Skip to main content

Showing 1–20 of 20 results for author: Ryan, P Y A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2311.03372  [pdf, ps, other

    cs.SE

    A Declaration of Software Independence

    Authors: Wojciech Jamroga, Peter Y. A. Ryan, Steve Schneider, Carsten Schurmann, Philip B. Stark

    Abstract: A voting system should not merely report the outcome: it should also provide sufficient evidence to convince reasonable observers that the reported outcome is correct. Many deployed systems, notably paperless DRE machines still in use in US elections, fail certainly the second, and quite possibly the first of these requirements. Rivest and Wack proposed the principle of software independence (SI)… ▽ More

    Submitted 26 October, 2023; originally announced November 2023.

  2. arXiv:2210.10694  [pdf, other

    cs.MA

    Verification of the Socio-Technical Aspects of Voting: The Case of the Polish Postal Vote 2020

    Authors: Wojciech Jamroga, Peter Y. A. Ryan, Yan Kim

    Abstract: Voting procedures are designed and implemented by people, for people, and with significant human involvement. Thus, one should take into account the human factors in order to comprehensively analyze properties of an election and detect threats. In particular, it is essential to assess how actions and strategies of the involved agents (voters, municipal office employees, mail clerks) can influence… ▽ More

    Submitted 18 October, 2023; v1 submitted 19 October, 2022; originally announced October 2022.

  3. arXiv:2107.06090  [pdf, ps, other

    cs.CR

    PakeMail: authentication and key management in decentralized secure email and messaging via PAKE

    Authors: Itzel Vazquez Sandoval, Arash Atashpendar, Gabriele Lenzini, Peter Y. A. Ryan

    Abstract: We propose the use of PAKE for achieving and enhancing entity authentication (EA) and key management (KM) in the context of decentralized end-to-end encrypted email and secure messaging, i.e., where neither a public key infrastructure nor trusted third parties are used. This approach not only simplifies the EA process by requiring users to share only a low-entropy secret, e.g., a memorable word, b… ▽ More

    Submitted 13 July, 2021; originally announced July 2021.

    Comments: arXiv admin note: substantial text overlap with arXiv:2005.10787

  4. arXiv:2105.14901  [pdf, other

    cs.HC

    User Experience Design for E-Voting: How mental models align with security mechanisms

    Authors: Marie-Laure Zollinger, Verena Distler, Peter B. Roenne, Peter Y. A. Ryan, Carine Lallemand, Vincent Koenig

    Abstract: This paper presents a mobile application for vote-casting and vote-verification based on the Selene e-voting protocol and explains how it was developed and implemented using the User Experience Design process. The resulting interface was tested with 38 participants, and user experience data was collected via questionnaires and semi-structured interviews on user experience and perceived security. R… ▽ More

    Submitted 15 June, 2021; v1 submitted 31 May, 2021; originally announced May 2021.

    Comments: E-Vote-ID 2019 TalTech Proceedings

    Journal ref: Fourth International Joint Conference on Electronic Voting E-Vote-ID 2019, p187--202

  5. arXiv:2105.14783  [pdf, other

    cs.CR

    Electryo, In-person Voting with Transparent Voter Verifiability and Eligibility Verifiability

    Authors: Peter B. Roenne, Peter Y. A Ryan, Marie-Laure Zollinger

    Abstract: Selene is an e-voting protocol that allows voters to directly check their individual vote, in cleartext, in the final tally via a tracker system, while providing good coercion mitigation. This is in contrast to conventional, end-to-end verifiable schemes in which the voter verifies the presence of an encryption of her vote on the bulletin board. The Selene mechanism can be applied to many e-voting… ▽ More

    Submitted 31 May, 2021; originally announced May 2021.

    Comments: E-Vote-ID 2018 TUT Proceedings

  6. arXiv:2102.01995  [pdf, ps, other

    cs.MA

    Convergence Voting: From Pairwise Comparisons to Consensus

    Authors: Gergei Bana, Wojciech Jamroga, David Naccache, Peter Y. A. Ryan

    Abstract: An important aspect of AI design and ethics is to create systems that reflect aggregate preferences of the society. To this end, the techniques of social choice theory are often utilized. We propose a new social choice function motivated by the PageRank algorithm. The function ranks voting options based on the Condorcet graph of pairwise comparisons. To this end, we transform the Condorcet graph i… ▽ More

    Submitted 1 March, 2021; v1 submitted 3 February, 2021; originally announced February 2021.

  7. arXiv:2011.07887  [pdf, ps, other

    cs.CY cs.MA

    A Survey of Requirements for COVID-19 Mitigation Strategies. Part I: Newspaper Clips

    Authors: Wojciech Jamroga, David Mestel, Peter B. Roenne, Peter Y. A. Ryan, Marjan Skrobot

    Abstract: The COVID-19 pandemic has influenced virtually all aspects of our lives. Across the world, countries have applied various mitigation strategies for the epidemic, based on social, political, and technological instruments. We postulate that one should {identify the relevant requirements} before committing to a particular mitigation strategy. One way to achieve it is through an overview of what is co… ▽ More

    Submitted 18 October, 2023; v1 submitted 16 November, 2020; originally announced November 2020.

  8. arXiv:2007.12412  [pdf, other

    cs.CR cs.AI cs.LO cs.MA

    Model Checkers Are Cool: How to Model Check Voting Protocols in Uppaal

    Authors: Wojciech Jamroga, Yan Kim, Damian Kurpiewski, Peter Y. A. Ryan

    Abstract: The design and implementation of an e-voting system is a challenging task. Formal analysis can be of great help here. In particular, it can lead to a better understanding of how the voting system works, and what requirements on the system are relevant. In this paper, we propose that the state-of-art model checker Uppaal provides a good environment for modelling and preliminary verification of voti… ▽ More

    Submitted 18 October, 2023; v1 submitted 24 July, 2020; originally announced July 2020.

  9. arXiv:2007.09085  [pdf, other

    cs.CR q-bio.QM

    Preservation of DNA Privacy During the Large Scale Detection of COVID-19

    Authors: Marcel Hollenstein, David Naccache, Peter B. Rønne, Peter Y A Ryan, Robert Weil, Ofer Yifrach-Stav

    Abstract: As humanity struggles to contain the global COVID-19 pandemic, privacy concerns are emerging regarding confinement, tracing and testing. The scientific debate concerning privacy of the COVID-19 tracing efforts has been intense, especially focusing on the choice between centralised and decentralised tracing apps. The privacy concerns regarding COVID-19 testing, however, have not received as much at… ▽ More

    Submitted 1 August, 2020; v1 submitted 17 July, 2020; originally announced July 2020.

    Comments: 10 pages, 1 figure

  10. arXiv:1908.04947  [pdf, ps, other

    cs.CR cs.CY stat.AP

    Risk-Limiting Tallies

    Authors: Wojciech Jamroga, Peter B. Roenne, Peter Y. A. Ryan, Philip B. Stark

    Abstract: Many voter-verifiable, coercion-resistant schemes have been proposed, but even the most carefully designed systems necessarily leak information via the announced result. In corner cases, this may be problematic. For example, if all the votes go to one candidate then all vote privacy evaporates. The mere possibility of candidates getting no or few votes could have implications for security in pract… ▽ More

    Submitted 14 August, 2019; originally announced August 2019.

  11. arXiv:1901.02560  [pdf, ps, other

    cs.CR cs.CC cs.DS quant-ph

    Coercion-Resistant Voting in Linear Time via Fully Homomorphic Encryption: Towards a Quantum-Safe Scheme

    Authors: Peter B. Rønne, Arash Atashpendar, Kristian Gjøsteen, Peter Y. A. Ryan

    Abstract: We present an approach for performing the tallying work in the coercion-resistant JCJ voting protocol, introduced by Juels, Catalano, and Jakobsson, in linear time using fully homomorphic encryption (FHE). The suggested enhancement also paves the path towards making JCJ quantum-resistant, while leaving the underlying structure of JCJ intact. The exhaustive, comparison-based approach of JCJ using p… ▽ More

    Submitted 5 February, 2019; v1 submitted 8 January, 2019; originally announced January 2019.

    Comments: 9 pages; added acknowledgments, revised the first paragraph in the section on security remarks, revised a few sentences throughout; to appear in the proceedings of Financial Cryptography and Data Security 2019, published by Springer

  12. arXiv:1812.02245  [pdf, ps, other

    quant-ph cs.CR cs.IT

    Revisiting Deniability in Quantum Key Exchange via Covert Communication and Entanglement Distillation

    Authors: Arash Atashpendar, G. Vamsi Policharla, Peter B. Rønne, Peter Y. A. Ryan

    Abstract: We revisit the notion of deniability in quantum key exchange (QKE), a topic that remains largely unexplored. In the only work on this subject by Donald Beaver, it is argued that QKE is not necessarily deniable due to an eavesdrop** attack that limits key equivocation. We provide more insight into the nature of this attack and how it extends to other constructions such as QKE obtained from unclon… ▽ More

    Submitted 5 December, 2018; originally announced December 2018.

    Comments: 16 pages, published in the proceedings of NordSec 2018

    Journal ref: NordSec 2018. Lecture Notes in Computer Science, vol. 11252, pp 104-120, Springer, Cham (2018)

  13. arXiv:1807.11609  [pdf, other

    cs.IT cs.DM

    A Proof of Entropy Minimization for Outputs in Deletion Channels via Hidden Word Statistics

    Authors: Arash Atashpendar, David Mestel, A. W. Roscoe, Peter Y. A. Ryan

    Abstract: From the output produced by a memoryless deletion channel from a uniformly random input of known length $n$, one obtains a posterior distribution on the channel input. The difference between the Shannon entropy of this distribution and that of the uniform prior measures the amount of information about the channel input which is conveyed by the output of length $m$, and it is natural to ask for whi… ▽ More

    Submitted 30 July, 2018; originally announced July 2018.

    Comments: 11 pages, 2 figures

  14. arXiv:1802.02432  [pdf, other

    cs.CR

    CryptoRec: Privacy-preserving Recommendation as a Service

    Authors: Jun Wang, Afonso Arriaga, Qiang Tang, Peter Y. A. Ryan

    Abstract: Recommender systems rely on large datasets of historical data and entail serious privacy risks. A server offering Recommendation as a Service to a client might leak more information than necessary regarding its recommendation model and dataset. At the same time, the disclosure of the client's preferences to the server is also a matter of concern. Devising privacy-preserving protocols using general… ▽ More

    Submitted 13 May, 2018; v1 submitted 7 February, 2018; originally announced February 2018.

    Comments: Major Revision: 1. Introduce a new one-iteration re-training process for the sake of efficiency; 2. Change security level settings; 3, change the paper title, from "CryptoRec: Secure Recommendations as a Service" to "CryptoRec: Privacy-preserving Recommendation as a Service"

  15. arXiv:1802.00703  [pdf, other

    cs.IT cs.DM

    From Clustering Supersequences to Entropy Minimizing Subsequences for Single and Double Deletions

    Authors: Arash Atashpendar, Marc Beunardeau, Aisling Connolly, Rémi Géraud, David Mestel, A. W. Roscoe, Peter Y. A. Ryan

    Abstract: A binary string transmitted via a memoryless i.i.d. deletion channel is received as a subsequence of the original input. From this, one obtains a posterior distribution on the channel input, corresponding to a set of candidate supersequences weighted by the number of times the received subsequence can be embedded in them. In a previous work it is conjectured on the basis of experimental data that… ▽ More

    Submitted 4 March, 2019; v1 submitted 2 February, 2018; originally announced February 2018.

    Comments: 25 pages, 2 figures, submitted to IEEE Transactions on Information Theory; added references, minor writing improvements, fixed a minor flaw in section 5, improved notation, added proof of entropy minimization for the Rényi entropy for the case of single deletions, improved the presentation of the proofs in the appendix, added more details to the framework section, results unchanged

  16. arXiv:1707.08619  [pdf, other

    cs.CR

    Public Evidence from Secret Ballots

    Authors: Matthew Bernhard, Josh Benaloh, J. Alex Halderman, Ronald L. Rivest, Peter Y. A. Ryan, Philip B. Stark, Vanessa Teague, Poorvi L. Vora, Dan S. Wallach

    Abstract: Elections seem simple---aren't they just counting? But they have a unique, challenging combination of security and privacy requirements. The stakes are high; the context is adversarial; the electorate needs to be convinced that the results are correct; and the secrecy of the ballot must be ensured. And they have practical constraints: time is of the essence, and voting systems need to be affordabl… ▽ More

    Submitted 4 August, 2017; v1 submitted 26 July, 2017; originally announced July 2017.

    Comments: To appear in E-Vote-Id '17

  17. arXiv:1610.06343  [pdf, ps, other

    cs.CR

    (Universal) Unconditional Verifiability in E-Voting without Trusted Parties

    Authors: Gina Gallegos-Garcia, Vincenzo Iovino, Alfredo Rial, Peter B. Roenne, Peter Y. A. Ryan

    Abstract: In traditional e-voting protocols, privacy is often provided by a trusted authority that learns the votes and computes the tally. Some protocols replace the trusted authority by a set of authorities, and privacy is guaranteed if less than a threshold number of authorities are corrupt. For verifiability, stronger security guarantees are demanded. Typically, corrupt authorities that try to fake the… ▽ More

    Submitted 20 October, 2016; originally announced October 2016.

  18. arXiv:1504.03778  [pdf

    cs.CR

    End-to-end verifiability

    Authors: Josh Benaloh, Ronald Rivest, Peter Y. A. Ryan, Philip Stark, Vanessa Teague, Poorvi Vora

    Abstract: This pamphlet describes end-to-end election verifiability (E2E-V) for a nontechnical audience: election officials, public policymakers, and anyone else interested in secure, transparent, evidence-based electronic elections. This work is part of the Overseas Vote Foundation's End-to-End Verifiable Internet Voting: Specification and Feasibility Assessment Study (E2E VIV Project), funded by the Dem… ▽ More

    Submitted 14 April, 2015; originally announced April 2015.

  19. arXiv:1404.6822  [pdf, other

    cs.CR

    vVote: a Verifiable Voting System

    Authors: Chris Culnane, Peter Y. A. Ryan, Steve Schneider, Vanessa Teague

    Abstract: The Pret a Voter cryptographic voting system was designed to be flexible and to offer voters a familiar and easy voting experience. In this paper we present a case study of our efforts to adapt Pret a Voter to the idiosyncrasies of elections in the Australian state of Victoria. This technical report includes general background, user experience and details of the cryptographic protocols and human p… ▽ More

    Submitted 20 September, 2015; v1 submitted 27 April, 2014; originally announced April 2014.

    Comments: Previously titled "Draft Technical Report for VEC vVote System"

  20. arXiv:1001.5050  [pdf, ps, other

    cs.SE cs.CR cs.CY

    Formal Modelling of a Usable Identity Management Solution for Virtual Organisations

    Authors: Ali N. Haidar, P. V. Coveney, Ali E. Abdallah, P. Y. A Ryan, B. Beckles, J. M. Brooke, M . A. S. Jones

    Abstract: This paper attempts to accurately model security requirements for computational grid environments with particular focus on authentication. We introduce the Audited Credential Delegation (ACD) architecture as a solution to some of the virtual organisations identity management usability problems. The approach uses two complementary models: one is state based, described in Z notation, and the other… ▽ More

    Submitted 27 January, 2010; originally announced January 2010.

    Journal ref: EPTCS 16, 2010, pp. 41-50