Capital One Distinguished Lecture

Event Details
  • Date/Time:
    • Tuesday October 27, 2015
      3:30 pm - 5:30 pm
  • Location: LeCraw Auditorium, Scheller College of Business, 800 West Peachtree St. NW, Atlanta, GA 30308
  • Phone: (404) 407-8873
  • URL: http://iisp.gatech.edu
  • Email: info@iisp.gatech.edu
  • Fee(s):
    $0.00
  • Extras:
Contact

Trina Brennan, 404.407.8873

Summaries

Summary Sentence: The Institute for Information Security & Privacy presents Ron Rivest, renowned cryptographer.

Full Summary: The first of a bi-annual lectures series, organized by the Institute for Information Security & Privacy and sponsored by Capital One, brings renowned cryptographer Ron Rivest to Georgia Tech for a free, open-to-the public lecture. Students, faculty, and those interested in information security are encouraged to attend.

Media
  • Ron Rivest Ron Rivest
    (image/jpeg)
  • Capital One Capital One
    (image/png)

The first of a bi-annual lectures series, organized by the Institute for Information Security & Privacy and sponsored by Capital One, brings renowned cryptographer Professor Ron Rivest to Georgia Tech for a free, open-to-the public lecture. Students, faculty, and those interested in information security are encouraged to attend.

3:30 - 4:30 p.m. Reception

4:30 - 5:30 p.m. Lecture - "Auditability and Verification of Elections"

Abstract

Democracy requires that elections have credible results---otherwise the winner lacks a political mandate and the supporters of losing candidates react with anything from protests to revolution.

Yet (U.S.) elections have become larger and increasingly complex, and politics seem more polarized.  Software-based voting systems inspire little trust.  Voting systems purchased with funds allocated after the 2000 U.S. presidential election fiasco are rapidly becoming obsolete.

How can good definitions, statistics, and cryptography help?

Rivest will present the notion of software independence, describe several methods for effective auditing of paper ballots, and give an overview of "end-to-end" cryptographic voting systems that allow voters to confirm that their votes were counted exactly as intended, without violating voter privacy or enabling vote-selling. We close with a (pessimistic) assessment of the prospects for "voting over the Internet."

About Ron Rivest

Professor Rivest is an Institute Professor at MIT, a member of its Department of Electrical Engineering and Computer Science, a member of MIT's Computer Science and Artificial Intelligence Laboratory (CSAIL), a member of that lab's Theory of Computation Group and a leader of its Cryptography and Information Security Group.

He received a B.A. in Mathematics from Yale University in 1969, and a Ph.D. in Computer Science from Stanford University in 1974. His research interests include cryptography, computer and network security, algorithms, and voting system security.

Rivest is a co-inventor of the RSA public-key cryptosystem, has extensive experience in cryptographic design and cryptanalysis.  He is also a founder of RSA Data Security and of Verisign.  Together with Adi Shamir and Len Adleman, he has received the 2002 ACM Turing Award and the 2009 NEC C&C Award.

He is also well-known as a co-author of the text, "Introduction to Algorithms" (with Cormen, Leiseron, and Stein).

He is a member of the National Academy of Engineering and the National Academy of Sciences, and is a Fellow of the Association for Computing Machinery, the International Association for Cryptographic Research, and the American Academy of Arts and Sciences.  He is on the Advisory Board for the Electronic Privacy Information Center and on the board of Verified Voting.

 

Additional Information

In Campus Calendar
Yes
Groups

School of Computer Science, School of Interactive Computing, School of Computational Science and Engineering, College of Computing Events, Institute for Information Security and Privacy

Invited Audience
Undergraduate students, Faculty/Staff, Public, Graduate students
Categories
Seminar/Lecture/Colloquium
Keywords
Cybersecurity, information security, public policy
Status
  • Created By: Tara La Bouff
  • Workflow Status: Published
  • Created On: Sep 5, 2015 - 7:59am
  • Last Updated: Apr 13, 2017 - 5:18pm