Secure, transparent voting technology
Our aim is to create an election platform that is tamper-proof, transparent and highly secure, setting a new standard of excellence in electronic voting.
The Electis Pillars of Security and Transparency
Our Electis platform is distinguished by several advanced features that guarantee the security, transparency and verifiability of electronic elections. These innovative features ensure that every vote is counted confidentially and accurately, while enabling voters to verify the integrity of the electoral process for themselves.
Homomorphic encryption
This allows encrypted votes to be combined into encrypted totals, maintaining confidentiality and enabling votes to be counted securely.
Verifiable End-to-End Evidence
Voters receive a verification code with their encrypted vote, enabling them to check that their vote has been included in the final total.
Non-Interactive Evidence of Zero Knowledge (NIZK)
Various proofs ensure that the keys are correctly chosen, the bulletins correctly formed and the decrypted totals correspond to the claimed values without revealing any sensitive information.
User authentication
Users register with an email and password, receive a verification link and activate their account via a generated token. OTP login allows voters to participate without full registration, and two-factor authentication adds an extra layer of security.
Key ceremony
Custodians share and verify encryption keys before the election opens, guaranteeing a secure key management process.
Casting and checking ballots
Voters cast encrypted ballots, receive a verification code, and can later verify that their vote has been counted.
By combining these advanced security features, Electis ensures that elections carried out on our platform are virtually unbreakable, offering peace of mind about the fairness, transparency and security of the process.
Electis is transforming online voting by combining advanced technologies to ensure an easy-to-use, totally transparent and ultra-secure platform, making every vote as solid and verifiable as a digital notarial deed.
Our platform-wide technologies
Login and authentication
Django provides robust and secure user authentication, while Python's secrets library guarantees secure token generation for email verification. This ensures that only authorized users can access the system.
Election creation
This information is stored in a JSON manifest, used to generate public-private key pairs. The ElectionGuard SDK providescryptographic security for key generation, guaranteeing the integrity and security of the election configuration.
Candidate and voter management
Django 's database templates facilitate secure and efficient data management, ensuring that candidate and voter information is stored and accessed securely.
Custodian management
Custodian and key management using the ElectionGuard SDK ensures that no single entity can decrypt votes, decentralizing trust and reinforcing security.
Creating smart contracts
Smart contracts on Tezos offer a transparent and immutable record of the election, ensuring that election data is forgery-proof and publicly verifiable.
Opening the election
Ensuring that only verified users can open the election maintains security, while using the ElectionGuard SDK to open the election ensures that election processes are cryptographically secure.
Monitoring and Tracking
Django provides reliable tracking and logging capabilities, ensuring that the election process is transparent and any issues can be promptly addressed.
Election closure and decryption
Homomorphic encryption enables votes to be counted without decrypting individual votes, guaranteeing voter confidentiality. Zero Knowledge Proofs (NIZK) guarantee that the count is correct without revealing any individual votes.
Connection and Authentication
Django provides robust and secure user authentication, while Python's secrets library ensures secure token generation for email verification. This ensures that only authorized users can access the system.
Election Creation
This information is stored in a JSON manifest, used to generate public-private key pairs. The ElectionGuard SDK provides cryptographic security for key generation, ensuring the integrity and security of the election configuration.
Candidate and Voter Management
Django's database models facilitate secure and efficient data management, ensuring that information about candidates and voters is stored and accessed securely.
Guardian Management
Managing guardians and keys with the ElectionGuard SDK ensures that no single entity can decrypt the votes, decentralizing trust and enhancing security.
Smart Contract Creation
Smart contracts on Tezos provide a transparent and immutable record of the election, ensuring that election data is tamper-proof and publicly verifiable.
Election Opening
Ensuring that only verified users can open the election maintains security, while using the ElectionGuard SDK for opening the election ensures that electoral processes are cryptographically secure.
Monitoring and Tracking
Django provides reliable tracking and logging capabilities, ensuring that the election process is transparent and any issues can be promptly addressed.
Election Closure and Decryption
Homomorphic encryption allows votes to be counted without decrypting individual votes, ensuring voter privacy. Zero Knowledge Proofs (NIZK) ensure that the tally is correct without revealing any individual vote.
We are the only ones to guarantee
Enhanced safety
Multiple defenses
Our technology relies on multiple layers of security to protect the integrity of elections. We use advanced encryption techniques, verification via blockchain and decentralized data storage. Each layer provides an additional barrier against tampering or hacking.
Voting confidentiality
Homomorphic encryption
Homomorphic encryption enables votes to be counted without ever being decrypted. As a result, votes remain encrypted and confidential during the counting process. Only the final total is revealed, ensuring that individual votes remain secret and secure from end to end.
Decentralized key management
No single point of control
In our system, no single entity holds all the keys needed to decrypt votes. Instead, keys are distributed among several trusted participants, known as guardians. Even if a key is compromised, the votes remain secure because all the guardians must work together to decrypt the final total.
Verifiable evidence
Transparency and trust
Every vote and every total is accompanied by verifiable cryptographic evidence. Anyone can check that votes have been correctly encrypted, counted and not falsified. This transparency enables independent verification of the electoral process by any observer.
Unalterable records
Immutable blockchain
Once election data has been recorded on the blockchain, it becomes immutable, i.e. it cannot be modified or deleted. Each block contains a cryptographic hash of the previous block, creating a secure data chain. Any attempt at modification would be immediately detected, ensuring that election results are permanent and unfalsifiable.
Multiple defenses
Our technology relies on multiple layers of security to protect the integrity of elections. We use advanced encryption techniques, verification via blockchain and decentralized data storage. Each layer provides an additional barrier against tampering or hacking.
Homomorphic encryption
Homomorphic encryption enables votes to be counted without ever being decrypted. As a result, votes remain encrypted and confidential during the counting process. Only the final total is revealed, ensuring that individual votes remain secret and secure from end to end.
No single point of control
In our system, no single entity holds all the keys needed to decrypt votes. Instead, keys are distributed among several trusted participants, known as guardians. Even if a key is compromised, the votes remain secure because all the guardians must work together to decrypt the final total.
Transparency and trust
Every vote and every total is accompanied by verifiable cryptographic evidence. Anyone can check that votes have been correctly encrypted, counted and not falsified. This transparency enables independent verification of the electoral process by any observer.
Immutable blockchain
Once election data has been recorded on the blockchain, it becomes immutable, i.e. it cannot be modified or deleted. Each block contains a cryptographic hash of the previous block, creating a secure data chain. Any attempt at modification would be immediately detected, ensuring that election results are permanent and unfalsifiable.
Understanding blockchain made easy
Imagine a digital notebook in which every event is indelibly recorded. Each person owns a copy of this notebook. So if someone tries to change a page, everyone else will know about it and refuse to accept the change. This system guarantees the honesty and security of the information recorded.
Electronic voting with Electis: everything you need to know
In this white paper published by the University of Tartu, you'll find an in-depth explanation of the structure and features of the Electis voting platform. Electis uses Django and ElectionGuard SDK to secure voting, as well as the Tezos blockchain for proof generation and IPFS decentralized storage for ballot verification. The white paper details how these technologies guarantee the integrity and decentralization of the electoral process.