Josh Benaloh
Microsoft
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Josh Benaloh.
theory and application of cryptographic techniques | 1994
Josh Benaloh; Michael de Mare
This paper describes a simple candidate one-way hash function which satisfies a quasi-commutative property that allows it to be used as an accumulator. This property allows protocols to be developed in which the need for a trusted central authority can be eliminated. Space-efficient distributed protocols are given for document time stamping and for membership testing, and many other applications are possible.
international conference on document analysis and recognition | 2003
Patrice Y. Simard; Richard Szeliski; Josh Benaloh; Julien Couvreur; Iulian D. Calinov
How do you tell a computer from a human? The situation arises often on the Internet, when online polls are conducted, accounts are requested, undesired email is received, and chat-rooms are spammed. The approach we use is to create a visual challenge that is easy for humans but difficult for a computer. More specifically, our challenge is to recognize a string of random distorted characters. To pass the challenge, the subject must type in the correct corresponding ASCII string. From an OCR point of view, this problem is interesting because our goal is to use the vast amount of accumulated knowledge to defeat the state of the art OCR algorithms. This is a role reversal from traditional OCR research. Unlike many other systems, our algorithm is based on the assumption that segmentation is much more difficult than recognition. Our image challenges present hard segmentation problems that humans are particularly apt at solving. The technology is currently being used in MSNs Hotmail registration system, where it has significantly reduced daily registration rate with minimal Consumer Support impact.
theory and application of cryptographic techniques | 1986
Josh Benaloh
In 1979, Blackley and Shamir independently proposed schemes by which a secret can be divided into many shares which can be distributed to mutually suspicious agents. This paper describes a homomorphism property attained by these and several other secret sharing schemes which allows multiple secrets to be combined by direct computation on shares. This property reduces the need for trust among agents and allows secret sharing to be applied to many new problems. One application described here gives a method of verifiable secret sharing which is much simpler and more efficient than previous schemes. A second application is described which gives a fault-tolerant method of holding verifiable secret-ballot elections.
international cryptology conference | 1987
Josh Benaloh
The method of cryptographic capsules, especially (but not exclusively) when combined with residue classes, seems to be a powerful tool with many applications. This simple tool makes possible several protocols which would be impractical or completely impossible without them. In addition, several previously published protocols can be significantly simplified by the use of capsules.
Journal of Cybersecurity | 2015
Hal Abelson; Ross J. Anderson; Steven Michael Bellovin; Josh Benaloh; Matt Blaze; Whitfield Diffie; John Gilmore; Matthew Green; Susan Landau; Peter G. Neumann; Ronald L. Rivest; Jeffrey I. Schiller; Bruce Schneier; Michael A. Specter; Daniel J. Weitzner
Twenty years ago, law enforcement organizations lobbied to require data and communication services to engineer their products to guarantee law enforcement access to all data. After lengthy debate and vigorous predictions of enforcement channels “going dark,” these attempts to regulate security technologies on the emerging Internet were abandoned. In the intervening years, innovation on the Internet flourished, and law enforcement agencies found new and more effective means of accessing vastly larger quantities of data. Today, there are again calls for regulation to mandate the provision of exceptional access mechanisms. In this article, a group of computer scientists and security experts, many of whom participated in a 1997 study of these same topics, has convened to explore the likely effects of imposing extraordinary access mandates. We have found that the damage that could be caused by law enforcement exceptional access requirements would be even greater today than it would have been 20 years ago. In the wake of the growing economic and social cost of the fundamental insecurity of today’s Internet environment, any proposals that alter the security dynamics online should be approached with caution. Exceptional access would force Internet system developers to reverse “forward secrecy” design practices that seek to minimize the impact on user privacy when systems are breached. The complexity of today’s Internet environment, with millions of apps and globally connected services, means that new law enforcement requirements are likely to introduce unanticipated, hard to detect
IEEE Transactions on Information Forensics and Security | 2009
Josh Benaloh; Tal Moran; Lee Naish; Kim Ramchen; Vanessa Teague
There are many advantages to voting schemes in which voters rank all candidates in order, rather than just choosing their favorite. However, these schemes inherently suffer from a coercion problem when there are many candidates, because a coercer can demand a certain permutation from a voter and then check whether that permutation appears during tallying. Recently developed cryptographic voting protocols allow anyone to audit an election (universal verifiability), but existing systems are either not applicable to ranked voting at all, or reveal enough information about the ballots to make voter coercion possible. We solve this problem for the popular single transferable vote (STV) ranked voting system, by constructing an algorithm for the verifiable tallying of encrypted votes. Our construction improves upon existing work because it extends to multiple-seat STV and reveals less information than other schemes. The protocol is based on verifiable shuffling of homomorphic encryptions, a well-studied primitive in the voting arena. Our protocol is efficient enough to be practical, even for a large election.
Communications of The ACM | 2015
Harold Abelson; Ross J. Anderson; Steven Michael Bellovin; Josh Benaloh; Matt Blaze; Whitfield Diffie; John Gilmore; Matthew Green; Susan Landau; Peter G. Neumann; Ronald L. Rivest; Jeffrey I. Schiller; Bruce Schneier; Michael A. Specter; Daniel J. Weitzner
Mandating insecurity by requiring government access to all data and communications.
International Joint Conference on Electronic Voting | 2017
Josh Benaloh
Cumulative Voting is an electoral system in which each voter is allowed to cast multiple votes — some or all of which may be duplicate votes for a single candidate. It is sometimes used to elect members to a legislative body such as a parliament or city council, and its purpose is to achieve a more proportional representation than that which results from many other voting systems. Cumulative voting is most commonly used in municipal elections in the United States and Europe, but it has also been used for larger elections and is often used by corporations to elect their directors.
Archive | 1997
D. Chase Franklin; Daniel Rosen; Josh Benaloh; Daniel R. Simon
international cryptology conference | 1988
Josh Benaloh; Jerry Leichter