Skip to main content

Showing 1–5 of 5 results for author: Benaloh, J

Searching in archive cs. Search in all archives.
.
  1. Bugs in our Pockets: The Risks of Client-Side Scanning

    Authors: Hal Abelson, Ross Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Jon Callas, Whitfield Diffie, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Vanessa Teague, Carmela Troncoso

    Abstract: Our increasing reliance on digital technology for personal, economic, and government affairs has made it essential to secure the communications and devices of private citizens, businesses, and governments. This has led to pervasive use of cryptography across society. Despite its evident advantages, law enforcement and national security agencies have argued that the spread of cryptography has hinde… ▽ More

    Submitted 14 October, 2021; originally announced October 2021.

    Comments: 46 pages, 3 figures

    Journal ref: Journal of Cybersecurity, 10(1), 2024

  2. arXiv:1707.08619  [pdf, other

    cs.CR

    Public Evidence from Secret Ballots

    Authors: Matthew Bernhard, Josh Benaloh, J. Alex Halderman, Ronald L. Rivest, Peter Y. A. Ryan, Philip B. Stark, Vanessa Teague, Poorvi L. Vora, Dan S. Wallach

    Abstract: Elections seem simple---aren't they just counting? But they have a unique, challenging combination of security and privacy requirements. The stakes are high; the context is adversarial; the electorate needs to be convinced that the results are correct; and the secrecy of the ballot must be ensured. And they have practical constraints: time is of the essence, and voting systems need to be affordabl… ▽ More

    Submitted 4 August, 2017; v1 submitted 26 July, 2017; originally announced July 2017.

    Comments: To appear in E-Vote-Id '17

  3. arXiv:1504.03778  [pdf

    cs.CR

    End-to-end verifiability

    Authors: Josh Benaloh, Ronald Rivest, Peter Y. A. Ryan, Philip Stark, Vanessa Teague, Poorvi Vora

    Abstract: This pamphlet describes end-to-end election verifiability (E2E-V) for a nontechnical audience: election officials, public policymakers, and anyone else interested in secure, transparent, evidence-based electronic elections. This work is part of the Overseas Vote Foundation's End-to-End Verifiable Internet Voting: Specification and Feasibility Assessment Study (E2E VIV Project), funded by the Dem… ▽ More

    Submitted 14 April, 2015; originally announced April 2015.

  4. arXiv:1211.1904  [pdf, other

    cs.CR

    STAR-Vote: A Secure, Transparent, Auditable, and Reliable Voting System

    Authors: Josh Benaloh, Mike Byrne, Philip Kortum, Neal McBurnett, Olivier Pereira, Philip B. Stark, Dan S. Wallach

    Abstract: In her 2011 EVT/WOTE keynote, Travis County, Texas County Clerk Dana DeBeauvoir described the qualities she wanted in her ideal election system to replace their existing DREs. In response, in April of 2012, the authors, working with DeBeauvoir and her staff, jointly architected STAR-Vote, a voting system with a DRE-style human interface and a "belt and suspenders" approach to verifiability. It pro… ▽ More

    Submitted 8 November, 2012; originally announced November 2012.

  5. arXiv:1105.5803  [pdf, ps, other

    stat.AP cs.CR cs.CY

    SOBA: Secrecy-preserving Observable Ballot-level Audit

    Authors: Josh Benaloh, Douglas Jones, Eric Lazarus, Mark Lindeman, Philip B. Stark

    Abstract: SOBA is an approach to election verification that provides observers with justifiably high confidence that the reported results of an election are consistent with an audit trail ("ballots"), which can be paper or electronic. SOBA combines three ideas: (1) publishing cast vote records (CVRs) separately for each contest, so that anyone can verify that each reported contest outcome is correct, if the… ▽ More

    Submitted 2 July, 2011; v1 submitted 29 May, 2011; originally announced May 2011.