Hi David,

On Fri, Nov 25, 2011 at 8:48 PM, David Barrett <[email protected]> wrote:
> That's interesting!  Can you give a bit more information about it's use for
> secure voting?

Absolutely, thanks for asking. Cryptographic counters were introduced
by Jonathan Katz, Steven Myers, and Rafail Ostrovsky in a work where
they especially addressed their applications to electronic voting. So,
I suppose its relevance makes the paper a good candidate for a
reference:

  'Cryptographic Counters and Applications to Electronic Voting',
  Eurocrypt 2001, http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.29.52

Though cryptocounters may find application as subroutines in
electronic voting system (more below), the possibility to use them as
useful building blocks ultimately depends upon the requirements
engineering for electronic vote (e.g., is coercion resistance a
requirement?)

> (I think there is a typo in the blog post around the word "addend", or
> that's a word I don't recognize -- it's key to that sentence, which itself
> is the key sentence of that section -- so I'm left confused.)

Sorry for the confusion. Let me rephrase the section.

Lets consider a secure electronic voting where each participant holds
a binary vote, which is either 0 or 1. We want to compute the tally
without revealing the individual votes. A secure protocol to compute
the sum of integers can be of help here. Votes, actually their
randomized encryptions, are terms of the addition. The addition can be
computed privately using an additive homomorphic cryptographic scheme,
hence providing means to privately cast the participants' votes. To
compute the tally, the voting authority -- which may inlcude
participants themselves -- decrypt the cryptographic counter and
publish the final result.

> I'd love more information on the real world applications of this interesting
> concept.  Thanks!

Lately, I've been working with a company interested in applying
cryptocounters and building an application where privacy is taken care
of by design. I'll do my best to help them delivering their project.
Perhaps they will decide to write something about this in the future.

At the same time, there are few application of cryptocounters,
unrelated to electronic voting and my current engagements, suggested
by Adam Young and Moti Yung in their Malicious Cryptography (J. Wiley)
and the upcoming Advances in Cryptovirology
http://www.cryptovirology.com/

But I'm pretty confident we could devise more applications.

Thanks!

> -david
>
>
>
> -- Sent from my Palm Pre

Cheers,

-- alfonso     blogs at http://Plaintext.crypto.lo.gy   tweets @secYOUre
_______________________________________________
p2p-hackers mailing list
[email protected]
http://lists.zooko.com/mailman/listinfo/p2p-hackers

Reply via email to