Skip to main content

Envisioning is an emerging technology research institute and advisory.

LinkedInInstagramGitHub

2011 — 2026

research
  • Reports
  • Newsletter
  • Methodology
  • Origins
  • My Collection
services
  • Research Sessions
  • Signals Workspace
  • Bespoke Projects
  • Use Cases
  • Signal Scanfree
  • Readinessfree
impact
  • ANBIMAFuture of Brazilian Capital Markets
  • IEEECharting the Energy Transition
  • Horizon 2045Future of Human and Planetary Security
  • WKOTechnology Scanning for Austria
audiences
  • Innovation
  • Strategy
  • Consultants
  • Foresight
  • Associations
  • Governments
resources
  • Pricing
  • Partners
  • How We Work
  • Data Visualization
  • Multi-Model Method
  • FAQ
  • Security & Privacy
about
  • Manifesto
  • Community
  • Events
  • Support
  • Contact
  • Login
ResearchServicesPricingPartnersAbout
ResearchServicesPricingPartnersAbout
  1. Home
  2. Research
  3. Agora
  4. End-to-End Verifiable Voting (E2E-V) Protocols

End-to-End Verifiable Voting (E2E-V) Protocols

Cryptographic voting where voters and observers can verify outcomes.
Back to AgoraView interactive version

End-to-End Verifiable Voting (E2E-V) protocols represent a sophisticated cryptographic approach to electoral systems that addresses fundamental tensions between ballot secrecy and election integrity. Unlike traditional voting methods where voters must trust election officials and equipment without independent verification, E2E-V systems provide mathematical proofs that allow voters to confirm their individual votes were correctly recorded while simultaneously enabling anyone to verify that the final tally accurately reflects all cast ballots. These protocols typically employ one of two core cryptographic architectures: mixnet-based systems, which shuffle encrypted ballots through a series of servers to break the link between voters and their choices, or homomorphic encryption schemes, which allow votes to be tallied while still encrypted. Both approaches generate zero-knowledge proofs—cryptographic evidence that computations were performed correctly without revealing the underlying data. Voters receive a tracking code or receipt that allows them to verify their encrypted ballot appears in the public bulletin board, while the cryptographic properties ensure that even with this verification capability, no one can prove how they voted to a third party, preserving ballot secrecy and preventing vote buying or coercion.

The democratic challenges these protocols address are profound and increasingly urgent. Traditional electronic voting systems have faced persistent concerns about software vulnerabilities, insider manipulation, and the impossibility of meaningful audits when votes exist only as bits in proprietary systems. Even paper-based systems, while auditable, require voters to trust that their ballots are handled correctly after submission. E2E-V protocols fundamentally transform this trust model by making the entire electoral process transparent to mathematical verification rather than institutional authority. This shift is particularly valuable in contexts where electoral legitimacy is contested or where public confidence in democratic institutions has eroded. The technology enables a new form of civic participation where technically inclined observers, civil society organisations, or political parties can independently verify election outcomes using publicly posted cryptographic evidence, without requiring access to sealed ballot boxes or proprietary vote-counting software. This public verifiability can help resolve electoral disputes through mathematical proof rather than institutional decree, potentially reducing post-election conflicts.

Several democracies have begun deploying E2E-V systems in binding elections, with notable implementations in municipal elections in Takoma Park, Maryland, and trials in countries including Estonia, Switzerland, and Australia. Research institutions and election authorities continue to refine these protocols, addressing practical challenges such as usability for non-technical voters, accessibility for people with disabilities, and integration with existing electoral infrastructure. The technology faces a critical adoption threshold: while cryptographic security is well-established, voter understanding and trust remain essential for legitimacy. Current development efforts focus on creating intuitive verification interfaces and educational frameworks that allow ordinary citizens to benefit from cryptographic guarantees without requiring expertise in mathematics. As concerns about election security intensify globally and as digital governance becomes more prevalent, E2E-V protocols represent a promising pathway toward electoral systems that are simultaneously more secure, more transparent, and more resistant to both technical attacks and institutional manipulation, potentially reshaping how democratic societies establish and maintain electoral legitimacy in an increasingly digital age.

TRL
6/9Demonstrated
Impact
5/5
Investment
5/5
Category
software

Related Organizations

VotingWorks logo
VotingWorks

United States · Nonprofit

100%

A non-partisan non-profit building open-source, verifiable voting machines.

Developer
Microsoft logo
Microsoft

United States · Company

95%

Through Copilot and the 'Recall' feature in Windows, Microsoft is integrating persistent memory and agentic capabilities directly into the operating system.

Developer
Verified Voting logo
Verified Voting

United States · Nonprofit

95%

A non-partisan organization advocating for legislation and regulation that promotes accuracy, transparency, and verifiability of elections.

Standards Body
Galois, Inc. logo
Galois, Inc.

United States · Company

90%

A computer science R&D firm specializing in formal verification and cryptography.

Developer
Helios Voting logo
Helios Voting

United States · Open Source

90%

An open-source, web-based open-audit voting system.

Developer
OSET Institute logo
OSET Institute

United States · Nonprofit

90%

A nonprofit election technology research and development institute.

Researcher
Scytl logo
Scytl

Spain · Company

90%

A specialist in online voting and election modernization.

Developer
Swiss Post logo
Swiss Post

Switzerland · Company

90%

The national postal service of Switzerland, which operates a state-approved e-voting system.

Deployer
Assembly Voting logo
Assembly Voting

Denmark · Company

85%

Provides secure digital voting solutions for associations, municipalities, and parties.

Developer
Smartmatic logo

Smartmatic

United Kingdom · Company

85%

A multinational company that builds and implements electronic voting systems.

Deployer
Polyas logo
Polyas

Germany · Company

80%

A leading provider of online voting in Germany.

Developer

Supporting Evidence

Evidence data is not available for this technology yet.

Connections

hardware
hardware
Tamper-Evident Voting Kiosks

Secure, transparent hardware for verifiable in-person voting.

TRL
7/9
Impact
5/5
Investment
4/5
software
software
Homomorphic Tallying Libraries

Counting encrypted votes without decrypting individual ballots.

TRL
5/9
Impact
4/5
Investment
4/5
ethics-security
Coercion Resistance & Anti Vote-Buying Safeguards

Designing systems so voters cannot prove how they voted.

TRL
4/9
Impact
5/5
Investment
4/5
ethics-security
Threat Modeling & Security Testing for Election Systems

Formal adversary analysis and continuous hardening of civic infrastructure.

TRL
7/9
Impact
5/5
Investment
4/5
hardware
hardware
Offline-First Voting Infrastructure

Hybrid paper-digital systems for low-connectivity contexts.

TRL
6/9
Impact
5/5
Investment
3/5
software
software
Mixnet Anonymization Systems

Breaking linkability between voters and ballots with verifiable shuffles.

TRL
5/9
Impact
4/5
Investment
4/5

Book a research session

Bring this signal into a focused decision sprint with analyst-led framing and synthesis.
Research Sessions