{"445191":{"#nid":"445191","#data":{"type":"event","title":"Capital One Distinguished Lecture","body":[{"value":"\u003Cp\u003EThe first of a bi-annual lectures series, organized by the Institute for Information Security \u0026amp; Privacy and sponsored by Capital One, brings renowned cryptographer Professor Ron Rivest to Georgia Tech for a free, open-to-the public lecture. Students, faculty, and those interested in information security are encouraged to attend.\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003E3:30 - 4:30 p.m. Reception\u003C\/strong\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003E4:30 - 5:30 p.m. Lecture - \u0022Auditability and Verification of Elections\u0022\u003C\/strong\u003E\u003C\/p\u003E\u003Cp\u003E\u003Cem\u003E\u003Cstrong\u003EAbstract\u003C\/strong\u003E\u003C\/em\u003E\u003C\/p\u003E\u003Cp\u003EDemocracy requires that elections have credible results---otherwise the winner lacks a political mandate and the supporters of losing candidates react with anything from protests to revolution.\u003C\/p\u003E\u003Cp\u003EYet (U.S.) elections have become larger and increasingly complex, and politics seem more polarized.\u0026nbsp; Software-based voting systems inspire little trust.\u0026nbsp; Voting systems purchased with funds allocated after the 2000 U.S. presidential election fiasco are rapidly becoming obsolete.\u003C\/p\u003E\u003Cp\u003EHow can good definitions, statistics, and cryptography help?\u003C\/p\u003E\u003Cp\u003ERivest will present the notion of software independence, describe several methods for effective auditing of paper ballots, and give an overview of \u0022end-to-end\u0022 cryptographic voting systems that allow voters to confirm that their votes were counted exactly as intended, without violating voter privacy or enabling vote-selling. We close with a (pessimistic) assessment of the prospects for \u0022voting over the Internet.\u0022\u003C\/p\u003E\u003Cp\u003E\u003Cstrong\u003E\u003Cem\u003EAbout Ron Rivest\u003C\/em\u003E\u003C\/strong\u003E\u003C\/p\u003E\u003Cp\u003EProfessor Rivest is an Institute Professor at MIT, a member of its Department of Electrical Engineering and Computer Science, a member of MIT\u0027s Computer Science and Artificial Intelligence Laboratory (CSAIL), a member of that lab\u0027s Theory of Computation Group and a leader of its Cryptography and Information Security Group.\u003Cbr \/\u003E\u003Cbr \/\u003EHe received a B.A. in Mathematics from Yale University in 1969, and a Ph.D. in Computer Science from Stanford University in 1974. His research interests include cryptography, computer and network security, algorithms, and voting system security.\u003Cbr \/\u003E\u003Cbr \/\u003ERivest is a co-inventor of the RSA public-key cryptosystem, has extensive experience in cryptographic design and cryptanalysis.\u0026nbsp; He is also a founder of RSA Data Security and of Verisign.\u0026nbsp; Together with Adi Shamir and Len Adleman, he has received the 2002 ACM Turing Award and the 2009 NEC C\u0026amp;C Award.\u003Cbr \/\u003E\u003Cbr \/\u003EHe is also well-known as a co-author of the text, \u0022Introduction to Algorithms\u0022 (with Cormen, Leiseron, and Stein).\u003Cbr \/\u003E\u003Cbr \/\u003EHe is a member of the National Academy of Engineering and the National Academy of Sciences, and is a Fellow of the Association for Computing Machinery, the International Association for Cryptographic Research, and the American Academy of Arts and Sciences.\u0026nbsp; He is on the Advisory Board for the Electronic Privacy Information Center and on the board of Verified Voting.\u003C\/p\u003E\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EThe first of a bi-annual lectures series, organized by the Institute for Information Security \u0026amp; Privacy and sponsored by Capital One, brings renowned cryptographer Ron Rivest to Georgia Tech for a free, open-to-the public lecture. Students, faculty, and those interested in information security are encouraged to attend.\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":[{"value":"The Institute for Information Security \u0026 Privacy presents Ron Rivest, renowned cryptographer."}],"uid":"27490","created_gmt":"2015-09-05 11:59:40","changed_gmt":"2017-04-13 21:18:22","author":"Tara La Bouff","boilerplate_text":"","field_publication":"","field_article_url":"","field_event_time":{"event_time_start":"2015-10-27T16:30:00-04:00","event_time_end":"2015-10-27T18:30:00-04:00","event_time_end_last":"2015-10-27T18:30:00-04:00","gmt_time_start":"2015-10-27 20:30:00","gmt_time_end":"2015-10-27 22:30:00","gmt_time_end_last":"2015-10-27 22:30:00","rrule":null,"timezone":"America\/New_York"},"extras":["free_food"],"hg_media":{"445251":{"id":"445251","type":"image","title":"Ron Rivest","body":null,"created":"1449256205","gmt_created":"2015-12-04 19:10:05","changed":"1475895184","gmt_changed":"2016-10-08 02:53:04","alt":"Ron Rivest","file":{"fid":"203168","name":"rivest_photo.jpg","image_path":"\/sites\/default\/files\/images\/rivest_photo_0.jpg","image_full_path":"http:\/\/tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/rivest_photo_0.jpg","mime":"image\/jpeg","size":62235,"path_740":"http:\/\/tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/rivest_photo_0.jpg?itok=JiJpfADQ"}},"445261":{"id":"445261","type":"image","title":"Capital One","body":null,"created":"1449256205","gmt_created":"2015-12-04 19:10:05","changed":"1475895184","gmt_changed":"2016-10-08 02:53:04","alt":"Capital One","file":{"fid":"203169","name":"capital-one-logo.png","image_path":"\/sites\/default\/files\/images\/capital-one-logo_0.png","image_full_path":"http:\/\/tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/capital-one-logo_0.png","mime":"image\/png","size":32868,"path_740":"http:\/\/tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/capital-one-logo_0.png?itok=at9f4OIE"}}},"media_ids":["445251","445261"],"groups":[{"id":"50875","name":"School of Computer Science"},{"id":"50876","name":"School of Interactive Computing"},{"id":"50877","name":"School of Computational Science and Engineering"},{"id":"322011","name":"College of Computing Events"},{"id":"430601","name":"Institute for Information Security and Privacy"}],"categories":[],"keywords":[{"id":"1404","name":"Cybersecurity"},{"id":"2678","name":"information security"},{"id":"626","name":"public policy"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[{"id":"1795","name":"Seminar\/Lecture\/Colloquium"}],"invited_audience":[{"id":"78751","name":"Undergraduate students"},{"id":"78761","name":"Faculty\/Staff"},{"id":"78771","name":"Public"},{"id":"174045","name":"Graduate students"}],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003ETrina Brennan, 404.407.8873\u003C\/p\u003E","format":"limited_html"}],"email":[],"slides":[],"orientation":[],"userdata":""}}}