Abstract
This paper describes a blockchain-enabled e-voting system that uses digital wallets to represent votercredentials, with each voter receiving a single "coin" to cast their vote. The voting process includes steps for voterregistration and identification, as well as the casting of votes using encryption or hashing algorithms. The authors discussvarious methods for voter identification, including the use of private and public key pairs, ID documents, and biometricdata. They also mention the use of the SHA-256 hashing algorithm for added security. The goal of the project is to developa flexible system that can be used in any institution and that guarantees maximum security against fraud. The system isbuilt using Rust, a new experimental programming language developed by Mozilla, and makes use of "task trees" tomanage the voting process. Consideration of various methods for voter identification, including the use of private andpublic key pairs, ID documents, and biometric data, shows a commitment to providing a flexible solution that can beadapted to meet the needs of different institutions and voting scenarios. The use of the SHA-256 hashing algorithm alsoadds an extra layer of security to the system, making it more difficult for malicious actors to manipulate or tamper withthe voting process. The use of Rust and "task trees" to manage the voting process also indicates a focus on developing arobust and efficient system that can handle the complexities of large-scale voting. Rust's emphasis on safety and memorymanagement can help prevent common programming errors that can lead to security vulnerabilities, while task trees canprovide a structured approach to managing multiple concurrent voting processes. Overall, the blockchain-enabled evoting system described in this paper presents an interesting approach to addressing the challenges of secure andtransparent voting processes. However, as with any new technology, it will be important to thoroughly test and evaluatethe system to ensure its reliability and effectiveness before it can be widely adopted
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: Automation of technological and business processes
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.