-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathmain.html
More file actions
161 lines (145 loc) · 9.18 KB
/
main.html
File metadata and controls
161 lines (145 loc) · 9.18 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
<!-- Hero Section -->
<section class="hero">
<div class="container">
<h1>Evoting for Democracy</h1>
<p class="description">
Simple centralised deployment with voter-verifiable results and accessible vote privacy
</p>
<div class="cta-buttons">
<a href="/vision" class="btn btn-secondary">Why It Matters?</a>
<a href="#" class="btn btn-secondary" onclick="openDemoModal()">Watch Demo</a>
<a href="/solution" class="btn btn-secondary">Technical Overview</a>
</div>
<!-- Simple text link for prototype -->
<div class="cta-buttons secondary-cta">
<a href="/downloads" class="btn-prototype">Download Development Prototype</a>
</div>
</div>
</section>
<!-- Problem Section -->
<section class="section problem-section" id="problem">
<div class="container">
<h2>Why E-voting Systems Fail Democracy</h2>
<p class="section-subtitle">
Democracy is undermined when the result of the vote depends on the honesty of the authorities that are not accountable to voters</p>
<div class="problem-list">
<div class="problem-item">
<h4>Deployment Complexity Forces Poor Choices</h4>
<p>Ontario's 2022 municipal elections demonstrate the real-world impact: municipalities predominantly selected simple black-box systems without individual verifiability, explicitly citing operational complexity of E2E verifiable systems as the primary deterrent while also leaving vote privacy to be completely dependent on the vendor.</p>
</div>
<div class="problem-item">
<h4>Centralisation Makes Fraud Easy</h4>
<p>Electronic voting systems centralize critical functions, creating single points of failure where one successful attack could manipulate thousands or millions of votes simultaneously. Unlike paper systems that require physical access to many locations, centralized e-voting creates attractive targets for large-scale fraud that's easier to execute and conceal.</p>
</div>
<div class="problem-item">
<h4>Decryption Ceremony Limits Privacy</h4>
<p>E-voting systems depending on threshold decryption ceremonies face a fundamental dilemma: technical errors by participants may leave election results permanently unencrypted, while low thresholds allow small corrupt minorities to break privacy guarantees.</p>
</div>
<div class="problem-item">
<h4>Lack of Everlasting Privacy</h4>
<p>Most E2E systems rely on computational privacy assumptions that may be broken by future cryptographic advances or quantum computing. This limitation is often compensated by eliminating eligibility verifiability and/or withholding election evidence from the public.</p>
</div>
<div class="problem-item">
<h4>Authority-Dependent Verifiability</h4>
<p>Even in properly deployed E2E systems, verification capabilities remain concentrated with election authorities, requiring voters to trust institutional honesty and competence rather than enabling independent verification. This leads voters to ask a pertinent question: If vote results have been manipulated, why wouldn't one also corrupt the vote verification process?</p>
</div>
<div class="problem-item">
<h4>Vote Buying and Coercion Risks</h4>
<p>Systems that provide voters with receipts or verification tokens create opportunities for vote buying and coercion, as voters can prove how they voted to third parties, undermining the secret ballot principle fundamental to democratic elections. The risk is even more amplified when the vote buyer can remain fully anonymous.</p>
</div>
</div>
<div class="quote-box">
An e-voting system where voters must trust intitutional promises that their votes were counted correctly and the final tally consists only of legitimate voters is merely a survey with extra steps.
<!-- <div class="cta-buttons" style="margin-top: 2rem;"> -->
<!-- <a href="/problem" class="btn btn-secondary">Read Full Analysis</a> -->
<!-- </div> -->
</div>
<p class="problem-conclusion">
Democratic legitimacy requires broad participation in verification, not just select observers. To enable this, e-voting must produce publicly accessible, indisputable cryptographic evidence that anyone can verify across borders—establishing trust in the final result while preserving vote privacy.
<!-- The solution is not to eliminate technology, but to democratize participation in deployment and verification, empowering voters to independently verify their votes without depending on institutional promises. -->
</p>
</div>
</section>
<!-- Innovation Section -->
<section class="section innovation-section" id="inovation">
<div class="container">
<h2>Solving E-voting's Central Problem</h2>
<p class="section-subtitle">Simple centralized deployment with voter-verifiable results and accessible vote privacy</p>
<p style="text-align: center; font-size: 1.2rem; margin-bottom: 3rem;">
Public evidence with everlasting vote privacy lets any expert audit resulting tally to be composed fairly from eligible voters, rather than requiring special vetting and access to internal audit data. This gives voters the option to choose which experts they trust, while the pool of experts can be enlarged through CI/CD pipelines.
</p>
<div class="innovation-grid">
<div class="innovation-card">
<div class="icon">✓</div>
<h4>E2E Verifiable</h4>
<p>Complete end-to-end verification from vote casting through final tally, with software-independent evidence</p>
</div>
<div class="innovation-card">
<div class="icon">🛡️</div>
<h4>Receipt Free</h4>
<p>Complete protection against vote buying and coercion while maintaining full verifiability</p>
</div>
<div class="innovation-card">
<div class="icon">🔒</div>
<h4>Everlasting Privacy</h4>
<p>Vote secrecy maintained even against future quantum computers and cryptographic breakthroughs</p>
</div>
<div class="innovation-card">
<div class="icon">🎯</div>
<h4>Centralized Deployment</h4>
<p>Clear responsibilities and simplified accountability. Enables federated deployment for enhanced security when needed</p>
</div>
<div class="innovation-card">
<div class="icon">🔄</div>
<h4>Open Transactional Anonymization</h4>
<p>Include anyone in pseudonym anonymization before voting with integrity guaranteed via zero-knowledge proofs, eliminating trust assumptions at tallying phase</p>
</div>
<div class="innovation-card">
<div class="icon">🚀</div>
<h4>CI/CD Evidence Publishing</h4>
<p>Election evidence published to GitHub/GitLab repositories with automated verification badges and static bulletin board generation for reproducable audits</p>
</div>
</div>
<div class="research-highlight">
<h3>Research Foundation</h3>
<p>Unconditional Individual Verifiability with Receipt Freeness via Post-Cast Isolation</p>
<div class="cta-buttons">
<a href="https://eprint.iacr.org/2025/1186" class="btn btn-primary">Read the Preprint</a>
<a href="/solution" class="btn btn-secondary">Technical Overview</a>
</div>
</div>
</div>
</section>
<!-- How It Works Section -->
<section class="section how-it-works-section" id="how-it-works">
<div class="container">
<h2>How Your Vote Stays Private Yet Verifiable</h2>
<p class="section-subtitle">No trust required—just cryptographic proofs and temporary isolation</p>
<div class="steps">
<div class="step">
<div class="step-number">1</div>
<h4>Setup - Pseudonym Anonymization</h4>
<p>
Before voting, sequential braidings generate a braided generator that determines your anonymous voting pseudonym from your private key. Anyone can participate as a braider by providing zero-knowledge proofs of honest behavior, ensuring voters' anonymity.
</p>
</div>
<div class="step">
<div class="step-number">2</div>
<h4>Cast Your Vote</h4>
<p>
Your voting device retrieves the voting proposal containing the braided generator and voting options. Once you make your selection, your voting calculator creates cryptographic commitments to your vote and tracker preimages, and pseudonymously signs the envelope, which your voting device delivers anonymously to the bulletin board.
</p>
</div>
<div class="step">
<div class="step-number">3</div>
<h4>Isolate and Verify</h4>
<p>
After voting phase ends, your unique challenge appears on the bulletin board next to your pseudonym. Entering this challenge in your isolated voting calculator computes your tracker, with which you can locate your vote on the tally board. To maintain receipt-freeness, you can configure your calculator to display any alternative tracker from the tally board.
</p>
</div>
</div>
<div class="key-insight">
Every previous e-voting system faced an impossible choice: give voters receipts (enabling vote buying) or trust authorities (enabling fraud). PeaceFounder is the first to escape this paradox entirely.
</div>
</div>
</section>