Skip to content

Commit 6d5abc0

Browse files
author
Janis Erdmanis
committed
updating technical overview
1 parent de362d0 commit 6d5abc0

9 files changed

Lines changed: 437 additions & 135 deletions

File tree

_assets/auto/peacefounder.el

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,6 +23,7 @@
2323
"sampigethaya2006"
2424
"schneider2017"
2525
"veliz2021"
26-
"Wikstrom2005"))
26+
"Wikstrom2005"
27+
"Selene2016"))
2728
'(or :bibtex :latex))
2829

_assets/clockwork.jpg

346 KB
Loading

_assets/peacefounder.bib

Lines changed: 24 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -268,4 +268,27 @@ @InProceedings{Wikstrom2005
268268
pages = {273--292},
269269
abstract = {We introduce the first El Gamal based mix-net in which each mix-server partially decrypts and permutes its input, i.e., no re-encryption is necessary. An interesting property of the construction is that a sender can verify non-interactively that its message is processed correctly. We call this sender verifiability.},
270270
isbn = {978-3-540-32267-2}
271-
}
271+
}
272+
273+
@incollection{Selene2016,
274+
location = {Berlin, Heidelberg},
275+
title = {Selene: Voting with Transparent Verifiability and Coercion-Mitigation},
276+
volume = {9604},
277+
isbn = {978-3-662-53356-7 978-3-662-53357-4},
278+
url = {http://link.springer.com/10.1007/978-3-662-53357-4_12},
279+
shorttitle = {Selene},
280+
abstract = {End-to-end verifiable voting schemes typically involves voters handling an encrypted ballot in order to confirm that their vote is accurately included in the tally. While this may be technically valid, from a public acceptance standpoint is may be problematic: many voters may not really understand the purpose of the encrypted ballot and the various checks that they can perform. In this paper we take a different approach and revisit an old idea: to provide each voter with a private tracking number. Votes are posted on a bulletin board in the clear along with their associated tracking number. This is appealing in that it provides voters with a very simple, intuitive way to verify their vote, in the clear. However, there are obvious drawbacks: we must ensure that no two voters are assigned the same tracker and we need to keep the trackers private.},
281+
pages = {176--192},
282+
booktitle = {Financial Cryptography and Data Security},
283+
publisher = {Springer Berlin Heidelberg},
284+
author = {Ryan, Peter Y. A. and Rønne, Peter B. and Iovino, Vincenzo},
285+
editor = {Clark, Jeremy and Meiklejohn, Sarah and Ryan, Peter Y.A. and Wallach, Dan and Brenner, Michael and Rohloff, Kurt},
286+
urldate = {2021-11-20},
287+
date = {2016},
288+
year = 2016,
289+
langid = {english},
290+
doi = {10.1007/978-3-662-53357-4_12},
291+
note = {Series Title: Lecture Notes in Computer Science},
292+
file = {Ryan et al. - 2016 - Selene Voting with Transparent Verifiability and .pdf:/Users/jerdmanis/BtSync/System/Zotero/storage/VIJU67MD/Ryan et al. - 2016 - Selene Voting with Transparent Verifiability and .pdf:application/pdf},
293+
}
294+

_assets/protocol.svg

Lines changed: 47 additions & 0 deletions
Loading

_css/style.css

Lines changed: 52 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -850,6 +850,58 @@ width: 100px;
850850
margin-bottom: 1rem;
851851
}
852852

853+
/* blockquote { */
854+
/* background: #f8f8f8; */
855+
/* border-radius: 8px; */
856+
/* padding: 2rem; */
857+
/* margin: 2rem 0; */
858+
/* } */
859+
860+
/* blockquote p { */
861+
/* margin-bottom: 1rem !important; */
862+
/* } */
863+
864+
/* .isolation-detail h3 { */
865+
/* font-size:1.5rem; */
866+
/* } */
867+
868+
/* .isolation-detail p { */
869+
/* margin-top:1.5rem; */
870+
/* } */
871+
872+
873+
blockquote {
874+
/* background: #f8f9fa; */
875+
background: linear-gradient(135deg, #f8f9fa 0%, #e9ecef 100%);
876+
border-radius: 8px;
877+
padding: 2rem;
878+
padding-top: 1rem;
879+
margin: 2rem 0;
880+
/* border-left: 4px solid #17a2b8; */
881+
}
882+
883+
blockquote p:last-of-type {
884+
margin-bottom: 0 !important;
885+
}
886+
887+
blockquote ul {
888+
margin-top: 1.5rem;
889+
margin-left:2rem;
890+
}
891+
892+
blockquote h3 {
893+
margin-top:1rem;
894+
font-size:1.5rem;
895+
}
896+
897+
blockquote p {
898+
margin-top:1rem;
899+
margin-bottom: 1rem !important;
900+
901+
}
902+
903+
904+
853905
.contact-section {
854906
background: #f0f0f0;
855907
border-radius: 8px;

downloads.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -103,11 +103,12 @@
103103

104104
The development prototype includes comprehensive documentation for setting up test elections and verifying the cryptographic protocols. We recommend starting with the provided test scenarios to understand the system's operation.
105105

106+
The PeaceFounder e-voting system offers two deployment options. A basic mode that displays votes on the tally board, signed directly with their pseudonym, and can be used without calculators. A main mode that requires voters to have calculators on hand provides vote deniability and permanent privacy for high-stakes elections. Currently, only the basic mode is supported.
107+
106108
~~~
107109
<div class="warning-notice"><strong>⚠️ Development Preview Notice:</strong> This prototype is intended for research and testing purposes only. It can be used on a small scale in low stakes scenarios until production hardening happens.</div>
108110
~~~
109111

110-
111112
### Server Setup
112113

113114
~~~

main.html

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ <h1>Evoting for Democracy</h1>
99
<div class="cta-buttons">
1010
<a href="/vision" class="btn btn-secondary">Why It Matters?</a>
1111
<a href="#" class="btn btn-secondary" onclick="openDemoModal()">Watch Demo</a>
12-
<a href="#inovation" class="btn btn-secondary">Read the Research</a>
12+
<a href="/solution" class="btn btn-secondary">Technical Overview</a>
1313
</div>
1414

1515
<!-- Simple text link for prototype -->
@@ -55,16 +55,16 @@ <h4>Vote Buying and Coercion Risks</h4>
5555

5656

5757
<div class="quote-box">
58-
If voters cannot independently verify that their votes are accurately counted while maintaining their privacy—regardless of whether administrators are honest or corrupt—then the system has failed its fundamental democratic purpose.
59-
60-
<div class="cta-buttons" style="margin-top: 2rem;">
61-
<a href="/problem" class="btn btn-secondary">Read Full Analysis</a>
62-
</div>
63-
58+
An e-voting system where voters must trust intitutional promises that their votes were counted correctly and the final tally consists only of legitimate voters is merely a survey with extra steps.
59+
<!-- <div class="cta-buttons" style="margin-top: 2rem;"> -->
60+
<!-- <a href="/problem" class="btn btn-secondary">Read Full Analysis</a> -->
61+
<!-- </div> -->
6462
</div>
6563

6664
<p class="problem-conclusion">
67-
The solution is not to eliminate technology, but to democratize participation in deployment and verification, empowering voters to independently verify their votes without depending on institutional promises.
65+
66+
Democratic legitimacy requires broad participation in verification, not just select observers. To enable this, e-voting must produce publicly accessible, indisputable cryptographic evidence that anyone can verify across borders—establishing trust in the final result while preserving vote privacy.
67+
<!-- The solution is not to eliminate technology, but to democratize participation in deployment and verification, empowering voters to independently verify their votes without depending on institutional promises. -->
6868
</p>
6969
</div>
7070
</section>
@@ -114,7 +114,7 @@ <h4>CI/CD Evidence Publishing</h4>
114114

115115
<div class="research-highlight">
116116
<h3>Research Foundation</h3>
117-
<p>"Unconditional Individual Verifiability with Receipt Freeness via Post-Cast Isolation"</p>
117+
<p>Unconditional Individual Verifiability with Receipt Freeness via Post-Cast Isolation</p>
118118
<div class="cta-buttons">
119119
<a href="https://eprint.iacr.org/2025/1186" class="btn btn-primary">Read the Preprint</a>
120120
<a href="/solution" class="btn btn-secondary">Technical Overview</a>

0 commit comments

Comments
 (0)