Security

Assembly Voting's election system is based on mathematically-proven algorithms and technologies. The technologies used are available for audit via open-source software. This ensures that all elements of the online voting system are fully documented and accessible to researchers, independent auditors, and other stakeholders.

Ensuring full Integrity

Integrity and control options in the electoral process constitute the cornerstones of a democratic election.

The Assembly Voting X system ensures full integrity through individual and universal verification for registered voters, election officials, independent auditors, observers, and others.

Vote in the online system as desired

Individual verification: The system contains a mechanism (ballot opener app) that can prove that the digital vote has been properly registered in the cryptogram containing the vote.

Vote registered in online system as cast

Individual verification: A bulletin board, based on blockchain-inspired technology, logs all election activities in the system without exception. By uploading a ballot receipt in the bulletin board, the registered voter can verify that the vote has been registered and neither edited nor removed throughout the election process.

Vote counted as registered

Universal verification: The vote counting process generates evidence documenting the correctness of the calculated election results. This means that the results of the election correspond to the content of all the encrypted votes received on the bulletin board during the electoral process.

System security

Assembly Voting X is constructed to ensure anonymity and voting secrecy ‘by design’. End-to-end encryption in the electoral process and mixing processes in the result statement, guarantee voters complete anonymity and voting secrecy throughout the electoral process.

Digital signature

A built-in, digital-signature based ‘login procedure’ features a verification mechanism, which ensures that all votes cast originate from registered voters. In addition, the digital signature helps to ensure that votes cast cannot be tampered with during the election process.

End-to-End encryption

An encryption protocol ensures that, under no circumstances, is it possible to read parts of the result until the election process is complete and the election officials initiate the result ceremony with decryption of the votes.

Mix-net

The Mixing Protocol breaks any connection between the voter’s identity and the vote cast, thereby ensuring full anonymity. The mixing process is organised by several independent parties and must be properly completed, before it is possible to initiate the decryption process of the registered votes.

Documentation

The components of the online voting system are based on mathematically-proven algorithms and technologies, that are available for impartial review. The documentation and use of open-source software form a key part of the universal verification of the online voting system.

Mathematical evidence

All the technologies and the system structure have been mathematically proven and reviewed by academic researchers.

Technical design

Detailed documentation showing the technical design of the Assembly Voting X solution.

Open-source software

The open-source software used in Assembly Voting X is available for review on GitHub.

ISAE3000

ISAE3000 is used to review all systems and data management processes in Assembly Voting.

ISO 27001

ISO 27001 is used to review system security and security management in Assembly Voting.

Scroll to Top