Applications of secure electronic voting to automated privacy-preserving troubleshooting

作者: Qiang Huang , David Jao , Helen J. Wang

DOI: 10.1145/1102120.1102132

关键词:

摘要: Recent work [27, 15] introduced a novel peer-to-peer application that leverages content sharing and aggregation among the peers to diagnose misconfigurations on desktop PC. This poses interesting challenges in preserving privacy of user configuration data maintaining integrity troubleshooting results. In this paper, we provide much more rigorous cryptographic yet practical solution for privacy, investigate analyze solutions ensuring integrity.

参考文章(30)
Helen J. Wang, Nikita Borisov, Qiang Huang, Privacy-Preserving Friends Troubleshooting Network. network and distributed system security symposium. ,(2005)
Atsushi Fujioka, Tatsuaki Okamoto, Kazuo Ohta, A Practical Secret Voting Scheme for Large Scale Elections theory and application of cryptographic techniques. pp. 244- 251 ,(1992) , 10.1007/3-540-57220-1_66
Poorvi L. Vora, David Wagner, Joseph L. Hall, Lillie Coney, Towards a privacy measurement criterion for voting systems international conference on digital government research. pp. 287- 288 ,(2005) , 10.5555/1065226.1065324
Ari Juels, Ronald L. Rivest, Markus Jakobsson, Making Mix Nets Robust for Electronic Voting by Randomized Partial Checking usenix security symposium. pp. 339- 353 ,(2002)
Helen J. Wang, Yih-Chun Hu, Chun Yuan, Zheng Zhang, Yi-Min Wang, Friends troubleshooting network: towards privacy-preserving, automatic troubleshooting international workshop on peer to peer systems. ,vol. 3279, pp. 184- 194 ,(2004) , 10.1007/978-3-540-30183-7_18
Jonathan Katz, Steven Myers, Rafail Ostrovsky, Cryptographic Counters and Applications to Electronic Voting Lecture Notes in Computer Science. pp. 78- 92 ,(2001) , 10.1007/3-540-44987-6_6
David Goldschlag, Paul Syverson, Michael Reed, Onion Routing for Anonymous and Private Internet Connections ,(1999)
John C. Platt, Helen J. Wang, Yi-Min Wang, Ruyun Zhang, Yu Chen, Automatic misconfiguration troubleshooting with peerpressure operating systems design and implementation. pp. 17- 17 ,(2004)
Amos Fiat, Adi Shamir, How to prove yourself: practical solutions to identification and signature problems international cryptology conference. ,vol. 263, pp. 186- 194 ,(1987) , 10.1007/3-540-47721-7_12
Michael J. Freedman, Emil Sit, Josh Cates, Robert Morris, Introducing Tarzan, a Peer-to-Peer Anonymizing Network Layer international workshop on peer to peer systems. pp. 121- 129 ,(2002) , 10.1007/3-540-45748-8_12