m.Vote Technical Specifications

m.Vote – Application Functional Description

Introduction to the document

This document has been drafted in Madrid (Spain) in English.

Date last revised September 1, 2015

This document contains technical and functional specifications for the m.Vote

This document will be updated and always available in the help section and via the website https://www.electronicid.eu/?p=2825

Electronic IDentification (eID) software reserves the right to review the functionality as well as the description of this document at any time for technical legal reasons, changes in the provision of the service or any cause beyond these matters, and that can cause a change. If these changes occur, you will be published on the Web site and/or we will notify you of them via the Web.

For any clarification, denunciation of abuse regarding the application, please contact us via email info@electronicid.eu

About Electronic IDentification

The term Electronic Identification (eID) refers to the features and services we provide through our Web service www.electronicid.eu, including services related with mobile voting m.Vote

About the m.Vote

The m.Vote is a mechanism of integrity of content easy-to-use eID that allows organizations to design and participate in legally binding referendums.

The m.Vote is used for a protocol of advanced electronic voting that has a level of security, privacy and reliability similar to a face-to-face vote, which gives an extra value to the consultations carried out by electronic means.

The Protocol of electronic voting is based on the same requirements as the vote in face-to-face format and adds value to the latter because it increases their reliability, level and ease of auditability and count of the process from start to finish.



Benefits from the use of the m.Vote

The eID software m.Vote provides a secure mechanism to organizations or individuals of any kind who believe in democratic values as principles of performance and relationship with your main stakeholders.

At the same time, the m.Vote offers a unique and safe tool to persons or organizations who want to know an opinion authentic and true to the reality of a particular issue or matter of today.

Along with the rest of identification, authentication and electronic signature services eID, the m.Vote becomes a unique tool for its level of authenticity.

The m.Vote can help the democratization of the environment, that is, in management and decision making joint in any organism or democratic institution.

Consultations and the results can be checked individually or globally, so that the m.Vote can be used in any environment and defend against any third party, either the institution representing people or before any Court of competent jurisdiction in the subject matter.


Elements of the system

The following table describes the main elements of the system.

Element Description
Promoter Person or organization that designs and promotes the consultation
Voter Person who issued an opinion or judgment through responses to consultation, anonymously and secret
Browser Device software that allows voting in good time
System The software code that allows the planning of the m.Vote in the application
Authority censorship Records and authenticates to the voters.
Electoral authority It allows the query design
Audit entity It ensures the integrity of the voting process. Without access to the data, is involved in the process of decryption of the votes, shuffling and it is involved in the verification of the integrity of data. At least must be an auditing entity, although the code, which is open, allows the installation of a multiple number of audit entities in a process that requires it.
Entity counting or tallying Authority that generates the identifiers and keys only for voting and counting and counting process. The entity is open source, so it can be installed and managed by a third and independent auditor.




System requirements

The system requirements are based mostly on the requirements of the Presential based vote.


Requirement Description
Authenticity People who vote are authenticated with a high level of trust in their identity for “non-repudiation”
Boundedness Concerning the single vote
Anonymity There is no relationship between the vote and the voter
Impossibility of coercion No voter should be able to demonstrate to third parties which vote has issued
Individual verifiability Each voter shall be able to ensure that their vote has been considered properly, so you can have a tangible proof of the fact
Global verifiability Allow organizations or authorized citizens the ability to check the validity of the final tally
Reliability Quality to ensure that you there is no alteration of the results, either by malicious attacks or system failures
Auditability During the voting process should register evidence of vote and elements of audit to allow authorized persons have guarantees to ensure that all the voting process is correct without compromising the integrity of the election or the privacy and anonymity of voters
Neutrality It is not possible to know partial results until no end time consultation or election
Mobility of the voters The system must allow that the participants issued his opinion or vote from cabin or point of voting, in our case, from any mobile device connected to the internet, eliminating the restrictions do so at the polling place in the area in which it is counted.
Ease to use The voter should require minimal skills and special knowledge for the vote
Quick vote The voter must to cast the ballot in a minimal and reasonable time
Vote rejection or null Voter should be able to vote without that is posted as valid for any of the proposed candidates nor be considered inside the block of blank votes
Trust The voter should understand the voting process to strengthen their confidence and acceptance of the system


Description of the process


Stage i. preparing and designing the query

The first part of the electronic voting process aims to design and publish the query that is to be performed by the promoter part in the system.


I.I design of the consultation

The design of the inquiry by the person or organization is the election authority. The design has questions and answers to, dates that will be available and other attributes such as tags or topics of interest within the web. Vote rejection and white options are mandatory in all responses.

I.II publication of the consultation

Once designed, the person or organization publishes consultation in the audit authority, thereby generating the unique identifier and the public keys for the query.

Entity counting or enumeration also generates the query with these identified and unique keys.


Stage II. Voting process

  • Consultation this list and is public via the web through a long and short link on the web page.


  1. I request for consultation

The request for consultations to the Censorship Authority aims to verify the identity of the voter in the census, which this person has not voted yet and request the opening of their vote.

II.II vote choice

The entity count and recount ballots required.

The scrutiny body generates ballots with public keys involved in the vote.

The voter signature receipt and vote in the browser encryption.

The censorship authority generates the receipt and vote separately (dissociation voting and voter) and brand that the voter has already made the vote.

Generates a pdf document private and full receipt of participation as a.


Stage III. Scrutiny process

Given the date of completion of the mandated in its initial design consultation, a system timer closes the voting process and proceeds to their scrutiny.


III. I submission of votes / receipts.

The censorship authority shuffles votes and receipts, decrypts the first layer of the vote and verifies the integrity. With all this, it sends messages to the State Auditor, which receives them and carries out the relevant checks. A message is the same one vote more a receipt.

III.II integrity tests

The censorship authority sends integrity tests the entity of scrutiny.

III. III submission of votes / receipts

The audit entity shuffles votes and receipts, decrypts the first layer of the vote and verifies the integrity. With all this, it sends messages to the entity’s scrutiny, which receives them and carries out the relevant checks. A message is the same one vote more a receipt.

III.IV integrity tests

The audit entity sends the entity’s scrutiny, which receives them and proceeds to verify integrity tests.

III. V count process

The entity of scrutiny open votes, counts them, marking used ballots.

Scrutiny entity sends stats to the system, making the data available to voters.

The system allows individual verification through the site that implements the eVoto.


References, standards and recommendations

Source of information in the design and development of our e-vote application process have been:

Practical guide to implementation of a system of electronic voting -Regional Observatory of the society of the information (ORSI), Castilla y León, 2010.

Recommendation (2001) 19 of the Committee of Ministers and Member States on the participation of citizens in local public life.

Recommendation (2004) 11 of the Committee of Ministers and Council of Europe to Member States on the legal standards, technical systems of electronic voting procedures.

Recommendation (2004) 15 of the Committee of Ministers and Council of Europe Member States on e-Governance.

Recommendation (2009) 1 of the Committee of Ministers and Council of Europe Member States on e-Democracy electronic democracy.

National law, Organic law 5/1985 of 19 June, the regime of general voting, is the legal standard that regulates different types of political elections taking place in Spain and sets out the General principles that affect these elections.

References to the support of digital technology and new forms of relationship between the administration of the State and citizens can be found in laws such as: Law 57/2003, on measures for the modernisation of local government, law 11/2007 electronic access of citizens to public services, or 56/2007 momentum measures on the information society.

Pilot tests to votes in the Senate, 2014.

References technical and operation of electronic voting in countries such as Norway, Brazil, USA, France and Spain among others.


For any clarification or queries are please contact us via email info@electronicid.eu

The eID team

Política y uso de cookies

Este sitio web utiliza cookies para que usted tenga la mejor experiencia de usuario. Si continúa navegando está dando su consentimiento para la aceptación de las mencionadas cookies y la aceptación de nuestra política de cookies, pinche el enlace para mayor información.

Aviso de cookies