Making Votes Count with Internet Voting

  • Original Paper
  • Open access
  • Published: 02 March 2020
  • Volume 43 , pages 1511–1533, ( 2021 )

Cite this article

You have full access to this open access article

online voting system research paper

  • Micha Germann   ORCID: orcid.org/0000-0002-5217-3240 1  

6603 Accesses

11 Citations

17 Altmetric

Explore all metrics

This paper reassesses the claim that electronic voting systems help voters to avoid common mistakes that lead to their votes remaining uncounted. While prior studies have come to mixed conclusions, I provide new, more robust evidence based on a case study of extended Internet voting trials in Geneva canton, Switzerland. The trials almost exclusively involved referendum votes. For causal identification I exploit the unique circumstance that federal safety legislation created a near-natural experiment, with some of the canton’s municipalities participating in the trials and others not. Using difference-in-differences estimation, I find that the residual vote rate decreased by an average of 0.3 percentage points if municipalities offered the possibility to vote online in addition to (mostly optically scanned) paper ballots. For cantonal measures, which are located towards the bottom of ballot papers in Geneva, the reduction increases to 0.5 percentage points. These remain relatively modest effects, and I find no evidence for a knock-on effect on electoral outcomes. However, on average only around 20% of votes were cast online where the opportunity existed, and online voting was most popular among voters with high levels of education. Despite the small effect sizes, the results of this study therefore point to the potential of Internet and, more generally, electronic voting technology to reduce avoidable voter mistakes.

Similar content being viewed by others

online voting system research paper

Internet Voting in a Local Election in Canada

online voting system research paper

To i-vote or Not to i-vote: Drivers and Barriers to the Implementation of Internet Voting

online voting system research paper

Internet Voting in Estonia: From Constitutional Debate to Evaluation of Experience over Six Elections

Avoid common mistakes on your manuscript.

Introduction

Electoral turnout, and how to improve it, range among the core concerns in political science. However, more frequently overlooked is the fact that even if citizens participate in elections, their votes do not always enter the final count. Comparative evidence suggests that between 3 and 5% of votes cast remain uncounted (i.e., are ruled blank or invalid) in the average democratic election (Martinez i Coma and Werner 2019 ; Uggla 2008 ). In some contexts, such as Latin America, it is not uncommon for the number of uncounted votes to exceed 10% of votes cast (Power and Garand 2007 ).

Uncounted votes (henceforth also referred to as residual votes) can reflect the actual will of voters. Some voters choose to intentionally spoil their ballots as a form of protest. Others choose to skip some of the less salient races on a ballot (Solvak and Vassil 2015 ). However, residual votes often also result from mistakes on the side of voters. For example, uncertainty about electoral rules can lead voters to vote for more candidates than are allowed under the rules, leading to the invalidation of their votes (Carman et al. 2008 ). Moreover, voters may accidentally skip races due to oversight, or they may fail to mark ballots in a sufficiently clear way. This paper considers the potential of Internet voting technology to reduce such accidental residual votes.

Accidental residual votes range among the lesser known challenges to democratic legitimacy and the quality of representation. Of course, intentional residual votes are problematic as well because they often reflect voter alienation. However, citizens who accidentally cast residual votes would have wanted to make their voices heard, but failed to do so. Therefore, accidental residual votes contravene a central democratic principle: that the votes of citizens must be accurately interpreted and counted (Dahl 1989 , ch. 8). What is more, accidental residual votes are unlikely to be randomly distributed across different populations of voters. Existing evidence suggests that voters with low educational attainment are more prone to errors that lead to their votes not being counted (Bullock and Hood 2002 ; Fujiwara 2015 ; Sinclair and Alvarez 2004 ). Where education levels are correlated with race and ethnicity, such as in the U.S., that can mean that voter errors are disproportionately committed by members of ethnic minorities (Tomz and Van Houweling 2003 ). By implication, accidental residual votes are likely to reinforce well-known inequalities in representation stemming from unequal participation. In closely fought contests, they may even affect electoral outcomes.

Various proposals have been made for how to reduce accidental residual votes, including better training of polling staff, improved ballot design, and voter education campaigns (Herrnson et al. 2012 ; Herron and Sekhon 2003 ; Kimball and Kropf 2005 ; Niemi and Herrnson 2003 ). Another prominent proposal concerns error-preventing voting technologies, such as electronic voting systems (Alvarez and Hall 2008 ). Paper ballots remain the most common voting method in contemporary democracies, more than 400 years after their invention (Reynolds and Steenbergen 2006 ). But when equipped with a pen and piece of paper, there is often little standing in the way of voters making avoidable errors. While they have grown controversial in recent years due to vulnerability to fraud, an advantage of electronic voting systems is that they can be programmed to prevent voters from making such mistakes. As a result, electronic voting should make it more likely that votes enter the final count and, thus, increase effective participation.

However, empirical studies of whether electronic voting technology lives up to this promise have come to mixed conclusions (e.g., Ansolabehere and Stewart 2005 ; Stewart 2006 ). This paper provides new, more robust evidence on the effect of electronic voting technology on residual votes. While prior studies focused on electronic voting machines located in polling stations, this study extends the focus to Internet voting, a novel form of electronic voting that is increasingly discussed and experimented with around the globe (Alvarez et al. 2009 ). Specifically, I study the case of Geneva canton, Switzerland, where Internet voting (henceforth also referred to as i-voting or online voting) has been trialed on an extended basis from 2003 to 2005 and from 2008 onward. A limitation of the Geneva case is that experimentation with i-voting has largely involved referendums while eschewing elections. However, within these constraints, Geneva canton holds valuable lessons because it enables the estimation of Internet voting’s effect on uncounted ballots with comparatively high internal validity. The i-voting roll-out in Geneva canton resembles a natural experiment because, since the very first trials, federal safety legislation has been in place that led to between-municipality variation in the availability of i-voting, with i-voting being offered in some but not other municipalities. In turn, this permits to hold constant many sources of confounding that could have afflicted prior studies, including jurisdiction-specific electoral laws and counting practices as well as varying electoral dynamics.

Using difference-in-differences estimation, I find that the residual vote rate decreased by an average of 0.3 percentage points if municipalities offered the possibility to vote online in addition to (mostly optically scanned) paper ballots. Footnote 1 For cantonal (i.e., regional) measures, which in Geneva are located towards the bottom of ballot papers, the effect increases to a minus of 0.5 percentage points. These remain relatively modest effects, and additional analyses suggest that the reduction in uncounted ballots did not have a knock-on effect on electoral outcomes. However, only around 20% of votes tended to be cast online where the opportunity existed. Online voters also tend to have above-average education and, as a group, could thus be less prone to voting errors. Despite the relatively small effect sizes, the results of this study therefore point to the potential of Internet and, more generally, electronic voting technology to reduce avoidable voter mistakes.

The fiasco of the 2000 U.S. presidential election raised public awareness in America and elsewhere that the choice of voting technology is more than a mere technicality. Palm Beach County, Florida, demonstrated to the world that punch card ballots—a form of voting whereby voters punch holes in voting cards with a ballot marking device—are highly vulnerable to human error. As became evident, voters often fail to punch the cards cleanly, leading to the infamous ‘hanging chads’ that might have swayed the 2000 election to Bush (Brady et al. 2001 ). Awareness also grew about similar concerns with other common voting methods. For example, the optical scanners that are sometimes used for the counting of write-in ballots may not count a vote if the relevant boxes, bubbles, or arrows have not been marked in a sufficiently clear way (Kimball and Kropf 2005 ). More generally, voters may misunderstand the rules and, for example, vote for both a presidential and a vice presidential candidate in U.S. elections (Herron and Sekhon 2003 ).

In 2002, the U.S. government passed the Help America Vote Act (HAVA). As a result, billions of federal and state tax dollars were spent to update older voting technologies. Most election authorities opted for one of two technological innovations: precinct scanners and direct-recording electronic voting machines (DREs). Both, but especially DREs, came with the promise of minimizing “lost votes” due to malfunctioning voting technology and voter mistakes. Precinct scanners allow voters to have their ballot papers checked at the polling station before the casting of their votes. The most advanced implementations report both overvotes (i.e., if voters vote for more candidates or options than are allowed under the rules) and undervotes (i.e., blank votes), thus giving voters a chance to discover and correct potential mistakes (Brady et al. 2001 ; Kimball and Kropf 2008 ). However, voters often fail to pre-check their ballots (Hanmer et al. 2010 ). DREs, by contrast, automatize much of the error checking and prevention process. For example, many DREs do not just alert voters to overvotes, but prevent overvotes altogether. DREs also remove all problems related to unclear marking of the ballot because votes are cast by touching a screen or pressing a button. Similarly to precinct scanners, DREs can also be programmed to alert voters if they are about to skip a race (e.g., with a flashing light) (Alvarez and Hall 2008 ).

Have these technological fixes worked as intended? The election debacle in 2000 led to a flurry of new research into the relationship between voting technology and residual votes, much of it focused on the U.S. (for a review of this literature cf. Stewart 2011 ). However, aside from a general consensus that punch card systems often lead to much higher residual vote rates (e.g., Brady et al. 2001 ; Knack and Kropf 2003 ; Ansolabehere and Stewart 2005 ; Kimball and Kropf 2008 ; though also cf. Lott 2009 ), the findings from this literature have remained contradictory. To be sure, several studies report evidence that precinct scanners (e.g., Alvarez et al. 2013 ; Kimball and Kropf 2008 ) and DREs (e.g., Stewart 2006 ) tend to reduce residual vote rates, including (for the case of DREs) two studies conducted outside the U.S., one in Brazil (Fujiwara 2015 ) and the other in the Netherlands (Allers and Kooreman 2009 ). Particularly promising, Tomz and Van Houweling ( 2003 ) reported evidence from two U.S. states, Louisiana and South Carolina, that DREs significantly reduce the gap between African American and white voters in terms of voided ballots. However, other studies point in different directions. In a comprehensive study of the U.S. experience that covers the whole nation and elections from 1988 to 2000, Ansolabehere and Stewart ( 2005 ) find that DREs often produce more residual votes than traditional paper-based voting methods, such as hand-counted write-in ballots. Knack and Kropf ( 2003 ) come to a similar conclusion in their study of the 1996 U.S. presidential election, whereas Brady et al. ( 2001 ) find that DREs performed comparably to, but did not outperform, most paper-based voting systems in the 2000 U.S. presidential election (also cf. Lott 2009 ). Regarding precinct scanners, both Knack and Kropf ( 2003 , fn. 21) and Tomz and Van Houweling ( 2003 , p. 56) report no significant differences in residual votes when comparing them with centrally counted optical scanning systems that do not provide voters with the possibility to check their ballots.

These disparate findings can be partly reconciled when considering that precinct scanners and DREs are not all born the same. Not all versions of precinct scanners alert voters to undervotes, which could decrease their performance (Miller 2013 ). At the same time, especially older DREs tended to have usability issues, which could explain why some studies found few, if any, improvements over paper-based voting technologies (Stewart 2006 ). Kimball and Kropf ( 2008 ), for example, show evidence from the 2004 election in the U.S. that full-face DREs that display all ballots at once on sometimes massive screens can overwhelm voters and make it more rather than less likely that they miss down-ballot contests. In addition, the performance of voting technologies is likely to differ depending on context factors, such as the complexity of electoral rules, the design of paper ballots, and levels of education.

However, many prior studies also suffer from limitations that render their conclusions uncertain (Stewart 2011 ). Especially earlier studies often relied on cross-sectional variation in voting technology while accounting for potential confounders by controlling for factors such as the size and average income of electoral districts (e.g., Kimball and Kropf 2008 ; Knack and Kropf 2003 ; Tomz and Van Houweling 2003 ). However, this risks confounding the effects of voting technology with other differences across jurisdictions that are more difficult to measure, such as the sophistication of voters, election laws, or levels of voter disaffection. Other studies have relied on more sophisticated panel data designs (e.g., Ansolabehere and Stewart 2005 ), which allow to control for cross-sectional differences via fixed effects estimation. However, a problem that remains is that these studies tend to make comparisons across different elections with potentially different dynamics, such as presidential races or ballot measures in different states. This risks conflating the effects of voting technology with election-specific factors, such as the closeness of races or their perceived importance (cf. Keele and Minozzi 2013 ). Therefore, more (and better) evidence on the performance of different voting technologies is needed.

Internet Voting and Residual Votes

This study sheds new light on the causal effect of electronic voting technology on residual votes based on a case study of Geneva canton. While prior studies have focused on DREs, this study extends the focus to a different form of electronic voting: Internet voting. From the perspective of residual votes, DREs and i-voting systems are not too different, as error-prevention mechanisms available in the context of DREs are often easily extendable to online voting. However, whereas DREs are for voting in polling stations, i-voting extends error-prevention mechanisms to remote voters. The remainder of this section provides a short overview of the i-voting trials in Geneva canton, including a discussion of the ways in which Geneva’s i-voting solution could have reduced the residual vote rate.

Geneva’s Internet Voting Trials

Geneva canton ranges among the Internet voting pioneers. In 2002, the Swiss government decided to enable trials with online voting in selected cantons. Geneva took up the challenge, along with two other cantons (Neuchâtel and Zurich). In 2003, Geneva staged Switzerland’s first i-voting experiment in the context of a local-level referendum in Anières, one of its smaller municipalities. The following year, Anières and three other municipalities first used i-voting for federal (i.e., national) and cantonal (i.e., regional) referendums. I-voting experiments continued in subsequent years in these and other municipalities. The only exception was the period between June 2005 and June 2008, when Geneva’s i-voting program was temporarily suspended because of the need to establish a firmer legal basis. In 2009, online voting was extended to Swiss expatriates registered in Geneva canton, an option that has remained available to them since (Pammett and Goodman 2013 ; Serdült et al. 2015 ).

Against initial expectations, Internet voting proved only moderately popular with Geneva’s voters. As in most other i-voting experiments (e.g., in Estonia), online ballots were always offered as a complement to paper ballots in Geneva canton. However, more unusually, voters in Geneva always also had the option to vote by mail. Voting materials were always automatically sent to voters around 4 weeks prior to an electoral contest, and they could then choose whether to take their ballot papers to a polling station, whether to return them by mail, or, where that opportunity existed, whether to cast their votes online. Perhaps due to this highly convenient range of choices, on average only around 20% of votes were cast online where the opportunity existed (Mendez and Serdült 2017 ; Serdült et al. 2015 ). The only major exception were expatriate voters, 50% and more of whom tended to make use of the possibility to vote online (see Fig. 1 and, for further details, Germann and Serdült 2014 ).

figure 1

Data source : Serdült et al. ( 2015 ), updated with official records

Internet voting usage in Geneva canton, 2004–2016.

Against the expectations of many, available evidence also suggests that the introduction of i-voting had no effect on electoral turnout (Germann and Serdült 2017 ). Again, a plausible reason is the availability of postal voting. Voting in Geneva is rather convenient even in the absence of online ballots. Where voters cannot also vote by mail, such as in Estonia or Canada, extant evidence suggests that online voting can provide a boost to turnout (Alvarez et al. 2009 Goodman and Stokes, forthcoming).

Electronic Safeguards Against Accidental Residual Votes

However, even if i-voting did not affect participation rates in Geneva canton, by reducing voter errors it might still have increased the effective turnout in terms of the number of valid votes cast. Next, I identify the safeguards implemented in Geneva’s i-voting solution that could have helped voters to avoid accidental residual votes. Given that Geneva’s i-voting trials were generally limited to direct democratic votes, the discussion (as the empirical analysis that follows) focuses on the case of referendum ballots. Footnote 2

Throughout the period analyzed (2001–2016), the same referendum ballots featuring ‘yes’ and ‘no’ boxes next to every measure were used in Geneva for both postal and the traditional ballot box voting. In order to cast a valid vote, voters had to check one of these boxes with a cross. Mail ballots were then counted centrally with optical scanners, whereas votes cast in polling stations were counted by hand in the individual polling stations. Footnote 3 As mail ballots were far more popular—often more than 90% or even 95% of paper ballots were returned by mail—most paper ballots were scanned. Neither mail nor precinct voters had access to any kind of technology, such as precinct scanners, that would allow them to check their marked ballots for errors.

Geneva’s i-voting system improves upon this system in two ways. First, it prevents accidental overvotes. In the context of referendum votes, the danger that voters erroneously conclude that they are supposed to check both the yes and no boxes is likely to be small. However, it is possible that voters leave stray marks covering the second box, which can prevent the optical scanners from deciphering a voter’s intention, leading to the invalidation of the vote. Footnote 4 Similarly, voters may come to realize that they did not give the answer they intended to give, leading them to check the second box while attempting to strike through (or erase) their original answer, which is not allowed. Geneva’s i-voting system prevents such unintentional overvotes because voters can choose their favored answer from a drop-down menu, which makes choices correctable and ensures that voters give one answer only.

Second, Geneva’s i-voting system is likely to reduce accidental undervotes. I-voting precludes undervotes that result from voters placing their checks outside of the relevant boxes. I-voting also precludes undervotes that result from voters using a red-colored pen, which cannot be read by Geneva’s optical scanners. Finally, and perhaps most importantly, the i-voting software makes it less likely that voters skip a race by accident. It is not uncommon in Switzerland that voters have to vote on 5, 10, or even more ballot measures at the same time (Selb 2008 ). When ballots are as crowded, the chance that voters unintentionally skip one or more of the proposals is likely to increase. While it is still possible to cast a blank vote with i-voting, it becomes less likely that voters do so unintentionally because online voters are shown a confirmation screen after completing their ballot. The confirmation screen prompts voters to review their choices before the final submission. Thus, undervoting becomes more transparent and correctable.

Empirical Strategy

Could these safeguards reduce the residual vote rate? The Geneva case enables a comparatively robust answer to this question because of its staggered adoption of i-voting over time and space.

Ever since the very first i-voting trials in Geneva canton, federal safety legislation has been in place limiting the number of voters who can participate in i-voting trials. The goal of this law has been to reduce the risk in terms of electoral manipulation. Initially, the safety legislation stipulated that not more than 20% of all voters in a canton should have access to online voting. In 2012, the cap was increased to 30% of a canton’s electorate. Footnote 5 To conform with this legislation, Geneva’s electoral administrators decided to trial i-voting only in selected municipalities. This way, they could ensure that the federally imposed cap would never be surpassed. There was some turnover over time, with some municipalities dropping out of the trials and others joining. But i-voting was always offered in some municipalities and not others. Notably, all voters in trial municipalities had the option of voting online. Trial municipalities were selected so that the federal cap would still be met if that were to happen. Of course, in practice only a minority of voters tended to make use of the possibility (see above), so that the actual number of online voters was consistently far below the federal cap. Importantly, trial municipalities were not selected randomly, but election officials sought to balance trial and non-trial municipalities on key socio-demographics (Germann and Serdült 2017 ). Table 1 shows that this strategy was partially (but not fully) successful when it comes to population size, age, education levels, and per capita income.

However, even if trial and non-trial municipalities are not fully balanced, the significant upshot of the way in which Geneva responded to the federal safety legislation is that there is both over-time and between-municipality variation in the availability of i-voting. As a result, municipalities from the same political unit, some of which had i-voting whereas others did not, can be compared while they simultaneously voted on the same issues. This set-up facilitates difference-in-differences estimation and, therefore, to straightforwardly account for any cross-sectional imbalances between trial and non-trial municipalities, such as, at least approximately, differences in income or education. Moreover, difference-in-differences estimation automatically takes care of any confounder that is specific to voting days or even ballot proposals, such as varying levels of voter disaffection or interest in referendum proposals. Beyond this, electoral laws apply uniformly across Geneva canton, thus ruling out bias due to variation in electoral legislation; and causal inference is facilitated further by Geneva’s relatively high social homogeneity (Geneva is commonly referred to as a “city canton” and 80% of its municipalities are counted as urban or peri-urban by the Federal Statistics Office).

Overall, the case set-up in combination with difference-in-differences estimation make it possible to rule out most possible confounders by design. However, difference-in-differences estimates are valid only if the parallel trends assumption is met (Angrist and Pischke 2009 ). In the present case, this means that under the counterfactual scenario where i-voting would have never been introduced, the residual vote rate should have evolved in parallel in treated (with i-voting) and control (without i-voting) municipalities. Further below I provide indirect evidence in favor of the parallel trends assumption. At the same time, I relax the parallel trends assumption via the inclusion of municipality-level time trends. Municipality-level time trends can increase our confidence that smooth changes in, for example, the socio-economic composition of municipalities do not bias the causal estimates. Moreover, all models control for electoral participation. While existing evidence suggests that i-voting had no measurable effect on turnout in Geneva canton (Germann and Serdült 2017 ), controlling for participation ensures that the estimated effects are independent of any small changes in turnout rates that cannot be safely distinguished from zero. In the robustness section I show that controlling for additional time-varying confounders does not affect the results.

Four further remarks are in order before turning to the empirical analysis. First, prior to 2001 Geneva canton used a different paper voting system whereby voters had to write ‘yes’ or ‘no’ next to referendum proposals rather than checking boxes. Also, prior to 2001 all ballots were counted manually, including mail ballots. Therefore, all analyses reported below focus on the period from 2001 onward.

Second, in late 2016 Geneva switched to a system whereby voters from all municipalities can i-vote if they register for an online ballot. To comply with federal safety regulations, registrations are capped at 30% of the canton’s electorate. Unfortunately, this implies that there is no longer between-municipality variation in i-voting availability. Given the absence of suitable control units, the analysis stops in September 2016, after which the new system was introduced.

Third, the federal safety regulation applies only to federal votes. Therefore, Geneva was in principle free to offer i-voting on a broader basis for its own, canton-level electoral contests. However, in practice cantonal referendums tend to be scheduled simultaneously with federal referendums, to profit from the latter’s higher turnout and save costs. As it would be impractical to offer i-voting for some but not other votes on the same ballot, the 20/30% cap therefore implicitly also applied to most cantonal referendums. There were only three exceptions to this general rule during the period studied. In May 2011, November 2011, and October 2012, no simultaneous federal referendums were scheduled and Geneva canton therefore allowed all its citizens to vote online in cantonal referendums. Given the lack of within-canton variation, there are no plausible counterfactuals in these cases. Therefore, I exclude all 11 cantonal referendums voted on these three dates. All other cantonal referendums are included.

Finally, as there are no plausible counterfactuals for municipal contests, I exclude all municipal referendums, even if they were voted simultaneously with federal referendums.

figure 2

Availability of i-voting in Geneva canton, 2004–2016

Main Results

I proceed to estimate the causal effect of the availability of i-voting in a municipality on the number of residual votes. The sample covers all cantonal and federal referendums voted in Geneva canton between 2001 and September 2016, except for the aforementioned 11 cantonal referendums when i-voting was made available in all municipalities. Overall, the sample includes 284 referendums voted on 53 separate dates. The unit of analysis is a municipality voting on a referendum proposal. All 45 municipalities in Geneva canton are included. In addition, I include expatriate voters as a separate, artificial 46th municipality. The results remain similar when expatriate voters are dropped (see Table S1 in the Online Supplement).

The dependent variable is the residual vote rate, defined as the percentage of votes that do not enter the final count relative to the total number of votes cast. Footnote 6 The average residual vote rate in the sample is 5.3%. Footnote 7 The central explanatory variable is the availability of i-voting in a municipality. I-voting was available on 28 of the 53 voting days (156 of 284 referendums) in at least four and a maximum of 18 municipalities during the period studied (see Fig. 2 for breakdowns by municipality).

All estimates are based on OLS regression with municipality and referendum fixed effects. Standard errors are clustered by municipality to account for time dependence. Two-way fixed effects regression constitutes a generalization of difference-in-differences estimation for multiple time periods (Angrist and Pischke 2009 , pp. 233–241). The causal effect of the availability of i-voting is estimated solely based on within-municipality variation in the availability of i-voting and the residual vote rate. All models include quadratic municipality-level time trends and control for electoral participation. Footnote 8

The results suggest that Internet voting constitutes an effective method to reduce voter errors and uncounted ballots. As argued above, Geneva’s i-voting solution prevents overvotes and decreases the potential for unintentional undervotes (among other things because of the confirmation screen). Model 1 in Table 2 suggests that as a result of this, the residual vote rate decreased by an average of 0.32 percentage points if a municipality offered the possibility to vote online ( \(p < 0.001\) ). To get a better grasp of the magnitude of this effect, I compare the point estimate to the counterfactual numbers of residual votes had i-voting never been made available. This suggests that i-voting decreased the average residual vote rate from 5.4 to 5.1% in municipalities with i-voting, which corresponds to a 6% decrease. Expressed differently, i-voting increased the share of valid votes in an average referendum by 0.3%, from 94.6 to 94.9%. While not earth-shattering, an 0.3% increase in the number of valid votes—and, therefore, effective turnout—is notable in light of the fact that only around a fifth of voters tended to make use of online voting where that possibility existed. Also, survey evidence suggests that Geneva’s online voters tended to have comparatively high levels of education. In particular, online voters were almost twice as likely to have a university degree compared to paper voters (Sciarini et al. 2013 , p. 48). Therefore, Geneva’s online voters constitute a demographic that, a priori, should be less susceptible to voter errors. Footnote 9

Additional analyses reported in models 2 and 3 in Table 2 suggest that electronic safeguards against residual votes are especially important when it comes to cantonal (and, thus, down-ballot) measures. Specifically, I find that whereas i-voting decreased the residual vote rate by a mere quarter of a percentage point in federal referendums ( \(p = 0.04\) ), the reduction amounts to almost half a percentage point in cantonal referendums ( \(p < 0.001\) ). The most plausible explanation for this finding is the extra nudge to voters provided by the confirmation screen to review their choices before the final submission. Cantonal referendums may be more prone to oversight and accidental undervotes, first, because they are often seen as ‘second order’ and tend to receive less media attention (Buetzer 2011 ), and second, because they are placed towards the bottom of ballot papers. Footnote 10 Therefore, asking voters to confirm their choices may be more important when it comes to cantonal referendums.

Causal Identification Assumption and Robustness Checks

The central causal identification assumption is that the residual vote rate would have evolved in parallel in municipalities with and without Internet voting had Internet voting never been introduced. To assess the plausibility of the parallel trends assumption, I consider the evolution of the residual vote rate in the period before the first i-voting trial in September 2004. Figure 3 shows annual averages of the number of residual votes from 2001 to mid-2004 by treatment status. Municipalities with at least one i-voting trial in subsequent years are assigned to the treatment group. All others are assigned to the control group. As becomes evident, the residual vote rate follows a very similar trajectory in treated and control municipalities before the first i-voting trial. This is of course no direct test of the parallel trends assumption, which relates to a counterfactual and is therefore fundamentally untestable. However, evidence for parallel pre-treatment trends makes it plausible that the residual vote rate would have developed in parallel also after September 2004 had i-voting never been introduced, and hence that the reduction in residual votes attributed to i-voting has causal interpretation.

figure 3

Pre-treatment trends (residual vote rate)

I provide additional, statistically-based evidence for the parallelism of pre-treatment trends based on a placebo test. To this purpose, I define a placebo treatment and code it 1 for all referendums voted on the 3 voting days before the first i-voting trial in a municipality, where applicable. I then estimate an analogous two-way fixed effects models including both the indicator for actual i-voting availability and the placebo treatment. As would be expected if pre-treatment trends are parallel, model 1 in Table 3 shows that the placebo treatment has no statistically significant effect on the residual vote rate ( \(p = 0.20\) ).

To further probe the internal validity of the results, I re-estimate the model while accounting for several additional municipality-level covariates that could plausibly affect the number of residual votes: per capita income, unemployment rate, population size (logged), age group shares (20–34; 35–49; 50–65; and 65+), the share of non-Swiss nationals, and vote shares for left-wing parties in the previous national election (lower chamber). Footnote 11 All data is drawn from official statistics. Data on the average income in municipalities is available only until and including 2015, so all referendums voted in 2016 are now dropped. Moreover, expatriate voters are no longer included because data on several covariates are unavailable (e.g., unemployment rate) or do not apply (e.g., share of foreigners). Further improving confidence in the estimated effect, model 2 in Table 3 shows that the coefficient for i-voting remains almost identical in both size (− 0.32) and statistical significance ( \(p = 0.002\) ). Similar conclusions are reached for this as well as all other robustness checks when disaggregating the sample into federal and cantonal referendums (see Tables S3 and S4 in the Online Supplement).

Next, I re-estimate the treatment effect while dropping cases with simultaneous municipal elections or referendums (see model 3 in Table 3 ). Simultaneous municipal electoral contests are rare—less than 1.5% of observations are concerned—and most municipal electoral contests are low-key affairs, similarly to cantonal referendums. Still, some municipal contests may mobilize additional voters, leading to potential violations of the parallel trends assumption. Reassuringly, the effect of i-voting on the residual vote rate remains virtually unchanged when dropping observations with simultaneous municipal contests.

Finally, I re-estimate the treatment effect while clustering standard errors by municipality and voting day. This adjusts standard errors for contemporaneous dependence among referendums voted on the same day, in addition to time dependence (Cameron et al. 2011 ). I find that the variance estimate remains similar ( \(p = 0.005\) ) (see model 4 in Table 3 ), including when estimating separate models for cantonal ( \(p = 0.001\) ) and federal ( \(p = 0.08\) ) referendums (see Tables S3 and S4 in the Online Supplement).

Indirect Effect on Electoral Outcomes?

Having established the robustness of the causal estimate, I finally turn to the question whether the reduction in the residual vote rate affected the outcomes of referendums in Geneva canton. As noted in the introduction, prior evidence suggests that voting errors are disproportionately committed by voters with low educational attainment (Bullock and Hood 2002 ; Tomz and Van Houweling 2003 ). Therefore, an important hope associated with error-reducing voting technologies has been that they reduce education-based disparities in uncounted ballots and can thereby improve the representation of less educated voters (Knack and Kropf 2003 ; Tomz and Van Houweling 2003 ). In line with this, Fujiwara ( 2015 ) found evidence that the introduction of DREs in Brazil increased electoral support for policy proposals that directly benefit voters with low education, such as economic redistribution and a strong welfare state, as well as support for left-wing parties more generally. However, whether such findings generalize to the case of Internet voting is not clear, especially as online voting is less frequently used by voters with low levels of education (Serdült et al. 2015 ).

To investigate potential knock-on effects on electoral outcomes I repeat the estimation set-up from above while switching the dependent variable from the residual vote rate to direct-democratic policy choices made by Geneva’s voters. As above, all models control for electoral turnout so as to make sure that the measured effect of the availability of i-voting reflects the implications of the reduction in uncounted ballots. Footnote 12 Table 4 shows the results.

I consider a total of four dependent variables. The first two enable me to investigate whether the reduction in uncounted ballots shifted referendum outcomes systematically to the left (or right). These measures leverage the fact that parties in Switzerland almost always publish voting recommendations prior to referendums. Using this information I coded two variables that, respectively, record the share of valid votes cast in favor of the options recommended by the Socialists (the largest left-wing party in Geneva canton) and the Greens (the second-largest left-wing party). For example, the first variable records the vote share in favor of a proposal if the Socialists recommended a ‘yes’ vote, and the no share if the Socialists recommended a ‘no’ vote. Models 1 and 2 in Table 4 show that the introduction of i-voting, conditional on turnout, had no statistically significant effect on levels of voter support for policy proposals favored by left-wing parties ( \(p = 0.45\) and 0.92, respectively). This suggests that the reduction in residual votes did not pull electoral outcomes towards the left (or the right).

Next, I analyze whether i-voting more specifically affected voter support for economic redistribution. To test this I manually identified referendums with direct implications for the level of economic redistribution from richer to poorer citizens. I was able to identify 66 relevant referendums. Footnote 13 I then used these 66 ballot proposals to code a variable recording the share of valid votes for increased redistribution. The variable corresponds to the yes share if a proposal would increase redistribution (e.g., a 2014 proposal for a federal minimum wage) and the no share for proposals that would lower redistribution (e.g., a 2002 proposal to cut unemployment benefits). Again, I find no evidence for an indirect effect on referendum outcomes (see model 3 in Table 4 ).

As elsewhere in Western Europe, the working class in Switzerland has increasingly turned to right-populist parties advocating culturally conservative policy proposals (Oesch 2012 ). As a final step, I therefore consider whether i-voting affected support for nativist policy proposals, such as a 2014 proposal to cut “mass immigration”, as well as other proposals generally associated with the cultural conservatism to cultural liberalism continuum, such as European integration, law and order, gay rights, and abortion (cf. Kriesi et al. 2006 ). I found a total of 38 relevant referendums during the period studied, and coded an analogous variable recording the share of valid votes in favor of cultural conservatism. Footnote 14 This variable records the yes share if a proposal would lead to more cultural conservatism (e.g., the previously mentioned proposal to cut immigration) and the no share if a proposal would lead to less cultural conservatism (e.g., a 2005 proposal to grant foreigners the right to vote in municipal elections). Again, I find no evidence that the reduction in residual votes affected referendum outcomes (see model 4 in Table 4 ).

figure 4

Pre-treatment trends (referendum outcomes)

Figure 4 plots average vote shares for left-wing parties as well as support for economic redistribution and cultural conservatism prior to the first i-voting trial. It becomes visible that the different dependent variables evolved approximately in parallel in treated and control municipalities. Footnote 15 All four models also pass placebo treatment checks (see Table S7 in the Online Supplement). Footnote 16 Analogously to above, this can be seen as supporting the parallel trends assumption and, hence, that the effect estimates have causal interpretation. Tables S8 and S9 in the Online Supplement show that the results remain unchanged when controlling for additional time-varying covariates and when dropping observations with simultaneous municipal contests. Finally, I also find no effects on electoral outcomes when disaggregating the sample into cantonal and federal referendums (see Tables S10 and S11 in the Online Supplement). This rules out an indirect effect that is visible only for cantonal referendums, which tend to see larger reductions in the residual vote rate.

Overall, these results suggest that i-voting’s reduced error potential remained without systematic implications for the outcomes of referendums and, in particular, that the introduction of i-voting did not improve the policy representation of voters with low education. As noted, a possible explanation is that online voting is most popular with highly educated voters, which could offset any effect on the representation of less educated voters. For such an effect to materialize, more voters with low education may have to make use of the opportunity to vote online. That said, it is important to note that the estimated coefficients represent average effects. One cannot, therefore, infer that the reduced error rate did not affect the outcome of any given referendum.

Uncounted ballots rarely make headlines. But the number of votes that are discarded from the tallying of final results can run into the tens of thousands and, in large polities, the hundreds of thousands. This study presented new evidence that Internet voting systems can prevent voters from accidentally casting residual votes. The estimated effects—an 0.25 percentage points reduction in the residual vote rate for federal referendums and almost 0.5 percentage points for cantonal referendums—may seem modest and some prior studies, if often based on less robust research designs, reported larger effects for similar comparisons. Stewart ( 2006 ), for example, presented evidence that U.S. counties that switched from central count optical scan systems to DREs after the 2000 election reported an 0.7 percentage points reduction in the residual vote rate in the 2004 presidential election. Extending the focus to referendum ballots, Kimball and Kropf ( 2008 ) report a similar effect size for touch-screen DREs. Footnote 17 However, the estimates from these studies refer to situations in which most, if not all, voters made use of electronic voting. By contrast, the estimates from this study refer to a situation in which only a fifth of votes were cast electronically (i.e., online), and the rest by paper.

Therefore, despite the relatively small effect sizes, this research suggests that electronic voting systems provide an effective remedy against common mistakes made by voters. What is more, this study also points to a way how error-reducing voting technology can be extended to remote voters. Countries around the globe increasingly allow voters to cast their votes remotely, most typically by mail (Gronke et al. 2008 ). However, only voters who frequent a polling station can profit from error-reducing technologies considered in prior studies, including DREs and precinct scanners (Alvarez et al. 2013 ). A unique benefit of Internet voting is that it allows the extension of technological safeguards against accidental residual votes to remote voters.

Nevertheless, the results of this study cannot, and should not, be read as a blanket recommendation of Internet voting (or electronic voting more generally). One of Internet voting’s weak points is that it tends to appeal more strongly to more educated (and younger) citizens. While that may change in the future (Vassil et al. 2016 ), all voters should be able to profit from safeguards against errors. If a polity wants to enable remote voting, that could, for example, suggest a combination of Internet voting with DREs. However, proneness to accidental residual votes is not the only criterion by which voting technologies should be judged. There are, in particular, increasingly concerns about the vulnerability of electronic voting systems to third party manipulation and consequent risks to the integrity of elections. As decisions on voting technology should not be based on their proneness to residual votes alone, no clear recommendations can follow from studies of residual votes, such as this one.

At the same time, this remains a single case study. Case constraints prevented me from analyzing residual votes in elections. Most paper votes in Geneva canton are also counted with optical scanners while in other contexts paper ballots are hand-counted. Based on a priori reasoning, there seem to be few reasons why the results of this study should not generalize to elections and to manual counting. Many kinds of elections have decidedly more complex rules than yes/no referendums and, therefore, more potential for voter error. And, while some of the issues that can emerge with optical scanners, such as stray marks, may be less of a problem if ballots are hand-counted, paper ballots remain difficult to correct; and irrespective of the counting method cannot alert voters to undervotes or prevent overvoting. Nevertheless, to move beyond conjecturing, more empirical evidence from other case contexts is needed.

Beyond cross-validation, an important contribution of future studies could be to identify the most effective technological safeguards against residual votes. For example, Geneva’s online voting system prompts voters to review their choices via the inclusion of a confirmation screen. Could accidental residual votes be reduced more effectively if voters were in addition given explicit reminders that they are about to undervote? And what if they were shown contests sequentially rather than all on the same screen, as is the case in Geneva canton? Finally, we also need more comparative evidence on the performance of electronic voting systems relative to other measures against accidental residual voting. For example, are electronic voting systems or precinct scanners more effective in reducing residual votes? Or, are improvements in paper ballot design or voter education campaigns more effective responses? While the existing literature has few answers to these questions, providing them will prove useful to electoral administrators around the world.

Data Availability

The data and code required to replicate all analyses in this article are available on the journal’s Dataverse within the Harvard Dataverse Network ( https://doi.org/10.7910/DVN/01F70K )

As is explained below, paper voters had no access to technology, such as precinct scanners, that could have helped them to spot errors.

For almost a decade Geneva offered i-voting exclusively in the context of referendums. In 2012, i-voting was first offered in the context of a cantonal election for Geneva’s Court of Auditors. However, i-voting remained unavailable in most subsequent elections. Therefore, the total number of elections conducted online in Geneva canton remains too small for meaningful statistical analysis.

Between 2010 and 2012 the canton replaced the scanners used prior to this with a new, quicker model from the same company (Axiome). According to electoral administrators, the older and the new models had the same functionality, apart from speed.

Stray marks constitute less of a problem for the minority of paper ballots that are counted manually.

Since 2014, federal legislation allows the extension of i-voting to 50% or even all voters in a canton if advanced security requirements are met, such as universal verifiability. However, at the time of writing Geneva’s i-voting system did not meet these requirements.

Geneva’s electoral statistics do not clearly separate under- from overvotes. While undervotes always figure as ‘blank’, overvotes can figure as both ‘blank’ or ‘invalid’, depending on the circumstances (cf. articles 64 and 65A of Geneva’s ‘loi sur l’exercice des droits politiques (LEDP) [law on the exercise of political rights]’). Unfortunately, this makes it impossible to determine the extent to which the aggregate effects reported below are due to reductions in over- and undervotes, respectively.

Note that this figure includes a considerable number of intentional undervotes. According to post-referendum surveys (Kriesi et al. 2018 ), on average around 3% of Swiss voters intentionally cast a blank vote on a ballot proposal during the period under study. The most likely reason is lack of interest in some of the less salient proposals on a ballot. Usually less than 0.5% of Swiss voters reported to have cast a blank vote on each and every proposal on the ballot. The corresponding figures for Geneva canton cannot be established due to sample restrictions.

The results remain almost identical when dropping turnout from the list of controls (see Table S2 in the Online Supplement).

Internet voters in Geneva also tended to be younger than the average voter (Sciarini et al. 2013 , p. 29; Serdült et al. 2015 ), but age is a less likely determinant of accidental residual votes.

Conforming with these arguments, cantonal referendums have a higher residual vote rate compared to federal referendums (3.6% versus 6.9%). However, note that voters are also more likely to selectively abstain from cantonal referendums due to lack of interest or higher information costs.

Unfortunately, municipal-level data on education levels is unavailable beyond the year 2000 due to a change in census data collection practices. However, the control for per capita income should at least partly make up for this. It is also worth noting that per capita income is far from statistically significant ( p = 0.38).

However, the results are again similar in models that do not control for turnout (see Table S6 in the Online Supplement).

Table S12 in the Online Supplement lists all referendums used to measure ‘support redistribution’, including short descriptions of the policy proposals.

Table S13 in the Online Supplement lists all referendums used to measure ‘support cultural conservatism’.

As above, municipalities are considered ‘treated’ if its citizens had the opportunity to i-vote at least once after September 2004, and as ‘control’ if citizens never could i-vote.

As above, the placebo treatments are coded 1 for the 3 voting days before the first i-voting trial in a municipality.

However, the latter effect does not reach conventional levels of statistical significance. Also, it is worth reiterating that other studies reported evidence that DREs lead to more, rather than fewer, residual votes when compared to central count optical scan systems (e.g., Ansolabehere and Stewart 2005 ; Knack and Kropf 2003 ).

Allers, M. A., & Kooreman, P. (2009). More evidence of the effects of voting technology on election outcomes. Public Choice , 139 (1–2), 159–170.

Article   Google Scholar  

Alvarez, R. M., Beckett, D., & Stewart, C. (2013). Voting technology, vote-by-mail, and residual votes in California, 1990–2010. Political Research Quarterly , 66 (3), 658–670.

Alvarez, R. M., & Hall, T. E. (2008). Electronic elections . Princeton, NJ: Princeton University Press.

Book   Google Scholar  

Alvarez, R. M., Hall, T. E., & Trechsel, A. H. (2009). Internet voting in comparative perspective: The case of Estonia. Political Science & Politics , 42 (3), 497–505.

Angrist, J. D., & Pischke, J. S. (2009). Mostly harmless econometrics: An empiricist’s companion . Princeton, NJ: Princeton University Press.

Ansolabehere, S., & Stewart, C. (2005). Residual votes attributable to technology. Journal of Politics , 67 (2), 365–389.

Brady, H. E., Buchler, J., Jarvis, M., & McNulty, J. E. (2001). Counting all the votes: The performance of voting technology in the United States . Berkeley, CA: University of California.

Google Scholar  

Buetzer, M. (2011). Second-order direct democracy in Switzerland: How sub-national experiences differ from national ballots. In T. Schiller (Ed.), Local direct democracy in Europe (pp. 138–156). Wiesbaden: VS Verlag für Sozialwissenschaften.

Chapter   Google Scholar  

Bullock, C. S., & Hood, M. V. (2002). One person-no vote; one vote; two votes: Voting methods, ballot types, and undervote frequency in the 2000 presidential election. Social Science Quarterly , 83 (4), 981–993.

Cameron, A. C., Gelbach, J. B., & Miller, D. L. (2011). Robust inference with multiway clustering. Journal of Business & Economic Statistics , 29 (2), 238–249.

Carman, C., Mitchell, J., & Johns, R. (2008). The unfortunate natural experiment in ballot design: The Scottish parliamentary elections of 2007. Electoral Studies , 27 (3), 442–459.

Dahl, R. A. (1989). Democracy and its critics . New Haven, CT and London: Yale University Press.

Fujiwara, T. (2015). Voting technology, political responsiveness, and infant health: Evidence from Brazil. Econometrica , 83 (2), 423–464.

Germann, M., & Serdült, U. (2014). Internet voting for expatriates: The Swiss case. eJournal of eDemocracy & Open Government , 6 (2), 197–215.

Germann, M., & Serdült, U. (2017). Internet voting and turnout: Evidence from Switzerland. Electoral Studies , 47 , 1–12.

Goodman, N. J., Stokes, L. C. (forthcoming). Reducing the cost of voting: An empirical evaluation of Internet voting’s effect on local elections. British Journal of Political Science.

Gronke, P., Galanes-Rosenbaum, E., Miller, P. A., & Toffey, D. (2008). Convenience voting. Annual Review of Political Science , 11 , 437–455.

Hanmer, M. J., Park, W. H., Traugott, M. W., Niemi, R. G., Herrnson, P. S., Bederson, B. B., et al. (2010). Losing fewer votes. Political Research Quarterly , 63 (1), 129–142.

Herrnson, P. S., Hanmer, M. J., & Niemi, R. G. (2012). The impact of ballot type on voter errors. American Journal of Political Science , 56 (3), 716–730.

Herron, M. C., & Sekhon, J. S. (2003). Overvoting and representation: An examination of overvoted presidential ballots in Broward and Miami-Dade counties. Electoral Studies , 22 (1), 21–47.

Keele, L., & Minozzi, W. (2013). How much Is Winnesota like Wisconsin? Assumptions and counterfactuals in causal inference with observational data. Political Analysis , 21 (2), 193–216.

Kimball, D. C., & Kropf, M. (2005). Ballot design and unrecorded votes on paper-based ballots. Public Opinion Quarterly , 69 (4), 508–529.

Kimball, D. C., & Kropf, M. (2008). Voting technology, ballot measures, and residual votes. American Politics Research , 36 (4), 479–509.

Knack, S., & Kropf, M. (2003). Voided ballots in the 1996 presidential election: A county-level analysis. Journal of Politics , 65 (3), 881–897.

Kriesi, H., Brunner, M., & Lorétan, F. (2018). VoxIt: Standardized post-vote surveys . Lausanne: FORSbase.

Kriesi, H., Grande, E., Lachat, R., Dolezal, M., Bornschier, S., & Frey, T. (2006). Globalization and the transformation of the national political space: Six European countries compared. European Journal of Political Research , 45 (6), 921–956.

Lott, J. R. (2009). Non-voted ballots, the cost of voting, and race. Public Choice , 138 (1–2), 171–197.

Martinez i Coma, F., & Werner, A. (2019). Compulsory voting and ethnic diversity increase invalid voting while corruption does not: An analysis of 417 parliamentary elections in 73 countries. Democratization , 26 (2), 288–308.

Mendez, F., & Serdült, U. (2017). What drives fidelity to Internet voting? Evidence from the roll-out of Internet voting in Switzerland. Government Information Quarterly , 34 (3), 511–523.

Miller, M. G. (2013). Do audible alerts reduce undervotes? Evidence from Illinois. Election Law Journal: Rules, Politics, and Policy , 12 (2), 162–178.

Niemi, R. G., & Herrnson, P. S. (2003). Beyond the butterfly: The complexity of U.S. ballots. Perspectives on Politics , 1 (2), 317–326.

Oesch, D. (2012). The class basis of the cleavage between the new left and the radical right: An analysis for Austria, Denmark, Norway and Switzerland. Class politics and the radical right (pp. 31–51). London: Routledge.

Pammett, J. H., Goodman N. J. (2013). Consultation and evaluation practices in the implementation of Internet voting in Canada and Europe. Research study prepared for Elections Canada.

Power, T. J., & Garand, J. C. (2007). Determinants of invalid voting in Latin America. Electoral Studies , 26 (2), 432–444.

Reynolds, A., & Steenbergen, M. (2006). How the world votes: The political consequences of ballot design. Innovation and Manipulation, Electoral Studies , 25 (3), 570–598.

Sciarini, P., Cappelletti, F., Goldberg, A., Nai, A., & Tawfik, A. (2013). Etude du vote par Internet dans le canton de Genève: Rapport final à l’intention de la Commission externe d’évaluation des politiques publiques . Geneva: University of Geneva.

Selb, P. (2008). Supersized votes: Ballot length, uncertainty, and choice in direct legislation elections. Public Choice , 135 (3–4), 319–336.

Serdült, U., Germann, M., Harris, M., Mendez, F., & Portenier, A. (2015). Who are the Internet voters? In E. Tambouris, H. J. Scholl, M. Janssen, M. A. Wimmer, K. Tarabanis, M. Gascó, B. Klievink, I. Lindgren, M. Milano, P. Panagiotopoulos, T. A. Pardo, P. Parycek, & Ø. Sæbø (Eds.), Electronic government and electronic participation (pp. 27–41). Amsterdam: IOS Press.

Serdült, U., Germann, M., Mendez, F., Portenier, A., & Wellig, C. (2015). Fifteen years of Internet voting in Switzerland: History, governance and use. In L. Téran & A. Meier (Eds.), ICEDEG 2015 (pp. 149–156). New York: Institute of Electrical and Electronics Engineers.

Sinclair, D. E., & Alvarez, R. M. (2004). Who overvotes, who undervotes, using punchcards? Evidence from Los Angeles county. Political Research Quarterly , 57 (1), 15–25.

Solvak, M., & Vassil, K. (2015). Indifference or indignation? Explaining purposive vote spoiling in elections. Journal of Elections, Public Opinion and Parties , 25 (4), 463–481.

Stewart, C. (2006). Residual votes in the 2004 election. Election Law Journal , 5 (2), 158–169.

Stewart, C. (2011). Voting technologies. Annual Review of Political Science , 14 , 353–378.

Tomz, M., & Van Houweling, R. P. (2003). How does voting equipment affect the racial gap in voided ballots? American Journal of Political Science , 47 (1), 46–60.

Uggla, F. (2008). Incompetence, alienation, or calculation? Explaining levels of invalid ballots and extra-parliamentary votes. Comparative Political Studies , 41 (8), 1141–1164.

Vassil, K., Solvak, M., Vinkel, P., Trechsel, A. H., & Alvarez, R. M. (2016). The diffusion of Internet voting. Usage patterns of Internet voting in Estonia between 2005 and 2015. Government Information Quarterly , 33 (3), 453–459.

Download references

Acknowledgements

Earlier versions of this paper were presented at the ECPR General Conference at the University of Wroclaw (2019), the Three Countries Congress at ETH Zurich (2019), the Elections, Public Opinion, and Parties Conference at Royal Holloway, University of London (2018), and a seminar at the University of Bath (2018). I am especially grateful to John Curtice, Anja Giudici, Kostas Gemenis, Silke Goubin, Sophia Hatzisavvidou, Fernando Mendez, Penny Miles, Uwe Serdült, Rodney Smith, Jennifer Thomson, Katerina Vrablikova, Jonathan Wheatley, and four anonymous reviewers for valuable comments and criticisms. A big thank you also goes to the Chancellerie d’État of the canton of Geneva for their patient answers to my repeated queries regarding the voting process in Geneva canton.

Author information

Authors and affiliations.

Department of Politics, Languages, and International Relations, University of Bath, 1 West North, Bath, BA2 7AY, UK

Micha Germann

You can also search for this author in PubMed   Google Scholar

Corresponding author

Correspondence to Micha Germann .

Ethics declarations

Conflicts of interest.

The author declares that he has no conflict of interest.

Additional information

Publisher's note.

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Electronic supplementary material

Below is the link to the electronic supplementary material.

Electronic supplementary material 1 (PDF 99 kb)

Rights and permissions.

Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/ .

Reprints and permissions

About this article

Germann, M. Making Votes Count with Internet Voting. Polit Behav 43 , 1511–1533 (2021). https://doi.org/10.1007/s11109-020-09598-2

Download citation

Published : 02 March 2020

Issue Date : December 2021

DOI : https://doi.org/10.1007/s11109-020-09598-2

Share this article

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

  • Uncounted ballots
  • Residual votes
  • Electronic voting
  • Internet voting
  • Democratic legitimacy
  • Find a journal
  • Publish with us
  • Track your research

An official website of the United States government

Official websites use .gov A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS A lock ( Lock Locked padlock icon ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

  • Publications
  • Account settings
  • Advanced Search
  • Journal List

Sensors (Basel, Switzerland) logo

A Systematic Literature Review and Meta-Analysis on Scalable Blockchain-Based Electronic Voting Systems

Mohd juzaiddin ab aziz, zarina shukur, hafiz adnan hussain.

  • Author information
  • Article notes
  • Copyright and License information

Correspondence: [email protected]

Received 2022 Aug 15; Accepted 2022 Sep 29; Collection date 2022 Oct.

Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license ( https://creativecommons.org/licenses/by/4.0/ ).

Electronic voting systems must find solutions to various issues with authentication, data privacy and integrity, transparency, and verifiability. On the other hand, Blockchain technology offers an innovative solution to many of these problems. The scalability of Blockchain has arisen as a fundamental barrier to realizing the promise of this technology, especially in electronic voting. This study seeks to highlight the solutions regarding scalable Blockchain-based electronic voting systems and the issues linked with them while also attempting to foresee future developments. A systematic literature review (SLR) was used to complete the task, leading to the selection of 76 articles in the English language from 1 January 2017 to 31 March 2022 from the famous databases. This SLR was conducted to identify well-known proposals, their implementations, verification methods, various cryptographic solutions in previous research to evaluate cost and time. It also identifies performance parameters, the primary advantages and obstacles presented by different systems, and the most common approaches for Blockchain scalability. In addition, it outlines several possible research avenues for developing a scalable electronic voting system based on Blockchain technology. This research helps future research before proposing or developing any solutions to keep in mind all the voting requirements, merits, and demerits of the proposed solutions and provides further guidelines for scalable voting solutions.

Keywords: Bitcoin, Blockchain, cryptography, electronic voting, ethereum, Internet of things, hyperledger fabric, smart contract, scalability

1. Introduction

In many countries, technology plays a significant role in elections, which is necessary for some circumstances, such as the technology utilized to construct voter records, establish electoral boundaries, manage and educate employees, print ballot sheets, carry out voter education programs, cast ballots records, tally the votes, and compile and broadcast election results, to name a few. Technology can improve election organization, lower long-term expenses, and enhance political accountability if uses it correctly [ 1 ]. The technology used in elections can be as old as printing presses, ballpoint pens, or modern technologies such as computers and optical scanners, digital mapping, or the Internet; or it can be a mix of the two [ 1 , 2 ]. Organizing large-scale elections in countries without access to modern technologies can be difficult. It might change if Blockchain technology is the foundation for the electronic voting system.

For the sake of fostering public confidence and accountability among voters, electoral integrity is necessary not only in democracies but also in all societies [ 3 , 4 ]. From the government’s perspective, electronic voting technologies have the potential to boost voter participation and trust, as well as reinvigorate interest in the voting process. According to a new study, adopting electronic voting methods may improve security [ 5 , 6 , 7 ]. When deciding whether or not to utilize an electronic voting structure, it is necessary to research the factors that contribute to the system’s advantages over traditional voting methods, such as using paper ballots [ 8 ]. It is anticipated that it will improve the efficacy and efficiency of democracy; moreover, it will provide a solution to various highlighted problematic conditions. Likewise, it enhances election accessibility, lets the elderly and disabled vote, increases election turnout, and is simple to use while obtaining a quick result [ 9 ]. However, it is widely acknowledged that running electronic voting systems underneath tight security measures is essential, especially when using modern encryption methods [ 10 ]. In the beginning, electronic voting was proposed as a remedy to the issues caused by voting on paper ballots to ensure that elections would be fair and accessible [ 3 ]. Electronic voting system security problems have been widely researched in the literature. According to the findings of the research [ 11 , 12 ], electronic voting may present several challenges, including those related to data integrity, dependability, transparency, ballot secrecy, security, implications of fraud, repercussions of failure, ignorant voters, lack of special information technology skills, equipment storage, and cost.

Blockchain is a novel technology with much potential for information systems. Blockchain-based techniques are being researched in various fields, including healthcare, logistics, finance, etc. [ 13 ]. Electronic voting is becoming a more essential and widespread issue in the context of Blockchain and information systems. The unique characteristics of this technology, such as decentralization and immutability, were crucial in ensuring that the voting system followed the same norms as more conventional elections and voting fields [ 14 ]. This line of inquiry has gained traction recently due to rising allegations of electoral fraud, such as those levelled during the presidential election in the United States [ 8 ]. Democracy is founded on voting and will not work well if people do not trust the voting system.

On the other hand, it just takes a rumour to completely undermine people’s faith in a voting system, particularly an automated one. Conventional voting methods based on a paper presented a severe health risk during the COVID-19 outbreak; hence, the need for research on methods of electronic voting that are secure, impartial, and confidential became even more pressing [ 15 , 16 ]. Electronic voting systems’ reliability, speed, and security are not yet at a level that can boost the voter’s trust. Researchers are working on methods and procedures for a more secure and efficient electronic voting system to ensure anonymous voting is conducted in a fair and risk-free environment [ 17 ]. The implementation of Blockchain technology in voting systems has a reasonable chance of drawing the attention of researchers searching for the most effective solutions. Protocols can be implemented in a voting system to ensure that voting is conducted in a way that is private, public, and impartial [ 1 ]. Because of this, people’s trust in voting systems and democracy, in general, may increase.

Blockchain technology was the first and primarily used technology behind Bitcoin to keep track of financial transactions [ 18 , 19 ]. However, new proposals and applications have evolved in the past. Recently, the Blockchain-based electronic voting system has grown in importance to overcome some problems that might arise when voting electronically. Due to the immutable nature of the Blockchain, it has transformed into a decentralized and distributed voting system [ 20 ]. Consequently, Blockchain’s voting systems have been proposed as the next generation of electronic voting systems [ 21 , 22 ]. Because of Blockchain technology, governments are being driven to design voting systems that are both intelligent and bearable and incorporate information on sustainability into such voting systems. It ensures that all relevant parties access reliable information on long-term assets [ 23 ]. It is worth noting that even though Blockchain is increasingly being used to improve electronic voting system security, many difficulties remain in obtaining the full benefits from Blockchain. Identifying which problems should be addressed in designing a Blockchain-based voting system is required [ 24 ].

This research reviewed the literature and clarified such issues using a systematic mapping technique for this goal. This paper makes the following contributions: Identifying well-known proposals for scalable Blockchain-based electronic voting and their verification methods, and highlighting those proposals that used famous cryptographic solutions and their focus on cost and time. It also identifies performance parameters, the primary advantages and obstacles presented by different systems, and the most common approaches for Blockchain scalability. In addition, it outlines several possible research paths for developing a scalable electronic voting system based on Blockchain technology.

According to this study, Blockchain-based voting systems may solve data tampering and integrity problems. The most often expressed concerns with Blockchain voting systems are privacy, transaction speed, and scalability, which still need more work [ 25 , 26 ]. This article provides a systematic literature review of the motivations, research accomplishments, and applications intended to facilitate the integration of Blockchain and the electronic voting system. The main contributions are as follows:

We describe the research methodology and a literature evaluation on scalable Blockchain-based electronic voting;

We introduce the background knowledge of electronic voting and Blockchain technology from the perspective of scalability, summarized in the previous work. The motivations and benefits for applying Blockchain to electronic voting are discussed in terms of requirements and challenges in electronic voting and the characteristics of Blockchain;

We summarize an optimized research framework according to the Blockchain architecture, including the scalability aspect of Blockchain and horizontal and vertical scalability trilemma in Blockchain, and analyse and specify significant characteristics of Blockchain scalability;

As for the Blockchain applications in electronic voting, we reviewed the previous work on electronic voting based on Blockchain and focused on scalability;

We analysed the previous research by following our methodology to answer the required questions regarding Blockchain function/performance requirements for electronic voting by comparing different Blockchain project implementations to provide a reference for practitioners;

Finally, some open issues and challenges in the field of the electronic voting system, combined with Blockchain, are highlighted, such as shading, consensus algorithm, block size increase, directed acyclic graph, forking, and an increase in authorized hardware devices to decrease block generation rate;

This study was performed by PRISMA (preferred reporting items for systematic reviews and meta-analyses) [ 27 ]. It included Kitchenham’s [ 28 ] standard criteria to customize this SLR to the computer science area.

The rest of this paper is systematized, as depicted in Figure 1 . Section 2 demonstrates an overview of electronic voting and Blockchain technologies. Section 3 debates the previous research closely related to scalability in Blockchain for electronic voting. Section 4 discusses SLR methodology. Section 5 focuses on our methods’ results and categories per the defined methodology. Research challenges and future directions are addressed in Section 6 . In the end, we conclude this paper in Section 7 .

Figure 1

Road map of Blockchain-based electronic voting.

2. Background Knowledge

This section is separated into the theoretical bases of Blockchain technology and electronic voting. A separate team is dedicated to discussing these characteristics in further detail.

2.1. Electronic Voting

Electronic voting is a method of voting in a political election or referendum that uses electronic technology in the voting process, as per the European Council [ 29 ]. It includes specialized electronic voting machines:

Optical scanning;

Electronically printed ballots;

Centralized and decentralized software or applications for voting through the Internet;

To register voters, electronic voting machines make use of a variety of input devices. Some examples of these devices include keyboards and touch screens [ 30 ]. Paper trails, also known as voter-verified audit trails, are printed copies of recorded votes often presented for verification with the ballots themselves (VVAPTs). These devices are used for fast vote counting and collecting voter data. They also enhance ballot presentation, lowering the frequency of spoiled votes [ 29 , 31 ]. Some authors [ 32 , 33 ] believe that third parties, on the other hand, design specialized voting devices, making end-to-end verification rugged and lowering confidence in them. The optical scanners can scan and record votes on readable paper ballots. This method is simple to learn and provides quick and accurate results. In addition, this method utilizes paper ballots, which have not been tampered with but can be replaced and are very expensive to adopt and maintain [ 34 ].

Electronic ballot printers provide legible paper recipes or voting tokens that may be thrown away in vote boxes and counted by machines. Because of the tangible evidence, this strategy is transparent and provable [ 35 , 36 ]. However, this method is similarly costly, and the only benefit it has over the old voting system is that it prevents ballots from being spoiled. There are two main types of Internet voting software: centralized and decentralized. Both systems enable voters to cast their votes via electronic devices linked to the Internet [ 37 ]. This approach may take various forms, including specialized gadgets and web pages. Voting makes it easier for individuals to acquire rapid and precise results and makes voting more convenient [ 38 ]. Unfortunately, this mode of voting has the most severe security weaknesses, such as the potential for hacker attacks, inadequate anonymity and privacy, and the possibility of being forced to vote a particular way [ 39 ]. Two qualities may be used to classify electronic voting systems:

Remoteness;

Supervision.

Remoteness describes how the votes are transmitted for aggregation and counting. The votes are sent to a central counting authority in real time by a remote system using a communication medium such as the Internet [ 40 , 41 ]. On the other hand, a nonremote method gathers votes on the local level and then transmits them to a counting authority after the election has concluded [ 42 ]. The place of voting is determined by supervision. In a monitored system, votes may only be cast under the supervision of some authority, such as a polling station [ 43 ]. A nonsupervised method, on the other hand, permits people to vote from any place and cast their ballots. Electronic voting aims to enhance the conventional voting method by decreasing and controlling fraud, reducing human involvement, and speeding up result processing [ 44 , 45 ].

Moreover, expenses are lowered by concentrating on voting overhead and improving participation in democratic procedures by utilizing new technologies that are more accessible and useful [ 42 ]. Electronic voting methods, on the other hand, are not without flaws. The following are the most common issues that such systems face:

Insufficient clarity and comprehension of such systems on the part of non-experts;

An absence of standards and norms;

Threats posed by system suppliers, malevolent users, and privileged insiders and the potential for these individuals to attack and manipulate the system;

Cost increases due to required information and communication technologies (ICT) such as infrastructure, maintenance, and power consumption;

Various ways are used to address the issues in electronic voting, each using a distinct set of technology and algorithms. Blockchain technology has received much attention recently, and its potential for improving electronic voting systems has been acknowledged by [ 46 ]. The following parts will reveal the findings of this potential investigation.

In voting systems that use electronic equipment, ballots are either recorded or counted electronically. The term “electronic voting” refers to a voting process aided by computer gear and software. Such systems may handle various operations, from planning elections to storing vote ballots [ 47 , 48 ]. Laptops, tablets, and smartphones all fall under system types. The electronic voting system should contain voter registration, identification, voting, and tallying features.

The electronic voting system comprises the following processes: The first step is to create a voter registration list (registration). On election day, officials examine voters’ credentials (verification and authentication). People qualified to vote in the next phase may do so (casting collation). Encrypted and verified voting should be implemented in [ 49 ]. The votes must be kept secret, anonymous, and correct, and they cannot be changed or deleted [ 50 , 51 ]. Eventually, computerized voting systems can calculate votes simply by adding them by design (counting the presentation of results).

In general, computerized voting applications rely heavily on central authority control. Such systems have several flaws and hazards associated with them [ 52 ]. A few examples are the lack of electronic voting system norms, security and dependability risks, exposure to hacking, fraud susceptibility, malicious software development, machines’ high prices, and transactions’ safe storing [ 53 , 54 ].

The United States of America pioneered the usage of electronic voting in other countries in the year 2000, followed by France (2001), the United Kingdom (2002), Spain (2003), Ireland (2004), Estonia (2005), Portugal (2005), the Netherlands (2004, 2006, 2007), Paraguay (2008), Finland (2008), Austria (2009), Germany (2009), and Norway (2009) [ 3 ]. Estonia became the first country to employ electronic voting from a distant location in its national parliamentary elections of 2007 [ 55 , 56 ]. It came after the government used the technology in more limited legislative polls in 2005.

There are various voting methods available, each with its advantages and disadvantages. The most commonly used voting methods discussed in [ 57 ] are direct-recording electronic (DRE), punch card, public network DRE, kiosk voting, central count, and precinct count. It is essential to highlight that the characteristics listed in Table 1 should be included in all electronic voting systems.

Electronic voting system requirements.

2.2. Blockchain Technology

Blockchains are immutable distributed ledger systems that store data in a digital ledger without a central point of authority and failure. The defined consensus algorithm confirms every transaction on the public ledger on the system. Once a transaction has been made, it can never be changed [ 58 ]. Every node on the system is accountable for checking and verifying the system’s published data [ 59 ]. A platform made on Blockchain runs continuously on a peer-to-peer (P2P) network [ 60 ]. Anyone can connect to that network and receive incentives for running their software as a node. The first people who described and worked on the cryptographically connected chain of blocks were Stuart Haber and W. Scott Stornetta [ 61 ] in 1991. After that, in 1992, Bayer, Haber, and Stornetta [ 62 ] included Merkle trees in the design to increase the efficiency of collecting several documents into one block. The primary goal was to create a timestamp for digital copies to prevent manipulation. Satoshi Nakamoto [ 18 ] constructed the first Blockchain-based system in 2008. It is also important to point out that the cryptocurrency Bitcoin was the first prominent use of Blockchain technology [ 63 ]. The idea may be compared to a globally distributed open and secure data book. As a result, this technology may be used in the cryptocurrency and financial industries and other disciplines involving the transactions [ 64 ]. As a result, the idea is increasingly seen as a critical part of industry 5.0 applications in the future years. Although the Blockchain is famous in cryptocurrency, it is not unreasonable to believe that its possibility extends further to the digital currency [ 65 ]. Private companies and government institutions are also testing Blockchain [ 66 , 67 ].

“Blockchain” refers to a series of timestamped and cryptographically connected blocks. As other blocks are added, the total number of blocks in the chain will grow; the hash of the first block will be included in each subsequent block, as shown in Figure 2 . Blockchain protects either secret or general data from being tampered with or manipulated [ 68 ]. The Blockchain is nothing more than a decentralized ledger that records all the direct transactions between users and vendors inside the system—a distributed network of nodes that maintains a shared transaction source [ 69 ]. The nodes are in charge of validating these transactions. As a result, the Blockchain enables trust to be established without a central authority [ 70 ].

Figure 2

Model of a Blockchain data structure.

Some have considered that Blockchain technology could ultimately be more significant than the Internet. Blockchain technology agrees that the data be saved and swapped on a peer-to-peer (P2P) network. Structurally, the Blockchain data can be conferred, shared, and linked with consensus-based algorithms [ 71 ]. It is decentralized, and there is no requirement for “trusted third parties” or mediators to be present along with the procedure [ 72 ]. The technology behind the Blockchain serves as the foundation for the new kind of Internet. Blockchain is derived from two theories: asymmetrical cryptography, which provides the use of a matched public and private key system, and distributed information technology architecture (especially P2P) [ 73 ].

Asymmetric cryptography is used in Blockchain systems, which is a slower kind of encryption than the symmetric cryptography [ 66 ]. A distributed system has components on various networked computers, which share and coordinate their activities by passing messages to each other. Asymmetrical cryptography allows users who do not know each other to transmit encrypted data [ 74 ]. This approach sends encrypted data to a third party using a public key that may be shared with anybody [ 75 ]. The third party decrypts the data using a private key associated with the public key. In other words, a public key is like a bank account number that anyone can share [ 76 ]. When users log onto their bank account, they must use the same password to access the private key [ 77 , 78 ]. Bitcoin was the first use of Blockchain technology. It is a digital currency based on Blockchain technology and can be used to deal online in the same manner as using money to trade in the natural world [ 79 ]. Because of the success of Bitcoin, Blockchain technology may be used in various industries and services, including financial markets, IoT, supply chains, voting, medical treatment, and storage.

Blockchain technology is broadly used in our daily lives, such as cybercrime, travel, healthcare, finance, and education. The technological community is also discovering other potential uses for this technology in other fields [ 80 ]. Applications such as insecurity, settlements, finance and assets management, banking, industries, and insurances are being used and evaluated by [ 81 ]. The Internet has modified how we share information and connect; the Blockchain will change how we exchange value and whom we trust. Many people in the Blockchain industry have noticed that Blockchain has become overhyped [ 82 ]. The technology has some limitations and is inapplicable for many digital interactions [ 83 ].

Current electronic voting technologies and solutions are unreliable, insecure, and hazardous. Blockchain technology in the electronic ballot has attracted many academics looking for considerably efficient methods and protocols for an electronic voting system that can perform safe, anonymous, and fair voting [ 84 ]. As a result, faith in electoral systems and democracy may grow. On the other hand, Blockchain-based solutions face several difficulties. As technology becomes more extensive and complex, it becomes more challenging to scale a Blockchain network [ 85 ]. This vulnerability affects small and large networks since there are only a small number of nodes, and a large amount of computing power is concentrated on specialized hardware [ 86 ]. Other attacks are also feasible, such as denial of service, Sybil, and man in the middle.

Last but not least, it is essential to note that anonymity is not automatically achieved by using systems based on Blockchain technology [ 87 ]. Because every node has access to a leading Blockchain network, transactions can be tracked to identify the primary owners of that transaction [ 88 ]. However, it is essential to mention that the noted obstacles (and benefits) are broad and may not involve every technological deployment.

There are other methods to classify Blockchain-based systems, but the most frequent one is based on the rights granted to users and nodes. These permits include:

The ability to write;

The ability to read.

Writing rights in a Blockchain network determine who is eligible to act as a node and take part in the storage of the Blockchain data structure, the negotiation of its scopes as parts of a consensus mechanism, and the distribution of mining rewards. Participants in the Blockchain must go through this procedure to agree on the field’s information [ 89 ]. Permissionless Blockchain networks allow anybody to act as a node and have full public access to these privileges. The phrase “permissioned Blockchain network” refers to a system in which only a few people can edit the ledger. On the other hand, read rights define who has access to a Blockchain’s data and under what circumstances [ 90 ]. These rights distinguish between public Blockchain networks, which enable anybody to read their contents, and private Blockchain networks, which allow only a limited number of organizations to view their contents [ 91 ]. Blockchain technology is evolving and improving all the time. There are several implementations available, each with its own set of attributes.

2.3. Scalability Aspect of Blockchain

Scalability means more transactions for the same hardware in this context, specifically the ability to increase the volume of transactions per second. Although Blockchain has seen substantial acceptance in recent years, one of the primary problems that may restrict its role as a disruptive technology is the scalability of Blockchain-based solutions [ 12 ]. As a result, this study aims to explore and assess existing initiatives to improve Blockchain scalability in electronic voting systems [ 92 ]. Our study has led us to conclude that scalability is a broad concept with various meanings in the literature. As a result, we use a definition of scalability from recent research to describe scalability in the context of this study, where scalability might relate to:

Horizontal: This is accomplished by adding/increasing the number of computers in an existing pool/network;

Vertical: This is accomplished by adding more power (such as memory, processing, and storage-efficient approaches) to an existing pool of resources. As a result, these core notions have been employed to describe scalability in Blockchains.

This study researched prior Blockchain scalability research, such as those mentioned in current surveys on Blockchain scalability and the fundamental scalability principles accessible in contemporary literature [ 93 ]. As a result, this section analyses and specifies significant characteristics that may be used to characterize a Blockchain system’s scalability. These characteristics of Blockchain scalability are described and presented in Figure 3 .

Figure 3

Blockchain scalability aspect.

2.4. Scalability Trilemma in Blockchain

Although Blockchain has become more attractive in recent years, one of the most significant issues with Blockchain-based electronic voting systems is scalability, which might restrict its potential as a disruptive technology. As a result, this study aims to look into and evaluate existing initiatives to improve the scalability of Blockchain-based electronic voting systems [ 94 ]. As a result, we use a definition of scalability from recent research to describe scalability in electronic voting systems in the context of this study. The scalability trilemma might relate to decentralization, security, and scalability [ 95 ]. It is essential to remember that the trilemma is only a model for the different obstacles that Blockchain technology faces [ 96 ]. The rule says that three elements cannot be combined at the same time simultaneously. So far, however, many researchers worldwide have experimented with many ways to optimize decentralization, scalability, and security.

Understanding the underlying scalability trilemma at the foundation of Blockchain architecture is critical. Blockchains suffer from a trilemma, as postulated by [ 97 ] Vitalik Buterin (cofounder of Ethereum) and further investigated by Multicoin [ 98 ] (an investment company that invests in Blockchain startups and crypto-related businesses as a “theory-driven investment firm”). They can only accomplish two of the following three features simultaneously. A Blockchain can have, at most, two of these three properties:

Scalability: A high rate of transactions per second; decentralization: involvement of a vast number of individuals in the construction and certification of blocks;

Security: Increasing the cost of gaining control over the network.

Scalability is not a priority for proof of work (PoW), a decentralized system that allows anybody to participate in mining or maintain a node. The cost of energy/hardware required to create accumulated hash power provides a security [ 99 ]. Just a few organizations control the world’s hashing power due to the proliferation of specialized and expensive Bitcoin mining hardware known as ASICs (application-specific integrated circuits) [ 100 ].

Decentralization and security are more critical to Ethereum than scaling concerning the second-largest network by market capitalization. Currently, the consensus process (PoW) is identical to that of Bitcoin. Its future proof of stake (PoS) mechanism will be built so that anybody may participate in block generation, just as in Bitcoin [ 101 ]. Proof of stake might be better than Bitcoin’s proof of work because the user does not need to buy costly equipment to participate in building blocks [ 102 ]. Consequently, the network will become more decentralized as the distribution of block producers becomes more diverse.

This study looked at current scalable Blockchain-based electronic voting systems, such as those included in the most recent surveys on Blockchain scalability or scalable Blockchain-based electronic voting, as well as the fundamental scalability concepts present in contemporary literature. As a result, this section analyses and specifies significant characteristics that may be used to characterize a Blockchain system’s scalability. This research defines these as other dimensions of Blockchain scalability trilemma in Figure 4 .

Figure 4

Blockchain Implications.

2.4.1. Decentralization over Scalability

Why have Bitcoin and Ethereum prioritize decentralization? Rather than prioritizing scaling, according to some observers, if these networks are to become widely adopted, they must be able to compete with Visa-like throughput. No one wants to utilize programs that take days, hours, or even seconds to complete a single task [ 103 , 104 ]. The criticism of Blockchains is legitimate, but the core benefits that Blockchains provide are missed, such as censorship resistance. Our return to traditional database systems offers censorship resistance. However, it comes at the expense of the efficiency provided by legacy systems such as Amazon Web Services. We will use traditional database systems if Blockchain platforms do not offer this functionality.

2.4.2. Security over Scalability

The security of a Blockchain system is critical as a unique, promising technology aiming to build a name for itself by upgrading current infrastructure. Many crypto projects have prioritized decentralization and scalability above the security [ 105 ], with a slew of high-profile exchange breaches and manipulated source-code vulnerabilities. For all of its benefits, Blockchain ecosystems rely on the robustness of the underlying source code, which, like everything else, must be thoroughly scrutinized. Both decentralization and scalability will flourish if security is established; however, the decentralization process is ongoing, and scalability must be continually enhanced [ 106 ]. Blockchains have become an enticing target for hackers because the Blockchain source code is freely available to the public and has the potential for monetary benefit from a successful assault. While scalability concentrates on the positive aspects, security protects against the negative aspects, which are vital but often overlooked by [ 107 ]. Good Blockchain use cases have been inhibited by failures, such as the well-known decentralized autonomous organization (DAO) assault, which resulted from shoddy source-code security.

2.4.3. Scalability over Security and Decentralization

Scalability leads to the ability of Blockchain technology to handle large transaction flow and future growth. Scalable Blockchains will not suffer as use cases multiply and Blockchain technology becomes more widely used [ 108 ]. The word “scalability” is used to identify Blockchains that cannot handle an increase in demand. According to the Blockchain trilemma, it is possible to achieve higher scalability, but this would come at the expense of either decentralization, security, or both fields [ 109 ]. Traditional, centralized systems offer faster network settlement times and higher usability than Blockchain networks [ 110 ]. Many Blockchain systems have achieved decentralization and security; however, scaling is a significant problem for today’s most popular decentralized networks, as shown in Figure 5 .

Figure 5

Blockchain scalability trilemma.

Recently, there has been a growing interest in developing electronic voting systems via Blockchain technology. An overview of the most frequent answers found in the protocols, an introduction to current research in Blockchain technology, and an essential guide to the most prevalent challenges that the proposed solutions encounter are all possible outcomes of this article. The following is a list of the paper’s most important findings:

A comprehensive assessment of studies on scalable Blockchain-based electronic voting systems;

Identifying the most critical trends in the subject;

Identifying the key issues that scalable Blockchain-based electronic voting systems confront.

Between 2017 and 2022, this paper will research electronic voting systems based on scalable Blockchain technology. These databases IEEE Digital Library, Scopus, Springer Link, ACM, and Science Direct were searched to locate the papers used for the research.

3. Related Work

Blockchain technology has several uses in various industries, such as banking and finance, IoT and media, energy, health, logistics, and many more. In addition, new fields and ways of use are continually being investigated. The authors of [ 111 ] comprehensively evaluate several articles on Blockchain technology in information systems and give a comprehensive list of applications organized by Blockchain technology problems. This section provides a fundamental analysis of previous research that looked at scalable Blockchain technology for electronic voting. This research used digital libraries such as IEEE Xplore Digital Library, Scopus, ScienceDirect, SpringerLink, and ACM Digital Library to identify and review the existing literature to conduct a methodical study of such efforts. It allowed us to perform a rigorous study analysis of the efforts made. To identify existing surveys, this study focused on efforts to accomplish solutions for scalable Blockchain for electronic voting, as presented in Table 2 . This investigation revealed many potential options [ 112 , 113 , 114 ]. These are broad studies of Blockchain technology, and they mention scalability as a significant challenge for Blockchain. These examinations do not specifically investigate or address the scalability of Blockchain technology, and as a result, they have been excluded from the scope of the present study.

Research questions table.

Currently, research is being carried out on using Blockchain technology in online voting systems. The authors of [ 115 ] describe and compare numerous Blockchain-based electronic voting systems in their summary on voting. The deployment of Blockchain-based electronic voting systems [ 12 ] presents both threats and potential. Another significant survey was performed in [ 106 ], whose authors researched several Blockchain-based electronic voting systems to see how they adhere to existing international standards and conventions. To conclude, specific commercial Blockchain-based electronic voting systems are given and discussed in [ 116 ] in addition to an open electronic voting platform.

The authors of [ 117 ] investigated electronic voting obstacles and the present state of the Blockchain-based e-voting systems. According to [ 118 ], electronic voting may be unavoidable when comparing conventional voting with distant voting through the Internet. Finally, the authors of [ 119 ] present an overview of the current voting systems by describing several voting techniques, their benefits and drawbacks, and technical breakthroughs in the sector.

Numerous articles have been written on merging Blockchain technology with electronic voting systems. The results show how each method has distinct aims and is executed differently in these articles. These publications cover a variety of techniques to accomplish various objectives using a variety of ways. That is why we are performing an SLR on scalable Blockchain-based electronic voting to obtain a handle on what is new in the industry.

In conclusion, these studies lack both a systematic strategy for conducting the review and sufficient depth in current initiatives to address the scalability of Blockchain for electronic voting. Consequently, there are gaps in the coverage of several aspects of Blockchain scalability and the survey’s depth and breadth. Furthermore, due to the ever-increasing length of the Bitcoin chain and recent advancements such as Segregated Witness (SegWit), the scalability of Blockchain has recently garnered significant interest. Consequently, a current and extensive effort is necessary to systematically assess the scalability of Blockchain technology for electronic voting based on its present level of development. This evaluation aims to identify the work that has already been carried out, the existing limitations, and the potential avenues for future research. The first comprehensive literature assessment, based on [ 120 ], considers current initiatives that address all areas of Blockchain scalability in electronic voting systems by selected based on nine QAC discussed in Section 4.8 . Some of the selected and related work is mentioned in Section 5 with the related studies, along with the references, research methods used, and a summary of their results, as well as pointing out the research gaps.

4. Research Methodology

We used an SLR to answer the study questions, and we followed the guidelines presented in [ 120 ]. Iteratively moving through the phases of planning, carrying out, and reporting on the review was one of the strategies we sought to use to conduct an exhaustive analysis of the SLR. The following sections explain the systematic literature review approach and an overview of the scalable Blockchain electronic voting studies.

4.1. Systematic Literature Overview and Process

A systematic literature review, also known as an SLR, is a secondary research method that follows a predetermined plan to locate, examine, and evaluate published research associated with a specific topic, problem, or phenomenon [ 120 ]. There are five stages to the procedure:

Planning the review;

Selection process;

Conducting the review;

Screening and refinement;

Reporting the review.

Establishing research topics and defining a review strategy are the two goals of the review-planning phase. This step essentially presents the research’s scope. The primary goal of the review phase is to develop a search process, implement it, and analyse as many suitable primary papers as attainable. Following this phase, a collection of relevant articles will be picked from all of the available research papers. These papers may then be reviewed and used to answer the research questions. The last phase of the review is the reporting process, which entails composing the findings appropriately for presentation. This process ultimately produces the whole research report in a suitable format, which in this case, is a research paper. The steps of the systematic literature review are shown in Figure 6 , together with the artefacts acquired after each phase.

Figure 6

The process used to identify, gather, and refine research articles.

4.2. Research Questions

By examining existing scalable Blockchain-based voting systems, this article intends to shed light on the most prevalent trends in electronic voting. To attain this goal, the research topics listed in Table 2 will be addressed.

As per our research, we interpret what we found in the literature and check if it is feasible, riveting, novel, ethical, and relevant to this research. During our examination of the literature, we ensured that the questions we produced were sufficient to demonstrate their relevance and that the techniques of analysis used were suitable.

4.3. Selection of Primary Study

To highlight the importance of primary research, specific keywords were categorized into a journal or search engine search feature. The keywords were selected to facilitate the discovery of study results that would contribute to answering the research questions. Moreover, “AND” and “OR” were the only operators used to limit this research. The search strings were as mentioned in Table 3 .

Query strings table.

Different search terms have been used to obtain the data in this research. This way, we did not miss any vital articles because some authors used variants of words to differentiate their work from others. This research tries to obtain and filter all the required data for data gathering, as shown in Figure 7 . The platforms searched were:

ScienceDirect;

IEEE Xplore Digital Library;

SpringerLink;

ACM Digital Library.

Figure 7

Terms that form the search string.

The search platforms were conducted using the title, keywords, or abstract, relying on the search platforms or databases. On the 31 March 2022, we conducted the searches and analysed all of the research that had been published up to that time. These searches yielded filtered results using the inclusion/exclusion criteria described in Section 4.4 . The criteria enabled us to generate a collection of findings that we could then put via [ 121 ] snowballing process. Snowballing iterations continued until there were no more articles that fulfilled the inclusion criterion.

4.4. Inclusion and Exclusion Criteria

To filter the results of a database search, a set of inclusion criteria (IC) and exclusion criteria (EC) was developed in Table 4 and Table 5 include a comprehensive list. Studies that might be included in this SLR include case studies, uses of cutting-edge technology built on the Blockchain technology, and discussions on the progress of existing security processes via Blockchain integration. The included articles were peer-reviewed and published in the English language. Because Google Scholar may produce lower-quality reports, any results showing in Google Scholar were checked for compliance with these standards. This SLR has the most up-to-date findings from the research. The essential inclusion and exclusion criteria are listed in Table 2 .

Inclusion criteria for systematic literature review.

Exclusion criteria for systematic literature review.

4.5. Strategy for Search

The following online libraries and archives were combed for information: IEEE Digital Library, Springer Link, Scopus, ACM Digital Library, and Science Direct. The study questions were prepared using the PICOC (population, intervention, comparison, outcomes, and context) [ 122 ] criteria in the review protocol.

Population: Articles describing scalable Blockchain-based electronic voting solutions for big or small-scale elections were reviewed.

Intervention: Gathering information on electronic voting systems built on Blockchain platforms.

Comparison: The results of the research will not be compared.

Outcomes: It is essential to understand the scalability of Blockchain-based electronic voting systems and how they are utilized in real-world situations, advantages and disadvantages, and the cryptographic methods.

Setting: Electronic voting, scalable Blockchain electronic voting, and Blockchain.

With this in mind, the following search phrase was eventually generated for searching the selected databases after numerous iterative tests: (blockchain OR block-chain OR distributed ledger) AND (voting) AND (large-scale OR national level) AND (scalable OR scalability) AND (lightweight).

4.6. Data Extraction

The search string to query the databases yielded 201 papers: 20 from Scopus, 34 from IEEE Digital Library, 83 from Springer Link, 22 from Science Direct, and 42 from ACM ( Figure 8 ). This research was conducted by PRISMA (preferred reporting items for systematic reviews and meta-analyses). This process is shown in ( Figure 9 ). For Scopus, IEEE Digital Library, Springer Link, ACM, and Science Direct, those percentages equate to 10 percent, 17 percent, 41 percent, 11 percent, and 21 percent, respectively ( Figure 10 ). Figure 11 shows the graphical representation of publications obtained for each queried database per year. These papers went through a filtering process that was divided into four stages:

The initial investigation, during which the majority of the relevant texts were gathered.

Duplication removal, where removes the duplicate papers.

The final selection was based on the title and abstract, and the inclusion and exclusion criteria were applied to the results.

After a thorough reading, all chosen papers were subjected to inclusion and exclusion criteria.

In the first stage, 201 papers were produced, followed by 201 papers in the second stage, 101 papers in the third stage, and 76 papers in the fourth stage, as shown in Table 5 .

Figure 8

Number of papers obtained from each queried database.

Figure 9

PRISMA systematic literature review process diagram.

Figure 10

Percentage of articles found in each database searched.

Figure 11

Graph of publications obtained for each queried database per year.

4.7. Data Analysis

Following the selection method, a framework for data extraction and synthesis of data was established. Following its implementation, data were extracted and synthesized from the 76 articles. Table 6 shows the form as well as its contents.

Data extraction.

4.8. Quality Assessment Criteria

All studies shown in this paper were selected based on nine quality assessment criteria (QAC) presented in Table 7 . QAC are used to refine and analyse the collected data. The presented paper satisfied the criteria to check the quality of the data collected for this research.

Quality criteria.

4.9. Compilation of Results

There are several challenges to the research’s validity. To begin with, not all relevant sources may have been discovered. The search was carried out across many databases using the most general search query feasible to counteract this. Thus, a substantial amount of research should have been conducted. The search was also undertaken to avoid discrimination and ensure internal validity. The use of well-known databases and the complete exclusion of grey literature ensured that the study’s external validity was maintained. As previously indicated, the complete search query was performed to collect the most relevant information from database search engines.

When undertaking a systematic mapping study, there are numerous threats to consider. An exhaustive search for relevant research and information may be impossible. This study identified several search parameters and investigated multiple databases to eradicate this threat. Using several criteria and logical operators could expand the coverage. This study sought to find all relevant documents using various keyword combinations. Even though the topic is new, most of the research conducted following the exclusion measures was published in 2017–2022. As a result, the missing paper review on the subject has too little an impact on these conclusions. Unpublished or associated works not obtainable in the chosen scientific database pose a threat. The internal validity is unaffected by the removed publications because the databases are well-known. Although this research encircled the articles following the designation criteria, there may still be a margin of error owing to the original sample.

5. Result Presentation

The findings of the systematic literature review of the selected 76 papers are reported in this section. Table 8 lists the papers that were chosen. Each research question is explored in its subsection. On the other hand, the primary subsection gives the findings of the research’s quality assessment.

Papers about Blockchain for electronic voting selected for analysis.

5.1. Overview

Only studies from 2017 to 2022 were accepted for this study to observe the most recent research and ideas implemented in electronic voting based on scalable Blockchain technology. Table 8 shows the chosen article with benefits and years. All the selected articles were chosen based on the earlier criteria and then refined accordingly.

5.2. RQ1: What Are Some of the Most Well-Known Proposals/Implementations for Scalable Blockchain-Based Electronic Voting?

As previously said, there are a variety of Blockchain implementations. As a result, it is necessary to determine which one is currently investigated in electronic voting. Figure 12 shows which Blockchain implementations were found and how many times they were mentioned in the literature. Table 9 shows the relationship between specific articles and Blockchain framework implementations.

Figure 12

Implementation of Blockchain in electronic voting.

Studies utilizing specific Blockchain implementations.

The first is [ 123 ], in which the authors claim that the hybrid consensus model ensures integral scalability and security. In addition to this, the second study [ 124 ] focuses on the system usability scale (SUS) test, which measures the efficacy, efficiency, and community satisfaction with the Blockchain-based electronic voting system. However, the systems are inappropriate in terms of authentications. In the third paper [ 125 ], which was initiated to ensure security using Blockchain and trust computation, the proposed mechanism shows a better success rate in simulation, but the accuracy did not confirm. In the fourth article [ 126 ], the authors look at how a transaction malleability attack may be executed. Even though the studies revealed the importance of variables such as network latency and block creation rate, the suggested approach has been implemented on a permissioned Blockchain instead [ 128 ], which advocates using permissioned Blockchain technology such as Hyperledger Fabric.

Furthermore, the authors argue that cryptocurrencies are inappropriate for electronic voting. Bitcoin is very famous in the financial sector and not in services, but it cannot deny the importance of Blockchain due to its first application. Here are some of the authors using Bitcoin in their research, such as [ 7 , 24 , 128 , 128 , 149 , 150 , 156 , 164 ].

In the services sector, with 29 articles, Ethereum is the first most popular Blockchain system, as below [ 123 , 181 ]. Ethereum is a decentralized platform that is open-source and can be accessed anywhere globally (Ethereum Foundation, 2014). It operates on both a public and a private Blockchain architecture. Enabling smart contracts, also known as programmable contracts, can automatically carry out their terms between two parties. Because it is used in all studies, this feature is critical for choosing this Blockchain implementation. It is worth emphasizing that Ethereum is a proof-of-work system, with each transaction on the Blockchain costing gas. It suggests that any system based on this technology ought to take into account any expenses incurred as a result of using it. These systems may not be suitable for large-scale elections because of the possible costs or the added strain that comes with managing virtual currency. The Linux Foundation is the organization in charge of managing the Hyperledger commercial Blockchain project.

It is a worldwide corporation that provides the essential structure, rules, norms, and tools for developing open-source Blockchain and associated applications for usage in various sectors. It is meant to facilitate pluggable implementations of diverse components and handle the complexities and subtleties that exist throughout the economic ecosystem. The above authors [ 163 , 185 ] used Hyperledger Fabric for private Blockchain, although Fabric is much faster than the rest of the above Blockchain frameworks, but the network is not decentralized in any way. In the vast majority of cases, it is controlled either by a single entity or by a group that has shared responsibility. Two different motivations led to the decision to concentrate some portions of the database. First, it is managed by a group, and second, it is often hosted on a centralized cloud service provider such as Amazon Web Services or Microsoft Azure.

5.3. RQ2: Were Those Solutions Tested in a Real-World Scenario?

This question tries to answer if any of the 76 possible solutions explained in the 76 articles chosen were used in an actual election or referendum, whether the results impacted the final product, and how that impact would have been felt. Some of the scenarios were just tested and simulated to check the feasibility of the mentioned solutions. The above solutions have been implemented in some states, but not on a large scale or country level. Some small organizations implemented internal voting, and they found some flaws presented in these solutions and needed more research to obtain fully controlled and decentralized results.

5.4. RQ3: What Are the Verification Methods Used to Test Those Solutions?

This question aimed to find out what testing procedures were used to verify e-voting systems. Table 10 shows a list of the test techniques that have been identified, along with their publications. The analysis of assessment criteria is a test method designed for writers to officially and informally evaluate how well their proposed systems meet a set of requirements. It is a form of verification that is used in the majority of publications.

The methods of verification employed in the chosen articles.

Scalability testing is a type of testing through which the developers perform a formal and informal investigation of the provided solution’s capacity to manage many users and transactions simultaneously, such as those present during an election. One example of this testing scenario is when voters cast their ballots online.

Performance tests are a type of method test in which the authors verify the performance of their solution in the real world. It involves load testing and monitoring the time it takes to complete various election processes, such as voter registration, setup, and ballot casting and tallying.

Security analysis is a testing method through which authors formally and informally analyse and define the security qualities of their systems in response to specific attacks such as reply attacks, DDoS attacks, Sybil attacks, and man-in-the-middle attacks. Examples of these attacks include reply attacks, DDoS attacks, and Sybil attacks.

Cost evaluation is a testing approach in which writers assess the expenses associated with using their product. It is essential when the Blockchain platform is open to the public and employs a cryptocurrency such as Ethereum, where each action has a cost measured in gas [ 151 , 159 ] conducted three types of tests, while only [ 131 , 183 ] ran four types.

5.5. RQ4: What Are the Different Cryptographic Solutions Employed in Previous Research?

The goal of this topic was to find the more often utilized cryptographic solutions in present electronic voting research. Table 11 shows the results linking cryptographic solutions to specific research articles.

Explicitly revealed cryptographic solutions in researched articles.

The Advanced Encryption Standard (AES), also often referred to as Rijndael, is a standard for the encryption of electronic data established in 2001 by the National Institute of Standards and Technology in the United States. Around the globe, critical data stored in software and hardware are encrypted using AES. It is essential for the government’s data security, cybersecurity, and computer security [ 127 , 134 ].

Homomorphic encryption is a kind of cryptographic solution that enables the generation of ciphertext to perform computations that provide the same result as if those computations had been performed on the plaintext. This type of encryption is known as symmetric-key encryption. Homomorphic encryption is employed to encrypt votes as mentioned in these articles [ 128 , 179 ].

The Rivest–Shamir–Adleman (RSA) algorithm is an asymmetric encryption technique that encrypts and decrypts data using two independent keys known as public and private keys. When using RSA, sensitive information may be encrypted using a public key, and the encrypted message can only be decrypted using a private key [ 137 , 160 ].

Elliptic curve cryptography is a key-based encryption technique, sometimes known as ECC. The encryption and decryption of data sent over the Internet is the primary emphasis of the ECC protocol, which makes use of distinct public and private key pairs. Concerning ECC, the cryptographic technique known as Rivest–Shamir–Adleman (RSA) is often discussed [ 24 , 162 ].

The elliptic curve digital signature algorithm, often known as ECDSA, is a kind of digital signature algorithm (DSA) that generates signatures using elliptic curve cryptography keys (ECC). This equation is based on public-key cryptography, and it is quite effective (PKC) [ 129 , 131 ].

As can be seen, the cryptographic solutions that are utilized the most frequently include a variety of digital signatures (12 articles) for authentication and authorization, ElGamal (4 articles) for anonymity and privacy, and DSA encryption of various types (1 article) for operations on encrypted votes, such as counting. The SHA (secure hash algorithm) (14 articles) is an algorithm that is extensively used in security protocols and applications. Some examples of these include transport layer security (TLS), pretty good privacy (PGP), secure sockets layer (SSL), Internet protocol security (IPsec), and secure/multipurpose Internet mail extensions (S/MiME).

5.6. RQ5: Were the Cryptographic Operations Used in Prior Solutions too Costly and Time-Consuming?

The goal of this question was to find the cost and time of the current cryptographic solutions in the latest research regarding scalable electronic voting systems. Table 12 shows the results, linking cryptographic cost and time to specific research articles. The United States government protects sensitive information via encryption known as the Advanced Encryption Standard (AES), a symmetric block cipher. Encryption of sensitive data all over the globe is accomplished with the help of the AES algorithm, which is implemented in both software and hardware. It is essential for the preservation of data and the security of government computers and cybersecurity, [ 127 , 134 ]. AES focuses mainly on the four steps used in each round of AES encryption as follows: (1) byte substitution, (2) shift rows, (3) mix columns, and (4) add round key.

Cryptographic operations.

AES is at least six times quicker than triple-DES (Data Encryption Standard). A substitute for DES was required as its key size was too small. AES is a symmetric algorithm designed for private-key cryptography. It is faster than RSA but only works when both parties transmit a private key.

Homomorphic encryption techniques are a kind of encryption algorithm that permits users to conduct mathematical operations on encrypted data. It is a beneficial property with several applications [ 39 , 128 , 133 , 151 , 159 , 165 , 179 ]. Currently implemented completely homomorphic systems are several charges of magnitude slower than unencrypted data operations. Homomorphic malleability is one of the various theoretical issues. It indicates that homomorphically encrypted data can be converted to another type of encrypted data.

The Rivest–Shamir–Adleman or RSA algorithm is the cornerstone of a cryptosystem. A cryptosystem is a set of cryptographic algorithms for certain security services or goals. It enables public-key encryption, which is used extensively to protect sensitive data, particularly when such data are sent over an unsecured network [ 137 , 160 ]. Due to the massive number of calculations, RSA is somewhat slow and costly. It is still slow in contrast to symmetric encryption techniques.

Elliptic curve cryptography, sometimes known as ECC, is a method that encrypts data using a key. Pairs of public and private keys are emphasized heavily in ECC’s approach to the decryption and encryption of online traffic. The cryptographic technique known as Rivest–Shamir–Adleman (RSA) is often cited in connection with ECC. Elliptic curves provide the same level of protection against intrusion as conventional security methods (such as RSA), but they do so with fewer bits. Elliptic curve cryptography requires, among other things, a decrease in the size of the device, a reduction in the amount of power that is used, and an improvement in processing speed [ 24 , 162 ].

ECDSA is a kind of DSA that makes use of keys obtained from ECC. This equation, which is based on public-key cryptography, is beneficial due to its efficiency (PKC). ECC is used to produce keys, resulting in far more minor keys than the typical key generated by digital signature [ 129 , 181 ]. Some studies claim that ECDSA is more efficient than RSA when signing and decrypting, but that it is slower when verifying signatures and encrypting data. In comparison to other cryptographic systems, the ECDSA provides significant benefits. With smaller key sizes, it gives more security.

The Diffie–Hellman key exchange is the foundation for the ElGamal encryption system, an asymmetric key encryption strategy that uses public-key cryptography. Taher Elgamal first described it in 1985 [ 132 , 162 ]. It is harder to factor huge prime numbers in RSA than in ElGamal, which relies on discrete logarithm calculations. RSA has been demonstrated to be more efficient than ElGamal in encrypting data. In contrast, the ElGamal decryption procedure is far quicker than RSA’s.

The DSA has been designated the Federal Information Processing Standard for digital signatures. Using the modular exponentiation and the discrete logarithm issue both come from the subject area of mathematics. DSA is faster at decryption and signature, but RSA is better at encryption and verification. When dealing with performance concerns, it is good to consider where the problem is (i.e., whether it is the client- or server-based) and then decide based on the basic methodology [ 144 ].

SHA is an acronym for a secure hashing algorithm that is safe and reliable. Data and certificates are hashed using SHA, a newer version of MD5. This algorithm, known as a message digest, results in a 160-bit (20-byte) hash value known as a message digest. Sensitive data may be protected via hashing and encryption. On the other hand, passwords should seldom be encrypted but rather hashed. The hash algorithm can only be used in one specific way, and that is: (it is not feasible to “decrypt” a hash in order to recover the value of the plaintext that it was initially being encrypted from). It is a good idea to use hashing to verify passwords, whereas encryption is used to secure users’ data, and it can be decrypted [ 182 , 185 ].

5.7. RQ6: What Are the Latest Blockchain Applications Focused on Scalability?

The selected articles can be categorized into three groups, as shown in Table 13 : the first is the small-scale or organization voting group, which consists of 20 articles including [ 183 , 185 ] that propose solutions and methods for small-scale voting, such as boardroom voting, etc. National voting is the second group, which consists of 24 papers [ 123 , 167 ] that describe e-voting on a large scale such as national elections, but these solutions are not tested in real-world scenarios; some of the solutions are verified formally and some of the solutions are tested by performing simulations. The third group comprises 18 publications [ 135 , 161 ] that provide solutions for generic voting. This category contains papers that did not specify the sort of election.

Scalability scenario classification.

5.8. RQ7: What Parameters Test the Performance and Scalability of the Electoral Process on a Large Scale?

Table 14 shows the parameters that have been identified to check the performance, highlighted in bold. Increases in block frequency may improve performance [ 140 , 178 ], while block propagation time sets a lower limit. The related work contradicts itself considering the effect of block size on performance, while [ 24 , 185 ] claims a favorable effect of increasing block size on performance. Depending on their instructions and storage access, different smart contracts may have various runtimes in terms of workload [ 2 , 48 , 134 , 136 , 141 , 142 , 143 , 144 , 146 , 147 , 151 , 156 , 157 , 159 , 162 ], Furthermore, [ 153 , 165 , 168 , 171 , 177 ], for example, reports a performance disparity. Node configuration and CPU usage are the parameters that describe a node’s computing power; they comprise hardware settings such as the quantity and kind of CPU and RAM. Only a tiny amount of research was conducted on this parameter in [ 14 , 34 , 179 ]. The impacts of network size are discussed in only a few studies [ 181 , 186 ].

Identified performance parameters.

Network structure/network usage is a parameter that describes the structure of the Blockchain network. This research is found in some of the work conducted in these papers [ 125 , 182 ]. Workload quantity is the number of transactions processed within a given time. Regarding workload quantity, the related work provides contradictory statements, such as in [ 1 , 165 ], while the quantity of miners/sealers/memory usage refers to actively participating nodes to be handled within the given time. Some of the work conducted on these papers was discovered during this investigation [ 14 , 164 ]. Blockchain client and API are referred to, as it is a user interface that connects to a Blockchain node or client network directly or via another service. During the initial investigation, some of the work on these documents was discovered clearly in these papers [ 136 , 166 ].

Subsequently, after applying the refinements to determine scalability parameters, 51 articles were picked to be retained in our study spanning three subcategories as follows. The first subcategory, throughput, includes 15 publications ( Table 15 ) that look at scalability issues. A fundamental component of scalability is transaction throughput, and almost all studies use the term “transactions per second” to describe throughput (TPS). It is the speed at which valid transactions are committed and added to the block when the stakeholders in a Blockchain network (miners) agree on how the network should function. It is worth noting that only these authors discuss the throughput [ 123 , 178 ].

Identified scalability parameters.

Meanwhile, the rest focuses on the second subcategory of scalability latency. In computer science, the term “latency” refers to the time that elapses between an input and an output. In Blockchain technology, having a low network latency is essential. Latency can discuss two types of delays in Blockchain: network latency and transaction latency. The network latency occurs between when a transaction request is initiated and when the network confirms the transaction. A transaction’s latency is a statistic of consensus efficiency that affects the processing and execution of large numbers of transactions. The second subcategory consists of 17 publications providing solutions for scaling the Blockchain by improving latency, such as [ 126 , 163 ]. In the following 19 articles [ 147 , 177 ], when modifying a parameter, these articles utilize throughput and latency instead of changes in throughput and latency (e.g., the network size or the hardware configuration of a node).

5.9. RQ8: What Are the Prior Approaches for Blockchain Scalability to Efficiently Enhance the Electoral Process on a Large Scale?

The goal of this question was to highlight approaches for Blockchain scalability to efficiently enhance the electoral process on a large scale. Table 16 presents a list of identified methods with their publications. On-chain methods boost the scalability of Blockchain by altering internal settings to reduce network latency and optimize the number of transactions and messages, respectively.

Prior approaches to enhance electoral process.

On-chain solutions include: Blockchain pipelining—an on-chain approach that adds blocks to the main chain without other nodes’ validation. It improves the transaction throughput of the Blockchain. The final decision on the block’s validity for forming the main chain is made through voting among nodes as a separate layer [ 145 , 187 ]. Blockchain delivery network—this research investigates solutions [ 126 , 164 ] that use cut-through routing-enabled gateways or cloud delivery networks. These ideas try to improve the transaction throughput or storage scalability without disrupting the Blockchain’s decentralized character. Block size adjustment—adjusting block size is another scalable method. These procedures are application-specific and require adjustment. Too many increases in block size can enhance the transactions per block, but latency is propagated. On the other hand, too much of a reduction in block size can raise block generation rate (BGR), improve latency, and cause frequent forks [ 1 , 188 ].

Off-chain solutions: Off-chain solutions carry out transactions outside the primary Blockchain network, reducing the required effort. These solutions are powered by Blockchain technology. Off-chain technologies such as payment channels link (LN), Raiden Network Token (RDN), or sharding may increase a Blockchain network’s horizontal and vertical scalability. These solutions have the potential to provide Blockchain-based solutions for devices with limited resources, such as Internet-of-things devices.

Payment channel networks: By constructing a micropayment channel, the payment channel allows several parties to conduct various off-chain transactions without publicly committing all transactions. Minimizing the workload on the main chain leads to an increase in throughput. In a typical payment channel network, just two transactions are required to update a record on the main-chain to complete all transactions between parties or satisfy the need for an on-chain transaction. Participants in this network can undertake an unlimited number of transactions. Through intermediaries, even parties not in a direct relationship can enter into transactions [ 128 , 160 ].

Sharding: A Blockchain’s mining node stores all the states, including account balance and transaction history, which reduces transaction throughput linearly. Sharding divides an extensive database into manageable pieces to boost efficiency [ 123 , 127 ]. In the Blockchain, it is the horizontal separation of the main chain into shards. Each partition/shard stores its state. Sharding is a technique that separates the main chain into multiple independent groups, even though it is considered an off-chain solution. As a result, each transaction broadcast on the network does not have to be mined by a single node. Each shard acts as its Blockchain inside the network through the Merkle tree and may be joined to the main chain using cryptographic means.

Hardware-assisted approaches: In addition to software-based approaches, the body of published research includes several solutions that employ specialized, trusted hardware devices for one of two purposes: either improving consensus or speeding up the transaction process to improve Blockchain scalability [ 129 , 146 ]. The hardware has high processing machines and trusted execution environments (TEEs), which enable efficient transaction management while maintaining both correctness and speed.

Parallel mining or processing: The conventional implementation of Blockchain technology is based on decentralized mining. Additionally, transaction throughput and scalability are severely limited in this implementation. The parallel mining methods improve the scalability of Blockchain networks by mining several blocks concurrently without making any fundamental changes to the Blockchain’s underlying structure [ 147 , 187 ].

Redesigning Blockchain: Through this research, the study discovered a few ways to devise an effective strategy, such as to design a new consensus structure, to deal with numerous properties of scalability such as increasing throughput and reducing latency etc. [ 152 , 185 ]. Although Graphchain and HashGraph leverage the nonlinear creation of blocks through the usage of directed acyclic graphs (DAG), certain techniques present as an alternate (other than Blockchain) scalable distributed ledger (DLT) solution. However, these methods are out of the scope of the current research.

6. Analysis and Discussion

According to researchers, electronic voting systems are expected to benefit from the use of Blockchain technology. The immutability of data and the system’s distributed nature are the primary benefits. Researchers have paid close attention to the issue of Blockchain’s scalability since it has emerged as a significant concern. We need ways and processes to increase horizontal and vertical scalability due to the growing usage of Blockchain technology in financial and nonfinancial industries. When scaling a Blockchain for large or countrywide elections, the most important pinpoints to consider are simplified storage, increased throughput, and reduced latency. Decentralized, secure, and scalable (DSS) Blockchain applications or solutions have been presented in various ways, each with its advantages and disadvantages. Blockchain cannot achieve its full potential unless the scalability issues are addressed. As a result, we have identified gaps in the current state of the art that will necessitate more work from the scientific community. In order to build scalable Blockchain, we have outlined the fundamental research problems below.

6.1. Sharding

Sharding is a method that may be used to increase the scalability of Blockchain. Graphchain [ 189 ] and Omniledger [ 190 ] are two examples of sharding-based techniques suggested to achieve low-level latency and high-throughput in a distributed database. Both of these techniques were developed in 2018. There are many other ways to solve such problems, but Graphchain has emerged as the most efficient and secure one [ 191 ]. However, these methods only apply to cryptocurrencies that do not require permissions. On the other hand, some other approaches were extended to all workloads but depended only on trusted hardware to reduce communication overhead [ 192 ].

In particular, message complexity reduction is the aspect of sharding and Blockchain sharding, which needs further investigation. Blockchain’s scalability depends on low communication costs per transaction (CCPT) [ 193 ]. CCPT is regarded as scalable in the context of Blockchain, either relying on hardware specifically designed for the purpose or trusting that all nodes are interested and would act rationally to sacrifice reliability to gain CCPT. Implementing decentralized reputation-management systems and load-balancing mechanisms that include an attractive incentive strategy are potential areas of investigation that could be pursued to prevent anomalous behaviour from nodes that do not have dedicated hardware [ 194 ]. Both of these areas could be explored further. Both of these areas are intended to prevent anomalous behaviour from occurring.

6.2. Consensus Algorithm

Due to the decentralized nature of Blockchain, the consensus algorithm is an essential part of every software stack. Even though Bitcoin is built on proof of work, various additional consensus algorithms have been suggested, comprising proof of stake, proof of authority, proof of weight, etc. An empirical investigation of consensus algorithms is necessary to understand and emphasize the applicability for various application domains [ 195 ]. This consensus algorithm may be a new topic of study that needs additional investigation by the scientific community.

6.3. Block Size Increase

As a result of the study, this research can identify the function block size and generation have in scaling Blockchain. Increasing the maximum block size is known as the block size increase. The blocks in Blockchain networks are created regularly, including a record of all transactions. Because the number of transactions that may be stored in a block is limited by the block size, raising the block size will boost throughput [ 196 ]. It can cause unacceptable propagation delays for blocks if the transmission delays caused by larger blocks are too significant. However, most of these attempts have focused on the Bitcoin Blockchain and are consequently limited to the Bitcoin settings. Such an examination should be carried out on a more abstract platform such as Ethereum or Multichain to emphasize the benefits and weaknesses, especially scalability. It is hoped that this will help developers understand the importance of Blockchain parameters and enable them to select appropriate Blockchain platforms for various application areas.

6.4. Directed Acyclic Graph

Another Blockchain form distinct from regular Blockchain is the decentralized autonomous group or DAG. It is a network consisting of separate transactions connected to several other individual transactions [ 197 ]. The DAG is a tree that grows from one transaction to another, branching out from one transaction to another, etc. Blockchain is a connected list of blocks.

6.5. Increase Authorized Hardware Devices to Decrease Block Generation Rate

Using innovative or approved hardware equipment for mining and verification on a permissioned (consortium) Blockchain may slow the pace at which blocks are generated, directly influencing the amount of business conducted on the network [ 198 ]. On the other hand, the use of this technology in permissionless (public) Blockchain systems requires an effective incentive mechanism to persuade miners to employ full gear with increased processing power, storage space, and memory.

7. Conclusions

The main aim of this paper is to review and analyse the current research on scalable voting systems, primarily based on Blockchain technology. Nevertheless, developing and implementing an electronic voting system is not a simple undertaking. Electronic voting systems must solve many problems, such as authentication, privacy, data integrity, transparency, and verifiability. This report is a systematic mapping study that summarizes the current research on scaling Blockchain technology for electronic voting. One of the fundamental issues that prevent the general use of Blockchain technology in various application fields, including electronic voting, is the impossibility of scaling Blockchain to accommodate increasing numbers of users. Recent occurrences, such as the epidemic that has spread all over the globe and the rise in the number of instances of election fraud, have resulted in the need for a voting information system that is effective, scalable, safe, and dependable. Because of this, investigations into new and improved Blockchain-based solutions are still being carried out. The primary objective of this research is to shed light on the various Blockchain-based voting options currently available. The paper presented the first systematic effort to identify and collate existing efforts related to Blockchain scalability in these aspects. It includes leveraging Blockchain to achieve scalable applications, mechanisms, and methods to enhance Blockchain scalability by contributing to the core Blockchain functions and efforts to define the scalability challenges through analysis of Blockchain-based electronic voting solutions. Several study holes in the field of elevating have been provided that need to be considered for further investigations. There may be other downsides, such as resistance to compulsion, scalability assaults, reduced transparency, and untrustworthy systems, all of which need to be overcome. Testing the electronic voting system may be conducted in various ways, much like trying any software, including acceptability, performance, and security. On the other hand, there is no universally accepted method for checking and ensuring such systems’ accuracy or reference data. At the very least, no one is referenced in any considered books. In addition, there is no indication that these technologies are being utilized in reality, making it hard to conduct an exhaustive study. Most of the chosen papers provide verifiable answers, one of the primary challenges of the electronic voting method. Other concerns often addressed include protecting the confidentiality of ballots and determining who is eligible to vote. On the other hand, many solutions have drawbacks such as a deficiency in coercion resistance and receipt freeness, expenses associated with functioning on a public Blockchain, and susceptibility to certain types of assaults.

Author Contributions

U.J.: writing, original draft, investigation and editing. M.J.A.A.: conceptualization, methodology, supervision. Z.S.: conceptualization, methodology, supervision. H.A.H.: writing—review and editing. All authors have read and agreed to the published version of the manuscript.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Data availability statement, conflicts of interest.

The authors declare no conflict of interest.

Funding Statement

We would like to thank the Universiti Kebangsaan Malaysia for funding. Code PP-FTSM-2021.

Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

  • 1. Khan K.M., Arshad J., Khan M.M. Investigating performance constraints for blockchain based secure e-voting system. Futur. Gener. Comput. Syst. 2019;105:13–26. doi: 10.1016/j.future.2019.11.005. [ DOI ] [ Google Scholar ]
  • 2. Gritzalis D.A. Secure Electronic Voting. Springer Science & Business Media; Berlin/Heidelberg, Germany: 2012. [ Google Scholar ]
  • 3. Taş R., Tanrıöver Ö.Ö. A Systematic Review of Challenges and Opportunities of Blockchain for E-Voting. Symmetry. 2020;12:1328. doi: 10.3390/sym12081328. [ DOI ] [ Google Scholar ]
  • 4. Noizat P. Handbook of Digital Currency. Elsevier; Amsterdam, The Netherlands: 2015. Blockchain electronic vote; pp. 453–461. [ Google Scholar ]
  • 5. Garg K., Saraswat P., Bisht S., Aggarwal S.K., Kothuri S.K., Gupta S. A Comparitive Analysis on E-Voting System Using Blockchain; Proceedings of the 2019 4th International Conference on Internet of Things: Smart Innovation and Usages (IoT-SIU); Ghaziabad, India. 18–19 April 2019; pp. 1–4. [ Google Scholar ]
  • 6. Febriyanto E., Rahayu N., Pangaribuan K., Sunarya P.A. Using Blockchain Data Security Management for E-Voting Systems; Proceedings of the 2020 8th International Conference on Cyber and IT Service Management (CITSM); Pangkal Pinang, Indonesia. 23–24 October 2020; pp. 1–4. [ Google Scholar ]
  • 7. Adiputra C.K., Hjort R., Sato H. A proposal of blockchain-based electronic voting system; Proceedings of the 2018 Second World Conference on Smart Trends in Systems, Security and Sustainability (WorldS4); London, UK. 30–31 October 2018; pp. 22–27. [ Google Scholar ]
  • 8. Pawlak M., Poniszewska-Marańda A. Trends in blockchain-based electronic voting systems. Inf. Process. Manag. 2021;58:102595. doi: 10.1016/j.ipm.2021.102595. [ DOI ] [ Google Scholar ]
  • 9. Roh C.-H., Lee I.-Y. A study on electronic voting system using private blockchain. J. Inf. Process. Syst. 2020;16:421–434. [ Google Scholar ]
  • 10. Vivek S., Yashank R., Prashanth Y., Yashas N., Namratha M. E-voting systems using blockchain: An exploratory literature survey; Proceedings of the 2020 Second International Conference on Inventive Research in Computing Applications (ICIRCA); Coimbatore, India. 15–17 July 2020; pp. 890–895. [ Google Scholar ]
  • 11. Jafar U., Ab Aziz M.J., Shukur Z. Blockchain for Electronic Voting System—Review and Open Research Challenges. Sensors. 2021;21:5874. doi: 10.3390/s21175874. [ DOI ] [ PMC free article ] [ PubMed ] [ Google Scholar ]
  • 12. Abuidris Y., Hassan A., Hadabi A., Elfadul I. Risks and opportunities of blockchain based on e-voting systems; Proceedings of the 2019 16th International Computer Conference on Wavelet Active Media Technology and Information Processing; Chengdu, China. 16–18 December 2019; pp. 365–368. [ Google Scholar ]
  • 13. Zheng S., Huo R., Huang T., Liu J., Wang S., Feng W. Survey of blockchain: Principle, progress and application. J. Commun. 2020;41:134. [ Google Scholar ]
  • 14. Pawade D., Sakhapara A., Badgujar A., Adepu D., Andrade M. Data Management, Analytics and Innovation. Springer; Berlin/Heidelberg, Germany: 2020. Secure Online Voting System Using Biometric and Blockchain; pp. 93–110. [ Google Scholar ]
  • 15. Aysan A., Bergigui F., Disli M. Blockchain-Based Solutions in Achieving SDGs after COVID-19. J. Open Innov. Technol. Mark. Complex. 2021;7:151. doi: 10.3390/joitmc7020151. [ DOI ] [ Google Scholar ]
  • 16. Aysan A.F., Bergigui F. Blockchain paths in rebooting the global response to the sustainable development goals after COVID-19. Preprints. 2020:2020100074. doi: 10.20944/preprints202010.0074.v1. [ DOI ] [ Google Scholar ]
  • 17. World Health Organization A Year without Precedent: WHO’s COVID-19 Response. [(accessed on 15 November 2021)]. Available online: https://www.who.int/news-room/spotlight/a-year-without-precedent-who-s-covid-19-response .
  • 18. Nakamoto S. Bitcoin: A Peer-to-Peer Electronic Cash System Bitcoin: A Peer-to-Peer Electronic Cash System. [(accessed on 23 November 2021)];Bitcoin. Org. 2009 Available online: https://bitcoin.org/en/bitcoin-paper . [ Google Scholar ]
  • 19. Crosby M., Pattanayak P., Verma S., Kalyanaraman V. Blockchain technology: Beyond bitcoin. Appl. Innov. 2016;2:71. [ Google Scholar ]
  • 20. Deep G., Mohana R., Nayyar A., Sanjeevikumar P., Hossain E. Authentication Protocol for Cloud Databases Using Blockchain Mechanism. Sensors. 2019;19:4444. doi: 10.3390/s19204444. [ DOI ] [ PMC free article ] [ PubMed ] [ Google Scholar ]
  • 21. Çabuk U.C., Adiguzel E., Karaarslan E. A survey on feasibility and suitability of blockchain techniques for the e-voting systems. arXiv. 2020 doi: 10.17148/IJARCCE.2018.7324.2002.07175 [ DOI ] [ Google Scholar ]
  • 22. Ravikumar S., Antony Kumar K., Sathana V. E-voting system using blockchain with network security. Turk. J. Comput. Math. Educ. (TURCOMAT) 2021;12:19–22. [ Google Scholar ]
  • 23. Nicolas K., Wang Y., Giakos G.C., Wei B., Shen H. Blockchain System Defensive Overview for Double-Spend and Selfish Mining Attacks: A Systematic Approach. IEEE Access. 2020;9:3838–3857. doi: 10.1109/ACCESS.2020.3047365. [ DOI ] [ Google Scholar ]
  • 24. Yi H. Securing e-voting based on blockchain in P2P network. EURASIP J. Wirel. Commun. Netw. 2019;2019:137. doi: 10.1186/s13638-019-1473-6. [ DOI ] [ Google Scholar ]
  • 25. Twesige R.L. A simple explanation of Bitcoin and Blockchain technology. Comput. Sci. 2015;1:1–5. [ Google Scholar ]
  • 26. Zhang Y., Li Y., Fang L., Chen P., Dong X. Privacy-protected Electronic Voting System Based on Blockchin and Trusted Execution Environment; Proceedings of the 2019 IEEE 5th International Conference on Computer and Communications (ICCC); Chengdu, China. 6–9 December 2019; pp. 1252–1257. [ Google Scholar ]
  • 27. Moher D., Liberati A., Tetzlaff J., Altman D.G., Group P. Preferred reporting items for systematic reviews and meta-analyses: The PRISMA statement. Ann. Intern. Med. 2009;151:264–269. doi: 10.7326/0003-4819-151-4-200908180-00135. [ DOI ] [ PubMed ] [ Google Scholar ]
  • 28. Kitchenham B., Brereton O.P., Budgen D., Turner M., Bailey J., Linkman S. Systematic literature reviews in software engineering—A systematic literature review. Inf. Softw. Technol. 2009;51:7–15. doi: 10.1016/j.infsof.2008.09.009. [ DOI ] [ Google Scholar ]
  • 29. Verwer M.B., Dionysiou I., Gjermundrød H. TrustedEVoting (TeV) a Secure, Anonymous and Verifiable Blockchain-Based e-Voting Framework; Proceedings of the International Conference on e-Democracy; Athens, Greece. 12–13 December 2019; pp. 129–143. [ Google Scholar ]
  • 30. Draper S.W., Brown M.I. Increasing interactivity in lectures using an electronic voting system. J. Comput. Assist. Learn. 2004;20:81–94. doi: 10.1111/j.1365-2729.2004.00074.x. [ DOI ] [ Google Scholar ]
  • 31. ND Institute Common Electronic Voting and Counting Technologies. [(accessed on 12 March 2022)]. Available online: https://www.ndi.org/e-voting-guide/common-electronic-voting-and-counting-technologies .
  • 32. Kiayias A., Zacharias T., Zhang B. An Efficient E2E Verifiable E-voting System without Setup Assumptions. IEEE Secur. Priv. 2017;15:14–23. doi: 10.1109/MSP.2017.71. [ DOI ] [ Google Scholar ]
  • 33. Shahzad B., Crowcroft J. Trustworthy Electronic Voting Using Adjusted Blockchain Technology. IEEE Access. 2019;7:24477–24488. doi: 10.1109/ACCESS.2019.2895670. [ DOI ] [ Google Scholar ]
  • 34. Braghin C., Cimato S., Cominesi S.R., Damiani E., Mauri L. Towards Blockchain-Based E-Voting Systems; Proceedings of the International Conference on Business Information Systems; Seville, Spain. 26–28 June 2019; pp. 274–286. [ Google Scholar ]
  • 35. Kumar D.A., Begum T.U.S. Electronic voting machine—A review; Proceedings of the International Conference on Pattern Recognition, Informatics and Medical Engineering (PRIME-2012); Tamilnadu, India. 21–23 March 2012; pp. 41–48. [ Google Scholar ]
  • 36. Alam A., Rashid S.Z.U., Salam M.A., Islam A. Towards blockchain-based e-voting system; Proceedings of the 2018 International Conference on Innovations in Science, Engineering and Technology (ICISET); Chittagong, Bangladesh. 27–28 October 2018; pp. 351–354. [ Google Scholar ]
  • 37. Jefferson D., Rubin A.D., Simons B., Wagner D. Analyzing internet voting security. Commun. ACM. 2004;47:59–64. doi: 10.1145/1022594.1022624. [ DOI ] [ Google Scholar ]
  • 38. Kshetri N., Voas J. Blockchain-Enabled E-Voting. IEEE Softw. 2018;35:95–99. doi: 10.1109/MS.2018.2801546. [ DOI ] [ Google Scholar ]
  • 39. Han G., Li Y., Yu Y., Choo K.-K.R., Guizani N. Blockchain-Based Self-Tallying Voting System with Software Updates in Decentralized IoT. IEEE Netw. 2020;34:166–172. doi: 10.1109/MNET.001.1900439. [ DOI ] [ Google Scholar ]
  • 40. Springall D., Finkenauer T., Durumeric Z., Kitcat J., Hursti H., MacAlpine M., Halderman J.A. Security analysis of the Estonian internet voting system; Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security; Scottsdale, AZ, USA. 3–7 November 2014; pp. 703–715. [ Google Scholar ]
  • 41. Serdult U., Germann M., Mendez F., Portenier A., Wellig C. Fifteen years of internet voting in Switzerland [history, governance and use]; Proceedings of the 2015 Second International Conference on eDemocracy & eGovernment (ICEDEG); Quito, Ecuador. 8–10 April 2015; pp. 126–132. [ Google Scholar ]
  • 42. Iqbal M., Matulevičius R. Blockchain-based application security risks: A systematic literature review; Proceedings of the International Conference on Advanced Information Systems Engineering; Rome, Italy. 3–7 June 2019; pp. 176–188. [ Google Scholar ]
  • 43. Gjøsteen K. Analysis of an internet voting protocol. Cryptol. ePrint Arch. 2010:380. [ Google Scholar ]
  • 44. Rubin A.D. Security considerations for remote electronic voting. Commun. ACM. 2002;45:39–44. doi: 10.1145/585597.585599. [ DOI ] [ Google Scholar ]
  • 45. Damgård I., Groth J., Salomonsen G. Secure Electronic Voting. Springer; Boston, MA, USA: 2003. The theory and implementation of an electronic voting system; pp. 77–99. [ Google Scholar ]
  • 46. Soud M., Helgason S., Hjálmtýsson G., Hamdaqa M. TrustVote: On elections we trust with distributed ledgers and smart contracts; Proceedings of the 2020 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS); Paris, France. 28–30 September 2020; pp. 176–183. [ Google Scholar ]
  • 47. Leema A.A., Gulzar Z., Padmavathy P. Trusted and Secured E-Voting Election System Based on Block Chain Technology; Proceedings of the International Conference on Computer Networks, Big Data and IoT (ICCBI—2019); Madurai, India. 19–20 December 2019; Cham, Switzerland: Springer Science and Business Media LLC; 2020. pp. 81–88. [ Google Scholar ]
  • 48. Lee K., James J.I., Ejeta T.G., Kim H.J. Electronic voting service using block-chain. J. Digit. Forensics Secur. Law. 2016;11:8. doi: 10.15394/jdfsl.2016.1383. [ DOI ] [ Google Scholar ]
  • 49. Simons B., Jones D.W. Internet voting in the US. Commun. ACM. 2012;55:68–77. doi: 10.1145/2347736.2347754. [ DOI ] [ Google Scholar ]
  • 50. Kremer S., Ryan M., Smyth B. Election verifiability in electronic voting protocols; Proceedings of the European Symposium on Research in Computer Security; Guildford, UK. 14–18 September 2010; pp. 389–404. [ Google Scholar ]
  • 51. Germann M., Serdült U. Internet voting and turnout: Evidence from Switzerland. Elect. Stud. 2017;47:1–12. doi: 10.1016/j.electstud.2017.03.001. [ DOI ] [ Google Scholar ]
  • 52. Park S., Specter M., Narula N., Rivest R.L. Going from bad to worse: From Internet voting to blockchain voting. J. Cybersecur. 2021;7:tyaa025. doi: 10.1093/cybsec/tyaa025. [ DOI ] [ Google Scholar ]
  • 53. Pawlak M., Poniszewska-Marańda A., Kryvinska N. Towards the intelligent agents for blockchain e-voting system. Procedia Comput. Sci. 2018;141:239–246. doi: 10.1016/j.procs.2018.10.177. [ DOI ] [ Google Scholar ]
  • 54. Pawlak M., Guziur J., Poniszewska-Marańda A. Towards the blockchain technology for ensuring the integrity of data storage and transmission; Proceedings of the OTM Confederated International Conferences on the Move to Meaningful Internet Systems; Valletta, Malta. 22–26 October 2018; pp. 297–304. [ Google Scholar ]
  • 55. Soni Y., Maglaras L., Ferrag M.A. Blockchain based voting systems; Proceedings of the European Conference on Cyber Warfare and Security; Online. 25–26 June 2020; Oxford, UK: Academic Conferences International Limited; pp. 241–248. [ Google Scholar ]
  • 56. Drechsler W., Madise Ü. Electronic Voting and Democracy. Palgrave Macmillan; London, UK: 2004. Electronic voting in Estonia; pp. 97–108. [ Google Scholar ]
  • 57. Kohno T., Stubblefield A., Rubin A.D., Wallach D.S. Analysis of an electronic voting system; Proceedings of the IEEE Symposium on Security and Privacy; Berkeley, CA, USA. 9–12 May 2004; pp. 27–40. [ Google Scholar ]
  • 58. Ali M.S., Vecchio M., Pincheira M., Dolui K., Antonelli F., Rehmani M.H. Applications of Blockchains in the Internet of Things: A Comprehensive Survey. IEEE Commun. Surv. Tutorials. 2018;21:1676–1717. doi: 10.1109/COMST.2018.2886932. [ DOI ] [ Google Scholar ]
  • 59. Hewa T., Ylianttila M., Liyanage M. Survey on blockchain based smart contracts: Applications, opportunities and challenges. J. Netw. Comput. Appl. 2021;177:102857. doi: 10.1016/j.jnca.2020.102857. [ DOI ] [ Google Scholar ]
  • 60. Yli-Huumo J., Ko D., Choi S., Park S., Smolander K. Where Is Current Research on Blockchain Technology?—A Systematic Review. PLoS ONE. 2016;11:e0163477. doi: 10.1371/journal.pone.0163477. [ DOI ] [ PMC free article ] [ PubMed ] [ Google Scholar ]
  • 61. Haber S., Stornetta W.S. How to time-stamp a digital document; Proceedings of the Conference on the Theory and Application of Cryptography; Trondheim, Norway. 30 May–3 June 1990; pp. 437–455. [ Google Scholar ]
  • 62. Bayer D., Haber S., Stornetta W.S. Seq II: Methods in Communication, Security, and Computer Science. Springer; Berlin, Germany: 1992. Improving the Efficiency and Reliability of Digital Time-Stamping; pp. 329–334. [ Google Scholar ]
  • 63. Giraldo F.D., Milton C.B., Gamboa C.E. Electronic Voting Using Blockchain and Smart Contracts: Proof of Concept. IEEE Lat. Am. Trans. 2020;18:1743–1751. doi: 10.1109/TLA.2020.9387645. [ DOI ] [ Google Scholar ]
  • 64. Zheng Z., Xie S., Dai H., Chen X., Wang H. An overview of blockchain technology: Architecture, consensus, and future trends; Proceedings of the 2017 IEEE International Congress on Big Data (BigData Congress); Boston, MA, USA. 11–14 December 2017; pp. 557–564. [ Google Scholar ]
  • 65. Katta P., Mohammed O.A., Prabaakaran K., Divya M., Jayashree G., Keerthika D. Smart voting using Fingerprint, Face and OTP Technology with Blockchain. J. Phys. Conf. Ser. 2021;1916:012139. doi: 10.1088/1742-6596/1916/1/012139. [ DOI ] [ Google Scholar ]
  • 66. Efanov D., Roschin P. The All-Pervasiveness of the Blockchain Technology. Procedia Comput. Sci. 2018;123:116–121. doi: 10.1016/j.procs.2018.01.019. [ DOI ] [ Google Scholar ]
  • 67. Ahram T., Sargolzaei A., Sargolzaei S., Daniels J., Amaba B. Blockchain technology innovations; Proceedings of the 2017 IEEE Technology & Engineering Management Conference (TEMSCON); Santa Clara, CA, USA. 8–10 June 2017; pp. 137–141. [ Google Scholar ]
  • 68. Jalal I., Shukur Z., Bakar K. Validators Performance Efficiency Consensus (VPEC): A Public Blockchain. Test Eng. Manag. 2020;83:17530–17539. [ Google Scholar ]
  • 69. Salman T., Zolanvari M., Erbad A., Jain R., Samaka M. Security Services Using Blockchains: A State of the Art Survey. IEEE Commun. Surv. Tutorials. 2018;21:858–880. doi: 10.1109/COMST.2018.2863956. [ DOI ] [ Google Scholar ]
  • 70. Hassan M.U., Rehmani M.H., Chen J. Privacy preservation in blockchain based IoT systems: Integration issues, prospects, challenges, and future research directions. Future Gener. Comput. Syst. 2019;97:512–529. doi: 10.1016/j.future.2019.02.060. [ DOI ] [ Google Scholar ]
  • 71. Lu Y. The blockchain: State-of-the-art and research challenges. J. Ind. Inf. Integr. 2019;15:80–90. doi: 10.1016/j.jii.2019.04.002. [ DOI ] [ Google Scholar ]
  • 72. Pilkington M. Blockchain Technology: Principles and Applications. In: Xavier F., Zhegu O.M., editors. Research Handbook on Digital Transformations. Edward Elgar Publishing; London, UK: 2015. pp. 225–253. [ Google Scholar ]
  • 73. Batubara F.R., Ubacht J., Janssen M. Challenges of blockchain technology adoption for e-government: A systematic literature review; Proceedings of the 19th Annual International Conference on Digital Government Research: Governance in the Data Age; Delft, The Netherlands. 30 May–1 June 2018; pp. 1–9. [ Google Scholar ]
  • 74. Lucca A.V., Sborz G.M., Leithardt V., Beko M., Zeferino C.A., Parreira W. A Review of Techniques for Implementing Elliptic Curve Point Multiplication on Hardware. J. Sens. Actuator Netw. 2020;10:3. doi: 10.3390/jsan10010003. [ DOI ] [ Google Scholar ]
  • 75. Imran M., Rashid M., Jafri A.R., Najam-ul-Islam M. ACryp-Proc: Flexible asymmetric crypto processor for point multiplication. IEEE Access. 2018;6:22778–22793. doi: 10.1109/ACCESS.2018.2828319. [ DOI ] [ Google Scholar ]
  • 76. Wu B., Duan T. The advantages of blockchain technology in commercial bank operation and management; Proceedings of the 2019 4th International Conference on Machine Learning Technologies; Cairo, Egypt. 28–30 March 2019; pp. 83–87. [ Google Scholar ]
  • 77. Niranjanamurthy M., Nithya B., Jagannatha S. Analysis of Blockchain technology: Pros, cons and SWOT. Clust. Comput. 2019;22:14743–14757. doi: 10.1007/s10586-018-2387-5. [ DOI ] [ Google Scholar ]
  • 78. Golosova J., Romanovs A. The advantages and disadvantages of the blockchain technology; Proceedings of the 2018 IEEE 6th workshop on advances in information, electronic and electrical engineering (AIEEE); Vilnius, Lithuania. 8–10 November 2018; pp. 1–6. [ Google Scholar ]
  • 79. Hussain H.A., Mansor Z., Shukur Z. Comprehensive Survey and Research Directions On Blockchain Iot Access Control. Int. J. Adv. Comput. Sci. Appl. 2021;12:239–244. doi: 10.14569/IJACSA.2021.0120530. [ DOI ] [ Google Scholar ]
  • 80. Yadav S., Singh S.P. Blockchain critical success factors for sustainable supply chain. Resour. Conserv. Recycl. 2020;152:104505. doi: 10.1016/j.resconrec.2019.104505. [ DOI ] [ Google Scholar ]
  • 81. Sheth H., Dattani J. Overview of blockchain technology. Asian J. Converg. Technol. 2019;V doi: 10.33130/AJCT.2019v05i01.013. [ DOI ] [ Google Scholar ]
  • 82. Upadhyay N. Demystifying blockchain: A critical analysis of challenges, applications and opportunities. Int. J. Inf. Manag. 2020;54:102120. doi: 10.1016/j.ijinfomgt.2020.102120. [ DOI ] [ Google Scholar ]
  • 83. Monrat A.A., Schelén O., Andersson K. A survey of blockchain from the perspectives of applications, challenges, and opportunities. IEEE Access. 2019;7:117134–117151. doi: 10.1109/ACCESS.2019.2936094. [ DOI ] [ Google Scholar ]
  • 84. Huang J., He D., Obaidat M.S., Vijayakumar P., Luo M., Choo K.-K.R. The application of the blockchain technology in voting systems: A review. ACM Comput. Surv. 2021;54:1–28. doi: 10.1145/3439725. [ DOI ] [ Google Scholar ]
  • 85. Baudier P., Kondrateva G., Ammi C., Seulliet E. Peace engineering: The contribution of blockchain systems to the e-voting process. Technol. Forecast. Soc. Chang. 2020;162:120397. doi: 10.1016/j.techfore.2020.120397. [ DOI ] [ PMC free article ] [ PubMed ] [ Google Scholar ]
  • 86. Bellini E., Ceravolo P., Damiani E. Blockchain-based e-vote-as-a-service; Proceedings of the 2019 IEEE 12th International Conference on Cloud Computing (CLOUD); Milan, Italy. 8–13 July 2019; pp. 484–486. [ Google Scholar ]
  • 87. Jafar U., Aziz M.J.A. A State of the Art Survey and Research Directions on Blockchain Based Electronic Voting System; Proceedings of the International Conference on Advances in Cyber Security; Penang, Malaysia. 8–9 December 2020; Berlin/Heidelberg, Germany: Springer; pp. 248–266. [ Google Scholar ]
  • 88. Adeshina S.A., Ojo A. Maintaining Voting Integrity using Blockchain; Proceedings of the 2019 15th International Conference on Electronics, Computer and Computation (ICECCO); Abuja, Nigeria. 10–12 December 2019; pp. 1–5. [ Google Scholar ]
  • 89. Rosasooria Y., Saon S., Isa M.A.M., Yamaguchi S., Ahmadon M.A. E-voting on blockchain using solidity language; Proceedings of the 2020 Third International Conference on Vocational Education and Electrical Engineering (ICVEE); Surabaya, Indonesia. 3–4 October 2020; pp. 1–6. [ Google Scholar ]
  • 90. Neziri V., Shabani I., Dervishi R., Rexha B. Assuring Anonymity and Privacy in Electronic Voting with Distributed Technologies Based on Blockchain. Appl. Sci. 2022;12:5477. doi: 10.3390/app12115477. [ DOI ] [ Google Scholar ]
  • 91. Ismail L., Materwala H. A review of blockchain architecture and consensus protocols: Use cases, challenges, and solutions. Symmetry. 2019;11:1198. doi: 10.3390/sym11101198. [ DOI ] [ Google Scholar ]
  • 92. Tso R., Liu Z.-Y., Hsiao J.-H. Distributed E-Voting and E-Bidding Systems Based on Smart Contract. Electronics. 2019;8:422. doi: 10.3390/electronics8040422. [ DOI ] [ Google Scholar ]
  • 93. Iftikhar Z., Javed Y., Zaidi S., Shah M., Khan Z.I., Mussadiq S., Abbasi K. Privacy Preservation in Resource-Constrained IoT Devices Using Blockchain—A Survey. Electronics. 2021;10:1732. doi: 10.3390/electronics10141732. [ DOI ] [ Google Scholar ]
  • 94. Khanna A., Sah A., Bolshev V., Jasinski M., Vinogradov A., Leonowicz Z., Jasiński M. Blockchain: Future of e-Governance in Smart Cities. Sustainability. 2021;13:11840. doi: 10.3390/su132111840. [ DOI ] [ Google Scholar ]
  • 95. Ma X., Zhou J., Yang X., Liu G. A Blockchain Voting System Based on the Feedback Mechanism and Wilson Score. Information. 2020;11:552. doi: 10.3390/info11120552. [ DOI ] [ Google Scholar ]
  • 96. Apeh A.J., Ayo C.K., Adebiyi A. A Scalable Blockchain Implementation Model for Nation-Wide Electronic Voting System; Proceedings of the International Conference on Computational Science and Its Applications; Cagliari, Italy. 13–16 September 2021; pp. 84–100. [ Google Scholar ]
  • 97. Poon J., Buterin V. Plasma: Scalable autonomous smart contracts. [(accessed on 6 September 2022)];White Pap. 2017 :1–47. Available online: https://plasma.io/plasma.pdf . [ Google Scholar ]
  • 98. M Capital Blockcrunch: DeFi Is a Ticking Time Bomb with Ben Sparango and Christian Keroles. [(accessed on 12 April 2022)]. Available online: https://multicoin.capital/es/2020/02/25/blockcrunch-defi-is-a-ticking-time-bomb-with-ben-sparango-and-christian-keroles/
  • 99. Kohad H., Kumar S., Ambhaikar A. Scalability of Blockchain based E-voting system using Multiobjective Genetic Algorithm with Sharding; Proceedings of the 2022 IEEE Delhi Section Conference (DELCON); New Delhi, India. 11–13 February 2022; pp. 1–4. [ Google Scholar ]
  • 100. Khan D., Jung L.T., Hashmani M.A. A Scalable Blockchain Consensus Model; Proceedings of the 2021 International Conference on Computer & Information Sciences (ICCOINS); Kuala Lumpur, Malaysia. 13–15 July 2021; pp. 151–156. [ Google Scholar ]
  • 101. Majumder S., Ray S. Intelligent Data Engineering and Analytics. Springer; Singapore: 2022. Usage of Blockchain Technology in e-Voting System Using Private Blockchain; pp. 51–61. [ Google Scholar ]
  • 102. Jalal I., Shukur Z., Bakar K.A.A. A Study on Public Blockchain Consensus Algorithms: A Systematic Literature Review. Algebra Number Theory. 2020 doi: 10.20944/preprints202011.0355.v1. [ DOI ] [ Google Scholar ]
  • 103. Dhulavvagol P.M., Bhajantri V.H., Totad S.G. Blockchain Ethereum Clients Performance Analysis Considering E-Voting Application. Procedia Comput. Sci. 2020;167:2506–2515. doi: 10.1016/j.procs.2020.03.303. [ DOI ] [ Google Scholar ]
  • 104. Fernandes A., Garg K., Agrawal A., Bhatia A. Decentralized Online Voting using Blockchain and Secret Contracts; Proceedings of the 2021 International Conference on Information Networking (ICOIN); Jeju Island, Korea. 13–16 January 2021; pp. 582–587. [ Google Scholar ]
  • 105. Akbari E., Wu Q., Zhao W., Arabnia H.R., Yang M.Q. From blockchain to internet-based voting; Proceedings of the International Conference on Computational Science and Computational Intelligence (CSCI); Las Vegas, NV, USA. 14–16 December 2017; pp. 218–221. [ Google Scholar ]
  • 106. Cucurull J., Rodríguez-Pérez A., Finogina T., Puiggali J. Blockchain-based internet voting: Systems’ compliance with international standards; Proceedings of the International Conference on Business Information Systems; Berlin, Germany. 18–20 July 2018; pp. 300–312. [ Google Scholar ]
  • 107. Akbari E., Zhao W., Yang S., Luo X. The impact of block parameters on the throughput and security of blockchains; Proceedings of the 2020 the 2nd International Conference on Blockchain Technology; Hilo, HI, USA. 12–14 March 2020; pp. 13–18. [ Google Scholar ]
  • 108. Xie J., Yu F.R., Huang T., Xie R., Liu J., Liu Y. A Survey on the Scalability of Blockchain Systems. IEEE Netw. 2019;33:166–173. doi: 10.1109/MNET.001.1800290. [ DOI ] [ Google Scholar ]
  • 109. El Fezzazi A., Adadi A., Berrada M. Towards a Blockchain based Intelligent and Secure Voting; Proceedings of the 2021 Fifth International Conference on Intelligent Computing in Data Sciences (ICDS); Fez, Morocco. 20–22 October 2021; pp. 1–8. [ Google Scholar ]
  • 110. Febrero P., Pereira J. Cryptocurrency Constellations across the Three-Dimensional Space: Governance Decentralization, Security, and Scalability. IEEE Trans. Eng. Manag. 2020:1–12. doi: 10.1109/TEM.2020.3030105. [ DOI ] [ Google Scholar ]
  • 111. Berdik D., Otoum S., Schmidt N., Porter D., Jararweh Y. A Survey on Blockchain for Information Systems Management and Security. Inf. Process. Manag. 2020;58:102397. doi: 10.1016/j.ipm.2020.102397. [ DOI ] [ Google Scholar ]
  • 112. Ayed A.B., Belhajji M.A. Securing the Internet of Things: Concepts, Methodologies, Tools, and Applications. IGI Global; Hershey, PA, USA: 2020. The blockchain technology: Applications and threats; pp. 1770–1781. [ Google Scholar ]
  • 113. Li X., Jiang P., Chen T., Luo X., Wen Q. A survey on the security of blockchain systems. Futur. Gener. Comput. Syst. 2017;107:841–853. doi: 10.1016/j.future.2017.08.020. [ DOI ] [ Google Scholar ]
  • 114. Zheng Z., Xie S., Dai H.-N., Chen X., Wang H. Blockchain challenges and opportunities: A survey. Int. J. Web Grid Serv. 2018;14:352–375. doi: 10.1504/IJWGS.2018.095647. [ DOI ] [ Google Scholar ]
  • 115. Xiao S., Wang X.A., Wang W., Wang H. Survey on blockchain-based electronic voting; Proceedings of the International Conference on Intelligent Networking and Collaborative Systems; Victoria, BC, Canada. 31 August–2 September 2019; Berlin/Heidelberg, Germany: Springer; pp. 559–567. [ Google Scholar ]
  • 116. Košt’ál K., Bencel R., Ries M., Kotuliak I. Blockchain e-voting done right: Privacy and transparency with public blockchain; Proceedings of the 2019 IEEE 10th International Conference on Software Engineering and Service Science (ICSESS); Beijing, China. 18–20 October 2019; pp. 592–595. [ Google Scholar ]
  • 117. Shanmugasundaram G., Kalaimathy A., Johnvee M., Pavithra S. Perspective Analysis of Digital Voting Systems; Proceedings of the 2019 IEEE International Conference on System, Computation, Automation and Networking (ICSCAN); Pondicherry, India. 29–30 March 2019; pp. 1–6. [ Google Scholar ]
  • 118. Willemson J. Bits or paper: Which should get to carry your vote? J. Inf. Secur. Appl. 2018;38:124–131. doi: 10.1016/j.jisa.2017.11.007. [ DOI ] [ Google Scholar ]
  • 119. Poddar V., Mondal S., Dutta N., Dey H. Incorporating Advancements In Voting Strategies: A Survey; Proceedings of the 2018 9th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON); New York, NY, USA. 8–10 November 2018; pp. 249–254. [ Google Scholar ]
  • 120. Kitchenham B., Charters S. Guidelines for Performing Systematic Literature Reviews in Software Engineering. Keele University; Keele, UK: 2007. [ Google Scholar ]
  • 121. Wohlin C. Guidelines for snowballing in systematic literature studies and a replication in software engineering; Proceedings of the 18th International Conference on Evaluation and Assessment in Software Engineering; London, UK. 13–14 May 2014; pp. 1–10. [ Google Scholar ]
  • 122. Cruz-Benito J. Systematic Literature Review & Mapping. University of Salamanca; Salamanca, Spain: 2016. [ Google Scholar ]
  • 123. Abuidris Y., Kumar R., Yang T., Onginjo J. Secure large-scale E-voting system based on blockchain contract using a hybrid consensus model combined with sharding. ETRI J. 2020;43:357–370. doi: 10.4218/etrij.2019-0362. [ DOI ] [ Google Scholar ]
  • 124. Kamil M., Bist A.S., Rahardja U., Santoso N.P.L., Iqbal M. COVID-19: Implementation e-voting blockchain concept. Int. J. Artif. Intell. Res. 2021;5:25–34. doi: 10.29099/ijair.v5i1.173. [ DOI ] [ Google Scholar ]
  • 125. Rathee G., Iqbal R., Waqar O., Bashir A.K. On the design and implementation of a blockchain enabled e-voting application within iot-oriented smart cities. IEEE Access. 2021;9:34165–34176. doi: 10.1109/ACCESS.2021.3061411. [ DOI ] [ Google Scholar ]
  • 126. Khan K.M., Arshad J., Khan M.M. Empirical analysis of transaction malleability within blockchain-based e-Voting. Comput. Secur. 2020;100:102081. doi: 10.1016/j.cose.2020.102081. [ DOI ] [ Google Scholar ]
  • 127. MohanaPriya D., Devadharshini G., Divya S., Rajalatchumy J. Towards A Privacy-Preserving Voting System through Blockchain Technologies; Proceedings of the 2021 International Conference on System Computation Automation and Networking (ICSCAN); Puducherry, India. 30–31 July 2021; pp. 1–6. [ Google Scholar ]
  • 128. Dimitriou T. Efficient, Coercion-free and Universally Verifiable Blockchain-based Voting. Comput. Netw. 2020;174:107234. doi: 10.1016/j.comnet.2020.107234. [ DOI ] [ Google Scholar ]
  • 129. Daramola O., Thebus D. Architecture-centric evaluation of blockchain-based smart contract e-voting for national elections. Informatics. 2020;7:16. doi: 10.3390/informatics7020016. [ DOI ] [ Google Scholar ]
  • 130. Krishnamurthy R., Rathee G., Jaglan N. An enhanced security mechanism through blockchain for E-polling/counting process using IoT devices. Wirel. Netw. 2019;26:2391–2402. doi: 10.1007/s11276-019-02112-5. [ DOI ] [ Google Scholar ]
  • 131. Shao W., Jia C., Xu Y., Qiu K., Gao Y., He Y. Attrichain: Decentralized traceable anonymous identities in privacy-preserving permissioned blockchain. Comput. Secur. 2020;99:102069. doi: 10.1016/j.cose.2020.102069. [ DOI ] [ Google Scholar ]
  • 132. Yang X., Yi X., Nepal S., Kelarev A., Han F. Blockchain voting: Publicly verifiable online voting protocol without trusted tallying authorities. Futur. Gener. Comput. Syst. 2020;112:859–874. doi: 10.1016/j.future.2020.06.051. [ DOI ] [ Google Scholar ]
  • 133. Li Y., Susilo W., Yang G., Yu Y., Liu D., Du X., Guizani M. A Blockchain-Based Self-Tallying Voting Protocol in Decentralized IoT. IEEE Trans. Dependable Secur. Comput. 2020;19:119–130. doi: 10.1109/TDSC.2020.2979856. [ DOI ] [ Google Scholar ]
  • 134. Zaghloul E., Li T., Ren J. Anonymous and coercion-resistant distributed electronic voting; Proceedings of the 2020 International Conference on Computing, Networking and Communications (ICNC); Big Island, HI, USA. 17–20 February 2020; pp. 389–393. [ Google Scholar ]
  • 135. Priya K.L.S., Rupa C. Block chain technology based electoral franchise; Proceedings of the 2020 2nd International Conference on Innovative Mechanisms for Industry Applications (ICIMIA); Bangalore, India. 5–7 March 2020; pp. 1–5. [ Google Scholar ]
  • 136. Mukherjee P.P., Boshra A.A., Ashraf M.M., Biswas M. A hyper-ledger fabric framework as a service for improved quality e-voting system; Proceedings of the 2020 IEEE Region 10 Symposium (TENSYMP); Dhaka, Bangladesh. 5–7 June 2020; pp. 394–397. [ Google Scholar ]
  • 137. Vivek S., Yashank R., Prashanth Y., Yashas N., Namratha M. E-Voting System using Hyperledger Sawtooth; Proceedings of the 2020 International Conference on Advances in Computing, Communication & Materials (ICACCM); Dehradun, India. 21–22 August 2020; pp. 29–35. [ Google Scholar ]
  • 138. Roopak T., Sumathi R. Electronic voting based on virtual id of aadhar using blockchain technology; Proceedings of the 2020 2nd International Conference on Innovative Mechanisms for Industry Applications (ICIMIA); Bangalore, India. 5–7 March 2020; pp. 71–75. [ Google Scholar ]
  • 139. Alvi S.T., Uddin M.N., Islam L. Digital voting: A blockchain-based e-voting system using biohash and smart contract; Proceedings of the 2020 Third International Conference on Smart Systems and Inventive Technology (ICSSIT); Tirunelveli, India. 20–22 August 2020; pp. 228–233. [ Google Scholar ]
  • 140. Li H., Li Y., Yu Y., Wang B., Chen K. A blockchain-based traceable self-tallying e-voting protocol in ai era. IEEE Trans. Netw. Sci. Eng. 2020;8:1019–1032. doi: 10.1109/TNSE.2020.3011928. [ DOI ] [ Google Scholar ]
  • 141. Al-madani A.M., Gaikwad A.T., Mahale V., Ahmed Z.A. Decentralized E-voting system based on Smart Contract by using Blockchain Technology; Proceedings of the 2020 International Conference on Smart Innovations in Design, Environment, Management, Planning and Computing (ICSIDEMPC); Aurangabad, India. 30–31 October 2020; pp. 176–180. [ Google Scholar ]
  • 142. Xu Z., Cao S. Efficient Privacy-Preserving Electronic Voting Scheme Based on Blockchain; Proceedings of the 2020 IEEE International Conference on Smart Internet of Things (SmartIoT); Beijing, China. 14–16 August 2020; pp. 190–196. [ Google Scholar ]
  • 143. Killer C., Rodrigues B., Scheid E.J., Franco M., Eck M., Zaugg N., Scheitlin A., Stiller B. Provotum: A blockchain-based and end-to-end verifiable remote electronic voting system; Proceedings of the 2020 IEEE 45th Conference on Local Computer Networks (LCN); Sydney, Australia. 16–19 November 2020; pp. 172–183. [ Google Scholar ]
  • 144. Panja S., Bag S., Hao F., Roy B. A Smart Contract System for Decentralized Borda Count Voting. IEEE Trans. Eng. Manag. 2020;67:1323–1339. doi: 10.1109/TEM.2020.2986371. [ DOI ] [ Google Scholar ]
  • 145. Zhou Y., Liu Y., Jiang C., Wang S. An improved FOO voting scheme using blockchain. Int. J. Inf. Secur. 2019;19:303–310. doi: 10.1007/s10207-019-00457-8. [ DOI ] [ Google Scholar ]
  • 146. Chaisawat S., Vorakulpipat C. Fault-tolerant architecture design for blockchain-based electronics voting system; Proceedings of the 2020 17th International Joint Conference on Computer Science and Software Engineering (JCSSE); Chiangmai, Thailand. 6–8 May 2020; pp. 116–121. [ Google Scholar ]
  • 147. Xiao S., Wang X.A., Wang H. Large-scale electronic voting based on conflux consensus mechanism; Proceedings of the International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing; Lodz, Poland. 1–3 July 2019; Berlin/Heidelberg, Germany: Springer; pp. 291–299. [ Google Scholar ]
  • 148. Bosri R., Uzzal A.R., Al Omar A., Hasan A.T., Bhuiyan M.Z.A. Towards a Privacy-Preserving Voting System Through Blockchain Technologies; Proceedings of the 2019 IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC); Fukuoka, Japan. 5–8 August 2019; pp. 602–608. [ Google Scholar ]
  • 149. Bistarelli S., Mercanti I., Santancini P., Santini F. End-to-End Voting with Non-Permissioned and Permissioned Ledgers. J. Grid Comput. 2019;17:97–118. doi: 10.1007/s10723-019-09478-y. [ DOI ] [ Google Scholar ]
  • 150. Gao S., Zheng D., Guo R., Jing C., Hu C. An Anti-Quantum E-Voting Protocol in Blockchain With Audit Function. IEEE Access. 2019;7:115304–115316. doi: 10.1109/ACCESS.2019.2935895. [ DOI ] [ Google Scholar ]
  • 151. Zhang S., Wang L., Xiong H. Chaintegrity: Blockchain-enabled large-scale e-voting system with robustness and universal verifiability. Int. J. Inf. Secur. 2019;19:323–341. doi: 10.1007/s10207-019-00465-8. [ DOI ] [ Google Scholar ]
  • 152. Almeida R.L., Ricci L., Camarinha-Matos L.M. Votechain: Community based scalable internet voting framework; Proceedings of the Doctoral Conference on Computing, Electrical and Industrial Systems, Costa de Caparica; Portugal. 8–10 May 2019; Berlin/Heidelberg, Germany: Springer; pp. 70–80. [ Google Scholar ]
  • 153. Lyu J., Jiang Z.L., Wang X., Nong Z., Au M.H., Fang J. A secure decentralized trustless E-voting system based on smart contract; Proceedings of the 2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom); Rotorua, New Zealand. 5–8 August 2019; pp. 570–577. [ Google Scholar ]
  • 154. Vo-Cao-Thuy L., Cao-Minh K., Dang-Le-Bao C., Nguyen T.A. Votereum: An ethereum-based e-voting system; Proceedings of the 2019 IEEE-RIVF International Conference on Computing and Communication Technologies (RIVF); Danang, Vietnam. 20–22 March 2019; pp. 1–6. [ Google Scholar ]
  • 155. Li P., Lai J. LaT-Voting: Traceable anonymous E-voting on blockchain; Proceedings of the International Conference on Network and System Security; Sapporo, Japan. 15–18 December 2019; Berlin/Heidelberg, Germany: Springer; pp. 234–254. [ Google Scholar ]
  • 156. Sun X., Wang Q., Kulicki P., Sopek M. A Simple Voting Protocol on Quantum Blockchain. Int. J. Theor. Phys. 2019;58:275–281. doi: 10.1007/s10773-018-3929-6. [ DOI ] [ Google Scholar ]
  • 157. Faour N. Transparent E-Voting dApp Based on Waves Blockchain and RIDE Language; Proceedings of the 2019 XVI International Symposium “Problems of Redundancy in Information and Control Systems” (REDUNDANCY); Moscow, Russia. 21–25 October 2019; pp. 219–223. [ Google Scholar ]
  • 158. Seftyanto D., Amiruddin A., Hakim A.R. Design of Blockchain-based electronic election system using Hyperledger: Case of Indonesia; Proceedings of the 2019 4th International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE); Yogyakarta, Indonesia. 20–21 November 2019; pp. 228–233. [ Google Scholar ]
  • 159. Chaieb M., Koscina M., Yousfi S., Lafourcade P., Robbana R. International Colloquium on Theoretical Aspects of Computing. Springer; Cham, Switzerland: 2019. Dabsters: A privacy preserving e-voting protocol for permissioned blockchain; pp. 292–312. [ Google Scholar ]
  • 160. Kirillov D., Korkhov V., Petrunin V., Makarov M., Khamitov I.M., Dostov V. Implementation of an e-voting scheme using hyperledger fabric permissioned blockchain; Proceedings of the International Conference on Computational Science and Its Applications; Cagliari, Italy. 1–9 July 2019; pp. 509–521. [ Google Scholar ]
  • 161. Bellini E., Ceravolo P., Bellini A., Damiani E. Data-Driven Process Discovery and Analysis. Springer; Berlin/Heidelberg, Germany: 2018. Designing process-centric blockchain-based architectures: A case study in e-voting as a service; pp. 1–23. [ Google Scholar ]
  • 162. Chandra Priya J., Sathia Bhama P.R., Swarnalaxmi S., Aisathul Safa A., Elakkiya I. Blockchain centered homomorphic encryption: A secure solution for E-balloting; Proceedings of the International Conference on Computer Networks, Big data and IoT; Madurai, India. 19–20 December 2018; pp. 811–819. [ Google Scholar ]
  • 163. Zhang W., Yuan Y., Hu Y., Huang S., Cao S., Chopra A., Huang S. A privacy-preserving voting protocol on blockchain; Proceedings of the 2018 IEEE 11th International Conference on Cloud Computing (CLOUD); San Francisco, CA, USA. 2–7 July 2018; pp. 401–408. [ Google Scholar ]
  • 164. Bartolucci S., Bernat P., Joseph D. SHARVOT: Secret SHARe-based VOTing on the blockchain; Proceedings of the 1st International Workshop on Emerging Trends in Software Engineering for Blockchain; Gothenburg, Sweden. 27 May–3 June 2018; pp. 30–34. [ Google Scholar ]
  • 165. Perez A.J., Ceesay E.N. Improving end-to-end verifiable voting systems with blockchain technologies; Proceedings of the 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData); Halifax, NS, Canada. 30 July–3 August 2018; pp. 1108–1115. [ Google Scholar ]
  • 166. Singh A., Chatterjee K. SecEVS: Secure Electronic Voting System Using Blockchain Technology; Proceedings of the 2018 International Conference on Computing, Power and Communication Technologies (GUCON); Greater Noida, India. 28–29 September 2018; pp. 863–867. [ Google Scholar ]
  • 167. Srivastava G., Dwivedi A.D., Singh R. PHANTOM protocol as the new crypto-democracy; Proceedings of the IFIP International Conference on Computer Information Systems and Industrial Management; Bialystok, Poland. 16–18 June 2018; pp. 499–509. [ Google Scholar ]
  • 168. Hjálmarsson F.Þ., Hreiðarsson G.K., Hamdaqa M., Hjálmtýsson G. Blockchain-based e-voting system; Proceedings of the 2018 IEEE 11th International Conference on Cloud Computing (CLOUD); San Francisco, CA, USA. 2–7 July 2018; pp. 983–986. [ Google Scholar ]
  • 169. Hardwick F.S., Gioulis A., Akram R.N., Markantonakis K. E-Voting with blockchain: An E-Voting protocol with decentralisation and voter privacy; Proceedings of the 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData); Halifax, NS, Canada. 30 July–3 August 2018; pp. 1561–1567. [ Google Scholar ]
  • 170. Fusco F., Lunesu M.I., Pani F.E., Pinna A. Crypto-voting, a Blockchain based e-Voting System; Proceedings of the 10th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management (KMIS); Seville, Spain. 18–20 September 2018; pp. 223–227. [ Google Scholar ]
  • 171. Yavuz E., Koç A.K., Çabuk U.C., Dalkılıç G. Towards secure e-voting using ethereum blockchain; Proceedings of the 2018 6th International Symposium on Digital Forensic and Security (ISDFS); Antalya, Turkey. 22–25 March 2018; pp. 1–7. [ Google Scholar ]
  • 172. Curran K. E-Voting on the Blockchain. J. Br. Blockchain Assoc. 2018;1:4451. doi: 10.31585/jbba-1-2-(3)2018. [ DOI ] [ Google Scholar ]
  • 173. Patil H.V., Rathi K.G., Tribhuwan M.V. A study on decentralized e-voting system using blockchain technology. Int. Res. J. Eng. Technol. 2018;5:48–53. [ Google Scholar ]
  • 174. Panja S., Roy B.K. A secure end-to-end verifiable e-voting system using zero knowledge based blockchain. [(accessed on 18 January 2022)];Cryptol. Eprint Arch. 2018 Available online: https://eprint.iacr.org/2018/466.pdf . [ Google Scholar ]
  • 175. Pawlak M., Guziur J., Poniszewska-Marańda A. Voting process with blockchain technology: Auditable blockchain voting system; Proceedings of the International Conference on Intelligent Networking and Collaborative Systems; Victoria, BC, Canada. 31 August–2 September 2018; pp. 233–244. [ Google Scholar ]
  • 176. Khan K.M., Arshad J., Khan M.M. Secure digital voting system based on blockchain technology. Int. J. Electron. Gov. Res. 2018;14:53–62. doi: 10.4018/IJEGR.2018010103. [ DOI ] [ Google Scholar ]
  • 177. Khoury D., Kfoury E.F., Kassem A., Harb H. Decentralized voting platform based on ethereum blockchain; Proceedings of the 2018 IEEE International Multidisciplinary Conference on Engineering Technology (IMCET); Beirut, Lebanon. 14–15 November 2018; pp. 1–6. [ Google Scholar ]
  • 178. Hanifatunnisa R., Rahardjo B. Blockchain based e-voting recording system design; Proceedings of the 2017 11th International Conference on Telecommunication Systems Services and Applications (TSSA); Lombok, Indonesia. 26–27 October 2017; pp. 1–6. [ Google Scholar ]
  • 179. Hsiao J.-H., Tso R., Chen C.-M., Wu M.-E. Advances in Computer Science and Ubiquitous Computing. Springer; Berlin/Heidelberg, Germany: 2017. Decentralized E-voting systems based on the blockchain technology; pp. 305–309. [ Google Scholar ]
  • 180. Liu Y., Wang Q. An e-voting protocol based on blockchain. [(accessed on 8 February 2022)];Cryptol. Eprint Arch. 2017 Available online: https://eprint.iacr.org/2017/1043.pdf . [ Google Scholar ]
  • 181. Tarasov P., Tewari H. The Future of E-Voting. IADIS Int. J. Comput. Sci. Inf. Syst. 2017;12:148–165. [ Google Scholar ]
  • 182. Ayed A.B. A conceptual secure blockchain-based electronic voting system. Int. J. Netw. Secur. Its Appl. 2017;9:1–9. [ Google Scholar ]
  • 183. McCorry P., Shahandashti S.F., Hao F. A smart contract for boardroom voting with maximum voter privacy; Proceedings of the International Conference on Financial Cryptography and Data Security; Sliema, Malta. 3–7 April 2017; Berlin/Heidelberg, Germany: Springer; pp. 357–375. [ Google Scholar ]
  • 184. Al-Maaitah S., Qatawneh M., Quzmar A. E-Voting System Based on Blockchain Technology: A Survey; Proceedings of the 2021 International Conference on Information Technology (ICIT); Guangzhou, China. 22–25 December 2021; pp. 200–205. [ Google Scholar ]
  • 185. Denis González C., Frias Mena D., Massó Muñoz A., Rojas O., Sosa-Gómez G. Electronic Voting System Using an Enterprise Blockchain. Appl. Sci. 2022;12:531. doi: 10.3390/app12020531. [ DOI ] [ Google Scholar ]
  • 186. Kaur M., Khan M.Z., Gupta S., Noorwali A., Chakraborty C., Pani S.K. Mbcp: Performance analysis of large scale mainstream blockchain consensus protocol. IEEE Access. 2021;9:80931–80944. doi: 10.1109/ACCESS.2021.3085187. [ DOI ] [ Google Scholar ]
  • 187. Fan X., Chai Q. Roll-DPoS: A randomized delegated proof of stake scheme for scalable blockchain-based internet of things systems; Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services; New York, NY, USA. 5–7 November 2018; pp. 482–484. [ Google Scholar ]
  • 188. Zhang K., Jacobsen H.-A. Towards Dependable, Scalable, and Pervasive Distributed Ledgers with Blockchains. University of Toronto; Toronto, CA, Canada: 2018. Technical Report. [ Google Scholar ]
  • 189. Boyen X., Carr C., Haines T. Graphchain: A blockchain-free scalable decentralised ledger; Proceedings of the 2nd ACM Workshop on Blockchains, Cryptocurrencies, and Contracts; Incheon, Korea. 4 June 2018; pp. 21–33. [ Google Scholar ]
  • 190. Kokoris-Kogias E., Jovanovic P., Gasser L., Gailly N., Syta E., Ford B. Omniledger: A secure, scale-out, decentralized ledger via sharding; Proceedings of the 2018 IEEE Symposium on Security and Privacy (SP); Francisco, CA, USA. 21–23 May 2018; pp. 583–598. [ Google Scholar ]
  • 191. Ibrahim M., Ravindran K., Lee H., Farooqui O., Mahmoud Q.H. Electionblock: An electronic voting system using blockchain and fingerprint authentication; Proceedings of the 2021 IEEE 18th International Conference on Software Architecture Companion (ICSA-C); Stuttgart, Germany. 22–26 March 2021; pp. 123–129. [ Google Scholar ]
  • 192. Khlaponin Y., Vyshniakov V., Ternavska V., Selyukov O., Komarnytskyi O. Development of audit and data protection principles in electronic voting systems. Eastern-Eur. J. Enterp. Technol. 2021;4:112. [ Google Scholar ]
  • 193. Gao N., Huo R., Wang S., Huang T., Liu Y. Sharding-Hashgraph: A High-Performance Blockchain-Based Framework for Industrial Internet of Things with Hashgraph Mechanism. IEEE Internet Things J. 2021;9:17070–17079. doi: 10.1109/JIOT.2021.3126895. [ DOI ] [ Google Scholar ]
  • 194. Wang G., Shi Z.J., Nixon M., Han S. Sok: Sharding on blockchain; Proceedings of the 1st ACM Conference on Advances in Financial Technologies; Zurich, Switzerland. 21–23 October 2019; pp. 41–61. [ Google Scholar ]
  • 195. Wu S., Galindo D. In: Evaluation and Improvement of Two Blockchain Based E-Voting System: Agora and Proof of Vote. Galindo D., editor. University of Birmingham; Birmingham, UK: 2018. [(accessed on 15 February 2022)]. Available online: http://www.dgalindo.es/mscprojects/shuang.pdf . [ Google Scholar ]
  • 196. Agbesi S., Asante G. Electronic voting recording system based on blockchain technology; Proceedings of the 2019 12th CMI Conference on Cybersecurity and Privacy (CMI); Copenhagen, Denmark. 28–29 November 2019; pp. 1–8. [ Google Scholar ]
  • 197. Utakaeva I.K. Directions and features of application of the blockchain technology. J. Phys. Conf. Ser. 2019;1353:012103. doi: 10.1088/1742-6596/1353/1/012103. [ DOI ] [ Google Scholar ]
  • 198. Heiberg S., Kubjas I., Siim J., Willemson J. On trade-offs of applying block chains for electronic voting bulletin boards. [(accessed on 13 March 2022)];Cryptol. Eprint Arch. 2018 Available online: https://eprint.iacr.org/2018/685.pdf . [ Google Scholar ]

Associated Data

This section collects any data citations, data availability statements, or supplementary materials included in this article.

  • View on publisher site
  • PDF (4.8 MB)
  • Collections

Similar articles

Cited by other articles, links to ncbi databases.

  • Download .nbib .nbib
  • Format: AMA APA MLA NLM

Add to Collections

Smart Online Voting System

Ieee account.

  • Change Username/Password
  • Update Address

Purchase Details

  • Payment Options
  • Order History
  • View Purchased Documents

Profile Information

  • Communications Preferences
  • Profession and Education
  • Technical Interests
  • US & Canada: +1 800 678 4333
  • Worldwide: +1 732 981 0060
  • Contact & Support
  • About IEEE Xplore
  • Accessibility
  • Terms of Use
  • Nondiscrimination Policy
  • Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. © Copyright 2024 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.

IMAGES

  1. Online Voting System Base Paper for Mini or Final BE project

    online voting system research paper

  2. SOLUTION: Online voting system research presentation software

    online voting system research paper

  3. Online voting system

    online voting system research paper

  4. PPT

    online voting system research paper

  5. (PDF) MyVote -Blockchain Based Online Voting System

    online voting system research paper

  6. (PDF) Blockchain for Electronic Voting System—Review and Open Research

    online voting system research paper

VIDEO

  1. OPERATING SYSTEM RESEARCH PAPER

  2. Online Voting System using PHP

  3. Online Voting System using PHP+SQL in urdu tutorials 021

  4. Online Voting System using PHP+SQL in urdu tutorials 018

  5. Online Voting System using PHP+SQL in urdu tutorials 010

  6. Online Voting System using PHP+SQL in urdu tutorials 017

COMMENTS

  1. (PDF) Online Voting System

    This project will analyse the student union's present voting procedure and find a way to mo del it with the online. voting system that will be put into p lace. Vo ting procedures will be handled ...

  2. An Online Voting System for Colleges and Universities

    Abstract and Figures. Purpose: This paper describes an online voting system that was designed to meet the electoral needs of universities and colleges. Design/Methodology: The prototyping model ...

  3. Blockchain‐Based Electronic Voting System: Significance and

    Moreover, it has many disadvantages. The current challenges and drawbacks of traditional paper-based voting systems are the following. (1) Cost issues: Logistics expenses that include tons of papers, transportation, polling stations, and human labor. (2) Accessibility issues: Most paper voting systems require a trip to the polling stations.

  4. (PDF) Modern Online Voting System Thesis

    An online voting system is a system on the internet where voters can elect their leaders. V oters are required to fill out web-forms with details such as their name, ID/Registration number and ...

  5. Transforming online voting: a novel system utilizing blockchain and

    As a cornerstone of democratic governance, elections hold unparalleled significance, shaping a nation's trajectory. However, the prevailing ballot-paper based voting systems continue to face trust issues among significant populations. As a result, e-Voting has emerged as an appealing alternative, with numerous countries opting for its implementation globally. While e-Voting systems offer ...

  6. Blockchain-Based E-Voting Systems: A Technology Review

    The employment of blockchain technology in electronic voting (e-voting) systems is attracting significant attention due to its ability to enhance transparency, security, and integrity in digital voting. This study presents an extensive review of the existing research on e-voting systems that rely on blockchain technology. The study investigates a range of key research concerns, including the ...

  7. Online Voting System

    Therefore, it is necessary to introduce an online voting system. Often used to extend technology from physical voting systems to digital voting systems. This particular analysis envisions implementing an online voting system with options such as: B. A system implemented by each party and supported by options that tend to participate in voting.

  8. PDF E-voting and media effects, an exploratory study

    Voting technology/medium Paper; kiosk; online. Characteristics of the e-voting technology Personal information needed for the smart card; availability of tools for audit and verification. Organization of the ballot Who 'owns' and organizes the ballot. Experience with e-voting Three subsequent ballots.

  9. E-voting adoption in many countries: A literature review

    Abstract. Although the number of countries that have adopted e-voting has decreased lately, the number of academic publications on e-voting adoption has increased in the last two years. To date, there is no coherent narrative in the existing literature that explains the progress of the research on e-voting adoption.

  10. PDF Recent Online Voting Systems: Study & Comparative Analysis

    Although there are many researches works on online voting systems, here we have critically analyzed and summarized twenty research works and projects which are more relevant, recent and pertinent. It is observed that most the recent works addresses the issue of online voting and use of various information technologies.

  11. Trends in blockchain-based electronic voting systems

    For this reason, this systematic literature review (SLR) is intended to provide an overview of a current state of the art and current trends in the field of blockchain-based electronic voting. 4. Research methodology. This chapter presents the research methodology used for the research presented in this paper.

  12. PDF Secure Digital Voting System based on Blockchain Technology

    The focus of our research is to investigate the key issues such as voter anonymity, vote confidentiality and end-to-end verification. These challenges form the foundation of an efficient voting system preserving the integrity of the voting process. In this paper, we present our efforts to explore the use of the blockchain

  13. Blockchain for Electronic Voting System—Review and Open Research Challenges

    Online voting is a trend that is gaining momentum in modern society. It has great potential to decrease organizational costs and increase voter turnout. It eliminates the need to print ballot papers or open polling stations—voters can vote from wherever there is an Internet connection. Despite these benefits, online voting solutions are viewed with a great deal of caution because they ...

  14. Making Votes Count with Internet Voting

    This paper reassesses the claim that electronic voting systems help voters to avoid common mistakes that lead to their votes remaining uncounted. While prior studies have come to mixed conclusions, I provide new, more robust evidence based on a case study of extended Internet voting trials in Geneva canton, Switzerland. The trials almost exclusively involved referendum votes. For causal ...

  15. (PDF) E-VOTING SYSTEM

    The proposed voting system allows the voter to scan the fingerprint for examining the authentication by matching with the pre-stored fingerprint template in database by using an algorithm. Once ...

  16. PDF MIT Open Access Articles Going from bad to worse: from Internet voting

    work, or waiting in line. However, voting online has a fatal flaw. Online voting systems are vulnerable to serious failures: attacks that are larger scale, harder to detect, and easier to execute than analogous attacks against paper-ballot-based voting systems. Furthermore, online voting systems will suffer from such

  17. A Systematic Literature Review and Meta-Analysis on Scalable Blockchain

    Conventional voting methods based on a paper presented a severe health risk during the COVID-19 outbreak; hence, the need for research on methods of electronic voting that are secure, impartial, and confidential became even more pressing [15,16]. Electronic voting systems' reliability, speed, and security are not yet at a level that can boost ...

  18. A remote and cost‐optimized voting system using blockchain and smart

    Many voting systems have been proposed and developed so far, and most of them have focused on making it more transparent and tamper-free using blockchain and smart contracts [49-51]. Vairam et al. proposed an online voting system solution focusing on the effects that might occur due to physical damage by a person on the EVS. They have also ...

  19. Smart Online Voting System

    Our country, India is the largest democratic country in the world. So it is essential to make sure that the governing body is elected through a fair election. India has only offline voting system which is not effective and upto the mark as it requires large man force and it also requires more time to process and publish the results. Therefore, to be made effective, the system needs a change ...

  20. (PDF) Online Voting System using Cloud

    2020 International Conference on Emerging Trends in Information Technology and Engineering (ic-ETITE) 978-1-7281-4141-1/$31.00 ©2020 IEEE. Online Voting System using Cloud. Abstract— In this ...