2022
DOI: 10.3390/app12020531
|View full text |Cite
|
Sign up to set email alerts
|

Electronic Voting System Using an Enterprise Blockchain

Abstract: Conventional electronic voting systems use a centralized scheme. A central administration of these systems manages the entire voting process and has partial or total control over the database and the system itself. This creates some problems, accidental or intentional, such as possible manipulation of the database and double voting. Many of these problems have been solved thanks to permissionless blockchain technologies in new voting systems; however, the classic consensus method of such blockchains requires s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
18
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 32 publications
(18 citation statements)
references
References 25 publications
0
18
0
Order By: Relevance
“…It is meant to facilitate pluggable implementations of diverse components and handle the complexities and subtleties that exist throughout the economic ecosystem. The above authors [ 163 , 185 ] used Hyperledger Fabric for private Blockchain, although Fabric is much faster than the rest of the above Blockchain frameworks, but the network is not decentralized in any way. In the vast majority of cases, it is controlled either by a single entity or by a group that has shared responsibility.…”
Section: Results Presentationmentioning
confidence: 99%
See 4 more Smart Citations
“…It is meant to facilitate pluggable implementations of diverse components and handle the complexities and subtleties that exist throughout the economic ecosystem. The above authors [ 163 , 185 ] used Hyperledger Fabric for private Blockchain, although Fabric is much faster than the rest of the above Blockchain frameworks, but the network is not decentralized in any way. In the vast majority of cases, it is controlled either by a single entity or by a group that has shared responsibility.…”
Section: Results Presentationmentioning
confidence: 99%
“…The hash algorithm can only be used in one specific way, and that is: (it is not feasible to “decrypt” a hash in order to recover the value of the plaintext that it was initially being encrypted from). It is a good idea to use hashing to verify passwords, whereas encryption is used to secure users’ data, and it can be decrypted [ 182 , 185 ].…”
Section: Results Presentationmentioning
confidence: 99%
See 3 more Smart Citations