A Glossary of Voting Terminology

Size: px
Start display at page:

Download "A Glossary of Voting Terminology"

Transcription

1 A Glossary of Voting Terminology

2 SecVote 2010, 3 sep 2010 Hugo Jonker - p. 2/27 Structure Terms from actual elections Requirements Attacks Cryptography Determining the winner Some academic systems of renown

3 SecVote 2010, 3 sep 2010 Hugo Jonker - p. 3/27 Actual election terminology Voter credentials

4 SecVote 2010, 3 sep 2010 Hugo Jonker - p. 4/27 Actual election terminology Ballot

5 SecVote 2010, 3 sep 2010 Hugo Jonker - p. 5/27 Actual election terminology Ballot box

6 SecVote 2010, 3 sep 2010 Hugo Jonker - p. 6/27 Actual election terminology Booth / Voting Booth / Pollbooth

7 SecVote 2010, 3 sep 2010 Hugo Jonker - p. 7/27 Actual election terminology DRE = Direct Recording Electronic (voting machine) Diebold (USA) Nedap (NL)

8 SecVote 2010, 3 sep 2010 Hugo Jonker - p. 8/27 Actual election terminology VVPAT = Voter Verified Paper Audit Trail

9 SecVote 2010, 3 sep 2010 Hugo Jonker - p. 9/27 Actual election terminology HAVA = Help America Vote Act

10 SecVote 2010, 3 sep 2010 Hugo Jonker - p. 10/27 Actual election terminology chain of custody

11 SecVote 2010, 3 sep 2010 Hugo Jonker - p. 11/27 Requirements eligibility only individuals belonging to the group may vote. democracy only eligible voters may vote, and they may only vote once. accuracy - result depends on all cast votes, - result depends on nothing more than cast votes, - result depends on cast votes as they were cast. fairness no intermediate results.

12 SecVote 2010, 3 sep 2010 Hugo Jonker - p. 12/27 Requirements - verifiability universal verifiability given the set of cast votes, anyone can verify that the announced result is correct. individual verifiability a voter can verify that her vote counts for the correct candidate. eligibility verifiability anyone can verify that the set of cast votes originates only from eligible voters.

13 SecVote 2010, 3 sep 2010 Hugo Jonker - p. 13/27 Requirements - privacy anonymity no observer can learn how a voter voted. receipt-freeness the voter cannot prove how she voted. coercion-resistance (JCJ05) receipt-freeness + resistance to: - forced randomised voting, - forced abstention, - voting in the voter s stead.

14 SecVote 2010, 3 sep 2010 Hugo Jonker - p. 14/27 Requirements - end-to-end End-to-end verifiability: cast-as-intended a voter can verify that her input to the process matches her intent. recorded-as-cast a voter can verify that the record of her vote matches what she gave as input. tallied-as-recorded anyone can verify that the announced result matches the public records of votes cast. counted-as-cast a voter can verify that her vote counts in favour of the candidate for whom she cast it.

15 SecVote 2010, 3 sep 2010 Hugo Jonker - p. 15/27 Attacks ItalianLuxembourgian attack. chain voting.

16 SecVote 2010, 3 sep 2010 Hugo Jonker - p. 16/27 Attacks gerrymandering.

17 SecVote 2010, 3 sep 2010 Hugo Jonker - p. 17/27 Attacks Family voting.

18 SecVote 2010, 3 sep 2010 Hugo Jonker - p. 18/27 Attacks chain voting.

19 SecVote 2010, 3 sep 2010 Hugo Jonker - p. 19/27 Cryptography blind signatures: deblind(sign A (blind(msg,k))) = sign A (msg). homomorphic encryption: enc(msg a,k) enc(msg b,k) = enc(msg a msg b,k). - RSA78 - ElGamal85 - Paillier

20 SecVote 2010, 3 sep 2010 Hugo Jonker - p. 20/27 Cryptography commitments. proofs: - (interactive) Zero Knowledge Proof (ZKP) - Designated Verifier Proofs (DVP) Fiat-Shamir heuristic: Make interactive proofs non-interactive.

21 Cryptography Plaintext Equivalence Test: enc(msg a,k) =? enc(msg b,k). Plaintext Inequivalence Test: enc(msg a,k) <? enc(msg b,k). SecVote 2010, 3 sep 2010 Hugo Jonker - p. 21/27

22 SecVote 2010, 3 sep 2010 Hugo Jonker - p. 22/27 x Cryptography Mixnets w x y z x y 3 Mix 1 Mix 2 Mix 3 3 w 3 y 3 x 3 w 3 w y z z z adapted from [HS00]

23 SecVote 2010, 3 sep 2010 Hugo Jonker - p. 23/27 Cryptography Randomized Partial Auditing / Checking [JJR02]

24 How to fill in the ballot / determining the winner Plurality voting (single winner) FPTP = First Past The Post winner = candidate with most votes. Instant Runoff / Alternative Vote Approval voting Range voting Condorcet Winner = pairwise most preferred candidate. Borda count rank candidates, most preferred wins. SecVote 2010, 3 sep 2010 Hugo Jonker - p. 24/27

25 SecVote 2010, 3 sep 2010 Hugo Jonker - p. 25/27 Determining the winner Arrow s Theorem No system such that: - if every voter prefers A to B, then the group prefers A to B. - if no voter s preference between A and B is changed if C is added, then the group s preference between A and B also remains unchanged. - no single voter can determine the group s preference.

26 Some influential systems Cha81 theoretical BT94 receipt-free JCJ05 coercion-resistant practical Cha04 end-to-end verifiable time Theoretical: Chaum81 FOO92 CFSY96 CGS97 - Helios RF / CR: BT94 SK95 HS00 JCJ05 - Civitas End-to-end: Chaum04 Prêt à Voter Punchscan Scantegrity (I, II) Code Voting SecVote 2010, 3 sep 2010 Hugo Jonker - p. 26/27

27 SecVote 2010, 3 sep 2010 Hugo Jonker - p. 27/27 Done! Thanks for your attention!

MA 110 Homework 1 ANSWERS

MA 110 Homework 1 ANSWERS MA 110 Homework 1 ANSWERS This homework assignment is to be written out, showing all work, with problems numbered and answers clearly indicated. Put your code number on each page. The assignment is due

More information

MA 111 Worksheet Sept. 9 Name:

MA 111 Worksheet Sept. 9 Name: MA 111 Worksheet Sept. 9 Name: 1. List the four fairness criteria. In your own words, describe what each of these critieria say. Majority Criteria: If a candidate recieves more than half of the first place

More information

How to carbon date digital information! Jeremy Clark

How to carbon date digital information! Jeremy Clark How to carbon date digital information! Jeremy Clark Time Mar 2012 2 Notify Vendors Time Mar 2012 3 Notify Vendors Time Mar 2012 Mar 2013 4 Time Mar 2012 Mar 2013 5 Time Mar 2012 Feb 2013 Mar 2013 6 Time

More information

Name: Exam Score: /100. Exam 1: Version C. Academic Honesty Pledge

Name: Exam Score: /100. Exam 1: Version C. Academic Honesty Pledge MATH 11008 Explorations in Modern Mathematics Fall 2013 Circle one: MW7:45 / MWF1:10 Dr. Kracht Name: Exam Score: /100. (110 pts available) Exam 1: Version C Academic Honesty Pledge Your signature at the

More information

A Lightweight Implementation of a Shuffle Proof for Electronic Voting Systems

A Lightweight Implementation of a Shuffle Proof for Electronic Voting Systems A Lightweight Implementation of a Shuffle Proof for Electronic Voting Systems Philipp Locher 1,2 and Rolf Haenni 1 1 Research Institute for Security in the Information Society Bern University of Applied

More information

Math 1001: Excursions in Mathematics Final Exam: 9 May :30-4:30 p.m.

Math 1001: Excursions in Mathematics Final Exam: 9 May :30-4:30 p.m. Math 1001: Excursions in Mathematics Final Exam: 9 May 2011 1:30-4:30 p.m. Name: Section Number: You have three hours to complete this exam. There are ten problems on twelve pages, worth a total of 100

More information

D. Plurality-with-Elimination Method

D. Plurality-with-Elimination Method Chapter : The Mathematics of Voting (c) 5 + 4 + 3 + 2 + = 5 (d) 5 20 = 300 (e) 300 69 70 64 48 = 49 25. C wins with 500 5 20 25 = 40 points; the points sum to 4 50 + 3 50 + 2 50 + 50 = 500. 26. E. There

More information

Note that there are questions printed on both sides of each page!

Note that there are questions printed on both sides of each page! Math 1001 Name: Fall 2007 Test 2 Student ID: 11/7/07 Time allowed: 50 minutes Section: 10:10 11:15 12:20 This exam includes 7 pages, including this one and a sheet for scratch work. There are a total of

More information

Part I. First Notions

Part I. First Notions Part I First Notions 1 Introduction In their great variety, from contests of global significance such as a championship match or the election of a president down to a coin flip or a show of hands, games

More information

Guest Editorial Special Issue on Electronic Voting

Guest Editorial Special Issue on Electronic Voting Guest Editorial Special Issue on Electronic Voting The MIT Faculty has made this article openly available. Please share how this access benefits you. Your story matters. Citation As Published Publisher

More information

Math 167 Ch 9 Review 1 (c) Janice Epstein

Math 167 Ch 9 Review 1 (c) Janice Epstein Math 167 Ch 9 Review 1 (c) Janice Epstein CHAPTER 9 VOTING Plurality Method: Each voter votes for one candidate. The candidate with the most votes is the winner. Majority Rule: Each voter votes for one

More information

Public-key Cryptography: Theory and Practice

Public-key Cryptography: Theory and Practice Public-key Cryptography Theory and Practice Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Chapter 5: Cryptographic Algorithms Common Encryption Algorithms RSA

More information

Primitives et constructions cryptographiques pour la confiance numrique

Primitives et constructions cryptographiques pour la confiance numrique Primitives et constructions cryptographiques pour la confiance numrique Damien Vergnaud École normale supérieure C.N.R.S. I.N.R.I.A. 3 avril 2014 D. Vergnaud (ENS) Cryptographic Primitives for Digital

More information

Simple And Efficient Shuffling With Provable Correctness and ZK Privacy

Simple And Efficient Shuffling With Provable Correctness and ZK Privacy Simple And Efficient Shuffling With Provable Correctness and ZK Privacy Kun Peng, Colin Boyd and Ed Dawson Information Security Institute Queensland University of Technology {k.peng, c.boyd, e.dawson}@qut.edu.au

More information

Cryptography CS 555. Topic 20: Other Public Key Encryption Schemes. CS555 Topic 20 1

Cryptography CS 555. Topic 20: Other Public Key Encryption Schemes. CS555 Topic 20 1 Cryptography CS 555 Topic 20: Other Public Key Encryption Schemes Topic 20 1 Outline and Readings Outline Quadratic Residue Rabin encryption Goldwasser-Micali Commutative encryption Homomorphic encryption

More information

Public-Key Cryptosystem Based on Composite Degree Residuosity Classes. Paillier Cryptosystem. Harmeet Singh

Public-Key Cryptosystem Based on Composite Degree Residuosity Classes. Paillier Cryptosystem. Harmeet Singh Public-Key Cryptosystem Based on Composite Degree Residuosity Classes aka Paillier Cryptosystem Harmeet Singh Harmeet Singh Winter 2018 1 / 26 Background s Background Foundation of public-key encryption

More information

Diffie-Hellman key-exchange protocol

Diffie-Hellman key-exchange protocol Diffie-Hellman key-exchange protocol This protocol allows two users to choose a common secret key, for DES or AES, say, while communicating over an insecure channel (with eavesdroppers). The two users

More information

Getting Around Voting Problems. No or limited accessible parking at the polling place...

Getting Around Voting Problems. No or limited accessible parking at the polling place... No or limited accessible parking at the polling place... What are the possible supports or action steps you can think of? #1 Solutions: Ask if other street parking is available. Carpool or find out busy

More information

ElGamal Public-Key Encryption and Signature

ElGamal Public-Key Encryption and Signature ElGamal Public-Key Encryption and Signature Çetin Kaya Koç koc@cs.ucsb.edu Çetin Kaya Koç http://koclab.org Winter 2017 1 / 10 ElGamal Cryptosystem and Signature Scheme Taher ElGamal, originally from Egypt,

More information

Self-Scrambling Anonymizer. Overview

Self-Scrambling Anonymizer. Overview Financial Cryptography 2000 21-25 february 2000 - Anguilla Self-Scrambling Anonymizers Département d Informatique ENS - CNRS David.Pointcheval@ens.fr http://www.di.ens.fr/~pointche Overview Introduction

More information

Generic Attacks on Feistel Schemes

Generic Attacks on Feistel Schemes Generic Attacks on Feistel Schemes Jacques Patarin 1, 1 CP8 Crypto Lab, SchlumbergerSema, 36-38 rue de la Princesse, BP 45, 78430 Louveciennes Cedex, France PRiSM, University of Versailles, 45 av. des

More information

Zero- Knowledge Proofs in Anonymous Creden6al Systems. Gergely Alpár October 21, 2011

Zero- Knowledge Proofs in Anonymous Creden6al Systems. Gergely Alpár October 21, 2011 Zero- Knowledge Proofs in Anonymous Creden6al Systems Gergely Alpár October 21, 2011 Waldo Source: findwaldo.com // Department Store Idea: Moni Naor et al. How to Convince your children you are not chea6ng,

More information

Deterring Voluntary Trace Disclosure in Re-encryption Mix Networks

Deterring Voluntary Trace Disclosure in Re-encryption Mix Networks Deterring Voluntary Trace Disclosure in Re-encryption Mix Networks Philippe Golle PARC pgolle@parc.com XiaoFeng Wang Indiana University xw7@indiana.edu Markus Jakobsson Indiana University markus@indiana.edu

More information

Cryptographic Shuffles and Their Applications

Cryptographic Shuffles and Their Applications 이학박사학위논문 Cryptographic Shuffles and Their Applications ( 암호학적셔플과그응용 ) 2012 년 8 월 서울대학교대학원 수리과학부 김명선 Cryptographic Shuffles and Their Applications ( 암호학적셔플과그응용 ) 지도교수천정희 이논문을이학박사학위논문으로제출함 2012 년 5 월 서울대학교대학원

More information

Digital support for gathering administrative ideas from constituents of democratic bodies

Digital support for gathering administrative ideas from constituents of democratic bodies Digital support for gathering administrative ideas from constituents of democratic bodies Marius C. Silaghi and Ronald J. Bailey and Phil Bernhard and Phil K. Chan and Cem Kaner February 17, 2004 Florida

More information

Data security (Cryptography) exercise book

Data security (Cryptography) exercise book University of Debrecen Faculty of Informatics Data security (Cryptography) exercise book 1 Contents 1 RSA 4 1.1 RSA in general.................................. 4 1.2 RSA background.................................

More information

Computer Aided Security: Cryptographic Primitives, Voting protocols, and Wireless Sensor Networks

Computer Aided Security: Cryptographic Primitives, Voting protocols, and Wireless Sensor Networks Computer Aided Security: Cryptographic Primitives, Voting protocols, and Wireless Sensor Networks Pascal Lafourcade November 6, 2012 Habilitation à Diriger des Recherches 1 / 48 Motivations Nowadays Security

More information

Public Key Encryption

Public Key Encryption Math 210 Jerry L. Kazdan Public Key Encryption The essence of this procedure is that as far as we currently know, it is difficult to factor a number that is the product of two primes each having many,

More information

Fermat s little theorem. RSA.

Fermat s little theorem. RSA. .. Computing large numbers modulo n (a) In modulo arithmetic, you can always reduce a large number to its remainder a a rem n (mod n). (b) Addition, subtraction, and multiplication preserve congruence:

More information

Public Key Cryptography Great Ideas in Theoretical Computer Science Saarland University, Summer 2014

Public Key Cryptography Great Ideas in Theoretical Computer Science Saarland University, Summer 2014 7 Public Key Cryptography Great Ideas in Theoretical Computer Science Saarland University, Summer 2014 Cryptography studies techniques for secure communication in the presence of third parties. A typical

More information

Professor Alan H. Stein

Professor Alan H. Stein Mathematics 103 Professor Alan H. Stein July 7, 2004 Solutions Final Examination (1) Consider an election among four candidates: James, Theresa, Marie and Donnie. Suppose 1850 voters cast ballots on which

More information

Majority Rule: Each voter votes for one candidate. The candidate with the majority of the votes wins. Majority means MORE than half.

Majority Rule: Each voter votes for one candidate. The candidate with the majority of the votes wins. Majority means MORE than half. Math 167 h 9 Week in Review 1 (c) Janice Epstein and Tamara arter HPTER 9 VOTING Majority Rule: Each voter votes for one candidate. The candidate with the majority of the votes wins. Majority means MORE

More information

Exam 4 Learning Objectives. Voting Methods

Exam 4 Learning Objectives. Voting Methods Exam 4 Learning Objectives Voting Methods Given the results of an election, determine the winner using o Majority rule or plurality o Borda count o Hare method o Pairwise-comparison o Tournament method.

More information

Secure Distributed Computation on Private Inputs

Secure Distributed Computation on Private Inputs Secure Distributed Computation on Private Inputs David Pointcheval ENS - CNRS - INRIA Foundations & Practice of Security Clermont-Ferrand, France - October 27th, 2015 The Cloud David Pointcheval Introduction

More information

Lecture 28: Applications of Crypto Protocols

Lecture 28: Applications of Crypto Protocols U.C. Berkeley Lecture 28 CS276: Cryptography April 27, 2006 Professor David Wagner Scribe: Scott Monasch Lecture 28: Applications of Crypto Protocols 1 Electronic Payment Protocols For this section we

More information

Protocoles de vote end-to-end

Protocoles de vote end-to-end Protocoles de vote end-to-end Analyse de sécurité basée sur la simulation Olivier de Marneffe, Olivier Pereira, Jean-Jacques Quisquater Université catholique de Louvain, Belgium 19 mars 2008 Microelectronics

More information

Knights, Spies, Games and Social Networks

Knights, Spies, Games and Social Networks Knights, Spies, Games and Social Networks Mark Wildon 16 February 2010 The Knights and Spies Problem In a room there are 100 people. Each person is either a knight or a spy. Knights always tell the truth,

More information

Unit 8: Sample Surveys

Unit 8: Sample Surveys Unit 8: Sample Surveys Marius Ionescu 10/27/2011 Marius Ionescu () Unit 8: Sample Surveys 10/27/2011 1 / 13 Chapter 19: Surveys Why take a survey? Marius Ionescu () Unit 8: Sample Surveys 10/27/2011 2

More information

The number theory behind cryptography

The number theory behind cryptography The University of Vermont May 16, 2017 What is cryptography? Cryptography is the practice and study of techniques for secure communication in the presence of adverse third parties. What is cryptography?

More information

Recommendations for E-Voting System Usability: Lessons from Literature for Interface Design, User Studies and Usability Criteria

Recommendations for E-Voting System Usability: Lessons from Literature for Interface Design, User Studies and Usability Criteria Recommendations for E-Voting System Usability: Lessons from Literature for Interface Design, User Studies and Usability Criteria 15-16 Oct. 2012 Evoting PhD Workshop Maina Olembo 1 Usable Security Lab

More information

e-voting Scientific Events May 2004

e-voting Scientific Events May 2004 e-voting Scientific Events May 2004 Trademarks All brand names and product names are trademarks or registered trademarks of their respective owners. Disclaimer This document is provided as is without warranty

More information

Linear Congruences. The solutions to a linear congruence ax b (mod m) are all integers x that satisfy the congruence.

Linear Congruences. The solutions to a linear congruence ax b (mod m) are all integers x that satisfy the congruence. Section 4.4 Linear Congruences Definition: A congruence of the form ax b (mod m), where m is a positive integer, a and b are integers, and x is a variable, is called a linear congruence. The solutions

More information

Medians of permutations and gene orders

Medians of permutations and gene orders Medians of permutations and gene orders Sylvie Hamel Université de Montréal Work in collaboration with: Guillaume Blin Maxime Crochemore Stéphane Vialette from Université Marne-la-Vallée Medians of permutations

More information

Andrei Sabelfeld. Joint work with Per Hallgren and Martin Ochoa

Andrei Sabelfeld. Joint work with Per Hallgren and Martin Ochoa Andrei Sabelfeld Joint work with Per Hallgren and Martin Ochoa Privacy for location based services Explosion of interest to location based services (LBS) locating people, vehicles, vessels, cargo, devices

More information

Lecture 5: Subgame Perfect Equilibrium. November 1, 2006

Lecture 5: Subgame Perfect Equilibrium. November 1, 2006 Lecture 5: Subgame Perfect Equilibrium November 1, 2006 Osborne: ch 7 How do we analyze extensive form games where there are simultaneous moves? Example: Stage 1. Player 1 chooses between fin,outg If OUT,

More information

PLEASE MARK YOUR ANSWERS WITH AN X, not a circle! 2. (a) (b) (c) (d) (e) (a) (b) (c) (d) (e) (a) (b) (c) (d) (e)...

PLEASE MARK YOUR ANSWERS WITH AN X, not a circle! 2. (a) (b) (c) (d) (e) (a) (b) (c) (d) (e) (a) (b) (c) (d) (e)... Math 7, Exam I March, 26 The Honor Code is in e ect for this examination. All work is to be your own. You may use your Calculator. The exam lasts for 5 minutes. Be sure that your name is on every page

More information

MGF 1107 FINAL EXAM REVIEW CHAPTER 9

MGF 1107 FINAL EXAM REVIEW CHAPTER 9 MGF 1107 FINL EXM REVIEW HPTER 9 1. my (), etsy (), arla (), Doris (D), and Emilia (E) are candidates for an open Student Government seat. There are 110 voters with the preference lists below. 36 24 20

More information

Discrete Mathematics & Mathematical Reasoning Multiplicative Inverses and Some Cryptography

Discrete Mathematics & Mathematical Reasoning Multiplicative Inverses and Some Cryptography Discrete Mathematics & Mathematical Reasoning Multiplicative Inverses and Some Cryptography Colin Stirling Informatics Some slides based on ones by Myrto Arapinis Colin Stirling (Informatics) Discrete

More information

Popular Ranking. b Independent. Key words: Rank aggregation, Kemeny Rank Aggregation, Popular Ranking

Popular Ranking. b Independent. Key words: Rank aggregation, Kemeny Rank Aggregation, Popular Ranking Popular Ranking Anke van Zuylen a Frans Schalekamp b David P. Williamson c,1 a Max-Planck-Institut für Informatik, Saarbrücken, Germany b Independent c School of ORIE, Cornell University, Ithaca, NY, USA

More information

Algorithmic Number Theory and Cryptography (CS 303)

Algorithmic Number Theory and Cryptography (CS 303) Algorithmic Number Theory and Cryptography (CS 303) Modular Arithmetic and the RSA Public Key Cryptosystem Jeremy R. Johnson 1 Introduction Objective: To understand what a public key cryptosystem is and

More information

WNBC/Marist Poll Poughkeepsie, NY Phone Fax

WNBC/Marist Poll Poughkeepsie, NY Phone Fax WNBC/Marist Poll Poughkeepsie, NY 12601 Phone 845.575.5050 Fax 845.575.5111 www.maristpoll.marist.edu Contact: NYS Poll: February 5 th Presidential Primaries FOR IMMEDIATE RELEASE: Saturday February 2,

More information

Chapter 1. Probability

Chapter 1. Probability Chapter 1. Probability 1.1 Basic Concepts Scientific method a. For a given problem, we define measures that explains the problem well. b. Data is collected with observation and the measures are calculated.

More information

Cryptography Math 1580 Silverman First Hour Exam Mon Oct 2, 2017

Cryptography Math 1580 Silverman First Hour Exam Mon Oct 2, 2017 Name: Cryptography Math 1580 Silverman First Hour Exam Mon Oct 2, 2017 INSTRUCTIONS Read Carefully Time: 50 minutes There are 5 problems. Write your name legibly at the top of this page. No calculators

More information

Generic Attacks on Feistel Schemes

Generic Attacks on Feistel Schemes Generic Attacks on Feistel Schemes -Extended Version- Jacques Patarin PRiSM, University of Versailles, 45 av. des États-Unis, 78035 Versailles Cedex, France This paper is the extended version of the paper

More information

opening polls for election day

opening polls for election day eslate Instruction Booklet Suggestion: One poll worker should read each instruction while the second poll worker completes each task. opening polls for election day 1. Setup eslate portable booth by attaching

More information

A guide to voting in the UK General Election

A guide to voting in the UK General Election A guide to voting in the UK General Election Easy Read What is the General Election? The General Election is when people all over the UK vote. In each area people vote for who they want to be their MP.

More information

Cryptography, Number Theory, and RSA

Cryptography, Number Theory, and RSA Cryptography, Number Theory, and RSA Joan Boyar, IMADA, University of Southern Denmark November 2015 Outline Symmetric key cryptography Public key cryptography Introduction to number theory RSA Modular

More information

Math June Review: Probability and Voting Procedures

Math June Review: Probability and Voting Procedures Math - June Review: Probability and Voting Procedures A big box contains 7 chocolate doughnuts and honey doughnuts. A small box contains doughnuts: some are chocolate doughnuts, and the others are honey

More information

Step-by-Step Instructions on How to Apply for Graduation

Step-by-Step Instructions on How to Apply for Graduation Step-by-Step Instructions on How to Apply for Graduation 0 P a g e Important Reminders: If you are an undergraduate student pursuing a double major, you will only need to submit one application. If you

More information

MA/CSSE 473 Day 9. The algorithm (modified) N 1

MA/CSSE 473 Day 9. The algorithm (modified) N 1 MA/CSSE 473 Day 9 Primality Testing Encryption Intro The algorithm (modified) To test N for primality Pick positive integers a 1, a 2,, a k < N at random For each a i, check for a N 1 i 1 (mod N) Use the

More information

CRITERIA AND PROCEDURE FOR SELECTION OF HARVEY A.K. WHITNEY LECTURE AWARD RECIPIENT

CRITERIA AND PROCEDURE FOR SELECTION OF HARVEY A.K. WHITNEY LECTURE AWARD RECIPIENT CRITERIA AND PROCEDURE FOR SELECTION OF HARVEY A.K. WHITNEY LECTURE AWARD RECIPIENT Approved May 12, 1963 Revised March 20-21, 1975 Revised November 17, 1978 Revised April 23, 1982 Revised June 23, 2007

More information

LET ME VOTE. Know Your Voting Rights

LET ME VOTE. Know Your Voting Rights LET ME VOTE Know Your Voting Rights Michigan 2018 CONTENTS Who Can Vote?... 1 Registration...2 Voting Early...4 Voting on Election Day...5 Photo ID...7 Problems at the Polls...8 Tips for Avoiding Problems...10

More information

Related Ideas: DHM Key Mechanics

Related Ideas: DHM Key Mechanics Related Ideas: DHM Key Mechanics Example (DHM Key Mechanics) Two parties, Alice and Bob, calculate a key that a third person Carl will never know, even if Carl intercepts all communication between Alice

More information

Juan Garay (Yahoo Labs) Clint Givens (Maine School of Science and Mathematics) Rafail Ostrovsky (UCLA) Pavel Raykov (ETH)

Juan Garay (Yahoo Labs) Clint Givens (Maine School of Science and Mathematics) Rafail Ostrovsky (UCLA) Pavel Raykov (ETH) Broadcast (and Round) Efficient Secure Multiparty Computation Juan Garay (Yahoo Labs) Clint Givens (Maine School of Science and Mathematics) Rafail Ostrovsky (UCLA) Pavel Raykov (ETH) Secure Multiparty

More information

HKIRA 4 th IR Awards 2018 Are Now Open for Nomination

HKIRA 4 th IR Awards 2018 Are Now Open for Nomination FOR IMMEDIATE RELEASE HKIRA 4 th IR Awards 2018 Are Now Open for Nomination Hong Kong (29 January, 2018) Hong Kong Investor Relations Association (HKIRA) is pleased to announce that public nomination is

More information

BBC NATIONAL SHORT STORY AWARD 2010

BBC NATIONAL SHORT STORY AWARD 2010 ENTRY TERMS AND CONDITIONS BBC NATIONAL SHORT STORY AWARD 2010 The British Broadcasting Corporation in association with Booktrust Award of 15,000 for the winner 3,000 for the runner up 500 for 3 further

More information

Application: Public Key Cryptography. Public Key Cryptography

Application: Public Key Cryptography. Public Key Cryptography Application: Public Key Cryptography Suppose I wanted people to send me secret messages by snail mail Method 0. I send a padlock, that only I have the key to, to everyone who might want to send me a message.

More information

Cryptography. Module in Autumn Term 2016 University of Birmingham. Lecturers: Mark D. Ryan and David Galindo

Cryptography. Module in Autumn Term 2016 University of Birmingham. Lecturers: Mark D. Ryan and David Galindo Lecturers: Mark D. Ryan and David Galindo. Cryptography 2017. Slide: 1 Cryptography Module in Autumn Term 2016 University of Birmingham Lecturers: Mark D. Ryan and David Galindo Slides originally written

More information

Note Computations with a deck of cards

Note Computations with a deck of cards Theoretical Computer Science 259 (2001) 671 678 www.elsevier.com/locate/tcs Note Computations with a deck of cards Anton Stiglic Zero-Knowledge Systems Inc, 888 de Maisonneuve East, 6th Floor, Montreal,

More information

Implementation and Performance Testing of the SQUASH RFID Authentication Protocol

Implementation and Performance Testing of the SQUASH RFID Authentication Protocol Implementation and Performance Testing of the SQUASH RFID Authentication Protocol Philip Koshy, Justin Valentin and Xiaowen Zhang * Department of Computer Science College of n Island n Island, New York,

More information

Fair tracing based on VSS and blind signature without Trustees

Fair tracing based on VSS and blind signature without Trustees Fair tracing based on VSS and blind signature without Trustees ByeongGon Kim SungJun Min Kwangjo Kim International Research center for Information Security (IRIS) Information and Communications Univ.(ICU),

More information

Claudia Ziegler Acemyan

Claudia Ziegler Acemyan Claudia Ziegler Acemyan 2223 West Main Street, Unit A, Houston, TX 77098 713-256-3858 claudiaz@rice.edu www.czacemyan.com EDUCATION Ph.D., Psychology, Human Factors and Human-Computer Interaction, Rice

More information

Voting Procedures. Requires MORE than 50% of the votes in one category If no category has the required number of votes no winner

Voting Procedures. Requires MORE than 50% of the votes in one category If no category has the required number of votes no winner Voting Procedures Majority Rule Requires MORE than 50% of the votes in one category If no category has the required number of votes no winner Students at HRHS voted on their favorite sports team. The following

More information

Identity-based multisignature with message recovery

Identity-based multisignature with message recovery University of Wollongong Research Online Faculty of Engineering and Information Sciences - Papers: Part A Faculty of Engineering and Information Sciences 2013 Identity-based multisignature with message

More information

Math 319 Problem Set #7 Solution 18 April 2002

Math 319 Problem Set #7 Solution 18 April 2002 Math 319 Problem Set #7 Solution 18 April 2002 1. ( 2.4, problem 9) Show that if x 2 1 (mod m) and x / ±1 (mod m) then 1 < (x 1, m) < m and 1 < (x + 1, m) < m. Proof: From x 2 1 (mod m) we get m (x 2 1).

More information

Triple-DES Block of 96 Bits: An Application to. Colour Image Encryption

Triple-DES Block of 96 Bits: An Application to. Colour Image Encryption Applied Mathematical Sciences, Vol. 7, 2013, no. 23, 1143-1155 HIKARI Ltd, www.m-hikari.com Triple-DES Block of 96 Bits: An Application to Colour Image Encryption V. M. Silva-García Instituto politécnico

More information

Introduction to Cryptography CS 355

Introduction to Cryptography CS 355 Introduction to Cryptography CS 355 Lecture 25 Mental Poker And Semantic Security CS 355 Fall 2005 / Lecture 25 1 Lecture Outline Review of number theory The Mental Poker Protocol Semantic security Semantic

More information

Chapter 15: Game Theory: The Mathematics of Competition Lesson Plan

Chapter 15: Game Theory: The Mathematics of Competition Lesson Plan Chapter 15: Game Theory: The Mathematics of Competition Lesson Plan For All Practical Purposes Two-Person Total-Conflict Games: Pure Strategies Mathematical Literacy in Today s World, 9th ed. Two-Person

More information

Signatures for Network Coding

Signatures for Network Coding Conference on Random network codes and Designs over F q Signatures for Network Coding Oliver Gnilke, Claude-Shannon-Institute, University College Dublin 18. September 2013 1 / 14 Network Coding Signature

More information

Game Theory and Algorithms Lecture 3: Weak Dominance and Truthfulness

Game Theory and Algorithms Lecture 3: Weak Dominance and Truthfulness Game Theory and Algorithms Lecture 3: Weak Dominance and Truthfulness March 1, 2011 Summary: We introduce the notion of a (weakly) dominant strategy: one which is always a best response, no matter what

More information

RSA hybrid encryption schemes

RSA hybrid encryption schemes RSA hybrid encryption schemes Louis Granboulan École Normale Supérieure Louis.Granboulan@ens.fr Abstract. This document compares the two published RSA-based hybrid encryption schemes having linear reduction

More information

Best of luck on the exam!

Best of luck on the exam! CS103 Handout 18 Fall 2014 October 20, 2014 Practice Midterm Exam This practice exam is closed-book and closed-computer but open-note. You may have a doublesided, 8.5 11 sheet of notes with you when you

More information

Mathematics Explorers Club Fall 2012 Number Theory and Cryptography

Mathematics Explorers Club Fall 2012 Number Theory and Cryptography Mathematics Explorers Club Fall 2012 Number Theory and Cryptography Chapter 0: Introduction Number Theory enjoys a very long history in short, number theory is a study of integers. Mathematicians over

More information

Unlinkability and Redundancy in Anonymous Publication Systems

Unlinkability and Redundancy in Anonymous Publication Systems Unlinkability and Redundancy in Anonymous Publication Systems Christian Boesgaard pink@diku.dk Department of Computer Science University of Copenhagen Denmark January 22, 2004 1 Introduction An anonymous

More information

CS 261 Notes: Zerocash

CS 261 Notes: Zerocash CS 261 Notes: Zerocash Scribe: Lynn Chua September 19, 2018 1 Introduction Zerocash is a cryptocurrency which allows users to pay each other directly, without revealing any information about the parties

More information

Voting Systems, Mass Murder, and the Enigma Machine

Voting Systems, Mass Murder, and the Enigma Machine Voting Systems, Mass Murder, and the Enigma Machine Department of Mathematics University of Arizona 3/22/11 Outline Der Reichstag 1 Der Reichstag 2 3 Der Reichstag German Parliamentary Election Results

More information

Chapter 1. Probability

Chapter 1. Probability Chapter 1. Probability 1.1 Basic Concepts Scientific method a. For a given problem, we define measures that explains the problem well. b. Data is collected with observation and the measures are calculated.

More information

Sequential Aggregate Signatures from Trapdoor Permutations

Sequential Aggregate Signatures from Trapdoor Permutations Sequential Aggregate Signatures from Trapdoor Permutations Anna Lysyanskaya Silvio Micali Leonid Reyzin Hovav Shacham Abstract An aggregate signature scheme (recently proposed by Boneh, Gentry, Lynn, and

More information

CONSTITUTION of the World Science Fiction Society, as of August 22, 2016

CONSTITUTION of the World Science Fiction Society, as of August 22, 2016 CONSTITUTION of the World Science Fiction Society, as of August 22, 2016 SECRETARY S NOTE: Material in red has been deleted from the current Constitution; and material in blue is newly added. Material

More information

PARADOXES WITH DICE AND ELECTIONS

PARADOXES WITH DICE AND ELECTIONS PARADOXES WITH DICE AND ELECTIONS Marcel Jackson La Trobe University Some startling paradoxes can be found with games involving relabeled dice. We look at some of the possibilities and their connection

More information

Circular Nim Games. S. Heubach 1 M. Dufour 2. May 7, 2010 Math Colloquium, Cal Poly San Luis Obispo

Circular Nim Games. S. Heubach 1 M. Dufour 2. May 7, 2010 Math Colloquium, Cal Poly San Luis Obispo Circular Nim Games S. Heubach 1 M. Dufour 2 1 Dept. of Mathematics, California State University Los Angeles 2 Dept. of Mathematics, University of Quebeq, Montreal May 7, 2010 Math Colloquium, Cal Poly

More information

Yale University Department of Computer Science

Yale University Department of Computer Science LUX ETVERITAS Yale University Department of Computer Science Secret Bit Transmission Using a Random Deal of Cards Michael J. Fischer Michael S. Paterson Charles Rackoff YALEU/DCS/TR-792 May 1990 This work

More information

Rigging Tournament Brackets for Weaker Players

Rigging Tournament Brackets for Weaker Players Rigging Tournament Brackets for Weaker Players Isabelle Stanton UC Berkeley isabelle@eecs.berkeley.edu Virginia Vassilevska Williams UC Berkeley virgi@eecs.berkeley.edu Abstract The agenda control problem

More information

Pan-Canadian Trust Framework Overview

Pan-Canadian Trust Framework Overview Pan-Canadian Trust Framework Overview A collaborative approach to developing a Pan- Canadian Trust Framework Authors: DIACC Trust Framework Expert Committee August 2016 Abstract: The purpose of this document

More information

Cryptography. 2. decoding is extremely difficult (for protection against eavesdroppers);

Cryptography. 2. decoding is extremely difficult (for protection against eavesdroppers); 18.310 lecture notes September 2, 2013 Cryptography Lecturer: Michel Goemans 1 Public Key Cryptosystems In these notes, we will be concerned with constructing secret codes. A sender would like to encrypt

More information

EE 418: Network Security and Cryptography

EE 418: Network Security and Cryptography EE 418: Network Security and Cryptography Homework 3 Solutions Assigned: Wednesday, November 2, 2016, Due: Thursday, November 10, 2016 Instructor: Tamara Bonaci Department of Electrical Engineering University

More information

Lindsay Special Election Statement of Vote

Lindsay Special Election Statement of Vote Lindsay Special Election Statement of Vote June 6, 207 TABLE OF CONTENTS Statement of Votes Cast Lindsay Special Election June 6, 207 CONTENTS SECTION - PAGE Certification of Results Statement of Votes..

More information

A Public Shuffle without Private Permutations

A Public Shuffle without Private Permutations A Public Shuffle without Private Permutations Myungsun Kim, Jinsu Kim, and Jung Hee Cheon Dep. of Mathematical Sciences, Seoul National University 1 Gwanak-ro, Gwanak-gu, Seoul 151-747, Korea {msunkim,kjs2002,jhcheon}@snu.ac.kr

More information

Physical Zero-Knowledge Proof: From Sudoku to Nonogram

Physical Zero-Knowledge Proof: From Sudoku to Nonogram Physical Zero-Knowledge Proof: From Sudoku to Nonogram Wing-Kai Hon (a joint work with YF Chien) 2008/12/30 Lab of Algorithm and Data Structure Design (LOADS) 1 Outline Zero-Knowledge Proof (ZKP) 1. Cave

More information

THE 1912 PRESIDENTIAL ELECTION

THE 1912 PRESIDENTIAL ELECTION Mathematics: Modeling Our World Unit 1: PICK A WINNER SUPPLEMENTAL ACTIVITY THE 112 PRESIDENTIAL ELECTION S1.1 The 112 presidential election had three strong candidates: Woodrow Wilson, Theodore Roosevelt,

More information