The Security
Table of

Online Voting

Secrecy
Integrity
Auditability
Infrastructure
Download Full PDF

Two-Factor Authentication  (2Fa)

Two-Factor Authentication

A double check of the voter’s identity.

To guarantee that a voter is who they say they are, many online voting systems will utilize two-factor authentication, a method of verification that relies on two separate pieces of information. These two factors can consist of: something the voter knows, such as a password or PIN; something they have, like an electronic identity card or smartphone; or something inherent to the voter, like fingerprints or face recognition.  

For example, in an online election, the voter may log on to the voting portal with their personal password (something they know), and then receive a single-use PIN on their smartphone (something they have) which they use to gain access to their online ballot.   

 Two-factor authentication is just a small security step, but it ensures that a voter’s login credentials are not being used by anyone but the voter. 

 

Benefits

Additional Security 

Added identification factors make impersonating a voter exponentially more difficult. 

Secrecy
Integrity
Auditability
Infrastructure
Learn More About Online Voting

2Fa

Benefits

Additional Security 

Added identification factors make impersonating a voter exponentially more difficult. 

Learn More About Online Voting

Scytl is the global leader in secure online voting and election management solutions.

  • 300,000+ online elections
  • 19 out of 21 country governments worldwide
  • 20 years of experience
  • 41 international patents in security
  • 30+ scientific publications

Scytl is the global leader in secure online voting and election management solutions.

  • 300,000+ online elections
  • 19 out of 21 country governments worldwide
  • 20 years of experience
  • 41 international patents in security
  • 30+ scientific publications