End-to-End verifiable online election system built on prominent, scientifically reviewed crypto algorithms providing full documentation, transparency and auditability before, during and after the election process. Suitable for conducting secure and trustworthy national, local and private elections.

Assembly Voting X

Integrity

Integrity and full auditability are imperative in an election process. Assembly Voting X ensures integrity and auditability by individual and universal verification measures for voters, independent 
auditors/ observers and academia.

Secure

The system is built to secure voter privacy by design. An End-to-End encryption scheme and a verifiable mixing process ensures voter privacy throughout the election process.

Documented

All system components are built on mathematically proven algorithms and technologies as well as on open source software. Hence, the election system is fully documented and continuously reviewed by academia and independent auditing institutions.

Request a free demo of Assembly Voting X
Service Solutions

Assembly Voting X can be acquired for events as a Full Service Solution

How Assembly Voting X works

End-to-End verifiable voting system

Assembly Voting X is designed to conduct trustworthy elections by providing a fully documented, secure and verifiable End-to-End solution without compromising the simple, accessible user interfaces for administrators, voters, trustees, observers and others engaged in the election process.

In fact, to achieve a fully verifiable solution, it is imperative to provide services which are user-friendly and easy to access for everyone involved in order to ensure a true End-to-End verifiable election.

Various measures are provided to ensure system integrity and system security:

System integrity

Functions to conduct individual and universal verification:

Cast as intended
Individual verifiability: 
The system contains a mechanism for the voter to get a prove that the vote has not been changed during the encryption process. Ballot spoiler function.

Registered as cast
Individual verifiability: 
The "append-only" bulletin board provides functionality for checking that your encrypted vote has not been altered or removed 
throughout the election process.

Counted as registered

Universal verifiability: 
The tallying process generates proofs that certify the correctness of the calculated results. That means, the election result corresponds to the content of all encrypted votes received during the election process.

System security

Security and voter privacy by design:

Digital signature
Provides verification mechanisms that assure that all received votes came from eligible voters only. In addition, digital signatures certify the fact that no votes have been tampered with during the voting process.

End-to-End encryption
Our encryption protocol enforces that, under no circumstances, nobody is able to read any partial results before it is intended to.

Mix-net

Through the mixing procedure, we break any connection between a voter identity and its vote. After the mixing procedure, we can safely decrypt all encrypted votes as they are completely anonymised.

End-to-End encryption
Our encryption protocol enforces that, under no circumstances, nobody is able to read any partial results before it is intended to.

Mix-net

Through the mixing procedure, we break any connection between a voter identity and its vote. After the mixing procedure, we can safely decrypt all encrypted votes as they are completely anonymised.

End-2-End process

Assembly Voting X is designed around an End-to-End process ensuring full auditability at each step throughout the ​process. The steps are:
 

Pre-election phase

Setting up the election

Election administrators set up the election, incl. trustees (election board) and mix-nodes.

Threshold Ceremony
Trustees use their trustee application to conduct the Threshold Ceremony. By generating one encryption key and several shares of the decryption key, it is not possible to access voting results throughout the voting process.

Election phase

Eligibility

Voters are authenticated by digital signatures.

Voting
Votes are confirmed and encrypted on the voter's device. Hence, it is possible to ensure vote secrecy.

Bulletin board

All encrypted votes are registered on the "append-only" bulletin board. All encrypted votes are publicly accessible and verifiable.

Post-election phase

ELECTION

COMPLETED

Mixing

The mixing process will irreversibly separate VoterID from the encrypted vote (votes are anonymised). This process starts after the election is closed.

Decryption

The trustees use the Trustee application to decrypt the results after the mixing has anonymised the encrypted votes. A predefined number of trustees have to participate in this process. Otherwise, decryption is not possible.

Tallying

The result of the election is calculated depending on the election type and published according to regulation.

Configurations

Participation media

  • Pc and computers

  • Tablets

  • Smartphone

  • Paper voting (for hybrid voting)

Voting principles

  • Required number of votes

  • Maximum number of votes

  • Weighted voting

  • Vote overwriting

  • Ranking

  • Write-in votes

Types of elections

  • Candidate elections

  • Candidate- and list elections

  • Referendums

  • Regional and constituency voting

  • Simultaneous ballots

Voting access

  • Digital signatures

  • Voter PIN combined with user ID

  • Voter PIN

Hotline service

  • Phone and e-mail

Assembly Voting X Technologies

◦  Elliptic curve cryptography -- secp256k1 curve

◦  Threshold cryptography based on ElGamal cryptosystem

◦  Schnorr digital signatures

◦  Discrete logarithm zero-knowledge proof

◦  Furukawa mixing proof

◦  SHA256 hash function

More information on Assembly Voting X 

Click the PDF-icon to download the leaflet and read more about the election system. 

Partner Solution

For organisations looking for a secure, documented and efficient digital infrastructure that allows them to help third party customers carry out elections in a given industry or specific geography. Assembly Voting has a partner program in place that provides systems access, local hosting and relevant training. 

Cases

City of Copenhagen

Every fourth year, the City of Copenhagen holds Senior Citizens' Council election, where Copenhageners over the age of 60 have the opportunity to vote digitally with Assembly Voting X. From the beginning of the election period, all voters thus have the opportunity of casting their vote using NemID, while those voters who wish to vote by letter still have the opportunity to do so as well. 

With more than 90.000 eligible citizens, the election is Denmark's biggest digital election in the municipalities. 

Ministry for Ecclesiastical Affairs of Denmark

The Bishop election in Helsingør Diocese was conducted as an electronic election with Assembly Voting X. The system, which is built as a digital version of the physical polling station, has thus formed the frame for the competition for one of the highest offices within the Danish National Church. 

Selected election officials began the election process by approving the election setup and handing out encryption keys via an election control application ensuring that no one has access to the results before the end of the election, where the election results is then decrypted. With Assembly Voting X, the security and possibility of controlling all parts of the electoral process is equivalent to the one known from e.g. parliamentary elections in Denmark. 

Location

Ringager 4C, 1. th

2605 Brøndby

Denmark

Contact us

info@aion.dk

assemblyvoting.com

+45 2616 9638 

Connect