Exploring FAEST: Post-Quantum Signatures and Zero-Knowledge Proofs
Delve into the world of FAEST, a post-quantum signature scheme, with a focus on publicly verifiable zero-knowledge proofs. The presentation covers VOLE-in-the-Head, families of ZK proofs, and the application of VOLE in creating VOLE-ZK proofs. Learn about the background of VOLE, its use in the desig
1 views • 26 slides
Public Interest Disclosure & Protection of Informers Resolution - Guidelines for PIDPI Complaints
Guidelines for lodging complaints under the PIDPI resolution to report allegations of corruption or misuse of office by employees in various sectors. Complaints must be specific, verifiable, and sent via post with vigilance angle, ensuring confidentiality of the complainant's identity.
0 views • 10 slides
Understanding Post-Election Risk-Limiting Audits in Indiana
Indiana's post-election audits, overseen by the Voting System Technical Oversight Program, utilize statistical methods to verify election outcomes, ensuring accuracy and reliability in the electoral process. The VSTOP team, led by experts in various fields, conducts audits based on Indiana Code IC 3
0 views • 12 slides
OpenID Connect Working Group Update & Progress Report
The OpenID Connect Working Group is actively developing specifications and initiatives to enhance login and identity assurance protocols. From creating the OpenID Connect protocol to incubating OpenID for Verifiable Credentials, the group is laying the foundation for secure authentication and trust
1 views • 8 slides
ERCOT Updates and Revision Requests Overview
In this report, updates and highlights from recent ERCOT meetings and workshops are presented. It covers topics such as settlement stability reports, unregistered DG reports, upcoming WMS meetings, and revision requests tabled for review. The content delves into deep dive reviews of ECRS deployment,
1 views • 9 slides
Guide to EVM and VVPAT Components, Connections, and Preparation for Poll
This comprehensive guide covers the components of Electronic Voting Machines (EVM) and Voter Verifiable Paper Audit Trail (VVPAT) systems, including protocols for setting up, connection processes for mock and actual polls, and instructions for masking/unmasking ballot buttons on the Balloting Unit (
0 views • 13 slides
EVM-VVPAT Administrative Procedures for Election Management
This document outlines the standard operating procedures (SoP) for Electronic Voting Machines (EVMs) and Voter Verifiable Paper Audit Trail (VVPAT) systems used in elections. It covers the components of EVMs, the process of voting, the roles of polling officers, and various sub-topics such as storag
1 views • 58 slides
CNF-FSS and Its Applications: PKC 2022 March 08
Explore the Background, Applications, and Summary of CNF-FSS, focusing on Function Secret Sharing, Distributed Point Function, CNF Key-Sharing, and more. Learn about the efficiency of multiparty sharing and 1-out-of-3 CNF-FSS constructions for certain classes of functions. Discover how CNF Key-Shari
1 views • 33 slides
Understanding Continuing Professional Development (CPD) for Professional Growth
Continuing Professional Development (CPD) is crucial for maintaining and enhancing professional competence. Verifiable CPD involves activities with tangible evidence, while unverifiable CPD lacks such evidence. Documentation is key to supporting CPD activities, and examples of verifiable and unverif
0 views • 7 slides
Practical Statistically-Sound Proofs of Exponentiation in Any Group
The paper presents practical and statistically sound proofs of exponentiation in any group. It discusses the computation process, applications in verifiable delay functions and time-efficient arguments for NP, as well as interactive protocols and the overview of PoEs. The research contributes a stat
0 views • 18 slides
The Logical Structure of Classical and Quantum Mechanics
The paper explores the common logical structure shared between classical and quantum mechanics, emphasizing the non-distributive lattice embedded in a distributive one. It discusses how all physical theories must adhere to this structure, incorporating topology, Heyting algebra, Boolean algebra, and
1 views • 36 slides
Fides: A System for Verifiable Computation Using Smart Contracts
Fides presents a system for verifiable computation using smart contracts, focusing on blockchain basics, Ethereum, smart contracts, and outsourcing computation. It explores key components of blockchain, Ethereum's decentralized computing platform, properties of smart contracts, and the concept of ve
0 views • 25 slides
SEAL Project: Enhancing Identity Management and KYC Solutions
The SEAL project aims to provide a robust infrastructure for identity management and KYC processes, emphasizing user data control and decentralized storage to minimize risks. Using a combination of federated and self-sovereign approach, SEAL offers microservice-based architecture supporting web and
0 views • 12 slides
Blackbox Verifiable Computation Scheme Overview
This summarized content discusses the concept of blackbox verifiable computation, focusing on the challenges faced by clients and servers, the role of helper oracles, positive results utilizing homomorphic encryption, and background information on Random Self Reducible (RSR) functions. The protocol
0 views • 20 slides
Re-Animator: Versatile System Call Tracing and Replaying
Re-Animator is a research project focusing on creating a high-fidelity system call capturing system with minimized overheads. The project aims to capture long-running applications and provide scalable and verifiable system call replaying. It introduces two prototype system call tracing systems and h
0 views • 39 slides
Importance of Requirements Management in Project Success
Requirements management is crucial for project success, involving careful consideration of various requirement types such as functional, performance, constraints, and more. Clear, consistent, and verifiable requirements are essential, along with understanding the origins, impacts, and alternatives f
0 views • 13 slides
Publicly Verifiable Grouped Aggregation Queries on Outsourced Data Streams
Explore the challenges and solutions for publicly verifiable grouped aggregation queries on outsourced data streams, focusing on security, verification, and cloud computing. The research discusses how to handle large amounts of data using small memory components and emphasizes the importance of data
0 views • 34 slides
Understanding Verifiable Mixnets in Electronic Voting Systems
Explore the concept of verifiable mixnets in electronic voting systems through topics like counting methods, preserving vote secrecy, and verifiability of the counting process. Learn about Verificatum, commitment schemes, and proof techniques for ensuring mixing correctness in voting processes.
0 views • 22 slides
Communication Complexity in Byzantine Agreement Research
The presentation discusses communication complexity in Byzantine Agreement, emphasizing a lower bound of (f/2) when After the Fact removal is considered. It explores two major contributions - the communication lower bound in randomized protocols and near-optimal subquadratic Byzantine Agreement. The
0 views • 9 slides