Hi David, On Fri, Nov 25, 2011 at 8:48 PM, David Barrett <dbarrett@quinthar.com> wrote:
That's interesting! Can you give a bit more information about it's use for secure voting?
Absolutely, thanks for asking. Cryptographic counters were introduced by Jonathan Katz, Steven Myers, and Rafail Ostrovsky in a work where they especially addressed their applications to electronic voting. So, I suppose its relevance makes the paper a good candidate for a reference: 'Cryptographic Counters and Applications to Electronic Voting', Eurocrypt 2001, http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.29.52 Though cryptocounters may find application as subroutines in electronic voting system (more below), the possibility to use them as useful building blocks ultimately depends upon the requirements engineering for electronic vote (e.g., is coercion resistance a requirement?)
(I think there is a typo in the blog post around the word "addend", or that's a word I don't recognize -- it's key to that sentence, which itself is the key sentence of that section -- so I'm left confused.)
Sorry for the confusion. Let me rephrase the section. Lets consider a secure electronic voting where each participant holds a binary vote, which is either 0 or 1. We want to compute the tally without revealing the individual votes. A secure protocol to compute the sum of integers can be of help here. Votes, actually their randomized encryptions, are terms of the addition. The addition can be computed privately using an additive homomorphic cryptographic scheme, hence providing means to privately cast the participants' votes. To compute the tally, the voting authority -- which may inlcude participants themselves -- decrypt the cryptographic counter and publish the final result.
I'd love more information on the real world applications of this interesting concept. Thanks!
Lately, I've been working with a company interested in applying cryptocounters and building an application where privacy is taken care of by design. I'll do my best to help them delivering their project. Perhaps they will decide to write something about this in the future. At the same time, there are few application of cryptocounters, unrelated to electronic voting and my current engagements, suggested by Adam Young and Moti Yung in their Malicious Cryptography (J. Wiley) and the upcoming Advances in Cryptovirology http://www.cryptovirology.com/ But I'm pretty confident we could devise more applications. Thanks!
-david
-- Sent from my Palm Pre
Cheers, -- alfonso blogs at http://Plaintext.crypto.lo.gy tweets @secYOUre _______________________________________________ p2p-hackers mailing list p2p-hackers@lists.zooko.com http://lists.zooko.com/mailman/listinfo/p2p-hackers ----- End forwarded message ----- -- Eugen* Leitl <a href="http://leitl.org">leitl</a> http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE
participants (1)
-
Alfonso De Gregorio