<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Research Archives - Sequent</title>
	<atom:link href="/research/feed/" rel="self" type="application/rss+xml" />
	<link>/research/</link>
	<description>Online Voting Platform</description>
	<lastBuildDate>Wed, 29 May 2024 17:03:42 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.5.7</generator>

<image>
	<url>/wp-content/uploads/2022/06/cropped-FAV-6-32x32.png</url>
	<title>Research Archives - Sequent</title>
	<link>/research/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Degree of Privacy in Voting</title>
		<link>/research/degree-of-privacy-in-voting/</link>
		
		<dc:creator><![CDATA[Serhii Bohynia]]></dc:creator>
		<pubDate>Tue, 30 May 2023 08:37:41 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Research]]></category>
		<category><![CDATA[blog]]></category>
		<guid isPermaLink="false">/?p=1849</guid>

					<description><![CDATA[<p>This article demonstrates the natural extension of Diaz’s 2002 degree of anonymity model to voting scenarios. The outcome is straightforward but holds potential value for intricate cases like weighted voting, where privacy concerns surpass the conventional “bisimilarity-under-swapping” definition outlined by Delaune in 2009. These concerns arise from the possibility of information leakage through election results, [&#8230;]</p>
<p>The post <a href="/research/degree-of-privacy-in-voting/">Degree of Privacy in Voting</a> appeared first on <a href="/">Sequent</a>.</p>
]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="1849" class="elementor elementor-1849" data-elementor-post-type="post">
				<div class="elementor-element elementor-element-6976bde8 e-flex e-con-boxed e-con e-parent" data-id="6976bde8" data-element_type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-6a1ec063 elementor-widget elementor-widget-text-editor" data-id="6a1ec063" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
			<style>/*! elementor - v3.21.0 - 26-05-2024 */
.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#69727d;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#69727d;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}</style>				<p>This article demonstrates the natural extension of Diaz’s 2002 degree of anonymity model to voting scenarios. The outcome is straightforward but holds potential value for intricate cases like weighted voting, where privacy concerns surpass the conventional “bisimilarity-under-swapping” definition outlined by Delaune in 2009. These concerns arise from the possibility of information leakage through election results, as highlighted in Delaune’s work:</p>						</div>
				</div>
					</div>
				</div>
		<div class="elementor-element elementor-element-640a2146 e-flex e-con-boxed e-con e-parent" data-id="640a2146" data-element_type="container" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}">
					<div class="e-con-inner">
		<div class="elementor-element elementor-element-77a5ffa7 e-con-full e-flex elementor-invisible e-con e-child" data-id="77a5ffa7" data-element_type="container" data-settings="{&quot;animation&quot;:&quot;fadeInLeft&quot;}">
				<div class="elementor-element elementor-element-341d4fd2 elementor-widget elementor-widget-button" data-id="341d4fd2" data-element_type="widget" data-widget_type="button.default">
				<div class="elementor-widget-container">
					<div class="elementor-button-wrapper">
			<a class="elementor-button elementor-button-link elementor-size-sm" href="/blog/">
						<span class="elementor-button-content-wrapper">
						<span class="elementor-button-icon elementor-align-icon-left">
				<i aria-hidden="true" class="fas fa-angle-left"></i>			</span>
									<span class="elementor-button-text">Go Back</span>
					</span>
					</a>
		</div>
				</div>
				</div>
				<div class="elementor-element elementor-element-6473aa36 elementor-widget elementor-widget-heading" data-id="6473aa36" data-element_type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
			<style>/*! elementor - v3.21.0 - 26-05-2024 */
.elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px}</style><div class="elementor-heading-title elementor-size-default">Blog</div>		</div>
				</div>
				<div class="elementor-element elementor-element-1185ce elementor-widget__width-inherit elementor-widget elementor-widget-theme-post-title elementor-page-title elementor-widget-heading" data-id="1185ce" data-element_type="widget" data-widget_type="theme-post-title.default">
				<div class="elementor-widget-container">
			<h1 class="elementor-heading-title elementor-size-default">Degree of Privacy in Voting</h1>		</div>
				</div>
				<div class="elementor-element elementor-element-100c7ccc elementor-widget elementor-widget-text-editor" data-id="100c7ccc" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<span>Blog</span>, <span>Research</span>						</div>
				</div>
				</div>
					</div>
				</div>
		<div class="elementor-element elementor-element-6b8518e8 e-flex e-con-boxed e-con e-parent" data-id="6b8518e8" data-element_type="container">
					<div class="e-con-inner">
		<div class="elementor-element elementor-element-3a971c92 e-con-full e-flex e-con e-child" data-id="3a971c92" data-element_type="container">
				<div class="elementor-element elementor-element-1570ae97 uael-heading-align-left elementor-widget elementor-widget-uael-table-of-contents" data-id="1570ae97" data-element_type="widget" data-settings="{&quot;heading_bottom_space&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:0,&quot;sizes&quot;:[]},&quot;content_between_space&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:16,&quot;sizes&quot;:[]},&quot;sticky&quot;:&quot;top&quot;,&quot;sticky_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;],&quot;scroll_offset&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;scroll_offset_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;scroll_offset_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;heading_text_align&quot;:&quot;left&quot;,&quot;heading_bottom_space_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;heading_bottom_space_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;separator_bottom_space&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;separator_bottom_space_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;separator_bottom_space_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;content_between_space_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;content_between_space_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;sticky_offset&quot;:0,&quot;sticky_effects_offset&quot;:0}" data-widget_type="uael-table-of-contents.default">
				<div class="elementor-widget-container">
					<div class="uael-toc-main-wrapper" data-headings="h2,h3" >
			<div class="uael-toc-wrapper">
				<div class="uael-toc-header">
					<span class="uael-toc-heading elementor-inline-editing" data-elementor-setting-key="heading_title" data-elementor-inline-editing-toolbar="basic" ></span>
									</div>
								<div class="uael-toc-toggle-content">
					<div class="uael-toc-content-wrapper">
						
							<ul data-toc-headings="headings" class="uael-toc-list uael-toc-list-none" data-scroll="500" ></ul>
											</div>
				</div>
				<div class="uael-toc-empty-note">
					<span>Add a header to begin generating the table of contents</span>
				</div>
			</div>
					</div>
				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-35207229 e-con-full e-flex e-con e-child" data-id="35207229" data-element_type="container">
				<div class="elementor-element elementor-element-21186f27 elementor-widget elementor-widget-image" data-id="21186f27" data-element_type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
			<style>/*! elementor - v3.21.0 - 26-05-2024 */
.elementor-widget-image{text-align:center}.elementor-widget-image a{display:inline-block}.elementor-widget-image a img[src$=".svg"]{width:48px}.elementor-widget-image img{vertical-align:middle;display:inline-block}</style>										<img fetchpriority="high" decoding="async" width="768" height="403" src="/wp-content/uploads/2024/03/Sequent-Degree-of-privacy-in-voting-person-phone-768x403-1.png" class="attachment-full size-full wp-image-1850" alt="" srcset="/wp-content/uploads/2024/03/Sequent-Degree-of-privacy-in-voting-person-phone-768x403-1.png 768w, /wp-content/uploads/2024/03/Sequent-Degree-of-privacy-in-voting-person-phone-768x403-1-300x157.png 300w" sizes="(max-width: 768px) 100vw, 768px" />													</div>
				</div>
		<div class="elementor-element elementor-element-7192251b e-flex e-con-boxed e-con e-child" data-id="7192251b" data-element_type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-1ab238db elementor-widget elementor-widget-text-editor" data-id="1ab238db" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>This article demonstrates the natural extension of Diaz’s 2002 degree of anonymity model to voting scenarios. The outcome is straightforward but holds potential value for intricate cases like weighted voting, where privacy concerns surpass the conventional “bisimilarity-under-swapping” definition outlined by Delaune in 2009. These concerns arise from the possibility of information leakage through election results, as highlighted in Delaune’s work:</p><p>It is important to note that the definition of “bisimilarity-under-swapping” remains resilient even in scenarios where the outcome of the election necessitates the disclosure of votes from VA and VB. This applies to situations such as unanimous voting or when other voters reveal their choices, leading to the deduction of votes for VA and VB.</p><p>The notion that information can potentially leak from voting results directs our attention to the degree of anonymity model. This model, rooted in information theory, enables the quantification of anonymity provided by anonymous connection schemes. It considers attackers who gather probabilistic information about users. Unlike the standard possibilistic privacy definition for voting, the degree of information in this model pertains to probabilistic inference. The measure is not binary; instead, it quantifies the amount of information an attacker can obtain by observing the process. In the context of voting, as discussed later, the attacker acquires information by observing the results, which are accessible regardless of the existence of ballot privacy.</p><p>By quantifying information gain, entropy naturally results (Diaz 2009).</p>						</div>
				</div>
				<div class="elementor-element elementor-element-c06ac86 elementor-widget elementor-widget-image" data-id="c06ac86" data-element_type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
													<img decoding="async" width="800" height="277" src="/wp-content/uploads/2024/03/1-1024x354.png" class="attachment-large size-large wp-image-1859" alt="" srcset="/wp-content/uploads/2024/03/1-1024x354.png 1024w, /wp-content/uploads/2024/03/1-300x104.png 300w, /wp-content/uploads/2024/03/1-768x266.png 768w, /wp-content/uploads/2024/03/1.png 1179w" sizes="(max-width: 800px) 100vw, 800px" />													</div>
				</div>
				<div class="elementor-element elementor-element-d035ca7 elementor-widget elementor-widget-text-editor" data-id="d035ca7" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>As a measure of degree of anonymity, the authors apply a normalization factor based on maximum entropy (zero information leakage):</p>						</div>
				</div>
				<div class="elementor-element elementor-element-4595dff elementor-widget elementor-widget-image" data-id="4595dff" data-element_type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
													<img decoding="async" width="800" height="313" src="/wp-content/uploads/2024/03/2-1024x400.png" class="attachment-large size-large wp-image-1860" alt="" srcset="/wp-content/uploads/2024/03/2-1024x400.png 1024w, /wp-content/uploads/2024/03/2-300x117.png 300w, /wp-content/uploads/2024/03/2-768x300.png 768w, /wp-content/uploads/2024/03/2.png 1180w" sizes="(max-width: 800px) 100vw, 800px" />													</div>
				</div>
				<div class="elementor-element elementor-element-a5dedba elementor-widget elementor-widget-text-editor" data-id="a5dedba" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>Given the normalization</p>						</div>
				</div>
				<div class="elementor-element elementor-element-b5c0018 elementor-widget elementor-widget-image" data-id="b5c0018" data-element_type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
													<img loading="lazy" decoding="async" width="800" height="189" src="/wp-content/uploads/2024/03/3-1024x242.png" class="attachment-large size-large wp-image-1861" alt="" srcset="/wp-content/uploads/2024/03/3-1024x242.png 1024w, /wp-content/uploads/2024/03/3-300x71.png 300w, /wp-content/uploads/2024/03/3-768x181.png 768w, /wp-content/uploads/2024/03/3.png 1156w" sizes="(max-width: 800px) 100vw, 800px" />													</div>
				</div>
					</div>
				</div>
				<div class="elementor-element elementor-element-8c308c1 elementor-widget elementor-widget-heading" data-id="8c308c1" data-element_type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
			<h2 class="elementor-heading-title elementor-size-default">Extension to Voting
</h2>		</div>
				</div>
				<div class="elementor-element elementor-element-777d12c elementor-widget elementor-widget-text-editor" data-id="777d12c" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>Using the degree of anonymity model, we can determine who sent a message out of possible groups (the anonymity set). This model should be extended to the case of voting, where the attacker wants to determine the voter’s choice. The availability of individual votes as plaintexts varies depending on the secure voting scheme employed. Consequently, the translation between different scenarios is not instantaneous. In one case, the focus is on determining a single variable out of n options, while in the context of voting, the objective is to ascertain vote choices based on election results.</p><p>However, it is possible to incorporate probabilities directly into the degree of anonymity model. These probabilities should be derived from the election results, as they constitute the publicly available information accessible to the attacker. Furthermore, it is desirable to establish a general approach that does not rely on the specific electoral method or the format of the election result. We start with:</p>						</div>
				</div>
				<div class="elementor-element elementor-element-a5f5846 elementor-widget elementor-widget-image" data-id="a5f5846" data-element_type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
													<img loading="lazy" decoding="async" width="165" height="63" src="/wp-content/uploads/2024/03/4.png" class="attachment-large size-large wp-image-1866" alt="" />													</div>
				</div>
				<div class="elementor-element elementor-element-d848bc1 elementor-widget elementor-widget-text-editor" data-id="d848bc1" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>These are sets of voters, choices and election results.</p>						</div>
				</div>
				<div class="elementor-element elementor-element-d5798de elementor-widget elementor-widget-image" data-id="d5798de" data-element_type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
													<img loading="lazy" decoding="async" width="151" height="36" src="/wp-content/uploads/2024/03/5.png" class="attachment-large size-large wp-image-1867" alt="" />													</div>
				</div>
				<div class="elementor-element elementor-element-f67f813 elementor-widget elementor-widget-text-editor" data-id="f67f813" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>The function ‘a’ represents the individual voter’s selection, defined as a mapping that associates each voter with their respective choice. On the other hand, the function ‘t’ denotes the election tally, which maps the set of choices made by voters to the corresponding result.</p>						</div>
				</div>
				<div class="elementor-element elementor-element-a858cd8 elementor-widget elementor-widget-image" data-id="a858cd8" data-element_type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
													<img loading="lazy" decoding="async" width="247" height="41" src="/wp-content/uploads/2024/03/6.png" class="attachment-large size-large wp-image-1868" alt="" />													</div>
				</div>
				<div class="elementor-element elementor-element-de473ed elementor-widget elementor-widget-text-editor" data-id="de473ed" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>Ar corresponds to the set of all functions ‘a’ that generate the outcome ‘r’, representing the sets of selections made by voters. Expanding on this, the function ‘m’ denotes the count of distinct functions ‘a’ in which voter ‘v’ selects choice ‘c’ and the overall result is ‘r’. In essence, it quantifies the number of instances where voter ‘v’ chooses ‘c’ and the final result corresponds to ‘r’.</p><p>These expressions allow us to provide equivalent expressions for the terms in the original definition of degree of anonymity. According to the election result, the entropy corresponding to the uncertainty of a voter’s choice is</p>						</div>
				</div>
				<div class="elementor-element elementor-element-001bea1 elementor-widget elementor-widget-image" data-id="001bea1" data-element_type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
													<img loading="lazy" decoding="async" width="800" height="141" src="/wp-content/uploads/2024/03/7.png" class="attachment-large size-large wp-image-1869" alt="" srcset="/wp-content/uploads/2024/03/7.png 845w, /wp-content/uploads/2024/03/7-300x53.png 300w, /wp-content/uploads/2024/03/7-768x135.png 768w" sizes="(max-width: 800px) 100vw, 800px" />													</div>
				</div>
				<div class="elementor-element elementor-element-437cf5c elementor-widget elementor-widget-text-editor" data-id="437cf5c" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>In this case, entropy is simply the standard expression for entropy, but with probabilities that correspond to the likelihood that a certain choice will be selected given a certain election result. When there is no information about the election, the maximum entropy corresponds to a uniform probability distribution for the voter’s choice, resulting in</p>						</div>
				</div>
				<div class="elementor-element elementor-element-663def2 elementor-widget elementor-widget-image" data-id="663def2" data-element_type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
													<img loading="lazy" decoding="async" width="119" height="19" src="/wp-content/uploads/2024/03/8.png" class="attachment-large size-large wp-image-1870" alt="" />													</div>
				</div>
				<div class="elementor-element elementor-element-49e4477 elementor-widget elementor-widget-text-editor" data-id="49e4477" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>where |C| is the number of choices (the cardinality of C). Finally, the degree of privacy is</p>						</div>
				</div>
				<div class="elementor-element elementor-element-77c17b3 elementor-widget elementor-widget-image" data-id="77c17b3" data-element_type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
													<img loading="lazy" decoding="async" width="110" height="42" src="/wp-content/uploads/2024/03/9.png" class="attachment-large size-large wp-image-1871" alt="" />													</div>
				</div>
				<div class="elementor-element elementor-element-6d6264c elementor-widget elementor-widget-text-editor" data-id="6d6264c" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>which quantifies the degree to which a voter’s v choice remains secret given the election result r. This expression exhibits similarities to the degree of anonymity model, albeit with certain modifications. Firstly, we are addressing the degree of privacy, quantifying the level of knowledge about a voter’s choice, rather than attempting to de-anonymize the sender of a message. Furthermore, this result pertains to each individual voter. While this characteristic may not always be relevant, it holds significance in scenarios involving weighted voting, where voters possess distinct degrees of anonymity. Additionally, it is possible to derive aggregate values, such as the average or minimum degree of anonymity. Another generalization involves computing expectation values over results for a given setup. As an extreme example, in an election with a single voter, the degree of anonymity would always be 0, regardless of the result.</p><p>As mentioned previously, the aforementioned definition applies universally to any election, regardless of the electoral method, result type, or even the design of the ballot. Now, let’s delve into some specific examples to further illustrate this point.</p>						</div>
				</div>
				<div class="elementor-element elementor-element-62a429a elementor-widget elementor-widget-heading" data-id="62a429a" data-element_type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
			<h2 class="elementor-heading-title elementor-size-default">Examples</h2>		</div>
				</div>
				<div class="elementor-element elementor-element-f4ee792 elementor-widget elementor-widget-text-editor" data-id="f4ee792" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>We calculate values for examples. In all cases we are using a plurality rule for the function t: V =&gt; C =&gt; R.</p>						</div>
				</div>
				<div class="elementor-element elementor-element-9446887 elementor-widget elementor-widget-heading" data-id="9446887" data-element_type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
			<h3 class="elementor-heading-title elementor-size-default">Yes/No vote, Single voter
</h3>		</div>
				</div>
				<div class="elementor-element elementor-element-8932993 elementor-widget elementor-widget-text-editor" data-id="8932993" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>This is a Yes/No vote (ballot options are Yes or No). We have a single voter, John.</p><p>V = { John }, C = { Yes, No }, R = { {Yes:1, No:0}, {Yes:0, No:1} }</p><p>In the following expression:</p>						</div>
				</div>
				<div class="elementor-element elementor-element-1be154c elementor-widget elementor-widget-image" data-id="1be154c" data-element_type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
													<img loading="lazy" decoding="async" width="800" height="141" src="/wp-content/uploads/2024/03/7.png" class="attachment-large size-large wp-image-1869" alt="" srcset="/wp-content/uploads/2024/03/7.png 845w, /wp-content/uploads/2024/03/7-300x53.png 300w, /wp-content/uploads/2024/03/7-768x135.png 768w" sizes="(max-width: 800px) 100vw, 800px" />													</div>
				</div>
				<div class="elementor-element elementor-element-90d5ff3 elementor-widget elementor-widget-text-editor" data-id="90d5ff3" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>The value of n is 2, for two possible results (the cardinality of C). Consider the case where r = Yes, then</p><p>Ar = { (John, Yes) }, and |Ar| = 1</p><p>since it is the only way that John could have voted. Similarly,</p><p>m(John, Yes, Yes) = 1 and m(John, No, Yes) = 0</p><p>again, for the same reason. The entropy then reduces to</p><p>H(v, r) = 1/1*log(1/1) = 0</p><p>which when plugged into</p>						</div>
				</div>
				<div class="elementor-element elementor-element-e97114f elementor-widget elementor-widget-image" data-id="e97114f" data-element_type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
													<img loading="lazy" decoding="async" width="110" height="42" src="/wp-content/uploads/2024/03/9.png" class="attachment-large size-large wp-image-1871" alt="" />													</div>
				</div>
				<div class="elementor-element elementor-element-1600a3a elementor-widget elementor-widget-text-editor" data-id="1600a3a" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>gives</p><p>d(John, Yes) = d(John, No) = 0</p><p>The degree of anonymity is zero. This matches the obvious fact that in an election with a single voter, their vote will be revealed.</p>						</div>
				</div>
				<div class="elementor-element elementor-element-d2cdd94 elementor-widget elementor-widget-heading" data-id="d2cdd94" data-element_type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
			<h3 class="elementor-heading-title elementor-size-default">Yes/No vote, Unanimous result</h3>		</div>
				</div>
				<div class="elementor-element elementor-element-11aa454 elementor-widget elementor-widget-text-editor" data-id="11aa454" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>V = { v1 … vn }, C = { Yes, No }, R = { {Yes:n, No:0}, {Yes:0, No:n} }</p><p>In the following expression:</p>						</div>
				</div>
				<div class="elementor-element elementor-element-53a6cf5 elementor-widget elementor-widget-image" data-id="53a6cf5" data-element_type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
													<img loading="lazy" decoding="async" width="800" height="141" src="/wp-content/uploads/2024/03/7.png" class="attachment-large size-large wp-image-1869" alt="" srcset="/wp-content/uploads/2024/03/7.png 845w, /wp-content/uploads/2024/03/7-300x53.png 300w, /wp-content/uploads/2024/03/7-768x135.png 768w" sizes="(max-width: 800px) 100vw, 800px" />													</div>
				</div>
				<div class="elementor-element elementor-element-5126c40 elementor-widget elementor-widget-text-editor" data-id="5126c40" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>we see that the unanimous vote case has a similar form as the case of a single voter, except for a general number of voters and results:</p><p>|Ar| = 1</p><p>for all r, and also</p><p>m(v, Yes, {Yes:0, No: 10} ) = 0 and m(v, Yes, {Yes:10, No: 0} ) = 1</p><p>which leads to</p><p>d(v, r) = 0</p><p>for all v and r. Once again, this matches the obvious expectation: in a unanimous election, all votes are disclosed.</p>						</div>
				</div>
				<div class="elementor-element elementor-element-75f4ca0 elementor-widget elementor-widget-heading" data-id="75f4ca0" data-element_type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
			<h3 class="elementor-heading-title elementor-size-default">Yes/No vote, General case
</h3>		</div>
				</div>
				<div class="elementor-element elementor-element-a9a0410 elementor-widget elementor-widget-text-editor" data-id="a9a0410" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>V = { v1 … vn }, C = { Yes, No }, R = { {Yes:n, No:0} … {Yes:0, No:n} }</p><p>In this case, the cardinality of R is |C|, as we are not confining the results solely to unanimous outcomes. The calculation for |Ar| and m deviates from the previous approach. By indexing the results in R based on the number of positive votes, we obtain the following:</p>						</div>
				</div>
				<div class="elementor-element elementor-element-a4e1b46 elementor-widget elementor-widget-image" data-id="a4e1b46" data-element_type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
													<img loading="lazy" decoding="async" width="100" height="45" src="/wp-content/uploads/2024/03/13.png" class="attachment-large size-large wp-image-1878" alt="" />													</div>
				</div>
				<div class="elementor-element elementor-element-87ebbee elementor-widget elementor-widget-text-editor" data-id="87ebbee" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>with a binomial coefficient on the right. This is the number of ways it is possible to obtain the result r. We also have</p>						</div>
				</div>
				<div class="elementor-element elementor-element-57ca209 elementor-widget elementor-widget-image" data-id="57ca209" data-element_type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
													<img loading="lazy" decoding="async" width="198" height="45" src="/wp-content/uploads/2024/03/14.png" class="attachment-large size-large wp-image-1879" alt="" />													</div>
				</div>
				<div class="elementor-element elementor-element-3859e78 elementor-widget elementor-widget-text-editor" data-id="3859e78" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>dividing the previous two expressions provides</p>						</div>
				</div>
				<div class="elementor-element elementor-element-e60edec elementor-widget elementor-widget-image" data-id="e60edec" data-element_type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
													<img loading="lazy" decoding="async" width="103" height="53" src="/wp-content/uploads/2024/03/15.png" class="attachment-large size-large wp-image-1880" alt="" />													</div>
				</div>
				<div class="elementor-element elementor-element-bd3294d elementor-widget elementor-widget-text-editor" data-id="bd3294d" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>Because this is a Yes/No election</p>						</div>
				</div>
				<div class="elementor-element elementor-element-8ea60b6 elementor-widget elementor-widget-image" data-id="8ea60b6" data-element_type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
													<img loading="lazy" decoding="async" width="222" height="45" src="/wp-content/uploads/2024/03/16.png" class="attachment-large size-large wp-image-1881" alt="" />													</div>
				</div>
				<div class="elementor-element elementor-element-e383ba9 elementor-widget elementor-widget-text-editor" data-id="e383ba9" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>which when divided by |Ar|</p>						</div>
				</div>
				<div class="elementor-element elementor-element-973eae5 elementor-widget elementor-widget-image" data-id="973eae5" data-element_type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
													<img loading="lazy" decoding="async" width="151" height="58" src="/wp-content/uploads/2024/03/17.png" class="attachment-large size-large wp-image-1882" alt="" />													</div>
				</div>
				<div class="elementor-element elementor-element-e22e790 elementor-widget elementor-widget-text-editor" data-id="e22e790" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>The complete expression for H is therefore</p>						</div>
				</div>
				<div class="elementor-element elementor-element-59400b4 elementor-widget elementor-widget-image" data-id="59400b4" data-element_type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
													<img loading="lazy" decoding="async" width="800" height="92" src="/wp-content/uploads/2024/03/18-1-1024x118-1.png" class="attachment-large size-large wp-image-1883" alt="" srcset="/wp-content/uploads/2024/03/18-1-1024x118-1.png 1024w, /wp-content/uploads/2024/03/18-1-1024x118-1-300x35.png 300w, /wp-content/uploads/2024/03/18-1-1024x118-1-768x89.png 768w" sizes="(max-width: 800px) 100vw, 800px" />													</div>
				</div>
				<div class="elementor-element elementor-element-2798b15 elementor-widget elementor-widget-text-editor" data-id="2798b15" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>at this point, we can do a couple of sanity checks. Firstly, the probabilities in the entropy expression (r/|C| + 1 — r/|C|) sum to 1. Secondly, these examples highlight a common-sense inference. If an election comprises |C| choices and the number of “Yes” votes is r, then the probability of any voter selecting “Yes” must be r / |C|. Although our generalized approach for calculating entropy is more extensive than our intuition for indistinguishable voters under the plurality rule, it aligns with logical reasoning.</p><p>Finally, the degree of privacy for the general Yes/No election is</p>						</div>
				</div>
				<div class="elementor-element elementor-element-6561ff1 elementor-widget elementor-widget-image" data-id="6561ff1" data-element_type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
													<img loading="lazy" decoding="async" width="800" height="84" src="/wp-content/uploads/2024/03/19-1024x108-1.png" class="attachment-large size-large wp-image-1887" alt="" srcset="/wp-content/uploads/2024/03/19-1024x108-1.png 1024w, /wp-content/uploads/2024/03/19-1024x108-1-300x32.png 300w, /wp-content/uploads/2024/03/19-1024x108-1-768x81.png 768w" sizes="(max-width: 800px) 100vw, 800px" />													</div>
				</div>
				<div class="elementor-element elementor-element-eb58db2 elementor-widget elementor-widget-text-editor" data-id="eb58db2" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>Below is a graph of this function for a fixed value of 10 voters (|C| = 10).</p>						</div>
				</div>
				<div class="elementor-element elementor-element-d59dc55 elementor-widget elementor-widget-image" data-id="d59dc55" data-element_type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
													<img loading="lazy" decoding="async" width="800" height="386" src="/wp-content/uploads/2024/03/20-1024x494.png" class="attachment-large size-large wp-image-1888" alt="" srcset="/wp-content/uploads/2024/03/20-1024x494.png 1024w, /wp-content/uploads/2024/03/20-300x145.png 300w, /wp-content/uploads/2024/03/20-768x370.png 768w, /wp-content/uploads/2024/03/20.png 1180w" sizes="(max-width: 800px) 100vw, 800px" />													</div>
				</div>
				<div class="elementor-element elementor-element-a22e788 elementor-widget elementor-widget-text-editor" data-id="a22e788" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>As we saw in the previous section, unanimous elections correspond to the two edges of the graph, where d = 0.</p>						</div>
				</div>
				<div class="elementor-element elementor-element-e2a21d0 elementor-widget elementor-widget-heading" data-id="e2a21d0" data-element_type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
			<h2 class="elementor-heading-title elementor-size-default">Summary</h2>		</div>
				</div>
				<div class="elementor-element elementor-element-6dfe8a4 elementor-widget elementor-widget-text-editor" data-id="6dfe8a4" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>The application of the generalized degree of anonymity model in the context of voting has demonstrated its versatility and relevance. This extension proves applicable to diverse voting methods, providing a flexible approach. Through simple yet illustrative examples, we observe that the model’s calculations align with outcomes derived from traditional methods specific to each type of election. While these initial examples may seem straightforward, the significance of the degree of privacy becomes particularly apparent in more complex scenarios where voters are distinguishable, and results may inadvertently reveal additional information. Weighted voting serves as a prime illustration of such cases. While the definitions presented herein can be equally applied to this scenario, employing them in their general form may require additional considerations to address potential combinatorial challenges.</p>						</div>
				</div>
				<div class="elementor-element elementor-element-6f9004e elementor-widget elementor-widget-heading" data-id="6f9004e" data-element_type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
			<h2 class="elementor-heading-title elementor-size-default">References</h2>		</div>
				</div>
				<div class="elementor-element elementor-element-35190be elementor-widget elementor-widget-text-editor" data-id="35190be" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>Diaz 2002 — <a href="https://www.esat.kuleuven.be/cosic/publications/article-89.pdf">Towards measuring anonymity</a></p><p>Delaune 2009 — <a href="http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.142.1731&amp;rep=rep1&amp;type=pdf">Verifying privacy-type properties of electronic voting protocols</a></p><p>[3] It is also possible to use a non-uniform prior probability here. In that case the resulting conditional probabilities must be derived in such a way that relative magnitudes are <a href="https://en.wikipedia.org/wiki/Conditional_probability#Formal_derivation">preserved</a>.</p>						</div>
				</div>
				</div>
					</div>
				</div>
				</div>
		<p>The post <a href="/research/degree-of-privacy-in-voting/">Degree of Privacy in Voting</a> appeared first on <a href="/">Sequent</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>A Toy Model of Information – Theoretic Security</title>
		<link>/research/a-toy-model-of-information-theoretic-security/</link>
		
		<dc:creator><![CDATA[Serhii Bohynia]]></dc:creator>
		<pubDate>Fri, 21 Apr 2023 09:20:46 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Research]]></category>
		<category><![CDATA[blog]]></category>
		<guid isPermaLink="false">/?p=1892</guid>

					<description><![CDATA[<p>In a previous post, we discussed different types of uncertainty due to limited information or computations as the basis for cryptography. A Caesar cipher example demonstrated how an adversary could have all the information to reveal a secret if the relationship between the message space, key space, and ciphertext satisfies the following: Go Back Blog Add a header to [&#8230;]</p>
<p>The post <a href="/research/a-toy-model-of-information-theoretic-security/">A Toy Model of Information – Theoretic Security</a> appeared first on <a href="/">Sequent</a>.</p>
]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="1892" class="elementor elementor-1892" data-elementor-post-type="post">
				<div class="elementor-element elementor-element-13a82ca3 e-flex e-con-boxed e-con e-parent" data-id="13a82ca3" data-element_type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-72c9ec1a elementor-widget elementor-widget-text-editor" data-id="72c9ec1a" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>In a<a href="https://sequentech.io/uncertainty-cryptography-and-information/"> previous post,</a> we discussed different types of uncertainty due to limited information or computations as the basis for cryptography. A <a href="https://en.wikipedia.org/wiki/Caesar_cipher">Caesar cipher </a>example demonstrated how an adversary could have all the information to reveal a secret if the relationship between the message space, key space, and ciphertext satisfies the following:</p>						</div>
				</div>
					</div>
				</div>
		<div class="elementor-element elementor-element-758f4fe0 e-flex e-con-boxed e-con e-parent" data-id="758f4fe0" data-element_type="container" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}">
					<div class="e-con-inner">
		<div class="elementor-element elementor-element-180a39a7 e-con-full e-flex elementor-invisible e-con e-child" data-id="180a39a7" data-element_type="container" data-settings="{&quot;animation&quot;:&quot;fadeInLeft&quot;}">
				<div class="elementor-element elementor-element-241c1b3a elementor-widget elementor-widget-button" data-id="241c1b3a" data-element_type="widget" data-widget_type="button.default">
				<div class="elementor-widget-container">
					<div class="elementor-button-wrapper">
			<a class="elementor-button elementor-button-link elementor-size-sm" href="/blog/">
						<span class="elementor-button-content-wrapper">
						<span class="elementor-button-icon elementor-align-icon-left">
				<i aria-hidden="true" class="fas fa-angle-left"></i>			</span>
									<span class="elementor-button-text">Go Back</span>
					</span>
					</a>
		</div>
				</div>
				</div>
				<div class="elementor-element elementor-element-8ab461e elementor-widget elementor-widget-heading" data-id="8ab461e" data-element_type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
			<div class="elementor-heading-title elementor-size-default">Blog</div>		</div>
				</div>
				<div class="elementor-element elementor-element-155b1bb5 elementor-widget__width-inherit elementor-widget elementor-widget-theme-post-title elementor-page-title elementor-widget-heading" data-id="155b1bb5" data-element_type="widget" data-widget_type="theme-post-title.default">
				<div class="elementor-widget-container">
			<h1 class="elementor-heading-title elementor-size-default">A Toy Model of Information – Theoretic Security</h1>		</div>
				</div>
				<div class="elementor-element elementor-element-4d2fdf6d elementor-widget elementor-widget-text-editor" data-id="4d2fdf6d" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<span>Blog</span>, <span>Research</span>						</div>
				</div>
				</div>
					</div>
				</div>
		<div class="elementor-element elementor-element-22a1a6ca e-flex e-con-boxed e-con e-parent" data-id="22a1a6ca" data-element_type="container">
					<div class="e-con-inner">
		<div class="elementor-element elementor-element-e120712 e-con-full e-flex e-con e-child" data-id="e120712" data-element_type="container">
				<div class="elementor-element elementor-element-4495caa5 uael-heading-align-left elementor-widget elementor-widget-uael-table-of-contents" data-id="4495caa5" data-element_type="widget" data-settings="{&quot;heading_bottom_space&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:0,&quot;sizes&quot;:[]},&quot;content_between_space&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:16,&quot;sizes&quot;:[]},&quot;sticky&quot;:&quot;top&quot;,&quot;sticky_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;],&quot;scroll_offset&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;scroll_offset_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;scroll_offset_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;heading_text_align&quot;:&quot;left&quot;,&quot;heading_bottom_space_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;heading_bottom_space_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;separator_bottom_space&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;separator_bottom_space_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;separator_bottom_space_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;content_between_space_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;content_between_space_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;sticky_offset&quot;:0,&quot;sticky_effects_offset&quot;:0}" data-widget_type="uael-table-of-contents.default">
				<div class="elementor-widget-container">
					<div class="uael-toc-main-wrapper" data-headings="h2,h3" >
			<div class="uael-toc-wrapper">
				<div class="uael-toc-header">
					<span class="uael-toc-heading elementor-inline-editing" data-elementor-setting-key="heading_title" data-elementor-inline-editing-toolbar="basic" ></span>
									</div>
								<div class="uael-toc-toggle-content">
					<div class="uael-toc-content-wrapper">
						
							<ul data-toc-headings="headings" class="uael-toc-list uael-toc-list-none" data-scroll="500" ></ul>
											</div>
				</div>
				<div class="uael-toc-empty-note">
					<span>Add a header to begin generating the table of contents</span>
				</div>
			</div>
					</div>
				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-66f2e071 e-con-full e-flex e-con e-child" data-id="66f2e071" data-element_type="container">
				<div class="elementor-element elementor-element-e440051 elementor-widget elementor-widget-image" data-id="e440051" data-element_type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
													<img loading="lazy" decoding="async" width="768" height="403" src="/wp-content/uploads/2024/03/A-Toy-Model-of-Information-768x403-1.png" class="attachment-full size-full wp-image-1893" alt="" srcset="/wp-content/uploads/2024/03/A-Toy-Model-of-Information-768x403-1.png 768w, /wp-content/uploads/2024/03/A-Toy-Model-of-Information-768x403-1-300x157.png 300w" sizes="(max-width: 768px) 100vw, 768px" />													</div>
				</div>
		<div class="elementor-element elementor-element-63fbdd8d e-flex e-con-boxed e-con e-child" data-id="63fbdd8d" data-element_type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-680b75b5 elementor-widget elementor-widget-text-editor" data-id="680b75b5" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>In a<a href="https://sequentech.io/uncertainty-cryptography-and-information/"> previous post,</a> we discussed different types of uncertainty due to limited information or computations as the basis for cryptography. A <a href="https://en.wikipedia.org/wiki/Caesar_cipher">Caesar cipher </a>example demonstrated how an adversary could have all the information to reveal a secret if the relationship between the message space, key space, and ciphertext satisfies the following:</p>						</div>
				</div>
				<div class="elementor-element elementor-element-afc8540 elementor-widget elementor-widget-code-highlight" data-id="afc8540" data-element_type="widget" data-widget_type="code-highlight.default">
				<div class="elementor-widget-container">
					<div class="prismjs-default copy-to-clipboard ">
			<pre data-line="" class="highlight-height language-html line-numbers">
				<code readonly="true" class="language-html">
					<xmp>ZHOO GRQH BRX KDYH IRXQG WKH VHFUHW YGNN FQPG AQW JCXG HQWPF VJG UGETGV
XFMM EPOF ZPV IBWF GPVOE UIF TFDSFU <strong>WELL DONE YOU HAVE FOUND
THE SECRET</strong> VDKK CNMD XNT GZUD ENTMC SGD RDBQDS UCJJ BMLC WMS
FYTC DMSLB RFC QCAPCR TBII ALKB VLR EXSB CLRKA QEB PBZOBQ</xmp>
				</code>
			</pre>
		</div>
				</div>
				</div>
				<div class="elementor-element elementor-element-a206064 elementor-widget elementor-widget-text-editor" data-id="a206064" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>Since none of the other attempts yielded meaningful results, we were able to identify the correct message. Since the number of possible keys is so small, only one of them can decrypt a possible message. In technical terms, the key space and message space[2] are small enough compared to the length of the message that only one key will decrypt.</p><p>The situation can be coarsely be classified into three cases:</p><ol><li aria-level="1"><i>H(K | C) = H(K)</i> — Perfect secrecy</li><li aria-level="1"><i>H(K | C) &lt; H(K)</i> — Information-theoretic security</li><li aria-level="1"><i>H(K | C) = 0</i> — Computational security</li></ol><p>The epistemic uncertainty mentioned in the previous entry is the epistemic uncertainty of information theory. To illustrate how information-theoretic privacy works, we can use a simple model that reduces computation security when conditions are not met.</p>						</div>
				</div>
				<div class="elementor-element elementor-element-2fb73ba1 elementor-widget elementor-widget-heading" data-id="2fb73ba1" data-element_type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
			<h2 class="elementor-heading-title elementor-size-default">Elements of our model
</h2>		</div>
				</div>
					</div>
				</div>
		<div class="elementor-element elementor-element-ff49a45 e-con-full e-flex e-con e-child" data-id="ff49a45" data-element_type="container">
				<div class="elementor-element elementor-element-3b74f6f2 elementor-widget elementor-widget-image" data-id="3b74f6f2" data-element_type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
													<img loading="lazy" decoding="async" width="440" height="321" src="/wp-content/uploads/2024/03/1-1.png" class="attachment-large size-large wp-image-1899" alt="" srcset="/wp-content/uploads/2024/03/1-1.png 440w, /wp-content/uploads/2024/03/1-1-300x219.png 300w" sizes="(max-width: 440px) 100vw, 440px" />													</div>
				</div>
				<div class="elementor-element elementor-element-29453059 elementor-widget elementor-widget-text-editor" data-id="29453059" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>The XOR function</p>						</div>
				</div>
				</div>
				<div class="elementor-element elementor-element-2f8b2c5 elementor-widget elementor-widget-text-editor" data-id="2f8b2c5" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>Using a key that determines the exact transformation and allows the intended recipient to recover the secret, our toy model must specify how messages are encrypted from plaintext to ciphertext. We can use a two-character alphabet that consists of binary sequences as messages. As our encryption function, we will use the <a href="https://en.wikipedia.org/wiki/Exclusive_or">XOR</a> function, which produces a third binary sequence from two inputs. By choosing this option, we also fix our key space to be binary sequences. Here’s an example encryption:</p><p>1010011000 XOR 1100111010 = 110100010</p><p>The XOR function produces a ciphertext 110100010 by taking as input a message (1010011000) and a key (1100111010). There is no difference in the process, we can simply imagine that the 1010011000 above is some meaningful content like “WELL DONE YOU FOUND THE SECRET ”. Like in English, in plaintext space (binary sequences) there is a subset of combinations that make meaningful messages, while the rest do not. As a result, we come to the notion of language entropy, which measures how large the meaningful subset of messages is in relation to the entire plaintext space.</p>						</div>
				</div>
				<div class="elementor-element elementor-element-d862257 elementor-widget elementor-widget-image" data-id="d862257" data-element_type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
													<img loading="lazy" decoding="async" width="300" height="276" src="/wp-content/uploads/2024/03/2-1.png" class="attachment-large size-large wp-image-1900" alt="" />													</div>
				</div>
				<div class="elementor-element elementor-element-559cdde elementor-widget elementor-widget-text-editor" data-id="559cdde" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>As the language entropy increases, the proportion of the blue region in relation to the entire plaintext space also increases. For binary languages, the entropy ranges from 0 to 1, which is measured in bits per character. Currently, our toy model consists of these components:</p><ul><li aria-level="1">Plaintext space: P ∈ {0, 1}n</li><li aria-level="1">Message space: M ⊂ P</li><li aria-level="1">Key space: K ⊂ {0, 1}n</li><li aria-level="1">Ciphertext space: C ∈ {0, 1}n</li><li aria-level="1">Encryption function: XOR: P x K → C</li><li aria-level="1">Language entropy: HL ∈ {0.0-1.0}<br /><br /></li></ul><p>The security characteristics of our system are contingent upon three parameters that are associated with the aforementioned factors:</p><ul><li aria-level="1">n:the number of characters in the plaintext</li><li aria-level="1">|K|: the size of the key space</li><li aria-level="1">HL: the language entropy</li><li aria-level="1">RL = 1 — HL: the language redundancy<br /><br /></li></ul><p>The final parameter, redundancy, is essentially a rephrasing of the language entropy. The equation that formulates the security in relation to these parameters is:</p>						</div>
				</div>
				<div class="elementor-element elementor-element-1a07bf6 elementor-widget elementor-widget-image" data-id="1a07bf6" data-element_type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
													<img loading="lazy" decoding="async" width="250" height="100" src="/wp-content/uploads/2024/03/3-1.png" class="attachment-large size-large wp-image-1901" alt="" />													</div>
				</div>
				<div class="elementor-element elementor-element-b4fa3f1 elementor-widget elementor-widget-text-editor" data-id="b4fa3f1" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>The given equation provides a minimum estimate for the anticipated quantity of false keys, denoted by the term “sn”. A false key, for a specific ciphertext, is a key that decrypts the ciphertext into a message that is not equivalent to the message that was initially encrypted using the correct key. As illustrated in the initial encryption example mentioned in the post, it was observed that among all the attempted keys used to decrypt the ciphertext, only one produced a coherent plaintext, implying that the ciphertext had no false keys. Conversely, if one of the keys, denoted as “s”, had decrypted the ciphertext into something similar to</p><p>THE MESSAGE COULD BE THIS</p><p>then in such a scenario, the key “s” would be considered a false key. If an attacker were to attempt all possible keys, they would end up with two potential messages, making it challenging to determine the accurate one. As a result, the confidentiality of the secret would be relatively preserved. The presence and quantity of anticipated false keys determine the category to which a cryptosystem belongs among the three general classifications mentioned earlier. Examining the false key equation reveals the following patterns:</p><ul><li aria-level="1">sn increases with the size of the key space, |K|</li><li aria-level="1">sn decreases with the size of the plaintext, n</li><li aria-level="1">sn decreases with language redundancy, RL</li></ul>						</div>
				</div>
				<div class="elementor-element elementor-element-f6ce5ff elementor-widget elementor-widget-heading" data-id="f6ce5ff" data-element_type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
			<h2 class="elementor-heading-title elementor-size-default">A visual representation
</h2>		</div>
				</div>
		<div class="elementor-element elementor-element-f1cdff4 e-con-full e-flex e-con e-child" data-id="f1cdff4" data-element_type="container">
				<div class="elementor-element elementor-element-c1f453a elementor-widget elementor-widget-image" data-id="c1f453a" data-element_type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
													<img loading="lazy" decoding="async" width="590" height="316" src="/wp-content/uploads/2024/03/4-1.png" class="attachment-large size-large wp-image-1902" alt="" srcset="/wp-content/uploads/2024/03/4-1.png 590w, /wp-content/uploads/2024/03/4-1-300x161.png 300w" sizes="(max-width: 590px) 100vw, 590px" />													</div>
				</div>
				<div class="elementor-element elementor-element-5313acc elementor-widget elementor-widget-text-editor" data-id="5313acc" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>Encryption representation with n = 2, H = 0.8, M = 3, K = 1</p>						</div>
				</div>
				</div>
				<div class="elementor-element elementor-element-93d7931 elementor-widget elementor-widget-text-editor" data-id="93d7931" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>The image’s left side depicts a visual representation of our parameter values for the toy model, where the left axis denotes the plaintext space, and the right axis represents the ciphertext space. Each point on the graph symbolizes an encryption or a mapping from the plaintext space to the ciphertext space. To obtain the visual representation, we set n = 2, resulting in a plaintext space with four elements. Out of these four, three convey meaningful messages, considering a language entropy of 0.8. Thus, the three red dots on the graph correspond to the three encryptions of these three meaningful messages. Since K=1, each plaintext has only one corresponding ciphertext or, visually, only one point on any given horizontal line. For comparison, see:</p>						</div>
				</div>
		<div class="elementor-element elementor-element-e6739e8 e-con-full e-flex e-con e-child" data-id="e6739e8" data-element_type="container">
				<div class="elementor-element elementor-element-ca6b335 elementor-widget elementor-widget-image" data-id="ca6b335" data-element_type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
										<figure class="wp-caption">
										<img loading="lazy" decoding="async" width="590" height="319" src="/wp-content/uploads/2024/03/5-1.png" class="attachment-large size-large wp-image-1903" alt="" srcset="/wp-content/uploads/2024/03/5-1.png 590w, /wp-content/uploads/2024/03/5-1-300x162.png 300w" sizes="(max-width: 590px) 100vw, 590px" />											<figcaption class="widget-image-caption wp-caption-text"></figcaption>
										</figure>
							</div>
				</div>
				<div class="elementor-element elementor-element-1fdc566 elementor-widget elementor-widget-text-editor" data-id="1fdc566" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>n = 2, H = 0.8, M = 3, K = 3</p>						</div>
				</div>
				</div>
				<div class="elementor-element elementor-element-c89e77e elementor-widget elementor-widget-text-editor" data-id="c89e77e" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>Displayed in the image are nine points that correspond to three messages encrypted using three distinct keys. Consequently, each horizontal line on the graph signifies all the encryptions for a specific message under various keys. As for the variance in color, consider the following alternative set of parameters:</p>						</div>
				</div>
		<div class="elementor-element elementor-element-ca885d9 e-con-full e-flex e-con e-child" data-id="ca885d9" data-element_type="container">
				<div class="elementor-element elementor-element-8147eac elementor-widget elementor-widget-image" data-id="8147eac" data-element_type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
										<figure class="wp-caption">
										<img loading="lazy" decoding="async" width="590" height="387" src="/wp-content/uploads/2024/03/6-1.png" class="attachment-large size-large wp-image-1904" alt="" srcset="/wp-content/uploads/2024/03/6-1.png 590w, /wp-content/uploads/2024/03/6-1-300x197.png 300w" sizes="(max-width: 590px) 100vw, 590px" />											<figcaption class="widget-image-caption wp-caption-text"></figcaption>
										</figure>
							</div>
				</div>
				<div class="elementor-element elementor-element-345134f elementor-widget elementor-widget-text-editor" data-id="345134f" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>n = 6, H = 0.8, M = 28, K = 3</p>						</div>
				</div>
				</div>
				<div class="elementor-element elementor-element-2cb92c9 elementor-widget elementor-widget-text-editor" data-id="2cb92c9" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>If we increase the plaintext length, the number of meaningful messages also increases to 28, resulting in a total of 28 x 3 = 84 encryptions, represented by red and blue points in this particular case. Can you discern the pattern that explains this phenomenon? It may be challenging to identify, but the explanation lies in comprehending the significance of vertical lines in the visual representation. Points that lie on the same horizontal line denote distinct encryptions for the same message, whereas points that are positioned on the same vertical line signify different messages encrypted using the same key. As previously observed, this is precisely the situation where an attacker cannot deduce the secret by attempting all possible keys in reverse, as it is impossible to distinguish the original message among the resulting messages.</p><p>Ciphertexts represented by blue points have more than one key that can decrypt them into a meaningful message. Alternatively, blue points signify ciphertexts that possess one or more spurious keys.</p><p>sn &gt; 0 ⇒ blue point</p><p>sn = 0 ⇒ red point</p><p>We can now visualize the properties of information-theoretic security that we mentioned earlier.</p><ul><li aria-level="1">sn increases with the size of the key space, |K|</li></ul>						</div>
				</div>
		<div class="elementor-element elementor-element-0f00755 e-con-full e-flex e-con e-child" data-id="0f00755" data-element_type="container">
				<div class="elementor-element elementor-element-4f63d46 elementor-widget elementor-widget-image" data-id="4f63d46" data-element_type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
										<figure class="wp-caption">
										<img loading="lazy" decoding="async" width="590" height="166" src="/wp-content/uploads/2024/03/7-1.png" class="attachment-large size-large wp-image-1908" alt="" srcset="/wp-content/uploads/2024/03/7-1.png 590w, /wp-content/uploads/2024/03/7-1-300x84.png 300w" sizes="(max-width: 590px) 100vw, 590px" />											<figcaption class="widget-image-caption wp-caption-text"></figcaption>
										</figure>
							</div>
				</div>
				<div class="elementor-element elementor-element-4b47ee1 elementor-widget elementor-widget-text-editor" data-id="4b47ee1" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>Fixed n, H, increasing values of K</p>						</div>
				</div>
				</div>
				<div class="elementor-element elementor-element-bf6f138 elementor-widget elementor-widget-text-editor" data-id="bf6f138" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>In terms of visualization, the number of red dots proportionally increases.</p><ul><li aria-level="1">sn decreases with language redundancy, RL</li></ul>						</div>
				</div>
		<div class="elementor-element elementor-element-e847b0c e-con-full e-flex e-con e-child" data-id="e847b0c" data-element_type="container">
				<div class="elementor-element elementor-element-0929964 elementor-widget elementor-widget-image" data-id="0929964" data-element_type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
										<figure class="wp-caption">
										<img loading="lazy" decoding="async" width="590" height="167" src="/wp-content/uploads/2024/03/8-1.png" class="attachment-large size-large wp-image-1909" alt="" srcset="/wp-content/uploads/2024/03/8-1.png 590w, /wp-content/uploads/2024/03/8-1-300x85.png 300w" sizes="(max-width: 590px) 100vw, 590px" />											<figcaption class="widget-image-caption wp-caption-text"></figcaption>
										</figure>
							</div>
				</div>
				<div class="elementor-element elementor-element-6cb1631 elementor-widget elementor-widget-text-editor" data-id="6cb1631" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>Fixed K, H, increasing values of n</p>						</div>
				</div>
				</div>
				<div class="elementor-element elementor-element-b566ed5 elementor-widget elementor-widget-text-editor" data-id="b566ed5" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>In terms of visualization, the number of red dots proportionally increases.</p>						</div>
				</div>
		<div class="elementor-element elementor-element-3015178 e-con-full e-flex e-con e-child" data-id="3015178" data-element_type="container">
				<div class="elementor-element elementor-element-139b5d7 elementor-widget elementor-widget-image" data-id="139b5d7" data-element_type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
										<figure class="wp-caption">
										<img loading="lazy" decoding="async" width="590" height="161" src="/wp-content/uploads/2024/03/9-1.png" class="attachment-large size-large wp-image-1910" alt="" srcset="/wp-content/uploads/2024/03/9-1.png 590w, /wp-content/uploads/2024/03/9-1-300x82.png 300w" sizes="(max-width: 590px) 100vw, 590px" />											<figcaption class="widget-image-caption wp-caption-text"></figcaption>
										</figure>
							</div>
				</div>
				<div class="elementor-element elementor-element-d6552fe elementor-widget elementor-widget-text-editor" data-id="d6552fe" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>Fixed n, K, decreasing values of H (increasing values of R)</p>						</div>
				</div>
				</div>
				<div class="elementor-element elementor-element-409597a elementor-widget elementor-widget-heading" data-id="409597a" data-element_type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
			<h3 class="elementor-heading-title elementor-size-default">Visualizing the categories
</h3>		</div>
				</div>
				<div class="elementor-element elementor-element-4e78984 elementor-widget elementor-widget-text-editor" data-id="4e78984" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>In addition to these patterns, we also discussed three general categories that cryptosystems fall into:</p><ul><li aria-level="1"><i>H(K | C) = H(K)</i> — Perfect secrecy</li></ul>						</div>
				</div>
		<div class="elementor-element elementor-element-b21dc27 e-con-full e-flex e-con e-child" data-id="b21dc27" data-element_type="container">
				<div class="elementor-element elementor-element-031a2b0 elementor-widget elementor-widget-image" data-id="031a2b0" data-element_type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
										<figure class="wp-caption">
										<img loading="lazy" decoding="async" width="590" height="356" src="/wp-content/uploads/2024/03/10.png" class="attachment-large size-large wp-image-1914" alt="" srcset="/wp-content/uploads/2024/03/10.png 590w, /wp-content/uploads/2024/03/10-300x181.png 300w" sizes="(max-width: 590px) 100vw, 590px" />											<figcaption class="widget-image-caption wp-caption-text"></figcaption>
										</figure>
							</div>
				</div>
				<div class="elementor-element elementor-element-d4369cc elementor-widget elementor-widget-text-editor" data-id="d4369cc" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>n = 8, H = 0.55, K = 256</p>						</div>
				</div>
				</div>
				<div class="elementor-element elementor-element-450b085 elementor-widget elementor-widget-text-editor" data-id="450b085" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>In terms of visualization, the number of blue dots per column is equivalent to the number of horizontal lines. This indicates that the adversary cannot extract any information from the ciphertext. It is noteworthy that 2^8 = 256, which corresponds to the value of K.</p><ul><li aria-level="1"><i>H(K | C) &lt; H(K)</i> — Information-theoretic security</li></ul>						</div>
				</div>
		<div class="elementor-element elementor-element-9a555d8 e-con-full e-flex e-con e-child" data-id="9a555d8" data-element_type="container">
				<div class="elementor-element elementor-element-faa6231 elementor-widget elementor-widget-image" data-id="faa6231" data-element_type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
										<figure class="wp-caption">
										<img loading="lazy" decoding="async" width="590" height="346" src="/wp-content/uploads/2024/03/11.png" class="attachment-large size-large wp-image-1915" alt="" srcset="/wp-content/uploads/2024/03/11.png 590w, /wp-content/uploads/2024/03/11-300x176.png 300w" sizes="(max-width: 590px) 100vw, 590px" />											<figcaption class="widget-image-caption wp-caption-text"></figcaption>
										</figure>
							</div>
				</div>
				<div class="elementor-element elementor-element-e3e00f0 elementor-widget elementor-widget-text-editor" data-id="e3e00f0" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>n = 9, H = 0.55, K = 106</p>						</div>
				</div>
				</div>
				<div class="elementor-element elementor-element-2ccc535 elementor-widget elementor-widget-text-editor" data-id="2ccc535" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>In terms of visualization, only blue dots are present. Each ciphertext is partially secured, implying that the attacker lacks sufficient information to disclose the secret definitively.</p><ul><li aria-level="1"><i>H(K | C) = 0</i> — Computational security</li></ul>						</div>
				</div>
		<div class="elementor-element elementor-element-ce775c6 e-con-full e-flex e-con e-child" data-id="ce775c6" data-element_type="container">
				<div class="elementor-element elementor-element-efcb607 elementor-widget elementor-widget-image" data-id="efcb607" data-element_type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
										<figure class="wp-caption">
										<img loading="lazy" decoding="async" width="590" height="387" src="/wp-content/uploads/2024/03/12.png" class="attachment-large size-large wp-image-1916" alt="" srcset="/wp-content/uploads/2024/03/12.png 590w, /wp-content/uploads/2024/03/12-300x197.png 300w" sizes="(max-width: 590px) 100vw, 590px" />											<figcaption class="widget-image-caption wp-caption-text"></figcaption>
										</figure>
							</div>
				</div>
				<div class="elementor-element elementor-element-2f0f861 elementor-widget elementor-widget-text-editor" data-id="2f0f861" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>n = 13, H = 0.53, K = 29</p>						</div>
				</div>
				</div>
				<div class="elementor-element elementor-element-d2f7bd7 elementor-widget elementor-widget-text-editor" data-id="d2f7bd7" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>In terms of visualization, there are red dots indicating ciphertexts that do not have information-theoretic protection and rely on computational security for their confidentiality.</p>						</div>
				</div>
				<div class="elementor-element elementor-element-f870199 elementor-widget elementor-widget-heading" data-id="f870199" data-element_type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
			<h2 class="elementor-heading-title elementor-size-default">Try it yourself.
</h2>		</div>
				</div>
				<div class="elementor-element elementor-element-8ff87d8 elementor-widget elementor-widget-text-editor" data-id="8ff87d8" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>This post discusses the main concepts presented in Claude Shannon’s <a href="http://netlab.cs.ucla.edu/wiki/files/shannon1949.pdf">Communication Theory of Secrecy Systems</a> published in 1949. Additionally, we have created a toy model to help visualize the security properties of cryptosystems and how they change with the primary parameters. If you’re interested, you can experiment with the model <a href="http://ruescasd.github.io/shannon1949/">here</a>. If you’re a teacher and find it useful, please inform us!</p>						</div>
				</div>
				</div>
					</div>
				</div>
				</div>
		<p>The post <a href="/research/a-toy-model-of-information-theoretic-security/">A Toy Model of Information – Theoretic Security</a> appeared first on <a href="/">Sequent</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Anonymity, Pseudonymity and E-participation</title>
		<link>/research/anonymity-pseudonymity-and-e-participation/</link>
		
		<dc:creator><![CDATA[Serhii Bohynia]]></dc:creator>
		<pubDate>Wed, 29 Mar 2023 10:04:45 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Research]]></category>
		<category><![CDATA[blog]]></category>
		<guid isPermaLink="false">/?p=1926</guid>

					<description><![CDATA[<p>In this article, we will examine two papers related to the topic of anonymity in e-participation: Ruesch &#38; Märker 2012 – “Making the Case for Anonymity in E-Participation” and Moore 2016 – “Anonymity, Pseudonymity and Deliberation: Why Not Everything Should be Connected.” Our focus is on the concept that there may be an optimal solution [&#8230;]</p>
<p>The post <a href="/research/anonymity-pseudonymity-and-e-participation/">Anonymity, Pseudonymity and E-participation</a> appeared first on <a href="/">Sequent</a>.</p>
]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="1926" class="elementor elementor-1926" data-elementor-post-type="post">
				<div class="elementor-element elementor-element-573a7243 e-flex e-con-boxed e-con e-parent" data-id="573a7243" data-element_type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-26921d26 elementor-widget elementor-widget-text-editor" data-id="26921d26" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>In this article, we will examine two papers related to the topic of anonymity in e-participation: Ruesch &amp; Märker 2012 – “Making the Case for Anonymity in E-Participation” and Moore 2016 – “Anonymity, Pseudonymity and Deliberation: Why Not Everything Should be Connected.” Our focus is on the concept that there may be an optimal solution in the anonymity spectrum, which strikes a balance between conflicting properties at both ends.</p>						</div>
				</div>
					</div>
				</div>
		<div class="elementor-element elementor-element-1a4bfd32 e-flex e-con-boxed e-con e-parent" data-id="1a4bfd32" data-element_type="container" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}">
					<div class="e-con-inner">
		<div class="elementor-element elementor-element-5ffad172 e-con-full e-flex elementor-invisible e-con e-child" data-id="5ffad172" data-element_type="container" data-settings="{&quot;animation&quot;:&quot;fadeInLeft&quot;}">
				<div class="elementor-element elementor-element-57fc96d5 elementor-widget elementor-widget-button" data-id="57fc96d5" data-element_type="widget" data-widget_type="button.default">
				<div class="elementor-widget-container">
					<div class="elementor-button-wrapper">
			<a class="elementor-button elementor-button-link elementor-size-sm" href="/blog/">
						<span class="elementor-button-content-wrapper">
						<span class="elementor-button-icon elementor-align-icon-left">
				<i aria-hidden="true" class="fas fa-angle-left"></i>			</span>
									<span class="elementor-button-text">Go Back</span>
					</span>
					</a>
		</div>
				</div>
				</div>
				<div class="elementor-element elementor-element-28a68fad elementor-widget elementor-widget-heading" data-id="28a68fad" data-element_type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
			<div class="elementor-heading-title elementor-size-default">Blog</div>		</div>
				</div>
				<div class="elementor-element elementor-element-4494bbca elementor-widget__width-inherit elementor-widget elementor-widget-theme-post-title elementor-page-title elementor-widget-heading" data-id="4494bbca" data-element_type="widget" data-widget_type="theme-post-title.default">
				<div class="elementor-widget-container">
			<h1 class="elementor-heading-title elementor-size-default">Anonymity, Pseudonymity and E-participation</h1>		</div>
				</div>
				<div class="elementor-element elementor-element-f8437a3 elementor-widget elementor-widget-text-editor" data-id="f8437a3" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<span>Blog</span>, <span>Research</span>						</div>
				</div>
				</div>
					</div>
				</div>
		<div class="elementor-element elementor-element-d3ba9e0 e-flex e-con-boxed e-con e-parent" data-id="d3ba9e0" data-element_type="container">
					<div class="e-con-inner">
		<div class="elementor-element elementor-element-1806cde3 e-con-full e-flex e-con e-child" data-id="1806cde3" data-element_type="container">
				<div class="elementor-element elementor-element-bbf3c1e uael-heading-align-left elementor-widget elementor-widget-uael-table-of-contents" data-id="bbf3c1e" data-element_type="widget" data-settings="{&quot;heading_bottom_space&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:0,&quot;sizes&quot;:[]},&quot;content_between_space&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:16,&quot;sizes&quot;:[]},&quot;sticky&quot;:&quot;top&quot;,&quot;sticky_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;],&quot;scroll_offset&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;scroll_offset_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;scroll_offset_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;heading_text_align&quot;:&quot;left&quot;,&quot;heading_bottom_space_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;heading_bottom_space_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;separator_bottom_space&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;separator_bottom_space_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;separator_bottom_space_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;content_between_space_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;content_between_space_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;sticky_offset&quot;:0,&quot;sticky_effects_offset&quot;:0}" data-widget_type="uael-table-of-contents.default">
				<div class="elementor-widget-container">
					<div class="uael-toc-main-wrapper" data-headings="h2,h3" >
			<div class="uael-toc-wrapper">
				<div class="uael-toc-header">
					<span class="uael-toc-heading elementor-inline-editing" data-elementor-setting-key="heading_title" data-elementor-inline-editing-toolbar="basic" ></span>
									</div>
								<div class="uael-toc-toggle-content">
					<div class="uael-toc-content-wrapper">
						
							<ul data-toc-headings="headings" class="uael-toc-list uael-toc-list-none" data-scroll="500" ></ul>
											</div>
				</div>
				<div class="uael-toc-empty-note">
					<span>Add a header to begin generating the table of contents</span>
				</div>
			</div>
					</div>
				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-12270e59 e-con-full e-flex e-con e-child" data-id="12270e59" data-element_type="container">
				<div class="elementor-element elementor-element-54ba002f elementor-widget elementor-widget-image" data-id="54ba002f" data-element_type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
													<img loading="lazy" decoding="async" width="768" height="403" src="/wp-content/uploads/2024/03/Sequent-Anonymity-Pseudonymity-E-participation-768x403-1.png" class="attachment-full size-full wp-image-1927" alt="" srcset="/wp-content/uploads/2024/03/Sequent-Anonymity-Pseudonymity-E-participation-768x403-1.png 768w, /wp-content/uploads/2024/03/Sequent-Anonymity-Pseudonymity-E-participation-768x403-1-300x157.png 300w" sizes="(max-width: 768px) 100vw, 768px" />													</div>
				</div>
				<div class="elementor-element elementor-element-2848594 elementor-widget elementor-widget-image" data-id="2848594" data-element_type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
													<img loading="lazy" decoding="async" width="728" height="546" src="/wp-content/uploads/2024/03/real-name-policy-in-eparticipation-3-728.jpg" class="attachment-large size-large wp-image-1933" alt="" srcset="/wp-content/uploads/2024/03/real-name-policy-in-eparticipation-3-728.jpg 728w, /wp-content/uploads/2024/03/real-name-policy-in-eparticipation-3-728-300x225.jpg 300w" sizes="(max-width: 728px) 100vw, 728px" />													</div>
				</div>
		<div class="elementor-element elementor-element-99d16b4 e-flex e-con-boxed e-con e-child" data-id="99d16b4" data-element_type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-15822c26 elementor-widget elementor-widget-text-editor" data-id="15822c26" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>In this article, we will examine two papers related to the topic of anonymity in e-participation: Ruesch &amp; Märker 2012 – “Making the Case for Anonymity in E-Participation” and Moore 2016 – “Anonymity, Pseudonymity and Deliberation: Why Not Everything Should be Connected.” Our focus is on the concept that there may be an optimal solution in the anonymity spectrum, which strikes a balance between conflicting properties at both ends.</p>						</div>
				</div>
				<div class="elementor-element elementor-element-107d94f elementor-widget elementor-widget-heading" data-id="107d94f" data-element_type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
			<h2 class="elementor-heading-title elementor-size-default">Advocating for Anonymity in E-Participation
</h2>		</div>
				</div>
				<div class="elementor-element elementor-element-625dc64 elementor-widget elementor-widget-text-editor" data-id="625dc64" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>We will examine the points raised in the first paper, which presents an analysis of the participatory budget of the city of Gütersloh in Germany. Although the title may suggest a stance in support of anonymity, it is important to note that the concept of anonymity is not absolute and exists on a spectrum. This spectrum is where the trade-offs between opposing arguments take place. The discussion is relevant to various online platforms such as forums, social networks, and the web in general, and therefore, we will first review general points.</p>						</div>
				</div>
				<div class="elementor-element elementor-element-6b3f708 elementor-widget elementor-widget-heading" data-id="6b3f708" data-element_type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
			<h2 class="elementor-heading-title elementor-size-default">General arguments
</h2>		</div>
				</div>
					</div>
				</div>
				<div class="elementor-element elementor-element-3757a8d5 elementor-widget elementor-widget-heading" data-id="3757a8d5" data-element_type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
			<h3 class="elementor-heading-title elementor-size-default"><ul><li>The self-control argument</li></ul></h3>		</div>
				</div>
				<div class="elementor-element elementor-element-9a07db0 elementor-widget elementor-widget-text-editor" data-id="9a07db0" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>There is substantial evidence supporting the argument that anonymous communication often leads to more uncivil discourse, while a real name policy can promote more civilized communication. The ability to be identified by others appears to foster self-restraint, reduce personal attacks, and help establish “communities of trust.”</p>						</div>
				</div>
				<div class="elementor-element elementor-element-f2d9456 elementor-widget elementor-widget-heading" data-id="f2d9456" data-element_type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
			<h3 class="elementor-heading-title elementor-size-default"><ul><li>The legal argument
</li></ul></h3>		</div>
				</div>
				<div class="elementor-element elementor-element-15b40a6 elementor-widget elementor-widget-text-editor" data-id="15b40a6" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>Advocates of the real name policy emphasize the significance of having easily identifiable profiles to ensure legal accountability for the actions and language used by internet users.</p>						</div>
				</div>
				<div class="elementor-element elementor-element-b761c81 elementor-widget elementor-widget-heading" data-id="b761c81" data-element_type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
			<h3 class="elementor-heading-title elementor-size-default"><ul><li>The online=offline argument</li></ul></h3>		</div>
				</div>
				<div class="elementor-element elementor-element-b9a4ae9 elementor-widget elementor-widget-text-editor" data-id="b9a4ae9" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>If we are expected to be accountable using our real names in our offline lives, why should we not have the same expectation in our online lives?</p><p>Conversely</p>						</div>
				</div>
				<div class="elementor-element elementor-element-de5fb05 elementor-widget elementor-widget-heading" data-id="de5fb05" data-element_type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
			<h3 class="elementor-heading-title elementor-size-default"><ul><li>The open participation argument</li></ul></h3>		</div>
				</div>
				<div class="elementor-element elementor-element-14dca37 elementor-widget elementor-widget-text-editor" data-id="14dca37" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>Requiring users to disclose their real name could lead to the exclusion of many individuals from participating in forums or social networks, particularly in authoritarian regimes where those critical of the government may face repercussions.</p>						</div>
				</div>
				<div class="elementor-element elementor-element-fcdf12c elementor-widget elementor-widget-heading" data-id="fcdf12c" data-element_type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
			<h3 class="elementor-heading-title elementor-size-default"><ul><li>The freedom argument</li></ul></h3>		</div>
				</div>
				<div class="elementor-element elementor-element-bfba82b elementor-widget elementor-widget-text-editor" data-id="bfba82b" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>Users are more likely to express themselves freely and without being influenced by groupthink when they are not required to disclose their real identity.</p>						</div>
				</div>
				<div class="elementor-element elementor-element-ab6e0d8 elementor-widget elementor-widget-heading" data-id="ab6e0d8" data-element_type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
			<h3 class="elementor-heading-title elementor-size-default"><ul><li>The privacy argument</li></ul></h3>		</div>
				</div>
				<div class="elementor-element elementor-element-6d6a880 elementor-widget elementor-widget-text-editor" data-id="6d6a880" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>Users should have the right to choose whether to make certain political or other opinions publicly accessible, especially considering that information once published on the internet can be almost impossible to control.</p>						</div>
				</div>
				<div class="elementor-element elementor-element-dd9fd06 elementor-widget elementor-widget-heading" data-id="dd9fd06" data-element_type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
			<h2 class="elementor-heading-title elementor-size-default">Arguments specific to E-participation
</h2>		</div>
				</div>
				<div class="elementor-element elementor-element-5bb5417 elementor-widget elementor-widget-text-editor" data-id="5bb5417" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>Many of the points discussed so far are likely familiar as they relate to observations made in the previous post. However, the focus has mainly been on social networks and unmoderated online forums, leaving the area of e-participation relatively unexplored in regards to anonymity and real name policy. This paper aims to fill that gap by explicitly connecting the “anonymity debate” to e-participation, presenting both pros and cons as rationale and objections, respectively.</p><p>Rationale 1: Requiring a real name policy and personal data can ensure that only eligible citizens participate, thereby improving representativeness and, in turn, legitimacy.</p><p>Rationale 2: Requiring users to disclose their real name and personal data ensures that the quality of dialogue is improved by preventing offensive comments from anonymous users.</p><p>Rationale 3: The following objections challenge the points made in favor of real name policy and the request for personal data in ensuring transparent communication and strengthening democracy:</p><p>Objection 1: The focus on real name policy and request for personal data can detract from discussions centered on issues, leading to a biased perception of messages that degrades the quality of discourse.</p><p>Objection 2: Real name policy and request for personal data infringe upon individuals’ privacy rights.</p><p>Objection 3: Requiring a real name policy and personal data can lead to time-consuming and costly administrative issues.</p><p>Objection 4: Real name policy and request for personal data can lead to negative media attention and public perception due to legal, administrative, and usability problems they cause.</p><p>Objection 5: Requiring real names and personal data may create usability issues that discourage people from participating, ultimately leading to a decrease in overall participation.</p><p>The arguments put forth regarding online discussion and the internet at large share a considerable amount of common ground with those presented in the case of e-participation. Rationale 2 and Objection 1 align with the general arguments for self-control and quality, while Objection 2 corresponds with the broader arguments for open participation and freedom.</p>						</div>
				</div>
				<div class="elementor-element elementor-element-e94b41c elementor-widget elementor-widget-heading" data-id="e94b41c" data-element_type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
			<h2 class="elementor-heading-title elementor-size-default">Preserving Integrity through Pseudonymity
</h2>		</div>
				</div>
				<div class="elementor-element elementor-element-de4308c elementor-widget elementor-widget-text-editor" data-id="de4308c" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>Introducing Integrity Preserving Pseudonymity as a Compromise Solution:</p><p>The authors of the paper argue that, based on the Gütersloh experience, the objections to real name policy outweigh the rationales. However, as we mentioned earlier, anonymity is not a black and white issue and there are various compromise solutions between complete anonymity and real name policy. These range from no registration at all to registration with verified personal data.</p><p>One potential solution that could be considered a midpoint is Integrity Preserving Pseudonymity. With this approach, citizens are required to validate their real identities to participate in the platform, but their identities remain private and cannot be linked to their pseudonyms beyond the eligibility requirement.</p><p>This compromise solution allows citizens to maintain a degree of identity by linking their contributions to their pseudonyms, but still ensures their privacy with respect to both the general public and institutional authorities managing the participation process. This strikes a balance between anonymity and real name policy, where identity is stronger than complete anonymity but weaker than real identity.</p><p>Integrity preserving pseudonymity can be established using <a href="https://en.wikipedia.org/wiki/Digital_credential#Anonymous">anonymous credentials</a>, a cryptographic technique introduced by David Chaum (CHA 85). Revisiting the pros and cons of this type of pseudonymity, we can analyze whether the Rationales and Objections support or challenge the use of pseudonymity, as well as the two extremes of pure anonymity and real names. To simplify, we have abbreviated the arguments and merged Objection 4 with Objection 3. The following table summarizes the analysis.</p>						</div>
				</div>
				<div class="elementor-element elementor-element-2d0fdbc elementor-widget elementor-widget-image" data-id="2d0fdbc" data-element_type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
													<img loading="lazy" decoding="async" width="800" height="351" src="/wp-content/uploads/2024/03/Screenshot-2023-03-29-at-9.53.12-1024x449.png" class="attachment-large size-large wp-image-1937" alt="" srcset="/wp-content/uploads/2024/03/Screenshot-2023-03-29-at-9.53.12-1024x449.png 1024w, /wp-content/uploads/2024/03/Screenshot-2023-03-29-at-9.53.12-300x132.png 300w, /wp-content/uploads/2024/03/Screenshot-2023-03-29-at-9.53.12-768x337.png 768w, /wp-content/uploads/2024/03/Screenshot-2023-03-29-at-9.53.12-1536x674.png 1536w, /wp-content/uploads/2024/03/Screenshot-2023-03-29-at-9.53.12.png 1546w" sizes="(max-width: 800px) 100vw, 800px" />													</div>
				</div>
				<div class="elementor-element elementor-element-4285692 elementor-widget elementor-widget-text-editor" data-id="4285692" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>The cells in the table are marked with a check (√) or an X depending on whether the argument supports or questions the use of pseudonymity. Cases where the argument has both positive and negative aspects with respect to the policy are marked with both symbols. Here is a summary of the arguments for pseudonymity.</p>						</div>
				</div>
				<div class="elementor-element elementor-element-496c73a elementor-widget elementor-widget-heading" data-id="496c73a" data-element_type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
			<h3 class="elementor-heading-title elementor-size-default"><ul><li>Legitimacy, integrity
</li></ul></h3>		</div>
				</div>
				<div class="elementor-element elementor-element-f26ebbc elementor-widget elementor-widget-text-editor" data-id="f26ebbc" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>Integrity preserving pseudonymity guarantees that only eligible citizens can participate while maintaining integrity.</p>						</div>
				</div>
				<div class="elementor-element elementor-element-de56230 elementor-widget elementor-widget-heading" data-id="de56230" data-element_type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
			<h3 class="elementor-heading-title elementor-size-default"><ul><li> Civility</li></ul></h3>		</div>
				</div>
				<div class="elementor-element elementor-element-4c27e54 elementor-widget elementor-widget-text-editor" data-id="4c27e54" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>Pseudonymity has characteristics of both real name policy and anonymity. On one hand, since participants are not fully identifiable, there is some possibility for uncivil behavior, which may pose a challenge for accountability. However, on the other hand, pseudonymity does offer a degree of identity through linking contributions to a particular citizen, allowing for a level of accountability. While this level of accountability is not as strong as that offered by real names, it is greater than that provided by pure anonymity.</p>						</div>
				</div>
				<div class="elementor-element elementor-element-638d20c elementor-widget elementor-widget-heading" data-id="638d20c" data-element_type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
			<h3 class="elementor-heading-title elementor-size-default"><ul><li>Communication transparency</li></ul></h3>		</div>
				</div>
				<div class="elementor-element elementor-element-889a9a4 elementor-widget elementor-widget-text-editor" data-id="889a9a4" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>According to the definition in the paper, the argument against pseudonymity based on the fact that citizens do not know the real person they are communicating with is considered negative. However, it is possible to make points similar to those made for civility in this context.</p>						</div>
				</div>
				<div class="elementor-element elementor-element-44e8864 elementor-widget elementor-widget-heading" data-id="44e8864" data-element_type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
			<h3 class="elementor-heading-title elementor-size-default"><ul><li>Issue-centric debate</li></ul></h3>		</div>
				</div>
				<div class="elementor-element elementor-element-73e4fa2 elementor-widget elementor-widget-text-editor" data-id="73e4fa2" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>This argument is equivocal for the same reasons as described for Civility. The presence of some degree of identity may divert from a purely issue-focused discussion, similar to what happens with pure anonymity.</p>						</div>
				</div>
				<div class="elementor-element elementor-element-14be847 elementor-widget elementor-widget-heading" data-id="14be847" data-element_type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
			<h3 class="elementor-heading-title elementor-size-default"><ul><li>Privacy, inclusion, freedom</li></ul></h3>		</div>
				</div>
				<div class="elementor-element elementor-element-384a8c5 elementor-widget elementor-widget-text-editor" data-id="384a8c5" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>Integrity preserving pseudonymity, by definition, protects citizens’ real identities, which in turn promotes inclusion and freedom.</p>						</div>
				</div>
				<div class="elementor-element elementor-element-e401f88 elementor-widget elementor-widget-heading" data-id="e401f88" data-element_type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
			<h3 class="elementor-heading-title elementor-size-default"><ul><li>Administrative complexity</li></ul></h3>		</div>
				</div>
				<div class="elementor-element elementor-element-843d6e0 elementor-widget elementor-widget-text-editor" data-id="843d6e0" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>Implementing pseudonymity involves citizen authentication using their real name and other personal information, resulting in similar complexity issues to those of a pure real name policy. Furthermore, pseudonymity requires a meticulous implementation with proper cryptography, leading to administrative complexity and associated costs.</p>						</div>
				</div>
				<div class="elementor-element elementor-element-038ea0e elementor-widget elementor-widget-heading" data-id="038ea0e" data-element_type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
			<h3 class="elementor-heading-title elementor-size-default"><ul><li>Usability and participation
</li></ul></h3>		</div>
				</div>
				<div class="elementor-element elementor-element-22f101b elementor-widget elementor-widget-text-editor" data-id="22f101b" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>This argument presents a mixed evaluation for pseudonymity. On one hand, the real name authentication required for pseudonymity may result in complexity issues similar to those for a pure real name policy, decreasing usability and participation. On the other hand, pseudonymity offers some advantages for increasing participation, while still protecting citizens’ real identity, which aligns with the Privacy-inclusion-freedom argument.</p><p>The overall evaluation of a pseudonymity policy should consider the relative importance of each argument, rather than simply counting the pros and cons. Pseudonymity can function as an optimal balance between maintaining important properties of pure anonymity and ameliorating its drawbacks. However, the level of identity present in pseudonymity does pose a greater threat to Privacy-integrity-freedom than pure anonymity if <a href="https://en.wikipedia.org/wiki/Inference_attack">inference attacks</a> are conducted on pseudonyms’ linkable contributions. The paper suggests that negative effects of anonymity can be accounted for by the use of pseudonyms and moderation, and that real name policy should be avoided in e-participation projects.</p>						</div>
				</div>
				<div class="elementor-element elementor-element-43d5de8 elementor-widget elementor-widget-heading" data-id="43d5de8" data-element_type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
			<h2 class="elementor-heading-title elementor-size-default">Summary</h2>		</div>
				</div>
				<div class="elementor-element elementor-element-a1e198a elementor-widget elementor-widget-text-editor" data-id="a1e198a" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>In Ruesch &amp; Märker’s 2012 paper, we examined arguments both for and against anonymity in general and specifically in the context of e-participation. We noted that anonymity exists on a spectrum and that integrity preserving pseudonymity falls somewhere in between complete anonymity and full identification. We then assessed pseudonymity based on the arguments presented and suggested that, depending on the importance of each argument, it could be an effective compromise that balances conflicting requirements in e-participation systems. [36]</p>						</div>
				</div>
				<div class="elementor-element elementor-element-c4123df elementor-widget elementor-widget-heading" data-id="c4123df" data-element_type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
			<h2 class="elementor-heading-title elementor-size-default">References</h2>		</div>
				</div>
				<div class="elementor-element elementor-element-12fef7e elementor-widget elementor-widget-text-editor" data-id="12fef7e" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>(Chaum 85) — Chaum, David (October 1985). “Security without identification: transaction systems to make big brother obsolete”.</p><p>(Ruesch &amp; Märker 2012) — Making the Case for Anonymity in E-Participation</p><p>[20] De Cindio, Fiorella. 2012. “Guidelines for Designing Deliberative Digital Habitats: Learning from E-Participation for Open Data Initiatives.” The Journal of Community Informatics 8 (2).</p><p>[21] Fredheim, Rolf, Alfred Moore, and John Naughton. n.d. “Anonymity and Online Commenting: An Empirical Study.” SSRN Electronic Journal. doi:10.2139/ssrn.2591299.</p><p>[22] Cho, Daegon, and Alessandro Acquisti. 2013. “The More Social Cues, The Less Trolling? An Empirical Study of Online Commenting Behavior.”</p><p>[23] Diakopoulos, Nicholas, and Mor Naaman. 2011. “Towards Quality Discourse in Online News Comments.” In Proceedings of the ACM 2011 Conference on Computer Supported Cooperative Work — CSCW ‘11. doi:10.1145/1958824.1958844.</p><p>[25] Fredheim, Rolf, Alfred Moore, and John Naughton. n.d. “Anonymity and Online Commenting: An Empirical Study.” SSRN Electronic Journal. doi:10.2139/ssrn.2591299.</p><p>[26] Davies, Todd. 2009. Online Deliberation: Design, Research, and Practice. Stanford Univ Center for the Study.</p><p>[29] Connolly, Terry, Leonard M. Jessup, and Joseph S. Valacich. 1990. “Effects of Anonymity and Evaluative Tone on Idea Generation in Computer-Mediated Groups.” Management Science 36 (6): 689—703.</p><p>[30] Flanagin, A. J., V. Tiyaamornwong, J. O’Connor, and D. R. Seibold. 2002. “Computer-Mediated Group Work: The Interaction of Sex and Anonymity.” Communication Research 29 (1): 66—93.</p>						</div>
				</div>
				</div>
					</div>
				</div>
				</div>
		<p>The post <a href="/research/anonymity-pseudonymity-and-e-participation/">Anonymity, Pseudonymity and E-participation</a> appeared first on <a href="/">Sequent</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Homomorphic vs Mixnet Based E-voting</title>
		<link>/blog/homomorphic-vs-mixnet-based-e-voting/</link>
		
		<dc:creator><![CDATA[Serhii Bohynia]]></dc:creator>
		<pubDate>Mon, 20 Feb 2023 07:44:38 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Research]]></category>
		<category><![CDATA[blog]]></category>
		<guid isPermaLink="false">/?p=1612</guid>

					<description><![CDATA[<p>Although proposals have been made using other techniques, most common modern approaches to constructing secure voting systems can be divided into two categories: those based on homomorphic tallying (shorthand “homomorphic systems”) and those based on verifiable mixnets (shortand “mixnet systems”). Most systems, both prototypes in academia as well as production systems in industry, use one [&#8230;]</p>
<p>The post <a href="/blog/homomorphic-vs-mixnet-based-e-voting/">Homomorphic vs Mixnet Based E-voting</a> appeared first on <a href="/">Sequent</a>.</p>
]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="1612" class="elementor elementor-1612" data-elementor-post-type="post">
				<div class="elementor-element elementor-element-25c11fc e-flex e-con-boxed e-con e-parent" data-id="25c11fc" data-element_type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-975bc23 elementor-widget elementor-widget-text-editor" data-id="975bc23" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>Although proposals have been made using other techniques, most common modern approaches to constructing secure voting systems can be divided into two categories: those based on homomorphic tallying (shorthand “homomorphic systems”) and those based on verifiable mixnets (shortand “mixnet systems”). Most systems, both prototypes in academia as well as production systems in industry, use one (or both) of these technologies to achieve the necessary properties for what is termed secure e-voting, and the related gold standard end-to-end verifiable voting.</p>						</div>
				</div>
					</div>
				</div>
		<div class="elementor-element elementor-element-80644e3 e-flex e-con-boxed e-con e-parent" data-id="80644e3" data-element_type="container" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}">
					<div class="e-con-inner">
		<div class="elementor-element elementor-element-78dd4fd e-con-full e-flex elementor-invisible e-con e-child" data-id="78dd4fd" data-element_type="container" data-settings="{&quot;animation&quot;:&quot;fadeInLeft&quot;}">
				<div class="elementor-element elementor-element-aac0576 elementor-widget elementor-widget-button" data-id="aac0576" data-element_type="widget" data-widget_type="button.default">
				<div class="elementor-widget-container">
					<div class="elementor-button-wrapper">
			<a class="elementor-button elementor-button-link elementor-size-sm" href="/blog/">
						<span class="elementor-button-content-wrapper">
						<span class="elementor-button-icon elementor-align-icon-left">
				<i aria-hidden="true" class="fas fa-angle-left"></i>			</span>
									<span class="elementor-button-text">Go Back</span>
					</span>
					</a>
		</div>
				</div>
				</div>
				<div class="elementor-element elementor-element-3699139 elementor-widget elementor-widget-heading" data-id="3699139" data-element_type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
			<div class="elementor-heading-title elementor-size-default">Blog</div>		</div>
				</div>
				<div class="elementor-element elementor-element-1d509e5 elementor-widget__width-inherit elementor-widget elementor-widget-theme-post-title elementor-page-title elementor-widget-heading" data-id="1d509e5" data-element_type="widget" data-widget_type="theme-post-title.default">
				<div class="elementor-widget-container">
			<h1 class="elementor-heading-title elementor-size-default">Homomorphic vs Mixnet Based E-voting</h1>		</div>
				</div>
				<div class="elementor-element elementor-element-f6bf2c5 elementor-widget elementor-widget-text-editor" data-id="f6bf2c5" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<span>Blog</span>, <span>Research</span>						</div>
				</div>
				</div>
					</div>
				</div>
		<div class="elementor-element elementor-element-f8842a3 e-flex e-con-boxed e-con e-parent" data-id="f8842a3" data-element_type="container">
					<div class="e-con-inner">
		<div class="elementor-element elementor-element-52083a1 e-con-full e-flex e-con e-child" data-id="52083a1" data-element_type="container">
				<div class="elementor-element elementor-element-b6c39b5 uael-heading-align-left elementor-widget elementor-widget-uael-table-of-contents" data-id="b6c39b5" data-element_type="widget" data-settings="{&quot;heading_bottom_space&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:0,&quot;sizes&quot;:[]},&quot;content_between_space&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:16,&quot;sizes&quot;:[]},&quot;sticky&quot;:&quot;top&quot;,&quot;sticky_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;],&quot;scroll_offset&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;scroll_offset_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;scroll_offset_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;heading_text_align&quot;:&quot;left&quot;,&quot;heading_bottom_space_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;heading_bottom_space_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;separator_bottom_space&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;separator_bottom_space_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;separator_bottom_space_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;content_between_space_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;content_between_space_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;sticky_offset&quot;:0,&quot;sticky_effects_offset&quot;:0}" data-widget_type="uael-table-of-contents.default">
				<div class="elementor-widget-container">
					<div class="uael-toc-main-wrapper" data-headings="h2,h3" >
			<div class="uael-toc-wrapper">
				<div class="uael-toc-header">
					<span class="uael-toc-heading elementor-inline-editing" data-elementor-setting-key="heading_title" data-elementor-inline-editing-toolbar="basic" ></span>
									</div>
								<div class="uael-toc-toggle-content">
					<div class="uael-toc-content-wrapper">
						
							<ul data-toc-headings="headings" class="uael-toc-list uael-toc-list-none" data-scroll="500" ></ul>
											</div>
				</div>
				<div class="uael-toc-empty-note">
					<span>Add a header to begin generating the table of contents</span>
				</div>
			</div>
					</div>
				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-90371b3 e-con-full e-flex e-con e-child" data-id="90371b3" data-element_type="container">
				<div class="elementor-element elementor-element-d1a5a6f elementor-widget elementor-widget-image" data-id="d1a5a6f" data-element_type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
													<img loading="lazy" decoding="async" width="1200" height="630" src="/wp-content/uploads/2024/03/homomorphic-vs-mixnet-based-evoting.png" class="attachment-full size-full wp-image-1617" alt="" srcset="/wp-content/uploads/2024/03/homomorphic-vs-mixnet-based-evoting.png 1200w, /wp-content/uploads/2024/03/homomorphic-vs-mixnet-based-evoting-300x158.png 300w, /wp-content/uploads/2024/03/homomorphic-vs-mixnet-based-evoting-1024x538.png 1024w, /wp-content/uploads/2024/03/homomorphic-vs-mixnet-based-evoting-768x403.png 768w" sizes="(max-width: 1200px) 100vw, 1200px" />													</div>
				</div>
		<div class="elementor-element elementor-element-b204d07 e-flex e-con-boxed e-con e-child" data-id="b204d07" data-element_type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-93e4737 elementor-widget elementor-widget-text-editor" data-id="93e4737" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>Although proposals have been made using other techniques, most common modern approaches to constructing secure voting systems can be divided into two categories: those based on homomorphic tallying (shorthand “homomorphic systems”) and those based on verifiable mixnets (shortand “mixnet systems”). Most systems, both prototypes in academia as well as production systems in industry, use one (or both) of these technologies to achieve the necessary properties for what is termed secure e-voting, and the related gold standard end-to-end verifiable voting.</p><p>In this post we briefly describe the two approaches and then offer a qualitative pros &amp; cons comparison of the two for aspects we have found significant in our experience evaluating and operating such systems. Given that Sequent’s voting system uses a mixnet as its core, it is unsurprising that our conclusion following the below comparisons leans in favour of that choice when building a secure voting system. However, at Sequent we’re open to the possibility of adding a homomorphic backend to our platform if careful analysis suggests it is desirable for particular use cases that may arise.</p>						</div>
				</div>
					</div>
				</div>
				<div class="elementor-element elementor-element-ea1c1fa elementor-widget elementor-widget-heading" data-id="ea1c1fa" data-element_type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
			<h3 class="elementor-heading-title elementor-size-default">Homomorphic tallying</h3>		</div>
				</div>
				<div class="elementor-element elementor-element-a05fc81 elementor-widget elementor-widget-text-editor" data-id="a05fc81" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>Voting systems based on homomorphic tallying exploit the homomorphic property of the underlying encryption to compute tallies. This homomorphic property makes it possible to add encrypted numbers together without decrypting them. The beauty of applying this technique to voting lies in the fact that when computing an election result we do not need to decrypt individual votes, only their sum, so that the secrecy of an individual’s ballot is preserved. </p><p>Unfortunately some technicalities have to be solved. We need a way to encode voter selections in a way that is amenable to this type of summing. This usually amounts to constructing vectors of ciphertexts for which a 1 represents a marked option on the ballot while a 0 represents an unmarked one, and then summing these vectors component-wise. In addition, because we only decrypt sums we also need a way to ensure that these encryptions represent valid choices. Not only because ballots could be nonsensical, but they could also be constructed maliciously to grant a voter more power than they ought to have. Preventing such cases is accomplished using zero knowledge proofs: using that technique we still don’t learn the contents of individual ballots but we are assured that they are valid. </p><p>You can learn more about the technical details of homomorphic tallying from any of the existing proposals featuring it in the literature, a prominent example is <a href="https://github.com/microsoft/electionguard/releases/download/v1.1/EG_spec_v1_1.pdf">ElectionGuard</a>.</p>						</div>
				</div>
				<div class="elementor-element elementor-element-a746a36 elementor-widget elementor-widget-heading" data-id="a746a36" data-element_type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
			<h3 class="elementor-heading-title elementor-size-default">Verifiable mixnets
</h3>		</div>
				</div>
				<div class="elementor-element elementor-element-34554c4 elementor-widget elementor-widget-text-editor" data-id="34554c4" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>Unlike homomorphic tallying, systems based on verifiable mixnets <i>do </i>decrypt individual ballots, but they do this <i>after</i> a process of anonymization which breaks the link between an encrypted ballot and the voter that cast it. The anonymization process amounts to a  <i>shuffling</i> of a set of ballots such that the output set cannot be correlated with the input. The central problem that a verifiable mixnet solves is that of performing this shuffle while still ensuring that the output of that process corresponds to what went in, in other words, no manipulation took place. This is where, as above, zero knowledge proofs enter the picture, ensuring that the shuffling is correct while revealing no other information.</p>						</div>
				</div>
		<div class="elementor-element elementor-element-f2e0188 e-con-full e-flex e-con e-child" data-id="f2e0188" data-element_type="container">
				<div class="elementor-element elementor-element-5f57c5d elementor-widget elementor-widget-image" data-id="5f57c5d" data-element_type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
													<img loading="lazy" decoding="async" width="768" height="408" src="/wp-content/uploads/2024/03/mixnet-taken-768x408-1.png" class="attachment-large size-large wp-image-1752" alt="" srcset="/wp-content/uploads/2024/03/mixnet-taken-768x408-1.png 768w, /wp-content/uploads/2024/03/mixnet-taken-768x408-1-300x159.png 300w" sizes="(max-width: 768px) 100vw, 768px" />													</div>
				</div>
				<div class="elementor-element elementor-element-65bb0bf elementor-widget elementor-widget-text-editor" data-id="65bb0bf" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>(A mixnet with three nodes, taken from <a href="https://proceedings.ictinnovations.org/attachment/paper/234/comparing-performance-of-decryption-and-re-encryption-mixnets.pdf">here</a>)</p>						</div>
				</div>
				</div>
				<div class="elementor-element elementor-element-1bd460d elementor-widget elementor-widget-text-editor" data-id="1bd460d" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>Verifiable mixnets come in <a href="https://eprint.iacr.org/2020/490.pdf">different flavours</a>, one example (we use at Sequent) is that of re-encryption mixnets. These implement the shuffle by permuting and re-encrypting the input ciphertexts such that the result is a shuffled set of ciphertexts that are equivalent but cannot be correlated with the input. Of course, whoever performs this shuffle <i>does</i> know the correspondence, but that’s where the “net” part of mixnet comes in. If this process is repeated by several independent parties, none of them will be able to trace the path of any ciphertext through the mix network: this will only be possible if all the independent parties pool their information together. So in effect, a mixnet implements a distribution of trust for the secrecy of the ballot, a recurring theme for secure voting systems.</p><p>You can learn more about all the technical details that we use at Sequent in <a href="https://www.csc.kth.se/~dog/research/papers/TW10Conf.pdf">these</a> <a href="https://eprint.iacr.org/2011/168.pdf">papers</a>, and of course directly looking at our source code <a href="https://github.com/sequentech/">repository</a>.</p>						</div>
				</div>
				<div class="elementor-element elementor-element-7e897ef elementor-widget elementor-widget-heading" data-id="7e897ef" data-element_type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
			<h2 class="elementor-heading-title elementor-size-default">Comparison</h2>		</div>
				</div>
				<div class="elementor-element elementor-element-cd3b001 elementor-widget elementor-widget-text-editor" data-id="cd3b001" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>Given this short description of the two techniques let’s take a look at some pros and cons of each for e-voting. We have divided the comparison into sections that are significant in our experience, in alphabetical order.</p>						</div>
				</div>
				<div class="elementor-element elementor-element-4371ad3 elementor-widget elementor-widget-heading" data-id="4371ad3" data-element_type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
			<h3 class="elementor-heading-title elementor-size-default">Generality</h3>		</div>
				</div>
				<div class="elementor-element elementor-element-748493f elementor-widget elementor-widget-text-editor" data-id="748493f" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>By generality we mean the degree to which the underlying cryptographic protocol can support a wide range of election and ballot types. Starting from the simplest election type, one which poses a yes/no question to voters, election and ballot types can increase in complexity up to schemes involving, for example, choosing one or more out of several choices, ordering of choices, scoring choices numerically, or even write-ins where voters can outright fill in a previously unspecified choice. </p><p>Generality is probably the axis along which homomorphic vs mixnet based voting systems differ most. As we mentioned before, a homomorphic tally system needs to convert voter’s ballots into suitable ciphertexts that can be summed exploiting the scheme’s homomorphic property. Unfortunately, beyond the case of choosing n-out-of-k options, this rules out the more complex examples we mentioned. Mixnets on the other hand can handle arbitrary ballot types, provided the ciphertext is sufficiently large to capture the ballot information. This makes generality a strong advantage of mixnet systems over homomorphic ones.</p>						</div>
				</div>
				<div class="elementor-element elementor-element-f62cdb4 elementor-widget elementor-widget-heading" data-id="f62cdb4" data-element_type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
			<h3 class="elementor-heading-title elementor-size-default">Implementation complexity
</h3>		</div>
				</div>
				<div class="elementor-element elementor-element-25ac4d6 elementor-widget elementor-widget-text-editor" data-id="25ac4d6" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>This category refers to the complexity of the software that makes up the voting systems. Absent other considerations, a higher implementation complexity is a negative factor in our comparison. One immediate reason is the higher difficulty in developing and maintaining the software that makes up the system. More importantly, a more complex implementation is more vulnerable to implementation errors and is harder to secure against both random errors and adversarial attacks.</p><p>In terms of total implementation complexity it is probably fair to say that a homomorphic system is less complex and wins out in this category. But this result leaves out important details as to where the complexity lies. Whereas mixnet systems pay a high complexity cost for the development of the shuffling and its proofs, homomorphic systems pay most of their complexity cost in ensuring that cast ballots are correctly constructed. This difference is a reflection of a key difference between the two. Homomorphic systems do not decrypt individual ballots and rely on complex proofs to certify that said ballots are valid. Mixnet systems however do decrypt after anonymization, so it is trivial in that case to remove invalid or maliciously constructed ballots.</p><p>The consequence of this difference is that homomorphic systems pay a large fraction of their complexity cost on the client where complex proofs must be constructed, and less so on the backend where the tally is more straightforward. Mixnets have the opposite complexity layout, the shuffle and tallying software is sophisticated, whereas the client is relatively simple. It could be argued that complexity on the client side is more problematic, since it is deployed in an uncontrolled environment, the user’s device, and is subject to greater degree of heterogeneity and uncertainty. Conversely, the backend runs in a controlled environment, the systems that specialised entities must run as trustees. In spite of this, we maintain that homomorphic systems come out ahead with respect to implementation complexity.</p>						</div>
				</div>
				<div class="elementor-element elementor-element-f78c3f0 elementor-widget elementor-widget-heading" data-id="f78c3f0" data-element_type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
			<h3 class="elementor-heading-title elementor-size-default">Performance</h3>		</div>
				</div>
				<div class="elementor-element elementor-element-afe447d elementor-widget elementor-widget-text-editor" data-id="afe447d" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>The discussion here draws parallels with the previous section, but replacing implementation complexity with computational complexity. Specifically, a homomorphic system requires more computation on the client side and less so on the backend. This occurs because these systems typically encrypt each possible selection with a ciphertext, resulting in vectors of ciphertexts that grow with the number of options presented to the voter. On top of this, zero knowledge proofs must be constructed for each of these encryptions. Both the encryption and the zero knowledge proofs add computational cost, a computation that takes place in the voter’s client which is limited in performance. On the other hand, once the ballots have reached the backend the necessary computation to verify them and perform the homomorphic sum is reduced, relative to the hardware characteristics available in a server environment..</p><p>Mixnet systems have the opposite layout. Ballot selections can usually be encoded into a single ciphertext, and proofs of validity are not essential as ciphertexts are decrypted after anonymization. However, the process of anonymization, the shuffle, is computationally intensive and grows in complexity the higher the degree of trust distribution is required. Depending on the techniques used, the size of the electorate and the hardware involved a tally can take up to hours in the worst cases.</p><p>Both homomorphic and mixnet based systems may encounter situations which make it a suboptimal choice. But while it is difficult to remedy cases in which client devices cannot be expected to compute large numbers of ciphertexts and proofs, it is usually easier to “throw hardware at the problem” on the backend. For this reason mixnets are more robust to demanding performance scenarios. However, when they can be applied, homomorphic systems show significantly better performance than mixnet systems in general. </p>						</div>
				</div>
				<div class="elementor-element elementor-element-c5afd92 elementor-widget elementor-widget-heading" data-id="c5afd92" data-element_type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
			<h3 class="elementor-heading-title elementor-size-default">Privacy</h3>		</div>
				</div>
				<div class="elementor-element elementor-element-2fa3f79 elementor-widget elementor-widget-text-editor" data-id="2fa3f79" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>There are different degrees to which a voting system can be said to achieve privacy. The most common and basic requirement is ballot secrecy: the voting system does not reveal who voted for what. There are stronger notions of privacy such as receipt-freeness, where the voter cannot prove how they voted, and coercion resistance where the voter is able to cast their chosen vote even under the influence of a coercer.</p><p>Homomorphic and mixnet based e-voting systems have been the subject of academic research for decades in an attempt to satisfy these requirements. While many proposals exist that achieve ballot secrecy, receipt-freeness and coercion resistance are still an open problem. Our comparison with respect to privacy is then limited to ballot secrecy.</p><p>If constructed correctly (including choices for security parameters), and modulo implementation complexity aspects, both types of systems offer comparable ballot secrecy using cryptography that relies on well known hardness assumptions. In fact, in prominent instances of protocols of both kinds there is overlap in the cryptographic techniques with identical security properties, as is the case for example when using the <a href="https://en.wikipedia.org/wiki/ElGamal_encryption">ElGamal</a> cryptosystem.</p><p>There are some considerations that escape a binary definition of ballot secrecy. One could argue that the tally counts are a form of leakage since they reveal more information than strictly the final result itself, a concern addressed by research into <a href="https://eprint.iacr.org/2020/405.pdf">tally-hiding</a> schemes. But this is true for both types of systems; homomorphic e-voting systems are not fully homomorphic, and are unable to perform arbitrary computations in ciphertext space to yield leak free results. In summary, we consider homomorphic and mixnet systems to be comparable with respect to privacy.</p>						</div>
				</div>
				<div class="elementor-element elementor-element-5c1b403 elementor-widget elementor-widget-heading" data-id="5c1b403" data-element_type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
			<h3 class="elementor-heading-title elementor-size-default">Verifiability</h3>		</div>
				</div>
				<div class="elementor-element elementor-element-a25b3c0 elementor-widget elementor-widget-text-editor" data-id="a25b3c0" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>The gold standard for secure voting systems is <a href="https://escholarship.org/content/qt7c9994dg/qt7c9994dg_noSplash_97d64dc5a809c552701079250f47b4cb.pdf">end-to-end verifiability</a>. A system is end-to-end verifiable if it is possible to certify that each of the key operations that make up an election (ballot casting, ballot recording and ballot counting) have been executed correctly. The question then becomes about whether homomorphic and mixnet systems can satisfy the requirements that make a system end-to-end verifiable.</p><p>Again, homomorphic and mixnet based e-voting systems have been the subject of academic research to satisfy these requirements. Within the category of end-to-end verifiability, there exist different proposals as to how each step of the verification takes place. One notable step is cast-as-intended verification, for which adequate usability is still an open problem. But whatever mechanisms are chosen to perform these verifications, they are generally equally applicable to both homomorphic and mixnet systems.</p><p>We can say that, if constructed correctly, both types of systems achieve comparable levels of verifiability;  there are many examples of both types in the academic <a href="https://arxiv.org/pdf/1605.08554.pdf">literature</a> on end-to-end verifiable systems. <a href="https://www.usenix.org/legacy/events/sec08/tech/full_papers/adida/adida.pdf">Helios</a> in particular is a system that has been proposed in both homomorphic and mixnet variants. In summary, we consider homomorphic and mixnet based systems to be comparable with respect to verifiability.</p>						</div>
				</div>
				<div class="elementor-element elementor-element-d59c7b2 elementor-widget elementor-widget-heading" data-id="d59c7b2" data-element_type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
			<h2 class="elementor-heading-title elementor-size-default">Conclusion</h2>		</div>
				</div>
				<div class="elementor-element elementor-element-e673384 elementor-widget elementor-widget-text-editor" data-id="e673384" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>One would think that the conclusion of our qualitative comparison between homomorphic and mixnet based systems would favour the former, given that it edges out its mixnet counterpart in more of the categories above. However, this advantage only manifests in the concrete cases where homomorphic systems can be applied at all. In contrast, mixnets can handle a much wider range of scenarios, albeit at a higher complexity cost. If one requires a system for a particular use case which does not rule out homomorphic based systems, they are better. But if one wants a future proof system that can be relied upon in general, mixnets are a better choice.</p>						</div>
				</div>
				</div>
					</div>
				</div>
				</div>
		<p>The post <a href="/blog/homomorphic-vs-mixnet-based-e-voting/">Homomorphic vs Mixnet Based E-voting</a> appeared first on <a href="/">Sequent</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Uncertainty, Cryptography and Information</title>
		<link>/research/uncertainty-cryptography-and-information/</link>
		
		<dc:creator><![CDATA[Serhii Bohynia]]></dc:creator>
		<pubDate>Wed, 07 Dec 2022 05:46:27 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Research]]></category>
		<category><![CDATA[blog]]></category>
		<guid isPermaLink="false">/?p=2001</guid>

					<description><![CDATA[<p>This post will discuss three types of uncertainty and how they can be used to understand cryptography. According to Wikipedia, uncertainty refers to an incomplete and/or unknown piece of information. A prediction is an estimate of what will occur in the future, an estimate of what has already been measured or an estimate of what is [&#8230;]</p>
<p>The post <a href="/research/uncertainty-cryptography-and-information/">Uncertainty, Cryptography and Information</a> appeared first on <a href="/">Sequent</a>.</p>
]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="2001" class="elementor elementor-2001" data-elementor-post-type="post">
				<div class="elementor-element elementor-element-1ecdff7f e-flex e-con-boxed e-con e-parent" data-id="1ecdff7f" data-element_type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-2fb94946 elementor-widget elementor-widget-text-editor" data-id="2fb94946" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>This post will discuss three types of uncertainty and how they can be used to understand cryptography. According to <a href="https://en.wikipedia.org/wiki/Uncertainty">Wikipedia</a>, uncertainty refers to an incomplete and/or unknown piece of information. A prediction is an estimate of what will occur in the future, an estimate of what has already been measured or an estimate of what is yet to be measured.</p>						</div>
				</div>
					</div>
				</div>
		<div class="elementor-element elementor-element-e120930 e-flex e-con-boxed e-con e-parent" data-id="e120930" data-element_type="container" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}">
					<div class="e-con-inner">
		<div class="elementor-element elementor-element-67c5db77 e-con-full e-flex elementor-invisible e-con e-child" data-id="67c5db77" data-element_type="container" data-settings="{&quot;animation&quot;:&quot;fadeInLeft&quot;}">
				<div class="elementor-element elementor-element-794a7d78 elementor-widget elementor-widget-button" data-id="794a7d78" data-element_type="widget" data-widget_type="button.default">
				<div class="elementor-widget-container">
					<div class="elementor-button-wrapper">
			<a class="elementor-button elementor-button-link elementor-size-sm" href="/blog/">
						<span class="elementor-button-content-wrapper">
						<span class="elementor-button-icon elementor-align-icon-left">
				<i aria-hidden="true" class="fas fa-angle-left"></i>			</span>
									<span class="elementor-button-text">Go Back</span>
					</span>
					</a>
		</div>
				</div>
				</div>
				<div class="elementor-element elementor-element-70cca9a3 elementor-widget elementor-widget-heading" data-id="70cca9a3" data-element_type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
			<div class="elementor-heading-title elementor-size-default">Blog</div>		</div>
				</div>
				<div class="elementor-element elementor-element-116d5b8b elementor-widget__width-inherit elementor-widget elementor-widget-theme-post-title elementor-page-title elementor-widget-heading" data-id="116d5b8b" data-element_type="widget" data-widget_type="theme-post-title.default">
				<div class="elementor-widget-container">
			<h1 class="elementor-heading-title elementor-size-default">Uncertainty, Cryptography and Information</h1>		</div>
				</div>
				<div class="elementor-element elementor-element-2fc8fd4c elementor-widget elementor-widget-text-editor" data-id="2fc8fd4c" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<span>Blog</span>, <span>Research</span>						</div>
				</div>
				</div>
					</div>
				</div>
		<div class="elementor-element elementor-element-46c1147f e-flex e-con-boxed e-con e-parent" data-id="46c1147f" data-element_type="container">
					<div class="e-con-inner">
		<div class="elementor-element elementor-element-748e348c e-con-full e-flex e-con e-child" data-id="748e348c" data-element_type="container">
				<div class="elementor-element elementor-element-393fd698 uael-heading-align-left elementor-widget elementor-widget-uael-table-of-contents" data-id="393fd698" data-element_type="widget" data-settings="{&quot;heading_bottom_space&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:0,&quot;sizes&quot;:[]},&quot;content_between_space&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:16,&quot;sizes&quot;:[]},&quot;sticky&quot;:&quot;top&quot;,&quot;sticky_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;],&quot;scroll_offset&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;scroll_offset_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;scroll_offset_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;heading_text_align&quot;:&quot;left&quot;,&quot;heading_bottom_space_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;heading_bottom_space_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;separator_bottom_space&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;separator_bottom_space_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;separator_bottom_space_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;content_between_space_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;content_between_space_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;sticky_offset&quot;:0,&quot;sticky_effects_offset&quot;:0}" data-widget_type="uael-table-of-contents.default">
				<div class="elementor-widget-container">
					<div class="uael-toc-main-wrapper" data-headings="h2,h3" >
			<div class="uael-toc-wrapper">
				<div class="uael-toc-header">
					<span class="uael-toc-heading elementor-inline-editing" data-elementor-setting-key="heading_title" data-elementor-inline-editing-toolbar="basic" ></span>
									</div>
								<div class="uael-toc-toggle-content">
					<div class="uael-toc-content-wrapper">
						
							<ul data-toc-headings="headings" class="uael-toc-list uael-toc-list-none" data-scroll="500" ></ul>
											</div>
				</div>
				<div class="uael-toc-empty-note">
					<span>Add a header to begin generating the table of contents</span>
				</div>
			</div>
					</div>
				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-4b49b3ab e-con-full e-flex e-con e-child" data-id="4b49b3ab" data-element_type="container">
				<div class="elementor-element elementor-element-67a3783b elementor-widget elementor-widget-image" data-id="67a3783b" data-element_type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
													<img loading="lazy" decoding="async" width="768" height="403" src="/wp-content/uploads/2024/03/case-study-768x403-1.png" class="attachment-full size-full wp-image-2002" alt="" srcset="/wp-content/uploads/2024/03/case-study-768x403-1.png 768w, /wp-content/uploads/2024/03/case-study-768x403-1-300x157.png 300w" sizes="(max-width: 768px) 100vw, 768px" />													</div>
				</div>
		<div class="elementor-element elementor-element-10756514 e-flex e-con-boxed e-con e-child" data-id="10756514" data-element_type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-47ed3a92 elementor-widget elementor-widget-text-editor" data-id="47ed3a92" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>This post will discuss three types of uncertainty and how they can be used to understand cryptography. According to <a href="https://en.wikipedia.org/wiki/Uncertainty">Wikipedia</a>, uncertainty refers to an incomplete and/or unknown piece of information.</p><p>A prediction is an estimate of what will occur in the future, an estimate of what has already been measured or an estimate of what is yet to be measured.</p><p>Here, we need to consider two main concepts: information and knowledge. Uncertainty can be defined as a lack of information or knowledge. As we’ll see, these two concepts are not equivalent and do not cover every situation. In order to understand uncertainty, we need to start at the strongest level.</p>						</div>
				</div>
				<div class="elementor-element elementor-element-fcef17f elementor-widget elementor-widget-heading" data-id="fcef17f" data-element_type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
			<h2 class="elementor-heading-title elementor-size-default">Ontological Uncertainty: Indeterminacy</h2>		</div>
				</div>
					</div>
				</div>
		<div class="elementor-element elementor-element-17b34b77 e-con-full e-flex e-con e-child" data-id="17b34b77" data-element_type="container">
				<div class="elementor-element elementor-element-726d32c2 elementor-widget elementor-widget-image" data-id="726d32c2" data-element_type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
													<img loading="lazy" decoding="async" width="220" height="250" src="/wp-content/uploads/2024/03/sphere-1.png" class="attachment-large size-large wp-image-2005" alt="" />													</div>
				</div>
				<div class="elementor-element elementor-element-172ef877 elementor-widget elementor-widget-text-editor" data-id="172ef877" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>The Bloch sphere representing the state of a spin 1/2 particle.</p>						</div>
				</div>
				</div>
				<div class="elementor-element elementor-element-1e8025d3 elementor-widget elementor-widget-text-editor" data-id="1e8025d3" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>As described in quantum mechanics, certain particles (spin 1/2 particles like electrons) have a property called spin that gives two discrete results, called “spin up” and “spin down”. The equation below describes this.</p>						</div>
				</div>
				<div class="elementor-element elementor-element-4d7bba2 elementor-widget elementor-widget-image" data-id="4d7bba2" data-element_type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
													<img loading="lazy" decoding="async" width="151" height="20" src="/wp-content/uploads/2024/03/eq0.png" class="attachment-large size-large wp-image-2009" alt="" />													</div>
				</div>
				<div class="elementor-element elementor-element-e6f5901 elementor-widget elementor-widget-text-editor" data-id="e6f5901" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>As a result, the probability of getting spin up equals α, and the probability of getting spin down equalsβ².</p><p>If we were to measure the spin before we measured it, would it be up or down? The equation above, however, only gives us probabilities for what will happen when we measure. We might ask ourselves, before we measure it, is the spin up or down? But the equation above only gives us probabilities of what will happen when we make the measurement.</p><p>According to mainstream interpretations of quantum mechanics, we cannot know what the spin value was before the measurement. Furthermore, it is impossible to predict what the measurement will reveal before it occurs. Our question requires information that presently doesn’t exist.</p><p>As a result of this intrinsic indeterminacy, we use the term ontological uncertainty: uncertainty is not a property of knowledge, but one of nature. Our confusion results from an ontological mismatch between nature and our models of it. This type of uncertainty can be summarized as follows:</p><p>We cannot know the information because it does not exist.</p><p>As a side note, the Heisenberg uncertainty principle is not very well named, since it is similar to the subject of the next section. The indeterminacy principle would be a better name.</p>						</div>
				</div>
				<div class="elementor-element elementor-element-5a5b2c9 elementor-widget elementor-widget-heading" data-id="5a5b2c9" data-element_type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
			<h2 class="elementor-heading-title elementor-size-default">Information Deficit: Epistemic Uncertainty
</h2>		</div>
				</div>
				<div class="elementor-element elementor-element-67b84831 elementor-widget elementor-widget-text-editor" data-id="67b84831" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>We began with the strongest and strangest form of uncertainty. The second type is encountered when dealing with incomplete information every day. Unlike the previous type of uncertainty, this uncertainty is a property of our state of knowledge, not of nature. For example, when we ask what caused dinosaur extinction, we are referring to a fact about reality, no matter how accessible it may be. In poker, when we wonder whether we have the best hand, we are referring to an unknown but existing fact, the set of all hands dealt.</p><p>In fields such as information theory, probability, and thermodynamics, uncertainty is treated as incomplete information. The technical term is entropy, and it’s measured in bits. If a description lacks a lot of information, it is said to have high entropy. In asking whether the coin will land heads or tails, we are missing one bit of information. Three bits are missing if we ask what number will come out of a fair 8-sided die. There are more possibilities in a die throw than in a coin flip, so there is a higher degree of uncertainty about the outcome. As a result, it has more entropy bits. This type of uncertainty can be summarized as follows:</p><p>We do not know the information, but it exists.</p><p>Before I finish, I would like to clarify a few things. Here’s the reason why the concept of randomness didn’t appear when discussing coin flips and die rolls. This section discusses classical physics, where phenomena are deterministic even if we don’t know all of the initial conditions. There is a combination of determinism and unknown initial conditions that underlies the use of randomness at the macroscale. Subjective randomness is sometimes used to distinguish it from intrinsic randomness, which is an alternative term for ontological uncertainty.</p>						</div>
				</div>
		<div class="elementor-element elementor-element-7475526 e-con-full e-flex e-con e-child" data-id="7475526" data-element_type="container">
				<div class="elementor-element elementor-element-830aebf elementor-widget elementor-widget-image" data-id="830aebf" data-element_type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
													<img loading="lazy" decoding="async" width="303" height="253" src="/wp-content/uploads/2024/03/eq2.jpg" class="attachment-large size-large wp-image-2010" alt="" srcset="/wp-content/uploads/2024/03/eq2.jpg 303w, /wp-content/uploads/2024/03/eq2-300x250.jpg 300w" sizes="(max-width: 303px) 100vw, 303px" />													</div>
				</div>
				<div class="elementor-element elementor-element-367f398 elementor-widget elementor-widget-text-editor" data-id="367f398" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>A deterministic coin flipping machine</p>						</div>
				</div>
				</div>
				<div class="elementor-element elementor-element-26e3833a elementor-widget elementor-widget-heading" data-id="26e3833a" data-element_type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
			<h2 class="elementor-heading-title elementor-size-default">The Third Type…
</h2>		</div>
				</div>
				<div class="elementor-element elementor-element-34fbb49b elementor-widget elementor-widget-text-editor" data-id="34fbb49b" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>Now for the interesting part. Imagine I have all the information about something, but I still don’t know everything about it. Sounds contradictory right? Here’s an example to illustrate this kind of situation.</p><ol><li aria-level="1">All men are mortal</li><li aria-level="1">Socrates is a man</li></ol><p>If now somebody tells you that</p><ol start="3"><li>Socrates is mortal.</li></ol><p>Are they giving you any information? Hopefully it seems to you like they told you something you already knew. Was there any information prior to giving statement 3? Put differently, does statement 3 contain any information not present in 1,2?</p>						</div>
				</div>
		<div class="elementor-element elementor-element-1ac15ee e-con-full e-flex e-con e-child" data-id="1ac15ee" data-element_type="container">
				<div class="elementor-element elementor-element-d12ff1c elementor-widget elementor-widget-image" data-id="d12ff1c" data-element_type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
													<img loading="lazy" decoding="async" width="718" height="934" src="/wp-content/uploads/2024/03/eq3.png" class="attachment-large size-large wp-image-2011" alt="" srcset="/wp-content/uploads/2024/03/eq3.png 718w, /wp-content/uploads/2024/03/eq3-231x300.png 231w" sizes="(max-width: 718px) 100vw, 718px" />													</div>
				</div>
				<div class="elementor-element elementor-element-42f0a31 elementor-widget elementor-widget-text-editor" data-id="42f0a31" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>One of the 24 valid syllogism types</p>						</div>
				</div>
				</div>
				<div class="elementor-element elementor-element-3cdcffbc elementor-widget elementor-widget-text-editor" data-id="3cdcffbc" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>Consider another example.</p><ol><li aria-level="1">x = 1051</li><li aria-level="1">y = 3067</li><li aria-level="1">x * y = 3223417</li></ol><p> </p><p>In this case statement 3 tells us something we probably didn’t know. But does statement 3 contain information not present in 1 and 2? We can turn to definitions from information theory in order to provide an answer. Define three random variables (for convenience in some arbitrary range a-b)</p><p><b>x ∈ {a-b}, y ∈ {a-b}, x*y {…}</b></p><p>We can calculate the conditional entropy according to the standard equation which in our case gives</p><p><b>H(x*y | x, y) = 0</b></p><p>The conditional entropy of x<i>y given x and y is zero. This is simply a technical way to say that given statements 1 and 2, statement 3 contains no extra information: whatever 3 tells us was already contained in 1,2. Once x and y are fixed, x</i>y follows necessarily. This brings us back to the beginning of the post.</p><p>We could say that uncertainty is lack of knowledge or even lack of information. As we’ll see, these two ideas are not equivalent and cannot be applied to every situation.</p><p>The two ideas differ now, as should be evident. In this case, we have all the information about something (x, y), but we do not know everything about it (x*y).</p>						</div>
				</div>
				<div class="elementor-element elementor-element-f80077c elementor-widget elementor-widget-heading" data-id="f80077c" data-element_type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
			<h2 class="elementor-heading-title elementor-size-default">Logical Uncertainty: Computation Deficit
</h2>		</div>
				</div>
				<div class="elementor-element elementor-element-5776046d elementor-widget elementor-widget-text-editor" data-id="5776046d" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>It is computation that bridges having all the information with having all the knowledge. In the Socrates syllogism, deducing (computing) the conclusion from the premises adds no information. A calculation based on x and y does not produce an answer. Despite the fact that the information was always there, computation can tell us things we did not know.</p>						</div>
				</div>
		<div class="elementor-element elementor-element-0f77a7d e-con-full e-flex e-con e-child" data-id="0f77a7d" data-element_type="container">
				<div class="elementor-element elementor-element-9d4d0c0 elementor-widget elementor-widget-image" data-id="9d4d0c0" data-element_type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
													<img loading="lazy" decoding="async" width="250" height="250" src="/wp-content/uploads/2024/03/eq4.png" class="attachment-large size-large wp-image-2012" alt="" srcset="/wp-content/uploads/2024/03/eq4.png 250w, /wp-content/uploads/2024/03/eq4-150x150.png 150w" sizes="(max-width: 250px) 100vw, 250px" />													</div>
				</div>
				<div class="elementor-element elementor-element-96bbe20 elementor-widget elementor-widget-text-editor" data-id="96bbe20" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>We are uncertain about the blanks, even though we have all the necessary information to fill them.</p>						</div>
				</div>
				</div>
				<div class="elementor-element elementor-element-b591672 elementor-widget elementor-widget-text-editor" data-id="b591672" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>The goal of computing is to derive implicit consequences from data. The distinction between deducing the conclusion of a simple syllogism and multiplying two large numbers is one of degree, not kind. There is a clear difference, however, in that without sufficient computation, we will remain uncertain about things that are already present. At the high end, there are cases such as Fermat’s last theorem, about which mathematicians have been unsure for 350 years. We conclude with a summary of logical uncertainty:</p><p>We have all of the information, but there are logical consequences we are unaware of.</p>						</div>
				</div>
		<div class="elementor-element elementor-element-0b678c0 e-con-full e-flex e-con e-child" data-id="0b678c0" data-element_type="container">
				<div class="elementor-element elementor-element-d4b3649 elementor-widget elementor-widget-image" data-id="d4b3649" data-element_type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
													<img loading="lazy" decoding="async" width="523" height="926" src="/wp-content/uploads/2024/03/eq5.png" class="attachment-large size-large wp-image-2013" alt="" srcset="/wp-content/uploads/2024/03/eq5.png 523w, /wp-content/uploads/2024/03/eq5-169x300.png 169w" sizes="(max-width: 523px) 100vw, 523px" />													</div>
				</div>
				<div class="elementor-element elementor-element-5869d70 elementor-widget elementor-widget-text-editor" data-id="5869d70" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>Pierre de Fermat</p>						</div>
				</div>
				</div>
				<div class="elementor-element elementor-element-8d693d9 elementor-widget elementor-widget-heading" data-id="8d693d9" data-element_type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
			<h2 class="elementor-heading-title elementor-size-default">Cryptography: Secrecy and Uncertainty
</h2>		</div>
				</div>
				<div class="elementor-element elementor-element-1ceb16f4 elementor-widget elementor-widget-text-editor" data-id="1ceb16f4" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>Cryptography (from Greek kryptós, “hidden, secret,” and v graphein, “writing”) is the practice and study of secure communication techniques in the presence of third parties known as adversaries.</p><p>The key word here is “secret,” which should remind us of our uncertainty. To say that we want a message to remain secret from an adversary is to say that we want this adversary to be unsure about the message’s content. Although our first instinct would lead us to believe that epistemic uncertainty exists, this is not always the case.</p><p>Consider the Caesar cipher, named after Julius Caesar, who used it over 2000 years ago. Each letter in the message is replaced by another letter obtained by shifting the alphabet a fixed number of places. This number of locations serves as the encryption key. For example, with a +3 shift</p>						</div>
				</div>
				<div class="elementor-element elementor-element-d398328 elementor-blockquote--skin-border elementor-blockquote--button-color-official elementor-widget elementor-widget-blockquote" data-id="d398328" data-element_type="widget" data-widget_type="blockquote.default">
				<div class="elementor-widget-container">
			<style>/*! elementor-pro - v3.21.0 - 20-05-2024 */
@charset "UTF-8";.entry-content blockquote.elementor-blockquote:not(.alignright):not(.alignleft),.entry-summary blockquote.elementor-blockquote{margin-right:0;margin-left:0}.elementor-widget-blockquote blockquote{margin:0;padding:0;outline:0;font-size:100%;vertical-align:baseline;background:transparent;quotes:none;border:0;font-style:normal;color:#3f444b}.elementor-widget-blockquote blockquote .e-q-footer:after,.elementor-widget-blockquote blockquote .e-q-footer:before,.elementor-widget-blockquote blockquote:after,.elementor-widget-blockquote blockquote:before,.elementor-widget-blockquote blockquote cite:after,.elementor-widget-blockquote blockquote cite:before{content:none}.elementor-blockquote{transition:.3s}.elementor-blockquote__author,.elementor-blockquote__content{margin-bottom:0;font-style:normal}.elementor-blockquote__author{font-weight:700}.elementor-blockquote .e-q-footer{margin-top:12px;display:flex;justify-content:space-between}.elementor-blockquote__tweet-button{display:flex;transition:.3s;color:#1da1f2;align-self:flex-end;line-height:1;position:relative;width:-moz-max-content;width:max-content}.elementor-blockquote__tweet-button:hover{color:#0967a0}.elementor-blockquote__tweet-button span{font-weight:600}.elementor-blockquote__tweet-button i,.elementor-blockquote__tweet-button span{vertical-align:middle}.elementor-blockquote__tweet-button i+span,.elementor-blockquote__tweet-button svg+span{margin-inline-start:.5em}.elementor-blockquote__tweet-button svg{fill:#1da1f2;height:1em;width:1em}.elementor-blockquote__tweet-label{white-space:pre-wrap}.elementor-blockquote--button-skin-bubble .elementor-blockquote__tweet-button,.elementor-blockquote--button-skin-classic .elementor-blockquote__tweet-button{padding:.7em 1.2em;border-radius:100em;background-color:#1da1f2;color:#fff;font-size:15px}.elementor-blockquote--button-skin-bubble .elementor-blockquote__tweet-button:hover,.elementor-blockquote--button-skin-classic .elementor-blockquote__tweet-button:hover{background-color:#0967a0;color:#fff}.elementor-blockquote--button-skin-bubble .elementor-blockquote__tweet-button:hover:before,.elementor-blockquote--button-skin-classic .elementor-blockquote__tweet-button:hover:before{border-inline-end-color:#0967a0}.elementor-blockquote--button-skin-bubble .elementor-blockquote__tweet-button svg,.elementor-blockquote--button-skin-classic .elementor-blockquote__tweet-button svg{fill:#fff;height:1em;width:1em}.elementor-blockquote--button-skin-bubble.elementor-blockquote--button-view-icon .elementor-blockquote__tweet-button,.elementor-blockquote--button-skin-classic.elementor-blockquote--button-view-icon .elementor-blockquote__tweet-button{padding:0;width:2em;height:2em}.elementor-blockquote--button-skin-bubble.elementor-blockquote--button-view-icon .elementor-blockquote__tweet-button i,.elementor-blockquote--button-skin-classic.elementor-blockquote--button-view-icon .elementor-blockquote__tweet-button i{position:absolute;left:50%;top:50%;transform:translate(-50%,-50%)}.elementor-blockquote--button-skin-bubble .elementor-blockquote__tweet-button:before{content:"";border:.5em solid transparent;border-inline-end-color:#1da1f2;position:absolute;left:-.8em;top:50%;transform:translateY(-50%) scaleY(.65);transition:.3s}.elementor-blockquote--button-skin-bubble.elementor-blockquote--align-left .elementor-blockquote__tweet-button:before{right:auto;left:-.8em;border-right-color:#1da1f2;border-left-color:transparent}.elementor-blockquote--button-skin-bubble.elementor-blockquote--align-left .elementor-blockquote__tweet-button:hover:before{border-right-color:#0967a0}.elementor-blockquote--button-skin-bubble.elementor-blockquote--align-right .elementor-blockquote__tweet-button:before{left:auto;right:-.8em;border-right-color:transparent;border-left-color:#1da1f2}.elementor-blockquote--button-skin-bubble.elementor-blockquote--align-right .elementor-blockquote__tweet-button:hover:before{border-left-color:#0967a0}.elementor-blockquote--skin-boxed .elementor-blockquote{background-color:#f9fafa;padding:30px}.elementor-blockquote--skin-border .elementor-blockquote{border-color:#f9fafa;border-style:solid;border-inline-start-width:7px;padding-inline-start:20px}.elementor-blockquote--skin-quotation .elementor-blockquote:before{content:"“";font-size:100px;color:#f9fafa;font-family:Times New Roman,Times,serif;font-weight:900;line-height:1;display:block;height:.6em}.elementor-blockquote--skin-quotation .elementor-blockquote__content{margin-top:15px}.elementor-blockquote--align-left .elementor-blockquote__content{text-align:left}.elementor-blockquote--align-left .elementor-blockquote .e-q-footer{flex-direction:row}.elementor-blockquote--align-right .elementor-blockquote__content{text-align:right}.elementor-blockquote--align-right .elementor-blockquote .e-q-footer{flex-direction:row-reverse}.elementor-blockquote--align-center .elementor-blockquote{text-align:center}.elementor-blockquote--align-center .elementor-blockquote .e-q-footer,.elementor-blockquote--align-center .elementor-blockquote__author{display:block}.elementor-blockquote--align-center .elementor-blockquote__tweet-button{margin-right:auto;margin-left:auto}</style>		<blockquote class="elementor-blockquote">
			<p class="elementor-blockquote__content">
				abcdefghijklmnopqrstuvwxyz defghijklmnopqrstuvwxyzabc			</p>
					</blockquote>
				</div>
				</div>
				<div class="elementor-element elementor-element-649281a9 elementor-widget elementor-widget-text-editor" data-id="649281a9" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>Let’s encrypt a message using this +3 key:</p>						</div>
				</div>
				<div class="elementor-element elementor-element-cbfdc67 elementor-blockquote--skin-border elementor-blockquote--button-color-official elementor-widget elementor-widget-blockquote" data-id="cbfdc67" data-element_type="widget" data-widget_type="blockquote.default">
				<div class="elementor-widget-container">
					<blockquote class="elementor-blockquote">
			<p class="elementor-blockquote__content">
				cryptography is based on uncertainty fubswrjudskb lv edvhg rq xqfhuwdlqwb

			</p>
					</blockquote>
				</div>
				</div>
				<div class="elementor-element elementor-element-c26e494 elementor-widget elementor-widget-text-editor" data-id="c26e494" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>We hope that if our adversary obtains the encrypted message, he/she will not discover its secret, whereas our intended recipient, knowing the +3 shift key, can recover it by using the reverse procedure (-3 shift). When analyzing ciphers, we assume that our adversary will intercept our messages and will also know the procedure, if not the key (in this case +3) used to encrypt them. Assume we are the adversary and capture this encrypted message using these assumptions:</p>						</div>
				</div>
				<div class="elementor-element elementor-element-1d36afc elementor-blockquote--skin-border elementor-blockquote--button-color-official elementor-widget elementor-widget-blockquote" data-id="1d36afc" data-element_type="widget" data-widget_type="blockquote.default">
				<div class="elementor-widget-container">
					<blockquote class="elementor-blockquote">
			<p class="elementor-blockquote__content">
				govv nyxo iye rkfo pyexn dro combod

			</p>
					</blockquote>
				</div>
				</div>
				<div class="elementor-element elementor-element-1e7c4e5 elementor-widget elementor-widget-text-editor" data-id="1e7c4e5" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>We want to know the secret, but we don’t know what key shift value it is. However, because the alphabet has 26 characters, there are only 25 possible shifts; a shift of 26 leaves the message unchanged. So, why not try all of the keys and see what happens:</p>						</div>
				</div>
				<div class="elementor-element elementor-element-b16761d elementor-blockquote--skin-border elementor-blockquote--button-color-official elementor-widget elementor-widget-blockquote" data-id="b16761d" data-element_type="widget" data-widget_type="blockquote.default">
				<div class="elementor-widget-container">
					<blockquote class="elementor-blockquote">
			<p class="elementor-blockquote__content">
				FNUU MXWN HXD QJEN OXDWM CQN BNLANC EMTT LWVM GWC PIDM NWCVL BPM AMKZMB DLSS KVUL FVB OHCL MVBUK AOL ZLJYLA CKRR JUTK EUA NGBK LUATJ ZNK YKIXKZ BJQQ ITSJ DTZ MFAJ KTZSI YMJ XJHWJY AIPP HSRI CSY LEZI JSYRH XLI WIGVIX ZHOO GRQH BRX KDYH IRXQG WKH VHFUHW YGNN FQPG AQW JCXG HQWPF VJG UGETGV XFMM EPOF ZPV IBWF GPVOE UIF TFDSFU WELL DONE YOU HAVE FOUND THE SECRET VDKK CNMD XNT GZUD ENTMC SGD RDBQDS UCJJ BMLC WMS FYTC DMSLB RFC QCAPCR TBII ALKB VLR EXSB CLRKA QEB PBZOBQ SAHH ZKJA UKQ DWRA BKQJZ PDA OAYNAP RZGG YJIZ TJP CVQZ AJPIY OCZ NZXMZO QYFF XIHY SIO BUPY ZIOHX NBY MYWLYN PXEE WHGX RHN ATOX YHNGW MAX LXVKXM OWDD VGFW QGM ZSNW XGMFV LZW KWUJWL NVCC UFEV PFL YRMV WFLEU KYV JVTIVK MUBB TEDU OEK XQLU VEKDT JXU IUSHUJ LTAA SDCT NDJ WPKT UDJCS IWT HTRGTI KSZZ RCBS MCI VOJS TCIBR HVS GSQFSH JRYY QBAR LBH UNIR SBHAQ GUR FRPERG IQXX PAZQ KAG TMHQ RAGZP FTQ EQODQF HPWW OZYP JZF SLGP QZFYO ESP DPNCPE			</p>
					</blockquote>
				</div>
				</div>
				<div class="elementor-element elementor-element-cbe6083 elementor-widget elementor-widget-text-editor" data-id="cbe6083" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>When we tried a key shift of +10, we discovered the secret. Take note of how we were able to isolate the correct message when none of the other attempts yielded meaningful results. This is due to the fact that the space of possible keys is so limited that only one of them decrypts to a possible message. Technically, the key space and message space[2] are small enough in comparison to the length of the message that only one key is required to decrypt it. In terms of uncertainty, the following inequality[3] expresses this:</p>						</div>
				</div>
				<div class="elementor-element elementor-element-91ef68d elementor-widget elementor-widget-image" data-id="91ef68d" data-element_type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
													<img loading="lazy" decoding="async" width="395" height="61" src="/wp-content/uploads/2024/03/eq9.png" class="attachment-large size-large wp-image-2026" alt="" srcset="/wp-content/uploads/2024/03/eq9.png 395w, /wp-content/uploads/2024/03/eq9-300x46.png 300w" sizes="(max-width: 395px) 100vw, 395px" />													</div>
				</div>
				<div class="elementor-element elementor-element-bc1b6e2 elementor-widget elementor-widget-text-editor" data-id="bc1b6e2" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>The left part of the expression, H(Key | Ciphertext), indicates how much uncertainty about the key remains once the encrypted message has been obtained. Take note of the term S(c), which represents the number of keys required to decrypt a meaningful message. As previously stated, <b>S(c) = 1, resulting in H(K | C) = P(c) * log2 (1) = P(c) * 0 = 0.</b></p><p>In other words, once we know the encrypted message, there is no uncertainty about the key, and thus the secret message[4]. Of course, when we first captured this,</p>						</div>
				</div>
				<div class="elementor-element elementor-element-b957f9a elementor-blockquote--skin-border elementor-blockquote--button-color-official elementor-widget elementor-widget-blockquote" data-id="b957f9a" data-element_type="widget" data-widget_type="blockquote.default">
				<div class="elementor-widget-container">
					<blockquote class="elementor-blockquote">
			<p class="elementor-blockquote__content">
				govv nyxo iye rkfo pyexn dro combod

			</p>
					</blockquote>
				</div>
				</div>
				<div class="elementor-element elementor-element-3691961 elementor-widget elementor-widget-text-editor" data-id="3691961" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>We didn’t know the secret, but we had all the information we needed to find out. We were only logically uncertain about the secret and required computation rather than information to discover it.</p>						</div>
				</div>
		<div class="elementor-element elementor-element-8ba6824 e-con-full e-flex e-con e-child" data-id="8ba6824" data-element_type="container">
				<div class="elementor-element elementor-element-4a7d329 elementor-widget elementor-widget-image" data-id="4a7d329" data-element_type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
													<img loading="lazy" decoding="async" width="250" height="250" src="/wp-content/uploads/2024/03/eq6.jpg" class="attachment-large size-large wp-image-2027" alt="" srcset="/wp-content/uploads/2024/03/eq6.jpg 250w, /wp-content/uploads/2024/03/eq6-150x150.jpg 150w" sizes="(max-width: 250px) 100vw, 250px" />													</div>
				</div>
				<div class="elementor-element elementor-element-78fbc37 elementor-widget elementor-widget-text-editor" data-id="78fbc37" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>Alberti’s cipher disk (1470)</p>						</div>
				</div>
				</div>
				<div class="elementor-element elementor-element-208a368c elementor-widget elementor-widget-text-editor" data-id="208a368c" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>Although we have only seen this for the simple Caesar cipher, it turns out that, <a href="https://en.wikipedia.org/wiki/One-time_pad">with a large enough message to encrypt</a>, many ciphers have this property. This is true for public key ciphers, such as those used in many secure voting systems, regardless of message size. Because our adversaries have enough information to obtain the secret, we can say that practical cryptography is based on logical uncertainty. However, as previously demonstrated, there are various degrees of logical uncertainty. Cryptography is based on this uncertainty being “strong” enough to keep secrets safe.</p><p>Talking about degrees of logical uncertainty leads us to <a href="https://en.wikipedia.org/wiki/Computational_complexity_theory">computational complexity</a>.</p>						</div>
				</div>
				<div class="elementor-element elementor-element-f77cb74 elementor-widget elementor-widget-heading" data-id="f77cb74" data-element_type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
			<h2 class="elementor-heading-title elementor-size-default">Logical Uncertainty and Computational Complexity
</h2>		</div>
				</div>
				<div class="elementor-element elementor-element-f22a841 elementor-widget elementor-widget-text-editor" data-id="f22a841" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>Computational complexity can be said to measure logical uncertainty in the same way that entropy measures epistemic uncertainty. In probability theory, we investigate how much information is required to eliminate epistemic uncertainty. Computational complexity is the amount of computation required to remove logical uncertainty. We saw that while deducing the conclusion of Socrates’ syllogism was simple, multiplying two large numbers was difficult. Complexity considers how difficult these problems are in comparison to one another. So, if we’re looking for the foundations of cryptography, we should start there.</p><p>Consider the widely used <a href="https://en.wikipedia.org/wiki/RSA_(cryptosystem)">RSA</a> public key cryptosystem. This scheme is based on the computational difficulty of factoring large numbers, among other things. This situation can be represented by two statements, for example:</p><ul><li aria-level="1">X=1522605027922533360535618378132637429718068114961380688657908494580122963258952897654000350692006139</li></ul><ul><li aria-level="1">X=3797522793694367392280887275544562785456553663 199*40094690950920881030683735292761468389214899724061</li></ul><p> </p><p>Statement 2 (the factors) is implied by statement 1, but obtaining 2 from 1 necessitates considerable computational effort. In practice, an adversary who intercepts a message encrypted with the RSA scheme will need so much computation to decrypt it that this possibility is labeled infeasible. Let’s be a little more specific. This means that an adversary will <a href="https://en.wikipedia.org/wiki/RSA_numbers#RSA-768">need</a> thousands of years of computing time on a modern computer to complete the task using the fastest known algorithm.</p><p>If the previous statement did not set off alarm bells, perhaps I should emphasize the words “well-known algorithm.” We know that using known algorithms is impossible, but what if a faster algorithm is discovered? You’d think complexity theory would have a solution for that hypothetical situation. The simple truth is that it does not.</p><p>Problems for which efficient algorithms exist are classified as P in complexity theory. Although no efficient algorithm for integer factorization is known, whether it is in P or not is an open question[5]. In other words, we are logically unsure whether factorization occurs in P!</p>						</div>
				</div>
		<div class="elementor-element elementor-element-76b8f6a e-con-full e-flex e-con e-child" data-id="76b8f6a" data-element_type="container">
				<div class="elementor-element elementor-element-bd97150 elementor-widget elementor-widget-image" data-id="bd97150" data-element_type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
													<img loading="lazy" decoding="async" width="761" height="630" src="/wp-content/uploads/2024/03/eq10.png" class="attachment-large size-large wp-image-2029" alt="" srcset="/wp-content/uploads/2024/03/eq10.png 761w, /wp-content/uploads/2024/03/eq10-300x248.png 300w" sizes="(max-width: 761px) 100vw, 761px" />													</div>
				</div>
				<div class="elementor-element elementor-element-367b5df elementor-widget elementor-widget-text-editor" data-id="367b5df" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>Several complexity classes</p>						</div>
				</div>
				</div>
				<div class="elementor-element elementor-element-2dec7c3 elementor-widget elementor-widget-text-editor" data-id="2dec7c3" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>Assuming that integer factorization does not exist in P, a message encrypted with RSA is secure. To ensure an adversary’s logical uncertainty about secret messages, cryptographic techniques rely on assumptions that are the subject of logical uncertainty at the computational complexity level! Not what you want to find when looking for foundations.</p>						</div>
				</div>
				<div class="elementor-element elementor-element-0b70157 elementor-widget elementor-widget-heading" data-id="0b70157" data-element_type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
			<h2 class="elementor-heading-title elementor-size-default">In Conclusion
</h2>		</div>
				</div>
				<div class="elementor-element elementor-element-6f920b5 elementor-widget elementor-widget-text-editor" data-id="6f920b5" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>But it’s not all that bad. When you think about it, it’s not so much whether factorization and other problems are in P as it is whether adversaries will find the corresponding efficient algorithms. The condition that factorization is in P and that efficient algorithms are discovered secretly by adversaries is far more powerful than the first requirement alone. More importantly, the second condition appears to be one for which we can find some evidence.</p><p>It is debatable whether or not <a href="https://wiki.lesswrong.com/wiki/Evidence">evidence</a> can be found for a logical statement. Is the fact that no one has proven that factorization is in P evidence that it isn’t? Some <a href="http://www.scottaaronson.com/blog/?p=1720">say</a> yes, while others say no. However, it appears less controversial to assert that the fact that no algorithm has been discovered serves as evidence for the possibility that we (as a species with a given level of cognitive and scientific advancement) will not discover it in the near future.</p>						</div>
				</div>
		<div class="elementor-element elementor-element-0d77264 e-con-full e-flex e-con e-child" data-id="0d77264" data-element_type="container">
				<div class="elementor-element elementor-element-9351933 elementor-widget elementor-widget-image" data-id="9351933" data-element_type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
													<img loading="lazy" decoding="async" width="450" height="160" src="/wp-content/uploads/2024/03/eq8.png" class="attachment-large size-large wp-image-2030" alt="" srcset="/wp-content/uploads/2024/03/eq8.png 450w, /wp-content/uploads/2024/03/eq8-300x107.png 300w" sizes="(max-width: 450px) 100vw, 450px" />													</div>
				</div>
				<div class="elementor-element elementor-element-d5641a9 elementor-widget elementor-widget-text-editor" data-id="d5641a9" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>Several complexity classes</p>						</div>
				</div>
				</div>
				<div class="elementor-element elementor-element-856b13f elementor-widget elementor-widget-text-editor" data-id="856b13f" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>The bottom line for cryptography’s foundations is a matter of both logical and epistemic uncertainty. On the one hand, questions about computational complexity belong in the realm of logic, and empirical evidence for this appears conceptually shaky. However, the practical aspects of cryptography are dependent not only on complexity issues, but also on our ability to solve them. Another point to consider is that computational complexity informs us about the difficulty of algorithms given specific computational primitives.</p><p>However, the question of which primitives we have access to when developing computing devices is a matter of physics (as <a href="https://en.wikipedia.org/wiki/Shor%27s_algorithm">quantum computing</a> illustrates). This means that we can use empirical evidence about the physical world to justify or refute confidence in cryptography’s security. Today, the ultimate foundations of cryptography are formed by the combination of computational complexity results and empirical evidence about the world.</p>						</div>
				</div>
				<div class="elementor-element elementor-element-8af00c9 elementor-widget elementor-widget-heading" data-id="8af00c9" data-element_type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
			<h2 class="elementor-heading-title elementor-size-default">References</h2>		</div>
				</div>
				<div class="elementor-element elementor-element-8082de7 elementor-widget elementor-widget-text-editor" data-id="8082de7" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
							<p>[1] Along the x, y, or z axes</p><p>[2] Without going into details, the message space is smaller than the set of all combinations of letters given that most of these combinations are meaningless. Meaningful messages are redundantly encoded.</p><p>[3] <a href="http://www14.in.tum.de/konferenzen/Jass05/courses/1/papers/gruber_paper.pdf">http://www14.in.tum.de/konferenzen/Jass05/courses/1/papers/gruber_paper.pdf</a></p><p>[4] The equation refers to the general case, but we can still use it to illustrate a particular case.</p><p>[5] To be precise, it’s that and the more general question of whether P=NP.</p>						</div>
				</div>
				</div>
					</div>
				</div>
				</div>
		<p>The post <a href="/research/uncertainty-cryptography-and-information/">Uncertainty, Cryptography and Information</a> appeared first on <a href="/">Sequent</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
