Worldwide Leader in Internet Voting
With over 87% market share worldwide in Internet voting, Scytl Online Voting is the most trusted product for your election automation solutions.
Significant Online Voting References
Scytl Online Voting has been successfully implemented in the United States for presidential and general elections. Scytl’s online voting solution has also been used in France, Switzerland, the United Kingdom, Norway, Australia, India, and the United Arab Emirates, among others. Additionally, Scytl is the only Internet voting provider that has been audited by twelve countries.
Familiar Voting Process
Scytl Online Voting reproduces a similar process to paper-based elections, allowing people with varying levels of computer proficiency to vote easily without any additional training. The online balloting system can be configured to replicate any paper ballot style.
Retain Control of the Voting Process
Similar to paper-based processes, the control of the electronic voting process remains exclusively in the hands of the electoral board. No staff member has access to the keys required to see or modify the opinions cast by the citizens unless specific permissions are granted.
Available on Google Android, Apple iOS, and Blackberry
Scytl’s online voting encryption technology is compatible with Google Android™, Blackberry, and Apple® iOS devices, offering the same security levels as its computer-based version. By encrypting the ballot on the citizen’s device before it is cast, Scytl is the only provider able to guarantee end-to-end security from the citizen to the final tally.
Adapted for Voters with Disabilities
Scytl takes into account the specific needs of voters with disabilities and enables them to participate in elections without assistance and fully guarantees their privacy. Scytl’s online voting system supports multiple assistive devices to facilitate accessibility, from screen readers to sip & puff devices.
Internet Voting Flexibility
Scytl Online Voting can be adapted to any ballot format and configuration. Scytl’s Internet voting product also supports multiple languages. Scytl has provided solutions in Russian, Gujarati, Arabic, Mandarin, and Tagalog.
With Scytl Online Voting, voters are provided with a voting receipt that contains a unique identifier that enables voters to check that their votes have reached the Electoral Board and have been counted. The random nature of Scytl’s voting receipt impedes the disclosure of the ballot choices selected, therefore impeding any attempt of vote coercion or vote selling.
Digitally signing the ballot on the voter’s device before it is transmitted to the digital ballot box server to be stored is one of the critical security features offered by Scytl’s online voting systems. This prevents anyone, including system administrators, from modifying the voter’s selection and jeopardizing the election results
Scytl’s Internet voting solution can be audited by independent experts before, during, and after the voting day. Scytl’s technology has been audited by independent experts that have consistently found its security and technology to be accurate and reliable. These organizations include the Florida Department of State, the Center for Advanced Security Research, the U.S. Air Force Institute of Technology, the French Security Agency, Fribourg University in Switzerland, and Trondheim University in Norway. Scytl’s Internet voting solution provides “individual verifiability” features to allow citizens to verify the cast opinions have been recorded and counted as intended.
End-to-end data encryption ensures the secrecy of both voter identity and his/ her voting preferences at all times. Votes are encrypted in the voter’s voting device before they are cast and can only be decrypted by the Electoral Board.. By the time votes are being deciphered, the separation and shuffling of the voter’s information from his/her actual vote ensures complete ballot anonymity.
Scytl's proprietary technology named “Immutable logs” prevents log files from being modified. Immutable logs are cryptographically protected via a patented technology ensuring it is not possible for these to be tampered with. This technology combines cryptographic HMAC techniques, digital signatures, random and temporary cryptographic secret keys, and short-time checkpoints to create a secure chain of logs that can be verified by an auditor.