ABT-V
Voting
Bilateral tier separation between voter identity and ballot content. No party can unilaterally reconstruct a voter-ballot pair.
Filed · Patent pending
Sid Ratnam
ABT methodology family · variant ABT-V · counsel memorandum

A vote counted twice and never linked once

A worked example of the VITK/BCTK independent-tier architecture, voter-ballot unlinkability by cryptographic structure, and multi-party reconstruction under judicial authorization in the voting variant of the ABT methodology family.

U.S. Provisional Patent 64/056,353 · Filed May 4, 2026 · Foundational specification: ABT envelope-tier architecture
Abstract

The ABT-V variant applies the foundational envelope-tier architecture to democratic participation, with the single-precinct federal ballot as the canonical scenario. The variant-specific architectural elements are: independent VITK and BCTK tier keys, such that voter identity and ballot content are encrypted to cryptographically independent tier authorities and cannot be correlated without explicit multi-party reconstruction; a voter-verifiable receipt that allows the voter to confirm their ballot was counted without revealing which ballot is theirs; and judicial-authorization multi-party reconstruction, in which three independent guardians each hold a key shard and unanimous participation is required before a voter-ballot pair can be linked — an event reserved for forensic audit, not routine administration. This memorandum follows a single ballot from casting to tally to contested-election forensic review.

I. The ballot is cast

Kamara Adeyemi votes at Millbrook precinct 7

Adeyemi's device holds a persistent voter key registered at enrollment. From it, she derives a per-ballot tokenized key scoped to this election only. Her vote is encrypted to two independent tier keys before leaving her device.

ActorEndpointHolds
Kamara Adeyemi
Voter · first party
Personal devicePersistent voter key vk_adeyemi; derives per-ballot token ballot_c7d9 at casting time
Millbrook County Board of Elections
Tally authority · second party
County election systemBCTK tier key; can decrypt ballot content projection; cannot decrypt voter identity projection
Process integrity guardian
Registry · neutral witness
Independent oversight bodyRoutes casting events, witnesses hash chain, holds no decryption material for either tier
Ballot envelope · ballot_c7d9
election2028 federal general · Millbrook precinct 7
tier_VITKvoter_identity · Adeyemi credential encrypted to VITK tier key
tier_BCTKballot_content · selections encrypted to BCTK tier key
ballot_receiptballot_c7d9 · public · verifiable without decryption
registry_witnesscasting event logged, hash-chained, public

The VITK (Voter Identity Tokenization Key) and BCTK (Ballot Content Tokenization Key) are cryptographically independent tier keys. They are not derived from each other. Decrypting the VITK projection reveals who voted. Decrypting the BCTK projection reveals what was voted. Neither projection enables decryption of the other. Correlation requires explicit multi-party reconstruction — a separate event, separately authorized.

Architectural note. The two-tier independence is constructed at the voter's device. The tally authority receives a ballot in which the content is readable to them and the identity is sealed to them. This is not an access policy enforced at the registry — the VITK ciphertext cannot be decrypted by any key the tally authority holds.
II. The tally counts the vote

Millbrook Board of Elections counts ballot_c7d9 — without seeing Adeyemi's name

The tally authority decrypts the BCTK projection at their endpoint. They see the selections. They do not see, and cannot derive, the voter's identity. The VITK tier is sealed to them at the cryptographic level.

BCTK projection — accessible to tally authority
ballot_idballot_c7d9
precinctMillbrook precinct 7
contest_presidentselection recorded · encrypted
contest_senateselection recorded · encrypted
contest_referendum_14selection recorded · encrypted
voter_identity— sealed in VITK tier · not accessible here —
voter_credential— sealed in VITK tier · not accessible here —

The tally authority adds ballot_c7d9 to the aggregate count. They know: a valid ballot was cast, in precinct 7, for the 2028 general election, with selections on three contests. They do not know, and cannot determine, whose ballot this is.

Double-counting prevention operates through the ballot receipt's uniqueness: each ballot_c7d9 identifier is structurally bound to a single voter registration credential at envelope construction time. Presenting the same ballot twice produces an invalid duplicate entry detectable by the registry without requiring the tally authority to know the voter's identity.

Architectural note. The tally authority's BCTK tier key cannot be used to correlate two ballots to each other as coming from the same voter. BCTK decryption reveals content only. The VITK tier holds the voter credential, and it is sealed to the tally authority by the cryptographic structure of the envelope itself.
III. Adeyemi verifies her vote was counted

Voter receipt ballot_c7d9 appears in the public tally log

The public tally log is a hash-chained registry record. Adeyemi can verify ballot_c7d9 is present in the log from her device, without revealing her identity to any observer of the log.

verify_receipt: input: ballot_c7d9 (held by voter) lookup: public tally log → entry found at position 3,847 hash_match: HMAC-SHA256(vk_adeyemi, election_seed) = ballot_c7d9 ✓ result: ballot included in tally revealed to observer: ballot_c7d9 was counted · nothing else

The verification is a private computation on Adeyemi's device. She derives ballot_c7d9 from her persistent voter key and the election seed. She checks whether that identifier appears in the public log. The log contains ballot identifiers — not voter identities. An observer watching the verification process sees Adeyemi perform a lookup; they see the receipt identifier; they do not learn from that observation which candidate she voted for.

This is the voter-verifiable receipt mechanism. It proves inclusion without proving content and proves participation without proving identity.

IV. The election is contested — reconstruction requires three guardians

A forensic audit is authorized. Three guardians must each participate to reconstruct any voter-ballot pair.

A contested-election proceeding authorizes cryptographic reconstruction of specific challenged ballots. Reconstruction of a voter-ballot pair requires all three process integrity guardians — Warden Osei, Magistrate Petrov, and Registrar Valdes — to participate. No single guardian and no pair can reconstruct unilaterally.

reconstruction_key = KDF(shard_osei, shard_petrov, shard_valdes, ballot_c7d9) threshold: 3-of-3 (unanimous) missing any shard: reconstruction fails judicial_authorization: case_2028_millbrook_07 · issued
01Warden Osei ✓
02Magistrate Petrov ✓
03Registrar Valdes ✓

The reconstruction event is witnessed by the registry and entered into the hash-chained log. It requires: a valid judicial authorization, the participation of all three guardians, and a ballot identifier from the authorized audit scope. Each reconstruction event is individually logged — reconstructing ballot_c7d9 does not grant access to ballot_c7d8 or ballot_c7da.

The threshold is 3-of-3, not 2-of-3. A simple majority is insufficient for voter-ballot linkage. The design reflects the gravity of the disclosure: any reconstruction event that links a voter's identity to their ballot choices is a singular forensic event, not an administrative operation.

Architectural note. The guardian key shards are not held by any party that also holds VITK or BCTK decryption material. The tally authority cannot participate in reconstruction. The voter cannot be compelled to participate in reconstruction — the reconstruction key is derived from guardian shards alone, not from the voter's device key.
V. Reconstruction links Adeyemi to ballot_c7d9

Under judicial authorization, the voter-ballot pair is reconstructed once

With all three guardian shards present and judicial authorization confirmed, the process integrity guardian constructs the reconstruction key. The VITK and BCTK tiers are both decryptable for ballot_c7d9 specifically. The result is logged and sealed.

GuardianShard contributedSignature
Warden Osei
Guardian · shard 01
shard_osei providedrec_osei_c7d9
Magistrate Petrov
Guardian · shard 02
shard_petrov providedrec_petrov_c7d9
Registrar Valdes
Guardian · shard 03
shard_valdes providedrec_valdes_c7d9
Reconstruction result · ballot_c7d9 · forensic audit only
voter_identityKamara Adeyemi · credential verified
ballot_contentselections decrypted at guardian endpoint
reconstruction_scopeballot_c7d9 only · judicial_authorization case_2028_millbrook_07
registry_logreconstruction event witnessed, hash-chained, permanent
VI. The tally is not changed — the audit record is

The forensic event closes. Adeyemi's ballot remains counted. The reconstruction record is permanent.

Reconstruction reveals the voter-ballot pair for the specific forensic purpose authorized. The election tally is not modified by reconstruction. The reconstruction record — who participated, which ballot, under which authorization — is permanently part of the hash-chained log.

The result of reconstruction is forensic, not administrative. The tally authority cannot use reconstruction output to modify vote counts — reconstruction is a read operation, not a write operation on the tally. The purpose of the contested-election audit is to verify that ballot_c7d9 was validly cast, validly counted, and accurately recorded — not to change the outcome based on who cast it.

After the reconstruction event closes, the voter-ballot linkage exists only in the sealed forensic record and in the guardians' logs. The VITK and BCTK tiers of ballot_c7d9 remain sealed in all other contexts. A subsequent request to reconstruct the same ballot requires a new judicial authorization and a new 3-of-3 guardian participation event.

Variant-family note. The same independent-tier, multi-party-reconstruction architecture applies to any domain where the identity of the participant and the content of their action must be separable by cryptographic structure: professional licensing decisions, anonymous peer review, sealed-bid procurement, and whistleblower-protected regulatory submissions, among others.

— § —

Cryptographic claim summary. The variant-specific architectural elements claimed in the ABT-V disclosure are: (a) independent VITK and BCTK tier keys constructed at the voter's device such that the two tiers are cryptographically independent and cannot be correlated without explicit reconstruction; (b) voter-verifiable receipt enabling participation confirmation without identity or content disclosure; (c) 3-of-3 guardian multi-party reconstruction under judicial authorization, with each reconstruction event individually scoped and logged; (d) separation of reconstruction from tally modification such that forensic access does not alter the election record; (e) process integrity guardian as hash-chained witness with no decryption capability for either VITK or BCTK tiers. The foundational mechanism — first-party-side encryption, callback-mediated key release, forward-only tier activation, per-tier projection, tamper-evident hash-chained logs — is inherited from the foundational specification.

U.S. Provisional Patent 64/056,353 · Filed May 4, 2026 · Sid Ratnam, sole inventor · Foundational reference implementation at cinematiccard.com (ABT-C variant)
Selective by design