ref-type="sec" rid="s4">4</xref>, and ED wrote <xref ref-type="sec" rid="s5">Sections 5</xref>, and supplementary material.</p>
</sec>
<sec sec-type="COI-statement" id="s8">
<title>Conflict of Interest</title>
<p>The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.</p>
</sec>
<sec sec-type="disclaimer" id="s9">
<title>Publisher&#x2019;s Note</title>
<p>All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.</p>
</sec>
<ack>
<p>We want to acknowledge our reviewers for their contributions in making this manuscript better and publishable.</p>
</ack>
<ref-list>
<title>References</title>
<ref id="B1">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Abuidris</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Hassan</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Hadabi</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Elfadul</surname>
<given-names>I.</given-names>
</name>
</person-group> (<year>2019</year>). &#x201c;<article-title>Risks and Opportunities of Blockchain Based on E-Voting Systems</article-title>,&#x201d; in <conf-name>2019 16th Int. Comput. Conf. Wavelet Act. Media Technol. Inf. Process. ICCWAMTIP</conf-name>, <fpage>365</fpage>&#x2013;<lpage>368</lpage>. <pub-id pub-id-type="doi">10.1109/ICCWAMTIP47768.2019.9067529</pub-id> </citation>
</ref>
<ref id="B2">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Alguliyev</surname>
<given-names>R.</given-names>
</name>
<name>
<surname>Aliguliyev</surname>
<given-names>R.</given-names>
</name>
<name>
<surname>Aliguliyev</surname>
<given-names>R.</given-names>
</name>
<name>
<surname>Yusifov</surname>
<given-names>F.</given-names>
</name>
</person-group> (<year>2019</year>). <article-title>Multi-criteria Evaluation &#x2b; Positional Ranking Approach for Candidate Selection in E-Voting</article-title>. <source>Decis. Mak. Appl. Manag. Eng.</source> <volume>2</volume> (<issue>2</issue>), <fpage>65</fpage>&#x2013;<lpage>80</lpage>. <pub-id pub-id-type="doi">10.31181/dmame1902119a</pub-id> </citation>
</ref>
<ref id="B3">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Almimi</surname>
<given-names>H. M.</given-names>
</name>
<name>
<surname>Shahin</surname>
<given-names>S. A.</given-names>
</name>
<name>
<surname>Daoud</surname>
<given-names>M. S.</given-names>
</name>
<name>
<surname>Al Fayoumi</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Ghadi</surname>
<given-names>Y.</given-names>
</name>
</person-group> (<year>2019</year>). &#x201c;<article-title>Enhanced E-Voting Protocol Based on Public Key Cryptography</article-title>,&#x201d; in <conf-name>2019 International Arab Conference on Information Technology (ACIT)</conf-name>, <fpage>218</fpage>&#x2013;<lpage>221</lpage>. <pub-id pub-id-type="doi">10.1109/acit47987.2019.8990991</pub-id> </citation>
</ref>
<ref id="B4">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Arnob</surname>
<given-names>M. S.</given-names>
</name>
<name>
<surname>Sarker</surname>
<given-names>N.</given-names>
</name>
<name>
<surname>Haque</surname>
<given-names>M. I.-U.</given-names>
</name>
<name>
<surname>Bhuyan</surname>
<given-names>M. G. S.</given-names>
</name>
</person-group> (<year>2020</year>). <article-title>Blockchain-Based Secured E-Voting System to Remove the Opacity and Ensure the Clarity of Election of Developing Countries</article-title>. <source>Int. Res. J. Eng. Technol.</source> <volume>07</volume> (<issue>1</issue>). </citation>
</ref>
<ref id="B5">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Arnob</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Sarker</surname>
<given-names>N.</given-names>
</name>
<name>
<surname>Haque</surname>
<given-names>I.-U.</given-names>
</name>
<name>
<surname>Sarwar</surname>
<given-names>M. G.</given-names>
</name>
<name>
<surname>Bhuyan</surname>
</name>
</person-group> (<year>2020</year>). <article-title>Blockchain-Based Secured E- Voting System to Remove the Opacity and Ensure the Clarity of Election of Deve</article-title>. <source>Int. Res. J. Eng. Technol.</source> <volume>7</volume>, <fpage>1826</fpage>&#x2013;<lpage>1831</lpage>. </citation>
</ref>
<ref id="B6">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Arun</surname>
<given-names>S. S. S.</given-names>
</name>
</person-group> (<year>2019</year>). <article-title>Blockchain Enabled E-Voting System</article-title>. <source>Int. J. Adv. Res. Comput. Commun. Eng.</source> <volume>8</volume> (<issue>4</issue>), <fpage>77</fpage>&#x2013;<lpage>81</lpage>. <pub-id pub-id-type="doi">10.17148/ijarcce.2019.8412</pub-id> </citation>
</ref>
<ref id="B7">
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>Bag</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Azad</surname>
<given-names>M. A.</given-names>
</name>
<name>
<surname>Hao</surname>
<given-names>F.</given-names>
</name>
</person-group> (<year>2019</year>). <source>End-to-End Verifiable Cumulative Voting without Tallying Authorities</source>, <fpage>1</fpage>&#x2013;<lpage>36</lpage>. </citation>
</ref>
<ref id="B8">
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>Bao</surname>
<given-names>Z.</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>B.</given-names>
</name>
<name>
<surname>Shi</surname>
<given-names>W.</given-names>
</name>
</person-group> (<year>2018</year>). <article-title>A Privacy-Preserving, Decentralized and Functional Bitcoin E-Voting Protocol</article-title>. in <conf-name>Proc. - 2018 IEEE SmartWorld, Ubiquitous Intell. Comput. Adv. Trust. Comput. Scalable Comput. Commun. Cloud Big Data Comput</conf-name> (<publisher-name>Internet People Smart City Innov. SmartWorld/UIC/ATC/ScalCom/CBDCo</publisher-name>), <fpage>252</fpage>&#x2013;<lpage>256</lpage>. <pub-id pub-id-type="doi">10.1109/SmartWorld.2018.00078</pub-id> </citation>
</ref>
<ref id="B9">
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>Barakat</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Eder</surname>
<given-names>C.</given-names>
</name>
<name>
<surname>Hanke</surname>
<given-names>T.</given-names>
</name>
</person-group> (<year>2018</year>). <source>An Introduction to Cryptography</source>. </citation>
</ref>
<ref id="B10">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Baskaran</surname>
<given-names>H.</given-names>
</name>
<name>
<surname>Yussof</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Rahim</surname>
<given-names>F. A.</given-names>
</name>
</person-group> (<year>2020</year>). <article-title>A Survey on Privacy Concerns in Blockchain Applications and Current Blockchain Solutions to Preserve Data Privacy</article-title>. <source>Commun. Comput. Inf. Sci.</source> <volume>1132</volume>, <fpage>3</fpage>&#x2013;<lpage>17</lpage>. <pub-id pub-id-type="doi">10.1007/978-981-15-2693-0_1</pub-id> </citation>
</ref>
<ref id="B11">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Bellini</surname>
<given-names>E.</given-names>
</name>
<name>
<surname>Ceravolo</surname>
<given-names>P.</given-names>
</name>
<name>
<surname>Bellini</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Damiani</surname>
<given-names>E.</given-names>
</name>
</person-group> (<year>2020</year>). <article-title>Designing Process-Centric Blockchain-Based Architectures: A Case Study in E-Voting as a Service</article-title>. <source>Lect. Notes Bus. Inf. Process.</source> <volume>379</volume>, <fpage>1</fpage>&#x2013;<lpage>23</lpage>. <pub-id pub-id-type="doi">10.1007/978-3-030-46633-6_1</pub-id> </citation>
</ref>
<ref id="B12">
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>Bhardwaj</surname>
<given-names>C.</given-names>
</name>
</person-group> (<year>2020</year>). <source>Zero Know Proof- its Explanation and Role in Blockchain</source>. <publisher-loc>Delhi &#x2013; NCR, India</publisher-loc>: <publisher-name>Appinventiv</publisher-name>
<comment>. <ext-link ext-link-type="uri" xlink:href="https://appinventiv.com/blog/zero-knowledge-proof-blockchain/">https://appinventiv.com/blog/zero-knowledge-proof-blockchain/</ext-link>(accessed Sep., 202021)</comment>. </citation>
</ref>
<ref id="B13">
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>Blazy</surname>
<given-names>O.</given-names>
</name>
</person-group> (<year>2012</year>). <source>Interactive and Non-interactive Proofs of Knowledge</source>. <publisher-loc>Barcelona, Spain</publisher-loc>: <publisher-name>Longdom</publisher-name>. </citation>
</ref>
<ref id="B14">
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>Bungale</surname>
<given-names>P. P.</given-names>
</name>
<name>
<surname>Sridhar</surname>
<given-names>S.</given-names>
</name>
</person-group> (<year>2016</year>). <source>A Framework for Receipt Issuing, Contendable Remote Poll-Site Voting.&#x201d; Departamento de Ciencias de la Computaci&#xf3;n</source>. <publisher-loc>Washington, DC</publisher-loc>: <publisher-name>USENIX Association</publisher-name>. </citation>
</ref>
<ref id="B15">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Christyono</surname>
<given-names>B. B. A.</given-names>
</name>
<name>
<surname>Widjaja</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Wicaksana</surname>
<given-names>A.</given-names>
</name>
</person-group> (<year>2021</year>). <article-title>Go-Ethereum for Electronic Voting System Using Clique as Proof-Of-Authority</article-title>. <source>Telkomnika</source> <volume>19</volume> (<issue>5</issue>), <fpage>1565</fpage>&#x2013;<lpage>1572</lpage>. <pub-id pub-id-type="doi">10.12928/TELKOMNIKA.V19I5.20415</pub-id> </citation>
</ref>
<ref id="B16">
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>Daramola</surname>
<given-names>O.</given-names>
</name>
</person-group> (<year>2020</year>). <source>Architecture-Centric Evaluation of Blockchain-Based</source>. </citation>
</ref>
<ref id="B17">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Darwish</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Gendy</surname>
<given-names>M. M. E.</given-names>
</name>
</person-group> (<year>2017</year>). <article-title>A New Cryptographic Voting Verifiable Scheme for E-Voting System Based on Bit Commitment and Blind Signature</article-title>. <source>Int. J. Swarm Intel. Evol. Comput.</source> <volume>6</volume> (<issue>2</issue>). <pub-id pub-id-type="doi">10.4172/2090-4908.1000158</pub-id> </citation>
</ref>
<ref id="B18">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Dayal</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Chawla</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Khari</surname>
<given-names>M.</given-names>
</name>
</person-group> (<year>2021</year>). <article-title>Coalescence of Neural Networks and Blockchain</article-title>. <source>Handb. Green Comput. Blockchain Technol.</source>, <fpage>31</fpage>&#x2013;<lpage>44</lpage>. <pub-id pub-id-type="doi">10.1201/9781003107507-3</pub-id> </citation>
</ref>
<ref id="B19">
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>Emiceli</surname>
<given-names>D.</given-names>
</name>
</person-group> (<year>2019</year>). <source>Chainode: Fast, Highly Scalable, and Lightweight Private Blockchain Network Based on node.Js</source>. <publisher-loc>Milan, Italy</publisher-loc>: <publisher-name>Davide Miceli</publisher-name>. <comment>Available at: <ext-link ext-link-type="uri" xlink:href="https://github.com/davidemiceli/chainode">https://github.com/davidemiceli/chainode</ext-link> (accessed Sep., 202021)</comment>. </citation>
</ref>
<ref id="B20">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Feng</surname>
<given-names>Q.</given-names>
</name>
<name>
<surname>He</surname>
<given-names>D.</given-names>
</name>
<name>
<surname>Zeadally</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Khan</surname>
<given-names>M. K.</given-names>
</name>
<name>
<surname>Kumar</surname>
<given-names>N.</given-names>
</name>
</person-group> (<year>2019</year>). <article-title>A Survey on Privacy Protection in Blockchain System</article-title>. <source>J. Netw. Comput. Appl.</source> <volume>126</volume>, <fpage>45</fpage>&#x2013;<lpage>58</lpage>. <pub-id pub-id-type="doi">10.1016/j.jnca.2018.10.020</pub-id> </citation>
</ref>
<ref id="B21">
<citation citation-type="web">
<person-group person-group-type="author">
<name>
<surname>Fleder</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Kester</surname>
<given-names>M. S.</given-names>
</name>
<name>
<surname>Pillai</surname>
<given-names>S.</given-names>
</name>
</person-group> (<year>2015</year>). <article-title>Bitcoin Transaction Graph Analysis</article-title>. <comment>[Online]. Available: <ext-link ext-link-type="uri" xlink:href="http://arxiv.org/abs/1502.01657">http://arxiv.org/abs/1502.01657</ext-link>
</comment>. </citation>
</ref>
<ref id="B22">
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>for</surname>
<given-names>I. D.</given-names>
</name>
<name>
<surname>Idea</surname>
<given-names>E. A.</given-names>
</name>
</person-group> (<year>2011</year>). <source>Introducing Electronic Voting : PolicyPaper</source>. </citation>
</ref>
<ref id="B23">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Fusco</surname>
<given-names>F.</given-names>
</name>
<name>
<surname>Lunesu</surname>
<given-names>M. I.</given-names>
</name>
<name>
<surname>Pani</surname>
<given-names>F. E.</given-names>
</name>
<name>
<surname>Pinna</surname>
<given-names>A.</given-names>
</name>
</person-group> (<year>2018</year>). &#x201c;<article-title>Crypto-voting, a Blockchain Based E-Voting System</article-title>,&#x201d; in <conf-name>IC3K 2018 - Proc. 10th Int. Jt. Conf. Knowl. Discov. Knowl. Eng. Knowl. Manag. 3 Ic3k</conf-name>, <fpage>223</fpage>&#x2013;<lpage>227</lpage>. <pub-id pub-id-type="doi">10.5220/0006962102230227</pub-id> </citation>
</ref>
<ref id="B24">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Gao</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Zheng</surname>
<given-names>D.</given-names>
</name>
<name>
<surname>Guo</surname>
<given-names>R.</given-names>
</name>
<name>
<surname>Jing</surname>
<given-names>C.</given-names>
</name>
<name>
<surname>Hu</surname>
<given-names>C.</given-names>
</name>
</person-group> (<year>2019</year>). <article-title>An Anti-quantum E-Voting Protocol in Blockchain with Audit Function</article-title>. <source>IEEE Access</source> <volume>7</volume>, <fpage>115304</fpage>&#x2013;<lpage>115316</lpage>. <pub-id pub-id-type="doi">10.1109/ACCESS.2019.2935895</pub-id> </citation>
</ref>
<ref id="B25">
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>George and Samman</surname>
</name>
</person-group> (<year>2016</year>). <source>The Trend towards Blockchain Privacy: Zero Knowledge Proofs</source>. <publisher-loc>New York, NY</publisher-loc>: <publisher-name>Coindesk</publisher-name>. <comment>
<ext-link ext-link-type="uri" xlink:href="https://www.coindesk.com/trend-towards-blockchain-privacy-zero-knowledge-proofs">https://www.coindesk.com/trend-towards-blockchain-privacy-zero-knowledge-proofs</ext-link> (accessed Jun. 25, 2021)</comment>. </citation>
</ref>
<ref id="B26">
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>George</surname>
<given-names>G. T.</given-names>
</name>
<name>
<surname>Konnully</surname>
<given-names>P.</given-names>
</name>
<name>
<surname>Nair</surname>
<given-names>S. R.</given-names>
</name>
<name>
<surname>Tas</surname>
<given-names>R.</given-names>
</name>
<name>
<surname>Kumar</surname>
<given-names>M.</given-names>
</name>
</person-group> (<year>2019</year>). <source>[ IJCST-V9i2p5 ]: Kevin Gabriel Houlder, Nithishwar P , Santhosh G , Venkatesh E</source>. </citation>
</ref>
<ref id="B27">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Giudici</surname>
<given-names>G.</given-names>
</name>
<name>
<surname>Milne</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Vinogradov</surname>
<given-names>D.</given-names>
</name>
</person-group> (<year>2019</year>). <article-title>Cryptocurrencies: Market Analysis and Perspectives</article-title>. <source>J. Ind. Bus. Econ.</source> <volume>47147</volume> (<issue>1</issue>), <fpage>1</fpage>&#x2013;<lpage>18</lpage>. <pub-id pub-id-type="doi">10.1007/S40812-019-00138-6</pub-id> </citation>
</ref>
<ref id="B28">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Halunen</surname>
<given-names>K.</given-names>
</name>
<name>
<surname>Latvala</surname>
<given-names>O.-M.</given-names>
</name>
</person-group> (<year>2021</year>). <article-title>Review of the Use of Human Senses and Capabilities in Cryptography</article-title>. <source>Comput. Sci. Rev.</source> <volume>39</volume>, <fpage>100340</fpage>. <pub-id pub-id-type="doi">10.1016/j.cosrev.2020.100340</pub-id> </citation>
</ref>
<ref id="B29">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Hanifatunnisa</surname>
<given-names>R.</given-names>
</name>
<name>
<surname>Rahardjo</surname>
<given-names>B.</given-names>
</name>
</person-group> (<year>2017</year>). &#x201c;<article-title>Blockchain Based E-Voting Recording System Design</article-title>,&#x201d; in <conf-name>Proceeding 2017 11th Int. Conf. Telecommun. Syst. Serv. Appl. TSSA</conf-name>, <volume>2018</volume>, <fpage>1</fpage>&#x2013;<lpage>6</lpage>. <pub-id pub-id-type="doi">10.1109/TSSA.2017.8272896</pub-id> </citation>
</ref>
<ref id="B30">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Heiberg</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Parsovs</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Willemson</surname>
<given-names>J.</given-names>
</name>
</person-group> (<year>2015</year>). <article-title>Log Analysis of Estonian Internet Voting 2013-2014</article-title>. <source>Lect. Notes Comput. Sci. Incl. Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinforma.</source> <volume>9269</volume>, <fpage>19</fpage>&#x2013;<lpage>34</lpage>. <pub-id pub-id-type="doi">10.1007/978-3-319-22270-7_2</pub-id> </citation>
</ref>
<ref id="B31">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Hellani</surname>
<given-names>H.</given-names>
</name>
<name>
<surname>Sliman</surname>
<given-names>L.</given-names>
</name>
<name>
<surname>Samhat</surname>
<given-names>A. E.</given-names>
</name>
<name>
<surname>Exposito</surname>
<given-names>E.</given-names>
</name>
</person-group> (<year>2020</year>). <article-title>Overview on the Blockchain-Based Supply Chain Systematics and Their Scalability Tools</article-title>. <source>Emerg. Sci. J.</source> <volume>4</volume>, <fpage>45</fpage>&#x2013;<lpage>69</lpage>. <pub-id pub-id-type="doi">10.28991/esj-2021-SP1-04</pub-id> </citation>
</ref>
<ref id="B32">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Hj&#xe1;lmarsson</surname>
<given-names>F. &#xde;.</given-names>
</name>
<name>
<surname>Hrei&#xf0;arsson</surname>
<given-names>G. K.</given-names>
</name>
<name>
<surname>Hamdaqa</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Hj&#xe1;lmt&#xfd;sson</surname>
<given-names>G.</given-names>
</name>
</person-group> (<year>2018</year>). &#x201c;<article-title>Blockchain-based E-Voting System</article-title>,&#x201d; in <conf-name>2018 IEEE 11th International Conference on Cloud Computing (CLOUD)</conf-name>, <fpage>983</fpage>&#x2013;<lpage>986</lpage>. </citation>
</ref>
<ref id="B33">
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>Hu</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Liyanage</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Mansoor</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Thilakarathna</surname>
<given-names>K.</given-names>
</name>
<name>
<surname>Jourjon</surname>
<given-names>G.</given-names>
</name>
<name>
<surname>Seneviratne</surname>
<given-names>A.</given-names>
</name>
</person-group> (<year>2018</year>). <source>Blockchain-based Smart Contracts - Applications and Challenges</source>. <publisher-loc>Ihaca, New York</publisher-loc>: <publisher-name>Cornell University</publisher-name>, <fpage>1</fpage>&#x2013;<lpage>26</lpage>. <comment>[Online]. Available at: <ext-link ext-link-type="uri" xlink:href="http://arxiv.org/abs/1810.04699">http://arxiv.org/abs/1810.04699</ext-link>
</comment>. </citation>
</ref>
<ref id="B34">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Jabbar</surname>
<given-names>I.</given-names>
</name>
<name>
<surname>Alsaad</surname>
<given-names>S. N.</given-names>
</name>
</person-group> (<year>2017</year>). <article-title>Design and Implementation of Secure Remote E-Voting System Using Homomorphic Encryption</article-title>. <source>Ij. Netw. Secur.</source> <volume>19</volume> (<issue>5</issue>), <fpage>694</fpage>&#x2013;<lpage>703</lpage>. </citation>
</ref>
<ref id="B35">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Jason</surname>
<given-names>P. C.</given-names>
</name>
<name>
<surname>Yuichi</surname>
<given-names>K.</given-names>
</name>
</person-group> (<year>2016</year>). <article-title>E-voting System Based on the Bitcoin Protocol and Blind Signatures</article-title>. <source>IPSJ Trans. Math. Model. Its Appl.</source>, <fpage>1</fpage>&#x2013;<lpage>6</lpage>. <comment>[Online]. Available: <ext-link ext-link-type="uri" xlink:href="https://www.researchgate.net/profile/Jason_Paul_Cruz/publication/317100187_E-voting_System_Based_on_the_Bitcoin_Protocol_and_Blind_Signatures/links/59d5a3ee458515140ee44e93/E-voting-System-Based-on-the-Bitcoin-Protocol-and-Blind-Signatures.pdf">https://www.researchgate.net/profile/Jason_Paul_Cruz/publication/317100187_E-voting_System_Based_on_the_Bitcoin_Protocol_and_Blind_Signatures/links/59d5a3ee458515140ee44e93/E-voting-System-Based-on-the-Bitcoin-Protocol-and-Blind-Signatures.pdf</ext-link>
</comment>. </citation>
</ref>
<ref id="B36">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Khan</surname>
<given-names>K. M.</given-names>
</name>
<name>
<surname>Arshad</surname>
<given-names>J.</given-names>
</name>
<name>
<surname>Khan</surname>
<given-names>M. M.</given-names>
</name>
</person-group> (<year>2018</year>). <article-title>Secure Digital Voting System Based on Blockchain Technology</article-title>. <source>Int. J. Electron. Gov. Res.</source> <volume>14</volume> (<issue>1</issue>), <fpage>53</fpage>&#x2013;<lpage>62</lpage>. <pub-id pub-id-type="doi">10.4018/IJEGR.2018010103</pub-id> </citation>
</ref>
<ref id="B37">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Kiayias</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Zacharias</surname>
<given-names>T.</given-names>
</name>
<name>
<surname>Zhang</surname>
<given-names>B.</given-names>
</name>
</person-group> (<year>2017</year>). <article-title>An Efficient E2E Verifiable E-Voting System without Setup Assumptions</article-title>. <source>IEEE Secur. Priv.</source> <volume>15</volume> (<issue>3</issue>), <fpage>14</fpage>&#x2013;<lpage>23</lpage>. <pub-id pub-id-type="doi">10.1109/MSP.2017.71</pub-id> </citation>
</ref>
<ref id="B38">
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>Kirillov</surname>
<given-names>D.</given-names>
</name>
<name>
<surname>Korkhov</surname>
<given-names>V.</given-names>
</name>
<name>
<surname>Petrunin</surname>
<given-names>V.</given-names>
</name>
<name>
<surname>Makarov</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Khamitov</surname>
<given-names>I. M.</given-names>
</name>
<name>
<surname>Dostov</surname>
<given-names>V.</given-names>
</name>
</person-group> (<year>2019</year>). <source>Implementation of an E-Voting Scheme Using Hyperledger Fabric Permissioned Blockchain 11620 LNCS</source>. <publisher-name>Springer International Publishing</publisher-name>. </citation>
</ref>
<ref id="B39">
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>Kost&#x27;al</surname>
<given-names>K.</given-names>
</name>
<name>
<surname>Bencel</surname>
<given-names>R.</given-names>
</name>
<name>
<surname>Ries</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Kotuliak</surname>
<given-names>I.</given-names>
</name>
</person-group> (<year>2019</year>). <source>10th, and Undefined 2019, &#x201c;Blockchain E-Voting Done Right: Privacy and Transparency with Public Blockchain</source>. <comment>ieeexplore.ieee.org</comment>. <pub-id pub-id-type="doi">10.1109/ICSESS47205.2019.9040770</pub-id> </citation>
</ref>
<ref id="B40">
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>Liu</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>Q.</given-names>
</name>
</person-group> (<year>2017</year>). <source>An E-Voting Protocol Based on Blockchain</source>. <publisher-loc>Poland, Poznan</publisher-loc>: <publisher-name>Cryptology ePrint</publisher-name>, <fpage>1043</fpage>. <comment>[Online]. Available at: <ext-link ext-link-type="uri" xlink:href="https://eprint.iacr.org/2017/1043.pdf">https://eprint.iacr.org/2017/1043.pdf</ext-link>
</comment>. </citation>
</ref>
<ref id="B41">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Mohammedali</surname>
<given-names>N.</given-names>
</name>
<name>
<surname>Al-Sherbaz</surname>
<given-names>A.</given-names>
</name>
</person-group> (<year>2019</year>). <article-title>Election System Based on Blockchain Technology</article-title>. <source>Ijcsit</source> <volume>11</volume> (<issue>5</issue>), <fpage>13</fpage>&#x2013;<lpage>31</lpage>. <pub-id pub-id-type="doi">10.5121/ijcsit.2019.11502</pub-id> </citation>
</ref>
<ref id="B42">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Mustafa</surname>
<given-names>M. K.</given-names>
</name>
<name>
<surname>Waheed</surname>
<given-names>S.</given-names>
</name>
</person-group> (<year>2021</year>). <article-title>An E-Voting Framework with Enterprise Blockchain</article-title>. <source>Adv. Distributed Comput. Mach. Learn.</source> <volume>127</volume>, <fpage>135</fpage>&#x2013;<lpage>145</lpage>. <pub-id pub-id-type="doi">10.1007/978-981-15-4218-3_14</pub-id> </citation>
</ref>
<ref id="B43">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Nzuva</surname>
<given-names>S.</given-names>
</name>
</person-group> (<year>2019</year>). <article-title>Smart Contracts Implementation, Applications, Benefits, and Limitations</article-title>. <source>Ppar</source> <volume>9</volume> (<issue>5</issue>), <fpage>63</fpage>&#x2013;<lpage>75</lpage>. <pub-id pub-id-type="doi">10.7176/ppar/9-9-06</pub-id> </citation>
</ref>
<ref id="B44">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Panwar</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Bhatnagar</surname>
<given-names>V.</given-names>
</name>
<name>
<surname>Khari</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Salehi</surname>
<given-names>A. W.</given-names>
</name>
<name>
<surname>Gupta</surname>
<given-names>G.</given-names>
</name>
</person-group> (<year>2022</year>). <article-title>A Blockchain Framework to Secure Personal Health Record (PHR) in IBM Cloud-Based Data Lake</article-title>. <source>Comput. Intell. Neurosci.</source> <volume>2022</volume>, <fpage>1</fpage>&#x2013;<lpage>19</lpage>. <pub-id pub-id-type="doi">10.1155/2022/3045107</pub-id> </citation>
</ref>
<ref id="B45">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Park</surname>
<given-names>H.-D.</given-names>
</name>
</person-group> (<year>2019</year>). <article-title>A Decentralized E-Voting System Based on Blockchain Network</article-title>. <source>Int. J. Innov. Technol. Explor. Eng.</source> <volume>18</volume> (<issue>12</issue>). </citation>
</ref>
<ref id="B46">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Partala</surname>
<given-names>J.</given-names>
</name>
<name>
<surname>Nguyen</surname>
<given-names>T. H.</given-names>
</name>
<name>
<surname>Pirttikangas</surname>
<given-names>S.</given-names>
</name>
</person-group> (<year>2020</year>). <article-title>Non-interactive Zero-Knowledge for Blockchain: A Survey</article-title>. <source>IEEE Access</source> <volume>8</volume>, <fpage>227945</fpage>&#x2013;<lpage>227961</lpage>. <pub-id pub-id-type="doi">10.1109/ACCESS.2020.3046025</pub-id> </citation>
</ref>
<ref id="B47">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Patidar</surname>
<given-names>K.</given-names>
</name>
<name>
<surname>Jain</surname>
<given-names>S.</given-names>
</name>
</person-group> (<year>2019</year>). <article-title>Decentralized E-Voting Portal Using Blockchain</article-title>. <source>2019 10th Int. Conf. Comput. Commun. Netw. Technol. ICCCNT</source>, <fpage>1</fpage>&#x2013;<lpage>4</lpage>. <pub-id pub-id-type="doi">10.1109/ICCCNT45670.2019.8944820</pub-id> </citation>
</ref>
<ref id="B48">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Pawlak</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Poniszewska-Mara&#x144;da</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Kryvinska</surname>
<given-names>N.</given-names>
</name>
</person-group> (<year>2018</year>). <article-title>Towards the Intelligent Agents for Blockchain E-Voting System</article-title>. <source>Procedia Comput. Sci.</source> <volume>141</volume>, <fpage>239</fpage>&#x2013;<lpage>246</lpage>. <pub-id pub-id-type="doi">10.1016/j.procs.2018.10.177</pub-id> </citation>
</ref>
<ref id="B49">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Prashantha</surname>
<given-names>N. C.</given-names>
</name>
<name>
<surname>Arpitha</surname>
<given-names>Y. C.</given-names>
</name>
<name>
<surname>Preethi</surname>
<given-names>R. B. K.</given-names>
</name>
<name>
<surname>Ranjitha</surname>
<given-names>D.</given-names>
</name>
<name>
<surname>Vinutha</surname>
<given-names>T.</given-names>
</name>
</person-group> (<year>2018</year>). <article-title>Design and Development of Security Based Voting System for Government Using Raspberry Pi</article-title>. <source>Int. J. Adv. Eng. Res. Dev.</source> <volume>5</volume> (<issue>5</issue>), <fpage>379</fpage>&#x2013;<lpage>384</lpage>. </citation>
</ref>
<ref id="B50">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Puneet</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Chaudhary</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Chauhan</surname>
<given-names>N.</given-names>
</name>
<name>
<surname>Kumar</surname>
<given-names>A.</given-names>
</name>
</person-group> (<year>2021</year>). &#x201c;<article-title>Decentralized Voting Platform Based on Ethereum Blockchain</article-title>,&#x201d; in <conf-name>Proc. 2021 1st Int. Conf. Adv. Electr. Comput. Commun. Sustain. Technol. ICAECT 2021</conf-name>, <fpage>224</fpage>&#x2013;<lpage>229</lpage>. <pub-id pub-id-type="doi">10.1109/ICAECT49130.2021.9392580</pub-id> </citation>
</ref>
<ref id="B51">
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>Risnanto</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Rahim</surname>
<given-names>Y. B. A.</given-names>
</name>
<name>
<surname>Herman</surname>
<given-names>N. S.</given-names>
</name>
</person-group> (<year>2019</year>). &#x201c;<article-title>Preparatory Component for Adoption E-Voting</article-title>,&#x201d; in <conf-name>TSSA 2019 - 13th Int. Conf. Telecommun</conf-name> (<publisher-loc>Bali, India</publisher-loc>: <publisher-name>IEEE</publisher-name>), <fpage>31</fpage>&#x2013;<lpage>34</lpage>. <pub-id pub-id-type="doi">10.1109/TSSA48701.2019.8985461</pub-id> </citation>
</ref>
<ref id="B52">
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>Sallal</surname>
<given-names>M.</given-names>
</name>
</person-group> (<year>2019</year>). <source>VMV: Augmenting an Internet Voting System with Selene Verifiability</source>. <publisher-loc>Singapore</publisher-loc>: <publisher-name>IEEE</publisher-name>, <fpage>1</fpage>&#x2013;<lpage>17</lpage>. <comment>[Online]. Available: <ext-link ext-link-type="uri" xlink:href="http://arxiv.org/abs/1912.00288">http://arxiv.org/abs/1912.00288</ext-link>
</comment>. </citation>
</ref>
<ref id="B53">
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>S&#xe4;nger</surname>
<given-names>R.</given-names>
</name>
</person-group> (<year>2019</year>). <source>On the Limitations of Cryptocurrencies the Inclusion of Coalitions in Double-Spending Attacks on Proof-Of-Work Based Cryptocurrencies</source>. <comment>[Online]. Available: <ext-link ext-link-type="uri" xlink:href="https://ssrn.com/abstract=3731527">https://ssrn.com/abstract&#x3d;3731527</ext-link>
</comment>. </citation>
</ref>
<ref id="B54">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Sarker</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Byun</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Fan</surname>
<given-names>W.</given-names>
</name>
<name>
<surname>Psarakis</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Chang</surname>
<given-names>S. Y.</given-names>
</name>
</person-group> (<year>2020</year>). <article-title>Voting Credential Management System for Electronic Voting Privacy</article-title>. <source>IFIP Netw. 2020 Conf. Work. Netw.</source> <volume>2020</volume>, <fpage>594</fpage>&#x2013;<lpage>598</lpage>. </citation>
</ref>
<ref id="B55">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Sharma</surname>
<given-names>T.</given-names>
</name>
</person-group> (<year>2016</year>). <article-title>E-voting Using Homomorphic Encryption Scheme</article-title>. <source>Ijca</source> <volume>141</volume> (<issue>13</issue>), <fpage>14</fpage>&#x2013;<lpage>16</lpage>. <pub-id pub-id-type="doi">10.5120/ijca2016909652</pub-id> </citation>
</ref>
<ref id="B56">
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>Sheer Hardwick</surname>
<given-names>F.</given-names>
</name>
<name>
<surname>Gioulis</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Naeem Akram</surname>
<given-names>R.</given-names>
</name>
<name>
<surname>Markantonakis</surname>
<given-names>K.</given-names>
</name>
</person-group> (<year>2018</year>). <article-title>E-voting with Blockchain: An E-Voting Protocol with Decentralisation and Voter Privacy</article-title>. in <conf-name>Proc. - IEEE 2018 Int. Congr. Cybermatics 2018 IEEE Conf. Internet Things, Green Comput. Commun. Cyber, Phys. Soc. Comput. Smart Data, Blockchain, Comput. Inf</conf-name> (<publisher-loc>Halifax, Canada</publisher-loc>: <publisher-name>IEEE</publisher-name>), <fpage>1561</fpage>&#x2013;<lpage>1567</lpage>. <pub-id pub-id-type="doi">10.1109/Cybermatics_2018.2018.00262</pub-id> </citation>
</ref>
<ref id="B57">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Nigam</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Sugandh</surname>
<given-names>U.</given-names>
</name>
<name>
<surname>Khari</surname>
<given-names>M.</given-names>
</name>
</person-group> (<year>2022</year>). <article-title>The Integration of Blockchain and IoT Edge Devices for Smart Agriculture: Challenges and Use Cases</article-title>. <fpage>507</fpage>&#x2013;<lpage>537</lpage>. <pub-id pub-id-type="doi">10.1016/bs.adcom.2022.02.015</pub-id> </citation>
</ref>
<ref id="B58">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Sugandh</surname>
<given-names>U.</given-names>
</name>
<name>
<surname>Khari</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Nigam</surname>
<given-names>S.</given-names>
</name>
</person-group> (<year>2021</year>). <article-title>How Blockchain Technology Can Transfigure the Indian Agriculture Sector</article-title>. <source>Handb. Green Comput. Blockchain Technol.</source>, <fpage>69</fpage>&#x2013;<lpage>88</lpage>. <pub-id pub-id-type="doi">10.1201/9781003107507-6</pub-id> </citation>
</ref>
<ref id="B59">
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>Traub</surname>
<given-names>E.</given-names>
</name>
</person-group> (<year>2018</year>). <source>Erictraub/Learn-Blockchain-By-Building-Your-Own-In-JavaScript: Code Out Your Very Own Blockchain and Decentralized Network in the Javascript Programming Language</source>. <publisher-loc>Birmingham, UK</publisher-loc>: <publisher-name>PacktPub</publisher-name>. <comment>Available at: <ext-link ext-link-type="uri" xlink:href="https://github.com/erictraub/Learn-Blockchain-By-Building-Your-Own-In-JavaScript">https://github.com/erictraub/Learn-Blockchain-By-Building-Your-Own-In-JavaScript</ext-link> (accessed Sep 20, 2021)</comment>. </citation>
</ref>
<ref id="B60">
<citation citation-type="web">
<person-group person-group-type="author">
<name>
<surname>Vivek</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Yashank</surname>
<given-names>R.</given-names>
</name>
</person-group> (<year>2020</year>). <article-title>E-voting System Using Hyperledger Sawtooth</article-title>. <comment>ieeexplore.ieee.org [Online]. Available at: <ext-link ext-link-type="uri" xlink:href="https://ieeexplore.ieee.org/abstract/document/9212945/">https://ieeexplore.ieee.org/abstract/document/9212945/</ext-link>
</comment>(<comment>Accessed Sep 19, 2021)</comment>. </citation>
</ref>
<ref id="B61">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Wang</surname>
<given-names>B.</given-names>
</name>
<name>
<surname>Sun</surname>
<given-names>J.</given-names>
</name>
<name>
<surname>He</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Pang</surname>
<given-names>D.</given-names>
</name>
<name>
<surname>Lu</surname>
<given-names>N.</given-names>
</name>
</person-group> (<year>2018</year>). <article-title>Large-scale Election Based on Blockchain</article-title>. <source>Procedia Comput. Sci.</source> <volume>129</volume>, <fpage>234</fpage>&#x2013;<lpage>237</lpage>. <pub-id pub-id-type="doi">10.1016/j.procs.2018.03.063</pub-id> </citation>
</ref>
<ref id="B62">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Wang</surname>
<given-names>D.</given-names>
</name>
<name>
<surname>Zhao</surname>
<given-names>J.</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>Y.</given-names>
</name>
</person-group> (<year>2020</year>). <article-title>A Survey on Privacy Protection of Blockchain: The Technology and Application</article-title>. <source>IEEE Access</source> <volume>8</volume>, <fpage>108766</fpage>&#x2013;<lpage>108781</lpage>. <pub-id pub-id-type="doi">10.1109/ACCESS.2020.2994294</pub-id> </citation>
</ref>
<ref id="B63">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Will</surname>
<given-names>M. A.</given-names>
</name>
<name>
<surname>Ko</surname>
<given-names>R. K. L.</given-names>
</name>
</person-group> (<year>2015</year>). <article-title>A Guide to Homomorphic Encryption</article-title>. <source>Cloud Secur. Ecosyst. Tech. Leg. Bus. Manag. Issues</source>, <fpage>101</fpage>&#x2013;<lpage>127</lpage>. <pub-id pub-id-type="doi">10.1016/B978-0-12-801595-7.00005-7</pub-id> </citation>
</ref>
<ref id="B64">
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>Wu</surname>
<given-names>Y.</given-names>
</name>
</person-group> (<year>2017</year>). <source>An E-Voting System Based on Blockchain and Ring Signature</source>. <publisher-loc>Birmingham, UK</publisher-loc>: <publisher-name>School of Computer Science, University of Birmingham</publisher-name>. </citation>
</ref>
<ref id="B65">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Yavuz</surname>
<given-names>E.</given-names>
</name>
<name>
<surname>Koc</surname>
<given-names>A. K.</given-names>
</name>
<name>
<surname>Cabuk</surname>
<given-names>U. C.</given-names>
</name>
<name>
<surname>Dalkilic</surname>
<given-names>G.</given-names>
</name>
</person-group> (<year>2018</year>). &#x201c;<article-title>Towards Secure E-Voting Using Ethereum Blockchain</article-title>,&#x201d; in <conf-name>6th Int. Symp. Digit. Forensic Secur. ISDFS 2018 - Proceeding 2018-Janua</conf-name>, <fpage>1</fpage>&#x2013;<lpage>6</lpage>. <pub-id pub-id-type="doi">10.1109/ISDFS.2018.8355340</pub-id> </citation>
</ref>
<ref id="B66">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Yi</surname>
<given-names>H.</given-names>
</name>
</person-group> (<year>2019</year>). <article-title>Securing E-Voting Based on Blockchain in P2P Network</article-title>. <source>J. Wirel. Com. Netw.</source> <volume>2019</volume> (<issue>1</issue>), <fpage>1</fpage>&#x2013;<lpage>9</lpage>. <pub-id pub-id-type="doi">10.1186/s13638-019-1473-6</pub-id> </citation>
</ref>
<ref id="B67">
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>Yu</surname>
<given-names>B.</given-names>
</name>
<name>
<surname>Liu</surname>
<given-names>J.</given-names>
</name>
<name>
<surname>Sakzad</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Steinfeld</surname>
<given-names>R.</given-names>
</name>
<name>
<surname>Rimba</surname>
<given-names>P.</given-names>
</name>
</person-group> (<year>2018</year>). <source>Platform-independent Secure Blockchain-Based Voting System</source>. <publisher-loc>Guildford, UK</publisher-loc>: <publisher-name>Springer, Cham</publisher-name>. </citation>
</ref>
<ref id="B68">
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>Zamostin</surname>
<given-names>Y.</given-names>
</name>
</person-group> (<year>2019</year>). <source>Proof of Work and Proof of Stake - what Are the Key Differences?</source>. <publisher-loc>Illinois, US</publisher-loc>: <publisher-name>Coinifide</publisher-name>. <comment>Available at: <ext-link ext-link-type="uri" xlink:href="https://coinifide.com/proof-of-work-vs-proof-of-stake-what-are-the-key-differences/">https://coinifide.com/proof-of-work-vs-proof-of-stake-what-are-the-key-differences/</ext-link>
</comment>(<comment>accessed Jun06, 2021)</comment>. </citation>
</ref>
<ref id="B69">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zhang</surname>
<given-names>J.-L.</given-names>
</name>
<name>
<surname>Zhang</surname>
<given-names>J.-Z.</given-names>
</name>
<name>
<surname>Xie</surname>
<given-names>S.-C.</given-names>
</name>
</person-group> (<year>2018</year>). <article-title>A Choreographed Distributed Electronic Voting Scheme</article-title>. <source>Int. J. Theor. Phys.</source> <volume>57</volume> (<issue>9</issue>), <fpage>2676</fpage>&#x2013;<lpage>2686</lpage>. <pub-id pub-id-type="doi">10.1007/s10773-018-3789-0</pub-id> </citation>
</ref>
<ref id="B70">
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>Zhang</surname>
<given-names>Q.</given-names>
</name>
<name>
<surname>Xu</surname>
<given-names>B.</given-names>
</name>
<name>
<surname>Jing</surname>
<given-names>H.</given-names>
</name>
<name>
<surname>Zheng</surname>
<given-names>Z.</given-names>
</name>
</person-group> (<year>2019</year>). <source>Ques-Chain: An Ethereum Based E-Voting System</source>. <comment>arXiv Prepr. arXiv1905.05041</comment>. </citation>
</ref>
<ref id="B71">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zhang</surname>
<given-names>R.</given-names>
</name>
<name>
<surname>Xue</surname>
<given-names>R.</given-names>
</name>
<name>
<surname>Liu</surname>
<given-names>L.</given-names>
</name>
</person-group> (<year>2020</year>). <article-title>Security and Privacy on Blockchain</article-title>. <source>ACM Comput. Surv.Mar</source> <volume>52</volume> (<issue>3</issue>), <fpage>1</fpage>&#x2013;<lpage>34</lpage>. <pub-id pub-id-type="doi">10.1145/3316481</pub-id> </citation>
</ref>
<ref id="B72">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zhao</surname>
<given-names>Z.</given-names>
</name>
<name>
<surname>Chan</surname>
<given-names>T.-H. H.</given-names>
</name>
</person-group> (<year>2016</year>). <article-title>How to Vote Privately Using Bitcoin</article-title>. <source>Lect. Notes Comput. Sci. Incl. Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinforma.</source> <volume>9543</volume>, <fpage>82</fpage>&#x2013;<lpage>96</lpage>. <pub-id pub-id-type="doi">10.1007/978-3-319-29814-6_8</pub-id> </citation>
</ref>
<ref id="B73">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zheng</surname>
<given-names>Z.</given-names>
</name>
<name>
<surname>Xie</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Dai</surname>
<given-names>H.</given-names>
</name>
<name>
<surname>Chen</surname>
<given-names>X.</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>H.</given-names>
</name>
</person-group> (<year>2017</year>). <article-title>An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends</article-title>. <source>Proc. - 2017 IEEE 6th Int. Congr. Big Data, BigData Congr.</source>, <fpage>557</fpage>&#x2013;<lpage>564</lpage>. <pub-id pub-id-type="doi">10.1109/BigDataCongress.2017.85</pub-id> </citation>
</ref>
<ref id="B74">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zhou</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Liu</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Jiang</surname>
<given-names>C.</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>S.</given-names>
</name>
</person-group> (<year>2020</year>). <article-title>An Improved FOO Voting Scheme Using Blockchain</article-title>. <source>Int. J. Inf. Secur.</source> <volume>19</volume> (<issue>3</issue>), <fpage>303</fpage>&#x2013;<lpage>310</lpage>. <pub-id pub-id-type="doi">10.1007/s10207-019-00457-8</pub-id> </citation>
</ref>
<ref id="B75">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zou</surname>
<given-names>X.</given-names>
</name>
<name>
<surname>Li</surname>
<given-names>H.</given-names>
</name>
<name>
<surname>Li</surname>
<given-names>F.</given-names>
</name>
<name>
<surname>Peng</surname>
<given-names>W.</given-names>
</name>
<name>
<surname>Sui</surname>
<given-names>Y.</given-names>
</name>
</person-group> (<year>2017</year>). <article-title>Transparent, Auditable, and Stepwise Verifiable Online E-Voting Enabling an Open and Fair Election</article-title>. <source>Cryptography</source> <volume>1</volume> (<issue>2</issue>), <fpage>13</fpage>. <pub-id pub-id-type="doi">10.3390/cryptography1020013</pub-id> </citation>
</ref>
</ref-list>
</back>
</article>