Next Article in Journal
CHAM-CLAS: A Certificateless Aggregate Signature Scheme with Chameleon Hashing-Based Identity Authentication for VANETs
Previous Article in Journal
Cryptanalysis of Dual-Stage Permutation Encryption Using Large-Kernel Convolutional Neural Network and Known Plaintext Attack
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Multi-Candidate Self-Tallying Voting Scheme Based on Smart Contracts

1
College of Information Science and Technology, Jinan University, Guangzhou 510632, China
2
CSG Electric Power Research Institute Co., Ltd., Guangzhou 510663, China
*
Author to whom correspondence should be addressed.
Cryptography 2024, 8(3), 42; https://doi.org/10.3390/cryptography8030042
Submission received: 17 June 2024 / Revised: 31 July 2024 / Accepted: 2 September 2024 / Published: 12 September 2024
(This article belongs to the Section Blockchain Security)

Abstract

:
In this paper, we propose a smart contract-based multi-candidate self-tallying voting scheme in order to guarantee the privacy of ballots in the case of multiple candidates. This scheme uses the ElGamal cryptosystem to ensure the security of the ballots, and combines it with a Distributed Encryption algorithm to make the voting scheme have self-tallying features, and guarantees the correctness of the intermediate data through zero-knowledge proofs. The experimental results show that the scheme improves the voting efficiency without compromising the security.

1. Introduction

Electronic voting, facilitated by user-friendly online platforms and digital devices, represents a significant evolution in the conduct of voting procedures. This method offers substantial benefits, including reduced costs, heightened efficiency in vote tallying, and improved transparency. For example, Russia’s adoption of electronic voting in local elections has significantly curtailed the time and potential for error associated with manual counting processes, leading to swifter announcements of electoral outcomes and a marked increase in the overall efficiency of the vote-tabulation process. During the COVID-19 pandemic, electronic voting has been instrumental in minimizing mass gatherings, allowing citizens to safely participate in the democratic process while observing social distancing protocols. Beyond symbolizing technological progress, electronic voting stands as a vital instrument for societal advancement. However, electronic voting must navigate a complex landscape of challenges and risks. In 2019, vulnerabilities within the Swiss Post’s electronic voting system were uncovered, revealing the potential for electoral manipulation and raising concerns about the security and reliability of electronic voting systems. These incidents underscore the importance of robust security measures and the need for continuous scrutiny and improvement of electronic voting technologies.
Blockchain technology is an innovative distributed ledger system that ensures the security and integrity of data through decentralization, transparency, and tamper-proof records. Utilizing encryption and consensus mechanisms, blockchain enables the verification and recording of transactions without a central authority, thereby providing trust and efficiency across various domains. Initially designed to support cryptocurrencies such as Bitcoin, the application of this technology has rapidly expanded into other fields [1,2]. Advancing into 2022, China established a pioneering platform for innovation in blockchain and privacy computing technologies. By harnessing the immutable qualities of blockchain, this platform ensures the integrity and indisputability of the voting process, proposing an electronic voting system that incorporates blockchain technology. Blockchain’s transparency and resistance to tampering make it an ideal candidate for addressing many of the security concerns associated with electronic voting. As blockchain technology continues to mature and expand its reach, an increasing cadre of researchers has turned their attention to electronic voting [3] schemes underpinned by smart contracts, offering a plethora of innovative solutions to the field.
These real-world implementations and developments justify the need for specific system requirements in electronic voting systems. Centralized versus distributed architectures, the necessity for fairness, robust encryption, and secrecy are all critical considerations. Centralized systems, while easier to manage and control, may present single points of failure or targets for attacks. In contrast, distributed systems, particularly those utilizing blockchain technology, offer enhanced security and transparency through decentralization but come with increased complexity and resource demands. Fairness in electronic voting ensures that no individual or group can unduly influence the outcome of an election, maintaining the integrity of the democratic process. This is particularly crucial in systems where votes are tallied electronically, as even minor discrepancies can significantly impact results. Encryption is paramount to protect voter privacy and prevent unauthorized access to voting data. Advanced cryptographic techniques, such as the ElGamal cryptosystem and zero-knowledge proofs, provide the necessary security framework to ensure that votes remain confidential and tamper-proof. Secrecy, or the assurance that a voter’s choices remain private, is another fundamental requirement. Ensuring that each vote is both anonymous and untraceable prevents voter coercion and preserves the principle of a free and fair election.
Electronic voting holds substantial promise for improving the efficiency, accessibility, and integrity of electoral processes. However, realizing this potential requires addressing significant security and privacy challenges through advanced cryptographic techniques and robust system architectures. The ongoing developments and research in blockchain and privacy-enhancing technologies offer promising avenues for overcoming these challenges and advancing the state of electronic voting systems.

1.1. Related Work

Electronic voting schemes, initially proposed by Chaum [4] in 1981, have evolved to address the need for secure and efficient voting systems. These schemes are categorized based on encryption technologies into three main types.
The first type involves Mix-nets [4,5], which Chaum introduced. The system works by obfuscating multiple inputs through the Mix-net, resulting in outputs that are unlinkable to the original sender. However, this method requires numerous zero-knowledge proofs [6,7] to ensure the integrity of the ballots during the mixing process, which can be computationally intensive and impact system efficiency. The second type leverages homomorphic encryption [8], first proposed in 1997. This technology enables operations on encrypted data (ciphertexts) without the need for decryption. The ballots remain encrypted during counting, with decryption occurring post-counting. The security of the homomorphic encryption algorithm directly influences the level of ballot privacy and voter anonymity, with more secure algorithms providing higher privacy. The third type of system utilizes blind signatures [9,10] and ring signatures [11] to ensure voter anonymity. Blind signatures allow the counting center to verify the validity of a ballot without knowing its source, while the signing institution remains ignorant of the voter’s choice. This system necessitates trust in the signer; to mitigate risks associated with untrusted signers, Liu et al. [12] introduced linkable ring signatures in 2005. This approach requires voter participation in the signature process, and by comparing linkable labels, authorities can verify voter participation. Voters signing ballots with linkable ring signatures must include the public keys of other voters to maintain anonymity.
However, such a voting protocol requires a centralized trusted party to control the entire voting process. Blockchain technology and smart contracts provide new ideas for electronic voting. These systems, as referenced in [13,14], utilize the properties of cryptocurrencies for voting. The ballots are not encrypted but are committed using random numbers to conceal the actual vote, with the sum of all random numbers equating to zero. A centralized institution is typically required to manage the coordination between candidates and voters. As discussed in [15,16], the blockchain serves as a secure ballot box, ensuring the integrity of the voting process by synchronizing data across untrusted nodes. The use of Bitcoin as a public bulletin board is highlighted, although its limited scripting capabilities pose challenges for implementing complex voting schemes. Voting systems based on smart contracts, as noted in [17,18], are limited to supporting two candidates and a restricted number of voters. They necessitate all voters to participate before the results are finalized, and a voter’s abstention can trigger a rerun of the entire voting process.
Building on blockchain technology, the concept of self-tallying electronic voting has been proposed, where voters perform the counting themselves. Kiayias [19] introduced this idea in 2002, emphasizing the potential for ballot privacy and indisputability, albeit with computational costs proportional to the number of voters. Groth et al. [20] later proposed a more efficient scheme, incorporating an anonymous broadcast channel for message confidentiality, albeit increasing the protocol’s round complexity. Hao suggested a two-round public discussion scheme, which was critiqued by Khader et al. [5] for not meeting robustness and fairness standards. Lee [21] presented a national-level protocol dependent on a trusted third party. Mccorry [18] developed a self-tallying protocol on Ethereum, though it is limited to small-scale scenarios and lacks support for fractional voting. Li [22] introduced a decentralized self-counting scheme using zero-knowledge proofs to address voter abstention, but it is designed for only two candidates. Panja [23] proposed a ranking system for multiple candidates with public verifiability, yet it is not suited for large-scale voting. In 2020, Yang [24] proposed an online voting protocol that allows public verifiability without a trusted institution, utilizing an improved ElGamal cryptosystem for ballot encryption. However, this protocol does not accommodate voter abstention, which could lead to incorrect results.

1.2. Overview

This paper introduces a novel electronic voting scheme designed to address concerns about privacy, fairness, and integrity in current systems. It starts by discussing the importance of electronic voting and the need for improvement over existing methods like Mix-nets, homomorphic encryption, and blind signatures. The paper then presents a new multi-candidate voting scheme featuring ElGamal encryption, distributed encryption, zero-knowledge proofs, and a recovery mechanism to ensure vote privacy and process transparency while maintaining fairness and system integrity.
A thorough security analysis confirms the scheme’s strengths through theoretical examination and simulation. Experimental results demonstrate the scheme’s efficiency and effectiveness in multi-candidate elections, comparing favorably with existing systems. The discussion evaluates the scheme’s practicality, application potential, and the challenges it may encounter. The conclusion reflects on the paper’s contributions, summarizes the findings, and suggests directions for future research and scheme enhancement.

1.3. Our Contributions

The principal contribution of this manuscript is the introduction of an innovative multi-candidate self-tallying electronic voting scheme predicated on smart contracts, offering enhancements and optimizations over current electronic voting paradigms. Initially, this work addresses the limitations of existing models concerning candidate count and systemic equity by proposing a novel methodology grounded in the ElGamal cryptographic system and distributed encryption techniques. This approach harnesses the homomorphic attributes of the ElGamal system, facilitating the aggregation of votes without the need for decryption, thus safeguarding ballot privacy and ensuring the openness of the tallying process. Moreover, leveraging distributed encryption, the scheme articulated in this paper robustly secures ballot confidentiality and empowers voters to independently execute vote tallying. To surmount the fairness challenges inherent in the voting procedure, the incorporation of zero-knowledge-proof technology is presented. These proofs serve to affirm the authenticity and propriety of each ballot, guaranteeing equitable consideration during the tallying phase. Thereby, the scheme circumvents potential inequities stemming from reliance on untrustworthy intermediaries, augmenting the overall trustworthiness of the voting framework. The paper introduces a resilience mechanism that empowers the final voter to attain the conclusive tally, notwithstanding any disclosure of keys by electoral administrators.
The performance of the proposed scheme within a multi-candidate voting context is substantiated through rigorous empirical analysis. The findings indicate that the scheme substantially ameliorates the efficiency of the voting system while upholding stringent security protocols, demonstrating adaptability to more extensive voting environments. Such enhancements render the proposed scheme markedly more viable and dependable for real-world implementation.

2. Preliminaries

In the process of constructing the self-tallying voting scheme for multiple candidates, this paper primarily utilizes the homomorphic properties of the ElGamal encryption system to ensure ballot privacy, employs distributed encryption to enable the self-tallying feature of the voting scheme, and uses zero-knowledge proofs to constrain participant behavior. This scheme includes the following polynomial-time algorithms:

2.1. Key Generation Algorithm KeyGen(k)

This algorithm takes as input a security parameter k, determines a large prime number p of k bits, and chooses a generator g of the cyclic group G. It then selects a random number x Z p * . Here, G, p, and g are public parameters. The algorithm outputs the key pair for voter v i .
{ p k i , s k i } = { g x mod p , x }

2.2. Encryption Algorithm Enc(pk, m)

This algorithm takes as input the plaintext m G and the public key p k . It chooses a random number r Z p * , and computes c 1 = g r mod p and c 2 = g m × p k r mod p . The algorithm outputs the ciphertext c.
c = ( c 1 , c 2 ) = ( g r , g m × p k r )

2.3. Decryption Algorithm Dec(c, sk)

This algorithm takes as input the ciphertext c and the corresponding private key s k , and outputs the corresponding plaintext of the ciphertext.
g m = c 2 c 1 s k mod p

2.4. Signature Algorithm Sign(m, sk)

This algorithm takes as input the message m to be signed and the signer’s private key s k . It chooses a random number r Z p * , computes R = g r mod p , and calculates the hash value h = Hash ( m ) of the message m. The algorithm outputs the signature σ .
σ = ( R , s ) = ( g r , h x R r )

2.5. Signature Verification Algorithm Verify( σ )

This algorithm takes as input the signature σ to be verified and the verifier’s public key p k . It computes the hash value h = Hash ( m ) of the message m, and verifies the signature with the following equation:
g h = p k R · R s
If the equation holds, the validation is considered successful; otherwise, the validation fails.

2.6. Distributed Encryption Algorithm (L, Index)

Assume that G denotes a finite cyclic group of order prime q and g is a generator of the cyclic group G. The algorithm takes as input the set of public keys of all voters L = { g x 1 , g x 2 , , g x n } and the index of one of the voters. The algorithm outputs the value y index of the voter with the given index.
y index = j = 1 index 1 g x j j = index + 1 n g x j

3. Self-Tallying Voting Scheme for Multiple Candidates

The basic idea of this system is that the election administrator deploys the voting contract by confirming the public parameters (such as the election’s public key). Each voter can submit their own ballot through the smart contract, and each vote constitutes a transaction in the blockchain system. Each ballot will go through the verification of the smart contract. If the check executed in the smart contract determines that the vote sent by the voter has not passed the verification, the transaction will be rejected. After the consensus algorithm of the blockchain is mined, the vote is considered the final result.

3.1. Framework of the Self-Tallying Voting Scheme

The main participants in this voting scheme are the blockchain and the voting clients v i ( i = 1 , 2 , , n ) . As shown in Figure 1, the entire voting scheme is implemented through the interaction between the blockchain and the clients. The main functions of each role in the system are as follows:
The blockchain is a database that can only be appended and not modified. It can store data uploaded by clients through transactions. Each client needs to register and save its identity information on the blockchain for smart contracts and other users to view. It can also serve as a public bulletin board to save the voting information of clients, without the need for an additional trusted third party to perform the above duties.
Voting devices, i.e., all voters participating in the voting, generate their own public and private keys according to the public parameters in the blockchain and send them to the blockchain to complete the registration. Afterward, they can use the public key generated by all registered client public keys to encrypt their own ballot information, ensuring the privacy of the ballot, before uploading it to the blockchain.

3.2. Self-Tallying Voting Scheme Model

The electoral scheme involves four main entities: the election administrator, the blockchain, the voters, and the candidates. Their roles are as follows:
Election Administrator: This individual sets up the election’s security measures, manages voter registration, and ensures voters are eligible. They also create a public and private key pair for the election, placing the public key on the blockchain. The administrator is responsible for candidate enrollment, maintaining a candidate list, establishing voting rules, and deploying the voting smart contract. Once voting starts, these details cannot be changed.
Blockchain: Acts as an immutable ledger where data can be added but not altered. Both the election administrator and voters can send data to the blockchain, which is then added to the latest block, securing the integrity of the voting process. Once data are on the blockchain, they cannot be changed or removed.
Voters: Each voter has a public and private key. After their eligibility is confirmed, the election administrator adds the voter’s public key to the blockchain. Voters use the smart contract to encrypt their votes with their private keys and send these encrypted votes to the blockchain, ensuring vote confidentiality and security.
Candidates: The election administrator also manages the candidate list. Candidates aim to win votes from the electorate, with the goal of accurately tallying the final results. This process prevents election outcomes from being affected by incomplete candidate lists.
Figure 2 illustrates the procedural flow involving the electorate, the election administrators, and the blockchain across the various stages of the electoral process.
Electronic voting systems are designed with a series of stages to ensure a secure and fair election process. The process starts with the Registration Stage, where candidates generate key pairs and voters submit these public keys to the election administrator. This is followed by the Initialization Stage, where the election administrator deploys a smart contract on the blockchain, making its address publicly accessible. The Commitment Stage requires voters to commit to their candidate ballots, ensuring the protocol’s fairness. During the Voting Stage, voters encrypt their ballots and submit them to the blockchain for verification. The Verification Stage involves checking each ballot and ensuring all a voter’s ballots meet the necessary conditions; successful verification leads to the tallying stage, while failure terminates the voting process. In the Tallying Stage, after all votes are verified, both voters and candidates can count the votes, with results being announced on the blockchain. Finally, the Recovery Stage is a fail-safe where, if the last voter does not vote, other voters can recover the committed ballot and ensure the vote is counted. This comprehensive approach guarantees that the voting system is transparent and secure.

3.3. Security Requirements

Designing a secure and reliable voting scheme to ensure the security of the election and voting process is crucial. To achieve this goal, the voting scheme needs to meet a series of security requirements to build a practical voting scheme.

Maximal Ballot Secrecy (MBS) [22]

In the following game, if any polynomial-time adversary A has a negligible advantage over the challenger C , then we consider this self-tallying voting scheme to be MBS secure.
We formalize the security model, assuming that in the MBS voting scheme, a total of n voters participate in the voting, and at most n-2 voters are controlled by the adversary. Because if n-1 voters are controlled by the adversary, it is easy to obtain the voting information of the last voter from the final election result. The adversary can query the ballot commitment and the ballot of the controlled voter, and can also obtain the final voting result. In the subsequent challenge stage, the votes of two voters who are not controlled by the adversary for the candidate’s ballot are {0} and {1}, respectively, and the adversary needs to distinguish which of these two ballots gives the content of {1}. The specific game between the challenger C and the adversary A is reflected in the specific interaction, and the specific security model is as follows:
  • Initialization: There are n voters in the game process, and the adversary A declares the target voters v a and v b to be challenged, and the other voters are controlled by the adversary. The challenger C randomly selects a voter v t from the target voters v a and v b , and the ballot of v t is {1}.
  • Setup: The challenger C will generate a pair of public and private keys for each voter through the key generation algorithm, and send all voters’ public keys and the private keys of the controlled voters to adversary A .
  • Query: The adversary can choose any ballot for the controlled voter, and can query the challenger C based on this ballot, including the ballot commitment query and the voting query. A can ask for the commitment of a certain vote in the commitment query, generate the corresponding commitment and send it to C and record it in the commitment list; A can control the voting content of any voter in the voting query.
  • Challenge: C generates corresponding challenge votes for the target voters v a and v b .
  • Tallying: A calculates the final result of the vote based on the collected ciphertext votes.
  • Guess: A outputs a guess result. That is, who gave the ballot of {1} among v a and  v b .
In the above model, the reason for setting up two challenge ballots v a and v b , instead of one, is to prevent A from inferring the content of the challenge ballot from its known information. Specifically, the ballot content of the controlled voter is known to A , and if there is only one challenge ballot when the final voting result is obtained, the adversary will have a non-negligible advantage to win in the guessing stage. The two challenge ballots have different values, because if both challenge tickets are {0} or {1}, and the adversary knows the ballot of the broken voter, then the adversary can easily infer from the final voting result. The content of the two identical ballots is {0} or {1}, and the advantage ε of winning the game is not negligible.
Definition 1.
If the probability of any polynomial-time adversary A winning in the game is negligible, then this scheme is MBS secure.
P r [ o u t = t ] 1 2 ε
Electronic voting systems must ensure several critical principles for a fair and secure election. Secrecy is essential, keeping all ballots confidential. Correctness guarantees that only valid votes are accurately counted. To prevent manipulation, double voting must be avoided, ensuring each voter casts only one vote. The system should be self-tallying, allowing for straightforward vote counting once all votes are in. Verifiability lets voters confirm their vote’s inclusion and watch for any unfair practices. Fairness is maintained by addressing issues like voter abstention and the potential for the last voter to influence the outcome.

4. Construction Details

This section first introduces in detail the basic cryptographic algorithms used in the self-tallying voting scheme for multiple candidates, then details the overall workflow of the scheme and its specific implementation details, and finally analyzes the security of the voting scheme. Table 1 is the Symbols used by the program.

4.1. Specific Construction of the Scheme

Before all voters generate keys and begin registration, the cyclic group ( G , p , g ) used by the system needs to be predefined. The election administrator then uses the KeyGen(k) algorithm to generate a pair of public and private keys ( p k , s k ) . The administrator uploads their public key p k to the blockchain through a transaction, enabling all voters to access it. In this scheme, each voter can support only one candidate (represented by 1), while votes for other candidates are opposition votes (represented by 0). The specific process of this scheme is described in the following seven stages:

4.1.1. Registration Stage

Each voter uses the KeyGen(k) algorithm to generate a public and private key pair { p k i , j , s k i , j } = { g x i , j , x i , j } for each candidate. After generating these keys, the voter registers with the election administrator, sending the n c public keys { p k i , 1 , p k i , 2 , , p k i , n c } to the administrator. Once the voter’s eligibility is verified, their public keys are added to the list of eligible voters and recorded on the blockchain. After all eligible voters have registered or the registration period set by the election administrator ends, the administrator deploys the voting contract.

4.1.2. Initialization Stage

The election administrator deploys the smart contract on the blockchain and publishes the contract address, allowing all voters to verify and access it.

4.1.3. Commitment Stage

Before voting, each voter v i obtains each public key g x i , j from the smart contract, where i [ 1 , n v ] and j [ 1 , n c ] . Voter v i generates a commitment for each candidate’s ballot m i , j to ensure it will be used for their formal vote later. The process for generating the commitment is as follows: v i chooses a random number ρ i , j for the j-th candidate, where j [ 1 , n c ] , and sends β i , j = g ρ i , j to the smart contract, making it viewable to all voters. After this, v i generates the ballot commitment C i , j = g m i , j × ( Y i , j ) ρ i , j , where Y i , j = k = 1 , k i n v g x i , j , and sends this commitment C i , j to the smart contract. To ensure that v i generates the ballot commitment truthfully, v i provides the corresponding zero-knowledge proof ZKP ( C i , j ) . The specific proof generation process is illustrated in Figure 3.
Figure 3 illustrates the generation process of a Zero-Knowledge Proof (ZKP), which is used to prove that a voter v i has indeed generated a valid commitment C i , j for their vote on candidate j, without revealing the specific content of the vote m i , j .
Zero-Knowledge Proof Generation: To prove that the generated commitment is genuine, the voter v i must provide a Zero-Knowledge Proof ZKP ( C i , j ) . This proof involves:
  • W ,   e 1 ,   r 1 and W ,   e 2 ,   r 2 are values used in the proof process, all elements of the finite field Z q .
  • a 1 ,   a 2 ,   b 1 ,   b 2 are values computed by the Prover based on their vote and random numbers.
  • e is a computed value used in the proof.
Proof Process: The Prover presents e 1 and e 2 , components of e, without revealing e itself, maintaining the anonymity of the vote. The Verifier uses these values to verify that the Prover indeed holds a valid commitment, without knowing the specific content of the commitment.
Verification Process: The Verifier uses the values provided by the Prover to verify the correctness of the proof. If the verification is successful, it indicates that the Prover has generated the commitment according to the specified rules without disclosing any information about their voting choice.

4.1.4. Voting Stage

Voters cast their votes according to their preferences. This stage consists of three steps: pre-computation, encrypted ballot, and proof generation.
During the pre-computation process, each of the n v voters publishes their public keys for voting on the blockchain. Consequently, all voters can see these n v n c public keys g x i , j . In this phase, voter v i generates a distributed encryption value y i , j for the jth candidate using the DistributedEncryption algorithm, where L = { g x 1 , j , g x 2 , j , , g x n v , j } and j { 1 , 2 , , n c } . Voter v i produces n c values y i , 1 ,   y i , 2 ,   , y i , n c , each specifically used for voting for the respective candidate.
In the encrypted ballot process, voter v i casts a vote for the candidate they support. If v i supports the jth candidate, then m i , j = 1 and m i , k = 0 for k { 1 , , j 1 , j + 1 , , n c } . Here, m i , j represents the voting data of the ith voter for the jth candidate. These ballots are private, so they must be encrypted before being uploaded. Each m i , j ballot is encrypted twice: first using the election administrator’s public key for ElGamal encryption, and second using the pre-computed y i , j for distributed encryption.
The voter’s ballot is first encrypted using the election administrator’s public key p k , resulting in the ciphertext through the encryption algorithm Enc ( p k , m i , j ) = ( g r , g m i , j p k r ) . To ensure the scheme’s distributed encryption characteristic, the first part g r of this ciphertext is further transformed by encrypting it again with the voter’s private key x i , j as follows:
g r y i , j x i , j × g r
Here, y i , j is pre-computed. Combining the two encryption processes, the encryption formula is as follows:
E ( p k , y i , j , x i , j , m i , j ) = ( y i , j x i , j × g r , g m i , j × p k r )
where j { 1 , 2 , , n c } . Thus, the encrypted ballots of voter v i for all candidates are represented as the following matrix:
B a l l o t v i = E ( p k , y i , 1 , x i , 1 , m i , 1 ) E ( p k , y i , 2 , x i , 2 , m i , 2 ) E ( p k , y i , n c , x i , n c , m i , n c )
In the proof generation phase, to ensure the voter has truthfully carried out the ciphertext generation process, each voter must provide two zero-knowledge proofs alongside the ciphertext. These proofs allow anyone to verify the validity of each vote without decrypting the ciphertext, thereby protecting voter privacy while confirming adherence to the protocol. The specific zero-knowledge proof creation process is as follows:
ZKP( x i , j ): This zero-knowledge proof ensures that the ciphertext for the jth candidate’s ballot was generated using the voter’s private key x i , j . Below is the proof generation and verification process for B a l l o t v i . Assume the ciphertext of v i for the jth candidate is E ( p k , y i , j , x i , j , m i , j ) = ( c 1 , c 2 ) = ( y i , j x i , j × g r , g m i , j × p k r ) , and this ciphertext is known to both the prover and the verifier.
In this process, y i , j and g x i , j are public parameters. The verifier checks whether the right-hand equation holds. If it does, the prover’s generated ciphertext is trustworthy. The detailed steps are given in Algorithm 1.
Algorithm 1 The generation process of ZKP( x i , j )
  • Parameters: random number a , b Z q .
  • Prover:
  •    (1) Prover Compute A = y i , j × g b , where y i , j is the distributed encryption value precomputed by voter v i for candidate j.
  •    (2) Generate B = g a , where g is the cyclic group generator.
  •    (3) Calculate the hash h = Hash ( A | | B ) , concatenating A and B.
  •    (4) Compute C = X i , j · h + a and D = r · h + b , using the voter’s public key X i , j and another random number r.
  •    (5) The Prover sends A , B , C , D to the Verifier without revealing a and b.
  • Verifier:
  •    The Verifier checks the equation y i , j c · g D = A · C 1 h , g c = B · ( g x i , j ) h to verify the proof.
  •    If the equation holds, the proof is valid, confirming the correct use of the private key. Otherwise, the proof is invalid.
  • Zero-Knowledge Feature: The proof process does not reveal the private key x i , j to the Verifier, ensuring voter anonymity and vote privacy.
ZKP(1): This zero-knowledge proof ensures that the sum of all votes of the voter is 1. Suppose the number of candidates is 3, the voter v i votes for these three candidates m i , 1 ,   m i , 2 ,   m i , 3 , and satisfies the relationship m i , 1 + m i , 2 + m i , 3 = 1 . The sum of the ballots is calculated through the additive homomorphism property of ElGamal, and when the ciphertext of these three candidates is multiplied, the following is obtained:
E ( p k , y i , 1 , x i , 1 , m i , 1 ) × E ( p k , y i , 2 , x i , 2 , m i , 2 ) × E ( p k , y i , 3 , x i , 3 , m i , 3 ) = y i , 1 x i , 1 · y i , 2 x i , 2 · y i , 3 x i , 3 · g r 1 + r 2 + r 3 , g m i , 1 + m i , 2 + m i , 3 · p k r 1 + r 2 + r 3 = y i , 1 x i , 1 · y i , 2 x i , 2 · y i , 3 x i , 3 · g r 4 , g m i , 1 + m i , 2 + m i , 3 · p k r 4 = ( c 1 , c 2 )
Define a = y i , 1 x i , 1 · y i , 2 x i , 2 · y i , 3 x i , 3 ; it needs to be proved that a is generated in the correct format. The detailed steps are given in Algorithm 2.
Algorithm 2 The generation and validation of ZKP ( a )
  • Parameters: selects random numbers r 1 , r 2 , r 3 Z q for generating temporary values in the proof.
  • Prover:
  •    (1) Compute R 1 = g r 1 , R 2 = g r 2 , R 3 = g r 3 , where g is the cyclic group generator.
  •    (2) Calculate the hash h = Hash ( A | R 1 | R 2 | R 3 ) .
  •    (3) Compute B = X i , 1 · h + r 1 , C = X i , 2 · h + r 2 , D = X i , 3 · h + r 3 .
  • The Prover presents A , B , C , D , R 1 , R 2 , R 3 to the Verifier.
  • Verifier:
  •    (1) The Verifier uses the formula y i , 1 B · y i , 2 C · y i , 3 D = A · z h to verify the proof, where y i , j are distributed encryption values, z is the public key base.
  •    (2) Compute g B = R 1 ( g x i , 1 ) h , g C = R 2 ( g x i , 2 ) h , g D = R 3 ( g x i , 3 ) h to validate the values B , C , D .
  • If the calculations are correct, Accept the proof. Otherwise, reject the proof.
  • Zero-Knowledge Feature: The proof process does not reveal the voter’s private keys x i , j to the Verifier, ensuring vote anonymity and privacy.
After the verification of the above proof, the prover needs to show that c 1 / a and c 2 / g have the same exponent using the proof scheme given in [25]. The detailed steps are given in Algorithm 3.
Algorithm 3 Procedure for proving that c 1 / a and c 2 / g have the same exponent
  • Parameters: The Prover selects a random number t for generating temporary values T 1 and T 2 in the proof.
  • Prover:
  •    (1) Compute T 1 = g t and T 2 = p k t , where g is the cyclic group generator and p k is the public key.
  •    (2) Calculate the hash h = Hash ( T 1 | | T 2 ) , concatenating T 1 and T 2 into a single string.
  •    (3) Compute s = r 4 · h + t , where r 4 is another random number selected by the Prover.
  • The Prover sends T 1 , T 2 , s to the Verifier.
  • Verifier:
  •    (1) The Verifier recalculates the hash h = Hash ( T 1 | | T 2 ) to ensure the Prover is using the same T 1 and T 2 .
  •    (2) The Verifier checks if T 1 · ( ( c 1 a ) h )   = g s , T 2 · ( ( c 2 a ) h )   = p k s
  • If the equation holds The proof is valid, confirming the homomorphic property of the encryption scheme. Else the proof is invalid.
  • Zero-Knowledge Feature: The proof process does not reveal the random numbers t and r 4 to the Verifier, ensuring the anonymity and privacy of the vote.

4.1.5. Verification Stage

The verification of the ballot is mainly carried out through the zero-knowledge proof given by the prover. First, each encrypted ballot needs to be verified to prevent calculation errors or possible malicious behavior when the voter generates the ciphertext. The specific verification process is in protocol 1. After completing the above verification process, an overall verification needs to be carried out. According to the voting rules, the sum of the votes of a voter for all candidates is 1. By using an encryption algorithm with additive homomorphism, anyone can calculate the total votes and complete the verification through ZKP(1). The specific verification process is shown in protocols 2 and 3.

4.1.6. Counting Stage

After all voters have completed voting, the election administrator needs to tally the votes and publish the results on the blockchain. Using the additive homomorphism property of the ballot ciphertext, the total votes are calculated. Since each ballot is encrypted using Formula (8), to count the votes for each candidate, the ciphertexts for the jth candidate from each voter are multiplied. This is represented as follows:
i = 1 n v E ( p k , y i , j , x i , j , m i , j ) = E ( p k , y 1 , j , x 1 , j , m 1 , j ) · · E ( p k , y n v , j , x n v , j , m n v , j ) = i = 1 n v y i , j x i , j · g r 1 + + r n v , i = 1 n v g m i , j · p k r 1 + + r n v = ( g r , g i = 1 n v m i , j p k r )
The result of Formula (11) can be regarded as the result of ElGamal encryption of i = 1 n v m i , j . To decrypt this ciphertext, the election administrator must upload the partial decryption value ( g r ) s k to the blockchain and generate a zero-knowledge proof ZKP ( s k ) to prove this value is correctly calculated using the private key s k . Any voter can calculate the total votes for the jth candidate using
g i = 1 n v m i , j = g i = 1 n v m i , j p k r / ( g r ) s k
Similarly, the above operation is performed for each candidate to obtain the total votes for all candidates. Since any voter on the blockchain can publicly access all ciphertexts, each voter can independently calculate the votes for each candidate.

4.1.7. Recovery Stage

If the last voter and the administrator collude, they can know the voting results in advance and change the voting strategy or abstain, causing fairness issues. Therefore, the last voter’s promised ballot can be recovered through the recovery phase, ensuring all voters obtain the correct result. Suppose the last voter v n v did not vote. Voter v i ( i [ 1 , n v 1 ] ) sends the recovery value R i , j = ( g x i , j ) ρ i j to the smart contract. After any voter obtains the recovery value of all other voters, they can calculate the last voter’s ballot g m i , j :
g m i , j = C i , j k = 1 , k n v n v R k , j
After obtaining g m i , j , since m i , j takes values of 0 or 1, the value of m i , j can be quickly determined. Voter v i can still calculate the sum of the votes of the first n v 1 voters through the above counting phase. In this way, the final voting result is obtained.

5. Correctness and Safety Analysis

In this section, we will theoretically analyze the security of the self-tallying voting protocol based on the ElGamal cryptosystem and distributed encryption algorithm and discuss its reliability and practicality in real-world applications.

5.1. Correctness

The correctness of the scheme is guaranteed by zero-knowledge proofs, ElGamal encryption, and blockchain. First, the scheme relies on smart contracts to automate the voting process, making it tamper-proof. The election administrator adds the election public key and other necessary parameters to the contract, enabling voters to vote securely and conveniently through the smart contract. The code logic in the smart contract ensures the correctness of the voting process, while blockchain technology guarantees that the voting results are tamper-proof.
Second, the scheme uses a zero-knowledge proof mechanism to protect voter privacy. During the voting process, voters use zero-knowledge proofs to ensure that the ciphertext they provide is generated according to the scheme’s requirements. Finally, during the counting stage, the ciphertext exhibits additive homomorphism properties. Any participating entity on the blockchain can count the votes without decryption and obtain the ciphertext of the result. The election administrator then generates a partial decryption value along with the corresponding zero-knowledge proof and publishes it on the blockchain, allowing all participants to decrypt the ciphertext to obtain the final result.
Assuming that the voter knows all the ciphertext ballots and that the ballots are immutable, the counting process for the jth candidate’s ballot is as follows:
i = 1 n ν E ( p k , y i , j , x i , j , m i , j ) = E ( p k , y i , j , x i , j , m i , j ) · · E ( p k , y n v , j , x n v , j , m n v , j ) = ( y 1 , j x 1 , j × g r 1 , g m 1 , j × p k r 1 ) · · ( y n v , j x n v , j × g r n v , j , g m n v , j × p k r n v ) = i = 1 n v y i , j x i , j · g r 1 + + r n v , i = 1 n v g m i , j · p k r 1 + + r n v = ( g r 1 + + r n v , g i = 1 n v m i , j · p k r 1 + + r n v ) = ( g r , g i = 1 n v m i , j · p k r )
where g 2 m j represents the total number of votes received by the jth candidate.

5.2. Security Analysis

Assuming there are a total of n v voters v 1 , v 2 , , v n v , and n c candidates c 1 , c 2 , , c n c , we consider two types of adversaries based on security needs: passive adversaries and active adversaries. Passive adversaries do not actively participate in the voting process but eavesdrop on the blockchain, attempting to obtain ballot information. Active adversaries may actively obstruct or manipulate the voting process, terminate voting prematurely, or collude with other voters to obtain more information about the voting.
The zero-knowledge proof provided in Figure 3 satisfies completeness, reliability, and honest verifier zero-knowledge (HVZK). The specific proof process is referenced in [22]. The MBS security of the voting scheme proposed in this chapter relies primarily on the security of this zero-knowledge proof protocol and the Decisional Diffie–Hellman (DDH) problem. The proof process is outlined below:
Theorem 1
(MBS). If the probability of an adversary A winning in the MBS model within any polynomial time is negligible, then this electronic voting scheme is MBS secure.
Proof. 
If there exists an adversary A within polynomial time that can win in the MBS model with a non-negligible advantage, an algorithm B can be constructed to break the zero-knowledge proof protocol and the DDH problem. Assume that the probability of the adversary winning in Game i is Pr [ Win i ] .
Game 0: Adversary A declares the target voters v a and v b , and the other voters are controlled by the adversary. The challenger C randomly selects a voter v T from the target voters v a and v b . The ballot of v T is {1}, while the ballot content of the other target voter is {0}. The challenger C generates the challenge ballots { C a , V a , Z a } and { C b , V b , Z b } for these two target voters, where C i is the ballot commitment, V i is the ciphertext ballot set, and Z i is the zero-knowledge proof, i { a , b } . A outputs a guess result, indicating who cast the ballot {1} among v a and v b .
Pr [ Win 0 ] = Pr [ out = T ]
Game 1: Game 1 differs from Game 0 only in the zero-knowledge proof. In this game, C generates zero-knowledge proof { Z a * , Z b * } through simulator S to replace { Z a , Z b } in Game 0. At this point, the challenge ballots are { C a , V a , Z a * } and { C b , V b , Z b * } . A wins the game if it can distinguish Game 1 from Game 0. If A wins the game within polynomial time with a non-negligible probability, then an algorithm B can be constructed to break the zero-knowledge proof protocol. The probability of the adversary winning in Game 1 satisfies the following formula:
Pr [ Win 1 ] Pr [ Win 0 ] ε zkp
Game 2: The difference between Game 2 and Game 1 is that C generates two ballot commitments { C a * , C b * } to replace { C a , C b } in Game 1. The target voters v a and v b are the public keys g a and g b generated by c j , R { g a b , g r } , where r is a random number. C chooses a random number for C a * , making C b * = g m b , j · R · ( g b ) i = 1 , i a , b n v x i , j . A wins the game if it can distinguish Game 2 from Game 1. If A wins the above game with a non-negligible advantage, then an algorithm B can be constructed to break the DDH problem. The probability of the adversary winning in Game 2 satisfies the following formula:
Pr [ Win 2 ] Pr [ Win 1 ] ε DDH
Game 3: The difference between Game 3 and Game 2 is that C generates two ballot commitments { C a * , C b * } to replace { C a , C b } in Game 2. The target voters v a and v b are the public keys g a and g b generated by c j , R { g a b , g r } , where r is a random number. C chooses a random number for C b * , letting C a * = g m a , j · R · ( g a ) i = 1 , i a , b n v x i , j . A wins the game if it can distinguish Game 3 from Game 2. If A wins the above game with a non-negligible advantage, then an algorithm B can be constructed to break the DDH problem. The probability of the adversary winning in Game 3 satisfies the following formula:
Pr [ Win 3 ] Pr [ Win 2 ] ε DDH
Game 4: The difference between Game 4 and Game 3 is that C generates two ciphertext ballot sets { V a * , V b * } to replace { V a , V b } in Game 3. At this point, the challenge ballots generated by C are { C a , V a * , Z a } and { C b , V b * , Z b } . For A , this is of the same distribution. A wins the game if it can distinguish Game 4 from Game 3. If A wins the above game with a non-negligible advantage, then an algorithm B can be constructed to break the DDH problem. The probability of the adversary winning in Game 4 satisfies the following formula:
Pr [ Win 4 ] Pr [ Win 3 ] ε DDH
Since the challenge ballot is indistinguishable from the adversary A , the probability of the adversary winning in Game 4 is 1 2 . Summarizing the above game process, the probability of A winning the MBS game is less than or equal to 1 2 + ε zkp + 3 ε DDH . Therefore, if the zero-knowledge proof protocol and DDH problem are secure, any A ’s advantage in winning the MBS game is negligible, and the self-tallying scheme proposed in this chapter is MBS secure.
The electronic voting system ensures Confidentiality through double encryption using ElGamal, protecting votes with both voter and administrator keys. It prevents Duplicate Voting by tracking plaintext voter identities against encrypted votes. Self-tallying allows voters to decrypt the final tally once the administrator provides partial decryption values. The system maintains Fairness by encrypting all ballots, making it impossible to influence results based on prior vote knowledge. Finally, verifiability is supported by the blockchain’s immutable ledger, enabling voters to verify all steps and calculations. This system combines cryptographic security with transparent, tamper-evident record-keeping for a fair and trustworthy voting process. ☐

6. Experimental Analysis

In this section, an experimental analysis was conducted on the scheme proposed in the previous section, specifically referring to the calculation time of each step in the voting process. Three aspects of experimental analysis were specifically conducted, namely voting, verification, and counting. In this scheme, each ballot is encrypted twice using different keys. All tests are performed using 512-bit keys, which provide a higher level of security than one-time encryption using 1024-bit keys. Most of the calculations in this chapter are performed off-chain, and only the contract’s verification of ciphertext and zero-knowledge proof is on-chain. Table 2 is the environment used for the experiment.
Table 3 provides a comparison of the functionality and security of this scheme with the schemes of Li et al. [22], Mccorry et al. [18], and Yang et al. [24]. The specific comparison includes self-tallying, support for multiple candidates, ballot encryption efficiency, and malicious participants. From the table, it can be seen that this scheme satisfies these attributes.
From the table, it can be concluded that this scheme has the following advantages: This scheme has the attribute of self-tallying, which avoids the privacy issues brought about by third-party institutions counting votes, making the voting results more undisputed. It can solve the fairness problem in the self-tallying scheme. Compared with Li’s scheme, this scheme supports voting for multiple candidates. Compared with Yang’s scheme, this scheme has better efficiency in encrypting ballots, and this scheme has a recovery phase, which can better solve the problem of voters giving up voting.
In this experiment, the time spent by voters in the process of encrypting votes was tested separately when the number of voters was 20 and under different numbers of candidates. From the figure, we can see that even if there are 20 candidates, the time cost of voting is less than 20 milliseconds. As the number of candidates increases, the time voters spend on encrypting ballots also increases accordingly, so the time voters spend on encrypting ballots is linearly related to the number of candidates. In the case of multiple-candidate voting, this scheme is more efficient in encrypting votes than Li’s and Yang’s schemes.
As shown in Figure 4 and Figure 5, tests were conducted with 20 voters, and the time spent on encrypting ballots, counting votes, and generating zero-knowledge proofs for different candidates was measured. The time each voter spends is proportional to the number of candidates, and the time spent on encrypting ballots is longer than that of counting votes and generating zero-knowledge proofs. When the number of candidates is 20, the time spent on encrypting ballots, counting votes, and generating zero-knowledge proofs will not exceed 12 milliseconds.
Verifying a ballot primarily involves validating the digital signature of the ciphertext and the corresponding zero-knowledge proof of the ciphertext. Counting votes mainly includes verifying the partial decryption value provided by the election administrator and calculating the number of votes each candidate received.
As can be seen from Figure 6, the time spent by voters on verifying ciphertexts is much longer than the time spent on calculating ciphertexts and counting votes. However, overall, when the number of candidates is 20, the total verification time for an individual will not exceed 3.5 s.

7. Conclusions

This manuscript presents an analysis of Li’s electronic voting scheme, identifying its limitations in terms of applicability to multiple candidates and issues surrounding fairness. To address these concerns, we introduce an innovative self-tallying voting scheme suitable for scenarios with multiple candidates. The scheme is constructed utilizing the ElGamal cryptosystem in conjunction with distributed encryption techniques.
A comparative analysis with Li’s scheme reveals that the proposed scheme enhances the efficiency of encrypting ballots for multiple candidates without compromising the privacy of the votes. Leveraging the homomorphic properties inherent in the ElGamal cryptosystem, the scheme enables voters to tally votes directly from ciphertexts, eliminating the need for decryption. Critically, the scheme ensures fairness by requiring the election administrator to upload a partial decryption value, thereby preventing any voter from ascertaining the election outcome prematurely.
The paper concludes with an experimental analysis that substantiates the scheme’s improved efficiency in handling multiple candidate elections while maintaining robust security measures. The findings demonstrate the scheme’s potential to offer a more secure and efficient framework for electronic voting, particularly in elections with a larger pool of candidates. For future work, we will consider selecting more efficient encryption algorithms. Although the ElGamal encryption algorithm currently used is sufficiently secure, its encryption, decryption, and intermediate computational processes are relatively slow. In the future, we can consider using more efficient encryption algorithms to enhance the performance of the voting system.

Author Contributions

Conceptualization, X.D., X.Z. and D.Z.; project administration, D.Z.; funding acquisition, D.Z.; methodology, X.D. and D.Z.; software, X.Z.; validation, C.H. and X.Z.; formal analysis, D.Z. and X.D.; investigation, D.Z.; resources, C.H.; data curation, J.Z.; writing—original draft preparation, X.D. and X.Z.; writing—review and editing, X.D., X.Z., D.Z. and J.Z.; visualization, J.Z. and C.H.; supervision, D.Z. and C.H. All authors have read and agreed to the published version of the manuscript.

Funding

This work is supported by Guangdong Provincial Key Laboratory of Power System Network Security (No. GPKLPSNS-2022-KF-05).

Data Availability Statement

All data are presented in the main text.

Conflicts of Interest

Chao Hong is employee of CSG Electric Power Research Institute Co., Ltd. The authors declare no conflicts of interest.

References

  1. Wang, Y.; Zhou, J.; Cong, R.; Wang, L.; Huang, Y.; Chen, D. A Study on the Current Status and Development of Blockchain Technology in the Intelligent Management of Electric Vehicles. South. Power Grid Technol. 2022, 16, 55–67. [Google Scholar] [CrossRef]
  2. Tang, X.; Yao, J.; Liu, W.; Yan, X.; Li, Z. Blockchain Technology-based Coordination Strategy for Electric Vehicles and Distributed Energy Interconnection. South. Power Grid Technol. 2022, 16, 46–54. [Google Scholar] [CrossRef]
  3. Mannonov, K.M.U.; Myeong, S. Citizens’ Perception of Blockchain-Based E-Voting Systems: Focusing on TAM. Sustainability 2024, 16, 4387. [Google Scholar] [CrossRef]
  4. Chaum, D.L. Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 1981, 24, 84–90. [Google Scholar] [CrossRef]
  5. Khader, D.; Smyth, B.; Ryan, P.; Hao, F. A fair and robust voting system by broadcast. In Proceedings of the 5th International Conference on Electronic Voting, EVOTE 2012, Bregenz, Austria, 11–14 July 2012; Lecture Notes in Informatics. Gesellschaft fur Informatik: Bonn, Germany, 2012; pp. 285–299. [Google Scholar]
  6. Fiege, U.; Fiat, A.; Shamir, A. Zero knowledge proofs of identity. In Proceedings of the Nineteenth Annual ACM Symposium on Theory of Computing, New York, NY, USA, 1 January 1987; pp. 210–217. [Google Scholar]
  7. Cramer, R.; Gennaro, R.; Schoenmakers, B. A secure and optimally efficient multi-authority election scheme. Eur. Trans. Telecommun. 1997, 8, 481–490. [Google Scholar] [CrossRef]
  8. Paillier, P. Public-key cryptosystems based on composite degree residuosity classes. In Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, Prague, Czech Republic, 2–6 May 1999; Springer: Berlin/Heidelberg, Germany, 1999; pp. 223–238. [Google Scholar]
  9. Fujioka, A.; Okamoto, T.; Ohta, K. A practical secret voting scheme for large scale elections. In Proceedings of the Advances in Cryptology—AUSCRYPT’92: Workshop on the Theory and Application of Cryptographic Techniques, Gold Coast, Australia, 13–16 December 1992; Proceedings 3. Springer: Berlin/Heidelberg, Germany, 1993; pp. 244–251. [Google Scholar]
  10. Joaquim, R.; Zúquete, A.; Ferreira, P. REVS–a robust electronic voting system. IADIS Int. J. WWW/Internet 2003, 1, 47–63. [Google Scholar]
  11. Yu, B.; Liu, J.K.; Sakzad, A.; Nepal, S.; Steinfeld, R.; Rimba, P.; Au, M.H. Platform-independent secure blockchain-based voting system. In Proceedings of the Information Security: 21st International Conference, ISC 2018, Guildford, UK, 9–12 September 2018; Proceedings 21. Springer: Berlin/Heidelberg, Germany, 2018; pp. 369–386. [Google Scholar]
  12. Liu, J.K.; Wong, D.S. Linkable ring signatures: Security models and new schemes. In Proceedings of the Computational Science and Its Applications–ICCSA 2005: International Conference, Singapore, 9–12 May 2005; Proceedings, Part II 5. Springer: Berlin/Heidelberg, Germany, 2005; pp. 614–623. [Google Scholar]
  13. Lee, B.; Kim, K. Receipt-free electronic voting scheme with a tamper-resistant randomizer. In Proceedings of the Information Security and Cryptology—ICISC 2002: 5th International Conference, Seoul, Republic of Korea, 28–29 November 2002; Revised Papers 5. Springer: Berlin/Heidelberg, Germany, 2003; pp. 389–406. [Google Scholar]
  14. Zhao, Z.; Chan, T.H.H. How to vote privately using bitcoin. In Proceedings of the Information and Communications Security: 17th International Conference, ICICS 2015, Beijing, China, 9–11 December 2015; Revised Selected Papers 17. Springer: Berlin/Heidelberg, Germany, 2016; pp. 82–96. [Google Scholar]
  15. Nakamoto, S. Bitcoin: A Peer-to-Peer Electronic Cash System. 2008. Available online: https://bitcoin.org/bitcoin.pdf (accessed on 16 June 2024).
  16. Wood, G. A secure decentralised generalised transaction ledger. Ethereum Proj. Yellow Pap. 2014, 151, 1–32. [Google Scholar]
  17. Kosba, A.; Miller, A.; Shi, E.; Wen, Z.; Papamanthou, C. Hawk: The blockchain model of cryptography and privacy-preserving smart contracts. In Proceedings of the 2016 IEEE Symposium on Security and Privacy (SP), San Jose, CA, USA, 22–26 May 2016; IEEE: Piscataway, NJ, USA, 2016; pp. 839–858. [Google Scholar]
  18. McCorry, P.; Shahandashti, S.F.; Hao, F. A smart contract for boardroom voting with maximum voter privacy. In Proceedings of the Financial Cryptography and Data Security: 21st International Conference, FC 2017, Sliema, Malta, 3–7 April 2017; Revised Selected Papers 21. Springer: Berlin/Heidelberg, Germany, 2017; pp. 357–375. [Google Scholar]
  19. Kiayias, A.; Yung, M. Self-tallying elections and perfect ballot secrecy. In Proceedings of the International Workshop on Public Key Cryptography, Paris, France, 12–14 February 2002; Springer: Berlin/Heidelberg, Germany, 2002; pp. 141–158. [Google Scholar]
  20. Groth, J. Efficient maximal privacy in boardroom voting and anonymous broadcast. In Proceedings of the International Conference on Financial Cryptography, Key West, FL, USA, 9–12 February 2004; Springer: Berlin/Heidelberg, Germany, 2004; pp. 90–104. [Google Scholar]
  21. Lee, K.; James, J.I.; Ejeta, T.G.; Kim, H.J. Electronic voting service using block-chain. J. Digit. Forensics Secur. Law 2016, 11, 8. [Google Scholar] [CrossRef]
  22. Li, Y.; Susilo, W.; Yang, G.; Yu, Y.; Liu, D.; Du, X.; Guizani, M. A blockchain-based self-tallying voting protocol in decentralized IoT. IEEE Trans. Dependable Secur. Comput. 2020, 19, 119–130. [Google Scholar] [CrossRef]
  23. Panja, S.; Bag, S.; Hao, F.; Roy, B. A smart contract system for decentralized borda count voting. IEEE Trans. Eng. Manag. 2020, 67, 1323–1339. [Google Scholar] [CrossRef]
  24. Yang, X.; Yi, X.; Nepal, S.; Kelarev, A.; Han, F. Blockchain voting: Publicly verifiable online voting protocol without trusted tallying authorities. Future Gener. Comput. Syst. 2020, 112, 859–874. [Google Scholar] [CrossRef]
  25. Schnorr, C.P. Efficient signature generation by smart cards. J. Cryptol. 1991, 4, 161–174. [Google Scholar] [CrossRef]
Figure 1. Framework for the self-tallying voting schemes.
Figure 1. Framework for the self-tallying voting schemes.
Cryptography 08 00042 g001
Figure 2. Workflow of the decentralized self-tallying scheme.
Figure 2. Workflow of the decentralized self-tallying scheme.
Cryptography 08 00042 g002
Figure 3. The generation process of Z K P ( C i , j ) .
Figure 3. The generation process of Z K P ( C i , j ) .
Cryptography 08 00042 g003
Figure 4. Encryption Time on voting.
Figure 4. Encryption Time on voting.
Cryptography 08 00042 g004
Figure 5. Time used for encrypting ballots, counting votes and zero-knowledge proofs.
Figure 5. Time used for encrypting ballots, counting votes and zero-knowledge proofs.
Cryptography 08 00042 g005
Figure 6. Time spent on the validation process.
Figure 6. Time spent on the validation process.
Cryptography 08 00042 g006
Table 1. Symbols used by the program.
Table 1. Symbols used by the program.
SymbolSpecific Meaning
p k Public key of the election administrator
s k Private key of the election administrator
n c Total number of candidates
n v Total number of voters
v i The ith voter, i = { 1 , 2 , , n v }
x i , j The private key generated by the ith voter for voting for the jth candidate
y i , j The value computed by the ith voter using all the public keys for the jth candidate through Distributed Encryption
m i , j The vote of the ith voter for the jth candidate
C i , j Ballot commitment generated by the ith voter for m i , j
Y i , j Public key product computed by the ith voter for the jth candidate
ZKP{…}Zero Knowledge Proofs
Table 2. Experimental environment.
Table 2. Experimental environment.
Parameter NameParameter Value
Operating SystemWin 11
ProcessorAMD Ryzen 7 5700U
RAM8 GB
Table 3. Comparison of the four options.
Table 3. Comparison of the four options.
SchemeSelf-TallyingVoting FunctionalityEfficiencyMalicious Participants
Li [22]yesTwo choicesLowSupport
Mccorry [18]yesTwo choicesLowNot Supported
Yang [24]yesMultiple choiceLowSupport
Our SchemeyesMultiple choiceHighSupport
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Dai, X.; Zhou, X.; Zhou, D.; Zhong, J.; Hong, C. A Multi-Candidate Self-Tallying Voting Scheme Based on Smart Contracts. Cryptography 2024, 8, 42. https://doi.org/10.3390/cryptography8030042

AMA Style

Dai X, Zhou X, Zhou D, Zhong J, Hong C. A Multi-Candidate Self-Tallying Voting Scheme Based on Smart Contracts. Cryptography. 2024; 8(3):42. https://doi.org/10.3390/cryptography8030042

Chicago/Turabian Style

Dai, Xingan, Xinquan Zhou, Dehua Zhou, Jinhan Zhong, and Chao Hong. 2024. "A Multi-Candidate Self-Tallying Voting Scheme Based on Smart Contracts" Cryptography 8, no. 3: 42. https://doi.org/10.3390/cryptography8030042

APA Style

Dai, X., Zhou, X., Zhou, D., Zhong, J., & Hong, C. (2024). A Multi-Candidate Self-Tallying Voting Scheme Based on Smart Contracts. Cryptography, 8(3), 42. https://doi.org/10.3390/cryptography8030042

Article Metrics

Back to TopTop