RSA Blind Signature sebagai dasar pengamanan pada sistem e-voting dengan Prinsip Frictionless User : studi desain dan tinjauan keamanan
DOI:
https://doi.org/10.62712/juktisi.v4i2.527Keywords:
E-voting, User-minimalized, Frictionless, Blind Digital Signature, RSA, KriptografiAbstract
Electronic voting (e-voting) systems have emerged as a critical research topic in the fields of information security and modern election technology. However, various studies have shown that e-voting systems still face several vulnerabilities, particularly in security aspects. One prominent weakness often highlighted is the direct involvement of voters in cryptographic technical processes, such as unblinding, which may lead to negligence and technical errors. This aligns with Bartjan Wattel’s assertion that "The real security challenge lies in protecting business processes from authorized users with malicious intent or who act carelessly" indicating that threats to security do not only originate from external intruders, but often from legitimate users with access rights. This study proposes a solution to minimize the voter’s technical involvement by implementing a Blind Digital Signature protocol based on the RSA algorithm, wherein the entire cryptographic process including blinding, signing, and unblinding is carried out by the system and authorized entities. The goal of the study is to develop an e-voting protocol that reduces voter participation in system security processes (frictionless), and to measure the security level of the implemented protocol. The results show that reducing the voter’s technical role in the cryptographic process enhances security and minimizes errors, as the blinding to unblinding stages are controlled by the system. Moreover, the protocol is modified to include digital signatures during access requests in inter-party communications, preventing forgery and ensuring that only authorized entities can participate in the system.
Downloads
References
G. Ikrissi and T. Mazri, “Electronic Voting: Review and Challenges,” Electronic Voting: Review and Challenges, Springer International Publishing, 2024, pp. 110–119. doi: 10.1007/978-3-031-53824-7_11.
P. Lohakare, “Online voting system,” Proceedings, 2024, pp. 646–649. doi: 10.69758/scel2919.
A. W. W. Hameed, “A Secure Electronic Voting,” IGI Global, 2011, pp. 431–449. doi: 10.4018/978-1-61520-789-3.CH032.
R. A. Cordery, M. J. Campagna, and B. Haas, “Electronic voting system and associated method,” U.S. Patent US20090032591A1, Jan. 29, 2009.
B. K. Hutasuhut, S. Efendi, dan Z. Situmorang, “Digital Signature untuk Menjaga Keaslian Data dengan Algoritma MD5 dan Algoritma RSA,” InfoTekJar: Jurnal Nasional Informatika dan Teknologi Jaringan, vol. 3, no. 2, pp. 101–109, Mar. 2019.
Z. Yan, Z. Jiang, dan Y. Li, “Towards Better Privacy-preserving Electronic Voting System,” arXiv preprint, arXiv:2205.12094, May 2022.
M. Kumar, S. Chand, dan C. P. Katti, “A Secure End-to-End Verifiable Internet-Voting System Using Identity-Based Blind Signature,” IEEE Systems Journal, vol. 14, no. 2, pp. 2032–2041, Jun. 2020. doi: 10.1109/JSYST.2019.2940474.
M. P. Heinl, S. Gölz, dan C. Bösch, “Remote Electronic Voting in Uncontrolled Environments: A Classifying Survey,” ACM Computing Surveys, vol. 55, no. 8, Art. no. 167, Dec. 2022. doi: 10.1145/3551386.
P. Rupa, R. Usha, R. Himaja, dan A. Kavya, “Secure and Transparent Voting using Blind Signatures,” International Journal of Scientific Research in Engineering and Management (IJSREM), vol. 9, no. 6, pp. 1–6, Jun. 2025.
M. H. Berenjestanaki, H. R. Barzegar, N. El Ioini, dan C. Pahl, “Blockchain-Based E-Voting Systems: A Technology Review,” Electronics, vol. 13, no. 1, Art. no. 17, Dec. 2023. doi: 10.3390/electronics13010017.
P. Kuppuswamy dan O. S. A. Al-Mushayt, “Implementation of e-Voting system using new blinding signature protocol,” IOSR Journal of Computer Engineering, vol. 8, no. 4, pp. 36–40, Jan.–Feb. 2013.
R. F. Olanrewaju, B. U. I. Khan, M. A. Morshidi, F. Anwar, and M. L. B. M. Kiah, “A frictionless and secure user authentication in web-based premium applications,” *IEEE Access*, vol. 9, pp. 129240–129255, 2021.
P. Chen, “Data Acquisition System based on Serial Port,” Journal of Theory and Practice of Engineering Science, vol. 4, no. 3, pp. 87–98, 2024. doi: 10.53469/jtpes.2024.04(03).09.
N. A. Nugraha, D. N. Fadilah, and S. Sutrisno, “Implementasi Manajemen Proyek Pembuatan Sistem Informasi Peminjaman Dokumen Perusahaan Dengan Metode Waterfall,” Industrika, vol. 8, no. 4, pp. 955–965, 2024. doi: 10.37090/indstrk.v8i4.1346.
B. H. Samudra and N. Umniati, “Penerapan metode waterfall dalam membangun aplikasi untuk pengujian jalur dan bangunan prasarana kereta api,” Jurnal Ilmiah Teknologi Dan Rekayasa (Edisi Elektronik), vol. 28, no. 1, pp. 30–43, 2023. doi: 10.35760/tr.2023.v28i1.4561.
M. R. Maulana, “Evaluasi metodologi waterfall dan agile: studi literatur pada sistem perpustakaan,” JITET: Jurnal Informatika Dan Teknik Elektro Terapan, vol. 13, no. 1, 2025. doi: 10.23960/jitet.v13i1.5900.
S. Sholichin, “Pengembangan dan Pengujian Aplikasi Pemesanan Makanan berbasis Website Menggunakan Metode Waterfall,” JCSE: Journal of Computer Science and Engineering, vol. 2, no. 1, pp. 40–50, 2021. doi: 10.36596/JCSE.V2I1.178.
M. B. Satria and H. Ardiansyah, “Analisis dan Perancangan Sistem Raport Digital Metode Waterfall,” Journal on Education, vol. 5, no. 2, pp. 5143–5151, 2023. doi: 10.31004/joe.v5i2.1253.
M. Syahid, N. Wahid, A. M. Najafi, A. Sihaj, R. Alik, A. Az, and Z. Irsani, “TECHNES: Penyedia Layanan Jasa Service Berbasis Aplikasi Android,” Indonesian Technology and Education Journal, vol. 1, no. 2, pp. 83–93, 2023. doi: 10.61255/itej.v1i2.180.
[12] A. Taufik, A. Christian, and T. Asra, “Perancangan Sistem Informasi Penjualan Peralatan Kesehatan Dengan Metode Waterfall,” Jurnal Teknik Komputer AMIK BSI, pp. 59–64, 2019.
N. H. Sari, “Penerapan Teknik Digital Signature Dalam Pengamanan Piagam Penghargaan Menggunakan Algoritma SHA-1 dan RSA,” Management of Information System Journal, vol. 2, no. 3, pp. 55–67, 2024.
A. Mursyidah, I. Aknuranda, and H. M. Az-Zahra, “Perancangan Antarmuka Pengguna Sistem Informasi Prosedur Pelayanan Umum Menggunakan Metode Design Thinking (Studi Kasus: Fakultas Ilmu Komputer Universitas Brawijaya),” Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer, vol. 3, no. 4, pp. 3931–3938, 2019.
E. V. Nugraha, R. Y. Ariyana, and E. K. Nurnawati, “Uji Black Box Tes Aplikasi Software Development System Information (SODEVI) PT. Dimata Sora Jayate Menggunakan Katalon Studio,” PROSIDING SNAST, pp. E60–E65, 2022.
F. Alwafi, “Analisis dan Implementasi Keamanan Jaringan pada PT. Dae Myung Highness Indonesia,” Penelitian Ilmu Komputer Sistem Embedded dan Logic, vol. 3, no. 1, pp. 1–10, 2015.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Ellsya Nabella Nur'allifa, Rizky Rahman Judie Putra, Muhamad Nursalman

This work is licensed under a Creative Commons Attribution 4.0 International License.
Ellsya Nabella Nur'allifa




