logoContact ↗Contact ↗ (opens in a new tab)
  • Introduction
  • Paper's Weaknesses
  • Security Requirements
  • 30 Second Overview
  • Authentication
  • Privacy
    • Privacy Protectors
  • Verifiability
    • Personal Vote Counted Correctly
    • Total Vote Count
    • Detecting Malware
    • Zero Knowledge Proofs
    • Risk Limiting Audits
    • Anti-Malware Codes: Proving Verification
    • Remediating Compromised Votes
    • Paper Trail
    • Voter Roll Audit
  • 15 Minute Overview
  • Technical Specifications
    • Voter Authentication Attacks
    • Malware On Voter's Devices
    • Denial Of Service
    • Server Penetration
    • Spoofing
    • Privacy Violations
    • Vote Selling
  • Comparing Voting Methods
  • Additional Benefits
  • Conclusion
  • Further Research in Progress
    • Vote Seller's Dilemma
    • Financially Guaranteeing Vote Integrity
    • Ultra Redundant Data Backups
    • Information Theoretic Security
    • Lower-Barrier Privacy Protectors Design
    • Ukraine: Secure Voting in a War Zone
Question? Give us feedback → (opens in a new tab)
Further Research in Progress

Further Research in Progress

Although Secure Internet Voting is already more secure than existing options, our team has ongoing research in progress to further strengthen different aspects of SIV:

  • Vote Seller's Dilemma

  • Automated Reward: using Smart Contracts for additional financial guarantees of vote integrity

  • Highly Redundant Real-time Data Backups

  • Information Theoretic Security: Quantum-resistant cryptography

  • Lower-Barrier Privacy Protectors Design

ConclusionVote Seller's Dilemma

Secure Internet Voting Inc.