Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Jérôme Dossogne is active.

Publication


Featured researches published by Jérôme Dossogne.


nordic conference on secure it systems | 2011

Mental voting booths

Jérôme Dossogne; Frédéric Lafitte

In this paper, we introduce the notion of mental voting booths, i.e., a building block for voting schemes that provides remote voters with similar protection as that offered by physical voting booths, essentially protecting them from over-the-shoulder coercion attacks (shoulder-surfing). We introduce a framework to model voting booths and formulate a property of the modelled booths that is sufficient to ensure over-the-shoulder coercion resistance. Next, we propose an example of mental booth that is simple enough to be used by any voter without prior training and show that an execution of the remote booth in the presence of the adversary is equivalent to that execution in his absence (e.g., inside a physical booth). The only cost lies in the use of an untappable channel in order to transmit a piece of information before the voting phase. Mental booths also allow for the voter to safely delegate his own voice to an untrusted person while still being able to verify that the untrusted person followed his instructions while voting.


security of information and networks | 2013

Secure and practical threshold RSA

Jérôme Dossogne; Frédéric Lafitte; Dirk Van Heule

This article describes a scheme that outputs RSA signatures using a threshold mechanism in which each share has a bitlength close to the bitlength of the RSA modulus. The scheme is proven unforgeable under the standard RSA assumption against an honest but curious adversary that has static corruption capabilities. Previous practical and provably secure schemes require to introduce a factor n! [33] and 2kt [15] in the exponent when computing the partial signatures, where n is the RSA modulus, t + 1 the threshold and k a fixed parameter. Our scheme requires only t + 1 modular exponentiations and l + 1 modular multiplications, with t the threshold and l the number of participants.


security of information and networks | 2013

Blinded additively homomorphic encryption schemes for self-tallying voting

Jérôme Dossogne; Frédéric Lafitte

In this paper, we propose a self-tallying election protocol based public key homomorphic encryption. The additive homomorphism allows a set of participants (voters) to publish an encrypted value (ballot) and to compute the encrypted sum of all these values based on their ciphertexts. Our scheme has the particularity that anyone can decrypt the sum, but only once all participants have contributed to its computation. More precisely, the sum can be decrypted at all times, but remains blinded until all participants have contributed their vote, which contains a share of the unblinding key. Additionally, we propose an adaptation of Helios in order to provide self-tallying.


international workshop on security | 2011

Enhancing Cryptographic Code against Side Channel Cryptanalysis with Aspects

Jérôme Dossogne; Stephane Fernandes Medeiros


Symposium on information theory in the Benelux | 2010

Online banking and man in the browser attacks , survey of the belgian situation

Jérôme Dossogne; Olivier Markowitch


system analysis and modeling | 2009

A Tripartite Strong Designated Verifier Scheme Based on Threshold RSA Signatures

Jérôme Dossogne; Olivier Markowitch


Symposium on information theory in the Benelux | 2009

Voting with a tripartite strong designated verifier scheme based on threshold RSA signatures

Jérôme Dossogne; Markowitch Olivier


GI-Edition. Lecture Notes in Informatics | 2012

Coercion-Freeness in E-voting via Multi-party Designated Verifier Schemes

Jérôme Dossogne; Frédéric Lafitte; Olivier Markowitch


Symposium on information theory in the Benelux | 2010

E-voting: Individual verifiability of public boards made more achievable

Jérôme Dossogne; Olivier Markowitch


security of information and networks | 2013

On authentication factors: "what you can" and "how you do it"

Jérôme Dossogne; Frédéric Lafitte

Collaboration


Dive into the Jérôme Dossogne's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Olivier Markowitch

Université libre de Bruxelles

View shared research outputs
Top Co-Authors

Avatar

Markowitch Olivier

Université libre de Bruxelles

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge