Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Josh Benaloh is active.

Publication


Featured researches published by Josh Benaloh.


theory and application of cryptographic techniques | 1994

One-way accumulators: a decentralized alternative to digital signatures

Josh Benaloh; Michael de Mare

This paper describes a simple candidate one-way hash function which satisfies a quasi-commutative property that allows it to be used as an accumulator. This property allows protocols to be developed in which the need for a trusted central authority can be eliminated. Space-efficient distributed protocols are given for document time stamping and for membership testing, and many other applications are possible.


international conference on document analysis and recognition | 2003

Using character recognition and segmentation to tell computer from humans

Patrice Y. Simard; Richard Szeliski; Josh Benaloh; Julien Couvreur; Iulian D. Calinov

How do you tell a computer from a human? The situation arises often on the Internet, when online polls are conducted, accounts are requested, undesired email is received, and chat-rooms are spammed. The approach we use is to create a visual challenge that is easy for humans but difficult for a computer. More specifically, our challenge is to recognize a string of random distorted characters. To pass the challenge, the subject must type in the correct corresponding ASCII string. From an OCR point of view, this problem is interesting because our goal is to use the vast amount of accumulated knowledge to defeat the state of the art OCR algorithms. This is a role reversal from traditional OCR research. Unlike many other systems, our algorithm is based on the assumption that segmentation is much more difficult than recognition. Our image challenges present hard segmentation problems that humans are particularly apt at solving. The technology is currently being used in MSNs Hotmail registration system, where it has significantly reduced daily registration rate with minimal Consumer Support impact.


theory and application of cryptographic techniques | 1986

Secret Sharing Homomorphisms: Keeping Shares of a Secret Secret (Extended Abstract)

Josh Benaloh

In 1979, Blackley and Shamir independently proposed schemes by which a secret can be divided into many shares which can be distributed to mutually suspicious agents. This paper describes a homomorphism property attained by these and several other secret sharing schemes which allows multiple secrets to be combined by direct computation on shares. This property reduces the need for trust among agents and allows secret sharing to be applied to many new problems. One application described here gives a method of verifiable secret sharing which is much simpler and more efficient than previous schemes. A second application is described which gives a fault-tolerant method of holding verifiable secret-ballot elections.


international cryptology conference | 1987

Cryptographic capsules: a disjunctive primitive for interactive protocols

Josh Benaloh

The method of cryptographic capsules, especially (but not exclusively) when combined with residue classes, seems to be a powerful tool with many applications. This simple tool makes possible several protocols which would be impractical or completely impossible without them. In addition, several previously published protocols can be significantly simplified by the use of capsules.


Journal of Cybersecurity | 2015

Keys under doormats: mandating insecurity by requiring government access to all data and communications

Hal Abelson; Ross J. Anderson; Steven Michael Bellovin; Josh Benaloh; Matt Blaze; Whitfield Diffie; John Gilmore; Matthew Green; Susan Landau; Peter G. Neumann; Ronald L. Rivest; Jeffrey I. Schiller; Bruce Schneier; Michael A. Specter; Daniel J. Weitzner

Twenty years ago, law enforcement organizations lobbied to require data and communication services to engineer their products to guarantee law enforcement access to all data. After lengthy debate and vigorous predictions of enforcement channels “going dark,” these attempts to regulate security technologies on the emerging Internet were abandoned. In the intervening years, innovation on the Internet flourished, and law enforcement agencies found new and more effective means of accessing vastly larger quantities of data. Today, there are again calls for regulation to mandate the provision of exceptional access mechanisms. In this article, a group of computer scientists and security experts, many of whom participated in a 1997 study of these same topics, has convened to explore the likely effects of imposing extraordinary access mandates. We have found that the damage that could be caused by law enforcement exceptional access requirements would be even greater today than it would have been 20 years ago. In the wake of the growing economic and social cost of the fundamental insecurity of today’s Internet environment, any proposals that alter the security dynamics online should be approached with caution. Exceptional access would force Internet system developers to reverse “forward secrecy” design practices that seek to minimize the impact on user privacy when systems are breached. The complexity of today’s Internet environment, with millions of apps and globally connected services, means that new law enforcement requirements are likely to introduce unanticipated, hard to detect


IEEE Transactions on Information Forensics and Security | 2009

Shuffle-Sum: Coercion-Resistant Verifiable Tallying for STV Voting

Josh Benaloh; Tal Moran; Lee Naish; Kim Ramchen; Vanessa Teague

There are many advantages to voting schemes in which voters rank all candidates in order, rather than just choosing their favorite. However, these schemes inherently suffer from a coercion problem when there are many candidates, because a coercer can demand a certain permutation from a voter and then check whether that permutation appears during tallying. Recently developed cryptographic voting protocols allow anyone to audit an election (universal verifiability), but existing systems are either not applicable to ranked voting at all, or reveal enough information about the ballots to make voter coercion possible. We solve this problem for the popular single transferable vote (STV) ranked voting system, by constructing an algorithm for the verifiable tallying of encrypted votes. Our construction improves upon existing work because it extends to multiple-seat STV and reveals less information than other schemes. The protocol is based on verifiable shuffling of homomorphic encryptions, a well-studied primitive in the voting arena. Our protocol is efficient enough to be practical, even for a large election.


Communications of The ACM | 2015

Keys under doormats

Harold Abelson; Ross J. Anderson; Steven Michael Bellovin; Josh Benaloh; Matt Blaze; Whitfield Diffie; John Gilmore; Matthew Green; Susan Landau; Peter G. Neumann; Ronald L. Rivest; Jeffrey I. Schiller; Bruce Schneier; Michael A. Specter; Daniel J. Weitzner

Mandating insecurity by requiring government access to all data and communications.


International Joint Conference on Electronic Voting | 2017

The Weakness of Cumulative Voting

Josh Benaloh

Cumulative Voting is an electoral system in which each voter is allowed to cast multiple votes — some or all of which may be duplicate votes for a single candidate. It is sometimes used to elect members to a legislative body such as a parliament or city council, and its purpose is to achieve a more proportional representation than that which results from many other voting systems. Cumulative voting is most commonly used in municipal elections in the United States and Europe, but it has also been used for larger elections and is often used by corporations to elect their directors.


Archive | 1997

Electronic online commerce card with customer generated transaction proxy number for online transactions

D. Chase Franklin; Daniel Rosen; Josh Benaloh; Daniel R. Simon


international cryptology conference | 1988

Generalized secret sharing and monotone functions

Josh Benaloh; Jerry Leichter

Collaboration


Dive into the Josh Benaloh's collaboration.

Top Co-Authors

Avatar

Ronald L. Rivest

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Jeffrey I. Schiller

Massachusetts Institute of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge