SlideShare uses cookies to improve functionality and performance, and to provide you with relevant advertising. If you continue browsing the site, you agree to the use of cookies on this website. See our User Agreement and Privacy Policy.
SlideShare uses cookies to improve functionality and performance, and to provide you with relevant advertising. If you continue browsing the site, you agree to the use of cookies on this website. See our Privacy Policy and User Agreement for details.
Successfully reported this slideshow.
Activate your 14 day free trial to unlock unlimited reading.
A short and sweet version of my voting talk for the Harvard College Fund meeting. The talk started with Stuart Shieber and ended with Greg Morrisett. I haven't included their slides here, as I'm not sure what license they'd like to use.
A short and sweet version of my voting talk for the Harvard College Fund meeting. The talk started with Stuart Shieber and ended with Greg Morrisett. I haven't included their slides here, as I'm not sure what license they'd like to use.
1.
Voters, Computers, and Trust:
Designing Verifiable Elections
Stuart M. Shieber
Ben Adida
Greg Morrisett
Center for Research on Computation and Society
October 18, 2008
School of Engineering and Applied Sciences
Harvard University
49.
Public-Key Encryption
public key
enc(cc number)
Customer
22
50.
Public Ballots
Bulletin Board
Bob:
McCain
Carol:
Obama
23
51.
Public Ballots
Bulletin Board
Bob:
McCain
Carol:
Obama
Alice
23
52.
Public Ballots
Bulletin Board
Alice: Bob:
Obama McCain
Carol:
Obama
Alice
23
53.
Public Ballots
Bulletin Board
Alice: Bob:
Obama McCain
Carol:
Obama
Tally
Obama....2
McCain....1
Alice
23
54.
Encrypted Public Ballots
Bulletin Board
Alice: Bob:
Rice Clinton
Carol:
Rice
Tally
Obama....2
McCain....1
Alice
24
55.
Encrypted Public Ballots
Bulletin Board
Alice: Bob:
Rice Clinton
Carol:
Ali Rice
ce
ver Tally
ifies
he
rv Obama....2
ote
McCain....1
Alice
24
56.
Encrypted Public Ballots
Bulletin Board
Alice: Bob:
Rice Clinton
Carol:
lly
Ali ta
Rice
ce e
thTally
ver es
rifi
ifies
e ve
he n
ryo
rv ve Obama....2
E
ote
McCain....1
Alice
24
57.
How can we verify
operations on
encrypted data?
Mathematical Proofs.
25