TY - GEN
T1 - A Systematic Study of Bulletin Board and Its Application
AU - Suwito, Misni
AU - Tama, Bayu
AU - Santoso, Bagus
AU - Dutta, Sabyasachi
AU - Tan, Haowen
AU - Yoshifumi, Ueshige
AU - Sakurai, Kouichi
N1 - Publisher Copyright:
© 2022 Owner/Author.
PY - 2022/5/30
Y1 - 2022/5/30
N2 - Any person can post arbitrary strings on the bulletin board. Following publication on bulletin board, a party receives a "evidence"that the intended data were posted. The bulletin board is open to the public, which means that anyone can view its contents. The fundamental security criteria for a BB are that its contents cannot be deleted, and that no evidence of publication can be falsified. BB was commonly perceived as a trusted and publicly verifiable channel. It formed the backbone of many important protocols such as e-voting, secure multi-party computation etc. and quite often it was assumed to exist to support the execution of the main protocol. After the advent of blockchain technology, BB systems has found a strong footing regarding its implementation in a distributed manner. In this paper, we aim to provide a concise summary of the evolution of bulletin board, its implementation issues and security analysis with an emphasis on its impact to e-voting systems.
AB - Any person can post arbitrary strings on the bulletin board. Following publication on bulletin board, a party receives a "evidence"that the intended data were posted. The bulletin board is open to the public, which means that anyone can view its contents. The fundamental security criteria for a BB are that its contents cannot be deleted, and that no evidence of publication can be falsified. BB was commonly perceived as a trusted and publicly verifiable channel. It formed the backbone of many important protocols such as e-voting, secure multi-party computation etc. and quite often it was assumed to exist to support the execution of the main protocol. After the advent of blockchain technology, BB systems has found a strong footing regarding its implementation in a distributed manner. In this paper, we aim to provide a concise summary of the evolution of bulletin board, its implementation issues and security analysis with an emphasis on its impact to e-voting systems.
UR - http://www.scopus.com/inward/record.url?scp=85133189926&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85133189926&partnerID=8YFLogxK
U2 - 10.1145/3488932.3527280
DO - 10.1145/3488932.3527280
M3 - Conference contribution
AN - SCOPUS:85133189926
T3 - ASIA CCS 2022 - Proceedings of the 2022 ACM Asia Conference on Computer and Communications Security
SP - 1213
EP - 1215
BT - ASIA CCS 2022 - Proceedings of the 2022 ACM Asia Conference on Computer and Communications Security
PB - Association for Computing Machinery, Inc
T2 - 17th ACM ASIA Conference on Computer and Communications Security 2022, ASIA CCS 2022
Y2 - 30 May 2022 through 3 June 2022
ER -