Secure, transparent voting technology

Remote voting applications face many challenges in guaranteeing fully auditable and secure elections. Electis simplifies this process by integrating the latest research into a practical and functional e-voting platform.
Our aim is to create an election platform that is tamper-proof, transparent and highly secure, setting a new standard of excellence in electronic voting.
pillars

The Electis Pillars of Security and Transparency

Our Electis platform is distinguished by several advanced features that guarantee the security, transparency and verifiability of electronic elections. These innovative features ensure that every vote is counted confidentially and accurately, while enabling voters to verify the integrity of the electoral process for themselves.

Homomorphic encryption

This allows encrypted votes to be combined into encrypted totals, maintaining confidentiality and enabling votes to be counted securely.

Verifiable End-to-End Evidence

Voters receive a verification code with their encrypted vote, enabling them to check that their vote has been included in the final total.

Non-Interactive Evidence of Zero Knowledge (NIZK)

Various proofs ensure that the keys are correctly chosen, the bulletins correctly formed and the decrypted totals correspond to the claimed values without revealing any sensitive information.

User authentication

Users register with an email and password, receive a verification link and activate their account via a generated token. OTP login allows voters to participate without full registration, and two-factor authentication adds an extra layer of security.

Key ceremony

Custodians share and verify encryption keys before the election opens, guaranteeing a secure key management process.

Casting and checking ballots

Voters cast encrypted ballots, receive a verification code, and can later verify that their vote has been counted.

Django

A high-level Python web framework that promotes rapid development and clean, pragmatic design. It manages user authentication, database interactions and the overall structure of the application.

Tezos

Using the Tezos blockchain to generate proof of election via a smart contract ensures the integrity and transparency of the electoral process.

IPFS

Developed by Microsoft, ElectionGuard ensures end-to-end verifiability of elections. It ensures that all votes are correctly encrypted, counted and verified, without revealing voters' choices.

ElectionGuard

The IPFS network is used to share evidence and ballots with the public, allowing anyone to verify that the integrity of the election has not been compromised.

By combining these advanced security features, Electis ensures that elections carried out on our platform are virtually unbreakable, offering peace of mind about the fairness, transparency and security of the process.

For platform stability

We integrate Django, a robust web framework, to ensure the stability and scalability of our voting platform, providing a reliable foundation for secure and efficient elections.

Decentralized storage and privacy

Integration with IPFS (InterPlanetary File System) and Mixnet enables decentralized storage and transmission of voter data, ensuring robust privacy protection and data availability during elections.

Tezos blockchain for immutable registrations:

Using Tezos blockchain technology, we secure voting records immutably and transparently, enhancing trust and verifiability throughout the electoral cycle.

IPFS and Mixnet for Decentralized Storage and Confidentiality

Integration with IPFS (InterPlanetary File System) and Mixnet enables decentralized storage and transmission of voter data, ensuring robust privacy protection and data availability during elections.

Electis is transforming online voting by combining advanced technologies to ensure an easy-to-use, totally transparent and ultra-secure platform, making every vote as solid and verifiable as a digital notarial deed.

Our platform-wide technologies

login

Login and authentication

Django provides robust and secure user authentication, while Python's secrets library guarantees secure token generation for email verification. This ensures that only authorized users can access the system.

file

Election creation

This information is stored in a JSON manifest, used to generate public-private key pairs. The ElectionGuard SDK providescryptographic security for key generation, guaranteeing the integrity and security of the election configuration.

list

Candidate and voter management

Django 's database templates facilitate secure and efficient data management, ensuring that candidate and voter information is stored and accessed securely.

key

Custodian management

Custodian and key management using the ElectionGuard SDK ensures that no single entity can decrypt votes, decentralizing trust and reinforcing security.

documento

Creating smart contracts

Smart contracts on Tezos offer a transparent and immutable record of the election, ensuring that election data is forgery-proof and publicly verifiable.

voto-1

Opening the election

Ensuring that only verified users can open the election maintains security, while using the ElectionGuard SDK to open the election ensures that election processes are cryptographically secure.

monitoring

Monitoring and Tracking

Django provides reliable tracking and logging capabilities, ensuring that the election process is transparent and any issues can be promptly addressed.

resultats

Election closure and decryption

Homomorphic encryption enables votes to be counted without decrypting individual votes, guaranteeing voter confidentiality. Zero Knowledge Proofs (NIZK) guarantee that the count is correct without revealing any individual votes.

login

Connection and Authentication

Django provides robust and secure user authentication, while Python's secrets library ensures secure token generation for email verification. This ensures that only authorized users can access the system.

file

Election Creation

This information is stored in a JSON manifest, used to generate public-private key pairs. The ElectionGuard SDK provides cryptographic security for key generation, ensuring the integrity and security of the election configuration.

list

Candidate and Voter Management

Django's database models facilitate secure and efficient data management, ensuring that information about candidates and voters is stored and accessed securely.

key

Guardian Management

Managing guardians and keys with the ElectionGuard SDK ensures that no single entity can decrypt the votes, decentralizing trust and enhancing security.

documento

Smart Contract Creation

Smart contracts on Tezos provide a transparent and immutable record of the election, ensuring that election data is tamper-proof and publicly verifiable.

voto-1

Election Opening

Ensuring that only verified users can open the election maintains security, while using the ElectionGuard SDK for opening the election ensures that electoral processes are cryptographically secure.

monitoring

Monitoring and Tracking

Django provides reliable tracking and logging capabilities, ensuring that the election process is transparent and any issues can be promptly addressed.

resultats

Election Closure and Decryption

Homomorphic encryption allows votes to be counted without decrypting individual votes, ensuring voter privacy. Zero Knowledge Proofs (NIZK) ensure that the tally is correct without revealing any individual vote.

We are the only ones to guarantee

Enhanced safety

Multiple defenses

Our technology relies on multiple layers of security to protect the integrity of elections. We use advanced encryption techniques, verification via blockchain and decentralized data storage. Each layer provides an additional barrier against tampering or hacking.

Voting confidentiality

Homomorphic encryption

Homomorphic encryption enables votes to be counted without ever being decrypted. As a result, votes remain encrypted and confidential during the counting process. Only the final total is revealed, ensuring that individual votes remain secret and secure from end to end.

Decentralized key management

No single point of control

In our system, no single entity holds all the keys needed to decrypt votes. Instead, keys are distributed among several trusted participants, known as guardians. Even if a key is compromised, the votes remain secure because all the guardians must work together to decrypt the final total.

Verifiable evidence

Transparency and trust

Every vote and every total is accompanied by verifiable cryptographic evidence. Anyone can check that votes have been correctly encrypted, counted and not falsified. This transparency enables independent verification of the electoral process by any observer.

Unalterable records

Immutable blockchain

Once election data has been recorded on the blockchain, it becomes immutable, i.e. it cannot be modified or deleted. Each block contains a cryptographic hash of the previous block, creating a secure data chain. Any attempt at modification would be immediately detected, ensuring that election results are permanent and unfalsifiable.

Multiple defenses

Our technology relies on multiple layers of security to protect the integrity of elections. We use advanced encryption techniques, verification via blockchain and decentralized data storage. Each layer provides an additional barrier against tampering or hacking.

Homomorphic encryption

Homomorphic encryption enables votes to be counted without ever being decrypted. As a result, votes remain encrypted and confidential during the counting process. Only the final total is revealed, ensuring that individual votes remain secret and secure from end to end.

No single point of control

In our system, no single entity holds all the keys needed to decrypt votes. Instead, keys are distributed among several trusted participants, known as guardians. Even if a key is compromised, the votes remain secure because all the guardians must work together to decrypt the final total.

Transparency and trust

Every vote and every total is accompanied by verifiable cryptographic evidence. Anyone can check that votes have been correctly encrypted, counted and not falsified. This transparency enables independent verification of the electoral process by any observer.

Immutable blockchain

Once election data has been recorded on the blockchain, it becomes immutable, i.e. it cannot be modified or deleted. Each block contains a cryptographic hash of the previous block, creating a secure data chain. Any attempt at modification would be immediately detected, ensuring that election results are permanent and unfalsifiable.

Understanding blockchain made easy

Imagine a digital notebook in which every event is indelibly recorded. Each person owns a copy of this notebook. So if someone tries to change a page, everyone else will know about it and refuse to accept the change. This system guarantees the honesty and security of the information recorded.

blockchain img 1
blockchain img 1

Electronic voting with Electis: everything you need to know

In this white paper published by the University of Tartu, you'll find an in-depth explanation of the structure and features of the Electis voting platform. Electis uses Django and ElectionGuard SDK to secure voting, as well as the Tezos blockchain for proof generation and IPFS decentralized storage for ballot verification. The white paper details how these technologies guarantee the integrity and decentralization of the electoral process.