logoContact ↗Contact ↗ (opens in a new tab)
  • Introduction
  • Paper's Weaknesses
  • Security Requirements
  • 30 Second Overview
  • Authentication
  • Privacy
    • Privacy Protectors
  • Verifiability
    • Personal Vote Counted Correctly
    • Total Vote Count
    • Detecting Malware
    • Zero Knowledge Proofs
    • Risk Limiting Audits
    • Anti-Malware Codes: Proving Verification
    • Remediating Compromised Votes
    • Paper Trail
    • Voter Roll Audit
  • 15 Minute Overview
  • Technical Specifications
    • Voter Authentication Attacks
    • Malware On Voter's Devices
    • Denial Of Service
    • Server Penetration
    • Spoofing
    • Privacy Violations
    • Vote Selling
  • Comparing Voting Methods
  • Additional Benefits
  • Conclusion
  • Further Research in Progress
    • Vote Seller's Dilemma
    • Financially Guaranteeing Vote Integrity
    • Ultra Redundant Data Backups
    • Information Theoretic Security
    • Lower-Barrier Privacy Protectors Design
    • Ukraine: Secure Voting in a War Zone
Question? Give us feedback → (opens in a new tab)
Verifiability
Paper Trail

Generating Paper Ballots from Digital Votes

The SIV Admin software includes a function that automatically converts digital votes into paper ballots in the form of a PDF document. Each generated vote is stamped with a unique Voter Verification #, thus preserving the privacy of the vote.

The ability to generate paper ballots from digital votes allows election administrators to seamlessly integrate SIV votes into their overall collection of votes. Thus, admins can audit and track individual votes, even after the election has concluded.

Remediating Compromised VotesVoter Roll Audit

Secure Internet Voting Inc.