Voting System Properties Most voting systems assume no collusion between more than one party for keys Most voting systems require a consistency check by.

Slides:



Advertisements
Similar presentations
Efficient Zero-Knowledge Argument for Correctness of a Shuffle Stephanie Bayer University College London Jens Groth University College London.
Advertisements

Analysis of an Internet Voting Protocol Dale Neal Garrett Smith.
Foundations of Cryptography Lecture 7 Lecturer:Danny Harnik.
Foundations of Cryptography Lecture 10 Lecturer: Moni Naor.
RPC Mixing: Making Mix-Nets Robust for Electronic Voting Ron Rivest MIT Markus Jakobsson Ari Juels RSA Laboratories.
CSC 421: Algorithm Design & Analysis
Efficient Zero-Knowledge Proof Systems Jens Groth University College London.
On the Security of Ballot Receipts in E2E Voting Systems Jeremy Clark, Aleks Essex, and Carlisle Adams Presented by Jeremy Clark.
Computing Kemeny and Slater Rankings Vincent Conitzer (Joint work with Andrew Davenport and Jayant Kalagnanam at IBM Research.)
1 Maximal Independent Set. 2 Independent Set (IS): In a graph G=(V,E), |V|=n, |E|=m, any set of nodes that are not adjacent.
Raef Bassily Adam Smith Abhradeep Thakurta Penn State Yahoo! Labs Private Empirical Risk Minimization: Efficient Algorithms and Tight Error Bounds Penn.
Probabilistic Methods in Concurrency Lecture 9 Other uses of randomization: a randomized protocol for anonymity Catuscia Palamidessi
Electronic Voting Presented by Ben Riva Based on presentations and papers of: Schoenmakers, Benaloh, Fiat, Adida, Reynolds, Ryan and Chaum.
Receipt-free Voting Joint work with Markus Jakobsson, C. Andy Neff Ari Juels RSA Laboratories.
Anonymous Fingerprinting Paper by: Birgit Pfitzmann, and Michael Waidner Presentation by: James Campbell.
Introduction to Modern Cryptography, Lecture 13 Money Related Issues ($$$) and Odds and Ends.
Complexity 18-1 Complexity Andrei Bulatov Probabilistic Algorithms.
CS151 Complexity Theory Lecture 6 April 15, 2015.
1 Amortized Analysis Consider an algorithm in which an operation is executed repeatedly with the property that its running time fluctuates throughout the.
1 Adapted from Oded Goldreich’s course lecture notes.
How Hard Is It To Manipulate Voting? Edith Elkind, Princeton Helger Lipmaa, HUT.
Parallel Mixing Philippe Golle, PARC Ari Juels, RSA Labs.
Zero-Knowledge Proofs And Their Applications in Cryptographic Systems Sultan Almuhammadi ICS 454.
CMSC 414 Computer and Network Security Lecture 2 Jonathan Katz.
Electronic Voting Schemes and Other stuff. Requirements Only eligible voters can vote (once only) No one can tell how voter voted Publish who voted (?)
Modelling and Analysing of Security Protocol: Lecture 12 Probabilistic Modelling Checking of Anonymous Systems Tom Chothia CWI.
Prof. Bart Selman Module Probability --- Part e)
UMBC Protocol Meeting 10/01/03 Universal Re-encryption: For Mix-Nets and Other Applications (to appear CT-RSA ’04) Paul Syverson NRL Markus Jakobsson Ari.
Multiplying and Dividing Fractions and Mixed Numbers
Data Structures Hashing Uri Zwick January 2014.
MOCA : Mobile Certificate Authority for Wireless Ad Hoc Networks The 2nd Annual PKI Research Workshop (PKI 2003) Seung Yi, Robin Kravets September. 25,
Cryptographic Voting Protocols: A Systems Perspective By Chris Karlof, Naveen Sastry, and David Wagner University of California, Berkely Proceedings of.
How to play ANY mental game
Provable Protocols for Unlinkability Ron Berman, Amos Fiat, Amnon Ta-Shma Tel Aviv University.
Arrays. Arrays: Introduction So far, we handled only one object in each line of code. When we wanted multiple objects to do something, we wrote multiple.
Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms David Chaum CACM Vol. 24 No. 2 February 1981 Presented by: Adam Lee 1/24/2006 David.
Optimistic Mixing for Exit-Polls Philippe Golle, Stanford Sheng Zhong, Yale Dan Boneh, Stanford Markus Jakobsson, RSA Labs Ari Juels, RSA Labs.
Privacy-Aware Personalization for Mobile Advertising
1 Maximal Independent Set. 2 Independent Set (IS): In a graph G=(V,E), |V|=n, |E|=m, any set of nodes that are not adjacent.
PROBABILISTIC COMPUTATION By Remanth Dabbati. INDEX  Probabilistic Turing Machine  Probabilistic Complexity Classes  Probabilistic Algorithms.
An Analysis of Parallel Mixing with Attacker-Controlled Inputs Nikita Borisov formerly of UC Berkeley.
SANDRA GUASCH CASTELLÓ PHD EVOTING WORKSHOP LUXEMBOURG, 15-16/10/2012 SUPERVISOR: PAZ MORILLO BOSCH Verifiable Mixnets.
1 CMSC 671 Fall 2001 Class #25-26 – Tuesday, November 27 / Thursday, November 29.
Applications of Dynamic Programming and Heuristics to the Traveling Salesman Problem ERIC SALMON & JOSEPH SEWELL.
Collaboration of Untrusting Peers with Changing Interests Baruch Awerbuch, Boaz Patt-Shamir, David Peleg, Mark Tuttle Review by Pinak Pujari.
Privacy and Anonymity Using Mix Networks* Slides borrowed from Philippe Golle, Markus Jacobson.
Ihab Mohammed and Safaa Alwajidi. Introduction Hash tables are dictionary structure that store objects with keys and provide very fast access. Hash table.
Game-based composition for key exchange Cristina Brzuska, Marc Fischlin (University of Darmstadt) Nigel Smart, Bogdan Warinschi, Steve Williams (University.
Software Security Seminar - 1 Chapter 4. Intermediate Protocols 발표자 : 이장원 Applied Cryptography.
Paper Title Authors names Conference and Year Presented by Your Name Date.
Almost Entirely Correct Mixing With Applications to Voting Philippe Golle Dan Boneh Stanford University.
Quantum Cryptography Antonio Acín
Shell Sort. Invented by Donald Shell in 1959, the shell sort is the most efficient of the O(n²) class of sorting algorithms. Of course, the shell sort.
The Initial Bulletin Board Posting 1 st Batch2 nd BatchEmpty forms Envelopes are: Opaque Sealed Bubbles unfilled Serial numbered (numbers unique per batch)
Cryptographic Shuffles Jens Groth University College London TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAAAAAAAAAAA.
A New Nation Vocabulary. Federal System A form of government which authority is divided between a central government and the states A form of government.
Topic 36: Zero-Knowledge Proofs
CSE 4095 Lecture 22 – BlockChain Slides adapted from Claudio Orlandi.
Challenges in Creating an Automated Protein Structure Metaserver
After the First Draft Easy Ways to Improve Your Essay Grades
Security Protocols Analysis
Direct product testing
Making Statistical Inferences
Helger Lipmaa University of Tartu, Estonia
Interactive Proofs Adapted from Oded Goldreich’s course lecture notes.
Interactive Proofs Adapted from Oded Goldreich’s course lecture notes.
Interactive Proofs Adapted from Oded Goldreich’s course lecture notes.
Cryptanalysis of Block Ciphers
Interactive Proofs Adapted from Oded Goldreich’s course lecture notes.
Presentation transcript:

Voting System Properties Most voting systems assume no collusion between more than one party for keys Most voting systems require a consistency check by each voter for a small piece of the protocol If 5-20% of voters check, the correctness of the entire protocol is determined by this weakest link

Choosing a Mixnet If we can trade a mixnet that requires only one honest* mix for a mixnet that is faster but requires more than one honest mix: good trade for voting If we can trade cryptographic soundness (1-ε) for statistical soundness (99%) and speed: good trade for voting * keep permutation private from other mixes

2 Such Mixnets Assuming re-encryption: Randomized Partial Checking [JJR02] Almost Entirely Correct Mixing [BG02] Open problem 1: others? Open problem 2: throw combinatorics at BG02

C 1 =E(m 1 ) C 2 =E(m 2 ) C 3 =E(m 3 ) C 4 =E(m 4 ) C 5 =E(m 5 ) C 6 =E(m 6 ) Mix C π1 C π2 C π3 C π4 C π5 C π6

C 1 =E(m 1 ) C 2 =E(m 2 ) C 3 =E(m 3 ) C 4 =E(m 4 ) C 5 =E(m 5 ) C 6 =E(m 6 ) Mix C π1 C π2 C π3 C π4 C π5 C π6 ΣΣ

C 1 =E(m 1 ) C 2 =E(m 2 ) C 3 =E(m 3 ) C 4 =E(m 4 ) C 5 =E(m 5 ) C 6 =E(m 6 ) Mix C π1 (C π2 )*a C π3 C π4 (C π5 )*a -1 C π6 ΣΣ Necessary but not sufficient

C 1 =E(m 1 ) C 2 =E(m 2 ) C 3 =E(m 3 ) C 4 =E(m 4 ) C 5 =E(m 5 ) C 6 =E(m 6 ) Mix C π1 (C π2 )*a C π3 C π4 (C π5 )*a -1 C π6 ΣΣ H T T T H T ≠

Properties Testing product of subsets is probabilistic: boost soundness by repeating Testing product of subsets reduces anonymity: repeating makes worst Adding additional honest mixes increases anonymity Optimize number of tests per mix and number of honest mixes to balance anonymity and soundness

Open Problem 2 Analysis in paper is tricky Complexity seems to result from using random coins Idea: throw a combinatorial design at the problem Choose random instance from a family of { ? } so that guarantees can be made by anonymity sets within mixes and with adjacent honest mixes