Design and Implementaation of Blockchain Voting System
Design and Implementaation of Blockchain Voting System
SYSTEM
SUPERVISED BY:
DR SALIMONU, R.I. (PhD)
2023/2024
CERTIFICATION
I certify that this project was carried out by me MUHAMMAD JAMIU HABEEB
ABOLAJI with matric numbers (CS/HND/F22/3368), a student of the department
of Computer Science, School of Applied Sciences and Technology, Federal
Polytechnic, Offa, Kwara State. In partial fulfilment of the requirements for the
award of Higher National Diploma (HND) in Computer Science.
_____________________________ _______________________
PROJECT STUDENT
i
APPROVAL PAGE
_____________________________ __________________________
PROJECT SUPERVISOR
_____________________________ __________________________
HEAD OF DEPARTMENT
ii
ABSTRACT
iii
DEDICATION
[Pre-Chapter Body Text: The first line of each paragraph is not indented and the
lines are justified, i.e., the right margin is even rather than ragged.Paragraph are
formatted as follows: Times New Roman, Size 12, single spacing, Sentence case and
Justified.>
iv
ACKNOWLEDGEMENT
[Pre-Chapter Body Text: The first line of each paragraph is not indented and the
lines are justified, i.e., the right margin is even rather than ragged.Paragraph are
formatted as follows: Times New Roman, Size 12, spacing of 1.5 lines, Sentence
case and Justified.>
v
TABLE OF CONTENTS
CERTIFICATION.....................................................................................................................i
APPROVAL PAGE..................................................................................................................ii
ABSTRACT............................................................................................................................iii
DEDICATION.........................................................................................................................iv
ACKNOWLEDGEMENT........................................................................................................v
TABLE OF CONTENTS........................................................................................................vi
LIST OF TABLES..................................................................................................................vii
LIST OF FIGURES...............................................................................................................viii
LIST OF APPENDICES..........................................................................................................ix
CHAPTER ONE.........................................................................................................1
1.1 General Introduction
1.2 Statement of the Problem
1.3 Aim and Objectives
1.4 Significance of the Study
1.5 Scope of the Study
1.6 Limitation of the Study
1.7 Definition of terms
CHAPTER TWO........................................................................................................7
2.1 Theoretical Concept
2.2 Review of related work
CHAPTER THREE.................................................................................................17
3.1 Data Collection
3.2 Description of the proposed system
3.3 Analysis of the proposed system
3.4 System Design
CHAPTER FOUR....................................................................................................24
4.1 System Requirements
4.2 System Implementation
4.3 Results presentation
4.4 System Evaluation/Testing (optional)
4.5 System Documentation and Maintenance
4.6 Benefits of the System
CHAPTER FIVE......................................................................................................29
5.1 Summary
vi
5.2 Conclusion
5.3 Recommendation
REFERENCES.........................................................................................................32
APPENDIX
FLOWCHART
PROGRAM CODING
PROGRAM OUTPUT
vii
LIST OF TABLES
LIST OF FIGURES
viii
LIST OF APPENDICES
ix
CHAPTER ONE
INTRODUCTION
1.1. General Introduction:
Elections are fundamental pillar of a democratic system enabling the general public
to express their views in the form of a vote. Due to their significance to our society,
the election process should be transparent and reliable so as to ensure participants of
its credibility. Within this context, the approach to voting has been an ever evolving
domain. This evolution is primarily driven by the efforts to make the system secure,
verifiable and transparent. In view of its significance, continuous efforts have been
made to improve overall efficiency and resilience of the voting system. Electronic
voting or e-voting has a profound role in this. Since its first use as punched-card
ballots in 1960’s, e-voting systems have achieved remarkable progress with its
adaption using the internet technologies (Gobel, 2024). However, evoting systems
must adhere to specific benchmark parameters so as to facilitate its widespread
adoption. These parameters include anonymity of the voter, integrity of the vote and
non-repudiation among others. Blockchain is one of the emerging technologies with
strong cryptographic foundations enabling applications to leverage these abilities to
achieve resilient security solutions. A Blockchain resembles a data structure which
maintains and shares all the transactions being executed through its genesis. It is
primarily a distributed decentralized database that maintains a complete list of
constantly germinating and growing data records secured from unauthorized
manipulating, tampering and revision. Blockchain allows every user to connect to
the network, send new transactions to it, verify transactions and create new blocks
(Rosenfeld, 2017). Each block is assigned a cryptographic hash (which may also be
treated as a finger print of the block) that remains valid as long as the data in the
block is not altered. If any changes are made in the block, the cryptographic hash
would change immediately indicating the change in the data which may be due to a
malicious activity. Therefore, due to its strong foundations in cryptography,
blockchain has been increasingly used to mitigate against unauthorized transactions
across various domains (Narayanan, 2019). Bitcoin remains the most distinguished
application of blockchain however researchers are keen to explore the use of
1
blockchain technology to facilitate applications across different domains leveraging
benefits such as non-repudiation, integrity and anonymity. In this paper, we explore
the use of blockchain to facilitate e-voting applications with the ability to assure
voter anonymity, vote integrity and end-to verification. We believe e-voting can
leverage from fundamental block chain features such as self-cryptographic validation
structure among transactions (through hashes) and public availability of distributed
ledger of records. The block chain technology can play key role in the domain of
electronic voting due to inherent nature of preserving anonymity, maintaining
decentralized and publicly distributed ledger of transactions across all the nodes.
This makes block chain technology very efficient to deal with the threat of utilizing a
voting token more than once and the attempt to influence the transparency of the
result. The focus of our research is to investigate the key issues such as voter
anonymity, vote confidentiality and end-to-end verification. These challenges form
the foundation of an efficient voting system preserving the integrity of the voting
process. In this paper, we present our efforts to explore the use of the block chain
technology to seek solutions to these challenges. In particular, our system is based on
the Prêt à Voter approach (Ryan, 2022) and uses an open source block chain
platform, Multichain (Multichain, 2017)as the underlying technology to develop our
system. In order to protect the anonymity and integrity of a vote, the system
generates strong cryptographic hash for each vote transaction based on information
specific to a voter. This hash is also communicated to the voter using encrypted
channels to facilitate verification. The system therefore conforms with the
fundamental requirements of an e-voting system as identified by (Rura et al, 2016).
More discussion around this is presented in section. The rest of the paper is
organized as follows: the next section presents the requirements for an e-voting
system as identified by (Rura et al, 2016) and explains how our proposed system
fulfils them. the paper identifying current progress and plans for further work. In
the modern era, traditional voting systems often face challenges related to security,
transparency, and accessibility. Manipulation of votes, coercion, and tampering of
results are common issues. The block chain technology offers a promising solution
by providing a decentralized, secure, transparent, and immutable platform for voting.
The use of block chain can revolutionize the way we conduct elections, enabling a
2
tamper-proof and trust less system. Each vote can be securely recorded on the block
chain, ensuring the integrity of the electoral process and enhancing public trust in
democratic systems. Nigeria has a long history of electoral fraud, with allegations of
vote rigging, ballot stuffing, and other irregularities being common. This has led to a
lack of trust in the electoral process among the Nigerian people, and has contributed
to low voter turnout.
Block chain technology has the potential to revolutionize the way that
elections are conducted.
Block chain is a distributed ledger technology that is secure, transparent, and
tamper-proof. This makes it ideal for use in voting systems, as it can help to
prevent fraud and ensure that every vote is counted accurately.
The existing voting system in Nigeria grapples with various pressing challenges.
Firstly, its centralized structure exposes it to security vulnerabilities, making it prone
to hacking and tampering, thus jeopardizing the integrity of the electoral process.
Secondly, a lack of transparency in the voting process raises concerns among
citizens regarding fairness and the potential for manipulation. Thirdly, ensuring the
integrity and verification of voting data poses a significant challenge, leaving the
system susceptible to errors. In response to these issues, the central objective of this
project is to address these shortcomings by implementing a system using block chain
technology to establish a more secure and transparent voting cycle for Nigeria.
The main objective of this project is to build a web application using block-chain
technology where people can vote from anywhere if he/she possess a valid
credentials or citizenship of respective organization or country where he/she wants to
vote and protect each and every vote to ensure that each and every vote matters.
3
Objectives:
Real time election result monitoring: One of the aims of this project is to
develop a system that makes use of block chain technology to actively
monitor elections in order to prevent results manipulation and to combat
rigging.
User Authorization: The objective of user authorization in an e-voting block
chain system is to establish a reliable mechanism for ensuring that only
authorized and legitimate users are granted access to the system. By
implementing a login protocol, we aim to prevent fraudulent activities, such
as identity theft, and ensure that every vote cast is genuine and traceable to
the rightful voter.
Evaluate and implement a block chain e-voting system: Block chain
technology provides high-level security for transactions, making it difficult
for hackers to access and manipulate data. This means that the block chain-
based e-voting system is more secure and less susceptible to fraud than a
regular e-voting system.
The vast majority of the ongoing work discusses security, exactness,
transparency, respectability, and quickness, protection, and review capacity.
This study would help increase the level of trust in the Country’s gradual shift in
implementing technology in its voting process and would also improve on the
existing voting system used in the most recent Nigerian federal and state elections
thus making it more accurate, less error prone, transparent, secure and faster and will
ensure a more free and fair electoral process ultimately leading to the conduct if
more credible elections.
Over the years technology related systems were developed and tested in order to
resolve some of the issues like electoral fraud, impersonation, double voting etc, and
4
example of such system can be found in the Federal government’s initiative to curb
malpractice during the last election cycle by the use of BVAS (Bimodal Voters
Accreditation System) and the IREV portal, but unfortunately the implementation of
both systems failed woefully. The implementation of this study would aim to address
all of the recurring issues we have witnessed over the last few years like the above
mentioned and other important areas such as voter security, time spent and many
more. So by taking these issues into consideration we have come up with a Block-
chain voting system.
The scope of this project revolves around the development of a Web based voting
system that makes use of block-chain for vote security and accountability which will
allow users/voters to participate in elections regardless of their physical location.
Federal and State elections in Nigeria have been adopted as the case study for the
system to be developed.
It is important to mention that time and cost was a major constraint in the course of
fact finding. It is also wise to mention here that some information needed to work
with was not collected because of the unwillingness of the agency to reveal such
information. This leads to the scope of this project as mentioned above.
6
CHAPTER TWO
LITERATURE REVIEW
2.1 Theoretical Concept:
This literature review chapter explores the evolving landscape of blockchain-based
voting systems. According to (kramer, 2021) As societies become increasingly
digital, it is essential to assess the potential of blockchain technology to address the
challenges and vulnerabilities associated with conventional voting methods.
Traditional voting systems, despite their historical significance, have been marred by
issues like fraud, vote tampering, and doubts surrounding the integrity of the process.
Blockchain technology offers a novel approach to address these concerns. The
objective of this literature review is to analyse existing research and developments in
the realm of blockchain-based voting systems, providing a comprehensive
understanding of the state of the art in this field. It delves into the historical
background, key principles, advantages, and challenges of integrating blockchain
technology into the voting process. This review will highlight not only the successes
and potential advantages of blockchain voting but also the practical challenges,
security concerns, and regulatory considerations that need to be addressed. By
critically examining the existing literature, this chapter will establish the foundation
for the subsequent chapters that focus on the design and implementation of a
blockchain voting system. It will provide insights into the existing knowledge gaps
and areas where further research and innovation are required. In this section, we
introduce study done by few researchers. (QuocKhanh Nguyen, 2023) Proposed a
review paper on Block chain Technology for the Advancement of the Future. This
article gives an overall view of Blockchain technology and its potential to contribute
to the development of the future by proposing several directions for further research.
This paper proposed the effects of industrial revolution 4.0 to the society were robots
will replace humans completely in the work force. This paper explains the basic
operation of blockchain technology that is peer-to-peer decentralized ledger which
provides a method to record and distribute information publicly on peer-t-peer
systems of computers through crypto protocol. This paper also describes the
advantages of blockchain such as it is arranged rationally that allows user to execute
quick insurance requests that can be valuate immediately using AI and Blockchain
7
decentralization helps it become less likely to be attacked. It gives role of blockchain
in technological revolution 4.0 and also within the society. Blockchain can help in
faster insurance and payments, it can make travelling easier by helping the travel
insurance agencies to automate payment which saves a great amount of time, helps
in protecting corporate identities, in banking sectors, internet security, supply chain
management, helps government to alleviate bureaucracy, increase safety and
transparency in government activities and many more. (Hussein Hellani, 2020)
Proposed a review paper On Blockchain Technology: Overview of Bitcoin and
Future Insights. This paper investigates bitcoin crypto currency application and
blockchain technology that enables existence of digital currency. This paper also
highlights requirements and benefits related to security, database and network. This
paper gives the understanding of Bitcoin as it is a peer-to-peer electronic cash
system. The word bitcoin denotes three different objects: blockchain platform, digital
currency and protocol that runs over this platform to define how transactions are
moved. This paper describes the characteristics of block chain where the distributed
ledger is structured into two main network types: permission less network such as
bitcoin where anyone can join the network without previous permission. Participants
of this type can validate the transaction and might be part of the consensus and block
creation and the permissioned network which is a private network limited to a
number of trusted entities that got permission to join the network in order to validate
transactions. Microsoft recently deployed blockchain as a service called Ethereum
consortium blockchain.
2.1.2 Elections
Elections are a fundamental component of democratic societies and are used to
determine who will hold public office, make legislative decisions, or lead a group.
The primary objective of an election is to select authentic representatives to govern a
nation or organization, thus upholding the principles of democracy within
administrative structures. Ensuring the security, transparency, and veracity of the
electoral process is of utmost importance.
There are different types of election conducted each based on different contexts to
select representatives or decide on specific issues. Electoral systems and types of
elections can vary widely across different countries, regions, and political structures,
each serving specific purposes in the democratic process. Here are some types of
elections:
9
General Elections: These are the standard elections held in a country to
choose representatives for legislative bodies, such as members of parliament
or congress, the president, or other key government officials. General
elections often involve multiple positions being contested simultaneously.
Primary Elections: In countries like the United States, primary elections are
held by political parties to select their candidates for the general election.
Voters choose from within the same party to decide who will represent their
party in the main election.
Local Elections: These elections focus on selecting officials at the local
level, such as mayors, city council members, school board members, or other
positions that primarily affect a specific locality or region.
11
using cryptography. Blockchain consists of two cryptographic keys that are private
key and public key. These keys help to perform successful transaction between two
parties. Each person has two keys which is used to produce a secure identity
reference. This identity is referred as digital signature and is used for controlling
transactions. Each block consists of a cryptographic hash value of the previous
block, a timestamp and transaction data. For using distributed ledger, blockchain
manages peer-to-peer network which helps in inter-node communication and
validating new blocks.
12
Nodes: In blockchain technology no one computer can own the chain.
Instead, it is distributed with the help of nodes connected to the chain. Nodes
can be of any kind such as an electronic device that maintains copies and
keeps network functioning.
The voter is allowed to view only his details and to whom voted. The only disclosed
information in election is total votes in entire election.
Lack of evidence: There is no evidence that the votes that are being casted is
under effect of bribes or any other fraud.
Scalable: Elections must be flexible enough to work at large scale also.
Speed: It must be ensured that the election result should be declared within
few hours of procedure ends.
Low cost: Cost is one of the major factors for any system design. The system
must be cost efficient.
2.1.6 E-voting using blockchain
Blockchain has become important in almost all the fields but one of the most valid
domains is voting. To construct a secure electronic voting machine is a difficult task
as it is a crucial system that must be executed without failure.
13
This method promotes greater trust between voters and governments by protecting
their data. Blockchain will allow all to cast their votes on smartphone or from the
computer with the apps, rather than having a queue at polling stations. Implementing
blockchain will not require a government to change their existing system rather their
existing platform can be re-modelled. The major weakness of blockchain is that it
can handle a small string of text that simply record a balance transfer between two
parties. However, Interplanetary file system (IPFS) provides much of the
infrastructure needed for the blockchain content storage as it provides permanent
decentralized web and no central entity controls the data.
In (Yung, 2024), a self-tallying voting system is proposed that does not require any
trusted third parties for vote aggregation and any private channel for voter-to-voter
privacy. The proposed protocol involves extensive computation. In (Hao et al, 2010)
a two round protocol is proposed that computes the tally in two rounds without using
a private channel or a trusted third party. The protocol is efficient in terms of
amputation and bandwidth consumption but is neither robust nor fair in certain
conditions (Dalia, 2021) in a protocol is proposed to improve the robustness and
fairness of the two round protocol. In (Chaum, 2019), authors propose E2E verifiable
voting system named DRE-ip (DRE-i with enhanced privacy), that overcomes
limitations of DRE-i. Instead of pre-computing ciphertexts, DRE-ip encrypts the vote
on the fly during voting process.
The article aims to create a secure and transparent voting application using
blockchain technology, ensuring one vote per Aadhar number (Aadhar number is the
national identification number of Indian citizens) and preventing fraud. It integrates
blockchain for secure voting, with a user-friendly interface. Three phases: creation,
voting, and result declaration. Each voter can cast one vote per Aadhar card,
authenticated to prevent fraud. The system provides a secure and transparent voting
process, ensuring integrity. Each vote is a transaction added to the blockchain, and
14
results are displayed through a pie chart. Gap Found: Challenges include addressing
real-world complexities and ensuring safety in practical RL-based EMS applications.
16
CHAPTER THREE
METHODOLOGY
3.1 Data Collection:
The proposed Computer Based Tourism System was design using the structured
system methodology. The system was built on the web platform. The front-end
interface was designed using HTML, CSS3 and JavaScript, while the backend
functionalities are powered by PHP server-side scripting language and MySQL (a
relational database management system) in designing the database which runs on a
web server. This language was chosen because of its flexibility and features for
developing online and offline based applications. In gathering and collecting
necessary data and information needed for system analysis, two major fact-finding
techniques were used in this work and they are:
Primary source
Secondary source
Primary Source
Primary source refers to the sources of collecting original data in which the
researcher made use of empirical approach such as personal interview and
questionnaires i.e to ask questions from people. Some of the electoral staffs were
interviewed to share their feelings and experience about the manual system of
processing and recording of the electoral process. Their response was that the
manual system is highly cumbersome, boring and time consuming. They stressed
that the manual system has not helped them much, since they have conduct elections
on session basis i.e. yearly on a high rate and the number keeps increasing on a
regular basis.
Secondary data collection: involves using already existing data where relevant
materials were gotten from the internet; published materials, journals, reports, e-
books, websites, blogs and soon.
A situation whereby files are littered around makes the office of the agency involved
in the electoral process look untidy and un-kept. I observed that due to insufficient
space for storage of this files the office looks very much like a warehouse or better
17
still a stuffy storehouse than like an office. Having also noticed that searching for a
particular candidate’s record is time consuming and stressful, this makes the manual
system ineffective.
18
The proposed system architecture consists of three main parts, the blockchain server
(NodeJs), the web application backend (NodeJs), and the front-end (React and
Tailwind CSS). The implementation of a public blockchain by the suggested solution
is highlighted as anyone can be a node and no trust is required among the
participants (nodes) in the blockchain. In the proposed system, not every registered
voter has to be part of the blockchain and not every node has to be used as a device
for voting. There is a distinction between nodes and the devices of the participants.
19
3.3.1 Input Analysis: A process of converting user originated to a computer based
format. Input design is an important part of development process since in accurate
input data are the most common cause of errors in data processing. Erroneous
entities can be controlled by input design. It consists of developing specifications
and procedures for entering data into a system and must be a simple format. The goal
of input data design is to make data entry easy, logical and free from errors as
possible. Input data design, we design the source document that capture and then
select the media used to enter them into the computer
The following are the input necessary to produce an output.
Administrator Account Information
User Account ID
User Name
Password
Confirm Password
User Type
Last Name
First Name
Middle Initial
Voters Information
Voter ID
Last Name
First Name
Middle Initial
Details
20
Administrator Output
Voter’s Output
3.3.3 Interface Design: It deals with the process of developing a method of two (or
more) modules in a system to connect and communicate. These modules can apply to
hardware, software or the interface between a user and a machine.
3.3.4 Database Analysis: The data in the system has to be stored and retrieved from
database. Designing the database is part of system design. Data elements and data
21
structures to be stored have been identified at analysis stage. They are structured and
put together to design the data storage and retrieval system.
ADMIN DATABASE
Username 20 Varchar
Password 20 Varchar
22
Course 50 Character
Year/Level 20 Varchar
Organization 30 Character
Student ID 20 Varchar
to aid software system development. Use case diagrams in UML were used to model
the system.
Figure 1.3 Use case diagram for the voter and admin.
Use case diagrams describe what a system does from an external observer's
standpoint. The emphasis of use case diagrams is on what a system does rather than
how. They are used to show the interactions between users of the system and the
23
system. A use case represents the several users called actors and the different ways
in which they interact with the system.
CHAPTER FOUR
IMPLEMENTATION AND RESULTS PRESENTATION
4.1 System Requirements:
The software requirement specification is the essential role in the software
development stages
Modular Design The modular design involves the process of classifying the
application elements into different sub-systems. The modular design of this
application is divided into collage details- which shows the important
notifications and activates in the college, student details- which shows student
performance track record and faculty details- which shows faculty personal and
professional details.
24
In implementing the system use Java NetBeans as front end and MYSQL database as
the back end.
25
Fig 3: Voters Login Page
26
operational errors including bugs that cause system not to work according to
specifications.
It allow the client can walk to any of the designated banks anytime during banking
hours and make deposit into his/her account. The function the administrator can
perform is to create a client record, update payments and transactions, show record
of client currently registered and using the card. There are forms on different pages
of the application that makes the administrator achieve these functions.
28
CHAPTER FOUR
Modular Design The modular design involves the process of classifying the
application elements into different sub-systems. The modular design of this
application is divided into collage details- which shows the important
notifications and activates in the college, student details- which shows student
performance track record and faculty details- which shows faculty personal and
professional details.
30
Fig 3: Voters Login Page
31
operational errors including bugs that cause system not to work according to
specifications.
It allow the client can walk to any of the designated banks anytime during banking
hours and make deposit into his/her account. The function the administrator can
perform is to create a client record, update payments and transactions, show record
of client currently registered and using the card. There are forms on different pages
of the application that makes the administrator achieve these functions.
33
CHAPTER FIVE
5.1 Summary:
With the successful implementation of this project work, it can therefore be inferred
that the project achieves the objectives and purposes that were initially set for it after
research was carried out from different literature sources.
Chapter 1 presents the background to the study, the aim and objectives of the study,
the significance and motivation of the study, methodology used to achieve the results
of the project.
Chapter 2 presents a review of related works used in this project.
Chapter 3 highlights the different steps used in designing the project and the
specifications of each step.
Chapter 4 presents the implementation of the project and how each component was
tested and the testing of the system as a whole.
5.2 Conclusion:
34
recommendations on how this project can be improved upon and advanced in the
future:
A dedicated desktop program would be a better solution than a web app due
to the various security risks associated with web apps and the sensitive nature
of the information collected by the users. Biometric features could add an
extra layer of protection when integrated with desktop applications.
Using an already established and stable blockchain framework like Ethereum
which is written in more performant languages would be preferable to
building a blockchain network from scratch using Python, especially for a
large-scale system such as a voting system like this.
Multiple tiers should be added to enable easy scalability to a nationwide
network. This means that the problem of large-scale node synchronization
will be alleviated by using smaller blockchain units which will be created for
specific geographical areas, such as states that will be linked together.
Individual transactions in the blockchain should also be hashed, establishing
a Merkle tee for a scalable nationwide solution. The systems' security would
be significantly improved as a result of this addition.
The software development life cycle model utilized for this project was the Agile
methodology, allowing for iterative development and continuous improvement. We
employed techniques such as user stories, sprint planning, and regular feedback
sessions to ensure the system meets desired expectations.
Primary and secondary research methods, including interviews with domain experts,
analysis of existing voting systems, and review of academic literature, have been
utilized to inform design decisions and enhance system effectiveness.
35
REFERENCES
Chaum. (2019). (Shahandashti & Hao, 2016), authors propose E2E verifiable voting system
named DRE-ip (DRE-i with enhanced privacy), that overcomes limitations of DRE-i
Instead of pre-computing ciphertexts, DRE-ip encrypts the vote on the fly during .
M, R. (2017). Blockchain allows every user to connect to the network, send new transactions
to it, verify transactions and create new blocks. .
microcontroller, A. A. (2014). Android Studio IDE and the Java programming language
were used to develop the Android mobile application, .
Multichain. (2017). Multichain as the underlying technology to develop our system. In order
to protect the anonymity and integrity of a vote, the system generates strong
cryptographic hash for each vote transaction based on information specific to a
voter.
primer. (2020). Instant messaging (IM) is a real time text based communication between two
or more people connected over a network like the Internet.
QuocKhanh Nguyen, Q. V. (2023). proposed a review paper on Block chain Technology for
the Advancement of the Future.
Rosenfeld. (2017). Blockchain allows every user to connect to the network, send new
transactions to it, verify transactions and create new blocks . .
36
Ryan. (2022). In particular, our system is based on the Prêt à Voter approach and uses an
open source block chain platform, .
Yung, K. &. (2024). In a self-tallying voting system is proposed that does not require any
trusted third parties for vote aggregation and any private channel for voter-to-voter
privacy. .
Appendix A
Sample Appendix (Replace Accordingly)
37