Blog

Cómo elegir el software de votación electrónica adecuado para un proceso electoral

December 21, 2017

En el anterior post hablamos de las razones por las que el voto online podría ser una buena opción para tu organización. Ahora, una vez has… [...]

How to choose the right online voting software for an electoral process

December 20, 2017

In the previous post we talked about the reasons why online voting could be a good option for your organization. Now, once you have decided… [...]

5 razones para elegir el voto online

December 19, 2017

Hoy en día hay muchas cosas que hacemos a través de Internet, desde comprar hasta hacer cualquier tipo de gestión oficial. Y puede que te… [...]

5 reasons to choose online voting

December 18, 2017

Nowadays, there are tons of things we do online, from shopping to doing any kind of official arrangement. And you may think, why not voting… [...]

Anonymity, Pseudonymity and E-participation

October 24, 2017

This is a follow up to a previous post discussing the pros and cons of anonymity in e-participation. These are the main points found there… [...]

Encoding plaintexts in ElGamal

October 03, 2017

The nVotes voting system uses an ElGamal re-encryption mixnet to ensure ballot privacy. When using ElGamal encryption it is necessary to… [...]

Ballot privacy for weighted voting

September 14, 2017

In previous posts we have discussed the idea of degree of privacy and its application to weighted voting. In those posts we were concerned… [...]

Degree of privacy for weighted voting

September 11, 2017

In the two previous posts we saw a general definition of degree of privacy for voting and a method to attack privacy in weighted voting. In… [...]

A privacy attack on weighted voting

September 06, 2017

In the previous post we suggested an extension to degree of anonymity of (Diaz 2002) to voting. Recall the suggested definition for degree… [...]

Degree of privacy in voting

September 03, 2017

In this post we show a natural extension of the degree of the anonymity model from (Diaz 2002) for voting. The result is simple, but may be… [...]

Election Methods: A typed classification

August 16, 2017

From wikipedia Electoral systems consist of sets of rules that govern all aspects of the voting process: when elections occur, who is… [...]

Anonymity and e-participation: Pros and Cons

July 27, 2017

In two previous posts we discussed cryptographic techniques that allow maintaining privacy and anonymity in e-participation platforms. That… [...]

3 crypto schemes for liquid democracy (III)

July 19, 2017

In part 1 and part 2 we showed two schemes supporting liquid democracy. Scheme Mixnet/Mixnet combined results from two tallies to obtain… [...]

Secure voting – a definition

July 16, 2017

What do we mean by secure voting? The expression has different meanings depending on context. On one hand, we can speak about secure voting… [...]

Anonymous authenticated registration for e-participation

July 12, 2017

Following the previous post, we describe a two-phase process by which citizens can anonymously register with an e-participation platform… [...]

Privacy-preserving e-participation with nMix

July 06, 2017

In this post we describe a concrete design enabling privacy for e-participation platforms falling under the category of social information… [...]

Elements of a distributed voting system

May 14, 2017

In this post we describe a high-level design for a voting system resulting from combining two protocols, ipfs and nMix. Ipfs is, from… [...]

Medidas de seguridad en la I Votación Ciudadana de Madrid

February 15, 2017

Durante estos días el Ayuntamiento de Madrid está utilizando nuestra plataforma de voto seguro por internet en la I Votación Ciudadana de… [...]

Parallelizing a mixnet prototype

August 04, 2016

Voting systems can be roughly divided into three (or more recently four CLW08) types according to their central cryptographic components… [...]

Software version 3.3.0 released

July 27, 2016

Version 3.3.0 is our second release this year, just one month after 3.2.0. This incremental release includes a number of bugfixes and… [...]

A general ballot encoding method

July 22, 2016

In a previous post we described a method to encode votes for multiple choice using base-n encoding of digits. It turns out this method can… [...]

3 crypto schemes for liquid democracy (II)

July 19, 2016

In part 1 we showed the first of three schemes supporting liquid democracy. Scheme Mixnet/Mixnet combined results from two tallies to obtain… [...]

Roadmap & Plans for distributed web voting

June 23, 2016

We have been busy thinking about what are we going to do in the future. For each election administrator, there are hundred or thousands of… [...]

Software version 3.2.0 released

June 23, 2016

Version 3.2.0 is our first stable release this year, and the amount of effort put into it is staggering. It’s a parallel release of all our… [...]

A typed purely functional election

June 07, 2016

This post is a continuation of A mixnet-based secure voting protocol and A typed purely-functional state machine. We briefly describe a… [...]

Machine executable legal code

May 29, 2016

Euclides algorithm. Source: Wikipedia In the VOTEID conference held in Switzerland in 2015, some mathematicians presented a paper where they… [...]

Multiplicative vs Additive Homomorphic ElGamal

May 22, 2016

A homomorphism is a structure preserving map between two algebraic structures. Let’s consider a simple function from the integers to… [...]

3 crypto schemes for liquid democracy (I)

May 17, 2016

Liquid democracy (also known as delegative democracy) is a hybrid system that exists between representative and direct democracy. Like in a… [...]

Blockchains and bulletin boards

May 08, 2016

Bulletin boards are a key component of cryptographically secure, end-to-end verifiable voting systems. The bulleting board is a storage… [...]

Uncertainty, information and cryptography

May 07, 2016

In this post I’m going to talk about three types of uncertainty, and how the foundations of cryptography can be understood in their terms… [...]

A typed purely-functional state machine

April 29, 2016

Modeling state is a central concern for a software system of any reasonable size. It is also one of the main sources of bugs when not… [...]

A toy model of information-theoretic security

April 21, 2016

In a previous post we discussed the foundations of cryptography in terms of different types of uncertainty stemming from limited information… [...]

Almost 150.000 people vote over the Internet with nVotes

April 18, 2016

An electoral process for one of our customers (the political party Podemos) took place from the 14th to the 16th of April where almost 15… [...]

A mixnet-based secure voting protocol

April 14, 2016

This post will describe the main steps and operations that compose the cryptographic protocol of a re-encryption mixnet based voting system… [...]

Multi-ballot elections

March 27, 2016

Recently the city of madrid consulted with us about the possibility of running an election with two ballot types, an unusual but interesting… [...]

Hired! Félix Robles joins our team!

February 27, 2016

We are excited to announce that Félix Robles is the newest member of our team, formerly of Wacom and Airbus. Félix is an accomplished... [...]