Assembly Voting X


Integrity and full auditability are imperative in an election process. Assembly Voting X ensures integrity and auditability by individual and universal verification measures for voters, independent auditors / observers and academia.


The system is built to secure voter privacy by design. An End-to-End encryption scheme and a verifiable mixing process ensures voter privacy throughout the election process.


All system components are built on mathematical proven algorithms and technologies as well as on open source software. Hence, the election system is fully documented and continuously reviewed by academia and independent auditing institutions.

  • Elliptic curve cryptography -- secp256k1 curve

  • Threshold cryptography based on ElGamal cryptosystem

  • Schnorr digital signatures

  • Discrete logarithm zero-knowledge proof

  • Furukawa mixing proof

  • SHA256 hash function

End-to-End verifiable voting system

Assembly Voting X is designed to conduct trustworthy elections by providing a full documented End-to-End secure and verifiable solution without compromising easy accessible user interfaces for administrators, voters, trustees, observers and others engaged in the election process.


In fact, to achieve a full verifiable solution it is imperative to provide services that are user-friendly and easy to access for everyone involved in order to ensure a true End-to-End verifiable election.


Various measures are provided to ensure system integrity and system security:

System integrity

Functions to conduct individual and universal verification:

Cast as intended
Individual verifiability: 
The system contains a mechanism for the voter to get a prove that vote has not been changed during the encryption process. Ballot spoiler function.

Registered as cast
Individual verifiability: 
The "append-only" bulletin board provides functionality for checking that your encrypted vote has not been altered or removed throughout the election process

Counted as registered

Universal verifiability: 
The tallying process generates proofs that certify the correctness of the calculated results. That means, the election result corresponds to the content of all encrypted votes received during the election process.

System security

Security and voter privacy by design:

Digital signature

Provides verification mechanisms that assure that all received votes came from eligible voters only. In addition, digital signatures certify the fact that no votes have been tampered with during the voting process.

End-to-End encryption

Our encryption protocol enforces that, under no circumstances, nobody is able to read any partial results before it is intended to.


Through the mixing procedure, we break any connection between a voter identity and its vote. After the mixing procedure, we can safely decrypt all encrypted votes as they are completely anonymised.

End-2-End process

Assembly Voting X is designed around an End-to-End process ensuring full auditability at each step throughout ​process. The steps are:

Pre-election phase

Election Phase

Post-election Phase


Voting access

  • Digital Signatures

  • Voter PIN combined with user ID

  • Voter PIN

Types of elections

  • Candidate elections

  • Candidate and list elections

  • Referendums

  • Regional and constituency voting

  • Simultaneous ballots

Voting media

  • PCs and computers

  • Tablet computers

  • Smart phones

  • Paper voting (for hybrid voting)

Voting principles

  • Required number of votes

  • Maximum number of votes

  • Weighted voting

  • Vote overwriting

  • Ranking

Hotline service

  • Phone and e-mail (8am to 8pm)

Assembly Voting ApS

Park Allé 382

DK-2625 Vallensbæk



Tlf: +45 2684 6644