Exploring the use of Intel SGX for Secure Many-Party Applications

Size: px
Start display at page:

Download "Exploring the use of Intel SGX for Secure Many-Party Applications"

Transcription

1 Exploring the use of Intel SGX for Secure Many-Party Applications SysTEX 16 K. A. Kucuk University of Oxford, UK December 12, 2016 Kubilay Ahmet Kucuk, University of Oxford Exploring the use of Intel SGX for Secure Many-Party Applications slide 1 /23

2 Overview 1. Introduction 2. Trustworthy Remote Entity (TRE) 3. SGX-based TRE 4. Results Kubilay Ahmet Kucuk, University of Oxford Exploring the use of Intel SGX for Secure Many-Party Applications slide 2 /23

3 Yao s Millionaires Problem Kubilay Ahmet Kucuk, kucuk@cs.ox.ac.uk, University of Oxford Exploring the use of Intel SGX for Secure Many-Party Applications slide 3 /23

4 Multi Party Computation (MPC) Limited scalability, Cryptographic primitives Kubilay Ahmet Kucuk, University of Oxford Exploring the use of Intel SGX for Secure Many-Party Applications slide 4 /23

5 Ideal MPC Third Party, Trust Issues Kubilay Ahmet Kucuk, University of Oxford Exploring the use of Intel SGX for Secure Many-Party Applications slide 5 /23

6 Many Party Application: Road Pricing Location-based services..diminishes the privacy Kubilay Ahmet Kucuk, University of Oxford Exploring the use of Intel SGX for Secure Many-Party Applications slide 6 /23

7 Many Party Application: Smart Grid aggregate measurements over multiple consumers Kubilay Ahmet Kucuk, University of Oxford Exploring the use of Intel SGX for Secure Many-Party Applications slide 7 /23

8 A Possible Solution... Trustworthy Remote Entity (TRE) ICR TRE P 1 P 2 P n card(icr) = n TRE Based on Trusted Computing Essentially a verifiable trusted third party (vttp) Comparable to the idealised version (TTP) in the MPC world Kubilay Ahmet Kucuk, kucuk@cs.ox.ac.uk, University of Oxford Exploring the use of Intel SGX for Secure Many-Party Applications slide 8 /23

9 TPM-based TRE Using TXT and TPM Final State Attestation (FSA) Bare-metal, event-driven Privacy Preserving Small TCB, Optimized Kubilay Ahmet Kucuk, University of Oxford Exploring the use of Intel SGX for Secure Many-Party Applications slide 9 /23

10 Other TRE possibilities Intel SGX; sgxtre, Middlebox, Compute Provider ARM TrustZone Kubilay Ahmet Kucuk, University of Oxford Exploring the use of Intel SGX for Secure Many-Party Applications slide 10 /23

11 Contributions SGX-based TRE SGX Benchmarks Design and Prototype Comparison Kubilay Ahmet Kucuk, University of Oxford Exploring the use of Intel SGX for Secure Many-Party Applications slide 11 /23

12 Requirements Security and Performance Req. Secure Computation and Communication Secure Attestation Scalability and Latency Kubilay Ahmet Kucuk, University of Oxford Exploring the use of Intel SGX for Secure Many-Party Applications slide 12 /23

13 Adversary Model Malicious Operator of TRE Dolev-Yao Network Adv. SMM, BIOS, OS Physical Access Kubilay Ahmet Kucuk, University of Oxford Exploring the use of Intel SGX for Secure Many-Party Applications slide 13 /23

14 Benchmarking Functionalities Kubilay Ahmet Kucuk, University of Oxford Exploring the use of Intel SGX for Secure Many-Party Applications slide 14 /23

15 Implementation: Architecture Kubilay Ahmet Kucuk, University of Oxford Exploring the use of Intel SGX for Secure Many-Party Applications slide 15 /23

16 Implementation: Flow Kubilay Ahmet Kucuk, University of Oxford Exploring the use of Intel SGX for Secure Many-Party Applications slide 16 /23

17 Implementation: Abstract Kubilay Ahmet Kucuk, University of Oxford Exploring the use of Intel SGX for Secure Many-Party Applications slide 17 /23

18 Experiment Skylake SGX machine Dell Latitude E5570 June 2016 SGX SDK Basic Network Simulated SMDs DLMS-COSEM Kubilay Ahmet Kucuk, University of Oxford Exploring the use of Intel SGX for Secure Many-Party Applications slide 18 /23

19 Results: Comparison of TPM-based and SGX-based Kubilay Ahmet Kucuk, University of Oxford Exploring the use of Intel SGX for Secure Many-Party Applications slide 19 /23

20 Results: Performance of SGX-based TRE Kubilay Ahmet Kucuk, University of Oxford Exploring the use of Intel SGX for Secure Many-Party Applications slide 20 /23

21 Security Evaluation SGX-based TRE No Outside Calls No Secret dependent access patterns SGX features. Kubilay Ahmet Kucuk, University of Oxford Exploring the use of Intel SGX for Secure Many-Party Applications slide 21 /23

22 Conclusion SGX-based TRE Template for Many Party apps Comparison of approaches Smaller TCB Stronger Adversary Kubilay Ahmet Kucuk, University of Oxford Exploring the use of Intel SGX for Secure Many-Party Applications slide 22 /23

23 Questions Any comments? Kubilay Ahmet Kucuk, University of Oxford Exploring the use of Intel SGX for Secure Many-Party Applications slide 23 /23

Remote Internet voting: developing a secure and efficient frontend

Remote Internet voting: developing a secure and efficient frontend CSIT (September 2013) 1(3):231 241 DOI 10.1007/s40012-013-0021-5 ORIGINAL RESEARCH Remote Internet voting: developing a secure and efficient frontend Vinodu George M. P. Sebastian Received: 11 February

More information

CHAPTER 2 LITERATURE REVIEW

CHAPTER 2 LITERATURE REVIEW 19 CHAPTER 2 LITERATURE REVIEW This chapter presents a review of related works in the area of E- voting system. It also highlights some gaps which are required to be filled up in this respect. Chaum et

More information

Swiss E-Voting Workshop 2010

Swiss E-Voting Workshop 2010 Swiss E-Voting Workshop 2010 Verifiability in Remote Voting Systems September 2010 Jordi Puiggali VP Research & Development Jordi.Puiggali@scytl.com Index Auditability in e-voting Types of verifiability

More information

Formal Verification of Selene with the Tamarin prover

Formal Verification of Selene with the Tamarin prover Formal Verification of Selene with the Tamarin prover (E-Vote-ID - PhD Colloquium) Marie-Laure Zollinger Université du Luxembourg October 2, 2018 Marie-Laure Zollinger Formal Verification of Selene with

More information

4th International Industrial Supercomputing Workshop Supercomputing for industry and SMEs in the Netherlands

4th International Industrial Supercomputing Workshop Supercomputing for industry and SMEs in the Netherlands 4th International Industrial Supercomputing Workshop Supercomputing for industry and SMEs in the Netherlands Dr. Peter Michielse Deputy Director 1 Agenda q Historical example: oil reservoir simulation

More information

Challenges and Advances in E-voting Systems Technical and Socio-technical Aspects. Peter Y A Ryan Lorenzo Strigini. Outline

Challenges and Advances in E-voting Systems Technical and Socio-technical Aspects. Peter Y A Ryan Lorenzo Strigini. Outline Challenges and Advances in E-voting Systems Technical and Socio-technical Aspects Peter Y A Ryan Lorenzo Strigini 1 Outline The problem. Voter-verifiability. Overview of Prêt à Voter. Resilience and socio-technical

More information

PRIVACY in electronic voting

PRIVACY in electronic voting PRIVACY in electronic voting Michael Clarkson Cornell University Workshop on Foundations of Security and Privacy July 15, 2010 Secret Ballot Florida 2000: Bush v. Gore Flawless Security FAIL Analysis

More information

CSE 520S Real-Time Systems

CSE 520S Real-Time Systems CSE 520S Real-Time Systems Prof. Chenyang Lu TAs: Haoran Li, Yehan Ma Real-Time Systems Ø Systems operating under timing constraints q Automobiles. q Airplanes. q Mars rovers. q Game console. q Factory

More information

Netvote: A Blockchain Voting Protocol

Netvote: A Blockchain Voting Protocol Netvote: A Blockchain Voting Protocol Technical White Paper Jonathan Alexander Steven Landers Ben Howerton jalexander@netvote.io steven@netvote.io ben@netvote.io June 22, 2018 Version 1.12 Abstract This

More information

Internet of Things Wireless Sensor Networks. Chenyang Lu

Internet of Things Wireless Sensor Networks. Chenyang Lu Internet of Things Wireless Sensor Networks Chenyang Lu Internet of Things Ø Convergence of q Miniaturized hardware: processor+sensors+wireless q Low-power wireless: connect millions of devices to the

More information

Design and Prototype of a Coercion-Resistant, Voter Verifiable Electronic Voting System

Design and Prototype of a Coercion-Resistant, Voter Verifiable Electronic Voting System 29 Design and Prototype of a Coercion-Resistant, Voter Verifiable Electronic Voting System Anna M. Shubina Department of Computer Science Dartmouth College Hanover, NH 03755 E-mail: ashubina@cs.dartmouth.edu

More information

A Micro-Benchmark Evaluation of Catamount and Cray Linux Environment (CLE) Performance

A Micro-Benchmark Evaluation of Catamount and Cray Linux Environment (CLE) Performance A Micro-Benchmark Evaluation of Catamount and Cray Linux Environment (CLE) Performance Jeff Larkin Cray Inc. Jeff Kuehn ORNL Does CLE waddle like a penguin, or run like

More information

PRIVACY PRESERVING IN ELECTRONIC VOTING

PRIVACY PRESERVING IN ELECTRONIC VOTING PRIVACY PRESERVING IN ELECTRONIC VOTING Abstract Ai Thao Nguyen Thi 1 and Tran Khanh Dang 2 1,2 Faculty of Computer Science and Engineering, HCMC University of Technology 268 Ly Thuong Kiet Street, District

More information

Privacy of E-Voting (Internet Voting) Erman Ayday

Privacy of E-Voting (Internet Voting) Erman Ayday Privacy of E-Voting (Internet Voting) Erman Ayday Security/Privacy of Elections Since there have been elections, there has been tampering with votes Archaeologists discovered a dumped stash of 190 broken

More information

Distributed Protocols at the Rescue for Trustworthy Online Voting

Distributed Protocols at the Rescue for Trustworthy Online Voting Distributed Protocols at the Rescue for Trustworthy Online Voting ICISSP 2017 in Porto Robert Riemann, Stéphane Grumbach Inria Rhône-Alpes, Lyon 19th February 2017 Outline 1 Voting in the Digital Age 2

More information

Addressing the Challenges of e-voting Through Crypto Design

Addressing the Challenges of e-voting Through Crypto Design Addressing the Challenges of e-voting Through Crypto Design Thomas Zacharias University of Edinburgh 29 November 2017 Scotland s Democratic Future: Exploring Electronic Voting Scottish Government and University

More information

Int. J. of Security and Networks, Vol. x, No. x, 201X 1, Vol. x, No. x, 201X 1

Int. J. of Security and Networks, Vol. x, No. x, 201X 1, Vol. x, No. x, 201X 1 Int. J. of Security and Networks, Vol. x, No. x, 201X 1, Vol. x, No. x, 201X 1 Receipt-Freeness and Coercion Resistance in Remote E-Voting Systems Yefeng Ruan Department of Computer and Information Science,

More information

Case Study. MegaMatcher Accelerator

Case Study. MegaMatcher Accelerator MegaMatcher Accelerator Case Study Venezuela s New Biometric Voter Registration System Based on MegaMatcher biometric technology, the new system enrolls registered voters and verifies identity during local,

More information

Union Elections. Online Voting. for Credit. Helping increase voter turnout & provide accessible, efficient and secure election processes.

Union Elections. Online Voting. for Credit. Helping increase voter turnout & provide accessible, efficient and secure election processes. Online Voting for Credit Union Elections Helping increase voter turnout & provide accessible, efficient and secure election processes. In a time of cyber-security awareness, Federal Credit Unions and other

More information

The Economist Case Study: Blockchain-based Digital Voting System. Team UALR. Connor Young, Yanyan Li, and Hector Fernandez

The Economist Case Study: Blockchain-based Digital Voting System. Team UALR. Connor Young, Yanyan Li, and Hector Fernandez The Economist Case Study: Blockchain-based Digital Voting System Team UALR Connor Young, Yanyan Li, and Hector Fernandez University of Arkansas at Little Rock Introduction Digital voting has been around

More information

The Community Capability Model Framework & Tools

The Community Capability Model Framework & Tools The Community Capability Model Framework & Tools Community Capability Model Framework for Data-Intensive Research: Roll-out across Disciplines Community Capability Model Interest Group Meeting RDA 2 nd

More information

General Framework of Electronic Voting and Implementation thereof at National Elections in Estonia

General Framework of Electronic Voting and Implementation thereof at National Elections in Estonia State Electoral Office of Estonia General Framework of Electronic Voting and Implementation thereof at National Elections in Estonia Document: IVXV-ÜK-1.0 Date: 20 June 2017 Tallinn 2017 Annotation This

More information

Secure Voter Registration and Eligibility Checking for Nigerian Elections

Secure Voter Registration and Eligibility Checking for Nigerian Elections Secure Voter Registration and Eligibility Checking for Nigerian Elections Nicholas Akinyokun Second International Joint Conference on Electronic Voting (E-Vote-ID 2017) Bregenz, Austria October 24, 2017

More information

Fall Detection for Older Adults with Wearables. Chenyang Lu

Fall Detection for Older Adults with Wearables. Chenyang Lu Fall Detection for Older Adults with Wearables Chenyang Lu Internet of Medical Things Ø Wearables: wristbands, smart watches q Continuous monitoring q Sensing: activity, heart rate, sleep, (pulse-ox, glucose

More information

Should We Vote Online? Martyn Thomas CBE FREng Livery Company Professor of Information Technology Gresham College

Should We Vote Online? Martyn Thomas CBE FREng Livery Company Professor of Information Technology Gresham College Should We Vote Online? Martyn Thomas CBE FREng Livery Company Professor of Information Technology Gresham College 1 Principles of Democratic Election Venice Commission universal: in principle, all humans

More information

Programming with Android: SDK install and initial setup. Dipartimento di Informatica: Scienza e Ingegneria Università di Bologna

Programming with Android: SDK install and initial setup. Dipartimento di Informatica: Scienza e Ingegneria Università di Bologna Programming with Android: SDK install and initial setup Luca Bedogni Marco Di Felice Dipartimento di Informatica: Scienza e Ingegneria Università di Bologna SDK and initial setup: Outline Ø Today: How

More information

CS 5523 Operating Systems: Intro to Distributed Systems

CS 5523 Operating Systems: Intro to Distributed Systems CS 5523 Operating Systems: Intro to Distributed Systems Instructor: Dr. Tongping Liu Thank Dr. Dakai Zhu, Dr. Palden Lama for providing their slides. Outline Different Distributed Systems Ø Distributed

More information

NEW REGIONAL TRADE ARCHITECTURE, SYSTEMIC COHERENCE AND DEVELOPMENT

NEW REGIONAL TRADE ARCHITECTURE, SYSTEMIC COHERENCE AND DEVELOPMENT Multi-year Expert Meeting on Enhancing the Enabling Economic Environment at All Levels in Support of Inclusive and Sustainable Development (2nd session) Towards an enabling multilateral trading system

More information

Secure Electronic Voting

Secure Electronic Voting Secure Electronic Voting Dr. Costas Lambrinoudakis Lecturer Dept. of Information and Communication Systems Engineering University of the Aegean Greece & e-vote Project, Technical Director European Commission,

More information

Response to the Scottish Government s Consultation on Electoral Reform

Response to the Scottish Government s Consultation on Electoral Reform Response to the Scottish Government s Consultation on Electoral Reform By Dr John Ault and Alex Ollington 12 th March 2018 1 Introduction Democracy Volunteers is the UK s leading domestic election observation

More information

M-Vote (Online Voting System)

M-Vote (Online Voting System) ISSN (online): 2456-0006 International Journal of Science Technology Management and Research Available online at: M-Vote (Online Voting System) Madhuri Mahajan Madhuri Wagh Prof. Puspendu Biswas Yogeshwari

More information

CRYPTOGRAPHIC PROTOCOLS FOR TRANSPARENCY AND AUDITABILITY IN REMOTE ELECTRONIC VOTING SCHEMES

CRYPTOGRAPHIC PROTOCOLS FOR TRANSPARENCY AND AUDITABILITY IN REMOTE ELECTRONIC VOTING SCHEMES Scytl s Presentation CRYPTOGRAPHIC PROTOCOLS FOR TRANSPARENCY AND AUDITABILITY IN REMOTE ELECTRONIC VOTING SCHEMES Spain Cryptography Days (SCD 2011) Department of Mathematics Seminar Sandra Guasch Researcher

More information

Smart Voting System using UIDAI

Smart Voting System using UIDAI IJIRST National Conference on Networks, Intelligence and Computing Systems March 2017 Smart Voting System using UIDAI Mrs. Nandhini M 1 Mr. Vasanthakumar M 2 1 Assistant Professor 2 B.Tech Final Year Student

More information

Patent Law. Prof. Roger Ford September 28, 2016 Class 7 Novelty: (AIA) 102(a)(1) prior art. Recap

Patent Law. Prof. Roger Ford September 28, 2016 Class 7 Novelty: (AIA) 102(a)(1) prior art. Recap Patent Law Prof. Roger Ford September 28, 2016 Class 7 Novelty: (AIA) 102(a)(1) prior art Recap Recap Novelty: introduction Anticipation: the basics Accidental anticipation Today s agenda Today s agenda

More information

The usage of electronic voting is spreading because of the potential benefits of anonymity,

The usage of electronic voting is spreading because of the potential benefits of anonymity, How to Improve Security in Electronic Voting? Abhishek Parakh and Subhash Kak Department of Electrical and Computer Engineering Louisiana State University, Baton Rouge, LA 70803 The usage of electronic

More information

Trustwave Subscriber Agreement for Digital Certificates Ver. 15FEB17

Trustwave Subscriber Agreement for Digital Certificates Ver. 15FEB17 Trustwave Subscriber Agreement for Digital Certificates Ver. 15FEB17 IMPORTANT: PLEASE READ THIS AGREEMENT AND THE TRUSTWAVE CERTIFICATION PRACTICES STATEMENTS ( CPS ) CAREFULLY BEFORE USING THE CERTIFICATE

More information

Please silence your cell phone. View this presentation and other pollworker-related materials at:

Please silence your cell phone. View this presentation and other pollworker-related materials at: SUPERVISORS Please silence your cell phone View this presentation and other pollworker-related materials at: http://www.elections.ri.gov/pollworkers Bring your pollworker manual with you to the polls Rhode

More information

Saturday, 7 November 15

Saturday, 7 November 15 CSCU9Q5 Data Protection and Freedom of Information Acts 1 The Data Protection Legislation As an individual you should know about your rights with respect to data held about you As an information professional

More information

Voting Protocol. Bekir Arslan November 15, 2008

Voting Protocol. Bekir Arslan November 15, 2008 Voting Protocol Bekir Arslan November 15, 2008 1 Introduction Recently there have been many protocol proposals for electronic voting supporting verifiable receipts. Although these protocols have strong

More information

Midas+ Seeker v2012 Enhancements and Open Forum. Jana Darnell, CPMSM, CPCS Product Manager, Midas+ Seeker

Midas+ Seeker v2012 Enhancements and Open Forum. Jana Darnell, CPMSM, CPCS Product Manager, Midas+ Seeker Midas+ Seeker v2012 Enhancements and Open Forum Jana Darnell, CPMSM, CPCS Product Manager, Midas+ Seeker New Look and Feel 21st Annual Midas+ User Symposium May 20 23, 2012 Tucson, Arizona 2 Bio Entry

More information

Income and Optimism in North Africa: Steps to a Social Cohesion Index

Income and Optimism in North Africa: Steps to a Social Cohesion Index Income and Optimism in North Africa: Steps to a Social Cohesion Index Bob Tortora Steve Crabtree Gallup bob_tortora@gallup.com April 2011 Copyright Standards This document contains proprietary research,

More information

CSCU9Q5. Data Protection and Freedom of Information Acts

CSCU9Q5. Data Protection and Freedom of Information Acts CSCU9Q5 Data Protection and Freedom of Information Acts 1 The Data Protection Legislation As an individual you should know about your rights with respect to data held about you As an information professional

More information

INTRODUCTION BACKGROUND. Chapter One

INTRODUCTION BACKGROUND. Chapter One Chapter One INTRODUCTION BACKGROUND The U.S. Army has a growing need to improve access control for its many systems, both in wartime and in peacetime. In wartime, the Army s dependence on information as

More information

Biometrics in Border Management Grand Challenges for Security, Identity and Privacy

Biometrics in Border Management Grand Challenges for Security, Identity and Privacy Boston, 14-18 February 2008 AAAS Annual Meeting 1 Joint Research Centre (JRC) The European Commission s Research-Based Policy Support Organisation Biometrics in Border Management Grand Challenges for Security,

More information

Seminar on Strategic Trade Controls in Southeast Asia: Session 6: Industry Outreach

Seminar on Strategic Trade Controls in Southeast Asia: Session 6: Industry Outreach Seminar on Strategic Trade Controls in Southeast Asia: Session 6: Industry Outreach Robert Shaw James Martin Center for Nonproliferation Studies Middlebury Institute of International Studies at Monterey

More information

E- Voting System [2016]

E- Voting System [2016] E- Voting System 1 Mohd Asim, 2 Shobhit Kumar 1 CCSIT, Teerthanker Mahaveer University, Moradabad, India 2 Assistant Professor, CCSIT, Teerthanker Mahaveer University, Moradabad, India 1 asimtmu@gmail.com

More information

Batch binary Edwards. D. J. Bernstein University of Illinois at Chicago NSF ITR

Batch binary Edwards. D. J. Bernstein University of Illinois at Chicago NSF ITR Batch binary Edwards D. J. Bernstein University of Illinois at Chicago NSF ITR 0716498 Nonnegative elements of Z: etc. 0 meaning 0 1 meaning 2 0 10 meaning 2 1 11 meaning 2 0 + 2 1 100 meaning 2 2 101

More information

Receipt-Free Homomorphic Elections and Write-in Voter Verified Ballots

Receipt-Free Homomorphic Elections and Write-in Voter Verified Ballots Receipt-Free Homomorphic Elections and Write-in Voter Verified Ballots Alessandro Acquisti April 2004 CMU-ISRI-04-116 Institute for Software Research International and H. John Heinz III School of Public

More information

ABC systems in Europe and beyond - status and recommendations for the way forward

ABC systems in Europe and beyond - status and recommendations for the way forward ABC systems in Europe and beyond - status and recommendations for the way forward Markus Clabian, AIT Austrian Institute of Technology GmbH, Coordinator FastPass Andreas Kriechbaum-Zabini AIT Austrian

More information

Secure Electronic Voting: New trends, new threats, new options. Dimitris Gritzalis

Secure Electronic Voting: New trends, new threats, new options. Dimitris Gritzalis Secure Electronic Voting: New trends, new threats, new options Dimitris Gritzalis 7 th Computer Security Incidents Response Teams Workshop Syros, Greece, September 2003 Secure Electronic Voting: New trends,

More information

ORIGINAL PASSPORTS Escrito por peterhayye - 05/05/ :53

ORIGINAL PASSPORTS Escrito por peterhayye - 05/05/ :53 ORIGINAL PASSPORTS ONLINE(puredocuments21@gmail.com) Escrito por peterhayye - 05/05/2018 18:53 Have you been searching for a passport, SSN, driver's license, I.D, Birth certificate, diploma or any other

More information

"Corruption" Andrei Schleifer and Robert Vishny. August Andrei Schleifer and Robert Vishny () Corruption August / 11

Corruption Andrei Schleifer and Robert Vishny. August Andrei Schleifer and Robert Vishny () Corruption August / 11 "Corruption" Andrei Schleifer and Robert Vishny August 1993 Andrei Schleifer and Robert Vishny () Corruption August 1993 1 / 11 Overview Previous articles discuss corruption as a Principal-Agent problem

More information

CERTIFICATE SUBSCRIBER AGREEMENT FOR DIGITAL CERTIFICATES

CERTIFICATE SUBSCRIBER AGREEMENT FOR DIGITAL CERTIFICATES YOU MUST READ THIS ("SUBSCRIBER AGREEMENT") CAREFULLY BEFORE APPLYING FOR, ACCEPTING, OR USING A DIGITAL CERTIFICATE ("CERTIFICATE"). A CERTIFICATE WILL ONLY BE ISSUED TO YOU IF YOU ACCEPT ALL OF THE TERMS

More information

Designing issues and requirement to develop online e- voting system systems having a voter verifiable audit trail.

Designing issues and requirement to develop online e- voting system systems having a voter verifiable audit trail. PAPER ID: IJIFR/V1/E4/019 ISSN (Online):2347-1697 Designing issues and requirement to develop online e- voting system systems 1 Indresh Aggarwal, 2 Dr. Vishal Kumar 1 Research Scholar, Department of computer

More information

The Effectiveness of Receipt-Based Attacks on ThreeBallot

The Effectiveness of Receipt-Based Attacks on ThreeBallot The Effectiveness of Receipt-Based Attacks on ThreeBallot Kevin Henry, Douglas R. Stinson, Jiayuan Sui David R. Cheriton School of Computer Science University of Waterloo Waterloo, N, N2L 3G1, Canada {k2henry,

More information

Arthur M. Keller, Ph.D. David Mertz, Ph.D.

Arthur M. Keller, Ph.D. David Mertz, Ph.D. Open Source Voting Arthur M. Keller, Ph.D. David Mertz, Ph.D. Outline Concept Fully Disclosed Voting Systems Open Source Voting Systems Existing Open Source Voting Systems Open Source Is Not Enough Barriers

More information

Introduction of Electronic Voting In Namibia

Introduction of Electronic Voting In Namibia Use of ICT in Electoral Processes Introduction of Electronic Voting In Namibia Commissioner U. Freyer Electoral Commission of Namibia Praia, Cape Verde November 2017 1 Presentation Outline 1. Background

More information

DESIGN AND ANALYSIS OF SECURED ELECTRONIC VOTING PROTOCOL

DESIGN AND ANALYSIS OF SECURED ELECTRONIC VOTING PROTOCOL DESIGN AND ANALYSIS OF SECURED ELECTRONIC VOTING PROTOCOL 1 KALAICHELVI V, 2 Dr.RM.CHANDRASEKARAN 1 Asst. Professor (Ph. D Scholar), SRC- Sastra University, Kumbakonam, India 2 Professor, Annamalai University,

More information

Johns Hopkins University Security Privacy Applied Research Lab

Johns Hopkins University Security Privacy Applied Research Lab Johns Hopkins University Security Privacy Applied Research Lab Protecting Against Privacy Compromise and Ballot Stuffing by Eliminating Non-Determinism from End-to-end Voting Schemes Technical Report SPAR-JHU:RG-SG-AR:245631

More information

The Government of Japan and the European Atomic Energy Community (hereinafter referred to as EURATOM ), collectively referred to as the Parties,

The Government of Japan and the European Atomic Energy Community (hereinafter referred to as EURATOM ), collectively referred to as the Parties, AGREEMENT BETWEEN THE GOVERNMENT OF JAPAN AND THE EUROPEAN ATOMIC ENERGY COMMUNITY FOR THE JOINT IMPLEMENTATION OF THE BROADER APPROACH ACTIVITIES IN THE FIELD OF FUSION ENERGY RESEARCH The Government

More information

BITIBU WHITEPAPER 08 AUGUST 2018 BITIBU TECHNOLOGY V 1.0

BITIBU WHITEPAPER 08 AUGUST 2018 BITIBU TECHNOLOGY V 1.0 BITIBU WHITEPAPER 08 AUGUST 2018 BITIBU TECHNOLOGY V 1.0 INTRODUCTION Bitcoin is the first decentralized peer-to-peer and the most prominent cryptocurrency. Cryptocurrency is a kind of digital currency,

More information

The Politics of the Envelope Alejandro Zaera-Polo (2008)

The Politics of the Envelope Alejandro Zaera-Polo (2008) The Politics of the Envelope Alejandro Zaera-Polo (2008) Alejandro Zaera-Polo born: nationality: work: 1963 Madrid, Spain Office for Metropolitan Architecture [OMA] (1991-1993) Foreign Office Architects

More information

Canada s FASTER-PrivBio Project Biometrics at the Virtual Border to enhance security and facilitation

Canada s FASTER-PrivBio Project Biometrics at the Virtual Border to enhance security and facilitation Canada s FASTER-PrivBio Project Biometrics at the Virtual Border to enhance security and facilitation Hubert Laferrière, Director, Immigration Refugees and Citizenship Canada, Government of Canada Gordon

More information

Chapter. Sampling Distributions Pearson Prentice Hall. All rights reserved

Chapter. Sampling Distributions Pearson Prentice Hall. All rights reserved Chapter 8 Sampling Distributions 2010 Pearson Prentice Hall. All rights reserved Section 8.1 Distribution of the Sample Mean 2010 Pearson Prentice Hall. All rights reserved Objectives 1. Describe the distribution

More information

Slide 1. Slide 2. Slide 3. Choosing the Best Training Visa: H-3 or J-1? Overview. Why choosing a training visa can be so.

Slide 1. Slide 2. Slide 3. Choosing the Best Training Visa: H-3 or J-1? Overview. Why choosing a training visa can be so. Slide 1 Choosing the Best Training Visa: H-3 or J-1? ILW Teleconference July 15, 2009 Slide 2 Overview Why choosing a training visa can be so H-3 legal standards J-1 trainee & intern legal standards Comparison

More information

3T Software Labs EULA

3T Software Labs EULA 3T Software Labs EULA Any use of the Software (as defined below) is subject to the terms of this licence agreement ( Agreement ). Please read the full Agreement carefully. You confirm that you accept and

More information

Abstract: We present a modular voting architecture in which vote generation is performed separately from vote casting.

Abstract: We present a modular voting architecture in which vote generation is performed separately from vote casting. A Modular Voting Architecture ( Frogs ) by Shuki Bruck (CalTech, bruck@paradise.caltech.edu) David Jefferson (Compaq, jefferson@pa.dec.com) Ronald L. Rivest (MIT, rivest@mit.edu) August 18, 2001 Abstract:

More information

bitqy The official cryptocurrency of bitqyck, Inc. per valorem coeptis Whitepaper v1.0 bitqy The official cryptocurrency of bitqyck, Inc.

bitqy The official cryptocurrency of bitqyck, Inc. per valorem coeptis Whitepaper v1.0 bitqy The official cryptocurrency of bitqyck, Inc. bitqy The official cryptocurrency of bitqyck, Inc. per valorem coeptis Whitepaper v1.0 bitqy The official cryptocurrency of bitqyck, Inc. Page 1 TABLE OF CONTENTS Introduction to Cryptocurrency 3 Plan

More information

Voting Systems: From Art to Science 1RWH

Voting Systems: From Art to Science 1RWH 1 Voting Systems: From Art to Science Voting Technology Conference 2001 Pasadena, Calif., March 30-31 31 Caltech/MIT Ed Gerck, Ph.D. egerck@safevote safevote.com CEO & VP of Technology 1 1RWH 7KLVSUHVHQWDWLRQGHDOVZLWKDJHQHUDOPRGHOIRUYRWLQJXVLQJ

More information

Quality of Service in Optical Telecommunication Networks

Quality of Service in Optical Telecommunication Networks Quality of Service in Optical Telecommunication Networks Periodic Summary & Future Research Ideas Zhizhen Zhong 2015.08.28 @Networks Lab Group Meeting 1 Outline Ø Background Ø Preemptive Service Degradation

More information

Introduction-cont Pattern classification

Introduction-cont Pattern classification How are people identified? Introduction-cont Pattern classification Biometrics CSE 190-a Lecture 2 People are identified by three basic means: Something they have (identity document or token) Something

More information

Recommendations of the Symposium. Facilitating Voting as People Age: Implications of Cognitive Impairment March 2006

Recommendations of the Symposium. Facilitating Voting as People Age: Implications of Cognitive Impairment March 2006 Recommendations of the Symposium Facilitating Voting as People Age: Implications of Cognitive Impairment March 2006 1. Basic Principles and Goals While the symposium focused on disability caused by cognitive

More information

Agora. Bringing our voting systems into the 21st century. Whitepaper Version 0.2

Agora. Bringing our voting systems into the 21st century. Whitepaper Version 0.2 Agora Bringing our voting systems into the 21st century Whitepaper Version 0.2 CONTENTS Disclaimer 1. AGORA 1.1. Mission Transparency Privacy Integrity Affordability Accessibility 1.2. Our Customers Providing

More information

The E-voting Controversy: What are the Risks?

The E-voting Controversy: What are the Risks? Panel Session and Open Discussion Join us for a wide-ranging debate on electronic voting, its risks, and its potential impact on democracy. The E-voting Controversy: What are the Risks? Wednesday April

More information

LAW OF EVIDENCE A: 2017

LAW OF EVIDENCE A: 2017 LAW OF EVIDENCE A: 2017 OVERVIEW: PURPOSE OF THE COURSE: For the student to acquire a basic knowledge of general principles relating to the law of evidence. With the knowledge acquired in this course the

More information

Software Agents Behaviour.

Software Agents Behaviour. From Human Regulations to einstitutions From Human Regulations to Regulated Software Agents Behaviour. (einstitutions: the KEMLG@UPC and IS@Utrecht view) Javier Vázquez-Salceda May 20, 2005 http://www.lsi.upc.es/~webia/kemlg

More information

SECURE REMOTE VOTER REGISTRATION

SECURE REMOTE VOTER REGISTRATION SECURE REMOTE VOTER REGISTRATION August 2008 Jordi Puiggali VP Research & Development Jordi.Puiggali@scytl.com Index Voter Registration Remote Voter Registration Current Systems Problems in the Current

More information

IFTECH INVENTING FUTURE TECHNOLOGY INC. ARAIG SDK AGREEMENT

IFTECH INVENTING FUTURE TECHNOLOGY INC. ARAIG SDK AGREEMENT OVERVIEW: The following pages of this PDF are IFTech Inventing Future Technology Inc. s ARAIG As Real As It Gets ARAIG SDK Licence Agreement. To receive the ARAIG Software Development Kit, you must read

More information

Security Proofs for Participation Privacy, Receipt-Freeness, Ballot Privacy, and Verifiability Against Malicious Bulletin Board for the Helios Voting Scheme David Bernhard 1, Oksana Kulyk 2, Melanie Volkamer

More information

We should share our secrets

We should share our secrets We should share our secrets Shamir secret sharing: how it works and how to implement it Daan Sprenkels hello@dsprenkels.com Radboud University Nijmegen 28 December 2017 Daan Sprenkels We should share our

More information

Department of Industrial Engineering: Research Groups

Department of Industrial Engineering: Research Groups Department of Industrial Engineering: Research Groups Engineering Management and Sustainable Systems Operations Management and Supply Chain Management Supply Chain Economics Operations Research Computer

More information

An Introduction to Cryptographic Voting Systems

An Introduction to Cryptographic Voting Systems Kickoff Meeting E-Voting Seminar An Introduction to Cryptographic Voting Systems Andreas Steffen Hochschule für Technik Rapperswil andreas.steffen@hsr.ch A. Steffen, 27.02.2012, Kickoff.pptx 1 Cryptographic

More information

CS 5523: Operating Systems

CS 5523: Operating Systems Lecture1: OS Overview CS 5523: Operating Systems Instructor: Dr Tongping Liu Midterm Exam: Oct 2, 2017, Monday 7:20pm 8:45pm Operating System: what is it?! Evolution of Computer Systems and OS Concepts

More information

ATTENDANCE RULES BY THE RIBI CONSTITUTION. Article 12 Attendance [ See article 7 for exceptions to the provisions of this article ]

ATTENDANCE RULES BY THE RIBI CONSTITUTION. Article 12 Attendance [ See article 7 for exceptions to the provisions of this article ] ATTENDANCE RULES BY THE RIBI CONSTITUTION Article 12 Attendance [ See article 7 for exceptions to the provisions of this article ] Section 1 - General Provisions Each member should attend this club s regular

More information

福井大学審査 学位論文 博士 ( 工学 )

福井大学審査 学位論文 博士 ( 工学 ) 福井大学審査 学位論文 博士 ( 工学 A Dissertation Submitted to the University of Fukui for Degree of Doctor of Engineering A Scheme for Electronic Voting Systems 電子投票システムの研究 カジムハマドロキブル Kazi Md. Rokibul アラム Alam 2010

More information

COMPUTING SCIENCE. University of Newcastle upon Tyne. Verified Encrypted Paper Audit Trails. P. Y. A. Ryan TECHNICAL REPORT SERIES

COMPUTING SCIENCE. University of Newcastle upon Tyne. Verified Encrypted Paper Audit Trails. P. Y. A. Ryan TECHNICAL REPORT SERIES UNIVERSITY OF NEWCASTLE University of Newcastle upon Tyne COMPUTING SCIENCE Verified Encrypted Paper Audit Trails P. Y. A. Ryan TECHNICAL REPORT SERIES No. CS-TR-966 June, 2006 TECHNICAL REPORT SERIES

More information

M-Polling with QR-Code Scanning and Verification

M-Polling with QR-Code Scanning and Verification IJSTE - International Journal of Science Technology & Engineering Volume 3 Issue 09 March 2017 ISSN (online): 2349-784X M-Polling with QR-Code Scanning and Verification Jaichithra K Subbulakshmi S B. Tech

More information

Keys to a Sustainable Development Path

Keys to a Sustainable Development Path Keys to a Sustainable Development Path Prof. Shigeru T. OTSUBO GSID, Nagoya University Topic 1 The Evolution of a Development Paradigm Revolutions and & the Evolution of Economic Systems This part was

More information

Security Analysis on an Elementary E-Voting System

Security Analysis on an Elementary E-Voting System 128 Security Analysis on an Elementary E-Voting System Xiangdong Li, Computer Systems Technology, NYC College of Technology, CUNY, Brooklyn, New York, USA Summary E-voting using RFID has many advantages

More information

Introduction to Policy and Public Affairs World Cancer Research Fund International

Introduction to Policy and Public Affairs World Cancer Research Fund International Introduction to Policy and Public Affairs World Cancer Research Fund International Advancing the development and implementation of effective policies worldwide to help people reduce their risk of cancer

More information

Supporting Debates over Citizen Initiatives

Supporting Debates over Citizen Initiatives Supporting Debates over Citizen Initiatives Kishore R. Kattamuri and Marius C. Silaghi Florida Institute of Techology {kattamuk,msilaghi}@fit.edu January 26, 2005 Technical Report CS-2005-3 Abstract Popular/citizen

More information

A Linked-List Approach to Cryptographically Secure Elections Using Instant Runoff Voting

A Linked-List Approach to Cryptographically Secure Elections Using Instant Runoff Voting A Linked-List Approach to Cryptographically Secure Elections Using Instant Runoff Voting Jason Keller 1 and Joe Kilian 2 1 Department of Computer Science, Rutgers University, Piscataway, NJ 08854 USA jakeller@eden.rutgers.edu

More information

Survey of Fully Verifiable Voting Cryptoschemes

Survey of Fully Verifiable Voting Cryptoschemes Survey of Fully Verifiable Voting Cryptoschemes Brandon Carter, Ken Leidal, Devin Neal, Zachary Neely Massachusetts Institute of Technology [bcarter, kkleidal, devneal, zrneely]@mit.edu 6.857 Final Project

More information

LME App Terms of Use [Google/ Android specific]

LME App Terms of Use [Google/ Android specific] LME App Terms of Use [Google/ Android specific] Please read these terms carefully because they set out the terms of a legally binding agreement (the Terms of Use ) between you and the London Metal Exchange

More information

Making First Vote YOUR Vote: Designing a Schoolwide Election Overview Materials Duration Preparation Procedure Introduction to Boards of Elections

Making First Vote YOUR Vote: Designing a Schoolwide Election Overview Materials Duration Preparation Procedure Introduction to Boards of Elections Making First Vote YOUR Vote: Designing a Schoolwide Election Overview In order to more deeply engage students in the First Vote school-wide election process, teachers are encouraged to not only allow students

More information

Colorado s Risk-Limiting Audits (RLA) CO Risk-Limiting Audits -- Feb Neal McBurnett

Colorado s Risk-Limiting Audits (RLA) CO Risk-Limiting Audits -- Feb Neal McBurnett Colorado s Risk-Limiting Audits (RLA) CO Risk-Limiting Audits -- Feb 2018 -- Neal McBurnett Overview of the Journey Post-Election Audits are Important How Traditional Audits Work Why RLA is better Definitions

More information

Receipt-Free Homomorphic Elections and Write-in Ballots

Receipt-Free Homomorphic Elections and Write-in Ballots Receipt-Free Homomorphic Elections and Write-in Ballots Alessandro Acquisti Carnegie Mellon University Posted November 5, 2003 Revised: May 4, 2004 Abstract Abstract. We present a voting protocol that

More information

The Costs of Remoteness, Evidence From German Division and Reunification by Redding and Sturm (AER, 2008)

The Costs of Remoteness, Evidence From German Division and Reunification by Redding and Sturm (AER, 2008) The Costs of Remoteness, Evidence From German Division and Reunification by Redding and Sturm (AER, 2008) MIT Spatial Economics Reading Group Presentation Adam Guren May 13, 2010 Testing the New Economic

More information

Machine-Assisted Election Auditing

Machine-Assisted Election Auditing Machine-Assisted Election Auditing Joseph A. Calandrino *, J. Alex Halderman *, and Edward W. Felten *, * Center for Information Technology Policy and Dept. of Computer Science, Princeton University Woodrow

More information

Lecture 8: Verification and Validation

Lecture 8: Verification and Validation Thanks to Prof. Steve Easterbrook University of Toronto What are goals of V&V Validation Techniques Ø Inspection Ø Model Checking Ø Prototyping Verification Techniques Ø Consistency Checking Lecture 8:

More information