Assembly Voting X
Integrity and full auditability are imperative in an election process. Assembly Voting X ensures integrity and auditability by individual and universal verification measures for voters, independent auditors / observers and academia.
The system is built to secure voter privacy by design. An End-to-End encryption scheme and a verifiable mixing process ensures voter privacy throughout the election process.
All system components are built on mathematical proven algorithms and technologies as well as on open source software. Hence, the election system is fully documented and continuously reviewed by academia and independent auditing institutions.
Elliptic curve cryptography -- secp256k1 curve
Threshold cryptography based on ElGamal cryptosystem
Schnorr digital signatures
Discrete logarithm zero-knowledge proof
Furukawa mixing proof
SHA256 hash function
End-to-End verifiable voting system
Assembly Voting X is designed to conduct trustworthy elections by providing a full documented End-to-End secure and verifiable solution without compromising easy accessible user interfaces for administrators, voters, trustees, observers and others engaged in the election process.
In fact, to achieve a full verifiable solution it is imperative to provide services that are user-friendly and easy to access for everyone involved in order to ensure a true End-to-End verifiable election.
Various measures are provided to ensure system integrity and system security:
Functions to conduct individual and universal verification:
Cast as intended
The system contains a mechanism for the voter to get a prove that vote has not been changed during the encryption process. Ballot spoiler function.
Registered as cast
The "append-only" bulletin board provides functionality for checking that your encrypted vote has not been altered or removed throughout the election process
Counted as registered
The tallying process generates proofs that certify the correctness of the calculated results. That means, the election result corresponds to the content of all encrypted votes received during the election process.
Security and voter privacy by design:
Provides verification mechanisms that assure that all received votes came from eligible voters only. In addition, digital signatures certify the fact that no votes have been tampered with during the voting process.
Our encryption protocol enforces that, under no circumstances, nobody is able to read any partial results before it is intended to.
Through the mixing procedure, we break any connection between a voter identity and its vote. After the mixing procedure, we can safely decrypt all encrypted votes as they are completely anonymised.
Assembly Voting X is designed around an End-to-End process ensuring full auditability at each step throughout process. The steps are:
Voter PIN combined with user ID
Types of elections
Candidate and list elections
Regional and constituency voting
PCs and computers
Paper voting (for hybrid voting)
Required number of votes
Maximum number of votes
Phone and e-mail (8am to 8pm)