Skip to main content

Showing 1–5 of 5 results for author: Gjosteen, K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2111.04210  [pdf, other

    cs.CR

    Towards Verifiable Remote Voting with Paper Assurance

    Authors: Eleanor McMurtry, Xavier Boyen, Chris Culnane, Kristian Gjøsteen, Thomas Haines, Vanessa Teague

    Abstract: We propose a protocol for verifiable remote voting with paper assurance. It is intended to augment existing postal voting procedures, allowing a ballot to be electronically constructed, printed on paper, then returned in the post. It allows each voter to verify that their vote has been correctly cast, recorded and tallied by the Electoral Commission. The system is not end-to-end verifiable, but do… ▽ More

    Submitted 9 November, 2021; v1 submitted 7 November, 2021; originally announced November 2021.

    Comments: Kristian Gjøsteen and Thomas Haines were supported by the Research Council of Norway and the Luxembourg National Research Fund (FNR), under the joint INTER project SURCVS (INTER/RCN//17/11747298/SURCVS/Ryan)

  2. arXiv:1901.02560  [pdf, ps, other

    cs.CR cs.CC cs.DS quant-ph

    Coercion-Resistant Voting in Linear Time via Fully Homomorphic Encryption: Towards a Quantum-Safe Scheme

    Authors: Peter B. Rønne, Arash Atashpendar, Kristian Gjøsteen, Peter Y. A. Ryan

    Abstract: We present an approach for performing the tallying work in the coercion-resistant JCJ voting protocol, introduced by Juels, Catalano, and Jakobsson, in linear time using fully homomorphic encryption (FHE). The suggested enhancement also paves the path towards making JCJ quantum-resistant, while leaving the underlying structure of JCJ intact. The exhaustive, comparison-based approach of JCJ using p… ▽ More

    Submitted 5 February, 2019; v1 submitted 8 January, 2019; originally announced January 2019.

    Comments: 9 pages; added acknowledgments, revised the first paragraph in the section on security remarks, revised a few sentences throughout; to appear in the proceedings of Financial Cryptography and Data Security 2019, published by Springer

  3. arXiv:1808.09237  [pdf, ps, other

    cs.CR

    Adversaries monitoring Tor traffic crossing their jurisdictional border and reconstructing Tor circuits

    Authors: Herman Galteland, Kristian Gjøsteen

    Abstract: We model and analyze passive adversaries that monitors Tor traffic crossing the border of a jurisdiction an adversary is controlling. We show that a single adversary is able to connect incoming and outgoing traffic of their border, tracking the traffic, and cooperating adversaries are able to reconstruct parts of the Tor network, revealing user-server relationships. In our analysis we created two… ▽ More

    Submitted 21 January, 2020; v1 submitted 28 August, 2018; originally announced August 2018.

  4. arXiv:1801.06736  [pdf, other

    cs.IT cs.CR cs.DM

    On the Construction of Quasi-Binary and Quasi-Orthogonal Matrices over Finite Fields

    Authors: Danilo Gligoroski, Kristian Gjosteen, Katina Kralevska

    Abstract: Orthogonal and quasi-orthogonal matrices have a long history of use in digital image processing, digital and wireless communications, cryptography and many other areas of computer science and coding theory. The practical benefits of using orthogonal matrices come from the fact that the computation of inverse matrices is avoided, by simply using the transpose of the orthogonal matrix. In this paper… ▽ More

    Submitted 20 January, 2018; originally announced January 2018.

  5. arXiv:cs/0611062  [pdf, ps, other

    cs.CR

    A framework for compositional verification of security protocols

    Authors: Suzana Andova, Cas Cremers, Kristian Gjosteen, Sjouke Mauw, Stig F. Mjolsnes, Sasa Radomirovic

    Abstract: Automatic security protocol analysis is currently feasible only for small protocols. Since larger protocols quite often are composed of many small protocols, compositional analysis is an attractive, but non-trivial approach. We have developed a framework for compositional analysis of a large class of security protocols. The framework is intended to facilitate automatic as well as manual verifi… ▽ More

    Submitted 1 May, 2007; v1 submitted 14 November, 2006; originally announced November 2006.