Scytl Results Consolidation incorporates strong cryptographic protection in order to prevent malicious interference. Cryptographic and/or biometric receipts are provided to polling station committees and can be attached to the physical ballot boxes to ensure their integrity during their shipping to a central tallying center. These receipts chain all the transactions making it possible for the election authority to be able to reconstruct a given operation.
Scytl’s consolidation product can support different electoral and canvassing models and can canvass ballots from different voting channels. Several interfaces for reporting results are available, including manual data entry and EML files. Scytl Results Consolidation is composed of independent components that can provide high levels of scalability, flexibility, and redundancy, using protected secure paths.
Faster Tabulation Speed
Being able to obtain and publish election results very quickly after the closing of the polls helps electoral authorities show transparency and mitigate speculation and rumors, even if the results are provisional.
Control in the Hands of the Election Authority
The central electoral authority supervises the whole operation and only its authorized members are able to start the tallying process on the consolidated data, even if not all the precincts have finished reporting the local tabulated results.
With Scytl Results Consolidation, polling stations can transmit results by telephone, PDA, or computer. Cryptographic and/or biometric receipts can be attached to ballot boxes to ensure their integrity. Provisional results can be recorded in a centralized or decentralized system.
Scytl’s platform consolidates the results from all the polling stations including both paper and electronic ballots. Scytl Results also tabulates results from remote voting channels such as Internet voting, mail voting, phone voting, and others.
Electronic Vote Counting
Electronic votes are securely transferred to Scytl’s “Mixing” service that decrypts the votes and breaks the correlation between the vote and the voter, protecting voters’ privacy. A strong authentication is required to ensure that nobody can decrypt the votes without the election authority’s consent.
Scytl’s platform can be adapted to all types of algorithms. Once the algorithm has been applied, the system automatically allocates the seats.
Results Integrity and Authenticity
Scytl Results Consolidation protects the integrity and authenticity of the results received from different voting channels or from the different polling places, in a way that it is not possible for a malicious attacker to modify the results or try to add bogus results to the consolidation process. These protection mechanisms use advanced cryptographic algorithms like HMACs and digital signatures.
Scytl’s product has been integrated with different communication technologies in order to ensure the availability of results even those coming from isolated areas where technological resources are limited.
Scytl products and applications use a proprietary technology named “Immutable logs” which prevents log files from being modified. Immutable logs are cryptographically protected through a patented technology to ensure it is not possible for these to be tampered with. This technology combines cryptographic HMAC techniques, digital signatures, random and temporary cryptographic secret keys, and short-time checkpoints to create a secure chain of logs that can be verified by an auditor.