Journal of International Commercial Law and Technology
2026, Volume 7, Issue 1 : 768-774 doi: 10.61336/cmejgm/2026-01-78
Research Article
Voter Verification and Electoral Integrity in India's Special Intensive Revision of Electoral Rolls: Legal and Technological Challenges
 ,
1
Research Scholar DAVV University, Indore, Madhya Pradesh, India
2
Principal, Acropolis Institute of Law, Indore, Madhya Pradesh, India
Received
Feb. 3, 2026
Revised
Feb. 18, 2026
Accepted
Feb. 28, 2026
Published
March 10, 2026
Abstract

This Paper reviews the conflict between digitalization of voter registration via Special Intensive Revision procedure and needing everyone to participate in the elections process, as mandated by the Constitution. Although the Aadhaar-based authentication integration is expected to increase the reliability of demographic information, it also provokes very important issues about disenfranchising vulnerable groups and the possibility of an algorithmic bias. Also, the dependence on centralized digital identity infrastructure would require a stringent analysis of how administrative practice in these revisions can perpetuate the privileges of incumbents at the expense of equitable representation of marginalized people. Also, the crossover between blockchain encasement based confirmations measures and Aadhaar integration bring forward a paradox in which the quest of regarding a permanent electoral roll might lead to the erosion of voter privacy by developing exceptionally trackable yet secure digital personas. These systemic weaknesses must be addressed through a subtle inquiry into the nature of whether, in fact, decentralized ledger technologies should be efficient in addressing security risks without violating the granular privacy requirements inherent in judicial oversight. The current academic literature should thus balance the scalability constraints of distributed ledger with the enormous population size of the Indian electorate, in which transaction throughput has been an important technical constraint.

Keywords
INTRDUCTION

The Special the Intensive Revision of the electoral rolls is the main process by which an effective and up to date roll of eligible voters is maintained and is the most basic ledger of the democratic practice in India. Nonetheless, the current administrative system is putting excessive burden on manual authentication of demographic information, which is prone to mistakes and inconsistency when conducting identification exercises that are life-threatening. Such weakness is further aggravated by the fact that they rely on centralized registries, which in many cases do not have the cryptographic protection to combat voter impersonation and data manipulation To overcome these institutional weaknesses, new studies indicate that a more reliable infrastructure of verifying voter identity through decentralized, tamper-resistant systems, like a blockchain, would ensure a better solution to these failures and potential manipulation of records by unauthorized employees. However, it is not yet simple to balance these cryptographic security features against the reality of practical, universal imperatives, especially concerning the populations in areas that have limited digital infrastructure. In addition, it is relevant just as the change in the direction of a digitized verification regime requires a profound evaluation of the legal frameworks regulating data stewardship, especially when dealing with sensitive biometric credentials on such a massive level. In addition, the use of Aadhar-authentication, though purported to simplify administration identification, creates technical dependencies that can come into conflict with already existing end-to-end verifiable protocols that aim at maintaining voter anonymity. Here, the introduction of distributed ledger technology should concern the serious scalability bottlenecks, where conventional consensus-building solutions tend not to handle the volume of transaction needed to serve India with more than million voters. In addition to these technical limitations, the guaranteed tension between invariable data storing and the right to be forgotten makes the realization of blockchain-based verification challenging in the long term, which requires a legal framework to ensure electoral transparency and personal data sovereignty.

 

2. The Indian Electoral System and Electoral Rolls

The transformations of the Indian electoral process, being embedded in its constitutional development, display the unchanging tendency toward the compromise between the growth of universal suffrage and the management of voter databases. In spite of these supportive attempts, the electoral roll is one of the major places under manipulation with regular reports of administrative miscalculations, illegitimate disappearance of voters and the introduction of phantom or non-qualified names. Such inconsistencies are made worse by the fact that they rely on individual databases, which makes it difficult to cross match demographic data between regional and national systems of identity.

 

2.1. Overview of India's Electoral Framework

This subsection explains the constitutional provisions according to which the Election Commission of India is reared up to provide a healthy registry with a special focus on the interaction between the Representation of the People Act and the contemporary technological driver of modernization. The main elements of these modernization efforts include the implementation of Voter-Verifiable Paper Audit Trails that have been implemented to address any mistrust in the integrity of Electronic Voting Machines by actually giving them a physical representation of voter intent

 

Nevertheless, as the administrative changes move towards digital-only validation during the Special Intensive Revision, the importance of such physical trails is being challenged because of the demand to support end-to-end cryptographic verifiability. As a result, decentralized identity models have been suggested to reduce the degree of dependence on centralized authorities wherein the hypothetical number of attack vectors is reduced, which raises the general level of voter confidence.

 

2.2. Process of Electoral Roll Preparation and Revision

The existing established system is a multi-tiered enumeration process, which includes house-to-house surveys undertaken by Booth Level Officers who determine the existent records of the household to verify them and detect any irregularities and uncertainties around the same. In spite of these administrative developments, this conventional methodology usually has very high error rates because of the human factor and because of the huge time delay which exists in the case of the physical data entry. Moreover, migrating populations among internal users make such fixed checks more difficult since the existing system allows most individuals to revoke previous registrations and re-register themselves in new districts This logistical friction has a disproportionately impactful effect on communities of color, where intermittent access to documentation of stable residency often results in unintentional disenfranchisement in the revision cycle. This is further discamented by the fragmented nature of centralized databases in India whereby, at many occasions, the residency changes in different constituencies can fail to synchronize, causing over-coverage as well as incorrect omissions of votersIn order to compensate these systemic inadequacies, recent solutions recommend the introduction of automated, image-processing-based auditing mechanisms that may or may not indeed make verification exercises greater than the already constrained physical sampling of Voter-Verifiable Paper Audit Trails.

 

2.3. Significance of Accurate Electoral Rolls for Democratic Integrity

It is the integrity of these registries that acts as the cornerstone of the protection of electoral legitimacy so that the will of the electorate as a whole is properly reflected in the voting exercise. Existing auditing procedures, however, tend to offer a surface degree of transparency and not the high level of mathematical assurance that would allow identifying systemic errors. To resolve it, the researchers recommend the integration of decentralized ledger systems that may implement cryptographic permanence, which will stop tampering of records by unauthorized parties and decrease the vulnerability of centralized systems to human corruption  Moreover, risk-reducing audits may enhance this cryptographic basis by offering a statistically sound approach that will ensure that the reported election result matches the underlying cast ballots.  However, to establish such verifiable integrity, there also has to be a fine balance between the capability of the entire world to conduct the audit of a vote and the control over sensitive voterе profiles, since at present it is still possible to target a select range of voters and manipulate them with ease due to the current state of sharing electoral roll with political groups.

 

3. Special Intensive Revision (SIR) of Electoral Rolls: Objectives and Methodology

The Special Intensive Revision would set right systemic registry failures by enabling a timely, stringent audit of the available electoral data, and therefore, make sure that the electorate constituency will represent current demographic realities. The process aims to reduce the occurrence of legacy errors of duplicate entries and phantom voters by moving toward a more dynamic and data-driven processing model to the existing, more periodic model. These attempts are however met with a great deal of difficulty when it comes to the issues of algorithmic transparency as automated reconciliation systems pose an additional danger of creating new disenfranchisement processes based on voting data-processing or verification procedures. Furthermore, the viability of these amendments is also enhanced by the lack of coordinated interface between local civil registration archives and national electoral register that bar real-time evaluation of deceased terrains or status turnover among migrant populations. Introducing disbursed ledger technology might fix all these failures in synchronization by giving a clear record of voter registration conduct, accessible exclusively by auditors and immutable, so that they can detect and revert improper changes. With the use of smart contracts to implement automatic updates due to validated civil status information, such a system may help stabilize that the electoral registry always reflects the demographic changes in the country. However, these implementations need to walk a delicate fine line when it comes to dealing with the dangers of privacy loss, because associating key identity systems with voting records may unintentionally enable the sharing of sensitive information about the voters among differing public databases. To resolve these security issues, a strong access control, and cryptographic privacy-preserving solutions and technologies, including zero-knowledge proofs could be used to allow voter validation without revealing much sensitive personal data. These technological protections are in line with modern trends of decentralized identity, which aims to outgrow fragile central databases in favor of indifferent architectures at the cost of providing verifiability of eligibility and restricting rigorous anonymity In addition, a cryptographically binding audit trail would ensure that changes made on the registration database can be made publicly visible, therefore, providing a means of detecting and correcting anomalies in real time. In addition to these technical structures, effective deployment of such systems requires its implementation through a policy change to decentralized systems where legitimate verifiers would act as stateless organization to avoid concentration of authority in one administrative agency These distributed protocols, by separating the verification process and central administrative management, eliminate, a priori, threats posed by identity theft and other fraudulent record manipulation that poses a common problem with existing electronic voting systems. The final step to making this transition robust is to take an integrative approach where cryptographic veracity of the ledger is taken into account but also socioeconomic dynamics influencing voter accessibility and implementing stringent organization of the fundamental digital infrastructure. In addition, even though decentralized identity solutions provide a channel of seeking sovereign authentication, policy makers should be cautious of the potential rise of a digital divide that has the propensity of marginalizing populations that lack the technological infrastructure needed. The next wave of electoral reforms should, therefore, focus on developing biometric systems that will strictly comply with accessibility requirements, so that alternative authentication mechanisms can be provided to citizens who might not have access to certain technologies or be at the digital identity development stage. In order to deal with these issues, to authenticate voters, it would be advantageous to provide zero-knowledge proving as a means to authenticate the voter by verifying their eligibility without the publicity of raw biometric information or other sensitive personal data. This methodology addresses the twofold agenda of severe cross-checking of identity with stringent privacy protection efficiently and consequently minimizes the risks of centralized data storage.

 

4. Technological Advancements in Voter Verification

Even more recently, electoral systems are taking over the biometric authentication (fingerprint scanning and facial recognition) to confirm the identities and reduce the fraud cases. By employing most commonly Support Vector Machines and Haar cascades algorithms to provide these mechanisms, security can be improved, as they provide a non-repudiation (linking of physical attributes) and specific electorally significant credentials. Nevertheless, such biometric systems tend to be concentrated on large-scale databases that can fail systematically or become victims of malicious data compromise, and the current challenges of inadequate system centralization strongly justify decentralized structural options.

 

4.1. Introduction of Digital Platforms and Databases

The movement to single-point digitization, including the consolidation of Aadhaar and municipal civil records, is aimed at simplifying the processes of verifying voter identities via cross-department information harmonization. However, this integration will require strict cybersecurity controls to curb the exploitation of interconnected datasets since a centralization of the sensitive biographical data will pose valuable targets against unauthorized data exfiltration. In addition, the use of large biometric databanks adds ethical issues of long-term monitoring and the risk of secondary processing of voter information used outside the electoral administration. In order to reduce these risks, there is a need to set up stringent data minimization measures and well-authenticated user control over biometric data to ensure that the masses will remain under trust. Also, biometric authentication should be combined with stringent auditory controls because history purported that usage of one-administrator accounts or portals with central access are highly susceptible to vulnerabilities, including account tampering in the pre-election period.

 

4.2. Biometric Technologies: Aadhar Integration and its Implications

The merging of Aadhaar unique identification architecture and the electoral rolls has created a two-sided paradigm, and on the one hand, it substantially reduces the occurrence of duplicate entries and impersonation of voters; on the other, it puts in place high-density data centralization, which can form substantial single points of failure. The use of such systems, therefore, entails the use of privacy-controlling technologies, such as distributed ledger audit trails, to curb the risk that the identity verification is used unintentionally to track the individual citizens on a longitudinal basis. The general strength of identity verification protocols can be strengthened by shifting to decentralized architectures, which help electoral authorities effectively address the risks of centralized databases, and thus increase the overall resilience and transparency of the latter. The authenticity of Aadhaar-based authentication has been an issue of concern, however, since the lack of resistance to false positives and negatives can unwillingly disenfranchise qualified voters, or enable unauthorized access. Additionally, the concentration of biometrics in these systems has elicited wide lawmaking discussion around the aspect of trade-offs between security and the basic right to privacy.

 

4.3. Geospatial Technologies and GIS Mapping in Electoral Management

Combining Geospatial Information Systems can also offer the additional strong spatial aspect to the process of electoral management, in the form of mapping the distribution of voters and the allocation of polling stations in the most appropriate manner, eliminating logistical imbalance in rural areas and underserved communities. In addition to logistical mapping, these tools of space enable real-time tracking of the pre-poll trends, the trends during the polling day and the post poll trends and enable a more dynamic and responsive electoral administrative stance. Through such spatial analytics, election management agencies are able to define the demographic concentrations that might need extra resources or even targeted outreach to guarantee fair turn-up among the various voting districts. Moreover, the cost of rolling out such geospatial structures will require the creation of stringent data security systems since such massive collocation of minute demographic data and voter registration system will require seriously protected encryption and limited access to the sensitive spatial data. Additionally, new computational models, including graph neural networks, are more analytic and refined to detect odd registration patterns, but these novel models need to be balanced with the need to have algorithmic interpretability so that the population can oversee it. In this respect, the introduction of new AI methodologies should be made with the priority to the problem of the black-box, in which the absence of transparency in the work of the algorithms may discredit the electoral process.

 

5. Legal Challenges in Implementing Voter Verification Technologies

The speed with which automated verification tools are adopted often exceeds that of the creation of sound legislative frameworks, so uncertainties about the liability and protection of the voter privacy through the law are common. In particular, the existing absence of special rules in the context of using deep learning models in the electoral database creates citizens with a risk to the misuse of citizens by state and non-state agencies. The lack of this mandate outermost by the fact there have been no express requirements on the auditability of automated systems as an issue that makes it difficult to hold the electoral authorities responsible as to discriminatory algorithmic results or mistaken voter disenfranchisement.

 

5.1. Privacy Concerns and Data Protection Laws

The Digital Personal Data Protection Act intersect with the electoral process is disputed, especially in the exemptions that the state is allowed to undertake to process sensitive biometric information without express and granular consent. And the absence of these heavy control structures breeds a situation of precarity in which the administrative expediency may be in conflict with the basic right of individual digital sovereignty. To end these systemic tensions, a fundamental overhaul of the regulatory system is necessary to exercise explicit legal responsibility regarding erroneous algorithms and provide a general data management plan in electoral procedures based on the principles of necessity and proportionality. Moreover, creation of inter-agency co-operation and social awareness campaigns is crucial so as to off de-mystify these technological shifts so that those concerned would be in the know regarding the behaviour as well as constraints of the automated electoral safeguards. Besides, the implementation of such systems should take into consideration the digital literacy gap, since the technological obstacles may inadvertently leave the disadvantaged groups of the population outside the verification process.

 

5.2. Constitutional Rights and Voter Disenfranchisement

The forced use of biometric and digital verification procedures is a threat of breaching the constitutional right to vote when the technical malfunctions or mistakes with database data primarily affect marginalized groups. The results of such a systemic exclusion require institutionalizing legal methods of recourse since allowing administrative decision-making discretion on the part of the technology developers can create barriers to the electoral process that are both legally and technically enforced. Thus, judicial review needs to be adapted to pursue automated administrative decisions to make sure that automated algorithmic programs do not work ultra vires and fulfil statutory requirements. The critical element of these computational structures is to create strong audit trails since the black-box proprietary software can, in most cases, prevent the detection of potential biases by an external audit. In addition, the adoption of immutable ledger technologies may offer a clear, audit-friendly design of records on verification, but these modernities have to be well balanced with the existing legal norms of ballot secrecy and the integrity of elections.

 

5.3. Jurisdictional Issues and Federal-State Coordination

Decentralization in electoral management in India, where state units hold primary responsibility in roll revision whilst national bodies established the national standards, is a source of friction in implementing similar biometric protocols to use in the heterogenous state administrative environments. Such instances of inter-jurisdictional conflict can even take the form of inconsistent evidences of voter identity proving, making the uniformity of Special Intensive Revision process difficult. These incoherencies lead to the point of the need to have a unified regulatory framework that defines the allocation of duties between central management and regional installation to avoid discordant data standards. Also, because the disparate backend databases are relied on to cross-verify, this heightens the chance of data silo, with standardized interoperability protocols necessary to assure the integrity of electoral roll across the state boundaries. This integrative undertaking should also consider the dangers of algorithmic prejudices, where automated enrolment-maintainance structures can function to privatize or enhance prevailing socioeconomic disparities in enrolment. To reduce the riskiness, the Election Commission of India should change its administrative practices to a paradigm of systemic administrative responsibility that handles the discretionary loopholes experienced in its operations. Future electoral reform projects should thus make the task of harmonization of technological effectiveness against the constitutional needs of transparency, such that the encroachment of digital technology on the validity of the democratic mandate not is negated.

 

6. Technological Challenges in Implementing Voter Verification during SIR

The main technical challenge is the guarantee of real-time synchronicity between the huge, geographically spread electoral databases which compose the foundation of the Special Intensive Revision. Moreover, the missing standardised interoperability between the older backend systems and the newer biometric identification modules can create high latency, which could give way to the less precise real-time roll updates. Moreover, biometric authentication is to be integrated, which necessitates intensive field-testing to avoid systemic exclusion as any inconsistencies between resident demographics and biometric templates in the store can result in wrongful de-registrations. These technical complications are enhanced by the fact that these verification processes and operations also require stringent security auditing in order to ensure that the hardware utilized in these operations can withstand any cyber vulnerabilities.

 

6.1. Data Inaccuracies and Database Management

The chronic problem of record duplication and the appearance of anomalous records duplication requires the implementation of the centralized and high-integrity information system to provide data deduplication and to simplify the process of invalid records detection. Nevertheless, automated deduplication algorithms are liable to constant human supervision, since even a poorly designed training data can cause incorrect record deletions and the inadvertent disenfranchisement of qualified voters. To cope with these technical weaknesses, the institutional structures should provide stringent data validation measures to be followed, which incorporate the multi-factor verification, hence reducing the possibility of having errors in the algorithms used in the list-cleansing process. Moreover, identity verification transparency may be boosted by taking the decentralized verification schemes used in environments that have high data integrity needs, although in such applications they are implemented with sufficient protection against unauthorized access.

 

6.2. Interoperability Issues between Different Systems

Legacy structures are frequently incompatible, and the evidence of this phenomenon has been seen in cross-border pilot projects in which the incompatibility of divergent governance structures prevents the harmonization of heterogeneous digital identity ecosystems. These impediments are also compounded by the absence of open standards that in many cases results in closed loop systems that do not provide the essential need towards a more consolidated and verifiable voter identity registry. To overcome these silos, it is critical to move towards API-first designs that can provide secure and standardized communications between municipal, state, and central electoral datakelses. This kind of architectural change would alleviate the tendency of technical latency and data fragmentation and thereby make sure that the Special Intensive Revision is working on a unique and coordinated base of high-fidelity electoral information. Finally, the success of this digital transformation will be based on sound cybersecurity measures that will ensure that authenticators are not exploited and that sensitive voter identity data cannot be changed or illegally profiled.

 

6.3. Digital Divide and Accessibility for All Voters

The use of advanced biometric verification technology endangers to marginalize people in less developed or remote societies when digital literacy and consistent technical equipment is still a major drawback. Such digital exclusion is further increased by the dependence on high-bandwidth connectivity, which often malfunctions in rural regions, unwelcomingly establishing a system of participation in the electoral process that is tiered, in favor of the urbanized, technology-stable constituencies. This means that the electoral authorities need to embrace the concept of inclusive design and a mixed verification system to make sure that the Special Intensive Revision may not unintentionally entrench systemic maleficence. To ensure the population trusts and protects the key rights of the voters, it is imperative to make enormous governance systems that support the complexity of these digital tools. This means that Data Protection Impact Assessments should be adopted to preventively distill the ways in which biometric-intensive electoral procedures may be infringing the privacy of individuals.

 

6.4. Cybersecurity Risks and Data Breaches

The digitalization of electoral lists also comes with critical vulnerabilities with the level of sensitive biometric and demographic data posing an easy high-value target to state and non-state actors with malicious intent to manipulate the democratic process by unauthorized data exfiltration or hacking of the system. To address these threats, one will have to shift in the direction of encryption-at-rest and immutable audit logs, which will guarantee that any efforts to modify voter records can be picked up and reversed. Additionally, the adoption of technologically superior cybersecurity has to be weighed against the anonymity of voters where authentication mechanisms are not designed to pose ubiquitous surveillance. This kind of fine balance is imperative to ensure that centralized systems of digital identities do not transition into a system of political persecution and the victimization of political dissent.

 

7. Impact of Voter Verification on Electoral Integrity

The system of biometric-assisted verification essentially alters the nature of democratic participation since it may not only increase the accuracy of voter identification but also opens up the potential risks of handling systematic disenfranchisement. As an example, though such technologies as bimodal accreditation systems are implemented to minimize impersonation, they are vulnerable to technical malfunction when transmitting data, which wrongly will negatively affect the credibility of voters in election results. Further, the dependence on them should be examined within the larger socio-political framework, with administrative control over data engineering potentially used to either benefit certain entities undue or harm particular groups. Consequently, there is a clear need to apply transparent governance designs and strong audit trails to eliminate risks linked to centralized data management to ensure that the administrative manipulation of the these electoral databases does not override the democratic process. In particular, relying on the blockchain-based ledgers may provide a decentralized approach to guaranteeing voter lists, which is resistant to internal manipulation without the compulsory transparency. Nevertheless, the government needs to be aware of the possible vulnerability areas that include biometric spoofing or the inability of those who do not have the necessary digital infrastructure to participate, which is likely to adversely affect the inclusivity of the overall electoral system. Moreover, despite privacy-saving methods such as zero-knowledge proofs providing a channel through which anonymity and verifiability can be reconciled, the sensitive nature of biometric information requires a high level of control, to safeguard the possible abuse by the strong. In this regard, the difference between the protocols of proof of human and membership comes into the limelight and authorities have to make sure that systems of verification are in place to verify that they have been eligible and still the system should not be such that it allows people to manipulate identities collectively. In addition to these design issues, new methods, like AI-powered liveness determination, which holds the physical presence of a voter against biometric data, can provide a workable model to mitigate the impacts of spoofing artifacts and preserve the fidelity of the Special Intensive Revision. Nonetheless, these distributed architectures need advanced managerial skills and insight into the inherent quality of scale because their poor execution can unknowingly create new channels of systemic damage.

 

8. Conclusion

The Special Intensive Revision of electoral rolls is a salad nexus in that there is a major technological shift to modernization combined with the basic manifestation of democratic legitimacy. The next generation initiative will need to focus more on modular, privacy conscious architecture, which would make high-assurance verification and the requirement of egalitarian universality of franchise compatible. Through the combination of decentralized audit software and effective identity management controls, the electoric authority will be able to address the risk associated with having central repositories of data besides gaining more trust among the people. Finally, to make these revisions successful, there should be a long term commitment to closing the digital divide thus assuring that the use of technology can add value and not limit access to the democratic process by all citizens. These efforts should be complemented by stringent legislative control where the quick-rollout of these sophisticated systems are well within the hatches of constitutional safeguards and open and responsible administrative procedures. Moreover, consideration of zero-knowledge proofs integration might offer a strong architecture of certifying voter eligibility and at the same time make sure that delicate biometric identifiers are not revealed in the centralized data bases. Such a paradigm shift requires that proprietary black-box validation be replaced with open-source protocols in order to enable independent audits that will ensure electoral results can be verified by end users of the product and by civil society participants. Moreover, it is of paramount essentiality to discuss the mentioned disadvantages of massive cryptographic validation to have the opportunities to operationalize these privacy-saving mechanisms in the context of the Indian electoral process. The possibility of scalable solutions (through layer-2 protocols and sharding) is concurrently being explored as a way to work around the current transaction throughput constraints, thus providing an elegant solution to the best deployment of high-assurance verification systems. A combination of these cryptographic innovations and the already established administration protocols can enable policymakers to develop a robust electoral transformation that will preserve the anonymity of the voters against the impending threats of data profiling and illegal connection.

 

References

  • D. Bhavya Reddy et al., “Implementing a Blockchain-based E-Voting System for India: Mitigating Security Challenges through Aadhaar Card Authentication,” 12 International Journal for Research in Applied Science and Engineering Technology 5319 (2024).
  • Shashank Singh, “Electoral reforms and constitutional protection of voting rights in India: An analysis,” 7 International Journal of Political Science and Governance 88 (2025).
  • Prashant Agrawal et al., “Publicly auditable privacy-preserving electoral rolls” arXiv (Cornell University) (2024).
  • Vishal Mohanty et al., “Auditing Indian Elections” Lecture notes in computer science 150 (2019).
  • Amrita Dhillon et al., “Voting over a Distributed Ledger: An interdisciplinary perspective” (2020).
  • Inderpreet Singh et al., “Enhancing Security and Transparency in Online Voting through Blockchain Decentralization,” 5 SN Computer Science (2024).
  • Prashant Agrawal et al., “Publicly Auditable Privacy-Preserving Electoral Rolls,” 20 217 (2024).
  • Abdul Razaque et al., “Blockchain-Enabled Smart Contracts and Prioritized Delegated Proof-of-Stake Paradigm for Secure and Scalable Electronic Voting Systems” Blockchain Research and Applications 100348 (2025).
  • Mirko Bottarelli et al., “Assessing the Trustworthiness of Electronic Identity Management Systems:  Framework and Insights from Inception to Deployment” arXiv (Cornell University) (2025).
  • Md Jobair Hossain Faruk et al., “Transforming online voting: a novel system utilizing blockchain and biometric verification for enhanced security, privacy, and transparency,” 27 Cluster Computing 4015 (2024).
  • Srilatha et al., “Fingerprint-based biometric smart electronic voting machine using IoT and advanced interdisciplinary approaches,” 507 E3S Web of Conferences 1037 (2024).
  • Avinash Ingole, “Towards Secure and Transparent Elections: A Review of Electronic Voting Integrated with Blockchain Technology” International Journal for Research in Applied Science and Engineering Technology 3263 (International Journal for Research in Applied Science and Engineering Technology (IJRASET), 2024).
  • Debanjan Sadhya and Tanya Sahu, “A critical survey of the security and privacy aspects of the Aadhaar framework,” 140 Computers & Security 103782 (2024).
  • Prathm Juneja, Artificial Intelligence for Electoral Management, 2024.
  • P Deepak, Stanley Simoes and Muiris MacCárthaigh, “AI and core electoral processes: Mapping the horizons,” 44 AI Magazine 218 (2023).
  • Joseph Olusegun Adebayo, Blessing Makwambeni and Surendra Thakur, “Covid-19, Fourth industrial revolution and the future of elections in Africa,” 19 Journal of African Elections 1 (2020).
  • AnandKumar Chennupati, “The threat of artificial intelligence to elections worldwide: A review of the 2024 landscape” World Journal of Advanced Engineering Technology and Sciences, 2024.
  • Aman Sonkar, “Automated State Action in India: Administrative Justice, Privacy and Constitutional Accountability” (2025).
  • Viji et al., “Blockchain Voting: A Comparative Analysis,” 10 International Journal for Research in Applied Science and Engineering Technology 1886 (2022).
  • Babar Ali, “From Statutes To Ballots: Assessing The Legal Facets Of Evms In Pakistan” Kurdish Studies 713 (2024).
  • “Scholar,” Encyclopaedia of the Qurʾān, 2014.
  • Karem Sayed Aboelazm, “The success of the E-voting to Enhance the Political Engagement: A Comparative Study,” 11 Journal of Law and Sustainable Development (2023).
  • Jide Edu et al., “Moving Beyond Frameworks: Stakeholders’ Perceptions of Risk Assessment in National Electronic Identity System” Research Square (Research Square) (2023).
  • Bruno Ricardo Bioni et al., “The digitization of the Brazilian national identity system: A descriptive and qualitative analysis of its information architecture,” 4 Data & Policy (2022).
  • Shrey Jain et al., “AI and Democracy’s Digital Identity Crisis” SSRN Electronic Journal (2023).
  • Suniti Chouhan and Gajanand Sharma, “A New Era of Elections: Leveraging Blockchain for Fair and Transparent Voting” arXiv (Cornell University) (2025).
  • Uzma Jafar, Mohd Juzaiddin Ab Aziz and Zarina Shukur, “Blockchain for Electronic Voting System—Review and Open Research Challenges” Sensors 5874 (Multidisciplinary Digital Publishing Institute, 2021).
Recommended Articles
Original Article
Integrating Green Consultancy and Eco-Squads: A Conceptual Framework for Enhancing Sustainability Practices in the Real Estate Industry
Original Article
Low-footprint, Energy-Efficient Memory Cryptographic Algorithm For Protecting Data in an Internet Of Things Setting
...
Research Article
Reassessing Financial Inclusion through the Lens of Neo-banking Innovations
Published: 10/03/2026
Research Article
Teaching Through Tales: Literature as a Tool for Character and Personality Building in the Era of Technology
Published: 05/03/2026
Loading Image...
Volume 7, Issue 1
Citations
116 Views
82 Downloads
Share this article
© Copyright Journal of International Commercial Law and Technology