Skip to main content

2018-05-07: The Verificatum Project 10-year Anniversary

Douglas Wikström, Associate Professor from the Department of Theoretical Computer Science, will give a seminar at 13:15 on the 7th of May in room 4523, Lindstedtsvägen 5. The title is "The Verificatum Project 10-year Anniversary". Welcome!

Abstract

A mix-net is a way for a group of servers to decrypt a set of ciphertexts in such a way that it is infeasible to find any correspondencebetween the individual inputs and output plaintexts. This idea originates in theseminal work of Chaum 1982 and the main application is electronicelections and related notions.

The Verificatum Mix-Net (VMN) was the first fully distributed implementation of a provably secure mix-net. The first version was completed 2008. Today it is licensed under AGPL.

Some key cryptographic protocols were developed at KTH, but the main contribution is what can be learned from the project as a whole and its application in real electronic voting systems. VMN is completely faithful to cryptographic theory, yet adopts best practices from real-world software engineering.

This was one of the first research projects with this focus (2007) and paved the way to what today is often referred to as real-world crypto. It is the only implementation of a mix-net from the research community that has been considered fit for use by national election authorities.

We first give an overview of a class of electronic voting systems and explain the role of mix-nets in the greater whole. Then we describe the state of the project today. We also give a historical account with afocus on mistakes and what we can learn from them.

Then we take a pause. The historical account leads us in anatural way into difficult tradeoffs and the uncharted territory wheretheory and practice are supposed to meet. This may be a Q&A session or a more mutual discussion depending on what the audience prefers.

Belongs to: School of Electrical Engineering and Computer Science
Last changed: Oct 23, 2019
Title
2021-12-08: Testing Software and Hardware against Speculation Contracts
2021-12 03: Practical Data Access Minimization in Trigger-Action Platforms
2021-11-16: Securing software in the presence of realistic attackers and polices
2021-11-9: An In-depth Study of Java Deserialization Exploits and Vulnerabilities
2019-02-05 Faceted Secure Multi-Execution
2019-01-11 Privacy-preserving ridesharing and multi key-homomorphic signatures
2018-11-06 Authentication and Pairing Using Human Body Impedance
2018-10-26 Security and Privacy in the IoT: An Information-Theoretic Perspective
2018-09-17 Cyber-Defence Panel
2018-09-13: Reconfigurable Distributed MIMO for Physical-layer Security in Mobile Networks
2018-09-03: A Constraint Programming approach to deliver a Tolerant Algebraic Side-Channel Attack of AES
2018-06-18: Coarse-grained information-flow control as a library in Haskell
2018-06-07: The capacity of private information retrieval with eavesdroppers
2018-05-23: Information-Flow Control for Concurrent Programs with Declassification
2018-05-09: Browser fingerprinting: past, present and possible future
2018-05-07: The Verificatum Project 10-year Anniversary