Scytl Results Consolidation

  • Pre-Election
  • Election Day
  • Post-Election
  • Governance
  • Professional Services
Scytl-Results-Consolidation

Scytl Results Consolidation securely collects and aggregates data electronically from all polling places in an election. Being able to obtain and publish election results quickly and accurately after the closing of the polls helps electoral offices show transparency and control of the election process.

With Scytl’s consolidation product, thousands of users can update the results from the precincts in a short period of time. Speed-up the counting and tabulation process, consolidating the results from different voting channels, and publish results in hours rather than days with Scytl Results Consolidation.

Results
Click to enlarge
  • Benefits
  • Features
  • Security

Ballot Security
Scytl Results Consolidation incorporates strong cryptographic protection in order to prevent malicious interference. Cryptographic and/or biometric receipts are provided to polling station committees and can be attached to the physical ballot boxes to ensure their integrity during their shipping to a central tallying center. These receipts chain all the transactions making it possible for the election authority to be able to reconstruct a given operation.

System Flexibility
Scytl’s consolidation product can support different electoral and canvassing models and can canvass ballots from different voting channels. Several interfaces for reporting results are available, including manual data entry and EML files. Scytl Results Consolidation is composed of independent components that can provide high levels of scalability, flexibility, and redundancy, using protected secure paths.

Faster Tabulation Speed
Being able to obtain and publish election results very quickly after the closing of the polls helps electoral authorities show transparency and mitigate speculation and rumors, even if the results are provisional.

Control in the Hands of the Election Authority
The central electoral authority supervises the whole operation and only its authorized members are able to start the tallying process on the consolidated data, even if not all the precincts have finished reporting the local tabulated results.

Results Transmission
With Scytl Results Consolidation, polling stations can transmit results by telephone, PDA, or computer. Cryptographic and/or biometric receipts can be attached to ballot boxes to ensure their integrity. Provisional results can be recorded in a centralized or decentralized system.

Results Consolidation
Scytl’s platform consolidates the results from all the polling stations including both paper and electronic ballots. Scytl Results also tabulates results from remote voting channels such as Internet voting, mail voting, phone voting, and others.

Electronic Vote Counting
Electronic votes are securely transferred to Scytl’s “Mixing” service that decrypts the votes and breaks the correlation between the vote and the voter, protecting voters’ privacy. A strong authentication is required to ensure that nobody can decrypt the votes without the election authority’s consent.

Seat Allocation
Scytl’s platform can be adapted to all types of algorithms. Once the algorithm has been applied, the system automatically allocates the seats.

Results Integrity and Authenticity
Scytl Results Consolidation protects the integrity and authenticity of the results received from different voting channels or from the different polling places, in a way that it is not possible for a malicious attacker to modify the results or try to add bogus results to the consolidation process. These protection mechanisms use advanced cryptographic algorithms like HMACs and digital signatures.

Results Availability
Scytl’s product has been integrated with different communication technologies in order to ensure the availability of results even those coming from isolated areas where technological resources are limited.

Auditability
Scytl products and applications use a proprietary technology named “Immutable logs” which prevents log files from being modified. Immutable logs are cryptographically protected through a patented technology to ensure it is not possible for these to be tampered with. This technology combines cryptographic HMAC techniques, digital signatures, random and temporary cryptographic secret keys, and short-time checkpoints to create a secure chain of logs that can be verified by an auditor.

Success Cases

Related Products with Scytl Results Consolidation

This Website uses its own cookies and third parties’ cookies, either session or persistent cookies which are necessary for the performance of the Website or which have an analytical and statistical objective. If you continue browsing, we consider that you accept its use.
For further information click here.