Fair Electronic Voting via Bitcoin Deposits

  • Xijuan WuEmail author
  • Baodian Wei
  • Haibo Tian
  • Yusong Du
  • Xiao Ma
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 849)


Bitcoin is the most popular decentralized digital currency now in use. Block chain is the basic technology of Bitcoin, providing a trustable ledger that can be publicly verified. Research on distributed applications based on block chain has become a new trend. We propose an electronic voting scheme based on block chain and prime numbers, which can support voting situations for multiple candidates. We design protocols for the Bitcoin voting situation, in which there are n voters and k candidates. Each voter will vote for one candidate. The proposed protocols could guarantee that the candidate who gets the majority voting wins the game and no individual voting information is disclosed. Due to the nature of the block chain, the voting results could not be tampered. It is transparent since the block chain is open to the public for verification.


Bitcoin Blockchain Electronic voting Deposit 



This work was supported by National Key R&D Program of China (2017YFB0802500), National Natural Science Foundations of China (U1636118, 61472457 and 61309028), Natural Science Foundation of Guangdong Province (2016A030313298), Science and Technology Planning Project of Guangdong Province (2014A010103017), the Fundamental Research Funds for the Central Universities (17lgjc45) and the Opening fund of Qiongqing Key Lab of Computer Network and Communication Technology (CY-CNCL -2017-04).


  1. 1.
    Neumann, P.G.: Security criteria for electronic voting. In: 16th National Computer Security Conference, vol. 29 (1993)Google Scholar
  2. 2.
    Okamoto, T.: An electronic voting scheme. In: Terashima, N., Altman, E. (eds.) Advanced IT Tools, pp. 21–30. Springer, Boston (1996). Scholar
  3. 3.
    Fujioka, A., Okamoto, T., Ohta, K.: A practical secret voting scheme for large scale elections. In: Seberry, J., Zheng, Y. (eds.) AUSCRYPT 1992. LNCS, vol. 718, pp. 244–251. Springer, Heidelberg (1993). Scholar
  4. 4.
    Sako, K., Kilian, J.: Receipt-free mix-type voting scheme. In: Guillou, Louis C., Quisquater, J.-J. (eds.) EUROCRYPT 1995. LNCS, vol. 921, pp. 393–403. Springer, Heidelberg (1995). Scholar
  5. 5.
    Jakobsson, M., Juels, A., Rivest, R.L.: Making mix nets robust for electronic voting by randomized partial checking. In: USENIX Security Symposium, pp. 339–353, San Francisco (2002)Google Scholar
  6. 6.
    Neff, C.A.: A verifiable secret shuffle and its application to e-voting. In: The 8th ACM Conference on Computer and Communications Security, pp. 116–125. ACM (2001)Google Scholar
  7. 7.
    Baudron, O., Fouque, P.-A., Pointcheval, D., Stern, J., Poupard, G.: Practical multi-candidate election system. In: The Twentieth Annual ACM Symposium on Principles of Distributed Computing, pp. 274–283. ACM (2001)Google Scholar
  8. 8.
    Cramer, R., Gennaro, R., Schoenmakers, B.: A secure and optimally efficient multi-authority election scheme. Trans. Emerg. Telecommun. Technol. 8(5), 481–490 (1997)CrossRefGoogle Scholar
  9. 9.
    Benaloh, J., Tuinstra, D.: Receipt-free secret-ballot elections. In: The Twenty-Sixth Annual ACM Symposium on Theory of Computing, pp. 544–553. ACM (1994)Google Scholar
  10. 10.
    Aradhya, P.: Distributed Ledger Visible to All? Ready for Blockchain? Huffington Post (2016)Google Scholar
  11. 11.
    Business Wire: Now you can vote online with a selfie. Business Wire (2016).
  12. 12.
    Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008).
  13. 13.
    Bentov, I., Kumaresan, R.: How to use bitcoin to design fair protocols. In: Garay, Juan A., Gennaro, R. (eds.) CRYPTO 2014. LNCS, vol. 8617, pp. 421–439. Springer, Heidelberg (2014). Scholar
  14. 14.
    Andrychowicz, M., Dziembowski, S., Malinowski, D., Mazurek, L.: Secure multiparty computations on bitcoin. In: 2014 IEEE Symposium on Security and Privacy, pp. 443–458. IEEE (2014)Google Scholar
  15. 15.
    Kumaresan, R., Bentov, I.: How to use bitcoin to incentivize correct computations. In: 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 30–41. ACM (2014)Google Scholar
  16. 16.
    Andrychowicz, M., Dziembowski, S., Malinowski, D., Mazurek, Ł.: Fair two-party computations via bitcoin deposits. In: Böhme, R., Brenner, M., Moore, T., Smith, M. (eds.) FC 2014. LNCS, vol. 8438, pp. 105–121. Springer, Heidelberg (2014). Scholar
  17. 17.
    Zhao, Z., Chan, T.-H.H.: How to vote privately using bitcoin. In: Qing, S., Okamoto, E., Kim, K., Liu, D. (eds.) ICICS 2015. LNCS, vol. 9543, pp. 82–96. Springer, Cham (2016). Scholar
  18. 18.
    Tilborg, V.H., Jajodia, S.: Encyclopedia of Cryptography and Security, 2nd edn. Springer, Cham (2011)CrossRefGoogle Scholar
  19. 19.
    Ben-Sasson, E., Chiesa, A., Tromer, E., Virza, M.: Succinct non-interactive zero knowledge for a von Neumann architecture. In: USENIX Security, pp. 781–796 (2014)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  • Xijuan Wu
    • 1
    • 2
    • 3
    Email author
  • Baodian Wei
    • 1
    • 2
    • 3
  • Haibo Tian
    • 1
    • 2
    • 3
  • Yusong Du
    • 1
    • 2
    • 3
  • Xiao Ma
    • 1
    • 2
    • 3
  1. 1.School of Data and Computer ScienceSun Yat-sen UniversityGuangzhouChina
  2. 2.Guangdong Key Laboratory of Information Security TechnologyGuangzhouChina
  3. 3.Chongqing Key Lab of Computer Network and Communication TechnologyChongqingChina

Personalised recommendations