Skip to content
This repository has been archived by the owner on Mar 10, 2023. It is now read-only.

novom/belenios

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Belenios API

master is unsafe, please refer to tags.

An api wrapping the belenios-tool command line.

Prerequisites

Getting Started

  1. From the project root directory, run yarn to install dependencies.
  2. Read the compilation instructions provided in INSTALL.md
  3. Run yarn setup.
  4. Run yarn start.

Contributing

Never commit directly on master, instead use branches and pull requests.

Once approved, a Pull request is merged in master by its author. Also, it must be squashed before merging, either manually or using GitHub's Squash and merge feature.

You must use the following Style Guides :

This project contains a linting config, you should setup eslint into your IDE with .eslintrc.js.

Known Issues

Please refer to the Issues section if you encounter any problems during development.

Introduction

Belenios is a verifiable voting system that partly implements the Helios-C protocol described here, which is itself derived from Helios.

It consists of a command-line tool and a web server. Both use the same backend and can be used to organize elections and perform verifications. They employ messages formatted in a common format, a specification of which is available in doc/specification.tex.

Compilation instructions are provided in INSTALL.md.

Election overview

An election involves several roles: an administrator, a credential authority, trustees and voters. For maximum security, each of these roles must be performed by a different entity. An election can be summarized as follows:

  1. The administrator initiates the process.
  2. The credential authority generates one credential per voter; he sends the private part to each voter and all public parts to the administrator.
  3. Each trustee generates a keypair and sends his/her public key to the administrator.
  4. The administrator collects all public credentials and trustees' public keys and sets up the election.
  5. The administrator opens the election.
  6. Each voter votes; the administrator collects, checks and publishes all the ballots.
  7. The administrator closes the election.
  8. Trustees collectively decrypt the result.
  9. The administrator announces the result of the election.

The command-line tool

Each step can be performed with the help of the command-line tool. The tool is also the most convenient way to exercise the verifiability capabilities of the system.

More information in doc/tool.md.

Legal

Internal code

By "internal code", we mean everything that is not in the ext/ directory.

Copyright © 2012-2021 Inria, CNRS

This program is free software: you can redistribute it and/or modify it under the terms of the GNU Affero General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version, with the additional exemption that compiling, linking, and/or using OpenSSL is allowed.

This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Affero General Public License for more details.

External code

Please refer to each file for accurate copyright and licensing information.

Packages

No packages published

Languages

  • OCaml 60.1%
  • Python 27.7%
  • JavaScript 7.5%
  • Shell 2.2%
  • HTML 1.5%
  • CSS 0.8%
  • Other 0.2%