Security

State of the art

Features

Secure identification

Identification is one of the key processes in any electronic voting, whether face-to-face, telematic or hybrid. Identification is one of the key processes in any electronic voting, whether face-to-face, telematic or hybrid.

Request a demo
Close-up of two girls and a boy working in front of the same computer screen with an interested look on their faces.

State of the art

CIATAA

If you have read the basics in the previous section, then you already know that CIATAA stands for the 6 pillars of information security for online voting technologies. Below, we explain how we secure each of these 6 pillars at Kuorum. The security levels we describe below correspond to the state of the art in online voting and are used in private electoral processes around the world. 

Confidentiality

In Kuorum we use cryptography to ensure that no one, not even us, has access to the information of the votes cast with our technology. For this we use, among other mechanisms: End-to-end encryption, encryption in transit and at rest, asymmetric key encryption and a Zero-trust architecture. If you want to know more, you can contact our engineering team.

Integrity

No one is capable of altering the results of a vote. This is what in electoral jargon is called avoiding the fraud. For this we use: Digital signature, immutable logs and Distributed Ledger Technologies (DLT).

Availability

We ensure our customers full service availability under peak loads thanks to our scalable architecture based on micro and nano services. In addition, we perform penetration tests and emulate disaster scenarios on a regular basis.

Authenticity

Also known in computer jargon as "non-repudiation". The way we identify voters is key. With Kuorum's technology, it is the administrators of each ballot who choose the level of identification security they require for their ballots. Our most demanding customers apply multi-factor authentication (MFA).

Traceability

Also known as auditability or end-to-end verifiability . This is to ensure that the voter and/or an auditor can attest to what has occurred in the process; of course, respecting the condition of anonymity.

Anonymity

Not all voting using our technology requires an anonymous vote. But, for those that do, we apply homomorphic asymmetric cryptography and mixing.

State of the art

CIATAA

If you have read the basics in the previous section, then you already know that CIATAA stands for the 6 pillars of information security for online voting technologies. Below, we explain how we secure each of these 6 pillars at Kuorum. The security levels we describe below correspond to the state of the art in online voting and are used in private electoral processes around the world. 

Confidentiality

In Kuorum we use cryptography to ensure that no one, not even us, has access to the information of the votes cast with our technology. For this we use, among other mechanisms: End-to-end encryption, encryption in transit and at rest, asymmetric key encryption and a Zero-trust architecture. If you want to know more, you can contact our engineering team.

Integrity

No one is capable of altering the results of a vote. This is what in electoral jargon is called avoiding the fraud. For this we use: Digital signature, immutable logs and Distributed Ledger Technologies (DLT).

Availability

We ensure our customers full service availability under peak loads thanks to our scalable architecture based on micro and nano services. In addition, we perform penetration tests and emulate disaster scenarios on a regular basis.

Authenticity

Also known in computer jargon as "non-repudiation". The way we identify voters is key. With Kuorum's technology, it is the administrators of each ballot who choose the level of identification security they require for their ballots. Our most demanding customers apply multi-factor authentication (MFA).

Traceability

Also known as auditability or end-to-end verifiability . This is to ensure that the voter and/or an auditor can attest to what has occurred in the process; of course, respecting the condition of anonymity.

Anonymity

Not all voting using our technology requires an anonymous vote. But, for those that do, we apply homomorphic asymmetric cryptography and mixing.

Connect it with your favorite tools

Integrate with leading video conferencing tools to offer your remote constituents a seamless experience. Compatible with all platforms, such as Zoom, Teams, Webex and many more.

Zoom Logo
Logo Teams
Webex logo
Google Meets Logo
Zapier Logo
BME Logo
Google Spreadsheets logo

Make collective decisions in a simple way

At Kuorum we help people around the world make collective decisions that matter. Tell us your goals and we'll tell you how we can help.

Request a demo
Legally binding
Lower emissions
Lower costs
Fewer incidents
Enhanced security
More participation
Request a demo
Want to know more?

Tell us your situation and a consultant will contact you in no time.

Contact us at
Contact

Tell us your situation without obligation and a consultant will contact you.

Valid number
We got your message!
We will contact you as soon as possible.
Oops, something is wrong, there is an error submitting the form.
Request a demo

Schedule a 30-minute product demo with our experts

Valid number
We got your message!
We will contact you as soon as possible.
Oops, something is wrong, the form cannot be submitted.