A matinee of cryptographic topics
|
|
- Lynne Phelps
- 6 years ago
- Views:
Transcription
1 A matinee of cryptographic topics 3 and 4 November A matinee of cryptographic topics
2 Questions How can you prove yourself? How can you shuffle a deck of cards in public? Is it possible to generate a ElGamal key pair such that nobody has any information about the public key, but still be able to find it without solving DLOG? How can Danish sugar beet farmers and buyers place bids in an auction and decide the answer but without revealing any info? Is it possible to flip a coin over the electric telephone? How many citations can you get from a two-page paper?
3 Oversikt 1 Final zero knowledge remarks 2 An application 3 Identification 4 Commitments 5 Secret sharing 3 A matinee of cryptographic topics
4 Final zero knowledge remarks Recap: Schnorr Public input: G = (g), G = q and h. Private input to P: a such that h = g a. Prover Verifier u r Z q α g u e r Z q r ae + u r g r =? αh e Question Can we use this for identification? Can we do it in a single round? α e 4 A matinee of cryptographic topics
5 Final zero knowledge remarks Fiat-Shamir heuristic Enter the random oracle model. Then any zero knowledge proof where the verifier only asks random questions can be turned into a non-interactive proof. Technique: Whenever the verifier should send a random value In theory: Ask the oracle for a value based on all previous data in the protocol. In practice: Use a hash function on all previous data 5 A matinee of cryptographic topics
6 Final zero knowledge remarks Fiat-Shamir(Schnorr) Let H be a cryptographic hash function. 1 u r Z q 2 α g u 3 e H(α) 4 r ae + u 5 Output (α, r) Verification: Check g r = αh H(α) Idea If H does just as good a job of selection something random, then it could just as well have been chosen by the verifier. Hence, the prover must know a such that g a = h. Key difference: The transcript cannot be simulated, hence it can be verified at any time. 6 A matinee of cryptographic topics
7 Let s get sidetracked for a moment... Prover γ r Zq ui wi ai Λ1 Λ2 r Zq r Zq r Zq k x ui i i=1 k z wi i y ui i i=1 bi ρi ui σi wi + b π(i) Γ g γ Ui g ui Wi Γ wi Ai g ai Ci Γ a π(i) Verifier r Λ1, Λ2, {Ai}, {Ci}, {Ui}, {Wi}, Γ ρi {0, 1} l {ρi} Bi g ρi U 1 i Di Γ b π(i) ri ai + λbi si a π(i) + λb π(i) {Di} λ {σi} λ r {0, 1} l Ri AiB λ i Si CiD λ i Φ1 Φ2 Γ σi k x ρi i i=1 k z σi i y ρi i i=1? = WiDi CP(log g h = log Φ1Λ1 Φ2Λ2) SS(Si = R γ π(i) )
8 M. Blum, 1986 An application Theorem Any theorem can be proven in zero knowledge ocr.pdf 8 A matinee of cryptographic topics
9 Identification How to prove yourself Authentication scheme Alice can prove to Bob that she is Alice, but someone else (Eve) cannot prove to Bob that she is Alice. Identification scheme Alice can prove to Bob that she is Alice, but Bob cannot prove to someone else that he is Alice. Signature scheme Alice can prove to Bob that she is Alice, but Bob cannot prove even to himself that he is Alice. (Further reading: Fiat, Shamir: How to prove yourself: Practical solutions to identification and signature problems) 9 A matinee of cryptographic topics
10 Commitments Section 4 Commitments 10 A matinee of cryptographic topics
11 Who gets the car? Commitments Alice chooses large primes p and q, both congruent to 3 modulo 4. b is chosen at random from {0, 1} Alice Bob p, q, n = pq n, x y y x 2 (mod n) a 2 0 a2 1 y a b (p, q) or If a b ±x, Alice wins. If a b ±x, Bob wins. Idea: gcd(x a b, n) will compute a nontrivial factor of n. 10 A matinee of cryptographic topics
12 Commitments More elegant solution Principles Bob must make a choice, and commit to it Alice flips the coin, announcing the result without knowing Bob s choice. Bob reveals his choice 11 A matinee of cryptographic topics
13 Examples Commitments We want to commit to x. g x Computationally hiding, unconditionally binding g x h r Unconditionally hiding, computationally binding (Pedersen) g x+r, h r ) Computationally hiding, unconditionally binding Question Can a scheme be both unconditionally hiding and binding? 12 A matinee of cryptographic topics
14 Secret sharing Section 5 Secret sharing 13 A matinee of cryptographic topics
15 Secret sharing http: //cs.jhu.edu/~sdoshi/crypto/papers/shamirturing.pdf 13 A matinee of cryptographic topics
An untraceable, universally verifiable voting scheme
An untraceable, universally verifiable voting scheme Michael J. Radwin December 12, 1995 Seminar in Cryptology Professor Phil Klein Abstract Recent electronic voting schemes have shown the ability to protect
More informationPaper-based electronic voting
Paper-based electronic voting Anna Solveig Julia Testaniere Master of Science in Mathematics Submission date: December 2015 Supervisor: Kristian Gjøsteen, MATH Norwegian University of Science and Technology
More informationReceipt-Free Universally-Verifiable Voting With Everlasting Privacy
Receipt-Free Universally-Verifiable Voting With Everlasting Privacy Tal Moran 1 and Moni Naor 1 Department of Computer Science and Applied Mathematics, Weizmann Institute of Science, Rehovot, Israel Abstract.
More informationIndividual Verifiability in Electronic Voting
Individual Verifiability in Electronic Voting Sandra Guasch Castelló Universitat Politècnica de Catalunya Supervisor: Paz Morillo Bosch 2 Contents Acknowledgements 7 Preface 9 1 Introduction 11 1.1 Requirements
More informationCRYPTOGRAPHIC PROTOCOLS FOR TRANSPARENCY AND AUDITABILITY IN REMOTE ELECTRONIC VOTING SCHEMES
Scytl s Presentation CRYPTOGRAPHIC PROTOCOLS FOR TRANSPARENCY AND AUDITABILITY IN REMOTE ELECTRONIC VOTING SCHEMES Spain Cryptography Days (SCD 2011) Department of Mathematics Seminar Sandra Guasch Researcher
More informationRECEIPT-FREE UNIVERSALLY-VERIFIABLE VOTING WITH EVERLASTING PRIVACY
RECEIPT-FREE UNIVERSALLY-VERIFIABLE VOTING WITH EVERLASTING PRIVACY TAL MORAN AND MONI NAOR Abstract. We present the first universally verifiable voting scheme that can be based on a general assumption
More informationAddressing the Challenges of e-voting Through Crypto Design
Addressing the Challenges of e-voting Through Crypto Design Thomas Zacharias University of Edinburgh 29 November 2017 Scotland s Democratic Future: Exploring Electronic Voting Scottish Government and University
More informationGeneral Framework of Electronic Voting and Implementation thereof at National Elections in Estonia
State Electoral Office of Estonia General Framework of Electronic Voting and Implementation thereof at National Elections in Estonia Document: IVXV-ÜK-1.0 Date: 20 June 2017 Tallinn 2017 Annotation This
More informationSecurity Proofs for Participation Privacy, Receipt-Freeness, Ballot Privacy, and Verifiability Against Malicious Bulletin Board for the Helios Voting Scheme David Bernhard 1, Oksana Kulyk 2, Melanie Volkamer
More informationAd Hoc Voting on Mobile Devices
Ad Hoc Voting on Mobile Devices Manu Drijvers, Pedro Luz, Gergely Alpár and Wouter Lueks Institute for Computing and Information Sciences (icis), Radboud University Nijmegen, The Netherlands. May 20, 2013
More informationHow to challenge and cast your e-vote
How to challenge and cast your e-vote Sandra Guasch 1, Paz Morillo 2 Scytl Secure Electronic Voting 1, Universitat Politecnica de Catalunya 2 sandra.guasch@scytl.com, paz@ma4.upc.com Abstract. An electronic
More informationSwiss E-Voting Workshop 2010
Swiss E-Voting Workshop 2010 Verifiability in Remote Voting Systems September 2010 Jordi Puiggali VP Research & Development Jordi.Puiggali@scytl.com Index Auditability in e-voting Types of verifiability
More informationProtocol to Check Correctness of Colorado s Risk-Limiting Tabulation Audit
1 Public RLA Oversight Protocol Stephanie Singer and Neal McBurnett, Free & Fair Copyright Stephanie Singer and Neal McBurnett 2018 Version 1.0 One purpose of a Risk-Limiting Tabulation Audit is to improve
More informationA Linked-List Approach to Cryptographically Secure Elections Using Instant Runoff Voting
A Linked-List Approach to Cryptographically Secure Elections Using Instant Runoff Voting Jason Keller 1 and Joe Kilian 2 1 Department of Computer Science, Rutgers University, Piscataway, NJ 08854 USA jakeller@eden.rutgers.edu
More informationA MULTIPLE BALLOTS ELECTION SCHEME USING ANONYMOUS DISTRIBUTION
A MULTIPLE BALLOTS ELECTION SCHEME USING ANONYMOUS DISTRIBUTION Manabu Okamoto 1 1 Kanagawa Institute of Technology 1030 Shimo-Ogino, Atsugi, Kanagawa 243-0292, Japan manabu@nw.kanagawa-it.ac.jp ABSTRACT
More informationSplit-Ballot Voting: Everlasting Privacy With Distributed Trust
Split-Ballot Voting: Everlasting Privacy With Distributed Trust TAL MORAN Weizmann Institute of Science, Israel and MONI NAOR Weizmann Institute of Science, Israel In this paper we propose a new voting
More informationJohns Hopkins University Security Privacy Applied Research Lab
Johns Hopkins University Security Privacy Applied Research Lab Protecting Against Privacy Compromise and Ballot Stuffing by Eliminating Non-Determinism from End-to-end Voting Schemes Technical Report SPAR-JHU:RG-SG-AR:245631
More informationPrivacy of E-Voting (Internet Voting) Erman Ayday
Privacy of E-Voting (Internet Voting) Erman Ayday Security/Privacy of Elections Since there have been elections, there has been tampering with votes Archaeologists discovered a dumped stash of 190 broken
More informationSecure Voter Registration and Eligibility Checking for Nigerian Elections
Secure Voter Registration and Eligibility Checking for Nigerian Elections Nicholas Akinyokun Second International Joint Conference on Electronic Voting (E-Vote-ID 2017) Bregenz, Austria October 24, 2017
More informationLecture 6 Cryptographic Hash Functions
Lecture 6 Cryptographic Hash Functions 1 Purpose Ø CHF one of the most important tools in modern cryptography and security Ø In crypto, CHF instantiates a Random Oracle paradigm Ø In security, used in
More informationFormal Verification of Selene with the Tamarin prover
Formal Verification of Selene with the Tamarin prover (E-Vote-ID - PhD Colloquium) Marie-Laure Zollinger Université du Luxembourg October 2, 2018 Marie-Laure Zollinger Formal Verification of Selene with
More informationSurvey of Fully Verifiable Voting Cryptoschemes
Survey of Fully Verifiable Voting Cryptoschemes Brandon Carter, Ken Leidal, Devin Neal, Zachary Neely Massachusetts Institute of Technology [bcarter, kkleidal, devneal, zrneely]@mit.edu 6.857 Final Project
More informationSelene: Voting with Transparent Verifiability and Coercion-Mitigation
Selene: Voting with Transparent Verifiability and Coercion-Mitigation Peter Y A Ryan, Peter B Rønne, Vincenzo Iovino Abstract. End-to-end verifiable voting schemes typically involves voters handling an
More informationOn e-voting and privacy
On e-voting and privacy Jan Willemson UT,Cybernetica On e-voting and privacy p. 1 What is e-voting?? A citizen sits in front of his computer, On e-voting and privacy p. 2 What is e-voting?? A citizen sits
More informationHASHGRAPH CONSENSUS: DETAILED EXAMPLES
HASHGRAPH CONSENSUS: DETAILED EXAMPLES LEEMON BAIRD BAIRD@SWIRLDS.COM DECEMBER 11, 2016 SWIRLDS TECH REPORT SWIRLDS-TR-2016-02 ABSTRACT: The Swirlds hashgraph consensus algorithm is explained through a
More informationInt. J. of Security and Networks, Vol. x, No. x, 201X 1, Vol. x, No. x, 201X 1
Int. J. of Security and Networks, Vol. x, No. x, 201X 1, Vol. x, No. x, 201X 1 Receipt-Freeness and Coercion Resistance in Remote E-Voting Systems Yefeng Ruan Department of Computer and Information Science,
More informationA Design of Secure Preferential E-Voting
A Design of Secure Preferential E-Voting Kun Peng and Feng Bao Institute for Infocomm Research, Singapore dr.kun.peng@gmail.com Abstract. A secure preferential e-voting scheme is designed in this paper.
More informationTowards Secure Quadratic Voting
Towards Secure Quadratic Voting Sunoo Park Computer Science and Artificial Intelligence Laboratory Massachusetts Institute of Technology Cambridge, MA 02139 sunoo@mit.edu Ronald L. Rivest Computer Science
More informationCryptographic Voting Protocols: Taking Elections out of the Black Box
Cryptographic Voting Protocols: Taking Elections out of the Black Box Phong Le Department of Mathematics University of California, Irvine Mathfest 2009 Phong Le Cryptographic Voting 1/22 Problems with
More informationUnion Elections. Online Voting. for Credit. Helping increase voter turnout & provide accessible, efficient and secure election processes.
Online Voting for Credit Union Elections Helping increase voter turnout & provide accessible, efficient and secure election processes. In a time of cyber-security awareness, Federal Credit Unions and other
More informationCobra: Toward Concurrent Ballot Authorization for Internet Voting
Cobra: Toward Concurrent Ballot Authorization for Internet Voting Aleksander Essex Children s Hospital of Eastern Ontario Research Institute Jeremy Clark Carleton University Urs Hengartner University of
More informationExact, Efficient and Information-Theoretically Secure Voting with an Arbitrary Number of Cheaters
Exact, Efficient and Information-Theoretically Secure Voting with an Arbitrary Number of Cheaters Anne Broadbent 1, 2 Stacey Jeffery 1, 2 Alain Tapp 3 1. Department of Combinatorics and Optimization, University
More informationA homomorphic encryption-based secure electronic voting scheme
Publ. Math. Debrecen 79/3-4 (2011), 479 496 DOI: 10.5486/PMD.2011.5142 A homomorphic encryption-based secure electronic voting scheme By ANDREA HUSZTI (Debrecen) Dedicated to Professor Attila Pethő and
More informationVoting with Unconditional Privacy by Merging Prêt-à-Voter and PunchScan
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY: SPECIAL ISSUE ON ELECTRONIC VOTING 1 Voting with Unconditional Privacy by Merging Prêt-à-Voter and PunchScan Jeroen van de Graaf Abstract We present
More informationA Robust Electronic Voting Scheme Against Side Channel Attack
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 7-86 (06) A Robust Electronic Voting Scheme Against Side Channel Attack YI-NING LIU, WEI GUO HI CHENG HINGFANG HSU, JUN-YAN QIAN AND CHANG-LU LIN Guangxi
More informationAn Application of time stamped proxy blind signature in e-voting
An Application of time stamped oxy blind signature in e-voting Suryakanta Panda Department of Computer Science NIT, Rourkela Odisha, India Suryakanta.silu@gmail.com Santosh Kumar Sahu Department of computer
More informationThe usage of electronic voting is spreading because of the potential benefits of anonymity,
How to Improve Security in Electronic Voting? Abhishek Parakh and Subhash Kak Department of Electrical and Computer Engineering Louisiana State University, Baton Rouge, LA 70803 The usage of electronic
More informationExposure-Resilience for Free: The Hierarchical ID-based Encryption Case
Exposure-Resilience for Free: The Hierarchical ID-based Encryption Case Yevgeniy Dodis Department of Computer Science New York University Email: dodis@cs.nyu.edu Moti Yung Department of Computer Science
More informationEstonian National Electoral Committee. E-Voting System. General Overview
Estonian National Electoral Committee E-Voting System General Overview Tallinn 2005-2010 Annotation This paper gives an overview of the technical and organisational aspects of the Estonian e-voting system.
More informationMechanism design: how to implement social goals
Mechanism Design Mechanism design: how to implement social goals From article by Eric S. Maskin Theory of mechanism design can be thought of as engineering side of economic theory Most theoretical work
More informationevoting after Nedap and Digital Pen
evoting after Nedap and Digital Pen Why cryptography does not fix the transparency issues Ulrich Wiesner 25C3, Berlin, 29 th December 2008 Agenda Why is evoting an issue? Physical copies, paper trail?
More informationCode Voting With Linkable Group Signatures
Code Voting With Linkable Group Signatures Jörg Helbach 1, Jörg Schwenk 2, Sven Schäge 3 Chair for Network and Data Security Ruhr-University Bochum Universitätsstr. 150 D-44780 Bochum 1 joerg@helbach.info
More information4. Student ID Card Copy (If you bring your card to the Office of Global Studies, we ll make the copy for you!)
Italian Visa Application Checklist Fall 2015 Deadline to submit all materials: April 24, 2015 U.S. Citizens applying through group visa process ONLY (non U.S. citizens must apply through the Consulate
More informationGerman Federal Ministry of the Interior 20 August / 6
German Federal Ministry of the Interior 20 August 2008 1 / 6 KEESING Journal of Documents & Identity Issue October 2008 Andreas Reisen As Head of Biometrics, Travel & ID Documents, Registration Division
More informationMaps and Hash Tables. EECS 2011 Prof. J. Elder - 1 -
Maps and Hash Tables - 1 - Outline Ø Maps Ø Hashing Ø Multimaps Ø Ordered Maps - 2 - Learning Outcomes Ø By understanding this lecture, you should be able to: Ø Outline the ADT for a map and a multimap
More informationEvery Vote Counts: Ensuring Integrity in Large-Scale DRE-based Electronic Voting
Every Vote Counts: Ensuring Integrity in Large-Scale DRE-based Electronic Voting Feng Hao School of Computing Science Newcastle University, UK feng.hao@ncl.ac.uk Matthew Nicolas Kreeger Thales Information
More informationPrimecoin: Cryptocurrency with Prime Number Proof-of-Work
Primecoin: Cryptocurrency with Prime Number Proof-of-Work Sunny King (sunnyking9999@gmail.com) July 7 th, 2013 Abstract A new type of proof-of-work based on searching for prime numbers is introduced in
More informationLocal differential privacy
Local differential privacy Adam Smith Penn State Bar-Ilan Winter School February 14, 2017 Outline Model Ø Implementations Question: what computations can we carry out in this model? Example: randomized
More informationUncovering the veil on Geneva s internet voting solution
Uncovering the veil on Geneva s internet voting solution The Swiss democratic semi-direct system enables citizens to vote on any law adopted by any authority (communal, cantonal or federal) and to propose
More informationA Receipt-free Multi-Authority E-Voting System
A Receipt-free Multi-Authority E-Voting System Adewole A. Philip Department of Computer Science University of Agriculture Abeokuta, Nigeria Sodiya Adesina Simon Department of Computer Science University
More informationvvote: a Verifiable Voting System
vvote: a Verifiable Voting System arxiv:1404.6822v4 [cs.cr] 20 Sep 2015 Technical Report Version 4.0 Chris Culnane, Peter Y A Ryan, Steve Schneider and Vanessa Teague Contents Abstract 4 1. Introduction
More informationTECHNICAL REPORT SERIES. No. CS-TR-1071 February, Human readable paper verification of Pret a Voter. David Lundin and Peter Y. A. Ryan.
COMPUTING SCIENCE Human readable paper verification of Pret a Voter D. Lundin and P. Y. A. Ryan TECHNICAL REPORT SERIES No. CS-TR-1071 February, 2008 TECHNICAL REPORT SERIES No. CS-TR-1071 February, 2008
More informationRunning head: ROCK THE BLOCKCHAIN 1. Rock the Blockchain: Next Generation Voting. Nikolas Roby, Patrick Gill, Michael Williams
Running head: ROCK THE BLOCKCHAIN 1 Rock the Blockchain: Next Generation Voting Nikolas Roby, Patrick Gill, Michael Williams University of Maryland University College (UMUC) Author Note Thanks to our UMUC
More informationElectronic Voting. Mohammed Awad. Ernst L. Leiss
Electronic Voting Mohammed Awad Ernst L. Leiss coscel@cs.uh.edu Partially funded under NSF Grant #1241772 Any opinions, findings, conclusions, or recommendations expressed herein are those of the authors
More informationVoting System: elections
Voting System: elections 6 April 25, 2008 Abstract A voting system allows voters to choose between options. And, an election is an important voting system to select a cendidate. In 1951, Arrow s impossibility
More information福井大学審査 学位論文 博士 ( 工学 )
福井大学審査 学位論文 博士 ( 工学 A Dissertation Submitted to the University of Fukui for Degree of Doctor of Engineering A Scheme for Electronic Voting Systems 電子投票システムの研究 カジムハマドロキブル Kazi Md. Rokibul アラム Alam 2010
More informationElectronic Voting Service Using Block-Chain
Journal of Digital Forensics, Security and Law Volume 11 Number 2 Article 8 2016 Electronic Voting Service Using Block-Chain Kibin Lee Korea University Joshua I. James Hallym University, joshua+jdfsl@dfir.science
More informationReceipt-Free Electronic Voting Scheme with a Tamper-Resistant Randomizer
Receipt-Free Electronic Voting Scheme with a Tamper-Resistant Randomizer Byoungcheon Lee 1 and Kwangjo Kim 2 1 Joongbu University, San 2-25, Majon-Ri, Chuboo-Meon, Kumsan-Gun, Chungnam, 312-702, Korea
More information2 IEICE TRANS. FUNDAMENTALS, VOL., NO. to the counter through an anonymous channel. Any voter may not send his secret key to the counter and then the
IEICE TRANS. FUNDAMENTALS, VOL., NO. 1 PAPER Special Section on Cryptography and Information Security A Secure and Practical Electronic Voting Scheme for Real World Environments Wen-Shenq Juang y, Student
More informationKleros. Short Paper v Clément Lesaege and Federico Ast. January 2018
Kleros Short Paper v1.0.5 Clément Lesaege and Federico Ast January 2018 Abstract Kleros is a decentralized application built on top of Ethereum that works as a decentralized third party to arbitrate disputes
More informationNetvote: A Blockchain Voting Protocol
Netvote: A Blockchain Voting Protocol Technical White Paper Jonathan Alexander Steven Landers Ben Howerton jalexander@netvote.io steven@netvote.io ben@netvote.io June 22, 2018 Version 1.12 Abstract This
More information(67686) Mathematical Foundations of AI June 18, Lecture 6
(67686) Mathematical Foundations of AI June 18, 2008 Lecturer: Ariel D. Procaccia Lecture 6 Scribe: Ezra Resnick & Ariel Imber 1 Introduction: Social choice theory Thus far in the course, we have dealt
More informationOn Some Incompatible Properties of Voting Schemes
This paper appears in Towards Trustworthy Elections D. Chaum, R. Rivest, M. Jakobsson, B. Schoenmakers, P. Ryan, and J. Benaloh Eds., Springer-Verlag, LNCS 6000, pages 191 199. On Some Incompatible Properties
More informationTowards Trustworthy e-voting using Paper Receipts
Towards Trustworthy e-voting using Paper Receipts Yunho Lee, Kwangwoo Lee, Seungjoo Kim, and Dongho Won Information Security Group, Sungkyunkwan University, 00 Cheoncheon-dong, Suwon-si, Gyeonggi-do, 0-76,
More informationSecure Electronic Voting
Secure Electronic Voting Dr. Costas Lambrinoudakis Lecturer Dept. of Information and Communication Systems Engineering University of the Aegean Greece & e-vote Project, Technical Director European Commission,
More informationThe Effectiveness of Receipt-Based Attacks on ThreeBallot
The Effectiveness of Receipt-Based Attacks on ThreeBallot Kevin Henry, Douglas R. Stinson, Jiayuan Sui David R. Cheriton School of Computer Science University of Waterloo Waterloo, N, N2L 3G1, Canada {k2henry,
More informationA user-friendly guide to voting in Canada
I C a n V o t e! A user-friendly guide to voting in Canada I C a n V o t e! A user-friendly guide to voting in Canada For enquiries, please contact: Public Enquiries Unit Elections Canada 257 Slater Street
More informationPrêt à Voter: a Voter-Verifiable Voting System Peter Y. A. Ryan, David Bismark, James Heather, Steve Schneider, and Zhe Xia
662 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 4, NO. 4, DECEMBER 2009 Prêt à Voter: a Voter-Verifiable Voting System Peter Y. A. Ryan, David Bismark, James Heather, Steve Schneider,
More informationVoting Protocol. Bekir Arslan November 15, 2008
Voting Protocol Bekir Arslan November 15, 2008 1 Introduction Recently there have been many protocol proposals for electronic voting supporting verifiable receipts. Although these protocols have strong
More informationA REPORT BY THE NEW YORK STATE OFFICE OF THE STATE COMPTROLLER
A REPORT BY THE NEW YORK STATE OFFICE OF THE STATE COMPTROLLER Alan G. Hevesi COMPTROLLER DEPARTMENT OF MOTOR VEHICLES CONTROLS OVER THE ISSUANCE OF DRIVER S LICENSES AND NON-DRIVER IDENTIFICATIONS 2001-S-12
More informationBlind Signatures in Electronic Voting Systems
Blind Signatures in Electronic Voting Systems Marcin Kucharczyk Silesian University of Technology, Institute of Electronics, ul. Akademicka 16, 44-100 Gliwice, Poland marcin.kuchraczyk@polsl.pl Abstract.
More informationBiometrics how to put to use and how not at all?
1 Biometrics how to put to use and how not at all? How to handle security problems of biometrics and how to handle security and privacy problems caused by biometrics? Andreas Pfitzmann TU Dresden, Fakultät
More informationCoalitional Game Theory
Coalitional Game Theory Game Theory Algorithmic Game Theory 1 TOC Coalitional Games Fair Division and Shapley Value Stable Division and the Core Concept ε-core, Least core & Nucleolus Reading: Chapter
More informationAutonocoin: A Proof-of-Belief Cryptocurrency
RESEARCH ARTICLE Autonocoin: A Proof-of-Belief Cryptocurrency Michael Abramowicz * Abstract. This paper proposes a self-governing cryptocurrency, dubbed Autonocoin. Cryptocurrency owners play formal tacit
More informationSoK: Verifiability Notions for E-Voting Protocols
SoK: Verifiability Notions for E-Voting Protocols Véronique Cortier, David Galindo, Ralf Küsters, Johannes Müller, Tomasz Truderung LORIA/CNRS, France University of Birmingham, UK University of Trier,
More informationSocial Choice. CSC304 Lecture 21 November 28, Allan Borodin Adapted from Craig Boutilier s slides
Social Choice CSC304 Lecture 21 November 28, 2016 Allan Borodin Adapted from Craig Boutilier s slides 1 Todays agenda and announcements Today: Review of popular voting rules. Axioms, Manipulation, Impossibility
More informationPrivacy Issues in an Electronic Voting Machine
Privacy Issues in an Arthur M. Keller UC Santa Cruz and Open Voting Consortium David Mertz Gnosis Software Joseph Lorenzo Hall UC Berkeley Arnold Urken Stevens Institute of Technology Outline Secret ballot
More informationTopics on the Border of Economics and Computation December 18, Lecture 8
Topics on the Border of Economics and Computation December 18, 2005 Lecturer: Noam Nisan Lecture 8 Scribe: Ofer Dekel 1 Correlated Equilibrium In the previous lecture, we introduced the concept of correlated
More informationSECURE REMOTE VOTER REGISTRATION
SECURE REMOTE VOTER REGISTRATION August 2008 Jordi Puiggali VP Research & Development Jordi.Puiggali@scytl.com Index Voter Registration Remote Voter Registration Current Systems Problems in the Current
More information( ) Page: 1/5 WORK PROGRAMME ON ELECTRONIC COMMERCE ELECTRONIC SIGNATURES. Communication from Argentina, Brazil and Paraguay
JOB/GC/115, JOB/CTG/3 JOB/SERV/247, JOB/IP/20 JOB/DEV/41 21 December 2016 (16-6995) Page: 1/5 General Council Council for Trade in Goods Council for Trade in Services Council for Trade-Related Aspects
More informationNonexistence of Voting Rules That Are Usually Hard to Manipulate
Nonexistence of Voting Rules That Are Usually Hard to Manipulate Vincent Conitzer and Tuomas Sandholm Carnegie Mellon University Computer Science Department 5 Forbes Avenue, Pittsburgh, PA 15213 {conitzer,
More informationThe Analytics of the Wage Effect of Immigration. George J. Borjas Harvard University September 2009
The Analytics of the Wage Effect of Immigration George J. Borjas Harvard University September 2009 1. The question Do immigrants alter the employment opportunities of native workers? After World War I,
More informationCHAPTER 2 LITERATURE REVIEW
19 CHAPTER 2 LITERATURE REVIEW This chapter presents a review of related works in the area of E- voting system. It also highlights some gaps which are required to be filled up in this respect. Chaum et
More informationA procedure to compute a probabilistic bound for the maximum tardiness using stochastic simulation
Proceedings of the 17th World Congress The International Federation of Automatic Control A procedure to compute a probabilistic bound for the maximum tardiness using stochastic simulation Nasser Mebarki*.
More informationDesign of Distributed Voting Systems
arxiv:1702.02566v1 [cs.cr] 8 Feb 2017 Design of Distributed Voting Systems Masterarbeit von Christian Meter aus Remscheid vorgelegt am Lehrstuhl für Rechnernetze und Kommunikationssysteme Prof. Dr. Martin
More informationPresidential Decree No. 513 of 10 November 1997
Presidential Decree No. 513 of 10 November 1997 "Regulations establishing criteria and means for implementing Section 15(2)of Law No. 59 of 15 March 1997 concerning the creation, storage and transmission
More informationFINAL REPORT ON THE LAW OF INFORMATION TECHNOLOGY
FINAL REPORT ON THE LAW OF INFORMATION TECHNOLOGY Introductory After the invention of computers and improvement in digital technology and communication systems dramatic changes have taken place in our
More informationto Enforcement Judgment of Civil Cases Responses to Inquiries Relating Legal Execution Department, Ministry of Justice Legal Execution Department
Legal Execution Department, Ministry of Justice to Enforcement of Civil Cases Judgment http : www.facebook.com Legal Execution Department to Enforcement of Civil Cases Judgment 2 Content What is enforcement
More informationPrêt à Voter with Confirmation Codes
Prêt à Voter with Confirmation Codes Peter Y A Ryan, Interdisciplinary Centre for Security and Trust and Dept. Computer Science and Communications University of Luxembourg peter.ryan@uni.lu Abstract A
More informationBiometrics how to put to use and how not at all?
1 Biometrics how to put to use and how not at all? How to handle security problems of biometrics and how to handle security and privacy problems caused by biometrics? Andreas Pfitzmann TU Dresden, Fakultät
More informationDesign and Prototype of a Coercion-Resistant, Voter Verifiable Electronic Voting System
29 Design and Prototype of a Coercion-Resistant, Voter Verifiable Electronic Voting System Anna M. Shubina Department of Computer Science Dartmouth College Hanover, NH 03755 E-mail: ashubina@cs.dartmouth.edu
More informationMaps, Hash Tables and Dictionaries
Maps, Hash Tables and Dictionaries Chapter 9-1 - Outline Ø Maps Ø Hashing Ø Dictionaries Ø Ordered Maps & Dictionaries - 2 - Outline Ø Maps Ø Hashing Ø Dictionaries Ø Ordered Maps & Dictionaries - 3 -
More informationBallot secrecy with malicious bulletin boards
Ballot secrecy with malicious bulletin boards David Bernhard 1 and Ben Smyth 2 1 University of Bristol, England 2 Mathematical and Algorithmic Sciences Lab, France Research Center, Huawei Technologies
More informationCoalition Formation and Selectorate Theory: An Experiment - Appendix
Coalition Formation and Selectorate Theory: An Experiment - Appendix Andrew W. Bausch October 28, 2015 Appendix Experimental Setup To test the effect of domestic political structure on selection into conflict
More information2018 Election Calendar
January, 2018 2-January 8-January 12-January Last day to affiliate with a major or minor party in order to run as a party candidate in the primary (either through nomination or petition) (No later than
More informationKey Considerations for Implementing Bodies and Oversight Actors
Implementing and Overseeing Electronic Voting and Counting Technologies Key Considerations for Implementing Bodies and Oversight Actors Lead Authors Ben Goldsmith Holly Ruthrauff This publication is made
More informationAssociated Students of Boise State University Governing Code
ASBSU Election Code, Page 1 I. Table of Contents Associated Students of Boise State University Governing Code II. Chapter Overview... 2 A. Purpose...2 B. Definitions...2 III. Election Manager... 2 IV.
More information1.2 Efficiency and Social Justice
1.2 Efficiency and Social Justice Pareto Efficiency and Compensation As a measure of efficiency, we used net social benefit W = B C As an alternative, we could have used the notion of a Pareto efficient
More informationDeclaration of Certification Practices Certificates of the General Council of Notaries
Declaration of Certification Practices Certificates of the General Council of Notaries Version: 2.9 Validity: 30/11/2015 1. Overview 1.1. Document control Project: Target entity: Declaration of Certification
More informationSUMMARY OF CHANGES IN ISO 9001:2008 (DRAFT INTERNATIONAL STANDARD)
SUMMARY OF CHANGES IN ISO 9001:2008 (DRAFT INTERNATIONAL STANDARD) Disclaimer This update on the ISO 9001:2008 amendment is based on the Draft International Standard (DIS) published in September 2007.
More information