Paper
1 April 2024 Exploring blockchain-integrated voting system technologies
Kexin Zhang
Author Affiliations +
Proceedings Volume 13077, Fourth International Conference on Signal Processing and Machine Learning (CONF-SPML 2024); 1307705 (2024) https://doi.org/10.1117/12.3027111
Event: 4th International Conference on Signal Processing and Machine Learning (CONF-SPML 2024), 2024, Chicago, IL, United States
Abstract
Blockchain stands as a paramount research focus in the current technological landscape. While significant progress has been observed in digital currencies such as Bitcoin and Ethereum, a notable research void persists concerning voting systems. This manuscript underscores the merits of blockchain-based voting mechanisms. Embracing blockchain technology can bolster the authenticity and transparency of electoral outcomes, tackle the intricacies of identity verification, and thwart malicious incursions or unauthorized alterations of results. Utilizing the Solidity programming language, a smart contract is crafted to orchestrate a fundamental voting paradigm. The article delineates the logical architecture underpinning this smart contract. A synthesis of existing literature discerns the quintessential functions vital for a robust voting system. In a detailed exposition, the testing procedures for various functionalities of this smart contract are unveiled. To conclude, the discourse suggests a compendium of supplementary features that, when integrated, could enhance the practicality and efficacy of the smart contract in future iterations.
(2024) Published by SPIE. Downloading of the abstract is permitted for personal use only.
Kexin Zhang "Exploring blockchain-integrated voting system technologies", Proc. SPIE 13077, Fourth International Conference on Signal Processing and Machine Learning (CONF-SPML 2024), 1307705 (1 April 2024); https://doi.org/10.1117/12.3027111
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Blockchain

Computer security

Transparency

Data backup

Design

Detection and tracking algorithms

Computer programming languages

Back to Top