Loading...
Search for: dousti--m-s
0.019 seconds

    An efficient and provably-secure coercion-resistant e-voting protocol

    , Article 2013 11th Annual Conference on Privacy, Security and Trust, PST 2013 ; 2013 , Pages 161-168 ; 9781467358392 (ISBN) Haghighat, A. T ; Dousti, M. S ; Jalili, R ; Sharif University of Technology
    2013
    Abstract
    We present an efficient and provably-secure e-voting protocol, which is a variant of the JCJ e-votingprotocol (Juels et al., 2010). It decreases the total number of JCJ's operations from O(n2) to O(n), where n is the number of votes or voters (whichever is the maximum). Note that since the operations under consideration are time-consuming (e.g., public-key encryption), the improvement is quite substantial. As a rough comparison, consider a nation-wide election with around ten million voters/votes. Assuming each operation takes one microsecond, and no parallelization is used, one can see a huge difference: our protocol tallies the votes in 10 seconds, while the JCJ protocol requires over 3... 

    Statistical disclosure: Improved, extended, and resisted

    , Article SECURWARE 2012 - 6th International Conference on Emerging Security Information, Systems and Technologies ; 2012 , Pages 119-125 ; 9781612082097 (ISBN) Emamdoost, N ; Dousti, M. S ; Jalili, R ; Sharif University of Technology
    2012
    Abstract
    Traffic analysis is a type of attack on secure communications systems, in which the adversary extracts useful patterns and information from the observed traffic. This paper improves and extends an efficient traffic analysis attack, called "statistical disclosure attack. " Moreover, we propose a solution to defend against the improved (and, a fortiori, the original) statistical disclosure attack. Our solution delays the attacker considerably, meaning that he should gather significantly more observations to be able to deduce meaningful information from the traffic  

    Minimal assumptions to achieve privacy in e-voting protocols

    , Article 2013 10th International ISC Conference on Information Security and Cryptology, ISCISC 2013 ; 29- 30 August , 2013 Haghighat, A. T ; Kargar, M. A ; Dousti, M. S ; Jalili, R ; Sharif University of Technology
    IEEE Computer Society  2013
    Abstract
    Chevallier-Mames et al, proved that in a specific condition (such as the lack of untappable channels and trusted-third parties), the universal verifiability and privacy-preserving properties of e-voting protocols are incompatible (WOTE'06 and TTE'10). In this paper, we first show a flaw in their proof. Then, we prove that even with more assumptions, such as the existence of TTPs and untappable channels between the authorities, an e-voting protocol is unable to preserve privacy, regardless of verifiability. Finally, we demonstrate that preserving privacy in e-voting protocols requires the provision of at least one of the following assumptions: limited computational power of adversary,...