The Secrecy of the Ballot in POLYAS CORE 3
In order to ensure voting secrecy, the completed ballot papers are encrypted on the voters’ devices and forwarded to the ballot box. The ballot papers are then cryptographically “shuffled”. This ensures that the identity of the voter cannot be inferred from the ballot paper. For the final result, the ballot papers are decrypted and counted in the ballot box.
The POLYAS CORE 3 voting system relies on the asymmetric encryption methods to protect the secrecy of the ballot. Thus, for each election with POLYAS CORE 3 a key pair is generated. This consists of a secret private key and a public key. The public key is used during the election to encrypt the ballots. Decryption of the ballots is only possible if the appropriate private key is used.
The identity of the eligible voters is anonymized while voting with POLYAS CORE 3 and is separated from the voting process. It is thus not possible to deduce the voters’ identity from the vote cast in the ballot box and the secrecy of the ballot is maintained.
To be able to provide you with the highest level of security for your online election, we are constantly searching for additional security measures.
Learn more about the research conducted by POLYAS!