Security

Assembly Voting’s election system is based on academic cryptographic articles and algorithms. The technology uses a mix of proprietary and open-source components. Our protocols are available for researchers, independent auditors, and other stakeholders to scrutinize.

Ensuring full Integrity

Integrity and control options in the electoral process constitute the cornerstones of a democratic election.

Our voting solution ensures full integrity through individual and universal verification for registered voters, election officials, independent auditors, observers, and others.

Votes are cast as intended

The system contains a mechanism allowing the voter to verify that their vote is correctly registered using the Benaloh Challenge, through which a voter may spoil and decrypt their encrypted vote.

Verify votes are registered as cast

Using hash-chain technology, we use a Bulletin Board to publicly register all significant election events. This allows anyone to individually verify that a vote for which they have a receipt still exists in the election.

It also allows for universal verification of the chain of events in the election, such as whether additional votes or configuration changes have all been received correctly.

Votes are counted as registered

We generate mixing and partial decryption proofs, allowing anyone with access to the files to use our published protocols to verify that the published, decrypted results correspond to the encrypted votes cast throughout the election.

System security

Our voting solution is constructed to ensure anonymity and voting secrecy ‘by design’. End-to-end encryption in the electoral process and mixing processes in the result statement, guarantee voters complete anonymity and voting secrecy throughout the electoral process.

Digital signature

A built-in, digital-signature based ‘login procedure’ features a verification mechanism, which ensures that all votes cast originate from registered voters. In addition, the digital signature helps to ensure that votes cast cannot be tampered with during the election process.

End-to-End encryption

An encryption protocol ensures that, under no circumstances, is it possible to read parts of the result until the election process is complete and the election officials initiate the result ceremony with decryption of the votes.

Mix-net

The Mixing Protocol breaks any connection between the voter’s identity and the vote cast, thereby ensuring full anonymity. The mixing process is organised by several independent parties and must be properly completed, before it is possible to initiate the decryption process of the registered votes.

Documentation

The components of the online voting system are based on mathematically-proven algorithms and technologies, that are available for impartial review. The documentation and use of open-source software form a key part of the universal verification of the online voting system.

Mathematical evidence

All the technologies and the system structure have been mathematically proven and reviewed by academic researchers.

Technical design

Detailed documentation showing the technical design of the voting solution.

Open-source software

The open-source software used in the voting system is available for review on GitHub.

ISAE3000

ISAE3000 is used to review all systems and data management processes in Assembly Voting.

ISO 27001

ISO 27001 is used to review system security and security management in Assembly Voting.

Scroll to Top