logoContact ↗Contact ↗ (opens in a new tab)
  • Introduction
  • Paper's Weaknesses
  • Security Requirements
  • 30 Second Overview
  • Authentication
  • Privacy
    • Privacy Protectors
  • Verifiability
    • Personal Vote Counted Correctly
    • Total Vote Count
    • Detecting Malware
    • Zero Knowledge Proofs
    • Risk Limiting Audits
    • Anti-Malware Codes: Proving Verification
    • Remediating Compromised Votes
    • Paper Trail
    • Voter Roll Audit
  • 15 Minute Overview
  • Technical Specifications
    • Voter Authentication Attacks
    • Malware On Voter's Devices
    • Denial Of Service
    • Server Penetration
    • Spoofing
    • Privacy Violations
    • Vote Selling
  • Comparing Voting Methods
  • Additional Benefits
  • Conclusion
  • Further Research in Progress
    • Vote Seller's Dilemma
    • Financially Guaranteeing Vote Integrity
    • Ultra Redundant Data Backups
    • Information Theoretic Security
    • Lower-Barrier Privacy Protectors Design
    • Ukraine: Secure Voting in a War Zone
Question? Give us feedback → (opens in a new tab)
Verifiability
Voter Roll Audit

Auditing The Voter Roll

The examination of voter rolls is a standard procedure that election officials typically undertake in the context of paper voting.

In a SIV election, the same authentication process is followed as with paper voting. Therefore, the process of auditing the voter roll does not change, even when SIV is added as a voting method.

Paper Trail15 Minute Overview

Secure Internet Voting Inc.