TTP SmartCard-Based ElGamal Cryptosystem Using Threshold Scheme for Electronic Elections

@inproceedings{Ahull2011TTPSE,
  title={TTP SmartCard-Based ElGamal Cryptosystem Using Threshold Scheme for Electronic Elections},
  author={Jordi Pujol Ahull{\'o} and Roger Jard{\'i}-Ced{\'o} and Jordi Castell{\`a}-Roca and Oriol Farr{\`a}s},
  booktitle={FPS},
  year={2011}
}
The private key of electronic elections is a very critical piece of information that, with an incorrect or improper use, may disrupt the elections results. To enforce the privacy and security of the private key, secret sharing schemes (or threshold schemes) are used to generate a distributed key into several entities. In this fashion, a threshold of at least t out of the n entities will be necessary to decrypt votes. We study in this work the feasibility of developing ElGamal cryptosystem and… 

Towards Low-level Cryptographic Primitives for JavaCards

TLDR
A methodology to efficiently derive essential data types and low-level cryptographic primitives from high-level operations in JavaCards that is ideal for resource-constrained platforms, and make optimal use of the underlying hardware, while having a small memory footprint is introduced.

JCMathLib: Wrapper Cryptographic Library for Transparent and Certifiable JavaCard Applets

  • V. MavroudisP. Svenda
  • Computer Science
    2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)
  • 2020
TLDR
JCMathLib, an open library that provides an intermediate layer realizing essential data types and low-level cryptographic primitives from high-level operations in JavaCards that does not rely on a proprietary API, is introduced.

References

SHOWING 1-10 OF 13 REFERENCES

A public key cryptosystem and a signature scheme based on discrete logarithms

  • Taher El Gamal
  • Computer Science, Mathematics
    IEEE Trans. Inf. Theory
  • 1984
TLDR
A new signature scheme is proposed, together with an imple- mentation of the Diffie-Hellman key distribution scheme that achieves a public key cryptosystem that relies on the difficulty of computing discrete logarithms over finite fields.

Efficient implementation of anonymous credentials on Java Card smart cards

TLDR
This work presents the first implementation of the (simplified) Direct Anonymous Attestation protocols suitable for contemporary Java Card smart cards, and points out performance bottlenecks and provides efficient solutions which allow the implementation to terminate within acceptable time.

Untraceable electronic mail, return addresses, and digital pseudonyms

A technique based on public key cryptography is presented that allows an electronic mail system to hide who a participant communicates with as well as the content of the communication - in spite of

Advances in Cryptology — EUROCRYPT ’97

  • W. Fumy
  • Computer Science, Mathematics
    Lecture Notes in Computer Science
  • 2001
TLDR
Two new attacks on a reduced number of rounds of IDEA (International Data Encryption Algorithm) are given: a truncated differential attack on IDEA reduced to 3.5 rounds and a differential-linear attack that contains a novel method for detaining the secret key.

BiTR: Built-in Tamper Resilience

TLDR
This paper puts forward the notion of Built-in Tamper Resilience (BiTR) for cryptographic protocols, capturing the idea that the protocol that is encapsulated in a hardware token is designed in such a way so that tampering gives no advantage to an adversary.

Cryptographic smart cards

TLDR
The existing crypto-dedicated microprocessors are surveyed and some of their possible evolutions are described, which make the cost of a malevolent attack far greater than the benefits.

High security smartcards

TLDR
The goal of the session is to introduce this context and highlights the main challenges the smartcard designers/manufacturers have to face.

How to share a secret

  • A. Shamir
  • Computer Science, Mathematics
    CACM
  • 1979
TLDR
This technique enables the construction of robust key management schemes for cryptographic systems that can function securely and reliably even when misfortunes destroy half the pieces and security breaches expose all but one of the remaining pieces.

A public key cryptosystem and a signature scheme based on discrete logarithms

TLDR
The invention pertains to a novel method of forming a flexible, tapered end on a thermoplastic molding strip that is flexible and virtually free of residual stress which may cause a strip to delaminate when applied to a desired substratum.

A secure and optimally efficient multi-authority election scheme

In this paper we present a new multi-authority secret-ballot election scheme that guarantees privacy, universal verifiability, and robustness. It is the first scheme for which the performance is