Showing 1–3 of 3 results for author: Nair, D G
-
Secret Sharing Homomorphism and Secure E-voting
Authors:
V P Binu,
Divya G Nair,
A Sreekumar
Abstract:
Secure E-voting is a challenging protocol. Several approaches based on homomorphic crypto systems, mix-nets blind signatures are proposed in the literature .But most of them need complicated homomorphic encryption which involves complicated encryption decryption process and key management which is not efficient. In this paper we propose a secure and efficient E-voting scheme based on secret sharin…
▽ More
Secure E-voting is a challenging protocol. Several approaches based on homomorphic crypto systems, mix-nets blind signatures are proposed in the literature .But most of them need complicated homomorphic encryption which involves complicated encryption decryption process and key management which is not efficient. In this paper we propose a secure and efficient E-voting scheme based on secret sharing homomorphism. Here E-voting is viewed as special case of multi party computation where several voters jointly compute the result without revealing his vote. Secret sharing schemes are good alternative for secure multi party computation and are computationally efficient and secure compared with the cryptographic techniques. It is the first proposal, which makes use of the additive homomorphic property of the Shamir secret sharing scheme and the encoding decoding of votes to obtain the individual votes obtained by each candidate apart from the election result. We have achieved integrity and privacy while keeping the efficiency of the system.
△ Less
Submitted 17 February, 2016;
originally announced February 2016.
-
An Effective Private Data storage and Retrieval System using Secret sharing scheme based on Secure Multi-party Computation
Authors:
Divya G. Nair,
V. P. Binu,
G. Santhosh Kumar
Abstract:
Privacy of the outsourced data is one of the major challenge.Insecurity of the network environment and untrustworthiness of the service providers are obstacles of making the database as a service.Collection and storage of personally identifiable information is a major privacy concern.On-line public databases and resources pose a significant risk to user privacy, since a malicious database owner ma…
▽ More
Privacy of the outsourced data is one of the major challenge.Insecurity of the network environment and untrustworthiness of the service providers are obstacles of making the database as a service.Collection and storage of personally identifiable information is a major privacy concern.On-line public databases and resources pose a significant risk to user privacy, since a malicious database owner may monitor user queries and infer useful information about the customer.The challenge in data privacy is to share data with third-party and at the same time securing the valuable information from unauthorized access and use by third party.A Private Information Retrieval(PIR) scheme allows a user to query database while hiding the identity of the data retrieved.The naive solution for confidentiality is to encrypt data before outsourcing.Query execution,key management and statistical inference are major challenges in this case.The proposed system suggests a mechanism for secure storage and retrieval of private data using the secret sharing technique.The idea is to develop a mechanism to store private information with a highly available storage provider which could be accessed from anywhere using queries while hiding the actual data values from the storage provider.The private information retrieval system is implemented using Secure Multi-party Computation(SMC) technique which is based on secret sharing. Multi-party Computation enable parties to compute some joint function over their private inputs.The query results are obtained by performing a secure computation on the shares owned by the different servers.
△ Less
Submitted 26 February, 2015;
originally announced February 2015.
-
An Improved E-voting scheme using Secret Sharing based Secure Multi-party Computation
Authors:
Divya G. Nair,
V. P. Binu,
G. Santhosh Kumar
Abstract:
E-voting systems (EVS)are having potential advantages over many existing voting schemes.Security, transparency, accuracy and reliability are the major concern in these systems.EVS continues to grow as the technology advances.It is inexpensive and efficient as the resources become reusable.Fast and accurate computation of results with voter privacy is the added advantage.In the proposed system we m…
▽ More
E-voting systems (EVS)are having potential advantages over many existing voting schemes.Security, transparency, accuracy and reliability are the major concern in these systems.EVS continues to grow as the technology advances.It is inexpensive and efficient as the resources become reusable.Fast and accurate computation of results with voter privacy is the added advantage.In the proposed system we make use of secret sharing technique and secure multi party computation(SMC) to achieve security and reliability.Secret sharing is an important technique used for SMC. Multi-party computation is typically accomplished using secret sharing by making shares of the input and manipulating the shares to compute a typical function of the input.The proposed system make use of bitwise representation of votes and only the shares are used for transmission and computation of result.Secure sum evaluation can be done with shares distributed using Shamir's secret sharing scheme.The scheme is hence secure and reliable and does not make any number theoretic assumptions for security.We also propose a unique method which calculates the candidates individual votes keeping the anonymity.
△ Less
Submitted 26 February, 2015;
originally announced February 2015.