174 resultados para private broadcast encryption


Relevância:

20.00% 20.00%

Publicador:

Resumo:

A set system (X, F ) with X= {x 1,...,x m}) and F = {B1...,B n }, where B i ⊆ X, is called an (n, m) cover-free set system (or CF set system) if for any 1 ≤ i, j, k ≤ n and j ≠ k, |B i >2 |B j ∩ B k | +1. In this paper, we show that CF set systems can be used to construct anonymous membership broadcast schemes (or AMB schemes), allowing a center to broadcast a secret identity among a set of users in a such way that the users can verify whether or not the broadcast message contains their valid identity. Our goal is to construct (n, m) CF set systems in which for given m the value n is as large as possible. We give two constructions for CF set systems, the first one from error-correcting codes and the other from combinatorial designs. We link CF set systems to the concept of cover-free family studied by Erdös et al in early 80’s to derive bounds on parameters of CF set systems. We also discuss some possible extensions of the current work, motivated by different application.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A parallel authentication and public-key encryption is introduced and exemplified on joint encryption and signing which compares favorably with sequential Encrypt-then-Sign (ɛtS) or Sign-then-Encrypt (Stɛ) schemes as far as both efficiency and security are concerned. A security model for signcryption, and thus joint encryption and signing, has been recently defined which considers possible attacks and security goals. Such a scheme is considered secure if the encryption part guarantees indistinguishability and the signature part prevents existential forgeries, for outsider but also insider adversaries. We propose two schemes of parallel signcryption, which are efficient alternative to Commit-then-Sign-and- Encrypt (Ct&G3&S). They are both provably secure in the random oracle model. The first one, called generic parallel encrypt and sign, is secure if the encryption scheme is semantically secure against chosen-ciphertext attacks and the signature scheme prevents existential forgeries against random-message attacks. The second scheme, called optimal parallel encrypt. and sign, applies random oracles similar to the OAEP technique in order to achieve security using encryption and signature components with very weak security requirements — encryption is expected to be one-way under chosen-plaintext attacks while signature needs to be secure against universal forgeries under random-plaintext attack, that is actually the case for both the plain-RSA encryption and signature under the usual RSA assumption. Both proposals are generic in the sense that any suitable encryption and signature schemes (i.e. which simply achieve required security) can be used. Furthermore they allow both parallel encryption and signing, as well as parallel decryption and verification. Properties of parallel encrypt and sign schemes are considered and a new security standard for parallel signcryption is proposed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Private Ancillary Funds (PAFs) are trusts to which Australian taxpayers can make tax deductible donations, enabling families, businesses and individuals to create a tax effective closely held charitable trust, whose sole purpose must be to provide money, property or benefits to deductible gift recipients. This Current Issues Information Sheet charts the movement in approval of PAFs, donations made to and distributions made by PAFs during the period 2000-01 to 2011-12.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background: Pharmacists are considered medication experts but are underutilised mainly at the periphery of the primary healthcare team. General medical practitioners (GPs) in Malaysian private healthcare clinics are granted rights to prescribe and dispense medications, thus furhter limiting pharmacists involvement in ensuring safe use of medicines. The integration of pharmacist into private primary healthcare clinics has the potential to reduce medication-relation problems. Objective: To explore the views of consumers on the integration of pharmacists within private primary healthcare clinics in Malaysia. Method: A purposive sample of healthcare consumers in Selangor and Kuala Lumpur, Malaysia were invited to participate in focus groups and semi-structured interviews. Sessions were audio recorded and transcribed verbatim and thematically analysed using NVivo 10. Results: A total of 24 healthcare consumers particpated in two focus groups and six semi-structured interviews. Four major themes were identified: (1) Pharmacists role viewed mainly as supplying medications, (2) Readiness to accept pharmacists in private healthcare clinics, (3) Willingness to pay for pharmacy services, and (4) Concerns about GPs resistance to pharmacist integration. Consumers felt that a pharmacist integrated into private prumary healthcare clinics could offer potential benefits such as counter-checking prescriptions to ensure correct medication is supplied and counselling consumers on their medications and the potential side effects. The potential to increase in costs to consumers and GPs reluctance were perceived as barriers to integration. Conclusion: This study provides insights into consumers perspectives on the roles of pharmacists within private primary healthcare clinics in Malaysia. Consumers generally supported pharmacist integration into private primary healthcare clinics. However, for pharmacists to expand their capacity in providing integrated and collaborative primary care services to consumers, barriers to pharmacist integration need to be addressed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Motivated by privacy issues associated with dissemination of signed digital certificates, we define a new type of signature scheme called a ‘Universal Designated-Verifier Signature’ (UDVS). A UDVS scheme can function as a standard publicly-verifiable digital signature but has additional functionality which allows any holder of a signature (not necessarily the signer) to designate the signature to any desired designated-verifier (using the verifier’s public key). Given the designated-signature, the designated-verifier can verify that the message was signed by the signer, but is unable to convince anyone else of this fact. We propose an efficient deterministic UDVS scheme constructed using any bilinear group-pair. Our UDVS scheme functions as a standard Boneh-Lynn-Shacham (BLS) signature when no verifier-designation is performed, and is therefore compatible with the key-generation, signing and verifying algorithms of the BLS scheme. We prove that our UDVS scheme is secure in the sense of our unforgeability and privacy notions for UDVS schemes, under the Bilinear Diffie-Hellman (BDH) assumption for the underlying group-pair, in the random-oracle model. We also demonstrate a general constructive equivalence between a class of unforgeable and unconditionally-private UDVS schemes having unique signatures (which includes the deterministic UDVS schemes) and a class of ID-Based Encryption (IBE) schemes which contains the Boneh-Franklin IBE scheme but not the Cocks IBE scheme.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Common Scrambling Algorithm Stream Cipher (CSASC) is a shift register based stream cipher designed to encrypt digital video broadcast. CSA-SC produces a pseudo-random binary sequence that is used to mask the contents of the transmission. In this paper, we analyse the initialisation process of the CSA-SC keystream generator and demonstrate weaknesses which lead to state convergence, slid pairs and shifted keystreams. As a result, the cipher may be vulnerable to distinguishing attacks, time-memory-data trade-off attacks or slide attacks.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In 2001, the red imported fire ant (Solenopsis invicta Buren) was identified in Brisbane, Australia. An eradication program involving broadcast bait treatment with two insect growth regulators and a metabolic inhibitor began in September of that year and is currently ongoing. To gauge the impacts of these treatments on local ant populations, we examined long-term monitoring data and quantified abundance patterns of S. invicta and common local ant genera using a linear mixed-effects model. For S. invicta, presence in pitfalls reduced over time to zero on every site. Significantly higher numbers of S. invicta workers were collected on high-density polygyne sites, which took longer to disinfest compared with monogyne and low-density polygyne sites. For local ants, nine genus groups of the 10 most common genera analyzed either increased in abundance or showed no significant trend. Five of these genus groups were significantly less abundant at the start of monitoring on high-density polygyne sites compared with monogyne and low-density polygyne sites. The genus Pheidole significantly reduced in abundance over time, suggesting that it was affected by treatment efforts. These results demonstrate that the treatment regime used at the time successfully removed S. invicta from these sites in Brisbane, and that most local ant genera were not seriously impacted by the treatment. These results have important implications for current and future prophylactic treatment efforts, and suggest that native ants remain in treated areas to provide some biological resistance to S. invicta.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Since the inception of the UN Convention on Biological Diversity (CBD) in 1992, little progress has been achieved in terms of involving the business community in protecting biological diversity worldwide. This article assesses the current activities of US Fortune 500 companies with respect to global biodiversity protection and the goals of the CBD. Data and information collected from 500 companies within eight major industrial sectors were further categorized at the company level to assess each company's involvement in global biodiversity protection. Our findings show that although companies' business profiles highly influence their decision-making process regarding the adoption of biodiversity protection policies and measures, their revenue profiles are less influential. We show that despite generating low revenues, companies in the utility sector are more active in the adoption of biodiversity protection policy than those in the financial sector, which generate high revenues. This study also demonstrates that companies must be convinced of the major effects of biodiversity loss on their bottom lines to be motivated to protect biological diversity. Companies' business and business-related risk profiles can also influence the adoption of biodiversity protection policies within the company. The study further demonstrates that a measurable biodiversity impact indicator is necessary for the companies to get seriously involved in the mitigation action. Finally, this study proposes a three-step biodiversity loss mitigation action framework that is drawn upon the assessment of the 500 companies that can contribute to develop an elaborative framework of business sector-specific mitigation plan. © 2013 Copyright Taylor and Francis Group, LLC.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Objective The main objective of the project was to explore the barriers and obstacles impeding a person-centred approach to planning and private housing for people with disability. Method Methodologically, the project involved explanation building using a multiple case study approach supported by a contextual study. It focussed initially on three organisations and their attempts to integrate innovative and what they regarded as person-centred models of housing into the private housing market for people with disability. It also included a fourth case highlighting the experiences of individuals with disability in accessing suitable and affordable housing. Results Using an ecological framework, the project found that: • Challenges exist within systems (such as the macro cultural, economic, regulatory systems through to local community, family and intra personal systems) as well as with interaction between systems • Reaching across systems is a key role for organisations and individuals but is very challenging with distance from the individual as well as from the policy/funding/service systems being a key aspect of the nature and extent by which they are challenged • In the case of housing for people with disability a ‘disability space’ is assumed and maintained disparately within each system and is separate from the ‘mainstream space’ with the established policy, legal, funding structures making it difficult to move between the two spaces. Conclusions Based on these findings, the project makes recommendations for government, community organisations, the housing industry, people with disability and their families and support networks, as well as for future research. An overarching recommendation is the need to address housing stock availability and suitability by adopting a mainstream approach rather than a disability-first/disability-specific approach.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Purpose – There is limited evidence on how differences in economic environments affect the demand for and supply of auditing. Research on audit pricing has mainly focused on large client markets in developed economies; in contrast, the purpose of this paper is to focus on the small client segment in the emerging economy of Thailand which offers a choice between auditors of two different qualities. Design/methodology/approach – This paper is based on a random stratified sample of small clients in Thailand qualifying for audit exemption. The final sample consists of 1,950 firm-year observations for 2002-2006. Findings – The authors find evidence of product differentiation in the small client market, suggesting that small firms view certified public accountants as superior and pay a premium for their services. The authors also find that audit fees have a positive significant association with leverage, metropolitan location and client size. Audit risk and audit opinion are not, however, significantly associated with audit fees. Furthermore, the authors find no evidence that clients whose financial year ends in the auditors’ busy period pay significantly higher audit fees, and auditors engage in low-balling on initial engagements to attract audit clients. Research limitations/implications – The research shows the importance of exploring actual decisions regarding audit practice and audit pricing in different institutional and organizational settings. Originality/value – The paper extends the literature from developed economies and large/listed market setting to the emerging economy and small client market setting. As far as the authors are aware, this is the first paper to examine audit pricing in the small client market in an emerging economy.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background In Australia, maternity care is available through universal coverage and a parallel, competitive private health insurance system. Differences between sectors in antenatal and intrapartum care and associated outcomes are well documented but few studies have investigated differences in postpartum care following hospital discharge and their impact on maternal satisfaction and confidence. Methods Women who birthed in Queensland, Australia from February to May 2010 were mailed a self-report survey 4 months postpartum. Regression analysis was used to determine associations between sector of birth and postpartum care, and whether postpartum care experiences explained sector differences in postpartum well-being (satisfaction, parenting confidence and feeling depressed). Results Women who birthed in the public sector had higher odds of health professional contact in the first 10 days post-discharge and satisfaction with the amount of postpartum care. After adjusting for demographic and postpartum contact variables, sector of birth no longer had an impact on satisfaction (AOR 0.95, 99% CI 0.78-1.31), but any form of health professional contact did. Women who had a care provider’s 24 hour contact details had higher odds of being satisfied (AOR 3.64, 95% CI 3.00-4.42) and confident (AOR 1.34, 95% CI 1.08- 1.65). Conclusion Women who birthed in the public sector appeared more satisfied because they had higher odds of receiving contact from a health professional within 10 days post-discharge. All women should have an opportunity to speak to and/or see a doctor, midwife or nurse in the first 10 days at home, and the details of a person they can contact 24 hours a day.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A Bitcoin wallet is a set of private keys known to a user and which allow that user to spend any Bitcoin associated with those keys. In a hierarchical deterministic (HD) wallet, child private keys are generated pseudorandomly from a master private key, and the corresponding child public keys can be generated by anyone with knowledge of the master public key. These wallets have several interesting applications including Internet retail, trustless audit, and a treasurer allocating funds among departments. A specification of HD wallets has even been accepted as Bitcoin standard BIP32. Unfortunately, in all existing HD wallets---including BIP32 wallets---an attacker can easily recover the master private key given the master public key and any child private key. This vulnerability precludes use cases such as a combined treasurer-auditor, and some in the Bitcoin community have suspected that this vulnerability cannot be avoided. We propose a new HD wallet that is not subject to this vulnerability. Our HD wallet can tolerate the leakage of up to m private keys with a master public key size of O(m). We prove that breaking our HD wallet is at least as hard as the so-called "one more" discrete logarithm problem.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Tensions surrounding social media in the employment relationship are increasingly evident in the media, public rhetoric, and courts and employment tribunals. Yet the underlying causes and dimensions of these tensions have remained largely unexplored. This article firstly reviews the available literature addressing social media and employment, outlining three primary sources of contestation: profiling, disparaging posts and blogs, and private use of social media during work time. In each area, the key dynamics and underlying concerns of the central actors involved are identified. The article then seeks to canvas explanations for these forms of contestation associated with social media at work. It is argued that the architecture of social media disrupts traditional relations in organisational life by driving employer and employee actions that (re)shape and (re)constitute the boundaries between public and private spheres. Although employers and employees are using the same social technologies, their respective concerns about and points of entry to these technologies, in contrast to traditional manifestations of conflict and resistance, are asymmetric. The article concludes with a representational summary of the relative legitimacy of concerns for organisational actors and outlines areas for future research.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper introduces our dedicated authenticated encryption scheme ICEPOLE. ICEPOLE is a high-speed hardware-oriented scheme, suitable for high-throughput network nodes or generally any environment where specialized hardware (such as FPGAs or ASICs) can be used to provide high data processing rates. ICEPOLE-128 (the primary ICEPOLE variant) is very fast. On the modern FPGA device Virtex 6, a basic iterative architecture of ICEPOLE reaches 41 Gbits/s, which is over 10 times faster than the equivalent implementation of AES-128-GCM. The throughput-to-area ratio is also substantially better when compared to AES-128-GCM. We have carefully examined the security of the algorithm through a range of cryptanalytic techniques and our findings indicate that ICEPOLE offers high security level.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Staffing rural and remote schools is an important policy issue for the public good. This paper examines the private issues it also poses for teachers with families working in these communities, as they seek to reconcile careers with educational choices for children. The paper first considers historical responses to staffing rural and remote schools in Australia, and the emergence of neoliberal policy encouraging marketisation of the education sector. We report on interviews about considerations motivating household mobility with 11 teachers across regional, rural and remote communities in Queensland. Like other middle-class parents, these teachers prioritised their children’s educational opportunities over career opportunities. The analysis demonstrates how teachers in rural and remote communities constitute a special group of educational consumers with insider knowledge and unique dilemmas around school choice. Their heightened anxieties around school choice under neoliberal policy are shown to contribute to the public issue of staffing rural and remote schools.