16 resultados para Santos, Juan Manuel
em Queensland University of Technology - ePrints Archive
Resumo:
We treat the security of group key exchange (GKE) in the universal composability (UC) framework. Analyzing GKE protocols in the UC framework naturally addresses attacks by malicious insiders. We define an ideal functionality for GKE that captures contributiveness in addition to other desired security goals. We show that an efficient two-round protocol securely realizes the proposed functionality in the random oracle model. As a result, we obtain the most efficient UC-secure contributory GKE protocol known.
Resumo:
A key exchange protocol allows a set of parties to agree upon a secret session key over a public network. Two-party key exchange (2PKE) protocols have been rigorously analyzed under various models considering different adversarial actions. However, the analysis of group key exchange (GKE) protocols has not been as extensive as that of 2PKE protocols. Particularly, the security attribute of key compromise impersonation (KCI) resilience has so far been ignored for the case of GKE protocols. We first model the security of GKE protocols addressing KCI attacks by both outsider and insider adversaries. We then show that a few existing protocols are not secure even against outsider KCI attacks. The attacks on these protocols demonstrate the necessity of considering KCI resilience for GKE protocols. Finally, we give a new proof of security for an existing GKE protocol under the revised model assuming random oracles.
Resumo:
The security of strong designated verifier (SDV) signature schemes has thus far been analyzed only in a two-user setting. We observe that security in a two-user setting does not necessarily imply the same in a multi-user setting for SDV signatures. Moreover, we show that existing security notions do not adequately model the security of SDV signatures even in a two-user setting. We then propose revised notions of security in a multi-user setting and show that no existing scheme satisfies these notions. A new SDV signature scheme is then presented and proven secure under the revised notions in the standard model. For the purpose of constructing the SDV signature scheme, we propose a one-pass key establishment protocol in the standard model, which is of independent interest in itself.
Resumo:
This paper presents efficient formulas for computing cryptographic pairings on the curve y 2 = c x 3 + 1 over fields of large characteristic. We provide examples of pairing-friendly elliptic curves of this form which are of interest for efficient pairing implementations.
Resumo:
We show how to construct a certificateless key agreement protocol from the certificateless key encapsulation mechanism introduced by \cite{lippold-ICISC_2009} in ICISC 2009 using the \cite{DBLP:conf/acisp/BoydCNP08} protocol from ACISP 2008. We introduce the Canetti-Krawczyk (CK) model for certificateless cryptography, give security notions for Type I and Type II adversaries in the CK model, and highlight the differences to the existing e$^2$CK model discussed by \cite{DBLP:conf/pairing/LippoldBN09}. The resulting CK model is more relaxed thus giving more power to the adversary than the original CK model.
Resumo:
Predicate encryption has an advantage over traditional public-key or identity-based encryption, since predicate encryption systems provide more flexible control over access to encrypted data. We focus on delegation capabilities in predicate systems. More specifically, we investigate delegatable encryption systems supporting disjunctive predicate evaluations. We present formal security definitions of delegatable predicate encryption and provide the first delegatable predicate encryption scheme which supports disjunctive predicate evaluations in the public-key setting. We analyze the security of the proposed system and give a security proof. In addition, we present a delegatable predicate encryption in the symmetric-key setting and discuss the related security issues.
Resumo:
Choi et al. recently proposed an efficient RFID authentication protocol for a ubiquitous computing environment, OHLCAP(One-Way Hash based Low-Cost Authentication Protocol). However, this paper reveals that the protocol has several security weaknesses : 1) traceability based on the leakage of counter information, 2) vulnerability to an impersonation attack by maliciously updating a random number, and 3) traceability based on a physically-attacked tag. Finally, a security enhanced group-based authentication protocol is presented.
Resumo:
Predicate encryption is a new primitive that supports flexible control over access to encrypted data. We study predicate encryption systems, evaluating a wide class of predicates. Our systems are more expressive than the existing attribute-hiding systems in the sense that the proposed constructions support not only all existing predicate evaluations but also arbitrary conjunctions and disjunctions of comparison and subset queries. Toward our goal, we propose encryption schemes supporting multi-inner-product predicate and provide formal security analysis. We show how to apply the proposed schemes to achieve all those predicate evaluations.
Resumo:
This paper presents a comprehensive formal security framework for key derivation functions (KDF). The major security goal for a KDF is to produce cryptographic keys from a private seed value where the derived cryptographic keys are indistinguishable from random binary strings. We form a framework of five security models for KDFs. This consists of four security models that we propose: Known Public Inputs Attack (KPM, KPS), Adaptive Chosen Context Information Attack (CCM) and Adaptive Chosen Public Inputs Attack(CPM); and another security model, previously defined by Krawczyk [6], which we refer to as Adaptive Chosen Context Information Attack(CCS). These security models are simulated using an indistinguisibility game. In addition we prove the relationships between these five security models and analyse KDFs using the framework (in the random oracle model).
Resumo:
Aim: The aim of this evaluation was to evaluate the use of Individualised Medication Administration Guides (IMAGs) for patients with dysphagia on one stroke ward over a 6month period. Background: Patients with dysphagia (PWD) are more likely to suffer an administration error than patients without swallowing difficulties. To both standardise and improve medicines administration to patients with dysphagia I-MAGs were introduced on one stroke ward over a 6 month period. Methods: A software package supported with data on current national guidelines on the administration of medicines to PWD was designed by a specialised pharmacist in dysphagia to enable him to create individualised medication administration guides for patients with dysphagia which stated how each medicine should be optimally prepared and administered. On completion of the pilot service a questionnaire was given to all nurses, pharmacist and speech and language therapists who had experienced the I-MAGs. All the professionals received the same questionnaire but questions relevant only to their practice were added to the nurse’s questionnaire. Results: Of 26 Healthcare professionals (HCPs) approached, 19 returned completed questionnaires. Higher variability was found in the 13 responses from the nurse respondents than in the ones from the 3 pharmacist and the 3 SALTs. 8 (61%) of the nurses felt more confident in their practice when I-MAGs were in place. 10 (76%) of the nurses admitted that the guides could sometimes increase the time of the administration, but saw that it made practice safer. All the pharmacists considered the recommendations in the guides useful and all the respondents with the exception of one nurse (12:13) would like this service to continue. Conclusion: I-MAGs were well received on the ward and they support individualised care for patients with dysphagia. But the guides needed additional pharmacist input and greater nursing time. Research to determine the cost effectiveness of I-MAGs is needed.
Resumo:
Introduction Patients with dysphagia (PWDs) have been shown to be four times more likely to suffer medication administration errors (MAEs).1 2 Individualised medication administration guides (I-MAGs) which outline how each formulation should be administered, have been developed to standardise medication administration by nurses on the ward and reduce the likelihood of errors. This pilot study aimed to determine the recruitment rates, estimate effect on errors and develop the intervention to design a future full scale randomised controlled trial to determine the costs and effects of I-MAG implementation. Ethical approval was granted by local ethics committee. Method Software was developed to enable I-MAG production (based on current best practice)3 4 for all PWDs on two care of the older person wards admitted during a six month period from January to July 2011. I-MAGs were attached to the medication administration record charts to be utilised by nurses when administering medicines. Staff training was provided for all staff on the intervention wards. Two care of the older person wards in the same hospital were used for control purposes. All patients with dysphagia were recruited for follow up purposes at discharge. Four ward rounds at each intervention and control ward were observed pre and post I-MAG implementation to determine the level of medication administration errors. NHS ethical approval for the study was obtained. Results 164 I-MAGs were provided for 75 patients with dysphagia (PWDs) in the two intervention wards. At discharge, 23 patients in the intervention wards and 7 patients in the control wards were approached for recruitment of which 17 (74%) & 5 (71.5%) respectively consented. Discussion Recruitment rates were low on discharge due to the dysphagia remitting during hospitalisation. The introduction of the I-MAG demonstrated no effect on the quality of administration on the intervention ward and interestingly practice improved on the control ward. The observation of medication rounds at least one month post I-MAG removal may have identified a reversal to normal practice and ideally observations should have been undertaken with I-MAGs in place. Identification of the reason for the improvement in the control ward is warranted.
Resumo:
We naturally chew food before swallowing, but tablets and capsules require a complicated, conscious mechanism to over-ride the need to chew and the gag reflex, designed to eject foodstuffs that are not adequately chewed...
Resumo:
Inappropriate food or medication texture in patients with dysphagia is the most significant risk factor for pneumonia. Dysphagia is prevalent within care homes for the older person as it is largely found in conditions associated with ageing. This study was designed to determine the appropriateness of medication formulation choices in elderly patients with dysphagia in care homes.
Resumo:
As conditions such as stroke, cancer, Parkinson's disease and Huntingdon's chorea are commonly found in care homes between 15% and 30% of residents in care homes have been found to have difficulties in swallowing their medicines.To address the difficulties associated with administering medicines to patients who cannot swallow (with dysphagia), Individualised Medication Administration Guides (I-MAGs) were introduced by a specialised pharmacist in Care for Elderly wards in a general hospital in East Anglia. The guides contained detailed information about how to administer each medication and they were individualised to the needs of the patient. The I-MAGs were printed in green forms and attached to the medication chart in order to be used in conjunction with it. The ward nurses reported an increase in their confidence when administering medication when I-MAGs were present in the ward. Some patients with I-MAG were discharged to care homes where the I-MAG might have been equally useful. However, the design of such guides is not known to be suitable for care homes environment where they have never been used before. This study aims to explore the opinions of nurses and carers within care homes on the relevance and acceptability of individualised medication administration guides for patients with dysphagia (PWD).