ARCHIVES
Original Article
Implementation Paper on Voting System Using Ethereum Blockchain and Ganache Tool
Chaitra BV1
S. Manikantan2
Purvi Hegde3
Khushi Rai4
Teja K M5
1Assistant Professor, Department of Computer Science and Design Engineering, Dayananda Sagar Academy of Technology & Management, Bengaluru, Karnataka, India. 2345Undergraduate Students, Department of Computer Science and Design Engineering, Dayananda Sagar Academy of Technology & Management, Bengaluru, Karnataka, India
Published Online: January-April 2025
Pages: 209-215
Cite this article
↗ https://www.doi.org/10.59256/indjcst.20250401033References
[1] Parmar, P., & Dewangan, A. K. Design and Implementation of Blockchain-Based E-Voting System Using Ethereum. IEEE
ICBC. https://ieeexplore.ieee.org/document/9461141
[2] Nguyen, K. C., Singh, A. K., & Kumar, R. Blockchain-Based E-Voting System with Biometric Security. IEEE
ISCC.https://ieeexplore.ieee.org/document/95519 75
[3] Mittal, P., & Singh, J. Enhancing Voting Transparency Using Blockchain Technology. IEEEBigData.
https://ieeexplore.ieee.org/document/9671770
[4] Liu, Y., Lu, K., & He, W. Face Recognition Algorithms for Biometric Authentication in Secure Systems. IEEE Transactions on
Information Forensics and Security.https://ieeexplore.ieee.org/document/9336219
[5] Chaudhary, M., & Garg, R. Blockchain-based Secure Voting Mechanism Underlying 5G Network: A Smart Contract Approach.
IEEE Access. https://ieeexplore.ieee.org/document/10036445
[6] Park, S., Choi, J., Kim, J., & Oh, H. zkVoting: Zero-knowledge proof based coercion-resistant and E2E verifiable e-voting system.
Cryptology ePrint Archive. https://eprint.iacr.org/2024/1003
[7] Sarier, N. D. Efficient and Usable CoercionResistant E-Voting on the Blockchain. Cryptology ePrint Archive.
https://eprint.iacr.org/2023/1509
[8] Yin, Z., Zhang, B., Nastenko, A., Oliynykov, R., & Ren, K. A Scalable Coercion-resistant Voting Scheme for Blockchain Decision-
making. Cryptology ePrint Archive.https://eprint.iacr.org/2023/1578
[9] M. Swan, Blockchain: Blueprint for a New Economy, 1st ed. Sebastopol, CA:O'ReillyMedia,2015.
https://www.google.co.in/books/edition/Blockchai n/4vFiBgAAQBAJ
[10] S. Nakamoto, "Bitcoin: A Peer-to-Peer Electronic Cash System," 2008. [Online]. Available: https://bitcoin.org/bitcoin.pdf. [Accessed:
Dec. 8, 2024]. bitcoin.pdf
[11] K. Zhang, J. Li, K. Zhang, and W. Yang, "A Blockchain-Based Secure Voting System," in Proceedings of the IEEE International
Conference on Software Engineering and Service Science (ICSESS), Beijing, China, 2019, pp. 541-545.
https://link.springer.com/chapter/10.1007/9 78-981-97-8537-7_15
[12] J. Benet, "IPFS - Content Addressed, Versioned, P2P File System," 2014.[Online].Available: https://arxiv.org/abs/1407.3561.
[Accessed: Dec.8,2024]. https://arxiv.org/abs/1407.3561
[13] K. Jain, P. Flynn, and A. Ross, "Handbook of Biometrics," New York, NY: Springer, 2007. Handbook of Biometrics | SpringerLink
[14] D. Chaum, R. Carback, J. Clark, and B. Essex, "Scantegrity: End-to-End Voter Verifiable Optical-Scan Voting," IEEE Transactions
on Information Forensics and Security, vol. 4, no. 4, pp. 611–627, Dec.2009.Scantegrity- End-to-End-VoterVerifiable-Optical-Scan-
Voting.pdf
[15] C. Cachin, "Architecture of the Hyperledger Blockchain Fabric," in Proceedings of the Workshop on Distributed Cryptocurrencies
and Consensus Ledgers, Chicago, IL, 2016, pp. 1-4. cachin_dccl.pdf
ICBC. https://ieeexplore.ieee.org/document/9461141
[2] Nguyen, K. C., Singh, A. K., & Kumar, R. Blockchain-Based E-Voting System with Biometric Security. IEEE
ISCC.https://ieeexplore.ieee.org/document/95519 75
[3] Mittal, P., & Singh, J. Enhancing Voting Transparency Using Blockchain Technology. IEEEBigData.
https://ieeexplore.ieee.org/document/9671770
[4] Liu, Y., Lu, K., & He, W. Face Recognition Algorithms for Biometric Authentication in Secure Systems. IEEE Transactions on
Information Forensics and Security.https://ieeexplore.ieee.org/document/9336219
[5] Chaudhary, M., & Garg, R. Blockchain-based Secure Voting Mechanism Underlying 5G Network: A Smart Contract Approach.
IEEE Access. https://ieeexplore.ieee.org/document/10036445
[6] Park, S., Choi, J., Kim, J., & Oh, H. zkVoting: Zero-knowledge proof based coercion-resistant and E2E verifiable e-voting system.
Cryptology ePrint Archive. https://eprint.iacr.org/2024/1003
[7] Sarier, N. D. Efficient and Usable CoercionResistant E-Voting on the Blockchain. Cryptology ePrint Archive.
https://eprint.iacr.org/2023/1509
[8] Yin, Z., Zhang, B., Nastenko, A., Oliynykov, R., & Ren, K. A Scalable Coercion-resistant Voting Scheme for Blockchain Decision-
making. Cryptology ePrint Archive.https://eprint.iacr.org/2023/1578
[9] M. Swan, Blockchain: Blueprint for a New Economy, 1st ed. Sebastopol, CA:O'ReillyMedia,2015.
https://www.google.co.in/books/edition/Blockchai n/4vFiBgAAQBAJ
[10] S. Nakamoto, "Bitcoin: A Peer-to-Peer Electronic Cash System," 2008. [Online]. Available: https://bitcoin.org/bitcoin.pdf. [Accessed:
Dec. 8, 2024]. bitcoin.pdf
[11] K. Zhang, J. Li, K. Zhang, and W. Yang, "A Blockchain-Based Secure Voting System," in Proceedings of the IEEE International
Conference on Software Engineering and Service Science (ICSESS), Beijing, China, 2019, pp. 541-545.
https://link.springer.com/chapter/10.1007/9 78-981-97-8537-7_15
[12] J. Benet, "IPFS - Content Addressed, Versioned, P2P File System," 2014.[Online].Available: https://arxiv.org/abs/1407.3561.
[Accessed: Dec.8,2024]. https://arxiv.org/abs/1407.3561
[13] K. Jain, P. Flynn, and A. Ross, "Handbook of Biometrics," New York, NY: Springer, 2007. Handbook of Biometrics | SpringerLink
[14] D. Chaum, R. Carback, J. Clark, and B. Essex, "Scantegrity: End-to-End Voter Verifiable Optical-Scan Voting," IEEE Transactions
on Information Forensics and Security, vol. 4, no. 4, pp. 611–627, Dec.2009.Scantegrity- End-to-End-VoterVerifiable-Optical-Scan-
Voting.pdf
[15] C. Cachin, "Architecture of the Hyperledger Blockchain Fabric," in Proceedings of the Workshop on Distributed Cryptocurrencies
and Consensus Ledgers, Chicago, IL, 2016, pp. 1-4. cachin_dccl.pdf
Related Articles
2025
Transforming Cyber-Physical Systems: Machine Learning for Secure and Efficient Solutions
2025
Exploring AI Techniques for Quantum Threat Detection and Prevention
2025
Maturity Models for Business Intelligence: An Overview
2025
INSPIRO: An AI Driven Institution Auditor
2025
Adaptive AI Framework for Anomaly Detection and DDoS Mitigation in Distributed Systems
2025