Only legitimately registered voters are allowed to vote, and only once per person.
A fair election requires that voters can freely choose without anyone learning how they voted.
For widely accepted results, vote totals must be independently auditable for accuracy.
There have already been digital systems in widespread use that offer each of these properties individually. Yet accomplishing all three at the same time has been unusually challenging.
Voter Registration
Election administrator collects list of all valid voters, via the same methods as currently used.
Name | Mailing Address | Email Address | |||||
---|---|---|---|---|---|---|---|
Barton, Adam | ... | ... | |||||
Green, Elissa | ... | ... | |||||
Hauck, Erik | ... | ... | |||||
Schuster, Brad | ... | ... | |||||
Swift, Savannah | ... | ... |
New
Ballot Finalized
The official ballot is finalized, as with traditional paper elections.
There can be multiple questions, as many as the election requires.
Privacy Protectors Registration
To give voters additional confidence that the election is run fairly, administrators have the option to add SIV “Privacy Protectors”.
These are like the observers in our existing paper elections, but SIV Privacy Protectors are vastly more powerful, because they use strong cryptography to ensure every vote is private and tamper-free.
After anonymization (Step 4), the Privacy Protectors work together to unlock the votes for tallying (Step 5).
Step 1: Invitation to Vote
Election administrator sends individualized invitations to all enrolled voters.
The purpose of this step is to get each voter their Voter Auth Token, highlighted in orange.
Key Properties of Voter Auth Tokens
Here we use an easy distribution channel — a simple email. But election administrators can offer other options, including 2-factor methods with drawn signatures, SMS, TOTP, or IP address geolocation.
Admins can even send Voter Auth Tokens via traditional postal mail. In other words, SIV can match the Voter Authentication requirements of existing processes, while upgrading the return ballot process to be faster, more accessible, and fully verifiable.
See How does SIV ensure One Vote per Person? for more.
From: elections@local.gov
To: you@email.com
Subject: Your Vote Invitation
Voting for our next Mayor is now open.
Votes are accepted for the next 14 days.
Click here to securely cast your vote:
www.local.gov/vote?auth=99eaa912cf
This link is unique for you. Don't share it with anyone, or they'll be able to take your vote. (Help)
Step 2: Mark & Encrypt Your Vote
Voter fills out their ballot, which gets immediately encrypted.
SIV shows voters a simple point-and-click interface to fill out their ballot:
Who should be the next Mayor?
Verification #:
This Verification # will be publicly shown once votes are unlocked. It allows you to easily verify your vote was counted correctly, while protecting your privacy.
This unique value was generated on your own device. Don't share it with anyone.
Encrypted @ Thu Dec 12 2024 19:48:06 GMT+0000 (Coordinated Universal Time)
Encryption Formula
https://en.wikipedia.org/wiki/ElGamal_encryption
in Ristretto255 prime-order subgroup of Elliptic Curve25519
Encrypted = Encoded + (Recipient * randomizer)
Lock = (Generator * randomizer)
Public Key
7e05122f37bc7af2b0a7b34c5b29e2500e170a94789cd906f8081d8fc83ea43d
---------
Verification #: 1255-1364-8030
Step 3: Submit Encrypted Vote
The voter sends their encrypted vote, with their Auth Token, to the election administrator.
{ auth: '99eaa912cf', mayor_vote: }
If it passes, the vote is added to a public list of all votes received so far.
{ auth: 'd0d38b605a', mayor_vote: { encrypted: e6decc13ef7a387fa018ade035a03808bf0bb50c60534b78a89dbc06c45afe28, lock: 3e192c196b86fcee92252bb3eea9de5b021c10ae2de4b1208fea7c4f6aab0970 }
{ auth: '166bce0e69', mayor_vote: { encrypted: 9a0f5e4a3f1cfd8f716216dc830a95a3778fc4604d08573b9b7d5491f304977b, lock: e28f7d1d93581fa8ab8b2606bd610f5cf3ba3243f7143fb2bf378340635c902d }
{ auth: '330f7473ee', mayor_vote: { encrypted: 02c149c126e359477e7bc89b6ec66b8968516a5d0ae80cf7167247cf38d8c641, lock: fcfc35ab236ec521c4649356867dd76601a8c48fdb13c398b57ec7fcb7f03f55 }
{ auth: 'b77d95a4e9', mayor_vote: { encrypted: 8055654f434aeee853894db42dd16cf49d38b343c6a9c247dfc99022851ae230, lock: 1c87bfaff1e9d3c9d5b6992bc827963dd7ea29461ad9ba09d7d70f1d71782460 }
{ auth: '99eaa912cf', mayor_vote: undefined }
The voter is sent a confirmation that their encrypted vote has been received and accepted.
Because of the strong encryption, the election administrator still has no way to know how individual voters choose to vote.
From: elections@local.gov
To: you@email.com
Subject: Vote Confirmation
Your vote for mayor has been received. Thank you.
The final results will be posted at www.local.gov/election-results when the election closes.
Here is the encrypted vote you submitted:
{ auth: '99eaa912cf', mayor_vote: }
If you did not submit this ballot, click here to report a problem.
Step 4: Verifiable Shuffle
All the encrypted votes are then anonymized by the Privacy Protectors.
{ auth: 'd0d38b605a', mayor_vote: { encrypted: e6decc13ef7a387fa018ade035a03808bf0bb50c60534b78a89dbc06c45afe28, lock: 3e192c196b86fcee92252bb3eea9de5b021c10ae2de4b1208fea7c4f6aab0970 } }
{ auth: '166bce0e69', mayor_vote: { encrypted: 9a0f5e4a3f1cfd8f716216dc830a95a3778fc4604d08573b9b7d5491f304977b, lock: e28f7d1d93581fa8ab8b2606bd610f5cf3ba3243f7143fb2bf378340635c902d } }
{ auth: '330f7473ee', mayor_vote: { encrypted: 02c149c126e359477e7bc89b6ec66b8968516a5d0ae80cf7167247cf38d8c641, lock: fcfc35ab236ec521c4649356867dd76601a8c48fdb13c398b57ec7fcb7f03f55 } }
{ auth: 'b77d95a4e9', mayor_vote: { encrypted: 8055654f434aeee853894db42dd16cf49d38b343c6a9c247dfc99022851ae230, lock: 1c87bfaff1e9d3c9d5b6992bc827963dd7ea29461ad9ba09d7d70f1d71782460 } }
{ auth: '99eaa912cf', mayor_vote: }
{ mayor_vote: { encrypted: e6decc13ef7a387fa018ade035a03808bf0bb50c60534b78a89dbc06c45afe28, lock: 3e192c196b86fcee92252bb3eea9de5b021c10ae2de4b1208fea7c4f6aab0970 } }
{ mayor_vote: { encrypted: 9a0f5e4a3f1cfd8f716216dc830a95a3778fc4604d08573b9b7d5491f304977b, lock: e28f7d1d93581fa8ab8b2606bd610f5cf3ba3243f7143fb2bf378340635c902d } }
{ mayor_vote: { encrypted: 02c149c126e359477e7bc89b6ec66b8968516a5d0ae80cf7167247cf38d8c641, lock: fcfc35ab236ec521c4649356867dd76601a8c48fdb13c398b57ec7fcb7f03f55 } }
{ mayor_vote: { encrypted: 8055654f434aeee853894db42dd16cf49d38b343c6a9c247dfc99022851ae230, lock: 1c87bfaff1e9d3c9d5b6992bc827963dd7ea29461ad9ba09d7d70f1d71782460 } }
{ mayor_vote: }
This randomizes the order of the votes, like mixing them up in a hat.
But this alone isn't enough to properly anonymize them, because the encrypted data — the outsides of our metaphorical locked safes — are still distinguishable. Any computer could quickly reconstruct the original list.
{mayor_vote: { encrypted: e6decc13ef7a387fa018ade035a03808bf0bb50c60534b78a89dbc06c45afe28, lock: 3e192c196b86fcee92252bb3eea9de5b021c10ae2de4b1208fea7c4f6aab0970 } }
{mayor_vote: { encrypted: 9a0f5e4a3f1cfd8f716216dc830a95a3778fc4604d08573b9b7d5491f304977b, lock: e28f7d1d93581fa8ab8b2606bd610f5cf3ba3243f7143fb2bf378340635c902d } }
{mayor_vote: { encrypted: 02c149c126e359477e7bc89b6ec66b8968516a5d0ae80cf7167247cf38d8c641, lock: fcfc35ab236ec521c4649356867dd76601a8c48fdb13c398b57ec7fcb7f03f55 } }
{mayor_vote: { encrypted: 8055654f434aeee853894db42dd16cf49d38b343c6a9c247dfc99022851ae230, lock: 1c87bfaff1e9d3c9d5b6992bc827963dd7ea29461ad9ba09d7d70f1d71782460 } }
{mayor_vote: { encrypted: 02c149c126e359477e7bc89b6ec66b8968516a5d0ae80cf7167247cf38d8c641, lock: fcfc35ab236ec521c4649356867dd76601a8c48fdb13c398b57ec7fcb7f03f55 } }
Now, the shuffled list is cryptographically mixed, with the original Auth Tokens unlinkable.
Their shuffled + re-encrypted list is now published publicly.
For strong cryptographic privacy, Privacy Protector #2 then repeats this same shuffle + re-encryption process, starting with the mixed list from Privacy Protector #1.
This way, all of the Privacy Protectors independently shuffle the encrypted votes, like multiple people shuffling a deck of cards, then handing it off to the next person.
This design creates multiple fail-safes. Even if some Privacy Protectors' devices are compromised, vote privacy can still be protected.
Step 5: Votes Unlocked & Tallied
The Privacy Protectors then work together to Unlock the final shuffled list.
Any voter can Search (Ctrl+F) to find their individual submission, via their Verification #, and see that their vote was counted correctly.
Anyone can independently tally the vote totals themselves.
Only submissions from authenticated voters were accepted, which can be verified with standard Risk-Limiting Audits after the election.
{ mayor_vote: 'Jane Kim', verification: '2609-8495-8645' }
{ mayor_vote: 'Angela Alioto', verification: '9019-9276-1698' }
{ mayor_vote: 'Jane Kim', verification: '9378-2460-2174' }
{ mayor_vote: 'Angela Alioto', verification: '1698-4962-3249' }
{ mayor_vote: 'undefined', verification: '1255-1364-8030' }
We've now succeeded to run an election that's authenticated, private, and completely verifiable.
For more information, see the Frequently Asked Questions page, or reach out to team@siv.org.