Accuracy not guaranteed. Neither is Congress's. At least we're honest about it. Always verify at Congress.gov.

Leg day: Fri → Fri (28d) Recess

Open Protocol

VoteChain

Cryptographic voter verification and ballot integrity for U.S. elections — replacing trust assumptions with mathematical proofs

Two protocols, one mission → 60 seconds

VoteChain is a two-layer protocol for election integrity. The verification layer answers “is this voter eligible?” using cryptographic credentials on a permissioned ledger — no PII on-chain, no biometric mandates. The ballot integrity layer (EWP) provides the chain of custody from cast to tally — encrypted ballots, append-only logs, and verifiable decryption proofs.

Everything here is published for transparency and critique. The POC runs entirely in your browser. The protocol documents are open for review.

Two-Layer Architecture

Layer 1: Verification

VoteChain PRD

  • 1. Citizen?
  • 2. Eligible (jurisdiction + election)?
  • 3. Alive / liveness satisfied?
  • 4. Already voted (nullifier uniqueness)?

Layer 2: Ballot Integrity

Election Web Protocol (EWP)

  • 1. Ballot encrypted (voter client)
  • 2. Recorded on bulletin board
  • 3. Included in tally set (Merkle proof)
  • 4. Counted correctly (verifiable decryption)
Coupling point: audit anchors (hash commitments linking eligibility proofs to ballot records)

New

Field Report: Air-Gapped Runtime Demonstration

Detailed engineering results from the 5-machine public test-election cycle, including random spoils, per-session reset behavior, duplicate-vote rejection tests, and rogue-node detection simulations.