300 resultados para Algebraic attack
Resumo:
The paper investigates the design of secret sharing that is immune against cheating (as defined by the Tompa-Woll attack). We examine secret sharing with binary shares and secrets. Bounds on the probability of successful cheating are given for two cases. The first case relates to secret sharing based on bent functions and results in a non-perfect scheme. The second case considers perfect secret sharing built on highly nonlinear balanced Boolean functions.
Resumo:
We study the natural problem of secure n-party computation (in the passive, computationally unbounded attack model) of the n-product function f G (x 1,...,x n ) = x 1 ·x 2 ⋯ x n in an arbitrary finite group (G,·), where the input of party P i is x i ∈ G for i = 1,...,n. For flexibility, we are interested in protocols for f G which require only black-box access to the group G (i.e. the only computations performed by players in the protocol are a group operation, a group inverse, or sampling a uniformly random group element). Our results are as follows. First, on the negative side, we show that if (G,·) is non-abelian and n ≥ 4, then no ⌈n/2⌉-private protocol for computing f G exists. Second, on the positive side, we initiate an approach for construction of black-box protocols for f G based on k-of-k threshold secret sharing schemes, which are efficiently implementable over any black-box group G. We reduce the problem of constructing such protocols to a combinatorial colouring problem in planar graphs. We then give two constructions for such graph colourings. Our first colouring construction gives a protocol with optimal collusion resistance t < n/2, but has exponential communication complexity O(n*2t+1^2/t) group elements (this construction easily extends to general adversary structures). Our second probabilistic colouring construction gives a protocol with (close to optimal) collusion resistance t < n/μ for a graph-related constant μ ≤ 2.948, and has efficient communication complexity O(n*t^2) group elements. Furthermore, we believe that our results can be improved by further study of the associated combinatorial problems.
Resumo:
In 2006, Gaurav Gupta and Josef Pieprzyk presented an attack on the branch-based software watermarking scheme proposed by Ginger Myles and Hongxia Jin in 2005. The software watermarking model is based on replacing jump instructions or unconditional branch statements (UBS) by calls to a fingerprint branch function (FBF) that computes the correct target address of the UBS as a function of the generated fingerprint and integrity check. If the program is tampered with, the fingerprint and/or integrity checks change and the target address is not computed correctly. Gupta and Pieprzyk's attack uses debugger capabilities such as register and address lookup and breakpoints to minimize the requirement to manually inspect the software. Using these resources, the FBF and calls to the same is identified, correct displacement values are generated and calls to FBF are replaced by the original UBS transferring control of the attack to the correct target instruction. In this paper, we propose a watermarking model that provides security against such debugging attacks. Two primary measures taken are shifting the stack pointer modification operation from the FBF to the individual UBSs, and coding the stack pointer modification in the same language as that of the rest of the code rather than assembly language to avoid conspicuous contents. The manual component complexity increases from O(1) in the previous scheme to O(n) in our proposed scheme.
Resumo:
The power of sharing computation in a cryptosystem is crucial in several real-life applications of cryptography. Cryptographic primitives and tasks to which threshold cryptosystems have been applied include variants of digital signature, identification, public-key encryption and block ciphers etc. It is desirable to extend the domain of cryptographic primitives which threshold cryptography can be applied to. This paper studies threshold message authentication codes (threshold MACs). Threshold cryptosystems usually use algebraically homomorphic properties of the underlying cryptographic primitives. A typical approach to construct a threshold cryptographic scheme is to combine a (linear) secret sharing scheme with an algebraically homomorphic cryptographic primitive. The lack of algebraic properties of MACs rules out such an approach to share MACs. In this paper, we propose a method of obtaining a threshold MAC using a combinatorial approach. Our method is generic in the sense that it is applicable to any secure conventional MAC by making use of certain combinatorial objects, such as cover-free families and their variants. We discuss the issues of anonymity in threshold cryptography, a subject that has not been addressed previously in the literature in the field, and we show that there are trade-offis between the anonymity and efficiency of threshold MACs.
Resumo:
The graft-versus-myeloma (GVM) effect represents a powerful form of immune attack exerted by alloreactive T cells against multiple myeloma cells, which leads to clinical responses in multiple myeloma transplant recipients. Whether myeloma cells are themselves able to induce alloreactive T cells capable of the GVM effect is not defined. Using adoptive transfer of T naive cells into myeloma-bearing mice (established by transplantation of human RPMI8226-TGL myeloma cells into CD122(+) cell-depleted NOD/SCID hosts), we found that myeloma cells induced alloreactive T cells that suppressed myeloma growth and prolonged survival of T cell recipients. Myeloma-induced alloreactive T cells arising in the myeloma-infiltrated bones exerted cytotoxic activity against resident myeloma cells, but limited activity against control myeloma cells obtained from myeloma-bearing mice that did not receive T naive cells. These myeloma-induced alloreactive T cells were derived through multiple CD8(+) T cell divisions and enriched in double-positive (DP) T cells coexpressing the CD8alphaalpha and CD4 coreceptors. MHC class I expression on myeloma cells and contact with T cells were required for CD8(+) T cell divisions and DP-T cell development. DP-T cells present in myeloma-infiltrated bones contained a higher proportion of cells expressing cytotoxic mediators IFN-gamma and/or perforin compared with single-positive CD8(+) T cells, acquired the capacity to degranulate as measured by CD107 expression, and contributed to an elevated perforin level seen in the myeloma-infiltrated bones. These observations suggest that myeloma-induced alloreactive T cells arising in myeloma-infiltrated bones are enriched with DP-T cells equipped with cytotoxic effector functions that are likely to be involved in the GVM effect.
Resumo:
Dealing with digital medical images is raising many new security problems with legal and ethical complexities for local archiving and distant medical services. These include image retention and fraud, distrust and invasion of privacy. This project was a significant step forward in developing a complete framework for systematically designing, analyzing, and applying digital watermarking, with a particular focus on medical image security. A formal generic watermarking model, three new attack models, and an efficient watermarking technique for medical images were developed. These outcomes contribute to standardizing future research in formal modeling and complete security and computational analysis of watermarking schemes.
Resumo:
Computer modelling has been used extensively in some processes in the sugar industry to achieve significant gains. This paper reviews the investigations carried out over approximately the last twenty five years,including the successes but also areas where problems and delays have been encountered. In that time the capability of both hardware and software have increased dramatically. For some processes such as cane cleaning, cane billet preparation, and sugar drying, the application of computer modelling towards improved equipment design and operation has been quite limited. A particular problem has been the large number of particles and particle interactions in these applications, which, if modelled individually, is computationally very intensive. Despite the problems, some attempts have already been made and knowledge gained on tackling these issues. Even if the detailed modelling is wanting, a model can provide some useful insights into the processes. Some options to attack these more intensive problems include the use of commercial software packages, which are usually very robust and allow the addition of user-supplied subroutines to adapt the software to particular problems. Suppliers of such software usually charge a fee per CPU licence, which is often problematic for large problems that require the use of many CPUs. Another option to consider is using open source software that has been developed with the capability to access large parallel resources. Such software has the added advantage of access to the full internal coding. This paper identifies and discusses the detail of software options with the potential capability to achieve improvements in the sugar industry.
Resumo:
The digital era is proving to be one of disruption, where new technologies matched with innovative business models can be harnessed to attack even the most established of companies. For businesses with the relative certainty of captive customer bases, such as airports, the ability to digitally diversify offers the opportunity to venture into new modes of operation. For an airport, this opportunity can also be leveraged to sustain superior customer support regardless of a customer’s location in the world. This research paper presents a case study of the development of an Australian Airport Corporation’s mobile application as part of a greater digital strategy initiative using a design-led approach to innovate. An action research method provides the platform for an intensive embedded practice and study of design-led innovation within the major Australian Airport Corporation. The findings reveal design-led innovation to be a crucial in-house idea generation and concept development capability enabling the bridging of distinct corporate domains associated with commercialisation, operations and customer experience. A Digital Innovation Checklist is presented as an output of this research which structures an organizational approach toward digital channel innovation. The practitioner’s checklist is designed to aid in the future development of digital channels within the broader spectrum of strategy by addressing business assumptions.
Resumo:
Ubiquitination involves the attachment of ubiquitin to lysine residues on substrate proteins or itself, which can result in protein monoubiquitination or polyubiquitination. Ubiquitin attachment to different lysine residues can generate diverse substrate-ubiquitin structures, targeting proteins to different fates. The mechanisms of lysine selection are not well understood. Ubiquitination by the largest group of E3 ligases, the RING-family E3 s, is catalyzed through co-operation between the non-catalytic ubiquitin-ligase (E3) and the ubiquitin-conjugating enzyme (E2), where the RING E3 binds the substrate and the E2 catalyzes ubiquitin transfer. Previous studies suggest that ubiquitination sites are selected by E3-mediated positioning of the lysine toward the E2 active site. Ultimately, at a catalytic level, ubiquitination of lysine residues within the substrate or ubiquitin occurs by nucleophilic attack of the lysine residue on the thioester bond linking the E2 catalytic cysteine to ubiquitin. One of the best studied RING E3/ E2 complexes is the Skp1/Cul1/F box protein complex, SCFCdc4, and its cognate E2, Cdc34, which target the CDK inhibitor Sic1 for K48-linked polyubiquitination, leading to its proteasomal degradation. Our recent studies of this model system demonstrated that residues surrounding Sic1 lysines or lysine 48 in ubiquitin are critical for ubiquitination. This sequence-dependence is linked to evolutionarily conserved key residues in the catalytic region of Cdc34 and can determine if Sic1 is mono- or poly-ubiquitinated. Our studies indicate that amino acid determinants in the Cdc34 catalytic region and their compatibility to those surrounding acceptor lysine residues play important roles in lysine selection. This may represent a general mechanism in directing the mode of ubiquitination in E2 s.
Resumo:
Existing evidence for successful silvicultural control of Hypsipyla spp. is conflicting and to a large extent anecdotal. Levels of attack have been correlated with factors such as shade, planting density, species mixtures, site characteristics, etc. These factors have often been poorly defined and are usually interdependent. The actual mechanisms that determine whether or not Hypsipyla spp. adversely affects plants we define as host-finding, host suitability, host recovery and natural enemies. These mechanisms can be influenced by the silvicultural techniques applied to a stand. Success of silvicultural techniques can usually be attributed to more than one mechanism and it is difficult to assess which is most the important for minimising the impact of Hypsipyla as these analytical data are lacking. This highlights the need for further research on silvicultural methods for controlling Hypsipyla spp. However, several silvicultural techniques that are briefly described show promise for improving the performance of future plantations. Examples of silvicultural control are reviewed with reference to these mechanisms.
Resumo:
Throughout Australia (and elsewhere in the world) public spaces are under attack by developers and also attempts by civic authorities to regulate, restrict and reframe them. A consequence of the increasingly security driven, privatised and surveilled nature of public space is the exclusion and displacement of those considered flawed and unwelcome in the “spectacular” consumption spaces of major urban centres. In this context of monitoring and control procedures, children and young people’s use of public space in parks, neighbourhoods, shopping malls and streets is often viewed as a threat to social order, requiring various forms of punitive and/or remedial action. This paper discusses developments in the surveillance, governance and control of public space used by children and young people in particular and the capacity for their displacement and marginality, diminishing their sense of belonging, wellbeing and right to public space as an expression of social, political and civil citizenship.
Resumo:
Aflatoxin B1, a potently carcinogenic fungal metabolite, is converted to the biologically active form by chemical oxidation using dimethyldioxirane and enzymatically by cytochrome P450 mixed-function oxidases. Both processes give rise to mixtures of the exo- and endo-8,9-epoxides. Methanolysis studies reveal exclusive trans opening of both epoxides under neutral conditions in CH3OH and CH3OH/H2O mixtures; an SN2 mechanism is postulated. Under acidic conditions, the exo isomer gives mixtures of trans and cis solvolysis products, suggesting that the reaction is, at least in part, SN1; the endo isomer gives only the trans product. The exo isomer reacts with DNA by attack of the nitrogen atom at the 7 position of guanine on C8 of the epoxide to give the trans adduct; the endo epoxide fails to form an adduct at this or any other site in DNA. The exo isomer is strongly mutagenic in a base-pair reversion assay employing Salmonella typhimurium; the endo isomer is essentially nonmutagenic. Aflatoxin B1 and its derivatives intercalate in DNA. These results are consistent with a mechanism in which intercalation of the exo epoxide optimally orients the epoxide for an SN2 reaction with guanine but intercalation of the endo isomer places the epoxide in an orientation which precludes reaction. Thus, while the exo epoxide is a potent mutagen, the endo epoxide fails to react with DNA.
Resumo:
The chlamydiae are obligate intracellular parasites that have evolved specific interactions with their various hosts and host cell types to ensure their successful survival and consequential pathogenesis. The species Chlamydia pneumoniae is ubiquitous, with serological studies showing that most humans are infected at some stage in their lifetime. While most human infections are asymptomatic, C. pneumoniae can cause more-severe respiratory disease and pneumonia and has been linked to chronic diseases such as asthma, atherosclerosis, and even Alzheimer's disease. The widely dispersed animal-adapted C. pneumoniae strains cause an equally wide range of diseases in their hosts. It is emerging that the ability of C. pneumoniae to survive inside its target cells, including evasion of the host's immune attack mechanisms, is linked to the acquisition of key metabolites. Tryptophan and arginine are key checkpoint compounds in this host-parasite battle. Interestingly, the animal strains of C. pneumoniae have a slightly larger genome, enabling them to cope better with metabolite restrictions. It therefore appears that as the evolutionarily more ancient animal strains have evolved to infect humans, they have selectively become more "susceptible" to the levels of key metabolites, such as tryptophan. While this might initially appear to be a weakness, it allows these human C. pneumoniae strains to exquisitely sense host immune attack and respond by rapidly reverting to a persistent phase. During persistence, they reduce their metabolic levels, halting progression of their developmental cycle, waiting until the hostile external conditions have passed before they reemerge.
Resumo:
Migraine is a common neurological disorder classified by the World Health Organisation (WHO) as one of the top twenty most debilitating diseases in the developed world. Current therapies are only effective for a proportion of sufferers and new therapeutic targets are desperately needed to alleviate this burden. Recently the role of epigenetics in the development of many complex diseases including migraine has become an emerging topic. By understanding the importance of acetylation, methylation and other epigenetic modifications, it then follows that this modification process is a potential target to manipulate epigenetic status with the goal of treating disease. Bisulphite sequencing and methylated DNA immunoprecipitation have been used to demonstrate the presence of methylated cytosines in the human D-loop of mitochondrial DNA (mtDNA), proving that the mitochondrial genome is methylated. For the first time, it has been shown that there is a difference in mtDNA epigenetic status between healthy controls and those with disease, especially for neurodegenerative and age related conditions. Given co-morbidities with migraine and the suggestive link between mitochondrial dysfunction and the lowered threshold for triggering a migraine attack, mitochondrial methylation may be a new avenue to pursue. Creative thinking and new approaches are needed to solve complex problems and a systems biology approach, where multiple layers of information are integrated is becoming more important in complex disease modelling.
Resumo:
For Construction - Architectural drawing package. House designed to AS3959:2009 Bushfire Attack Level 40. QUT-Client Agreement 100% Research (HERDC definition of Research).