The Security
Table of

Online Voting

Secrecy
Integrity
Auditability
Infrastructure
Download Full PDF

Existing Authentication Methods  (EaM)

Existing Authentication Methods

Using in-use authentication systems.

In many governments and organizations, eligible voters already have credentials that they use to verify their identity as a citizen or member in order to access particular information or to complete certain processes. In these cases, an online voting system can be connected to the external identity provider in order to use these existing credentials for login, eliminating the need to create new usernames and passwords for every eligible voter.  

Benefits

Trusted Security  

Using authentication methods that users are already familiar with can increase their trust in the system’s security. 

Secrecy
Integrity
Auditability
Infrastructure
Learn More About Online Voting

EaM

Benefits

Trusted Security 

Using authentication methods that users are already familiar with can increase their trust in the system’s security. 

Learn More About Online Voting

Scytl is the global leader in secure online voting and election management solutions.

  • 300,000+ online elections
  • 19 out of 21 country governments worldwide
  • 20 years of experience
  • 41 international patents in security
  • 30+ scientific publications

Scytl is the global leader in secure online voting and election management solutions.

  • 300,000+ online elections
  • 19 out of 21 country governments worldwide
  • 20 years of experience
  • 41 international patents in security
  • 30+ scientific publications