Proof of the possibility for a public audit of a secret internet voting system

Keywords: secret Internet voting, open server block, audit of Internet voting


The aim of this study is to prove the possibility of building a system of secret Internet voting, in which a full-fledged audit is available to all voters and their proxies. A full-fledged audit should be understood as such an audit, in which everything that may be in doubt is checked. The open block of servers was created using Raspberry Pi 3 Model B type minicomputers, which are widely known and well-established. On the basis of an open block of servers, a full-scale model of the system for conducting experimental voting was created and a detailed methodology for a full-fledged audit was developed. This methodology provides for two stages of the audit. In the first stage, voters or their proxies must be present near the server unit. In the second stage, they continue the audit remotely through a dedicated server without losing information about the security of their data. For practical acquaintance with this research, the possibility of experimental voting is given. The experiment can be conducted by anyone at any time through a link on the Internet. Thus, it is shown that not only with traditional secret voting technologies, a full-fledged audit is possible, thanks to which voters have no doubts about maintaining the secrecy of their votes and the honesty of the results. To conduct a full-fledged audit according to the described methodology, it is not require to involve highly qualified specialists, but school education, which is mandatory in many countries, is quite enough. The importance of the results is that the lack of a full-fledged audit of Internet voting systems is the main factor hindering the development of e-democracy. The lack of public auditing of Internet voting systems causes distrust in the possibility of using the Internet to conduct fair elections


Download data is not yet available.

Author Biographies

Yurii Khlaponin, Kyiv National University of Construction and Architecture

Department of Cybersecurity and Computer Engineering

Volodymyr Vyshniakov, Kyiv National University of Construction and Architecture

Department of Cybersecurity and Computer Engineering

Oleh Komarnytskyi, Kyiv City State Administration

Department of Transport Infrastructure


Electronic Vote & Democracy. Available at:

Ajish, S., Anil Kumar, K. S. (2020). Secure I-Voting System with Modified Voting and Verification Protocol. Advances in Electrical and Computer Technologies, 189–200. doi:

Solvak, M. (2020). Does Vote Verification Work: Usage and Impact of Confidence Building Technology in Internet Voting. Lecture Notes in Computer Science, 213–228. doi:

Ernest, A., Hourt, N., Larimer, D. (2016). Pat. No. US20170109955A1. Blockchain Electronic Voting System and Method. Available at:

Ibrahim, M., Ravindran, K., Lee, H., Farooqui, O., Mahmoud, Q. H. (2021). ElectionBlock: An Electronic Voting System using Blockchain and Fingerprint Authentication. 2021 IEEE 18th International Conference on Software Architecture Companion (ICSA-C). doi:

Alvi, S. T., Uddin, M. N., Islam, L., Ahamed, S. (2020). From Conventional Voting to Blockchain Voting: Categorization of Different Voting Mechanisms. 2020 2nd International Conference on Sustainable Technologies for Industry 4.0 (STI). doi:

Fernandes, A., Garg, K., Agrawal, A., Bhatia, A. (2021). Decentralized Online Voting using Blockchain and Secret Contracts. 2021 International Conference on Information Networking (ICOIN). doi:

Schneier, B. (2020) Voatz Internet Voting App Is Insecure. Available at:

Recommendation CM/Rec(2017)5[1] of the Committee of Ministers to member States on standards for e-voting. Available at:

Khlaponin, Y., Vyshniakov, V., Ternavska, V., Selyukov, O., Komarnytskyi, O. (2021). Development of audit and data protection principles in electronic voting systems. Eastern-European Journal of Enterprise Technologies, 4 (2 (112)), 47–57. doi:

Vyshniakov, V. M., Pryhara, M. P., Voronin, O. V. (2014). Vidkryta systema taiemnoho holosuvannia. Upravlinnia rozvytkom skladnykh system, 20, 110–115. Available at:

Shannon, C. E. (1949). Communication Theory of Secrecy Systems. Bell System Technical Journal, 28 (4), 656–715. doi:

Chupryn, V., Vyshniakov, V., Prygara, M. (2016). Method of generation of casual numbers on the basis of the use of apparatus of the computer plugged in the Internet. Ukrainian Information Security Research Journal, 18 (4). doi:

Diffie, W., Hellman, M. (1976). New directions in cryptography. IEEE Transactions on Information Theory, 22 (6), 644–654. doi:

Vyshnyakov, V. M., Komarnitskiy, O. A. (2019). Transparentnye sistemy elektronnoy demokratii. Accent Graphics Communications & Publishing. Available at:

Proof of the possibility for a public audit of a secret internet voting system

👁 27
⬇ 39
How to Cite
Khlaponin, Y., Vyshniakov, V., & Komarnytskyi, O. (2023). Proof of the possibility for a public audit of a secret internet voting system. EUREKA: Physics and Engineering, (1), 189-200.
Computer Science