Visualizing protocols is not only useful as a step towards understanding and ensuring security properties, but is also a beneficial tool to communicate notions of security to decision makers and technical people outside the field of cryptography. We present a simple card game that is a visualization for a secure protocol for private polling where it is simple to see that individual responses cannot be traced back to a respondent, and cheating is irrational. We use visualization tricks to illustrate a somewhat complex protocol, namely the Cryptographic Randomized Response Technique protocol of Lipmaa et al. While our tools --- commitments and cut-and-choose --- are well known, our construction for oblivious transfer using playing cards is...
Abstract. We critically survey game-based security definitions for the privacy of voting schemes. In...
Privacy-preserving data mining has been an active research area in recent years due to privacy conce...
Democracy depends on the proper administration of popular elections. Voters should receive assurance...
We propose simple, realistic protocols for polling that allow the responder to plausibly repudiate h...
Card-based protocols allow to evaluate an arbitrary fixed Boolean function on a hidden input to obt...
We develop cryptographically secure techniques to guarantee unconditional privacy for respondents t...
We show that any function F can be securely evaluated by a protocolwith ballots and a ballot box. Th...
While cryptographic tools offer practical security and privacy supported by theory and formal proof...
Investigating the capabilities of public key and related cryptographic techniques has recently becom...
While many cryptographic protocols for card games have been proposed, all of them focus on card game...
In this thesis we study several aspects of the security of remote electronic voting protocols.Such p...
InvestigatIng the capabilities of public key and related cryptographic techniques has recently becom...
Part 7: Privacy-Preserving Data Applications IIInternational audiencePrivacy-preserving data mining ...
The problem of analyzing the effect of privacy concerns on the behavior of selfish utility-maximizin...
Abstract. Cryptographic techniques have been used intensively in the past to show how to play multip...
Abstract. We critically survey game-based security definitions for the privacy of voting schemes. In...
Privacy-preserving data mining has been an active research area in recent years due to privacy conce...
Democracy depends on the proper administration of popular elections. Voters should receive assurance...
We propose simple, realistic protocols for polling that allow the responder to plausibly repudiate h...
Card-based protocols allow to evaluate an arbitrary fixed Boolean function on a hidden input to obt...
We develop cryptographically secure techniques to guarantee unconditional privacy for respondents t...
We show that any function F can be securely evaluated by a protocolwith ballots and a ballot box. Th...
While cryptographic tools offer practical security and privacy supported by theory and formal proof...
Investigating the capabilities of public key and related cryptographic techniques has recently becom...
While many cryptographic protocols for card games have been proposed, all of them focus on card game...
In this thesis we study several aspects of the security of remote electronic voting protocols.Such p...
InvestigatIng the capabilities of public key and related cryptographic techniques has recently becom...
Part 7: Privacy-Preserving Data Applications IIInternational audiencePrivacy-preserving data mining ...
The problem of analyzing the effect of privacy concerns on the behavior of selfish utility-maximizin...
Abstract. Cryptographic techniques have been used intensively in the past to show how to play multip...
Abstract. We critically survey game-based security definitions for the privacy of voting schemes. In...
Privacy-preserving data mining has been an active research area in recent years due to privacy conce...
Democracy depends on the proper administration of popular elections. Voters should receive assurance...