Pre-registration, petition collection and anonymized e-voting were in our radar when we designed the respective elements of the e-voting Platform.
Each step of the voting procedure requires different authentication, verification and administration requirements which are typically combined with unique regulations or internal company processes.
We love challenges, we love adventures.
Combined application of e-voter card, e-id, company registry cards and multiple biometric authentication and verification methods gives the flexibility to support different requirements and assure the right and free will.
Wide range of biometric verification, authentication, face recognition and liveness detection services are enhanced by the capabilities of our data science and artificial intelligence excellence team.
E-voting is not just about cryptography but also about secure storage and database archival. Our quantum safe research work organically enriches the security level of the solution. We continuously discovering potential improvement of the platform in security directions as well.
We currently work on secure voting protocol for score-based voting rules, where independent tellers perform the tallying procedure. The protocol outputs the winning nominee(s) while preserving the privacy of the voters and the secrecy of the ballots. It may offer perfect secrecy, in the sense that apart from the desired output, all other information – the ballots, intermediate values, and the final scores received by each of the nominee– is not disclosed to any party, including the vote counters.
Such security will increase the voters’ confidence and, consequently, encourage them to vote according to their true preferences.
During our work, our main goals were developing the pre-election registration, the petition collection and the e-voting/election system. After successful competitor analysis, requirement assessment and planning, we prepared the solution for a regional government office with the cooperation of the Hungarian Association for Electronic Signature.
Biometric verification, e-id reading, authentication, fillable digital forms, legally binding digital signature easily fit into the system, where we offered system integration and support activities. The next-generation solution provides a scalable architecture, data protection and encrypted data management to support time-critical processes, even with extremely high data traffic.