Exploring the use of Intel SGX for Secure Many-Party Applications
|
|
- Hector Hutchinson
- 6 years ago
- Views:
Transcription
1 Exploring the use of Intel SGX for Secure Many-Party Applications SysTEX 16 K. A. Kucuk University of Oxford, UK December 12, 2016 Kubilay Ahmet Kucuk, University of Oxford Exploring the use of Intel SGX for Secure Many-Party Applications slide 1 /23
2 Overview 1. Introduction 2. Trustworthy Remote Entity (TRE) 3. SGX-based TRE 4. Results Kubilay Ahmet Kucuk, University of Oxford Exploring the use of Intel SGX for Secure Many-Party Applications slide 2 /23
3 Yao s Millionaires Problem Kubilay Ahmet Kucuk, kucuk@cs.ox.ac.uk, University of Oxford Exploring the use of Intel SGX for Secure Many-Party Applications slide 3 /23
4 Multi Party Computation (MPC) Limited scalability, Cryptographic primitives Kubilay Ahmet Kucuk, University of Oxford Exploring the use of Intel SGX for Secure Many-Party Applications slide 4 /23
5 Ideal MPC Third Party, Trust Issues Kubilay Ahmet Kucuk, University of Oxford Exploring the use of Intel SGX for Secure Many-Party Applications slide 5 /23
6 Many Party Application: Road Pricing Location-based services..diminishes the privacy Kubilay Ahmet Kucuk, University of Oxford Exploring the use of Intel SGX for Secure Many-Party Applications slide 6 /23
7 Many Party Application: Smart Grid aggregate measurements over multiple consumers Kubilay Ahmet Kucuk, University of Oxford Exploring the use of Intel SGX for Secure Many-Party Applications slide 7 /23
8 A Possible Solution... Trustworthy Remote Entity (TRE) ICR TRE P 1 P 2 P n card(icr) = n TRE Based on Trusted Computing Essentially a verifiable trusted third party (vttp) Comparable to the idealised version (TTP) in the MPC world Kubilay Ahmet Kucuk, kucuk@cs.ox.ac.uk, University of Oxford Exploring the use of Intel SGX for Secure Many-Party Applications slide 8 /23
9 TPM-based TRE Using TXT and TPM Final State Attestation (FSA) Bare-metal, event-driven Privacy Preserving Small TCB, Optimized Kubilay Ahmet Kucuk, University of Oxford Exploring the use of Intel SGX for Secure Many-Party Applications slide 9 /23
10 Other TRE possibilities Intel SGX; sgxtre, Middlebox, Compute Provider ARM TrustZone Kubilay Ahmet Kucuk, University of Oxford Exploring the use of Intel SGX for Secure Many-Party Applications slide 10 /23
11 Contributions SGX-based TRE SGX Benchmarks Design and Prototype Comparison Kubilay Ahmet Kucuk, University of Oxford Exploring the use of Intel SGX for Secure Many-Party Applications slide 11 /23
12 Requirements Security and Performance Req. Secure Computation and Communication Secure Attestation Scalability and Latency Kubilay Ahmet Kucuk, University of Oxford Exploring the use of Intel SGX for Secure Many-Party Applications slide 12 /23
13 Adversary Model Malicious Operator of TRE Dolev-Yao Network Adv. SMM, BIOS, OS Physical Access Kubilay Ahmet Kucuk, University of Oxford Exploring the use of Intel SGX for Secure Many-Party Applications slide 13 /23
14 Benchmarking Functionalities Kubilay Ahmet Kucuk, University of Oxford Exploring the use of Intel SGX for Secure Many-Party Applications slide 14 /23
15 Implementation: Architecture Kubilay Ahmet Kucuk, University of Oxford Exploring the use of Intel SGX for Secure Many-Party Applications slide 15 /23
16 Implementation: Flow Kubilay Ahmet Kucuk, University of Oxford Exploring the use of Intel SGX for Secure Many-Party Applications slide 16 /23
17 Implementation: Abstract Kubilay Ahmet Kucuk, University of Oxford Exploring the use of Intel SGX for Secure Many-Party Applications slide 17 /23
18 Experiment Skylake SGX machine Dell Latitude E5570 June 2016 SGX SDK Basic Network Simulated SMDs DLMS-COSEM Kubilay Ahmet Kucuk, University of Oxford Exploring the use of Intel SGX for Secure Many-Party Applications slide 18 /23
19 Results: Comparison of TPM-based and SGX-based Kubilay Ahmet Kucuk, University of Oxford Exploring the use of Intel SGX for Secure Many-Party Applications slide 19 /23
20 Results: Performance of SGX-based TRE Kubilay Ahmet Kucuk, University of Oxford Exploring the use of Intel SGX for Secure Many-Party Applications slide 20 /23
21 Security Evaluation SGX-based TRE No Outside Calls No Secret dependent access patterns SGX features. Kubilay Ahmet Kucuk, University of Oxford Exploring the use of Intel SGX for Secure Many-Party Applications slide 21 /23
22 Conclusion SGX-based TRE Template for Many Party apps Comparison of approaches Smaller TCB Stronger Adversary Kubilay Ahmet Kucuk, University of Oxford Exploring the use of Intel SGX for Secure Many-Party Applications slide 22 /23
23 Questions Any comments? Kubilay Ahmet Kucuk, University of Oxford Exploring the use of Intel SGX for Secure Many-Party Applications slide 23 /23
Remote Internet voting: developing a secure and efficient frontend
CSIT (September 2013) 1(3):231 241 DOI 10.1007/s40012-013-0021-5 ORIGINAL RESEARCH Remote Internet voting: developing a secure and efficient frontend Vinodu George M. P. Sebastian Received: 11 February
More informationCHAPTER 2 LITERATURE REVIEW
19 CHAPTER 2 LITERATURE REVIEW This chapter presents a review of related works in the area of E- voting system. It also highlights some gaps which are required to be filled up in this respect. Chaum et
More informationSwiss E-Voting Workshop 2010
Swiss E-Voting Workshop 2010 Verifiability in Remote Voting Systems September 2010 Jordi Puiggali VP Research & Development Jordi.Puiggali@scytl.com Index Auditability in e-voting Types of verifiability
More informationFormal Verification of Selene with the Tamarin prover
Formal Verification of Selene with the Tamarin prover (E-Vote-ID - PhD Colloquium) Marie-Laure Zollinger Université du Luxembourg October 2, 2018 Marie-Laure Zollinger Formal Verification of Selene with
More information4th International Industrial Supercomputing Workshop Supercomputing for industry and SMEs in the Netherlands
4th International Industrial Supercomputing Workshop Supercomputing for industry and SMEs in the Netherlands Dr. Peter Michielse Deputy Director 1 Agenda q Historical example: oil reservoir simulation
More informationChallenges and Advances in E-voting Systems Technical and Socio-technical Aspects. Peter Y A Ryan Lorenzo Strigini. Outline
Challenges and Advances in E-voting Systems Technical and Socio-technical Aspects Peter Y A Ryan Lorenzo Strigini 1 Outline The problem. Voter-verifiability. Overview of Prêt à Voter. Resilience and socio-technical
More informationPRIVACY in electronic voting
PRIVACY in electronic voting Michael Clarkson Cornell University Workshop on Foundations of Security and Privacy July 15, 2010 Secret Ballot Florida 2000: Bush v. Gore Flawless Security FAIL Analysis
More informationCSE 520S Real-Time Systems
CSE 520S Real-Time Systems Prof. Chenyang Lu TAs: Haoran Li, Yehan Ma Real-Time Systems Ø Systems operating under timing constraints q Automobiles. q Airplanes. q Mars rovers. q Game console. q Factory
More informationNetvote: A Blockchain Voting Protocol
Netvote: A Blockchain Voting Protocol Technical White Paper Jonathan Alexander Steven Landers Ben Howerton jalexander@netvote.io steven@netvote.io ben@netvote.io June 22, 2018 Version 1.12 Abstract This
More informationInternet of Things Wireless Sensor Networks. Chenyang Lu
Internet of Things Wireless Sensor Networks Chenyang Lu Internet of Things Ø Convergence of q Miniaturized hardware: processor+sensors+wireless q Low-power wireless: connect millions of devices to the
More informationDesign and Prototype of a Coercion-Resistant, Voter Verifiable Electronic Voting System
29 Design and Prototype of a Coercion-Resistant, Voter Verifiable Electronic Voting System Anna M. Shubina Department of Computer Science Dartmouth College Hanover, NH 03755 E-mail: ashubina@cs.dartmouth.edu
More informationA Micro-Benchmark Evaluation of Catamount and Cray Linux Environment (CLE) Performance
A Micro-Benchmark Evaluation of Catamount and Cray Linux Environment (CLE) Performance Jeff Larkin Cray Inc. Jeff Kuehn ORNL Does CLE waddle like a penguin, or run like
More informationPRIVACY PRESERVING IN ELECTRONIC VOTING
PRIVACY PRESERVING IN ELECTRONIC VOTING Abstract Ai Thao Nguyen Thi 1 and Tran Khanh Dang 2 1,2 Faculty of Computer Science and Engineering, HCMC University of Technology 268 Ly Thuong Kiet Street, District
More informationPrivacy of E-Voting (Internet Voting) Erman Ayday
Privacy of E-Voting (Internet Voting) Erman Ayday Security/Privacy of Elections Since there have been elections, there has been tampering with votes Archaeologists discovered a dumped stash of 190 broken
More informationDistributed Protocols at the Rescue for Trustworthy Online Voting
Distributed Protocols at the Rescue for Trustworthy Online Voting ICISSP 2017 in Porto Robert Riemann, Stéphane Grumbach Inria Rhône-Alpes, Lyon 19th February 2017 Outline 1 Voting in the Digital Age 2
More informationAddressing the Challenges of e-voting Through Crypto Design
Addressing the Challenges of e-voting Through Crypto Design Thomas Zacharias University of Edinburgh 29 November 2017 Scotland s Democratic Future: Exploring Electronic Voting Scottish Government and University
More informationInt. J. of Security and Networks, Vol. x, No. x, 201X 1, Vol. x, No. x, 201X 1
Int. J. of Security and Networks, Vol. x, No. x, 201X 1, Vol. x, No. x, 201X 1 Receipt-Freeness and Coercion Resistance in Remote E-Voting Systems Yefeng Ruan Department of Computer and Information Science,
More informationCase Study. MegaMatcher Accelerator
MegaMatcher Accelerator Case Study Venezuela s New Biometric Voter Registration System Based on MegaMatcher biometric technology, the new system enrolls registered voters and verifies identity during local,
More informationUnion Elections. Online Voting. for Credit. Helping increase voter turnout & provide accessible, efficient and secure election processes.
Online Voting for Credit Union Elections Helping increase voter turnout & provide accessible, efficient and secure election processes. In a time of cyber-security awareness, Federal Credit Unions and other
More informationThe Economist Case Study: Blockchain-based Digital Voting System. Team UALR. Connor Young, Yanyan Li, and Hector Fernandez
The Economist Case Study: Blockchain-based Digital Voting System Team UALR Connor Young, Yanyan Li, and Hector Fernandez University of Arkansas at Little Rock Introduction Digital voting has been around
More informationThe Community Capability Model Framework & Tools
The Community Capability Model Framework & Tools Community Capability Model Framework for Data-Intensive Research: Roll-out across Disciplines Community Capability Model Interest Group Meeting RDA 2 nd
More informationGeneral Framework of Electronic Voting and Implementation thereof at National Elections in Estonia
State Electoral Office of Estonia General Framework of Electronic Voting and Implementation thereof at National Elections in Estonia Document: IVXV-ÜK-1.0 Date: 20 June 2017 Tallinn 2017 Annotation This
More informationSecure Voter Registration and Eligibility Checking for Nigerian Elections
Secure Voter Registration and Eligibility Checking for Nigerian Elections Nicholas Akinyokun Second International Joint Conference on Electronic Voting (E-Vote-ID 2017) Bregenz, Austria October 24, 2017
More informationFall Detection for Older Adults with Wearables. Chenyang Lu
Fall Detection for Older Adults with Wearables Chenyang Lu Internet of Medical Things Ø Wearables: wristbands, smart watches q Continuous monitoring q Sensing: activity, heart rate, sleep, (pulse-ox, glucose
More informationShould We Vote Online? Martyn Thomas CBE FREng Livery Company Professor of Information Technology Gresham College
Should We Vote Online? Martyn Thomas CBE FREng Livery Company Professor of Information Technology Gresham College 1 Principles of Democratic Election Venice Commission universal: in principle, all humans
More informationProgramming with Android: SDK install and initial setup. Dipartimento di Informatica: Scienza e Ingegneria Università di Bologna
Programming with Android: SDK install and initial setup Luca Bedogni Marco Di Felice Dipartimento di Informatica: Scienza e Ingegneria Università di Bologna SDK and initial setup: Outline Ø Today: How
More informationCS 5523 Operating Systems: Intro to Distributed Systems
CS 5523 Operating Systems: Intro to Distributed Systems Instructor: Dr. Tongping Liu Thank Dr. Dakai Zhu, Dr. Palden Lama for providing their slides. Outline Different Distributed Systems Ø Distributed
More informationNEW REGIONAL TRADE ARCHITECTURE, SYSTEMIC COHERENCE AND DEVELOPMENT
Multi-year Expert Meeting on Enhancing the Enabling Economic Environment at All Levels in Support of Inclusive and Sustainable Development (2nd session) Towards an enabling multilateral trading system
More informationSecure Electronic Voting
Secure Electronic Voting Dr. Costas Lambrinoudakis Lecturer Dept. of Information and Communication Systems Engineering University of the Aegean Greece & e-vote Project, Technical Director European Commission,
More informationResponse to the Scottish Government s Consultation on Electoral Reform
Response to the Scottish Government s Consultation on Electoral Reform By Dr John Ault and Alex Ollington 12 th March 2018 1 Introduction Democracy Volunteers is the UK s leading domestic election observation
More informationM-Vote (Online Voting System)
ISSN (online): 2456-0006 International Journal of Science Technology Management and Research Available online at: M-Vote (Online Voting System) Madhuri Mahajan Madhuri Wagh Prof. Puspendu Biswas Yogeshwari
More informationCRYPTOGRAPHIC PROTOCOLS FOR TRANSPARENCY AND AUDITABILITY IN REMOTE ELECTRONIC VOTING SCHEMES
Scytl s Presentation CRYPTOGRAPHIC PROTOCOLS FOR TRANSPARENCY AND AUDITABILITY IN REMOTE ELECTRONIC VOTING SCHEMES Spain Cryptography Days (SCD 2011) Department of Mathematics Seminar Sandra Guasch Researcher
More informationSmart Voting System using UIDAI
IJIRST National Conference on Networks, Intelligence and Computing Systems March 2017 Smart Voting System using UIDAI Mrs. Nandhini M 1 Mr. Vasanthakumar M 2 1 Assistant Professor 2 B.Tech Final Year Student
More informationPatent Law. Prof. Roger Ford September 28, 2016 Class 7 Novelty: (AIA) 102(a)(1) prior art. Recap
Patent Law Prof. Roger Ford September 28, 2016 Class 7 Novelty: (AIA) 102(a)(1) prior art Recap Recap Novelty: introduction Anticipation: the basics Accidental anticipation Today s agenda Today s agenda
More informationThe usage of electronic voting is spreading because of the potential benefits of anonymity,
How to Improve Security in Electronic Voting? Abhishek Parakh and Subhash Kak Department of Electrical and Computer Engineering Louisiana State University, Baton Rouge, LA 70803 The usage of electronic
More informationTrustwave Subscriber Agreement for Digital Certificates Ver. 15FEB17
Trustwave Subscriber Agreement for Digital Certificates Ver. 15FEB17 IMPORTANT: PLEASE READ THIS AGREEMENT AND THE TRUSTWAVE CERTIFICATION PRACTICES STATEMENTS ( CPS ) CAREFULLY BEFORE USING THE CERTIFICATE
More informationPlease silence your cell phone. View this presentation and other pollworker-related materials at:
SUPERVISORS Please silence your cell phone View this presentation and other pollworker-related materials at: http://www.elections.ri.gov/pollworkers Bring your pollworker manual with you to the polls Rhode
More informationSaturday, 7 November 15
CSCU9Q5 Data Protection and Freedom of Information Acts 1 The Data Protection Legislation As an individual you should know about your rights with respect to data held about you As an information professional
More informationVoting Protocol. Bekir Arslan November 15, 2008
Voting Protocol Bekir Arslan November 15, 2008 1 Introduction Recently there have been many protocol proposals for electronic voting supporting verifiable receipts. Although these protocols have strong
More informationMidas+ Seeker v2012 Enhancements and Open Forum. Jana Darnell, CPMSM, CPCS Product Manager, Midas+ Seeker
Midas+ Seeker v2012 Enhancements and Open Forum Jana Darnell, CPMSM, CPCS Product Manager, Midas+ Seeker New Look and Feel 21st Annual Midas+ User Symposium May 20 23, 2012 Tucson, Arizona 2 Bio Entry
More informationIncome and Optimism in North Africa: Steps to a Social Cohesion Index
Income and Optimism in North Africa: Steps to a Social Cohesion Index Bob Tortora Steve Crabtree Gallup bob_tortora@gallup.com April 2011 Copyright Standards This document contains proprietary research,
More informationCSCU9Q5. Data Protection and Freedom of Information Acts
CSCU9Q5 Data Protection and Freedom of Information Acts 1 The Data Protection Legislation As an individual you should know about your rights with respect to data held about you As an information professional
More informationINTRODUCTION BACKGROUND. Chapter One
Chapter One INTRODUCTION BACKGROUND The U.S. Army has a growing need to improve access control for its many systems, both in wartime and in peacetime. In wartime, the Army s dependence on information as
More informationBiometrics in Border Management Grand Challenges for Security, Identity and Privacy
Boston, 14-18 February 2008 AAAS Annual Meeting 1 Joint Research Centre (JRC) The European Commission s Research-Based Policy Support Organisation Biometrics in Border Management Grand Challenges for Security,
More informationSeminar on Strategic Trade Controls in Southeast Asia: Session 6: Industry Outreach
Seminar on Strategic Trade Controls in Southeast Asia: Session 6: Industry Outreach Robert Shaw James Martin Center for Nonproliferation Studies Middlebury Institute of International Studies at Monterey
More informationE- Voting System [2016]
E- Voting System 1 Mohd Asim, 2 Shobhit Kumar 1 CCSIT, Teerthanker Mahaveer University, Moradabad, India 2 Assistant Professor, CCSIT, Teerthanker Mahaveer University, Moradabad, India 1 asimtmu@gmail.com
More informationBatch binary Edwards. D. J. Bernstein University of Illinois at Chicago NSF ITR
Batch binary Edwards D. J. Bernstein University of Illinois at Chicago NSF ITR 0716498 Nonnegative elements of Z: etc. 0 meaning 0 1 meaning 2 0 10 meaning 2 1 11 meaning 2 0 + 2 1 100 meaning 2 2 101
More informationReceipt-Free Homomorphic Elections and Write-in Voter Verified Ballots
Receipt-Free Homomorphic Elections and Write-in Voter Verified Ballots Alessandro Acquisti April 2004 CMU-ISRI-04-116 Institute for Software Research International and H. John Heinz III School of Public
More informationABC systems in Europe and beyond - status and recommendations for the way forward
ABC systems in Europe and beyond - status and recommendations for the way forward Markus Clabian, AIT Austrian Institute of Technology GmbH, Coordinator FastPass Andreas Kriechbaum-Zabini AIT Austrian
More informationSecure Electronic Voting: New trends, new threats, new options. Dimitris Gritzalis
Secure Electronic Voting: New trends, new threats, new options Dimitris Gritzalis 7 th Computer Security Incidents Response Teams Workshop Syros, Greece, September 2003 Secure Electronic Voting: New trends,
More informationORIGINAL PASSPORTS Escrito por peterhayye - 05/05/ :53
ORIGINAL PASSPORTS ONLINE(puredocuments21@gmail.com) Escrito por peterhayye - 05/05/2018 18:53 Have you been searching for a passport, SSN, driver's license, I.D, Birth certificate, diploma or any other
More information"Corruption" Andrei Schleifer and Robert Vishny. August Andrei Schleifer and Robert Vishny () Corruption August / 11
"Corruption" Andrei Schleifer and Robert Vishny August 1993 Andrei Schleifer and Robert Vishny () Corruption August 1993 1 / 11 Overview Previous articles discuss corruption as a Principal-Agent problem
More informationCERTIFICATE SUBSCRIBER AGREEMENT FOR DIGITAL CERTIFICATES
YOU MUST READ THIS ("SUBSCRIBER AGREEMENT") CAREFULLY BEFORE APPLYING FOR, ACCEPTING, OR USING A DIGITAL CERTIFICATE ("CERTIFICATE"). A CERTIFICATE WILL ONLY BE ISSUED TO YOU IF YOU ACCEPT ALL OF THE TERMS
More informationDesigning issues and requirement to develop online e- voting system systems having a voter verifiable audit trail.
PAPER ID: IJIFR/V1/E4/019 ISSN (Online):2347-1697 Designing issues and requirement to develop online e- voting system systems 1 Indresh Aggarwal, 2 Dr. Vishal Kumar 1 Research Scholar, Department of computer
More informationThe Effectiveness of Receipt-Based Attacks on ThreeBallot
The Effectiveness of Receipt-Based Attacks on ThreeBallot Kevin Henry, Douglas R. Stinson, Jiayuan Sui David R. Cheriton School of Computer Science University of Waterloo Waterloo, N, N2L 3G1, Canada {k2henry,
More informationArthur M. Keller, Ph.D. David Mertz, Ph.D.
Open Source Voting Arthur M. Keller, Ph.D. David Mertz, Ph.D. Outline Concept Fully Disclosed Voting Systems Open Source Voting Systems Existing Open Source Voting Systems Open Source Is Not Enough Barriers
More informationIntroduction of Electronic Voting In Namibia
Use of ICT in Electoral Processes Introduction of Electronic Voting In Namibia Commissioner U. Freyer Electoral Commission of Namibia Praia, Cape Verde November 2017 1 Presentation Outline 1. Background
More informationDESIGN AND ANALYSIS OF SECURED ELECTRONIC VOTING PROTOCOL
DESIGN AND ANALYSIS OF SECURED ELECTRONIC VOTING PROTOCOL 1 KALAICHELVI V, 2 Dr.RM.CHANDRASEKARAN 1 Asst. Professor (Ph. D Scholar), SRC- Sastra University, Kumbakonam, India 2 Professor, Annamalai University,
More informationJohns Hopkins University Security Privacy Applied Research Lab
Johns Hopkins University Security Privacy Applied Research Lab Protecting Against Privacy Compromise and Ballot Stuffing by Eliminating Non-Determinism from End-to-end Voting Schemes Technical Report SPAR-JHU:RG-SG-AR:245631
More informationThe Government of Japan and the European Atomic Energy Community (hereinafter referred to as EURATOM ), collectively referred to as the Parties,
AGREEMENT BETWEEN THE GOVERNMENT OF JAPAN AND THE EUROPEAN ATOMIC ENERGY COMMUNITY FOR THE JOINT IMPLEMENTATION OF THE BROADER APPROACH ACTIVITIES IN THE FIELD OF FUSION ENERGY RESEARCH The Government
More informationBITIBU WHITEPAPER 08 AUGUST 2018 BITIBU TECHNOLOGY V 1.0
BITIBU WHITEPAPER 08 AUGUST 2018 BITIBU TECHNOLOGY V 1.0 INTRODUCTION Bitcoin is the first decentralized peer-to-peer and the most prominent cryptocurrency. Cryptocurrency is a kind of digital currency,
More informationThe Politics of the Envelope Alejandro Zaera-Polo (2008)
The Politics of the Envelope Alejandro Zaera-Polo (2008) Alejandro Zaera-Polo born: nationality: work: 1963 Madrid, Spain Office for Metropolitan Architecture [OMA] (1991-1993) Foreign Office Architects
More informationCanada s FASTER-PrivBio Project Biometrics at the Virtual Border to enhance security and facilitation
Canada s FASTER-PrivBio Project Biometrics at the Virtual Border to enhance security and facilitation Hubert Laferrière, Director, Immigration Refugees and Citizenship Canada, Government of Canada Gordon
More informationChapter. Sampling Distributions Pearson Prentice Hall. All rights reserved
Chapter 8 Sampling Distributions 2010 Pearson Prentice Hall. All rights reserved Section 8.1 Distribution of the Sample Mean 2010 Pearson Prentice Hall. All rights reserved Objectives 1. Describe the distribution
More informationSlide 1. Slide 2. Slide 3. Choosing the Best Training Visa: H-3 or J-1? Overview. Why choosing a training visa can be so.
Slide 1 Choosing the Best Training Visa: H-3 or J-1? ILW Teleconference July 15, 2009 Slide 2 Overview Why choosing a training visa can be so H-3 legal standards J-1 trainee & intern legal standards Comparison
More information3T Software Labs EULA
3T Software Labs EULA Any use of the Software (as defined below) is subject to the terms of this licence agreement ( Agreement ). Please read the full Agreement carefully. You confirm that you accept and
More informationAbstract: We present a modular voting architecture in which vote generation is performed separately from vote casting.
A Modular Voting Architecture ( Frogs ) by Shuki Bruck (CalTech, bruck@paradise.caltech.edu) David Jefferson (Compaq, jefferson@pa.dec.com) Ronald L. Rivest (MIT, rivest@mit.edu) August 18, 2001 Abstract:
More informationbitqy The official cryptocurrency of bitqyck, Inc. per valorem coeptis Whitepaper v1.0 bitqy The official cryptocurrency of bitqyck, Inc.
bitqy The official cryptocurrency of bitqyck, Inc. per valorem coeptis Whitepaper v1.0 bitqy The official cryptocurrency of bitqyck, Inc. Page 1 TABLE OF CONTENTS Introduction to Cryptocurrency 3 Plan
More informationVoting Systems: From Art to Science 1RWH
1 Voting Systems: From Art to Science Voting Technology Conference 2001 Pasadena, Calif., March 30-31 31 Caltech/MIT Ed Gerck, Ph.D. egerck@safevote safevote.com CEO & VP of Technology 1 1RWH 7KLVSUHVHQWDWLRQGHDOVZLWKDJHQHUDOPRGHOIRUYRWLQJXVLQJ
More informationQuality of Service in Optical Telecommunication Networks
Quality of Service in Optical Telecommunication Networks Periodic Summary & Future Research Ideas Zhizhen Zhong 2015.08.28 @Networks Lab Group Meeting 1 Outline Ø Background Ø Preemptive Service Degradation
More informationIntroduction-cont Pattern classification
How are people identified? Introduction-cont Pattern classification Biometrics CSE 190-a Lecture 2 People are identified by three basic means: Something they have (identity document or token) Something
More informationRecommendations of the Symposium. Facilitating Voting as People Age: Implications of Cognitive Impairment March 2006
Recommendations of the Symposium Facilitating Voting as People Age: Implications of Cognitive Impairment March 2006 1. Basic Principles and Goals While the symposium focused on disability caused by cognitive
More informationAgora. Bringing our voting systems into the 21st century. Whitepaper Version 0.2
Agora Bringing our voting systems into the 21st century Whitepaper Version 0.2 CONTENTS Disclaimer 1. AGORA 1.1. Mission Transparency Privacy Integrity Affordability Accessibility 1.2. Our Customers Providing
More informationThe E-voting Controversy: What are the Risks?
Panel Session and Open Discussion Join us for a wide-ranging debate on electronic voting, its risks, and its potential impact on democracy. The E-voting Controversy: What are the Risks? Wednesday April
More informationLAW OF EVIDENCE A: 2017
LAW OF EVIDENCE A: 2017 OVERVIEW: PURPOSE OF THE COURSE: For the student to acquire a basic knowledge of general principles relating to the law of evidence. With the knowledge acquired in this course the
More informationSoftware Agents Behaviour.
From Human Regulations to einstitutions From Human Regulations to Regulated Software Agents Behaviour. (einstitutions: the KEMLG@UPC and IS@Utrecht view) Javier Vázquez-Salceda May 20, 2005 http://www.lsi.upc.es/~webia/kemlg
More informationSECURE REMOTE VOTER REGISTRATION
SECURE REMOTE VOTER REGISTRATION August 2008 Jordi Puiggali VP Research & Development Jordi.Puiggali@scytl.com Index Voter Registration Remote Voter Registration Current Systems Problems in the Current
More informationIFTECH INVENTING FUTURE TECHNOLOGY INC. ARAIG SDK AGREEMENT
OVERVIEW: The following pages of this PDF are IFTech Inventing Future Technology Inc. s ARAIG As Real As It Gets ARAIG SDK Licence Agreement. To receive the ARAIG Software Development Kit, you must read
More informationSecurity Proofs for Participation Privacy, Receipt-Freeness, Ballot Privacy, and Verifiability Against Malicious Bulletin Board for the Helios Voting Scheme David Bernhard 1, Oksana Kulyk 2, Melanie Volkamer
More informationWe should share our secrets
We should share our secrets Shamir secret sharing: how it works and how to implement it Daan Sprenkels hello@dsprenkels.com Radboud University Nijmegen 28 December 2017 Daan Sprenkels We should share our
More informationDepartment of Industrial Engineering: Research Groups
Department of Industrial Engineering: Research Groups Engineering Management and Sustainable Systems Operations Management and Supply Chain Management Supply Chain Economics Operations Research Computer
More informationAn Introduction to Cryptographic Voting Systems
Kickoff Meeting E-Voting Seminar An Introduction to Cryptographic Voting Systems Andreas Steffen Hochschule für Technik Rapperswil andreas.steffen@hsr.ch A. Steffen, 27.02.2012, Kickoff.pptx 1 Cryptographic
More informationCS 5523: Operating Systems
Lecture1: OS Overview CS 5523: Operating Systems Instructor: Dr Tongping Liu Midterm Exam: Oct 2, 2017, Monday 7:20pm 8:45pm Operating System: what is it?! Evolution of Computer Systems and OS Concepts
More informationATTENDANCE RULES BY THE RIBI CONSTITUTION. Article 12 Attendance [ See article 7 for exceptions to the provisions of this article ]
ATTENDANCE RULES BY THE RIBI CONSTITUTION Article 12 Attendance [ See article 7 for exceptions to the provisions of this article ] Section 1 - General Provisions Each member should attend this club s regular
More information福井大学審査 学位論文 博士 ( 工学 )
福井大学審査 学位論文 博士 ( 工学 A Dissertation Submitted to the University of Fukui for Degree of Doctor of Engineering A Scheme for Electronic Voting Systems 電子投票システムの研究 カジムハマドロキブル Kazi Md. Rokibul アラム Alam 2010
More informationCOMPUTING SCIENCE. University of Newcastle upon Tyne. Verified Encrypted Paper Audit Trails. P. Y. A. Ryan TECHNICAL REPORT SERIES
UNIVERSITY OF NEWCASTLE University of Newcastle upon Tyne COMPUTING SCIENCE Verified Encrypted Paper Audit Trails P. Y. A. Ryan TECHNICAL REPORT SERIES No. CS-TR-966 June, 2006 TECHNICAL REPORT SERIES
More informationM-Polling with QR-Code Scanning and Verification
IJSTE - International Journal of Science Technology & Engineering Volume 3 Issue 09 March 2017 ISSN (online): 2349-784X M-Polling with QR-Code Scanning and Verification Jaichithra K Subbulakshmi S B. Tech
More informationKeys to a Sustainable Development Path
Keys to a Sustainable Development Path Prof. Shigeru T. OTSUBO GSID, Nagoya University Topic 1 The Evolution of a Development Paradigm Revolutions and & the Evolution of Economic Systems This part was
More informationSecurity Analysis on an Elementary E-Voting System
128 Security Analysis on an Elementary E-Voting System Xiangdong Li, Computer Systems Technology, NYC College of Technology, CUNY, Brooklyn, New York, USA Summary E-voting using RFID has many advantages
More informationIntroduction to Policy and Public Affairs World Cancer Research Fund International
Introduction to Policy and Public Affairs World Cancer Research Fund International Advancing the development and implementation of effective policies worldwide to help people reduce their risk of cancer
More informationSupporting Debates over Citizen Initiatives
Supporting Debates over Citizen Initiatives Kishore R. Kattamuri and Marius C. Silaghi Florida Institute of Techology {kattamuk,msilaghi}@fit.edu January 26, 2005 Technical Report CS-2005-3 Abstract Popular/citizen
More informationA Linked-List Approach to Cryptographically Secure Elections Using Instant Runoff Voting
A Linked-List Approach to Cryptographically Secure Elections Using Instant Runoff Voting Jason Keller 1 and Joe Kilian 2 1 Department of Computer Science, Rutgers University, Piscataway, NJ 08854 USA jakeller@eden.rutgers.edu
More informationSurvey of Fully Verifiable Voting Cryptoschemes
Survey of Fully Verifiable Voting Cryptoschemes Brandon Carter, Ken Leidal, Devin Neal, Zachary Neely Massachusetts Institute of Technology [bcarter, kkleidal, devneal, zrneely]@mit.edu 6.857 Final Project
More informationLME App Terms of Use [Google/ Android specific]
LME App Terms of Use [Google/ Android specific] Please read these terms carefully because they set out the terms of a legally binding agreement (the Terms of Use ) between you and the London Metal Exchange
More informationMaking First Vote YOUR Vote: Designing a Schoolwide Election Overview Materials Duration Preparation Procedure Introduction to Boards of Elections
Making First Vote YOUR Vote: Designing a Schoolwide Election Overview In order to more deeply engage students in the First Vote school-wide election process, teachers are encouraged to not only allow students
More informationColorado s Risk-Limiting Audits (RLA) CO Risk-Limiting Audits -- Feb Neal McBurnett
Colorado s Risk-Limiting Audits (RLA) CO Risk-Limiting Audits -- Feb 2018 -- Neal McBurnett Overview of the Journey Post-Election Audits are Important How Traditional Audits Work Why RLA is better Definitions
More informationReceipt-Free Homomorphic Elections and Write-in Ballots
Receipt-Free Homomorphic Elections and Write-in Ballots Alessandro Acquisti Carnegie Mellon University Posted November 5, 2003 Revised: May 4, 2004 Abstract Abstract. We present a voting protocol that
More informationThe Costs of Remoteness, Evidence From German Division and Reunification by Redding and Sturm (AER, 2008)
The Costs of Remoteness, Evidence From German Division and Reunification by Redding and Sturm (AER, 2008) MIT Spatial Economics Reading Group Presentation Adam Guren May 13, 2010 Testing the New Economic
More informationMachine-Assisted Election Auditing
Machine-Assisted Election Auditing Joseph A. Calandrino *, J. Alex Halderman *, and Edward W. Felten *, * Center for Information Technology Policy and Dept. of Computer Science, Princeton University Woodrow
More informationLecture 8: Verification and Validation
Thanks to Prof. Steve Easterbrook University of Toronto What are goals of V&V Validation Techniques Ø Inspection Ø Model Checking Ø Prototyping Verification Techniques Ø Consistency Checking Lecture 8:
More information