How P2P E-Voting fixes E-Voting - I
Voting Without the Middleman

The "What" and "Why": Voting Without the Middleman
Imagine if the act of voting didn’t require sweating and waiting in a school ground or, conversely, placing blind faith in a single, opaque government server vulnerable to a motivated teenager in a basement. We stand at the precipice of a profound paradigm shift: the advent of Peer-to-Peer (P2P) E-Voting.
The Old Way: Traditional electronic voting relies on centralized electoral architectures. A single authority manages the tallying process on a central server. This represents a glaring single point of failure; if the server crashes, experiences hardware failure, or is quietly manipulated, the entire democratic exercise is compromised. We are asked to trust the institution implicitly.
The P2P Way: Decentralization removes the "boss" server entirely. Instead, distributed ledger technology (DLT) allows a network of participating computers (nodes) to collectively manage the tally. Utilizing cryptographic hashing—specifically algorithms like SHA-256—each block of votes is immutably linked. To alter a single ballot, a bad actor would have to computationally recalculate the entire chain, a feat of near impossibility.
Why care? At its core, this is a philosophical pivot from trusting inherently flawed human institutions to trusting the cold, verifiable certainty of math. Through advanced cryptography, we are achieving what once seemed paradoxical. Zero-Knowledge Proofs (ZKP) allow a system to mathematically prove your vote is valid without ever revealing who you picked. Meanwhile, Homomorphic Encryption enables the network to tally encrypted votes without ever needing to decrypt the individual ballots. It is the mechanics of a secret ballot, perfectly preserved in a public square of code.
A Blast from the Past: From Punch Cards to Pixels
To understand the gravity of decentralized voting, we must look at the fraught history of capturing the democratic voice. We have spent decades searching for fidelity in the vote.
The 1960s & 70s: This era introduced computer-aided counting, defined by IBM’s Votomatic punched-card systems and early Direct-Recording Electronic (DRE) machines. They were, essentially, proprietary "black boxes"—glorified calculators governed by closed-source software with no physical audit trail. The electorate was forced to simply trust the machine's final printout.
The 90s & 00s: The internet arrived, and with it, remote convenience. Estonia pioneered "I-Voting," allowing citizens to vote from their couches. Yet, this convenience masked a critical vulnerability: the systems remained deeply centralized. Government-managed servers became high-value targets for state-sponsored cyberattacks. It was a step forward in accessibility, but a lateral move in systemic security.
2008 – Today: The true conceptual breakthrough arrived not from political scientists, but from cypherpunks. The 2008 Bitcoin whitepaper introduced a decentralized solution to the "double-spending" problem of digital currency. Cryptographers soon realized that solving "double-spending" inherently solves "double-voting." With the launch of Ethereum in 2015, Smart Contracts allowed for automated, complex electoral rules. Today, we are moving past mere theory into municipal trials with platforms like VoteChain, Agora, and Horizon State. While blockchains themselves may not be the perfect foundational technology for e-voting, they have increased developer interests and mindshare in peer to peer and distributed systems. Voting in particular is vastly different from a financial transaction ledger system and is thus better a better fit for DHTs than DLTs.
The Great Debate: The Geeks vs. The Skeptics
As with any systemic upheaval, the transition to P2P voting has drawn battle lines. In one corner stand the Technological Optimists, and in the other, the Security Suits.
The Geeks (Cryptographers): Technologists advocate for a future of "universal verifiability." They argue that a public bulletin board model provides a superior trust matrix, rendering the need to trust vendors or government officials obsolete. They envision a "Smartphone Democracy," leveraging tools like the European Digital Identity (EUDI) Wallet, where exercising one's civic duty is as secure, transparent, and seamless as ordering a pizza.
The Skeptics (FBI/CISA/NIST): Intelligence and security agencies offer a sobering counter-narrative. Their primary concern is the "Unsupervised Endpoint Problem." It matters little if a p2p mesh or blockchain is mathematically unhackable if the voter's device is fundamentally compromised. If a smartphone is crawling with malware that alters the vote before it is ever encrypted and transmitted to the P2P network, the DLT or DHT simply acts as an immutable ledger of a stolen choice.
The Messy Bits: Glitches in the Matrix
Decentralizing democracy is not without its deep, sometimes paradoxical, complexities. When we remove the central authority, we introduce entirely new vulnerabilities that challenge the very nature of identity and free will.
The Sybil Attack: In a truly open P2P network, what stops a single tech-savvy bad actor from generating 10,000 digital identities and voting 10,000 times? Solving this requires "bootstrapping" the decentralized network with centralized biometric or digital IDs—such as India’s Aadhaar or the EU's EUDI. This creates an ideological friction: relying on centralized state surveillance to enable decentralized state elections.
The Verifiability Paradox: The genius of the blockchain is transparency, but in voting, too much transparency is toxic. If a voter can mathematically prove to themselves that their vote was counted, they can also prove it to an employer or a bad actor offering $50 for their ballot. To combat this risk of coercion and vote-buying, protocols like Secure Internet Voting (SIV) are exploring "Verifiable Private Overrides." This allows a coerced voter to cast a "fake" vote to satisfy their coercer, and later securely override it in private. Yet, this introduces a labyrinthine technical complexity that the average citizen may struggle to comprehend, let alone trust. VoteTorrent has a better approach to solving this partially because it does not use blockchain in the first place and because it has permissioned, consent-based and policy-based data access. We will discuss more about it in the next part of this series.
The Digital Divide: If the future of democracy requires modern hardware capable of heavy cryptographic processing and high-speed internet, do we inadvertently disenfranchise those without access? We risk filtering the democratic conversation through the sieve of socioeconomic status.
Coming Soon to a Phone Near You: The Future of the Vote
Despite the philosophical and technical hurdles, the roadmap for P2P e-voting is accelerating toward a serverless, mobile-first infrastructure.
Mobile-First Trials: Theoretical frameworks are giving way to high-stakes, binding reality. In 2025 and 2026, major trials are slated to test mobile-based P2P voting for expatriates in the Philippines. Furthermore, decentralized architectures are being actively researched for regional elections in places like Palestine, where trust in a central, localized authority is historically fraught.
The "TrustChain" Protocol: To solve the hardware constraints of mobile voting, researchers at TU Delft are developing the TrustChain protocol, alongside efforts like the Open Vote Network (OV-net) which explores self-tallying systems for smaller organizations. These frameworks are designed to be lightweight, allowing smartphones to participate in the network consensus without melting the device's battery.
The Hybrid Future: The ultimate destination may not be a purely digital utopia, but a grounded synthesis of the physical and the virtual. In the United States, the Election Assistance Commission is evaluating End-to-End (E2E) Verifiable protocols under the VVSG 2.0 guidelines. This points toward a hybrid reality: physical paper ballots to satisfy traditional security demands, inextricably backed by a digital, P2P cryptographic audit trail to ensure universal verifiability.
Democracy is, by its nature, an ongoing experiment. As we upgrade its underlying architecture, the ride will inevitably be bumpy, fraught with ethical debates and technological growing pains. But in a future governed by cryptographic truth rather than blind institutional faith, we may finally stop worrying about losing the keys to the ballot box. After all, in a decentralized world, the box belongs to everyone.





