A Glossary of Voting Terminology
|
|
- Brent Griffin
- 5 years ago
- Views:
Transcription
1 A Glossary of Voting Terminology
2 SecVote 2010, 3 sep 2010 Hugo Jonker - p. 2/27 Structure Terms from actual elections Requirements Attacks Cryptography Determining the winner Some academic systems of renown
3 SecVote 2010, 3 sep 2010 Hugo Jonker - p. 3/27 Actual election terminology Voter credentials
4 SecVote 2010, 3 sep 2010 Hugo Jonker - p. 4/27 Actual election terminology Ballot
5 SecVote 2010, 3 sep 2010 Hugo Jonker - p. 5/27 Actual election terminology Ballot box
6 SecVote 2010, 3 sep 2010 Hugo Jonker - p. 6/27 Actual election terminology Booth / Voting Booth / Pollbooth
7 SecVote 2010, 3 sep 2010 Hugo Jonker - p. 7/27 Actual election terminology DRE = Direct Recording Electronic (voting machine) Diebold (USA) Nedap (NL)
8 SecVote 2010, 3 sep 2010 Hugo Jonker - p. 8/27 Actual election terminology VVPAT = Voter Verified Paper Audit Trail
9 SecVote 2010, 3 sep 2010 Hugo Jonker - p. 9/27 Actual election terminology HAVA = Help America Vote Act
10 SecVote 2010, 3 sep 2010 Hugo Jonker - p. 10/27 Actual election terminology chain of custody
11 SecVote 2010, 3 sep 2010 Hugo Jonker - p. 11/27 Requirements eligibility only individuals belonging to the group may vote. democracy only eligible voters may vote, and they may only vote once. accuracy - result depends on all cast votes, - result depends on nothing more than cast votes, - result depends on cast votes as they were cast. fairness no intermediate results.
12 SecVote 2010, 3 sep 2010 Hugo Jonker - p. 12/27 Requirements - verifiability universal verifiability given the set of cast votes, anyone can verify that the announced result is correct. individual verifiability a voter can verify that her vote counts for the correct candidate. eligibility verifiability anyone can verify that the set of cast votes originates only from eligible voters.
13 SecVote 2010, 3 sep 2010 Hugo Jonker - p. 13/27 Requirements - privacy anonymity no observer can learn how a voter voted. receipt-freeness the voter cannot prove how she voted. coercion-resistance (JCJ05) receipt-freeness + resistance to: - forced randomised voting, - forced abstention, - voting in the voter s stead.
14 SecVote 2010, 3 sep 2010 Hugo Jonker - p. 14/27 Requirements - end-to-end End-to-end verifiability: cast-as-intended a voter can verify that her input to the process matches her intent. recorded-as-cast a voter can verify that the record of her vote matches what she gave as input. tallied-as-recorded anyone can verify that the announced result matches the public records of votes cast. counted-as-cast a voter can verify that her vote counts in favour of the candidate for whom she cast it.
15 SecVote 2010, 3 sep 2010 Hugo Jonker - p. 15/27 Attacks ItalianLuxembourgian attack. chain voting.
16 SecVote 2010, 3 sep 2010 Hugo Jonker - p. 16/27 Attacks gerrymandering.
17 SecVote 2010, 3 sep 2010 Hugo Jonker - p. 17/27 Attacks Family voting.
18 SecVote 2010, 3 sep 2010 Hugo Jonker - p. 18/27 Attacks chain voting.
19 SecVote 2010, 3 sep 2010 Hugo Jonker - p. 19/27 Cryptography blind signatures: deblind(sign A (blind(msg,k))) = sign A (msg). homomorphic encryption: enc(msg a,k) enc(msg b,k) = enc(msg a msg b,k). - RSA78 - ElGamal85 - Paillier
20 SecVote 2010, 3 sep 2010 Hugo Jonker - p. 20/27 Cryptography commitments. proofs: - (interactive) Zero Knowledge Proof (ZKP) - Designated Verifier Proofs (DVP) Fiat-Shamir heuristic: Make interactive proofs non-interactive.
21 Cryptography Plaintext Equivalence Test: enc(msg a,k) =? enc(msg b,k). Plaintext Inequivalence Test: enc(msg a,k) <? enc(msg b,k). SecVote 2010, 3 sep 2010 Hugo Jonker - p. 21/27
22 SecVote 2010, 3 sep 2010 Hugo Jonker - p. 22/27 x Cryptography Mixnets w x y z x y 3 Mix 1 Mix 2 Mix 3 3 w 3 y 3 x 3 w 3 w y z z z adapted from [HS00]
23 SecVote 2010, 3 sep 2010 Hugo Jonker - p. 23/27 Cryptography Randomized Partial Auditing / Checking [JJR02]
24 How to fill in the ballot / determining the winner Plurality voting (single winner) FPTP = First Past The Post winner = candidate with most votes. Instant Runoff / Alternative Vote Approval voting Range voting Condorcet Winner = pairwise most preferred candidate. Borda count rank candidates, most preferred wins. SecVote 2010, 3 sep 2010 Hugo Jonker - p. 24/27
25 SecVote 2010, 3 sep 2010 Hugo Jonker - p. 25/27 Determining the winner Arrow s Theorem No system such that: - if every voter prefers A to B, then the group prefers A to B. - if no voter s preference between A and B is changed if C is added, then the group s preference between A and B also remains unchanged. - no single voter can determine the group s preference.
26 Some influential systems Cha81 theoretical BT94 receipt-free JCJ05 coercion-resistant practical Cha04 end-to-end verifiable time Theoretical: Chaum81 FOO92 CFSY96 CGS97 - Helios RF / CR: BT94 SK95 HS00 JCJ05 - Civitas End-to-end: Chaum04 Prêt à Voter Punchscan Scantegrity (I, II) Code Voting SecVote 2010, 3 sep 2010 Hugo Jonker - p. 26/27
27 SecVote 2010, 3 sep 2010 Hugo Jonker - p. 27/27 Done! Thanks for your attention!
MA 110 Homework 1 ANSWERS
MA 110 Homework 1 ANSWERS This homework assignment is to be written out, showing all work, with problems numbered and answers clearly indicated. Put your code number on each page. The assignment is due
More informationMA 111 Worksheet Sept. 9 Name:
MA 111 Worksheet Sept. 9 Name: 1. List the four fairness criteria. In your own words, describe what each of these critieria say. Majority Criteria: If a candidate recieves more than half of the first place
More informationHow to carbon date digital information! Jeremy Clark
How to carbon date digital information! Jeremy Clark Time Mar 2012 2 Notify Vendors Time Mar 2012 3 Notify Vendors Time Mar 2012 Mar 2013 4 Time Mar 2012 Mar 2013 5 Time Mar 2012 Feb 2013 Mar 2013 6 Time
More informationName: Exam Score: /100. Exam 1: Version C. Academic Honesty Pledge
MATH 11008 Explorations in Modern Mathematics Fall 2013 Circle one: MW7:45 / MWF1:10 Dr. Kracht Name: Exam Score: /100. (110 pts available) Exam 1: Version C Academic Honesty Pledge Your signature at the
More informationA Lightweight Implementation of a Shuffle Proof for Electronic Voting Systems
A Lightweight Implementation of a Shuffle Proof for Electronic Voting Systems Philipp Locher 1,2 and Rolf Haenni 1 1 Research Institute for Security in the Information Society Bern University of Applied
More informationMath 1001: Excursions in Mathematics Final Exam: 9 May :30-4:30 p.m.
Math 1001: Excursions in Mathematics Final Exam: 9 May 2011 1:30-4:30 p.m. Name: Section Number: You have three hours to complete this exam. There are ten problems on twelve pages, worth a total of 100
More informationD. Plurality-with-Elimination Method
Chapter : The Mathematics of Voting (c) 5 + 4 + 3 + 2 + = 5 (d) 5 20 = 300 (e) 300 69 70 64 48 = 49 25. C wins with 500 5 20 25 = 40 points; the points sum to 4 50 + 3 50 + 2 50 + 50 = 500. 26. E. There
More informationNote that there are questions printed on both sides of each page!
Math 1001 Name: Fall 2007 Test 2 Student ID: 11/7/07 Time allowed: 50 minutes Section: 10:10 11:15 12:20 This exam includes 7 pages, including this one and a sheet for scratch work. There are a total of
More informationPart I. First Notions
Part I First Notions 1 Introduction In their great variety, from contests of global significance such as a championship match or the election of a president down to a coin flip or a show of hands, games
More informationGuest Editorial Special Issue on Electronic Voting
Guest Editorial Special Issue on Electronic Voting The MIT Faculty has made this article openly available. Please share how this access benefits you. Your story matters. Citation As Published Publisher
More informationMath 167 Ch 9 Review 1 (c) Janice Epstein
Math 167 Ch 9 Review 1 (c) Janice Epstein CHAPTER 9 VOTING Plurality Method: Each voter votes for one candidate. The candidate with the most votes is the winner. Majority Rule: Each voter votes for one
More informationPublic-key Cryptography: Theory and Practice
Public-key Cryptography Theory and Practice Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Chapter 5: Cryptographic Algorithms Common Encryption Algorithms RSA
More informationPrimitives et constructions cryptographiques pour la confiance numrique
Primitives et constructions cryptographiques pour la confiance numrique Damien Vergnaud École normale supérieure C.N.R.S. I.N.R.I.A. 3 avril 2014 D. Vergnaud (ENS) Cryptographic Primitives for Digital
More informationSimple And Efficient Shuffling With Provable Correctness and ZK Privacy
Simple And Efficient Shuffling With Provable Correctness and ZK Privacy Kun Peng, Colin Boyd and Ed Dawson Information Security Institute Queensland University of Technology {k.peng, c.boyd, e.dawson}@qut.edu.au
More informationCryptography CS 555. Topic 20: Other Public Key Encryption Schemes. CS555 Topic 20 1
Cryptography CS 555 Topic 20: Other Public Key Encryption Schemes Topic 20 1 Outline and Readings Outline Quadratic Residue Rabin encryption Goldwasser-Micali Commutative encryption Homomorphic encryption
More informationPublic-Key Cryptosystem Based on Composite Degree Residuosity Classes. Paillier Cryptosystem. Harmeet Singh
Public-Key Cryptosystem Based on Composite Degree Residuosity Classes aka Paillier Cryptosystem Harmeet Singh Harmeet Singh Winter 2018 1 / 26 Background s Background Foundation of public-key encryption
More informationDiffie-Hellman key-exchange protocol
Diffie-Hellman key-exchange protocol This protocol allows two users to choose a common secret key, for DES or AES, say, while communicating over an insecure channel (with eavesdroppers). The two users
More informationGetting Around Voting Problems. No or limited accessible parking at the polling place...
No or limited accessible parking at the polling place... What are the possible supports or action steps you can think of? #1 Solutions: Ask if other street parking is available. Carpool or find out busy
More informationElGamal Public-Key Encryption and Signature
ElGamal Public-Key Encryption and Signature Çetin Kaya Koç koc@cs.ucsb.edu Çetin Kaya Koç http://koclab.org Winter 2017 1 / 10 ElGamal Cryptosystem and Signature Scheme Taher ElGamal, originally from Egypt,
More informationSelf-Scrambling Anonymizer. Overview
Financial Cryptography 2000 21-25 february 2000 - Anguilla Self-Scrambling Anonymizers Département d Informatique ENS - CNRS David.Pointcheval@ens.fr http://www.di.ens.fr/~pointche Overview Introduction
More informationGeneric Attacks on Feistel Schemes
Generic Attacks on Feistel Schemes Jacques Patarin 1, 1 CP8 Crypto Lab, SchlumbergerSema, 36-38 rue de la Princesse, BP 45, 78430 Louveciennes Cedex, France PRiSM, University of Versailles, 45 av. des
More informationZero- Knowledge Proofs in Anonymous Creden6al Systems. Gergely Alpár October 21, 2011
Zero- Knowledge Proofs in Anonymous Creden6al Systems Gergely Alpár October 21, 2011 Waldo Source: findwaldo.com // Department Store Idea: Moni Naor et al. How to Convince your children you are not chea6ng,
More informationDeterring Voluntary Trace Disclosure in Re-encryption Mix Networks
Deterring Voluntary Trace Disclosure in Re-encryption Mix Networks Philippe Golle PARC pgolle@parc.com XiaoFeng Wang Indiana University xw7@indiana.edu Markus Jakobsson Indiana University markus@indiana.edu
More informationCryptographic Shuffles and Their Applications
이학박사학위논문 Cryptographic Shuffles and Their Applications ( 암호학적셔플과그응용 ) 2012 년 8 월 서울대학교대학원 수리과학부 김명선 Cryptographic Shuffles and Their Applications ( 암호학적셔플과그응용 ) 지도교수천정희 이논문을이학박사학위논문으로제출함 2012 년 5 월 서울대학교대학원
More informationDigital support for gathering administrative ideas from constituents of democratic bodies
Digital support for gathering administrative ideas from constituents of democratic bodies Marius C. Silaghi and Ronald J. Bailey and Phil Bernhard and Phil K. Chan and Cem Kaner February 17, 2004 Florida
More informationData security (Cryptography) exercise book
University of Debrecen Faculty of Informatics Data security (Cryptography) exercise book 1 Contents 1 RSA 4 1.1 RSA in general.................................. 4 1.2 RSA background.................................
More informationComputer Aided Security: Cryptographic Primitives, Voting protocols, and Wireless Sensor Networks
Computer Aided Security: Cryptographic Primitives, Voting protocols, and Wireless Sensor Networks Pascal Lafourcade November 6, 2012 Habilitation à Diriger des Recherches 1 / 48 Motivations Nowadays Security
More informationPublic Key Encryption
Math 210 Jerry L. Kazdan Public Key Encryption The essence of this procedure is that as far as we currently know, it is difficult to factor a number that is the product of two primes each having many,
More informationFermat s little theorem. RSA.
.. Computing large numbers modulo n (a) In modulo arithmetic, you can always reduce a large number to its remainder a a rem n (mod n). (b) Addition, subtraction, and multiplication preserve congruence:
More informationPublic Key Cryptography Great Ideas in Theoretical Computer Science Saarland University, Summer 2014
7 Public Key Cryptography Great Ideas in Theoretical Computer Science Saarland University, Summer 2014 Cryptography studies techniques for secure communication in the presence of third parties. A typical
More informationProfessor Alan H. Stein
Mathematics 103 Professor Alan H. Stein July 7, 2004 Solutions Final Examination (1) Consider an election among four candidates: James, Theresa, Marie and Donnie. Suppose 1850 voters cast ballots on which
More informationMajority Rule: Each voter votes for one candidate. The candidate with the majority of the votes wins. Majority means MORE than half.
Math 167 h 9 Week in Review 1 (c) Janice Epstein and Tamara arter HPTER 9 VOTING Majority Rule: Each voter votes for one candidate. The candidate with the majority of the votes wins. Majority means MORE
More informationExam 4 Learning Objectives. Voting Methods
Exam 4 Learning Objectives Voting Methods Given the results of an election, determine the winner using o Majority rule or plurality o Borda count o Hare method o Pairwise-comparison o Tournament method.
More informationSecure Distributed Computation on Private Inputs
Secure Distributed Computation on Private Inputs David Pointcheval ENS - CNRS - INRIA Foundations & Practice of Security Clermont-Ferrand, France - October 27th, 2015 The Cloud David Pointcheval Introduction
More informationLecture 28: Applications of Crypto Protocols
U.C. Berkeley Lecture 28 CS276: Cryptography April 27, 2006 Professor David Wagner Scribe: Scott Monasch Lecture 28: Applications of Crypto Protocols 1 Electronic Payment Protocols For this section we
More informationProtocoles de vote end-to-end
Protocoles de vote end-to-end Analyse de sécurité basée sur la simulation Olivier de Marneffe, Olivier Pereira, Jean-Jacques Quisquater Université catholique de Louvain, Belgium 19 mars 2008 Microelectronics
More informationKnights, Spies, Games and Social Networks
Knights, Spies, Games and Social Networks Mark Wildon 16 February 2010 The Knights and Spies Problem In a room there are 100 people. Each person is either a knight or a spy. Knights always tell the truth,
More informationUnit 8: Sample Surveys
Unit 8: Sample Surveys Marius Ionescu 10/27/2011 Marius Ionescu () Unit 8: Sample Surveys 10/27/2011 1 / 13 Chapter 19: Surveys Why take a survey? Marius Ionescu () Unit 8: Sample Surveys 10/27/2011 2
More informationThe number theory behind cryptography
The University of Vermont May 16, 2017 What is cryptography? Cryptography is the practice and study of techniques for secure communication in the presence of adverse third parties. What is cryptography?
More informationRecommendations for E-Voting System Usability: Lessons from Literature for Interface Design, User Studies and Usability Criteria
Recommendations for E-Voting System Usability: Lessons from Literature for Interface Design, User Studies and Usability Criteria 15-16 Oct. 2012 Evoting PhD Workshop Maina Olembo 1 Usable Security Lab
More informatione-voting Scientific Events May 2004
e-voting Scientific Events May 2004 Trademarks All brand names and product names are trademarks or registered trademarks of their respective owners. Disclaimer This document is provided as is without warranty
More informationLinear Congruences. The solutions to a linear congruence ax b (mod m) are all integers x that satisfy the congruence.
Section 4.4 Linear Congruences Definition: A congruence of the form ax b (mod m), where m is a positive integer, a and b are integers, and x is a variable, is called a linear congruence. The solutions
More informationMedians of permutations and gene orders
Medians of permutations and gene orders Sylvie Hamel Université de Montréal Work in collaboration with: Guillaume Blin Maxime Crochemore Stéphane Vialette from Université Marne-la-Vallée Medians of permutations
More informationAndrei Sabelfeld. Joint work with Per Hallgren and Martin Ochoa
Andrei Sabelfeld Joint work with Per Hallgren and Martin Ochoa Privacy for location based services Explosion of interest to location based services (LBS) locating people, vehicles, vessels, cargo, devices
More informationLecture 5: Subgame Perfect Equilibrium. November 1, 2006
Lecture 5: Subgame Perfect Equilibrium November 1, 2006 Osborne: ch 7 How do we analyze extensive form games where there are simultaneous moves? Example: Stage 1. Player 1 chooses between fin,outg If OUT,
More informationPLEASE MARK YOUR ANSWERS WITH AN X, not a circle! 2. (a) (b) (c) (d) (e) (a) (b) (c) (d) (e) (a) (b) (c) (d) (e)...
Math 7, Exam I March, 26 The Honor Code is in e ect for this examination. All work is to be your own. You may use your Calculator. The exam lasts for 5 minutes. Be sure that your name is on every page
More informationMGF 1107 FINAL EXAM REVIEW CHAPTER 9
MGF 1107 FINL EXM REVIEW HPTER 9 1. my (), etsy (), arla (), Doris (D), and Emilia (E) are candidates for an open Student Government seat. There are 110 voters with the preference lists below. 36 24 20
More informationDiscrete Mathematics & Mathematical Reasoning Multiplicative Inverses and Some Cryptography
Discrete Mathematics & Mathematical Reasoning Multiplicative Inverses and Some Cryptography Colin Stirling Informatics Some slides based on ones by Myrto Arapinis Colin Stirling (Informatics) Discrete
More informationPopular Ranking. b Independent. Key words: Rank aggregation, Kemeny Rank Aggregation, Popular Ranking
Popular Ranking Anke van Zuylen a Frans Schalekamp b David P. Williamson c,1 a Max-Planck-Institut für Informatik, Saarbrücken, Germany b Independent c School of ORIE, Cornell University, Ithaca, NY, USA
More informationAlgorithmic Number Theory and Cryptography (CS 303)
Algorithmic Number Theory and Cryptography (CS 303) Modular Arithmetic and the RSA Public Key Cryptosystem Jeremy R. Johnson 1 Introduction Objective: To understand what a public key cryptosystem is and
More informationWNBC/Marist Poll Poughkeepsie, NY Phone Fax
WNBC/Marist Poll Poughkeepsie, NY 12601 Phone 845.575.5050 Fax 845.575.5111 www.maristpoll.marist.edu Contact: NYS Poll: February 5 th Presidential Primaries FOR IMMEDIATE RELEASE: Saturday February 2,
More informationChapter 1. Probability
Chapter 1. Probability 1.1 Basic Concepts Scientific method a. For a given problem, we define measures that explains the problem well. b. Data is collected with observation and the measures are calculated.
More informationCryptography Math 1580 Silverman First Hour Exam Mon Oct 2, 2017
Name: Cryptography Math 1580 Silverman First Hour Exam Mon Oct 2, 2017 INSTRUCTIONS Read Carefully Time: 50 minutes There are 5 problems. Write your name legibly at the top of this page. No calculators
More informationGeneric Attacks on Feistel Schemes
Generic Attacks on Feistel Schemes -Extended Version- Jacques Patarin PRiSM, University of Versailles, 45 av. des États-Unis, 78035 Versailles Cedex, France This paper is the extended version of the paper
More informationopening polls for election day
eslate Instruction Booklet Suggestion: One poll worker should read each instruction while the second poll worker completes each task. opening polls for election day 1. Setup eslate portable booth by attaching
More informationA guide to voting in the UK General Election
A guide to voting in the UK General Election Easy Read What is the General Election? The General Election is when people all over the UK vote. In each area people vote for who they want to be their MP.
More informationCryptography, Number Theory, and RSA
Cryptography, Number Theory, and RSA Joan Boyar, IMADA, University of Southern Denmark November 2015 Outline Symmetric key cryptography Public key cryptography Introduction to number theory RSA Modular
More informationMath June Review: Probability and Voting Procedures
Math - June Review: Probability and Voting Procedures A big box contains 7 chocolate doughnuts and honey doughnuts. A small box contains doughnuts: some are chocolate doughnuts, and the others are honey
More informationStep-by-Step Instructions on How to Apply for Graduation
Step-by-Step Instructions on How to Apply for Graduation 0 P a g e Important Reminders: If you are an undergraduate student pursuing a double major, you will only need to submit one application. If you
More informationMA/CSSE 473 Day 9. The algorithm (modified) N 1
MA/CSSE 473 Day 9 Primality Testing Encryption Intro The algorithm (modified) To test N for primality Pick positive integers a 1, a 2,, a k < N at random For each a i, check for a N 1 i 1 (mod N) Use the
More informationCRITERIA AND PROCEDURE FOR SELECTION OF HARVEY A.K. WHITNEY LECTURE AWARD RECIPIENT
CRITERIA AND PROCEDURE FOR SELECTION OF HARVEY A.K. WHITNEY LECTURE AWARD RECIPIENT Approved May 12, 1963 Revised March 20-21, 1975 Revised November 17, 1978 Revised April 23, 1982 Revised June 23, 2007
More informationLET ME VOTE. Know Your Voting Rights
LET ME VOTE Know Your Voting Rights Michigan 2018 CONTENTS Who Can Vote?... 1 Registration...2 Voting Early...4 Voting on Election Day...5 Photo ID...7 Problems at the Polls...8 Tips for Avoiding Problems...10
More informationRelated Ideas: DHM Key Mechanics
Related Ideas: DHM Key Mechanics Example (DHM Key Mechanics) Two parties, Alice and Bob, calculate a key that a third person Carl will never know, even if Carl intercepts all communication between Alice
More informationJuan Garay (Yahoo Labs) Clint Givens (Maine School of Science and Mathematics) Rafail Ostrovsky (UCLA) Pavel Raykov (ETH)
Broadcast (and Round) Efficient Secure Multiparty Computation Juan Garay (Yahoo Labs) Clint Givens (Maine School of Science and Mathematics) Rafail Ostrovsky (UCLA) Pavel Raykov (ETH) Secure Multiparty
More informationHKIRA 4 th IR Awards 2018 Are Now Open for Nomination
FOR IMMEDIATE RELEASE HKIRA 4 th IR Awards 2018 Are Now Open for Nomination Hong Kong (29 January, 2018) Hong Kong Investor Relations Association (HKIRA) is pleased to announce that public nomination is
More informationBBC NATIONAL SHORT STORY AWARD 2010
ENTRY TERMS AND CONDITIONS BBC NATIONAL SHORT STORY AWARD 2010 The British Broadcasting Corporation in association with Booktrust Award of 15,000 for the winner 3,000 for the runner up 500 for 3 further
More informationApplication: Public Key Cryptography. Public Key Cryptography
Application: Public Key Cryptography Suppose I wanted people to send me secret messages by snail mail Method 0. I send a padlock, that only I have the key to, to everyone who might want to send me a message.
More informationCryptography. Module in Autumn Term 2016 University of Birmingham. Lecturers: Mark D. Ryan and David Galindo
Lecturers: Mark D. Ryan and David Galindo. Cryptography 2017. Slide: 1 Cryptography Module in Autumn Term 2016 University of Birmingham Lecturers: Mark D. Ryan and David Galindo Slides originally written
More informationNote Computations with a deck of cards
Theoretical Computer Science 259 (2001) 671 678 www.elsevier.com/locate/tcs Note Computations with a deck of cards Anton Stiglic Zero-Knowledge Systems Inc, 888 de Maisonneuve East, 6th Floor, Montreal,
More informationImplementation and Performance Testing of the SQUASH RFID Authentication Protocol
Implementation and Performance Testing of the SQUASH RFID Authentication Protocol Philip Koshy, Justin Valentin and Xiaowen Zhang * Department of Computer Science College of n Island n Island, New York,
More informationFair tracing based on VSS and blind signature without Trustees
Fair tracing based on VSS and blind signature without Trustees ByeongGon Kim SungJun Min Kwangjo Kim International Research center for Information Security (IRIS) Information and Communications Univ.(ICU),
More informationClaudia Ziegler Acemyan
Claudia Ziegler Acemyan 2223 West Main Street, Unit A, Houston, TX 77098 713-256-3858 claudiaz@rice.edu www.czacemyan.com EDUCATION Ph.D., Psychology, Human Factors and Human-Computer Interaction, Rice
More informationVoting Procedures. Requires MORE than 50% of the votes in one category If no category has the required number of votes no winner
Voting Procedures Majority Rule Requires MORE than 50% of the votes in one category If no category has the required number of votes no winner Students at HRHS voted on their favorite sports team. The following
More informationIdentity-based multisignature with message recovery
University of Wollongong Research Online Faculty of Engineering and Information Sciences - Papers: Part A Faculty of Engineering and Information Sciences 2013 Identity-based multisignature with message
More informationMath 319 Problem Set #7 Solution 18 April 2002
Math 319 Problem Set #7 Solution 18 April 2002 1. ( 2.4, problem 9) Show that if x 2 1 (mod m) and x / ±1 (mod m) then 1 < (x 1, m) < m and 1 < (x + 1, m) < m. Proof: From x 2 1 (mod m) we get m (x 2 1).
More informationTriple-DES Block of 96 Bits: An Application to. Colour Image Encryption
Applied Mathematical Sciences, Vol. 7, 2013, no. 23, 1143-1155 HIKARI Ltd, www.m-hikari.com Triple-DES Block of 96 Bits: An Application to Colour Image Encryption V. M. Silva-García Instituto politécnico
More informationIntroduction to Cryptography CS 355
Introduction to Cryptography CS 355 Lecture 25 Mental Poker And Semantic Security CS 355 Fall 2005 / Lecture 25 1 Lecture Outline Review of number theory The Mental Poker Protocol Semantic security Semantic
More informationChapter 15: Game Theory: The Mathematics of Competition Lesson Plan
Chapter 15: Game Theory: The Mathematics of Competition Lesson Plan For All Practical Purposes Two-Person Total-Conflict Games: Pure Strategies Mathematical Literacy in Today s World, 9th ed. Two-Person
More informationSignatures for Network Coding
Conference on Random network codes and Designs over F q Signatures for Network Coding Oliver Gnilke, Claude-Shannon-Institute, University College Dublin 18. September 2013 1 / 14 Network Coding Signature
More informationGame Theory and Algorithms Lecture 3: Weak Dominance and Truthfulness
Game Theory and Algorithms Lecture 3: Weak Dominance and Truthfulness March 1, 2011 Summary: We introduce the notion of a (weakly) dominant strategy: one which is always a best response, no matter what
More informationRSA hybrid encryption schemes
RSA hybrid encryption schemes Louis Granboulan École Normale Supérieure Louis.Granboulan@ens.fr Abstract. This document compares the two published RSA-based hybrid encryption schemes having linear reduction
More informationBest of luck on the exam!
CS103 Handout 18 Fall 2014 October 20, 2014 Practice Midterm Exam This practice exam is closed-book and closed-computer but open-note. You may have a doublesided, 8.5 11 sheet of notes with you when you
More informationMathematics Explorers Club Fall 2012 Number Theory and Cryptography
Mathematics Explorers Club Fall 2012 Number Theory and Cryptography Chapter 0: Introduction Number Theory enjoys a very long history in short, number theory is a study of integers. Mathematicians over
More informationUnlinkability and Redundancy in Anonymous Publication Systems
Unlinkability and Redundancy in Anonymous Publication Systems Christian Boesgaard pink@diku.dk Department of Computer Science University of Copenhagen Denmark January 22, 2004 1 Introduction An anonymous
More informationCS 261 Notes: Zerocash
CS 261 Notes: Zerocash Scribe: Lynn Chua September 19, 2018 1 Introduction Zerocash is a cryptocurrency which allows users to pay each other directly, without revealing any information about the parties
More informationVoting Systems, Mass Murder, and the Enigma Machine
Voting Systems, Mass Murder, and the Enigma Machine Department of Mathematics University of Arizona 3/22/11 Outline Der Reichstag 1 Der Reichstag 2 3 Der Reichstag German Parliamentary Election Results
More informationChapter 1. Probability
Chapter 1. Probability 1.1 Basic Concepts Scientific method a. For a given problem, we define measures that explains the problem well. b. Data is collected with observation and the measures are calculated.
More informationSequential Aggregate Signatures from Trapdoor Permutations
Sequential Aggregate Signatures from Trapdoor Permutations Anna Lysyanskaya Silvio Micali Leonid Reyzin Hovav Shacham Abstract An aggregate signature scheme (recently proposed by Boneh, Gentry, Lynn, and
More informationCONSTITUTION of the World Science Fiction Society, as of August 22, 2016
CONSTITUTION of the World Science Fiction Society, as of August 22, 2016 SECRETARY S NOTE: Material in red has been deleted from the current Constitution; and material in blue is newly added. Material
More informationPARADOXES WITH DICE AND ELECTIONS
PARADOXES WITH DICE AND ELECTIONS Marcel Jackson La Trobe University Some startling paradoxes can be found with games involving relabeled dice. We look at some of the possibilities and their connection
More informationCircular Nim Games. S. Heubach 1 M. Dufour 2. May 7, 2010 Math Colloquium, Cal Poly San Luis Obispo
Circular Nim Games S. Heubach 1 M. Dufour 2 1 Dept. of Mathematics, California State University Los Angeles 2 Dept. of Mathematics, University of Quebeq, Montreal May 7, 2010 Math Colloquium, Cal Poly
More informationYale University Department of Computer Science
LUX ETVERITAS Yale University Department of Computer Science Secret Bit Transmission Using a Random Deal of Cards Michael J. Fischer Michael S. Paterson Charles Rackoff YALEU/DCS/TR-792 May 1990 This work
More informationRigging Tournament Brackets for Weaker Players
Rigging Tournament Brackets for Weaker Players Isabelle Stanton UC Berkeley isabelle@eecs.berkeley.edu Virginia Vassilevska Williams UC Berkeley virgi@eecs.berkeley.edu Abstract The agenda control problem
More informationPan-Canadian Trust Framework Overview
Pan-Canadian Trust Framework Overview A collaborative approach to developing a Pan- Canadian Trust Framework Authors: DIACC Trust Framework Expert Committee August 2016 Abstract: The purpose of this document
More informationCryptography. 2. decoding is extremely difficult (for protection against eavesdroppers);
18.310 lecture notes September 2, 2013 Cryptography Lecturer: Michel Goemans 1 Public Key Cryptosystems In these notes, we will be concerned with constructing secret codes. A sender would like to encrypt
More informationEE 418: Network Security and Cryptography
EE 418: Network Security and Cryptography Homework 3 Solutions Assigned: Wednesday, November 2, 2016, Due: Thursday, November 10, 2016 Instructor: Tamara Bonaci Department of Electrical Engineering University
More informationLindsay Special Election Statement of Vote
Lindsay Special Election Statement of Vote June 6, 207 TABLE OF CONTENTS Statement of Votes Cast Lindsay Special Election June 6, 207 CONTENTS SECTION - PAGE Certification of Results Statement of Votes..
More informationA Public Shuffle without Private Permutations
A Public Shuffle without Private Permutations Myungsun Kim, Jinsu Kim, and Jung Hee Cheon Dep. of Mathematical Sciences, Seoul National University 1 Gwanak-ro, Gwanak-gu, Seoul 151-747, Korea {msunkim,kjs2002,jhcheon}@snu.ac.kr
More informationPhysical Zero-Knowledge Proof: From Sudoku to Nonogram
Physical Zero-Knowledge Proof: From Sudoku to Nonogram Wing-Kai Hon (a joint work with YF Chien) 2008/12/30 Lab of Algorithm and Data Structure Design (LOADS) 1 Outline Zero-Knowledge Proof (ZKP) 1. Cave
More informationTHE 1912 PRESIDENTIAL ELECTION
Mathematics: Modeling Our World Unit 1: PICK A WINNER SUPPLEMENTAL ACTIVITY THE 112 PRESIDENTIAL ELECTION S1.1 The 112 presidential election had three strong candidates: Woodrow Wilson, Theodore Roosevelt,
More information