3rd Usenix Workshop on Hot Topics in Security (hotsec '08) Securing Systems N Security Benchmarking Using Partial Verification Exploring New Directions
نویسنده
چکیده
Each ballot is first transformed into a square matrix with a row and column for each candidate. Each cell in the matrix represents a pairwise preference of the row candidate to the column candidate. A value of –1 indicates that the row candidate is preferred, whereas a 0 indicates the column candidate is preferred. By summing the column for a candidate and multiplying by –1, you can recover the rank from the traditional ballot. Additionally, by adding an eliminated row to the column sums the votes are automatically redistributed to reflect the new ordering. The final step is to take this matrix and encrypt it using something such as exponential ElGamal, which has the property of additive homomorphism. Tallying then takes place using the encrypted matrices for each ballot instead of the cleartext votes. The authors have implemented this scheme and said that for a 30-candidate election and one million voters it required 10,000 PC hours to tally the election and produced a 400 GB audit log of the encrypted ballots.
منابع مشابه
Security Benchmarking using Partial Verification
Implementation-level vulnerabilities are a persistent threat to the security of computing systems. We propose using the results of partially-successful verification attempts to place a numerical upper bound on the insecurity of systems, in order to motivate improvement.
متن کاملComparing Different Methodologies Used To Ensure the Security of RFID Credit Card: A Comparative Analysis
The use of Radio Frequency Identification (RFID) advancement is turning out to be rapidly transversely over an extensive variety of business undertakings. Engineers apply the development not simply in customary applications, for instance, asset or stock after, also in security organizations, electronic travel papers and RFID-embedded card. In any case, RFID development moreover brings different...
متن کاملComparing Different Methodologies Used To Ensure the Security of RFID Credit Card: A Comparative Analysis
The use of Radio Frequency Identification (RFID) advancement is turning out to be rapidly transversely over an extensive variety of business undertakings. Engineers apply the development not simply in customary applications, for instance, asset or stock after, also in security organizations, electronic travel papers and RFID-embedded card. In any case, RFID development moreover brings different...
متن کاملنسبت دگرگونیهای منطقه غرب آسیا با امنیت ملی جمهوری اسلامی ایران
Popular upheavals and regional developments in the Islamic world began in 2011, which began with the uprising of the Tunisian people, and then spread to other countries in the Arab world, including Egypt, Bahrain and Yemen. Major changes in the periphery of Iran were considered. Which affects the national security of the various countries of the region, including Iran. This paper, by descripti...
متن کاملA short introduction to two approaches in formal verification of security protocols: model checking and theorem proving
In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in all instances or not. We investigate Scyther operational semantics as n example of this...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2008