Decentralized Voting: A Self-tallying Voting System Using a Smart Contract on the Ethereum Blockchain

  • Xuechao YangEmail author
  • Xun Yi
  • Surya Nepal
  • Fengling Han
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11233)


Electronic online voting has been piloted in various countries in the recent past. These experiments show that further research is required, to improve the security guarantees of such systems, in terms of vote confidentiality and integrity and validity verification. In this paper we argue that blockchain technology, combined with modern cryptography can provide the transparency, integrity and confidentiality required from reliable online voting. Furthermore, we present a decentralized online voting system implemented as a smart contract on the Ethereum blockchain. The system has no hardwired restrictions on possible vote assignments to candidates, protects voter confidentiality by using a homomorphic encryption system and stores proofs for each element of a vote. To the best of our knowledge, our proposed system is the first decentralized ranked choice online voting system in existence. The underlying Ethereum platform enforces the correct execution of the voting protocol. We also present a security and performance analysis, showing the feasibility of our proposed protocol for real-world voting applications at large scale.


Decentralized voting Ethereum blockchain Smart contract Self-tallying 


  1. 1.
    Adida, B.: Helios: web-based open-audit voting. In: USENIX Security Symposium, vol. 17, pp. 335–348 (2008)Google Scholar
  2. 2.
    Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008)Google Scholar
  3. 3.
    ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. In: Advances in Cryptology, pp. 10–18 (1984)Google Scholar
  4. 4.
    Lamport, L., Shostak, R., Pease, M.: The Byzantine generals. ACM Trans. Program. Lang. Syst. 4(3), 382–401 (1982)CrossRefGoogle Scholar
  5. 5.
    Buterin, V.: A next-generation smart contract and decentralized application platform (2015).
  6. 6.
    Szabo, N.: Smart contracts: building blocks for digital markets. EXTROPY J. Transhumanist Thought 16 (1996)Google Scholar
  7. 7. Introducing a secure and transparent online voting solution for the modern age: Follow My Vote (2016).
  8. 8.
    Hao, F., Ryan, P.Y., Zieliński, P.: Anonymous voting by two-round public discussion. IET Inf. Secur. 4(2), 62–67 (2010)CrossRefGoogle Scholar
  9. 9.
    Groth, J.: Efficient maximal privacy in boardroom voting and anonymous broadcast. In: International Conference on Financial Cryptography, pp. 90–104 (2004)CrossRefGoogle Scholar
  10. 10.
    Kiayias, A., Yung, M.: Self-tallying elections and perfect ballot secrecy. In: International Workshop on Public Key Cryptography, pp. 141–158 (2002)CrossRefGoogle Scholar
  11. 11.
    Li, M., Sun, X., Wang, H., Zhang, Y., Zhang, J.: Privacy-aware access control with trust management in web service. World Wide Web 14(4), 407–430 (2011)CrossRefGoogle Scholar
  12. 12.
    Kabir, M.E., Wang, H.: Conditional purpose based access control model for privacy protection. In: Proceedings of the Twentieth Australasian Conference on Australasian Database, vol. 92, pp. 135–142 (2009)Google Scholar
  13. 13.
    Kabir, M.E., Wang, H., Bertino, E.: A role-involved purpose-based access control model. Inf. Syst. Front. 14(3), 809–822 (2012)CrossRefGoogle Scholar
  14. 14.
    McCorry, P., Shahandashti, S.F., Hao, F.: A smart contract for boardroom voting with maximum voter privacy. In: International Conference on Financial Cryptography and Data Security, pp. 357–375 (2017)Google Scholar
  15. 15.
    Schnorr, C.P.: Efficient signature generation by smart cards. J. Cryptol. 4(3), 161–174 (1991)CrossRefGoogle Scholar
  16. 16.
    Sun, X., Li, M., Wang, H.: A family of enhanced (L, \(\alpha \))-diversity models for privacy preserving data publishing. Future Gener. Comput. Syst. 27(3), 348–356 (2011)Google Scholar
  17. 17.
    Sun, X., Wang, H.: Satisfying privacy requirements before data anonymization. Comput. J. 55(4), 422–437 (2012)CrossRefGoogle Scholar
  18. 18.
    Sun, X., Wang, H., Li, J., Truta, T.M.: Enhanced p-sensitive k-anonymity models for privacy preserving data publishing. Trans. Data Priv. 1(2), 53–66 (2008)MathSciNetGoogle Scholar
  19. 19.
    Wang, H., Cao, J., Zhang, Y.: A flexible payment scheme and its role-based access control. IEEE Trans. Knowl. Data Eng. 17(3), 425–436 (2005)CrossRefGoogle Scholar
  20. 20.
    Wang, H., Zhang, Y., Cao, J.: Effective collaboration with information sharing in virtual universities. IEEE Trans. Knowl. Data Eng. 21(6), 840–853 (2009)CrossRefGoogle Scholar
  21. 21.
    Business Wire. Now you can vote online with a selfie. Business Wire (2016).
  22. 22.
    Yang, X., et al.: A verifiable ranked choice internet voting system. In: Bouguettaya, A., et al. (eds.) WISE 2017. LNCS, vol. 10570, pp. 490–501. Springer, Cham (2017). Scholar
  23. 23.
    Yang, X., Yi, X., Nepal, S., Kelarev, A., Han, F.: A secure verifiable ranked choice online voting system based on homomorphic encryption. IEEE Access (2018)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2018

Authors and Affiliations

  • Xuechao Yang
    • 1
    Email author
  • Xun Yi
    • 1
  • Surya Nepal
    • 2
  • Fengling Han
    • 1
  1. 1.School of ScienceRMIT UniversityMelbourneAustralia
  2. 2.CSIRO Data61SydneyAustralia

Personalised recommendations