Secure and verifiable e-voting for everyone

We support cities, companies, governmental and non-governmental organisations with transparent and secure electronic voting and surveying solutions relying on cutting-edge technologies

Homomorphic Encryption

We use ElectionGuard to carry out homomorphic encryption, which allows the solution to perform calculations on encrypted data without decrypting it first.

Web 3 public Blockchain

By utilising Tezos, a blockchain network for decentralised application, our solution increases transparency and security.


Our voting solutions allow users to track ballots and make sure that their votes have not been fiddled with in the system.


The source-code of our solutions is open. This is important to us as it provides transparency and accessibility. It allows any external auditor to verify our code.

Core Technology

Homomorphic Encryption

Tezos Blockchain & IPFS decentralized storage

Sha1 functions


Wallet-based sign-in

Benaloh challenge

Multiple guardians

Smart contracts

Schnorr proof, Chaum-Pedersen proof, Cramer-Damgard-Schoenmakers technique, Flat-Shamir heuristic


We use ElectionGuard to carry out homomorphic encryption, which allows the solution to perform calculations on encrypted data without decrypting it first. Voters receive a their ballot number and ballot hash (a fingerprint of the content of their ballot) after they cast their vote. With this information they can track their ballots in the final tally and make sure they have been cast as they intent.


A blockchain is a system to securely record information. This information is stored in blocks of information that are connected through hashes. This that makes it difficult or impossible to change, hack, or cheat the system as the ledger is distributed across a network of computers that are part of the blockchain system. Storing election results on the blockchain makes it more secure as the results cannot be manipulated post-election. Using blockchain to secure election results provides transparency as every voter can access the encrypted results to verify that their ballot has been counted correctly.


The source-code of our solutions is open. Users and external auditors can see how our platform works, validate and audit it. This creates trust in the voting process, which is a central piece of a democratic governance process. 

How it works

The best way to learn how it works is to create an election. Discover our free platform and create a safe and easy-to-implement election in a few steps.


Play Video


Frequently asked questions

Electis uses homomorphic encryption which enables the solutions to conduct calculations on encrypted ballots without ever decrypting them individually. Therefore, the final tally and results can be revealed without revealing the identity of the individual voters nor what they have voted for.

Voters can verify that their casted ballot is actually counted in the final tally. All encrypted ballots are uploaded to the IPFS decentralized storage. At the end of a vote, a unique Ballot ID is shared with the voter. With this information, they can then check if their ballot was counted in the final tally. A hash of the encrypted ballot (Fingerprint of the Ballots’ content) is also provided to the voter after casting their vote, which the voter can compare to the hash of the encrypted ballot stored on IPFS under the correspondent bulletin ID. This double-check (bulletin ID and hash) provides a full personal identification.

Our solutions are GDPR compliant by design as we don’t store any unencrypted user data. Voters’ data is immediately deleted from our servers after the voting is complete and only encrypted ballots are stored which cannot be traced back to the voter.

Yes, organizers can track voter participation. Our system stores and checks for whether the voters received the email with the OTP link or not and whether the voter cast or not. At no time can the organizers see what the voter have voted for.