Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Sriramkrishnan Srinivasan is active.

Publication


Featured researches published by Sriramkrishnan Srinivasan.


international conference on cryptology in india | 2010

Versatile Pret a Voter: Handling Multiple Election Methods with a Unified Interface

Zhe Xia; Chris Culnane; James Heather; Hugo Jonker; Peter Y. A. Ryan; Steve Schneider; Sriramkrishnan Srinivasan

A number of end-to-end verifiable voting schemes have been introduced recently. These schemes aim to allow voters to verify that their votes have contributed in the way they intended to the tally and in addition allow anyone to verify that the tally has been generated correctly. These goals must be achieved while maintaining voter privacy and providing receipt-freeness. However, most of these end-to-end voting schemes are only designed to handle a single election method and the voter interface varies greatly between different schemes. In this paper, we introduce a scheme which handles many of the popular election methods that are currently used around the world. Our scheme not only ensures privacy, receipt-freeness and end-to-end verifiability, but also keeps the voter interface simple and consistent between various election methods.


Information Security Technical Report | 2010

Identity based encryption: Progress and challenges

Sriramkrishnan Srinivasan

Identity based cryptography is currently among the most active areas of research in cryptography. In this article we discuss identity based encryption (IBE) which has the potential for widespread real world adoption and has in fact already been deployed commercially. We will discuss the many advantages and disadvantages of IBE and briefly introduce various schemes that have been proposed in the literature. We discuss the real world impact of IBE and highlight some issues which we think will become more pertinent as IBE and related technologies become more well known and widely deployed.


network and system security | 2014

Countering Ballot Stuffing and Incorporating Eligibility Verifiability in Helios

Sriramkrishnan Srinivasan; Chris Culnane; James Heather; Steve Schneider; Zhe Xia

Helios is a web-based end-to-end verifiable electronic voting system which has been said to be suitable for low-coercion environments. Although many Internet voting schemes have been proposed in the literature, Helios stands out for its real world relevance. It has been used in a number of elections in university campuses around the world and it has also been used recently by the IACR to elect its board members. It was noted that a dishonest server in Helios can stuff ballots and this seems to limit the claims of end-to-end verifiability of the system. In this work, we investigate how the issue of ballot stuffing can be addressed with minimum change to the current vote casting experience in Helios and we argue formally about the security of our techniques. Our ideas are intuitive and general enough to be applied in the context of other Internet voting scheme and they also address recent attacks exploiting the malleability of ballots in Helios.


availability, reliability and security | 2013

Solving the Discrete Logarithm Problem for Packing Candidate Preferences

James Heather; Chris Culnane; Steve Schneider; Sriramkrishnan Srinivasan; Zhe Xia

Ranked elections are used in many places across the world, and a number of end-to-end verifiable voting systems have been proposed to handle these elections recently. One example is the vVote system designed for the Victorian State Election, Australia. In this system, many voters will give a full ranking of up to 38 candidates. The easiest way to do this is to ask each voter to reorder ciphertexts representing the different candidates, so that the ciphertext ordering represents the candidate ranking. But this requires sending 38 ciphertexts per voter through the mixnets, which will take a long time. In this paper, we explore how to “pack” multiple candidate preferences into a single ciphertext, so that these preferences can be represented in the least number of ciphertexts possible, while maintaining efficient decryption. Both the packing and the unpacking procedure are performed publicly: we still provide 38 ciphertexts, but they are combined appropriately before they enter the mixnets, and after decryption, a meet-in-the-middle algorithm can be used to recover the full candidate preferences despite the discrete logarithm problem.


conference on electronic voting technology workshop on trustworthy elections | 2012

Using Prêt à Voter in Victorian state elections

Craig Burton; Chris Culnane; James Heather; Thea Peacock; Peter Y. A. Ryan; Steve Schneider; Sriramkrishnan Srinivasan; Vanessa Teague; Roland Wen; Zhe Xia


Electronic Voting | 2012

A Supervised Verifiable Voting Protocol for the Victorian Electoral Commission

Craig Burton; Chris Culnane; James Heather; Thea Peacock; Peter Y. A. Ryan; Steve Schneider; Sriramkrishnan Srinivasan; Vanessa Teague; Roland Wen; Zhe Xia


2011 International Workshop on Requirements Engineering for Electronic Voting Systems | 2011

Focus group views on Prêt à Voter 1.0

Steve Schneider; Morgan Llewellyn; Chris Culnane; James Heather; Sriramkrishnan Srinivasan; Zhe Xia


VoteID'11 Proceedings of the Third international conference on E-Voting and Identity | 2011

Prêt á voter with write-ins

Steve Schneider; Sriramkrishnan Srinivasan; Chris Culnane; James Heather; Zhe Xia


conference on electronic voting technology workshop on trustworthy elections | 2011

Authentication codes

Chris Culnane; David Bismark; James Heather; Steve Schneider; Sriramkrishnan Srinivasan; Zhe Xia


mobile ad hoc and sensor networks | 2012

Analysis on Token-Controlled Public Key Encryption

Changlu Lin; Yong Li; Sriramkrishnan Srinivasan; Li Lu

Collaboration


Dive into the Sriramkrishnan Srinivasan's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Zhe Xia

University of Surrey

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Roland Wen

University of New South Wales

View shared research outputs
Top Co-Authors

Avatar

Thea Peacock

University of Newcastle

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Morgan Llewellyn

IMT Institute for Advanced Studies Lucca

View shared research outputs
Researchain Logo
Decentralizing Knowledge