Authors :
Kenneth Richard Dike; Dr. Ugbari Augustine; Dr. Martha Ozohu Musa
Volume/Issue :
Volume 11 - 2026, Issue 2 - February
Google Scholar :
https://tinyurl.com/359ntf5t
Scribd :
https://tinyurl.com/4u3vk3bx
DOI :
https://doi.org/10.38124/ijisrt/26feb823
Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.
Abstract :
Delays and security remain major issues in traditional manual voting, while in the emerging electronic voting, trust
and privacy remain issues in its adoption. This research presents the design and development of a secure electronic voting
protocol that combines biometric verification of a standard identity with cryptography to preserve election integrity. This
research follows the Design Science Research Methodology, producing the protocol as an artefact, beginning with quick
work on it and iteratively improving it during development. The proposed architecture uses a combined National Identity
verification and Liveness detection procedure for user authentication, ensuring voter uniqueness and preventing
impersonation. It also integrates the RSA blind signature protocol to prevent direct linking of votes to their voters. It uses
Paillier encryption to safeguard votes both in transit and at rest, and this encryption scheme has a homomorphic property
that enables aggregation of encrypted votes and decryption of the final tally. It uses the SHA-256 cryptographic hashing
algorithm, the HMAC authentication technique and the AES-GCM encryption to secure the integrity of data. It also uses
zero-knowledge proofs to demonstrate the correctness of encrypted votes and decrypted tallies. Testing showed that it
prevented a photo spoofing attempt and also blocked authentication using a person’s mother’s identity data. Also, when the
blinded vote is compared with the unblinded, via local logs on the development system, there is no direct link. The whole
system shows a secure electronic voting protocol that is easy to use and can be trusted.
Keywords :
Blind Signatures, Identity Verification, National Identity, Biometrics, Liveness Detection, Electronic Voting
References :
- Aadhaar - Wikipedia. (n.d.). Retrieved 17 August 2025, from https://en.wikipedia.org/wiki/Aadhaar
- Akintoye, K. A., & Araoye, O. I. (2015). A BIOMETRIC E-VOTING FRAMEWORK FOR NIGERIA. Jurnal Teknologi (Sciences & Engineering), 77(13). https://doi.org/10.11113/jt.v77.6363
- Chaum, D. (1983). Blind Signatures for Untraceable Payments. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 199–203. https://doi.org/10.1007/978-1-4757-0602-4_18
- Chaum, D. (2004). Secret-Ballot Receipts: True Voter-Verifiable Elections. In IEEE Security and Privacy (Vol. 2, Number 1). IEEE. https://doi.org/10.1109/MSECP.2004.1264852
- Culnane, C., Ryan, P. Y. A., Schneider, S., & Teague, V. (2015). V Vote: A verifiable voting system. ACM Transactions on Information and System Security (TISSEC), 18(1), 1–30. https://doi.org/10.1145/2746338
- Election - Wikipedia. (n.d.). Retrieved 15 August 2025, from https://en.wikipedia.org/wiki/Election
- Gaikwad, A. A., Shinde, S. T., Shinde, T. P., & Ghante, S. S. (2025). Online Voting System. International Scientific Journal of Engineering and Management (ISJEM), 4(6). https://doi.org/10.55041/ISJEM04549
- Ibrahim, S., Kamat, M., Salleh, M., & Aziz, S. R. A. (2003). Secure E-voting with blind signature (IEEE, Tran.). 4th National Conference of Telecommunication Technology, 2003. NCTT 2003 Proceedings, 193–197. https://doi.org/10.1109/NCTT.2003.1188334
- Jóźwik, M. J., & Pouwelse, J. (2025). SmartphoneDemocracy: Privacy-Preserving E-Voting on Decentralized Infrastructure using Novel European Identity.
- Kareem, S., & Balkrishna, R. S. (2025). Enhancing E-Voting Security: A Multi-Layered Biometric Authentication System with Aadhaar/Voter ID Integration. International Journal of Scientific Research and Engineering Development, 8(3). https://ijsred.com/volume8/issue3/IJSRED-V8I3P468.pdf
- Loss, J. (2022). Blind Signatures: Past, Present, and Future. Special Topics on Privacy and Public Auditability (STPPA) - Event 4. https://csrc.nist.gov/presentations/2022/stppa4-blind-sigs
- M., U., Patil, A. L., N., K. K., & T., B. H. (2023). BIOMETRIC-ENABLED VOTING SYSTEM DESIGN USING IOT. International Journal For Technological Research in Engineering, 11(4). https://ijtre.com/wp-content/uploads/2024/01/2023110408.pdf
- Meera, S., Rasika, R., Kowsalya, V., & Kanimozhi, P. (2024). A Unified Biometric Voter Verification and Authentication E-Voting System Through CNN. https://doi.org/10.1234/jes.2020.12.3.45
- Moser, F., Kirsten, M., & Dörre, F. (2024). SoK: Mechanisms Used in Practice for Verifiable Internet Voting. In E-Vote-ID 2024 - 9th International Joint Conference on Electronic Voting. https://doi.org/10.18420/e-vote-id2024_10
- Nur’allifa, E. N., Putra, R. R. J., & Nursalman, M. (2025). RSA Blind Signature sebagai dasar pengamanan pada sistem e-voting dengan Prinsip Frictionless User : studi desain dan tinjauan keamanan. Jurnal Komputer Teknologi Informasi Sistem Informasi (JUKTISI), 4(2), 782–793. https://doi.org/10.62712/juktisi.v4i2.527
- Ostapets, D., & Motylenko, V. (2025). Analysis of approaches of electronic voting systems implementation. Системні Технології, 6(155), 50–60. https://doi.org/10.34185/1562-9945-6-155-2024-06
- Pooshideh, M., Beheshti, A., Qi, Y., Farhood, H., Simpson, M., Gatland, N., & Soltany, M. (2024). Presentation Attack Detection: A Systematic Literature Review. ACM Computing Surveys, 57(1), 1–32. https://doi.org/10.1145/3687264
- Prêt à Voter - Wikipedia. (n.d.). Retrieved 7 September 2025, from https://en.wikipedia.org/wiki/Pr%C3%AAt_%C3%A0_Voter
- Ryan, P. Y. A. (2004). A Variant of the Chaum Voter-verifiable Scheme. Technical Report CS-TR-864, School of Computing Science, Newcastle University. https://nuhc.ncl.ac.uk/assets/pdf/TRs/864.pdf
- Schmid, M., & Grünert, A. (2008). Blind Signatures and Blind Signature E-Voting Protocols. University of Applied Science Biel: Bern, Switzerland. https://www.e-voting-cc.ch/images/pdf/blindsignatures.pdf
- Sreenivasa, N., Agarwal, G., & Jain, R. (2023). Online Voting System by Using Three Step Verification. ITM Web of Conferences, 57, 01010. https://doi.org/10.1051/itmconf/20235701010
- Yan, Z., Jiang, Z., & Li, Y. (2022). Towards Better Privacy-preserving Electronic Voting System. ArXiv Preprint ArXiv:2205.12094.
Delays and security remain major issues in traditional manual voting, while in the emerging electronic voting, trust
and privacy remain issues in its adoption. This research presents the design and development of a secure electronic voting
protocol that combines biometric verification of a standard identity with cryptography to preserve election integrity. This
research follows the Design Science Research Methodology, producing the protocol as an artefact, beginning with quick
work on it and iteratively improving it during development. The proposed architecture uses a combined National Identity
verification and Liveness detection procedure for user authentication, ensuring voter uniqueness and preventing
impersonation. It also integrates the RSA blind signature protocol to prevent direct linking of votes to their voters. It uses
Paillier encryption to safeguard votes both in transit and at rest, and this encryption scheme has a homomorphic property
that enables aggregation of encrypted votes and decryption of the final tally. It uses the SHA-256 cryptographic hashing
algorithm, the HMAC authentication technique and the AES-GCM encryption to secure the integrity of data. It also uses
zero-knowledge proofs to demonstrate the correctness of encrypted votes and decrypted tallies. Testing showed that it
prevented a photo spoofing attempt and also blocked authentication using a person’s mother’s identity data. Also, when the
blinded vote is compared with the unblinded, via local logs on the development system, there is no direct link. The whole
system shows a secure electronic voting protocol that is easy to use and can be trusted.
Keywords :
Blind Signatures, Identity Verification, National Identity, Biometrics, Liveness Detection, Electronic Voting