Peter B. Rønne
YOU?
Author Swipe
View article: Direct and Transparent Voter Verification with Everlasting Receipt-Freeness
Direct and Transparent Voter Verification with Everlasting Receipt-Freeness Open
We present a new verifiable voting scheme based on the Hyperion scheme but providing everlasting privacy and receipt-freeness. As with Selene and Hyperion, it provides a direct form of E2E verifiability: voters verify the presence of their…
View article: Expanding the Toolbox: Coercion and Vote-Selling at Vote-Casting Revisited
Expanding the Toolbox: Coercion and Vote-Selling at Vote-Casting Revisited Open
Coercion and vote-buying are challenging and multi-faceted threats that prevent people from expressing their will freely. Even though there are known techniques to resist or partially mitigate coercion and vote-buying, we explicitly demons…
View article: Intelligo ut Confido: Understanding, Trust and User Experience in Verifiable Receipt-Free E-Voting (long version)
Intelligo ut Confido: Understanding, Trust and User Experience in Verifiable Receipt-Free E-Voting (long version) Open
Voting protocols seek to provide integrity and vote privacy in elections. To achieve integrity, procedures have been proposed allowing voters to verify their vote - however this impacts both the user experience and privacy. Especially, vot…
View article: Taphonomical Security: (DNA) Information with a Foreseeable Lifespan
Taphonomical Security: (DNA) Information with a Foreseeable Lifespan Open
This paper introduces the concept of information with a foreseeable lifespan and explains who to achieve this primitive via a new method for encoding and storing information in DNA-RNA sequences. The storage process can be divided into thr…
View article: Electronic Voting
Electronic Voting Open
This open access book E-Vote-ID 2022 focuses on Electronic Voting from aspects relating to security and usability and much more.
View article: Root-of-Trust Abstractions for Symbolic Analysis: Application to Attestation Protocols
Root-of-Trust Abstractions for Symbolic Analysis: Application to Attestation Protocols Open
A key component in building trusted computing services is a highly secure anchor that serves as a Root-of-Trust (RoT). There are several works that conduct formal analysis on the security of such commodity RoTs (or parts of it), and also a…
View article: Root-of-Trust Abstractions for Symbolic Analysis: Application to Attestation Protocols
Root-of-Trust Abstractions for Symbolic Analysis: Application to Attestation Protocols Open
A key component in building trusted computing services is a highly secure anchor that serves as a Root-of-Trust (RoT). There are several works that conduct formal analysis on the security of such commodity RoTs (or parts of it), and also a…
View article: Batching CSIDH Group Actions using AVX-512
Batching CSIDH Group Actions using AVX-512 Open
Commutative Supersingular Isogeny Diffie-Hellman (or CSIDH for short) is a recently-proposed post-quantum key establishment scheme that belongs to the family of isogeny-based cryptosystems. The CSIDH protocol is based on the action of an i…
View article: The FZZ duality with boundary
The FZZ duality with boundary Open
The Fateev-Zamolodchikov-Zamolodchikov (FZZ) duality relates Witten’s cigar model to sine-Liouville theory. This duality was proven in the path integral formulation and extended to the case of higher genus closed Riemann surfaces by Schome…
View article: Supergroup — extended super Liouville correspondence
Supergroup — extended super Liouville correspondence Open
We derive a relation between correlation functions of supergroup WZNW models and conformal field theories with extended superconformal symmetry. The supergroups considered have a bosonic subgroup of the form SL(2) x A for some Lie group A.…
View article: From world-sheet supersymmetry to super target spaces
From world-sheet supersymmetry to super target spaces Open
We investigate the relation between N=(2,2) superconformal Lie group WZNW models and Lie supergroup WZNW models. The B-twist of an exactly marginal perturbation of the world-sheet superconformal sigma model is the supergroup model. Moreove…
View article: AVRNTRU: Lightweight NTRU-based Post-Quantum Cryptography for 8-bit AVR Microcontrollers
AVRNTRU: Lightweight NTRU-based Post-Quantum Cryptography for 8-bit AVR Microcontrollers Open
peer reviewed
View article: Sixth International Joint Conference on Electronic Voting E-Vote-ID 2021. 5-8 October 2021
Sixth International Joint Conference on Electronic Voting E-Vote-ID 2021. 5-8 October 2021 Open
This volume contains papers presented at E-Vote-ID 2021, the Sixth International Joint Conference on Electronic Voting, held during October 5-8, 2021. Due to the extraordinary situation provoked by Covid-19 Pandemic, the conference is held…
View article: Authenticated Key Distribution: When the Coupon Collector is Your Enemy
Authenticated Key Distribution: When the Coupon Collector is Your Enemy Open
We introduce new authenticated key exchange protocols which on the one hand do not resort to standard public key setups with corresponding assumptions of computationally hard problems, but on the other hand, are more efficient than distrib…
View article: A Lightweight Implementation of NTRU Prime for the Post-Quantum Internet of Things
A Lightweight Implementation of NTRU Prime for the Post-Quantum Internet of Things Open
The dawning era of quantum computing has initiated various initiatives for the standardization of post-quantum cryptosystems with the goal of (eventually) replacing RSA and ECC. NTRU Prime is a variant of the classical NTRU cryptosystem th…
View article: Revisiting Deniability in Quantum Key Exchange via Covert Communication and Entanglement Distillation
Revisiting Deniability in Quantum Key Exchange via Covert Communication and Entanglement Distillation Open
We revisit the notion of deniability in quantum key exchange (QKE), a topic that remains largely unexplored. In the only work on this subject by Donald Beaver, it is argued that QKE is not necessarily deniable due to an eavesdropping attac…
View article: Cholesteric Liquid Crystal Shells as Enabling Material for Information‐Rich Design and Architecture
Cholesteric Liquid Crystal Shells as Enabling Material for Information‐Rich Design and Architecture Open
The responsive and dynamic character of liquid crystals (LCs), arising from their ability to self‐organize into long‐range ordered structures while maintaining fluidity, has given them a role as key enabling materials in the information te…