
​
End-to-End verifiable online election system built on prominent, scientifically reviewed crypto algorithms providing full documentation, transparency and auditability before, during and after the election process. Suitable for conducting secure and trustworthy national, local and private elections.
Assembly Voting X

Integrity
Integrity and full auditability are imperative in an election process. Assembly Voting X ensures integrity and auditability by individual and universal verification measures for voters, independent
auditors/ observers and academia.

Secure
The system is built to secure voter privacy by design. An End-to-End encryption scheme and a verifiable mixing process ensures voter privacy throughout the election process.

Documented
All system components are built on mathematically proven algorithms and technologies as well as on open source software. Hence, the election system is fully documented and continuously reviewed by academia and independent auditing institutions.

Request a free demo of Assembly Voting X
Service Solutions
Assembly Voting X can be acquired for events as a Full Service Solution
How Assembly Voting X works
End-to-End verifiable voting system
Assembly Voting X is designed to conduct trustworthy elections by providing a fully documented, secure and verifiable End-to-End solution without compromising the simple, accessible user interfaces for administrators, voters, trustees, observers and others engaged in the election process.
​
In fact, to achieve a fully verifiable solution, it is imperative to provide services which are user-friendly and easy to access for everyone involved in order to ensure a true End-to-End verifiable election.
​
Various measures are provided to ensure system integrity and system security:
​
System integrity
Functions to conduct individual and universal verification:
Cast as intended
Individual verifiability:
The system contains a mechanism for the voter to get a prove that the vote has not been changed during the encryption process. Ballot spoiler function.
Registered as cast
Individual verifiability:
The "append-only" bulletin board provides functionality for checking that your encrypted vote has not been altered or removed
throughout the election process.
Counted as registered
Universal verifiability:
The tallying process generates proofs that certify the correctness of the calculated results. That means, the election result corresponds to the content of all encrypted votes received during the election process.
System security
Security and voter privacy by design:
Digital signature
Provides verification mechanisms that assure that all received votes came from eligible voters only. In addition, digital signatures certify the fact that no votes have been tampered with during the voting process.
End-to-End encryption
Our encryption protocol enforces that, under no circumstances, nobody is able to read any partial results before it is intended to.
Mix-net
Through the mixing procedure, we break any connection between a voter identity and its vote. After the mixing procedure, we can safely decrypt all encrypted votes as they are completely anonymised.
End-to-End encryption
Our encryption protocol enforces that, under no circumstances, nobody is able to read any partial results before it is intended to.
Mix-net
Through the mixing procedure, we break any connection between a voter identity and its vote. After the mixing procedure, we can safely decrypt all encrypted votes as they are completely anonymised.
End-2-End process
Assembly Voting X is designed around an End-to-End process ensuring full auditability at each step throughout the ​process. The steps are:
Pre-election phase

Setting up the election
Election administrators set up the election, incl. trustees (election board) and mix-nodes.
Threshold Ceremony
Trustees use their trustee application to conduct the Threshold Ceremony. By generating one encryption key and several shares of the decryption key, it is not possible to access voting results throughout the voting process.
Election phase

Eligibility
Voters are authenticated by digital signatures.
Voting
Votes are confirmed and encrypted on the voter's device. Hence, it is possible to ensure vote secrecy.
Bulletin board
All encrypted votes are registered on the "append-only" bulletin board. All encrypted votes are publicly accessible and verifiable.
Post-election phase

ELECTION
COMPLETED
Mixing
The mixing process will irreversibly separate VoterID from the encrypted vote (votes are anonymised). This process starts after the election is closed.
Decryption
The trustees use the Trustee application to decrypt the results after the mixing has anonymised the encrypted votes. A predefined number of trustees have to participate in this process. Otherwise, decryption is not possible.
Tallying
The result of the election is calculated depending on the election type and published according to regulation.

Configurations
Participation media
-
Pc and computers
-
Tablets
-
Smartphone
-
Paper voting (for hybrid voting)
Voting principles
-
Required number of votes
-
Maximum number of votes
-
Weighted voting
-
Vote overwriting
-
Ranking
-
Write-in votes
Types of elections
-
Candidate elections
-
Candidate- and list elections
-
Referendums
-
Regional and constituency voting
-
Simultaneous ballots
Voting access
-
Digital signatures
-
Voter PIN combined with user ID
-
Voter PIN
Hotline service
-
Phone and e-mail
Assembly Voting X Technologies
â—¦ Elliptic curve cryptography -- secp256k1 curve
â—¦ Threshold cryptography based on ElGamal cryptosystem
â—¦ Schnorr digital signatures
â—¦ Discrete logarithm zero-knowledge proof
â—¦ Furukawa mixing proof
â—¦ SHA256 hash function
More information on Assembly Voting X
Click the PDF-icon to download the leaflet and read more about the election system.
Partner Solution
​
For organisations looking for a secure, documented and efficient digital infrastructure that allows them to help third party customers carry out elections in a given industry or specific geography. Assembly Voting has a partner program in place that provides systems access, local hosting and relevant training.
Cases
City of Copenhagen

Every fourth year, the City of Copenhagen holds Senior Citizens' Council election, where Copenhageners over the age of 60 have the opportunity to vote digitally with Assembly Voting X. From the beginning of the election period, all voters thus have the opportunity of casting their vote using NemID, while those voters who wish to vote by letter still have the opportunity to do so as well.
​
With more than 90.000 eligible citizens, the election is Denmark's biggest digital election in the municipalities.
Ministry for Ecclesiastical Affairs of Denmark
The Bishop election in Helsingør Diocese was conducted as an electronic election with Assembly Voting X. The system, which is built as a digital version of the physical polling station, has thus formed the frame for the competition for one of the highest offices within the Danish National Church.
​
Selected election officials began the election process by approving the election setup and handing out encryption keys via an election control application ensuring that no one has access to the results before the end of the election, where the election results is then decrypted. With Assembly Voting X, the security and possibility of controlling all parts of the electoral process is equivalent to the one known from e.g. parliamentary elections in Denmark.