[Haifux] Fwd: Tal Moran on Tuesday 16/02/2010
Orna Agmon Ben-Yehuda
ladypine at gmail.com
Mon Jan 25 09:51:09 MSK 2010
Recalling the vast amount of discussions regarding critical issues such as
choosing a logo for Haifux (http://haifux.org/logo.html), some of you may be
interested in this talk...
----- Forwarded message from CS Colloquium <colloq at CS.TECHNION.AC.IL> -----
Date: Mon, 25 Jan 2010 08:43:15 +0200
From: CS Colloquium <colloq at CS.TECHNION.AC.IL>
Reply-To: CS Colloquium <colloq at CS.TECHNION.AC.IL>
Subject: Tal Moran on Tuesday 16/02/2010
To: CS-COLOQ-L at LISTSERV.TECHNION.AC.IL
Time+Place : Tuesday 16/02/2010 14:30 room 337-8 Taub Bld.
Speaker : Tal Moran
Affiliation: CRCS, Harvard University
Host : Erez Petrank
Title : Cryptography by the People, for the People:
How Voting and Cryptography Go Hand-in-Hand
A democratic election is a classic example of a task in which multiple
adversarial parties must collaborate and agree on an outcome.
Traditional election systems (such as the one used in Israel) employ various
means to ensure that the result will be accurate even if some of the people
involved are corrupt or dishonest. However, the final tally is only as
trustworthy as the people who count the votes. Even in the most secure
systems these are usually fairly small committees. If an entire committee
colludes, they can manufacture their own results. Even worse, depending on
the exact setup, it may be feasible to stuff ballot boxes, destroy votes or
perform other manipulations.
Using cryptographic techniques, it is possible to design a fair voting
system whose correct operation can be verified by anyone, while still
retaining ballot secrecy.
This can be done even if the computers used to run the election are
In the talk, I will briefly survey the techniques used to accomplish this
and present in more detail examples with some unique properties, such as a
practical solution for securely tallying Single Transferable Vote elections
(a ranked voting system that is used in Australia, Ireland and Malta, among
others). The talk will contain any necessary cryptographic background.
Based on joint works with Moni Naor and with Josh Benaloh, Lee Naish, Kim
Ramchen and Vanessa Teague.
Visit our home page-
Mon Jan 25 08:43:15 IST 2010
----- End forwarded message -----
-------------- next part --------------
An HTML attachment was scrubbed...
More information about the Haifux