3,272 research outputs found

    Verifiable Classroom Voting in Practice

    Get PDF
    Classroom voting is an important pedagogical technique in which students learn by voting on the answers to questions. The same voting platform is also often used for exercises such as rating lecturer performance and voting for prizes. In this paper, we present VCV, an end-to-end (E2E) verifiable classroom voting system built based on the DRE-i protocol. Our system provides E2E verifiability without tallying authorities; it supports voting through mobile phones with constrained computing resources; it reports the tallying results instantly after voting is finished along with cryptographic proofs that enable the public to verify the tallying integrity. Since 2013, the VCV system has been used regularly in real classroom teaching, as well as academic prize competitions, in Newcastle University with positive user feedback. Our experience suggests that E2E verifiable voting through the internet and using mobile phones is feasible for daily routine activities such as classroom voting

    Exploring NIST LWC/PQC Synergy with R5Sneik: How SNEIK 1.1 Algorithms were Designed to Support Round5

    Get PDF
    Most NIST Post-Quantum Cryptography (PQC) candidate algorithms use symmetric primitives internally for various purposes such as ``seed expansion\u27\u27 and CPA to CCA transforms. Such auxiliary symmetric operations constituted only a fraction of total execution time of traditional RSA and ECC algorithms, but with faster lattice algorithms the impact of symmetric algorithm characteristics can be very significant. A choice to use a specific PQC algorithm implies that its internal symmetric components must also be implemented on all target platforms. This can be problematic for lightweight, embedded (IoT), and hardware implementations. It has been widely observed that current NIST-approved symmetric components (AES, GCM, SHA, SHAKE) form a major bottleneck on embedded and hardware implementation footprint and performance for many of the most efficient NIST PQC proposals. Meanwhile, a separate NIST effort is ongoing to standardize lightweight symmetric cryptography (LWC). Therefore it makes sense to explore which NIST LWC candidates are able to efficiently support internals of post-quantum asymmetric cryptography. We discuss R5Sneik, a variant of Round5 that internally uses SNEIK 1.1 permutation-based primitives instead of SHAKE and AES-GCM. The SNEIK family includes parameter selections specifically designed to support lattice cryptography. R5Sneik is up to 40\% faster than Round5 for some parameter sets on ARM Cortex M4, and has substantially smaller implementation footprint. We introduce the concept of a fast Entropy Distribution Function (EDF), a lightweight diffuser that we expect to have sufficient security properties for lattice seed expansion and many types of sampling, but not for plain encryption or hashing. The same SNEIK 1.1 permutation core (but with a different number of rounds) can also be used to replace AES-GCM as an AEAD when building lightweight cryptographic protocols, halving typical flash footprint on Cortex M4, while boosting performance

    Too big to handle, too important to abandon: Reforming Sudan's Gezira scheme

    Get PDF
    © 2020 The Authors Participatory irrigation management (PIM) has been broadly promoted by public administrators and donor organizations. The reasons for this push include performance failures of state-controlled irrigation schemes and the need to improve irrigation productivity for meeting rising food demands. A popular reform for increasing participation and ownership is represented by Irrigation Management Transfers (IMTs). IMTs mean replacing the government with the civil society (farmers) in irrigation management, and they go beyond working with the public sector as in PIM. These widely implemented reforms produced mixed experiences. Besides, the evaluation of IMT cases is reliant on scarce quantitative data. IMTs are also difficult to replicate due to methodological issues. However, qualitative research can engage with stakeholders’ perceptions and narratives, especially the most relevant target group, namely farmers. We provide in this study stakeholders’ opinions and attitudes towards several waves of IMT reforms in the Gezira scheme in Sudan. This mega-scheme is of high developmental and socio-cultural importance for the country ever since the independence from the British Empire. Using a perception survey and in-depth interviews with key informants, we illustrate the failure legacies to reform the Gezira scheme by enhancing farmers’ participation through Water User Associations (WUAs). While both farmers and experts have suggested a poor implementation, inadequate farmers’ involvement and unclear objectives of the reforms, the reforms’ recurrent failures are explained within complex historic and political contexts. There are long-standing legacies of development missteps of the Gezira scheme, with no clear and ultimate triggers of performance deterioration. Besides, splits in professional cultures, power imbalances, political instrumentalization (of farmers) and the lack of farmers’ awareness or capacities are salient factors for understanding the poor state of the Gezira scheme. It is difficult for stand-alone irrigation management reforms to be successful. Such reforms need to be embedded within a comprehensive policy package that prioritizes irrigation governance and proposes sound regulations based on clear roles, consensus-making and prior consultation
    • …
    corecore