Secure Online Voting Protocol with Blind Signatures and Identity Verification


Authors : Kenneth Richard Dike; Dr. Ugbari Augustine; Dr. Martha Ozohu Musa

Volume/Issue : Volume 11 - 2026, Issue 2 - February


Google Scholar : https://tinyurl.com/359ntf5t

Scribd : https://tinyurl.com/4u3vk3bx

DOI : https://doi.org/10.38124/ijisrt/26feb823

Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.


Abstract : Delays and security remain major issues in traditional manual voting, while in the emerging electronic voting, trust and privacy remain issues in its adoption. This research presents the design and development of a secure electronic voting protocol that combines biometric verification of a standard identity with cryptography to preserve election integrity. This research follows the Design Science Research Methodology, producing the protocol as an artefact, beginning with quick work on it and iteratively improving it during development. The proposed architecture uses a combined National Identity verification and Liveness detection procedure for user authentication, ensuring voter uniqueness and preventing impersonation. It also integrates the RSA blind signature protocol to prevent direct linking of votes to their voters. It uses Paillier encryption to safeguard votes both in transit and at rest, and this encryption scheme has a homomorphic property that enables aggregation of encrypted votes and decryption of the final tally. It uses the SHA-256 cryptographic hashing algorithm, the HMAC authentication technique and the AES-GCM encryption to secure the integrity of data. It also uses zero-knowledge proofs to demonstrate the correctness of encrypted votes and decrypted tallies. Testing showed that it prevented a photo spoofing attempt and also blocked authentication using a person’s mother’s identity data. Also, when the blinded vote is compared with the unblinded, via local logs on the development system, there is no direct link. The whole system shows a secure electronic voting protocol that is easy to use and can be trusted.

Keywords : Blind Signatures, Identity Verification, National Identity, Biometrics, Liveness Detection, Electronic Voting

References :

  1. Aadhaar - Wikipedia. (n.d.). Retrieved 17 August 2025, from https://en.wikipedia.org/wiki/Aadhaar
  2. Akintoye, K. A., & Araoye, O. I. (2015). A BIOMETRIC E-VOTING FRAMEWORK FOR NIGERIA. Jurnal Teknologi (Sciences & Engineering), 77(13). https://doi.org/10.11113/jt.v77.6363
  3. Chaum, D. (1983). Blind Signatures for Untraceable Payments. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 199–203. https://doi.org/10.1007/978-1-4757-0602-4_18
  4. Chaum, D. (2004). Secret-Ballot Receipts: True Voter-Verifiable Elections. In IEEE Security and Privacy (Vol. 2, Number 1). IEEE. https://doi.org/10.1109/MSECP.2004.1264852
  5. Culnane, C., Ryan, P. Y. A., Schneider, S., & Teague, V. (2015). V Vote: A verifiable voting system. ACM Transactions on Information and System Security (TISSEC), 18(1), 1–30. https://doi.org/10.1145/2746338
  6. Election - Wikipedia. (n.d.). Retrieved 15 August 2025, from https://en.wikipedia.org/wiki/Election
  7. Gaikwad, A. A., Shinde, S. T., Shinde, T. P., & Ghante, S. S. (2025). Online Voting System. International Scientific Journal of Engineering and Management (ISJEM), 4(6). https://doi.org/10.55041/ISJEM04549
  8. Ibrahim, S., Kamat, M., Salleh, M., & Aziz, S. R. A. (2003). Secure E-voting with blind signature (IEEE, Tran.). 4th National Conference of Telecommunication Technology, 2003. NCTT 2003 Proceedings, 193–197. https://doi.org/10.1109/NCTT.2003.1188334
  9. Jóźwik, M. J., & Pouwelse, J. (2025). SmartphoneDemocracy: Privacy-Preserving E-Voting on Decentralized Infrastructure using Novel European Identity.
  10. Kareem, S., & Balkrishna, R. S. (2025). Enhancing E-Voting Security: A Multi-Layered Biometric Authentication System with Aadhaar/Voter ID Integration. International Journal of Scientific Research and Engineering Development, 8(3). https://ijsred.com/volume8/issue3/IJSRED-V8I3P468.pdf
  11. Loss, J. (2022). Blind Signatures: Past, Present, and Future. Special Topics on Privacy and Public Auditability (STPPA) - Event 4. https://csrc.nist.gov/presentations/2022/stppa4-blind-sigs
  12. M., U., Patil, A. L., N., K. K., & T., B. H. (2023). BIOMETRIC-ENABLED VOTING SYSTEM DESIGN USING IOT. International Journal For Technological Research in Engineering, 11(4). https://ijtre.com/wp-content/uploads/2024/01/2023110408.pdf
  13. Meera, S., Rasika, R., Kowsalya, V., & Kanimozhi, P. (2024). A Unified Biometric Voter Verification and Authentication E-Voting System Through CNN. https://doi.org/10.1234/jes.2020.12.3.45
  14. Moser, F., Kirsten, M., & Dörre, F. (2024). SoK: Mechanisms Used in Practice for Verifiable Internet Voting. In E-Vote-ID 2024 - 9th International Joint Conference on Electronic Voting. https://doi.org/10.18420/e-vote-id2024_10
  15. Nur’allifa, E. N., Putra, R. R. J., & Nursalman, M. (2025). RSA Blind Signature sebagai dasar pengamanan pada sistem e-voting dengan Prinsip Frictionless User : studi desain dan tinjauan keamanan. Jurnal Komputer Teknologi Informasi Sistem Informasi (JUKTISI), 4(2), 782–793. https://doi.org/10.62712/juktisi.v4i2.527
  16. Ostapets, D., & Motylenko, V. (2025). Analysis of approaches of electronic voting systems implementation. Системні Технології, 6(155), 50–60. https://doi.org/10.34185/1562-9945-6-155-2024-06
  17. Pooshideh, M., Beheshti, A., Qi, Y., Farhood, H., Simpson, M., Gatland, N., & Soltany, M. (2024). Presentation Attack Detection: A Systematic Literature Review. ACM Computing Surveys, 57(1), 1–32. https://doi.org/10.1145/3687264
  18. Prêt à Voter - Wikipedia. (n.d.). Retrieved 7 September 2025, from https://en.wikipedia.org/wiki/Pr%C3%AAt_%C3%A0_Voter
  19. Ryan, P. Y. A. (2004). A Variant of the Chaum Voter-verifiable Scheme. Technical Report CS-TR-864, School of Computing Science, Newcastle University. https://nuhc.ncl.ac.uk/assets/pdf/TRs/864.pdf
  20. Schmid, M., & Grünert, A. (2008). Blind Signatures and Blind Signature E-Voting Protocols. University of Applied Science Biel: Bern, Switzerland. https://www.e-voting-cc.ch/images/pdf/blindsignatures.pdf
  21. Sreenivasa, N., Agarwal, G., & Jain, R. (2023). Online Voting System by Using Three Step Verification. ITM Web of Conferences, 57, 01010. https://doi.org/10.1051/itmconf/20235701010
  22. Yan, Z., Jiang, Z., & Li, Y. (2022). Towards Better Privacy-preserving Electronic Voting System. ArXiv Preprint ArXiv:2205.12094.

Delays and security remain major issues in traditional manual voting, while in the emerging electronic voting, trust and privacy remain issues in its adoption. This research presents the design and development of a secure electronic voting protocol that combines biometric verification of a standard identity with cryptography to preserve election integrity. This research follows the Design Science Research Methodology, producing the protocol as an artefact, beginning with quick work on it and iteratively improving it during development. The proposed architecture uses a combined National Identity verification and Liveness detection procedure for user authentication, ensuring voter uniqueness and preventing impersonation. It also integrates the RSA blind signature protocol to prevent direct linking of votes to their voters. It uses Paillier encryption to safeguard votes both in transit and at rest, and this encryption scheme has a homomorphic property that enables aggregation of encrypted votes and decryption of the final tally. It uses the SHA-256 cryptographic hashing algorithm, the HMAC authentication technique and the AES-GCM encryption to secure the integrity of data. It also uses zero-knowledge proofs to demonstrate the correctness of encrypted votes and decrypted tallies. Testing showed that it prevented a photo spoofing attempt and also blocked authentication using a person’s mother’s identity data. Also, when the blinded vote is compared with the unblinded, via local logs on the development system, there is no direct link. The whole system shows a secure electronic voting protocol that is easy to use and can be trusted.

Keywords : Blind Signatures, Identity Verification, National Identity, Biometrics, Liveness Detection, Electronic Voting

Paper Submission Last Date
31 - March - 2026

SUBMIT YOUR PAPER CALL FOR PAPERS
Video Explanation for Published paper

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe