Secure, transparent voting technology
Our aim is to create an election platform that is tamper-proof, transparent and highly secure, setting a new standard of excellence in electronic voting.
The Electis Pillars of Security and Transparency
Our Electis platform is distinguished by several advanced features that guarantee the security, transparency and verifiability of electronic elections. These innovative features ensure that every vote is counted confidentially and accurately, while enabling voters to verify the integrity of the electoral process for themselves.
Homomorphic encryption
This allows encrypted votes to be combined into encrypted totals, maintaining confidentiality and enabling votes to be counted securely.
Verifiable End-to-End Evidence
Voters receive a verification code with their encrypted vote, enabling them to check that their vote has been included in the final total.
Non-Interactive Evidence of Zero Knowledge (NIZK)
Various proofs ensure that the keys are correctly chosen, the bulletins correctly formed and the decrypted totals correspond to the claimed values without revealing any sensitive information.
User authentication
Users register with an email and password, receive a verification link and activate their account via a generated token. OTP login allows voters to participate without full registration, and two-factor authentication adds an extra layer of security.
Key ceremony
Custodians share and verify encryption keys before the election opens, guaranteeing a secure key management process.
Casting and checking ballots
Voters cast encrypted ballots, receive a verification code, and can later verify that their vote has been counted.
By combining these advanced security features, Electis ensures that elections carried out on our platform are virtually unbreakable, offering peace of mind about the fairness, transparency and security of the process.
Electis is transforming online voting by combining advanced technologies to ensure an easy-to-use, totally transparent and ultra-secure platform, making every vote as solid and verifiable as a digital notarial deed.
Our platform-wide technologies
Login and authentication
Django provides robust and secure user authentication, while Python's secrets library guarantees secure token generation for email verification. This ensures that only authorized users can access the system.
Election creation
This information is stored in a JSON manifest, used to generate public-private key pairs. The ElectionGuard SDK providescryptographic security for key generation, guaranteeing the integrity and security of the election configuration.
Candidate and voter management
Django 's database templates facilitate secure and efficient data management, ensuring that candidate and voter information is stored and accessed securely.
Custodian management
Custodian and key management using the ElectionGuard SDK ensures that no single entity can decrypt votes, decentralizing trust and reinforcing security.
Creating smart contracts
Smart contracts on Tezos offer a transparent and immutable record of the election, ensuring that election data is forgery-proof and publicly verifiable.
Opening the election
Ensuring that only verified users can open the election maintains security, while using the ElectionGuard SDK to open the election ensures that election processes are cryptographically secure.
Monitoring and Tracking
Django provides reliable tracking and logging capabilities, ensuring that the election process is transparent and any issues can be promptly addressed.
Election closure and decryption
Homomorphic encryption enables votes to be counted without decrypting individual votes, guaranteeing voter confidentiality. Zero Knowledge Proofs (NIZK) guarantee that the count is correct without revealing any individual votes.
Connexion et authentification
Django fournit une authentification utilisateur robuste et sécurisée, tandis que la bibliothèque secrets de Python garantit une génération sécurisée de jetons pour la vérification par email. Cela assure que seuls les utilisateurs autorisés peuvent accéder au système.
Création d'élection
Ces informations sont stockées dans un manifeste JSON, utilisé pour générer des paires de clés publique-privée. Le SDK ElectionGuard fournit une sécurité cryptographique pour la génération de clés, garantissant l'intégrité et la sécurité de la configuration de l'élection.
Gestion des candidats et des électeurs
Les modèles de base de données de Django facilitent une gestion sécurisée et efficace des données, garantissant que les informations sur les candidats et les électeurs sont stockées et consultées de manière sécurisée.
Gestion des gardiens
La gestion des gardiens et des clés à l'aide du SDK ElectionGuard garantit qu'aucune entité seule ne peut décrypter les votes, décentralisant ainsi la confiance et renforçant la sécurité.
Création de contrats intelligents
Les contrats intelligents sur Tezos offrent un enregistrement transparent et immuable de l'élection, garantissant que les données de l'élection sont infalsifiables et vérifiables publiquement.
Ouverture de l'élection
S'assurer que seuls les utilisateurs vérifiés peuvent ouvrir l'élection permet de maintenir la sécurité, tandis que l'utilisation du SDK ElectionGuard pour l'ouverture de l'élection garantit que les processus électoraux sont cryptographiquement sécurisés.
Monitoring and Tracking
Django provides reliable tracking and logging capabilities, ensuring that the election process is transparent and any issues can be promptly addressed.
Clôture de l'élection et déchiffrement
Le chiffrement homomorphique permet de compter les votes sans décrypter les votes individuels, garantissant ainsi la confidentialité des électeurs. Les preuves NIZK (Zero Knowledge Proofs) garantissent que le décompte est correct sans révéler aucun vote individuel.
We are the only ones to guarantee
Enhanced safety
Multiple defenses
Our technology relies on multiple layers of security to protect the integrity of elections. We use advanced encryption techniques, verification via blockchain and decentralized data storage. Each layer provides an additional barrier against tampering or hacking.
Voting confidentiality
Homomorphic encryption
Homomorphic encryption enables votes to be counted without ever being decrypted. As a result, votes remain encrypted and confidential during the counting process. Only the final total is revealed, ensuring that individual votes remain secret and secure from end to end.
Decentralized key management
No single point of control
In our system, no single entity holds all the keys needed to decrypt votes. Instead, keys are distributed among several trusted participants, known as guardians. Even if a key is compromised, the votes remain secure because all the guardians must work together to decrypt the final total.
Verifiable evidence
Transparency and trust
Every vote and every total is accompanied by verifiable cryptographic evidence. Anyone can check that votes have been correctly encrypted, counted and not falsified. This transparency enables independent verification of the electoral process by any observer.
Unalterable records
Immutable blockchain
Once election data has been recorded on the blockchain, it becomes immutable, i.e. it cannot be modified or deleted. Each block contains a cryptographic hash of the previous block, creating a secure data chain. Any attempt at modification would be immediately detected, ensuring that election results are permanent and unfalsifiable.
Multiple defenses
Our technology relies on multiple layers of security to protect the integrity of elections. We use advanced encryption techniques, verification via blockchain and decentralized data storage. Each layer provides an additional barrier against tampering or hacking.
Homomorphic encryption
Homomorphic encryption enables votes to be counted without ever being decrypted. As a result, votes remain encrypted and confidential during the counting process. Only the final total is revealed, ensuring that individual votes remain secret and secure from end to end.
No single point of control
In our system, no single entity holds all the keys needed to decrypt votes. Instead, keys are distributed among several trusted participants, known as guardians. Even if a key is compromised, the votes remain secure because all the guardians must work together to decrypt the final total.
Transparency and trust
Every vote and every total is accompanied by verifiable cryptographic evidence. Anyone can check that votes have been correctly encrypted, counted and not falsified. This transparency enables independent verification of the electoral process by any observer.
Immutable blockchain
Once election data has been recorded on the blockchain, it becomes immutable, i.e. it cannot be modified or deleted. Each block contains a cryptographic hash of the previous block, creating a secure data chain. Any attempt at modification would be immediately detected, ensuring that election results are permanent and unfalsifiable.
Understanding blockchain made easy
Imagine a digital notebook in which every event is indelibly recorded. Each person owns a copy of this notebook. So if someone tries to change a page, everyone else will know about it and refuse to accept the change. This system guarantees the honesty and security of the information recorded.
Electronic voting with Electis: everything you need to know
In this white paper published by the University of Tartu, you'll find an in-depth explanation of the structure and features of the Electis voting platform. Electis uses Django and ElectionGuard SDK to secure voting, as well as the Tezos blockchain for proof generation and IPFS decentralized storage for ballot verification. The white paper details how these technologies guarantee the integrity and decentralization of the electoral process.