Skip to main content

Mathematical proofs

Electobox relies on well-studied cryptographic primitives whose security is defined in terms of precise mathematical assumptions. This page summarises the guarantees the system is designed to uphold and where formal analysis belongs in your assurance process.

What the cryptography proves

Threshold encryption ensures that ciphertexts remain confidential unless a quorum of trustees cooperates to decrypt. The anonymisation step is designed so that, after it runs, no party — including Electobox — can link a decrypted ballot back to a voter identity.

Documentation and review

Detailed proof sketches, parameter choices, and references to the underlying schemes should be maintained alongside your security documentation and reviewed whenever the voting or crypto pipeline changes. If you need a formal third-party review, engage auditors with experience in mix-nets, threshold schemes, and end-to-end verifiable e-voting.