Swiss Post believes that only a transparent and politically neutral solution for e-voting can be successful in the long term. This is why Swiss Post publishes a certain number of documents and concepts for experts.
The following documents describe in detail how the Swiss Post e-voting platform works. Experts in the e-voting and cybersecurity sector are the target audience.
If you have any questions, you can address them to Swiss Post at evoting@swisspost.ch.
Presentation of available documents
Basic principles
The Pillars of End-to-End Online Voting (PDF, 815.8 KB)Document is unavailable.
Using a table, this document succinctly describes the principal pillars of security for secured end-to-end e-voting.
Minutes
Complete Verifiability Security Proof Report (PDF, 1.1 MB)Document is unavailable.
In this document, we are introducing the paper that provides the cryptographic proof of complete verifiability of Scytl sVote Voting Protocol, according to the complete abstract model defined in the VEleS ordinance.
Privacy Security Proof Report (PDF, 1.1 MB)Document is unavailable.
In this document, we are introducing the paper that provides the cryptographic proof of voter privacy of Scytl sVote Voting Protocol, according to the complete abstract model defined in the VEleS ordinance.
Complete Verifiability Formal Proof Report (PDF, 1.3 MB)Document is unavailable.
In this document, we are introducing the paper that provides the symbolic proof of complete Verifiability of Scytl sVote Voting Protocol, according to the complete abstract model defined in the VEleS ordinance.
Privacy Formal Proof Report (PDF, 706.5 KB)Document is unavailable.
In this document, we are introducing the paper that provides the symbolic proof of voter privacy of Scytl sVote Voting Protocol, according to the complete abstract model defined in the VEleS ordinance.
Software
E-voting system documentation (PDF, 1.6 MB)Document is unavailable.
This document describes how Swiss Post has established a secure infrastructure for their electronic voting. It outlines the most important security measures against cyber attacks.
Note: the following additional documents were published with the source code and can be viewed at GitLab.com (go to registration):
- Cryptographic protocol specification
- Architecture of the e-voting solution
- Scytl sVote Auditability with Control Components
Note: documents specific to the 50% certification of the system are available on request.