By the same authors

On Secure E-Voting over Blockchain

Research output: Contribution to journalArticlepeer-review

Standard

On Secure E-Voting over Blockchain. / McCorry, Patrick; Mehrnezhad, Maryam; Toreini, Ehsan; Shahandashti, Siamak F.; Hao, Feng.

In: Digital Threats: Research and Practice, Vol. 2, No. 4, 33, 01.12.2021.

Research output: Contribution to journalArticlepeer-review

Harvard

McCorry, P, Mehrnezhad, M, Toreini, E, Shahandashti, SF & Hao, F 2021, 'On Secure E-Voting over Blockchain', Digital Threats: Research and Practice, vol. 2, no. 4, 33. https://doi.org/10.1145/3461461

APA

McCorry, P., Mehrnezhad, M., Toreini, E., Shahandashti, S. F., & Hao, F. (2021). On Secure E-Voting over Blockchain. Digital Threats: Research and Practice, 2(4), [33]. https://doi.org/10.1145/3461461

Vancouver

McCorry P, Mehrnezhad M, Toreini E, Shahandashti SF, Hao F. On Secure E-Voting over Blockchain. Digital Threats: Research and Practice. 2021 Dec 1;2(4). 33. https://doi.org/10.1145/3461461

Author

McCorry, Patrick ; Mehrnezhad, Maryam ; Toreini, Ehsan ; Shahandashti, Siamak F. ; Hao, Feng. / On Secure E-Voting over Blockchain. In: Digital Threats: Research and Practice. 2021 ; Vol. 2, No. 4.

Bibtex - Download

@article{cf51e782079542db913e9cfeaf78d0de,
title = "On Secure E-Voting over Blockchain",
abstract = "This article discusses secure methods to conduct e-voting over a blockchain in three different settings: decentralized voting, centralized remote voting, and centralized polling station voting. These settings cover almost all voting scenarios that occur in practice. A proof-of-concept implementation for decentralized voting over Ethereum's blockchain is presented. This work demonstrates the suitable use of a blockchain not just as a public bulletin board but, more importantly, as a trustworthy computing platform that enforces the correct execution of the voting protocol in a publicly verifiable manner. We also discuss scaling up a blockchain-based voting application for national elections. We show that for national-scale elections the major verifiability problems can be addressed without having to depend on any blockchain. However, a blockchain remains a viable option to realize a public bulletin board, which has the advantage of being a {"}preventive{"}measure to stop retrospective changes on previously published records as opposed to a {"}detective{"}measure like the use of mirror websites. CCS Concepts: • Security and privacy; ",
keywords = "blockchain, boardroom voting, E-voting, Ethereum, national elections",
author = "Patrick McCorry and Maryam Mehrnezhad and Ehsan Toreini and Shahandashti, {Siamak F.} and Feng Hao",
note = "{\textcopyright} 2021 Copyright held by the owner/author(s). Uploaded in accordance with the publisher{\textquoteright}s self-archiving policy. Further copying may not be permitted; contact the publisher for details ",
year = "2021",
month = dec,
day = "1",
doi = "10.1145/3461461",
language = "English",
volume = "2",
journal = "Digital Threats: Research and Practice",
issn = "2576-5337",
publisher = "Association for Computing Machinery (ACM)",
number = "4",

}

RIS (suitable for import to EndNote) - Download

TY - JOUR

T1 - On Secure E-Voting over Blockchain

AU - McCorry, Patrick

AU - Mehrnezhad, Maryam

AU - Toreini, Ehsan

AU - Shahandashti, Siamak F.

AU - Hao, Feng

N1 - © 2021 Copyright held by the owner/author(s). Uploaded in accordance with the publisher’s self-archiving policy. Further copying may not be permitted; contact the publisher for details

PY - 2021/12/1

Y1 - 2021/12/1

N2 - This article discusses secure methods to conduct e-voting over a blockchain in three different settings: decentralized voting, centralized remote voting, and centralized polling station voting. These settings cover almost all voting scenarios that occur in practice. A proof-of-concept implementation for decentralized voting over Ethereum's blockchain is presented. This work demonstrates the suitable use of a blockchain not just as a public bulletin board but, more importantly, as a trustworthy computing platform that enforces the correct execution of the voting protocol in a publicly verifiable manner. We also discuss scaling up a blockchain-based voting application for national elections. We show that for national-scale elections the major verifiability problems can be addressed without having to depend on any blockchain. However, a blockchain remains a viable option to realize a public bulletin board, which has the advantage of being a "preventive"measure to stop retrospective changes on previously published records as opposed to a "detective"measure like the use of mirror websites. CCS Concepts: • Security and privacy;

AB - This article discusses secure methods to conduct e-voting over a blockchain in three different settings: decentralized voting, centralized remote voting, and centralized polling station voting. These settings cover almost all voting scenarios that occur in practice. A proof-of-concept implementation for decentralized voting over Ethereum's blockchain is presented. This work demonstrates the suitable use of a blockchain not just as a public bulletin board but, more importantly, as a trustworthy computing platform that enforces the correct execution of the voting protocol in a publicly verifiable manner. We also discuss scaling up a blockchain-based voting application for national elections. We show that for national-scale elections the major verifiability problems can be addressed without having to depend on any blockchain. However, a blockchain remains a viable option to realize a public bulletin board, which has the advantage of being a "preventive"measure to stop retrospective changes on previously published records as opposed to a "detective"measure like the use of mirror websites. CCS Concepts: • Security and privacy;

KW - blockchain

KW - boardroom voting

KW - E-voting

KW - Ethereum

KW - national elections

UR - http://www.scopus.com/inward/record.url?scp=85126172685&partnerID=8YFLogxK

U2 - 10.1145/3461461

DO - 10.1145/3461461

M3 - Article

AN - SCOPUS:85126172685

VL - 2

JO - Digital Threats: Research and Practice

JF - Digital Threats: Research and Practice

SN - 2576-5337

IS - 4

M1 - 33

ER -