Cryptography by the People, for the People
نویسندگان
چکیده
In this thesis we investigate methods for designing and analyzing cryptographic schemes which take into account the differences between humans and computers. On the one hand, humans have trouble performing complex algorithms and mathematical computations. On the other, humans live in a physical world, and can make use of " real " objects in ways that purely electronic algorithms cannot. Tamper-Evident Seals. In the first part of the thesis (Chapters 2 and 3), we construct cryptographic protocols that rely on the properties of everyday objects (such as locks, envelopes or scratch-off cards). In Chapter 2, we formally define the properties of tamper-evident seals. We consider several variants of the " intuitive " definition, and study their relation to basic cryptographic primitives (such as fair coin-flipping, bit-commitment and oblivious transfer), giving both positive and negative results. In Chapter 3, we use scratch-off cards and envelopes to construct protocols for securely conducting polls of sensitive questions: the responders can safely answer truthfully while maintaining plausible deniability (the pollster will never be certain of their actual answer), but at the same time cannot bias the results of the poll. The protocols are simple enough to be used in practice. Voting Protocols. The distinction between the capabilities of humans and computers is especially evident in the context of voting, where voters need to be certain that their ballots were taken into account, even if they mistrust the computers running the election. The second part of the thesis (Chapters 4 and 5) deals specifically with protocols for secure elections. We present two protocols for universally-verifiable voting; both allow voters to verify that their ballots were cast correctly and allow anyone to verify that the published final tally is correct — even if the computers running the election behave maliciously. Both protocols also have the property of everlasting privacy: the data published during the election contains no information at all about voters' choices (beyond the final tally). This ensures that even if the cryptographic assumptions used by these protocols are subsequently broken, voter privacy will not be violated. Formal Analysis. One of our major aims is to provide rigorous proofs of security for cryptographic protocols involving humans. We give formal proofs of security for our protocols in the Universal Composability model, which gives very powerful guarantees about the security of the protocols when run concurrently with other protocols and when used as building-blocks in larger protocols. …
منابع مشابه
An Introduction to Differential Computation Analysis (DCA) on the withe-box cryptography algorithms
Advances in information and communication technologies lead to use of some new devices such as smart phones. The new devices provide more advantages for the adversaries hence with respect to them, one can define with-box cryptography. In this new model of cryptography, designers try to hide the key using as a kind of implementation. The Differential Computation Analysis (DCA) is a side channel ...
متن کاملA Comparison between Marriage Expectations in People with Needs for Succorance and Kind People
The current research was conducted with the aim to compare the marriage expectations between kind people and people with needs for succorance. The study was carried out using correlational method. The statistical population of this research consisted of all single students at Shahrekord University. For that purpose, a total number of 130 students (55 males, 75 females) were selected using rando...
متن کاملLived experience of caring for aging parents in middle-aged people: Hermeneutic study
Background : Due to the decrease in fertility rate and the increase in the number of aging people, middle-aged adults are more important than ever as an important source for keeping elderly people in families. Understanding and insight into aging care by middle-aged people is necessary to promote health in middle age and old age. The present study was conducted with the aim of understanding the...
متن کاملComparison of Spirituality Dimensions among Opioid-Dependent, Methamphetamine Dependent, and Normal People
Background and Objectives: Substance abuse and dependence is one of the major problems and concerns of today's world. Spiritual vacuums are a cause of tendency toward drugs abuse. The aim of this study is to compare spirituality components among opioid-dependent, methamphetamine dependent, and normal people in Shiraz. Methods: The study population of this causal-comparative study consisted of 5...
متن کاملInvestigating the effect of structural form of outdoor path of residential complexes on improving the routing of people in emergency situations
Background and Objective: Due to the importance of time in choosing the optimal routing to reduce the damage caused by accidents in critical situations such as earthquakes, fires, etc., the structural form of the route has a significant impact on the selection of people in emergencies. It can also be very effective in the work for designers, managers and urban planners for disaster risk managem...
متن کاملUsing Ineffective Coping Strategies for Facing With COVID-19
Dear Editor, Methods that people use to overcome problems are called coping strategies. The concept of coping was first introduced by Lazarus in 1966. He believed that stress involves three stages. First, there is the initial assessment, which is to observe a risk. The second stage involves the evaluation, which is the search for an answer in the mind, and the third stage is to f...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2008