28 research outputs found

    Making Code Voting Secure against Insider Threats using Unconditionally Secure MIX Schemes and Human PSMT Protocols

    Full text link
    Code voting was introduced by Chaum as a solution for using a possibly infected-by-malware device to cast a vote in an electronic voting application. Chaum's work on code voting assumed voting codes are physically delivered to voters using the mail system, implicitly requiring to trust the mail system. This is not necessarily a valid assumption to make - especially if the mail system cannot be trusted. When conspiring with the recipient of the cast ballots, privacy is broken. It is clear to the public that when it comes to privacy, computers and "secure" communication over the Internet cannot fully be trusted. This emphasizes the importance of using: (1) Unconditional security for secure network communication. (2) Reduce reliance on untrusted computers. In this paper we explore how to remove the mail system trust assumption in code voting. We use PSMT protocols (SCN 2012) where with the help of visual aids, humans can carry out mod  10\mod 10 addition correctly with a 99\% degree of accuracy. We introduce an unconditionally secure MIX based on the combinatorics of set systems. Given that end users of our proposed voting scheme construction are humans we \emph{cannot use} classical Secure Multi Party Computation protocols. Our solutions are for both single and multi-seat elections achieving: \begin{enumerate}[i)] \item An anonymous and perfectly secure communication network secure against a tt-bounded passive adversary used to deliver voting, \item The end step of the protocol can be handled by a human to evade the threat of malware. \end{enumerate} We do not focus on active adversaries

    A Survey on Mix Networks and Their Secure Applications

    No full text

    Remote Internet voting: developing a secure and efficient frontend

    No full text

    Cyber-physical systems engineering: an introduction

    No full text
    International audienceCyber-Physical Systems (CPSs) [1] connect the real world to software systems through a network of sensors and actuators in which physical and logical components interact in complex ways. There is a diverse range of application domains [2], including health [3], energy [4], transport [5], autonomous vehicles [6] and robotics [7]; and many of these include safety critical requirements [8]. Such systems are, by defi- nition, characterised by both discrete and continuous components. The development and verification processes must, therefore, incorporate and integrate discrete and continuous models. The development of techniques and tools to handle the correct design of CPSs has drawn the attention of many researchers. Continuous mod- elling approaches are usually based on a formal mathematical expression of the problem using dense reals and differential equations to model the behaviour of the studied hybrid system. Then, models are simulated in order to check required properties. Discrete modelling approaches rely on formal methods, based on abstraction, model-checking and theorem prov- ing. There is much ongoing research concerned with how best to combine these approaches in a more coherent and pragmatic fashion, in order to support more rigorous and automated hybrid-design verification. It is also possible to combine different discrete-event and continuous- time models using a technique called co-simulation. This has been sup- ported by different tools and the underlying foundation for this has been analysed. Thus, the track will also look into these areas as well as the industrial usage of this kind of technolog

    CAPS

    No full text

    Secure wireless collection and distribution of commercial airplane health data

    No full text

    Anonymous Card Shuffling and Its Applications to Parallel Mixnets

    No full text

    Emerging Trends in Avionics Networking

    No full text
    The history of flight started with the pioneer era. The introduction of mechanical controls (including hydraulics) then led to the second era. Later, with the utilization of computers and automation in aircraft, we reached the third era. Now, we are moving towards the fourth era of flight, namely Flight 4.0, which is characterized by “smart” and “connected” aircraft that extensively exploit emerging information and communication technologies. Aeronautical informatics is advancing rapidly through the synergy between information and communication technologies and aeronautics. Multi-core avionic platforms, wireless avionics networking, service-oriented architectures and IoT, data sciences and semantic infrastructures are shaping systems to come. Increasing autonomy requirements are challenging the community to investigate new ways to assure safety. Modern software engineering methodologies and real-time software techniques are altering the established development practice. Universities are starting to align their aerospace engineering and computer science curriculums in order to address this synergy. This book is a unique compilation of advancements in aeronautical informatics, introducing the changing technology landscape of flight with respect to information and communication technology push
    corecore