Secure Electronic Voting
Scytl Kiosk Voting embeds unique security features that provide transparency and trust. As part of Scytl online voting solution, it is the most trusted product for your election automation processes.
Significant Online Voting References
Scytl’s electronic voting solutions have been successfully implemented in the United States, France, Switzerland, the United Kingdom, Norway, Australia, India, and the United Arab Emirates, among others. Additionally, Scytl is the only Internet voting provider that has been audited by twelve countries.
Familiar Voting Process
Scytl Kiosk Voting reproduces a similar process to paper-based elections, allowing people with varying levels of computer proficiency to vote easily without any additional training. The online balloting system can be configured to replicate any paper ballot style.
Retain Control of the Voting Process
Similar to paper-based processes, the control of the kiosk voting process remains exclusively in the hands of the electoral board. No staff member has access to the keys required to see or modify the votes cast by the citizens unless specific permissions are granted.
Adapted to the Blind and Visually Impaired
Scytl takes into account the specific needs of voters with disabilities and enables them to participate in elections without assistance and fully guarantees their privacy. Scytl’s online voting system supports multiple assistive devices to facilitate accessibility, from screen readers to sip & puff devices.
Touch Screen Interface
Scytl Kiosk Voting is easy to use for all voters. It provides a user-friendly touch screen interface to facilitate the voting process for all voters, regardless of literacy level or computer proficiency.
Control of the Voting Process
Similarly to paper-based elections, the control of the kiosk voting process remains exclusively in the hands of the Electoral Board. System administrators or any other officials with privileges in the system cannot see or modify the votes.
Scytl Kiosk Voting provides voters with a special “counted-as-cast” receipt that informs the voter that his or her ballot was properly recorded by the system. After counting is complete, the receipt can be used to validate whether the cast ballot was included in the final count. This is a patented and powerful feature of Scytl’s kiosk voting technology.
Digitally signing the ballot on the voting kiosk before it is stored on the digital ballot box is one of the critical security features offered by Scytl’s electronic voting systems. This prevents anyone, including system administrators, from modifying the voter’s selection and jeopardizing the election results.
Scytl’s Internet voting solutions can be audited by independent experts before, during, and after Election Day. Scytl’s technology has been audited by independent organizations and academic experts that have consistently found its security and technology to be accurate and reliable. These organizations include the Florida Department of State, the Center for Advanced Security Research, the U.S. Air Force Institute of Technology, the French Security Agency, Fribourg University in Switzerland and Trondheim University in Norway. Scytl’s kiosk voting solution can provide “individual verifiability” features to allow voters to verify the votes hasve been recorded and counted as intended.
End-to-end data encryption ensures the secrecy of both voter identity and his or her voting preferences at all times. Votes are encrypted in the kiosk before they are cast and can only be decrypted by the Electoral Board. By the time votes are deciphered, the separation and shuffling of the voter’s information from his or her actual vote ensures complete vote anonymity.
Scytl products and applications use a proprietary technology named “Immutable logs” which prevents log files from being modified. Immutable logs are cryptographically protected through a patented technology to ensure it is not possible for these to be tampered with. This technology combines cryptographic HMAC techniques, digital signatures, random and temporary cryptographic secret keys, and short-time checkpoints to create a secure chain of logs that can be verified by an auditor.