Implementing Blockchain-Based Traceable Certiﬁcates as Sustainable Technology in Democratic Elections

: A democratic election is a crucial event in any country. Therefore, the government of the country is concerned with creating more competitive and fairer elections. This paper discusses the survey and scope of Blockchain technology adoptions in conducting elections. A distributed digital ledger is used in the Blockchain technology that is utilized for recording transactions happening between two parties. Ledger conducts this processing in an efﬁcient and effective manner with latest secure mechanism of encryption algorithms. Therefore, the data stored in several blocks in each transaction is secure, transparent, and tamper-proof, which ultimately improves the transparency and voter conﬁdentiality. This paper demonstrates how the beneﬁts of the Blockchain technology such as immutability, transparency and end-to-end veriﬁability can be utilized by the national governments around the world to ensure fair democratic elections. In short, we aim to present a rigorous mechanism of a Blockchain based e-voting system, its efﬁciency based on different consensus algorithms and the overall progress and analysis based on some critical parameters to anticipate the feasibility of the successful implementation of the proposed e-voting system.


Introduction
The most common means of vote casting is through ballot papers. This method has been widely criticized because of fraudulent voting and booth capturing witnessed across various countries worldwide. Thus, manually casting the vote has been replaced with electronic machines to record the vote for individual citizens of the country. The machines saved paper costs and reduced time and replaced the manual exercise involved in conventional counting and resulted in dumping of fake votes. Such voting machines introduced more transparency and verifiability to its voters [1].
Even after all these replacements, several concerns still remain for voters. The Distributed Ledger Technology (DLT) can be combined with such voting machines to make the electoral process more robust and error-free. DLT is secured and immutable through the use of complex encryption algorithms. In simple terms, Blockchain is defined as a distributed database whose copy is issued to everyone involved in the transaction process [2]. One can add records in the database but cannot alter them. Therefore, data stored inside the Blockchain is secure, transparent, and tamper-proof.
A distributed digital ledger is used in Blockchain technology that is utilised for recording transactions happening between two parties. This task is achieved by the ledger in a very efficient manner. In creating chain of blocks, each block comprises of data and its associated hash value of previously created block in such a chain [3]. The data stored inside such blocks may depend on the type of Blockchain, especially its version. "Hash" is the second element that is always unique, very similar to a human fingerprint that can be identified amongst trillions of hands. Hash is calculated just after the creation of a block and the Hash identifies the block along with its contents. Any manipulations in the block will automatically cause changes in its associated hash value [4]. Thus, the role of hash is very significant in identification of any block, if it is modified. This gives unique characteristic for Blockchain, and each block is linked or chained in sequence to one another. The first block is an initial block, and thus it does not have any hash value and is also known as the genesis block. When anyone tries to modify or alter the data in any block, the hash value associated with the blocks also gets modified which helps in identification of such block and make it as "invalid". This scenario makes a chain of blocks as more secure and immutable.
The conceptualization of Blockchain Technology is creating a number of records, namely blocks, that hold data and its associated generated hash value (always unique). It creates a distributed ledger that keeps a record of all data for every transaction [5]. Three major pillars of the Blockchain are immutability, decentralized and transparency. Such a technique is also known as Distributed Ledger Technology (DLT) as demonstrated in Figure 1.
inside such blocks may depend on the type of Blockchain, especially its version. "Ha is the second element that is always unique, very similar to a human fingerprint that be identified amongst trillions of hands. Hash is calculated just after the creation of a bl and the Hash identifies the block along with its contents. Any manipulations in the bl will automatically cause changes in its associated hash value [4]. Thus, the role of has very significant in identification of any block, if it is modified. This gives unique cha teristic for Blockchain, and each block is linked or chained in sequence to one another. first block is an initial block, and thus it does not have any hash value and is also kno as the genesis block. When anyone tries to modify or alter the data in any block, the h value associated with the blocks also gets modified which helps in identification of s block and make it as "invalid". This scenario makes a chain of blocks as more secure a immutable.
The conceptualization of Blockchain Technology is creating a number of recor namely blocks, that hold data and its associated generated hash value (always unique creates a distributed ledger that keeps a record of all data for every transaction [5]. Th major pillars of the Blockchain are immutability, decentralized and transparency. Suc technique is also known as Distributed Ledger Technology (DLT) as demonstrated in F ure 1.

Decentralization
The need of the decentralized system can only be understood when we are aw about the vulnerabilities of a centralized system that is used in a traditional fund tran system. Banks and client-server model are examples of the centralized system in wh bank as a central authority controls the entire transaction process [6].
To address such limitations, the idea of a decentralized system is introduced in wh data has been utilized to store, record and synchronize transactions at different nodes decentralization, every node can make transaction associated with the data. Blockch Technology has been established with the aid of distributed networks, digital signat and encryption/decryption techniques from the security domain. A decentralized syst uses peer-to-peer (P2P) networks in which every node can own the copy of the comp data in the chain of blocks [7].  The need of the decentralized system can only be understood when we are aware about the vulnerabilities of a centralized system that is used in a traditional fund transfer system. Banks and client-server model are examples of the centralized system in which bank as a central authority controls the entire transaction process [6].
To address such limitations, the idea of a decentralized system is introduced in which data has been utilized to store, record and synchronize transactions at different nodes. In decentralization, every node can make transaction associated with the data. Blockchain Technology has been established with the aid of distributed networks, digital signature and encryption/decryption techniques from the security domain. A decentralized system uses peer-to-peer (P2P) networks in which every node can own the copy of the complete data in the chain of blocks [7]. Generally, Blockchain transactions are not encrypted. Current block stores the hash of the previous block. The encryption technique is used in Blockchain which ultimately secures the data. Thus, this characteristic enables Blockchain technology to maintain transparency and privacy in the entire network nodes of peer connection. The identity of an individual node is kept hidden through the use of complex cryptographic unique alphanumeric characters and usually symbolized only by its public identifier/address [8].

Immutability
This term is used to depict something that has entered into the chain of blocks and can never be modified or altered in anyway. Even though the data can be added to the chain, but already existing blocks of data cannot be altered. Due to cryptographic hash function, such property is exhibited by Blockchain Technology. Moreover, hashing is a methodology or technique in which the input data length is a variable quantity whereas the output length is fixed [9].

Role of Blockchain in Overall Governance
Blockchain can not only be utilized in elections but can also be used to improve overall governance by incorporating it in property registry systems [10], public sector banking [11], healthcare [12] and building smart cities [13]. All the sectors which are prone to cybercrimes can be made secure with the help of Blockchain. Thus, the novelty of the proposed research lies in developing theoretical approach for sustainable development of the society on the basis of the Blockchain-based Traceable Certificates. The major benefits of Blockchain adoption specifically into an e-Election can be listed below [14]:

•
The first benefit that Blockchain can bring about is transparency. Decentralized ledger of Blockchain records result-in accuracy and safety thus ensuring trust at every stage of the voting process; • Immutable public ledger enables the tracking and counting of votes while being visible to everyone. This feature of Blockchain provides legitimacy of the voting; • Blockchain and its distributed ledger provides an unhackable system as there is no involvement of fallible or corruptible central body; • Blockchain allows for anonymity during voting by providing private keys to the voters. These applications of such private keys keep the votes polled by the voters anonymous; • Processing time is reduced in Blockchain because results can be gathered and processed quickly soon after the completion of the voting phase.

• Blockchain as an Ultimate Solution for Securing Elections
This idea of Blockchain in conducting secure election has previously been implemented by companies such as Agora and Polys but the former was not able to justify its presence and had a controversy with the Sierra Leone government while the latter never achieved scalability in any state election. There have been several challenges which need to be kept in mind while designing system for e-Election conduction [14,15] Several noteworthy attempts have been made recently, but none of them have achieved the scalability which is required for Blockchain based voting to be successful as depicted in Table 1 [16,17]. Due to the presence of the above-mentioned properties and after looking at the frauds that occurred in digital electoral systems as discussed in Table 2, it is recommended that the Blockchain technology is used in Electronic Voting Machines to make them more intelligent and secure [18,19]. The perception associated with the casting of a vote by authorized voters can be visualized in Figure 2, that justifies the usage of Blockchain technology in such a system [20,21]. When a fraud voter penetrates the system through fake credentials it can immediately be reported at the zonal office by authorities. Such malicious activities can easily be determined through Blockchain technology [22]. The first block called genesis block is created with legitimate data associated with transaction identity, source/destination address, voter/candidate details, etc.

Material & Methods
Before studying the working of Blockchain technology in electronic voting, it is important to know the vulnerabilities in today's election in detail. Several parameters may influence any e-voting processes that are as follows [23,24]: Hacked voter registration databases: Cyber-attack on voter's registration database can also threaten people's ability to vote. A registration database consists of information such as voter's name, phone number, address, etc. Such information is known as Personally Identifiable Information (PII). Hackers can exploit the stored information by selling it on the dark web and use it to target potential voters with disinformation and to gain benefits.
Hacked voting hardware: Any type of electronic device or software used in the machine is subject to cyber-attacks. Results stored in these devices can be vulnerable to hacking. Hackers need only one single point to breach an entire model of the voting machine. Attackers may also inject malware into machines developed by reputed companies to cause a dangerous effect on the votes of millions of voters [25,26].
Compromised election reporting systems: Reporting systems could be manipulated to announce false results. If automated data streams are used to inform the results to news organizations, then attackers may manipulate data streams and trick news organizations to announce the wrong winner. In this context, highly realistic fake videos can be created announcing bogus winners using Generative Adversarial Networks (GANs). It is a type of Neural Network used to carry out unsupervised learning. GANs can be utilized by attackers to fabricate audio, video, and image content, which seem realistic and plausible.
Post-election audits: The procedure used to count the votes and the equipment are checked for their correctness. If any bug or error is found during the audit, election officials are informed, and they can act as a deterrent against fraud. However, experts believe that voting machines that only record votes electronically are not suitable for ensuring election integrity.

Material & Methods
Before studying the working of Blockchain technology in electronic voting, it is important to know the vulnerabilities in today's election in detail. Several parameters may influence any e-voting processes that are as follows [23,24]: Hacked voter registration databases: Cyber-attack on voter's registration database can also threaten people's ability to vote. A registration database consists of information such as voter's name, phone number, address, etc. Such information is known as Personally Identifiable Information (PII). Hackers can exploit the stored information by selling it on the dark web and use it to target potential voters with disinformation and to gain benefits.
Hacked voting hardware: Any type of electronic device or software used in the machine is subject to cyber-attacks. Results stored in these devices can be vulnerable to hacking. Hackers need only one single point to breach an entire model of the voting machine. Attackers may also inject malware into machines developed by reputed companies to cause a dangerous effect on the votes of millions of voters [25,26].
Compromised election reporting systems: Reporting systems could be manipulated to announce false results. If automated data streams are used to inform the results to news organizations, then attackers may manipulate data streams and trick news organizations to announce the wrong winner. In this context, highly realistic fake videos can be created announcing bogus winners using Generative Adversarial Networks (GANs). It is a type of Neural Network used to carry out unsupervised learning. GANs can be utilized by attackers to fabricate audio, video, and image content, which seem realistic and plausible.
Post-election audits: The procedure used to count the votes and the equipment are checked for their correctness. If any bug or error is found during the audit, election officials are informed, and they can act as a deterrent against fraud. However, experts believe that voting machines that only record votes electronically are not suitable for ensuring election integrity. A glimpse of Election Security: There are three stages in an election process: preelection, election, and post-election. There are several steps that are followed in an election process, as shown in Figure 3. The process also contains several vulnerabilities which need to be identified to prevent future attacks.
to be identified to prevent future attacks.
Step. 1 Voter forms a political opinion; Step. 2 Disinformation campaign against the voter; Step. 3 Voter enters their name in a voter registration database; Step. 4 Hackers attack the voter registration database and alter the records; Step. 5 Voter is unable to find their record because of altered voter record; Step. 6 If a voter casts a vote, their vote could be changed by a hacked voting machine; Step. 7 Voter's vote could be miscounted due to tampering caused in the machine; Step. 8 A winner is declared; Step. 9 Reporting systems are compromised to spread alternative results; Step. 10 Mismatch in the results causes dispute over election's integrity which prompts a post-election audit that can be vulnerable to inaccuracies. Steps shown in Figure 3 as highlighted into red color rectangular depicts the vulnerabilities and possible breach into security [27].

Consensus Protocol for a Common Understanding in Generating Certificates
There is a need for a common point of understanding in a decentralized consensus mechanism. This can be termed as Proof of Work (PoW) in which a certain procedure is used to validate the transaction in a given peer-network and creates a new block for consortium Blockchain [28,29]. Consensus is a kind of agreement that must be taken up by Sept.1 Voter forms a political opinion; Sept.2 Disinformation campaign against the voter; Sept.3 Voter enters their name in a voter registration database; Sept.4 Hackers attack the voter registration database and alter the records; Sept.5 Voter is unable to find their record because of altered voter record; Sept.6 If a voter casts a vote, their vote could be changed by a hacked voting machine; Sept.7 Voter's vote could be miscounted due to tampering caused in the machine; Sept.8 A winner is declared; Sept.9 Reporting systems are compromised to spread alternative results; Sept.10 Mismatch in the results causes dispute over election's integrity which prompts a post-election audit that can be vulnerable to inaccuracies.
Steps shown in Figure 3 as highlighted into red color rectangular depicts the vulnerabilities and possible breach into security [27].

Consensus Protocol for a Common Understanding in Generating Certificates
There is a need for a common point of understanding in a decentralized consensus mechanism. This can be termed as Proof of Work (PoW) in which a certain procedure is used to validate the transaction in a given peer-network and creates a new block for consortium Blockchain [28,29]. Consensus is a kind of agreement that must be taken up by each participating node in consortium. There can be major algorithms for consensus protocol for different features as depicted in Table 3.

Algorithms for Voting & Publishing Schemes
During the processing of each block after the casting of the vote by the authorized voter using Blockchain based election, the data associated with the elected candidate and voter itself is stored within the block. Such block is published and attached to the next block that creates a chain in series [30,31]. The smart contract is created by the chief election commissioner (administrator) in respective blocks.
If a voter wishes to REGISTER for casting their vote, then the voter must ensure to SETUP for predefined system software possessed by Chief Election Commissioner ed authority) [32]. The voter should use CREDENTIALS to cast their vote through e-ballot. This can be recorded with a digital signature with mentioned VALIDITY. The job of a legitimate voter is specified in Algorithm 1.

Algorithm 1: Voting Scheme for individual voters
Voting Scheme for individual voters Initially, SETUP the device as per the requirement of system software If the Voter is not REGISTERED then Use CREDENTIALS to REGISTER with verification Cast a Vote with DIGITAL SIGNATURE VALIDITY of the e-ballot for particular session END After casting a vote by the authorized voter, it is the duty of the election commissioner (administrator) to PUBLISH the vote [33]. This should be verified first by VALIDATE and then APPEND it to the next block in the series. This process is depicted in Algorithm 2.

Algorithm 2: Publish Scheme for Vote by Election Commissioner
Publish Scheme for Vote by Election Commissioner Firstly, CHECK the VALIDITY for the e-ballot If VALIDITY is FALSE then e-ballot can be CANCELLED Otherwise, e-ballot can be PUBLISHED and APPENDED to the next block

Blockchain as the Solution to Vulnerabilities
Let us understand how Blockchain affects the voting process as shown in Figure 4 [34,35].

Use of Blockchain in Electronic Voting for Certificates
Indian electoral arrangements currently utilize the EVM (Electronic Voting Machine), wherein the person casting his vote presses a button corresponding to the candidate they wish to vote. However, there have been recent modifications after the emergence of VVPAT (Voter Verified Paper Audit Trail) through which the voter can also verify whether his vote has been received by the candidate to whom he has casted his vote to • Cryptographic Media Verification: Cryptographic techniques would help to determine the trusted and accountable sources of information. Voters would only consume the information that is stamped with a unique cryptographic identifier. In this work, the practice of "Cryptographic media verification" is based on previous existing unique cryptographic identifier created by authorized persons (in the government).

•
Mobile Apps for Blockchain Voting: Voting through mobile apps would increase voter's participation in an election process and adding Blockchain to the application would help in securing mobile internet voting. • Digital Identity and Blockchain Voting: Biometric identity such as iris and face data has been used to match a voter's identity with his/her identity stored in the voter's registration database at the time of his or her registration. This technique has been adopted to verify the identity of the person.

•
Post-Election Audit on the Blockchain: Each voter would be allowed to examine each ballot to confirm the accuracy of the counted votes without revealing his or her identity.

Use of Blockchain in Electronic Voting for Certificates
Indian electoral arrangements currently utilize the EVM (Electronic Voting Machine), wherein the person casting his vote presses a button corresponding to the candidate they wish to vote. However, there have been recent modifications after the emergence of VVPAT (Voter Verified Paper Audit Trail) through which the voter can also verify whether his vote has been received by the candidate to whom he has casted his vote to [36]. The addition of VVPAT to EVM has simplified the process but added some serious issues regarding security. To remove these bottlenecks, Blockchain would prove to be an effective solution. Once Blockchain is induced in this electoral process, the threats of booth capturing would no longer exist, and the results would be full of trust [37].
To reform the electoral process in the biggest democracy is not easy, but in the long run it would be beneficial. To begin with, the Chief Election Commission of India should devise a Blockchain-based electronic voting system. All eligible voters must be allowed to vote only after their biometric verification is successful. Once verified, voters must select the candidate to whom they want to vote for, and this vote would be converted to a block [38]. This block will then be verified and will contain all the information necessary such as the candidate who received the vote, identity of the voter (into hidden format such as ****), timestamp, etc. This would then become an indispensable part of the Blockchain. Similarly, all the voters would then follow the same process and create such blocks. The duty of the Chief Election Commission would then be to verify the identity and display it for everyone to see. Since blocks are connected via the hash of the previous block, changing any one block would lead to tampering of the complete information which is not possible.
The process of casting vote and counting the votes of a particular candidate into peer of network, there must be a set of specific functions (RANGE) as mentioned in Algorithm 3. These functions can rely on a particular smart contract generated between e-voter and the corresponding candidate as discusses in Algorithm 3.

Case Study: Indian Electoral System
India has a vibrant electoral democracy governed by the Constitution of India through which fundamental rights and the country's citizen duties can be configured. Such elections are conducted by distinct roles from the election commission of India [38]. As such conducting elections in India is a tedious and cumbersome process because the country holds the position of the world's most populated democracy. Indian states have been subjected to allegations from various political and non-political organizations regarding malfunctioning of the currently used system for elections i.e., VVPAT (Voter Verified Paper Audit Trail) and EVM (Electronic Voting Machine) [39,40].
These systems have been upgraded and made better than the ballot paper system to reduce paper wastage and time; however, it has also brought some severe issues with it such as being prone to electronic faults, hacking, etc [41,42]. Moreover, transportation of these machines from a central control unit to polling stations has led to wear and tear. Thus, to avoid all these added issues security personnel trained Election Commission officials, etc. are appointed to take care of the machine. However, with the emergence of Blockchain technology, expenditure on such avoidable factors would decline. This will improve the overall governance and the electoral process of the country. The Indian government spent about 3426 crore INR for conducting elections in 2014 [43] which witnessed a 131% rise in the costs as compared to the 2009 elections. For any voting system, there can be a number of parameters that need to be considered while designing an automated, secure and trusted e-voting system [44]. Firstly, it should majorly focus on events such as register (create), poll, validity, verify and publish. This can be well-conceptualized from three-point of views, i.e., voter's view, candidate's view and chief election commissioner's view as depicted in Figure 5 [45].

Results & Discussions
Decentralization with security and privacy-preserving features can be of primordial importance for its application in activities of mass participation as a general election [46,47]. The statistical analysis of different parameters of any public Blockchain should be considered in order to facilitate the process more efficiently. One of the key challenges

Results & Discussions
Decentralization with security and privacy-preserving features can be of primordial importance for its application in activities of mass participation as a general election [46,47]. The statistical analysis of different parameters of any public Blockchain should be considered in order to facilitate the process more efficiently. One of the key challenges which is ubiquitous to such public Blockchain is the cost of deployment. However, in this case the principal aim is to achieve optimized security and reliability. In Ethereum Blockchain, all the programmable transactions require some charges for ensuring safety in the networks and to overcome computational challenges. All operations such as computations, smart contract deployment and storage on the EVM require fees to complete the tasks. In our case with some initial fluctuations, we have observed throughout consistency in the chain length and the transaction energy dissipation. However, the charges are expected to increase with the deployment of more complex smart contracts, which in turn would result in making the entire process comparatively expensive, as shown in Figure 6. Block time is the length of time it takes to create a new block in a Blockchain. In an election process block time could be one of the decisive factors for the successful implementation and adoption of such a system. We have observed that the block time is expected to increase exponentially with the chain length by measuring it at an interval of one block, as shown in Figure 7. One of the main factors which influences the block time is the difficulty level of the network. In Ethereum homestead released Blockchain the level of difficulty is calculated using the following procedure: where//denotes integer division and 2** denotes the two to the power operation. The int function returns the largest integer less than or equal to a given number: Block time is the length of time it takes to create a new block in a Blockchain. In an election process block time could be one of the decisive factors for the successful implementation and adoption of such a system. We have observed that the block time is expected to increase exponentially with the chain length by measuring it at an interval of one block, as shown in Figure 7. One of the main factors which influences the block time is the difficulty level of the network. In Ethereum homestead released Blockchain the level of difficulty is calculated using the following procedure: where//denotes integer division and 2** denotes the two to the power operation. The int function returns the largest integer less than or equal to a given number: The proposed mechanism can be deployed to any other Blockchain with lower gas fees to make the process more cost effective, provided it is open-source, reliable and meets the protocol and security standards for the execution of a general election. We have also made an attempt to estimate the variation of throughput (transactions per second, tps) and average latency of the Blockchain with the send rate (tps). Transaction throughput may be defined as the measure of how fast a Blockchain can process a particular transaction. Blockchain network latency is the time between submitting a transaction to a network and the first confirmation of acceptance by the network. An analysis of such parameters can be a decisive factor, particularly when the chain length is very large. In our case we have found a strong correlation in the variation of throughput and average latency with the send rate (tps) of the chain. We evaluated the performance of the system over different transaction sending rates (10-130 tps). Although the average latency showed a steady increase with the increase in the transaction send rate, the throughput increased till the transaction send rate increased to 100 tps and then the growth rate slowed down, as shown in Figure 8. So, the analysis of the system over the aforementioned parameters reveals that adoption of decentralization for an event of mass participation such as an election process is a viable option. As from the point of feasibility of cost, it is clear that although the process The proposed mechanism can be deployed to any other Blockchain with lower gas fees to make the process more cost effective, provided it is open-source, reliable and meets the protocol and security standards for the execution of a general election. We have also made an attempt to estimate the variation of throughput (transactions per second, tps) and average latency of the Blockchain with the send rate (tps). Transaction throughput may be defined as the measure of how fast a Blockchain can process a particular transaction. Blockchain network latency is the time between submitting a transaction to a network and the first confirmation of acceptance by the network. An analysis of such parameters can be a decisive factor, particularly when the chain length is very large. In our case we have found a strong correlation in the variation of throughput and average latency with the send rate (tps) of the chain. We evaluated the performance of the system over different transaction sending rates (10-130 tps). Although the average latency showed a steady increase with the increase in the transaction send rate, the throughput increased till the transaction send rate increased to 100 tps and then the growth rate slowed down, as shown in Figure 8. The proposed mechanism can be deployed to any other Blockchain with lower gas fees to make the process more cost effective, provided it is open-source, reliable and meets the protocol and security standards for the execution of a general election. We have also made an attempt to estimate the variation of throughput (transactions per second, tps) and average latency of the Blockchain with the send rate (tps). Transaction throughput may be defined as the measure of how fast a Blockchain can process a particular transaction. Blockchain network latency is the time between submitting a transaction to a network and the first confirmation of acceptance by the network. An analysis of such parameters can be a decisive factor, particularly when the chain length is very large. In our case we have found a strong correlation in the variation of throughput and average latency with the send rate (tps) of the chain. We evaluated the performance of the system over different transaction sending rates (10-130 tps). Although the average latency showed a steady increase with the increase in the transaction send rate, the throughput increased till the transaction send rate increased to 100 tps and then the growth rate slowed down, as shown in Figure 8. So, the analysis of the system over the aforementioned parameters reveals that adoption of decentralization for an event of mass participation such as an election process is a viable option. As from the point of feasibility of cost, it is clear that although the process So, the analysis of the system over the aforementioned parameters reveals that adoption of decentralization for an event of mass participation such as an election process is a viable option. As from the point of feasibility of cost, it is clear that although the process has dependency on gas fees, the cost is economical and governments and organizations would find it affordable. Overall, the system performed as per our expectations. The accuracy over varying transaction send rates (tps) over the network has been found to be considerably better in comparison to the existing centralized voting system, as shown in Figure 9. The analysis shows strong correlation with the desired outcomes in terms of cost and security, and we conclude that the adoption of Blockchain based traceable certificates in democratic elections would ensure transparency, confidentiality and security of the process. has dependency on gas fees, the cost is economical and governments and organizations would find it affordable. Overall, the system performed as per our expectations. The accuracy over varying transaction send rates (tps) over the network has been found to be considerably better in comparison to the existing centralized voting system, as shown in Figure 9. The analysis shows strong correlation with the desired outcomes in terms of cost and security, and we conclude that the adoption of Blockchain based traceable certificates in democratic elections would ensure transparency, confidentiality and security of the process.

Analyzing the Feasibility of Proposed Mechanism for Achieving ESG-Goals in the Context of a Democratic Society
The proposed mechanism is dependent on factors such as the block processing time (for syncing with other nodes) and transactions processing time of the network used. The following chart represents the gas used for the network transactions in the proposed system. A and V represents the operations dependent on the administrator and the voters, respectively. Table 4 discusses the parameters that affects the public blockchain networks over cost of development of the system. The total cost of implementing the system would be attained by adding the costs for deploying, maintaining and monitoring the system across public or enterprise blockchains. Asynchronous BFT However, the system can be made more efficient through the use of more low-cost networks. The possibility of the development of more energy efficient and scalable private networks and protocols in future would further enhance the feasibility of the usage of the system. Further, a second layer can be used on top of a main network with high gas cost

Analyzing the Feasibility of Proposed Mechanism for Achieving ESG-Goals in the Context of a Democratic Society
The proposed mechanism is dependent on factors such as the block processing time (for syncing with other nodes) and transactions processing time of the network used. The following chart represents the gas used for the network transactions in the proposed system. A and V represents the operations dependent on the administrator and the voters, respectively. Table 4 discusses the parameters that affects the public blockchain networks over cost of development of the system. The total cost of implementing the system would be attained by adding the costs for deploying, maintaining and monitoring the system across public or enterprise blockchains. networks and protocols in future would further enhance the feasibility of the usage of the system. Further, a second layer can be used on top of a main network with high gas cost networks, for faster response and low gas cost. Transaction verification mechanisms such as the Proof-of-Work consensus protocol require high processing power and hence are energy consuming which might negatively impact the climate change mitigation efforts since a considerable proportion of electricity is obtained from combustible fossil fuels worldwide [48][49][50].

Conclusions
This article presents the need for a secured voting system based on the Blockchain technology. Such a technology has a bright future and would capture the market in the coming years through its security features such as immutability, transparency, distributed nature and end-to-end connection through smart contracts. For events such as elections, voter's confidentiality and transparency are the major characteristics in a democratic country. To conduct such an election through online or digital means, Blockchain technology plays a vital and prominent role in securing this event. Our observations reveal that the implementation of the Blockchain technology in elections would not only be feasible but also will be very effective in terms of both cost and security. The government should ensure the choice of consensus algorithms, parameters such as block size, difficulty of the chain etc. based on the number of voters and available time. The smart contract is a legal event or action which would get automatically executed whenever it is intended to be included by its developers. Such contract binds the integrity of the voter with the created block and would then append it to the next processing block to form the sequence or chain which would be immutable. This guarantees confidentiality and transparency for voter's rights. Strong network connectivity and reliable hardware infrastructure and software services for mining, security, processing power and memory would be required to maintain the constant throughput in the Blockchain during the entire electoral process. There is a strong possibility of an exponential rise in block time with the increase in the difficulty of the chain if power consuming consensus algorithms such as Proof-ofwork are used. In this regard, it should be noted that the consensus algorithm goes towards achieving enhanced security, transparency and scalability. In 'Proof-of-work', the primary intention is to mine the coin whereas in 'Proof-of-stake', the intention is to validate the transaction. For more energy efficient mechanisms, such as the 'Proof-of-stake' can be also used, however, in case of 'Proof-of-stake' mechanism, inconsistencies in the governance issues remain such as excessive influence of validators with maximum holdings on transaction verification, possibilities of induced centralization in the process through double spending etc. Additionally, certain security challenges such as advanced spear phishing attacks on the voters by cybercriminals, threat of natural disasters which might bring in severe interruptions in the process, hardware vulnerabilities etc., continue to exist. We conclude that the proposed Blockchain based e-voting system would, however, be effective in achieving integrity and security in any democratic election around the world.
Our future work would comprise of a more comparative evaluation of the system over various private networks and thorough an analysis of performance through its implementation using different consensus algorithms. Based on our findings from this paper, we also aim to investigate the possibility of a dedicated Blockchain which would meet the criteria for the low consumption of energy and security standards to become more relevant for its implementation in a real national election.