956 resultados para Applied identity-based encryption
Resumo:
Now a days, email has become the most widely communication way in daily life. The main reason for using email is probably because of the convenience and speed in which it can be transmitted irrespective of geographical distances. To improve security and efficiency of email system, most of the email system adopt PKI and IBE encryption schemes. However, both PKI and IBE encryption schemes have their own shortcomings and consequently bring security issues to email systems. This paper proposes a new secure email system based on IBE which combines finger print authentication and proxy service for encryption and decryption
Resumo:
L'objectiu principal del projecte és l'estudi, la implementació d'algoritmes i protocols amb criptografia basada en la identitat. Aquesta o Identity Based Encryption (IBE) s'utilitza per simplificar el procés de comunicacions segures, com per exemple el correu electrònic. IBE permet a les polítiques de seguretat ser codificades directament sense la necessitat d'usar certificats. Aquests esquemes van ser proposats inicialment per A. Shamir a l'any 1984 i han estat objecte d'estudi per D. Boneh, S. Galbraith, etc. En aquest farem l'estudi dels emparellaments de Werl i Tate a través de l'algorisme de Miller, que ens permetrà implementar aquests emparellaments sobre corbes el·líptiques supersingulars.
Resumo:
The main objective of this paper is to evaluate the key elements in the construction of cosistent organisational messages over time. In order to accomplish that, we propose the aligment of several elements: vision, misson, objectives, cultural values, optimal identity attributes, positioning, type of messages, communication style and means, and image...
Resumo:
We analyze the consistency of the recently proposed regularization of an identity based solution in open bosonic string field theory. We show that the equation of motion is satisfied when it is contracted with the regularized solution itself. Additionally, we propose a similar regularization of an identity based solution in the modified cubic superstring field theory.
Resumo:
The aim of this study was to explore two of the mechanisms by which transformational leaders have a positive influence on followers. It examined the mediating role of follower's leader and group identification on the associations among different transformational leader behaviours and follower job satisfaction and supervisor-rated job performance. One hundred and seventy-nine healthcare employees and 44 supervisors participated in the study. The results from multilevel structural equation modelling provided results that partially supported the predicted model. Identification with the leader significantly mediated the positive associations between supportive leadership, intellectual stimulation, personal recognition, in the prediction of job satisfaction and job performance. Leader identification also mediated the relationship between supportive leadership, intellectual stimulation, personal recognition, and group identification. However, group identification did not mediate the associations between vision leadership and inspirational communication, in the prediction of job satisfaction and job performance. The results highlight the role of individualized forms of leadership and leader identification in enhancing follower outcomes.
Resumo:
Perceived discrimination is associated with increased engagement in unhealthy behaviors. We propose an identity-based pathway to explain this link. Drawing on an identity-based motivation model of health behaviors (Oyserman, Fryberg, & Yoder, 2007), we propose that erceptions of discrimination lead individuals to engage in ingroup-prototypical behaviors in the service of validating their identity and creating a sense of ingroup belonging. To the extent that people perceive unhealthy behaviors as ingroup-prototypical, perceived discrimination may thus increase motivation to engage in unhealthy behaviors. We describe our theoretical model and two studies that demonstrate initial support for some paths in this model. In Study 1, African American participants who reflected on racial discrimination were more likely to endorse unhealthy ingroup-prototypical behavior as self-characteristic than those who reflected on a neutral event. In Study 2, among African American participants who perceived unhealthy behaviors to be ingroup-prototypical, discrimination predicted greater endorsement of unhealthy behaviors as self-characteristic as compared to a control condition. These effects held both with and without controlling for body mass index (BMI) and income. Broader implications of this model for how discrimination adversely affects health-related decisions are discussed.
Resumo:
Bilinear pairings can be used to construct cryptographic systems with very desirable properties. A pairing performs a mapping on members of groups on elliptic and genus 2 hyperelliptic curves to an extension of the finite field on which the curves are defined. The finite fields must, however, be large to ensure adequate security. The complicated group structure of the curves and the expensive field operations result in time consuming computations that are an impediment to the practicality of pairing-based systems. The Tate pairing can be computed efficiently using the ɳT method. Hardware architectures can be used to accelerate the required operations by exploiting the parallelism inherent to the algorithmic and finite field calculations. The Tate pairing can be performed on elliptic curves of characteristic 2 and 3 and on genus 2 hyperelliptic curves of characteristic 2. Curve selection is dependent on several factors including desired computational speed, the area constraints of the target device and the required security level. In this thesis, custom hardware processors for the acceleration of the Tate pairing are presented and implemented on an FPGA. The underlying hardware architectures are designed with care to exploit available parallelism while ensuring resource efficiency. The characteristic 2 elliptic curve processor contains novel units that return a pairing result in a very low number of clock cycles. Despite the more complicated computational algorithm, the speed of the genus 2 processor is comparable. Pairing computation on each of these curves can be appealing in applications with various attributes. A flexible processor that can perform pairing computation on elliptic curves of characteristic 2 and 3 has also been designed. An integrated hardware/software design and verification environment has been developed. This system automates the procedures required for robust processor creation and enables the rapid provision of solutions for a wide range of cryptographic applications.
Resumo:
Bildbasierte Authentifizierung und Verschlüsselung: Identitätsbasierte Kryptographie (oft auch identity Based Encryption, IBE) ist eine Variation der asymmetrischen Schlüsselverfahren, bei der der öffentliche Schlüssel des Anwenders eine beliebig wählbare Zeichenfolge sein darf, die dem Besitzer offensichtlich zugeordnet werden kann. Adi Shamir stellte 1984 zunächst ein solches Signatursystem vor. In der Literatur wird dabei als öffentlicher Schlüssel meist die Email-Adresse oder eine Sozialversicherungsnummer genannt. Der Preis für die freie Schlüsselwahl ist die Einbeziehung eines vertrauenswürdigen Dritten, genannt Private Key Generator, der mit seinem privaten Generalschlüssel den privaten Schlüssel des Antragstellers generiert. Mit der Arbeit von Boneh und Franklin 2001 zum Einsatz der Weil-Paarbildung über elliptischen Kurven wurde IBE auf eine sichere und praktikable Grundlage gestellt. In dieser Arbeit wird nach einer allgemeinen Übersicht über Probleme und Lösungsmöglichkeiten für Authentifizierungsaufgaben im zweiten Teil als neue Idee der Einsatz eines Bildes des Anwenders als öffentlicher Schlüssel vorgeschlagen. Dazu wird der Ablauf der Schlüsselausgabe, die Bestellung einer Dienstleistung, z. B. die Ausstellung einer personengebundenen Fahrkarte, sowie deren Kontrolle dargestellt. Letztere kann offline auf dem Gerät des Kontrolleurs erfolgen, wobei Ticket und Bild auf dem Handy des Kunden bereitliegen. Insgesamt eröffnet sich dadurch die Möglichkeit einer Authentifizierung ohne weitere Preisgabe einer Identität, wenn man davon ausgeht, dass das Bild einer Person angesichts allgegenwärtiger Kameras sowieso öffentlich ist. Die Praktikabilität wird mit einer Implementierung auf der Basis des IBE-JCA Providers der National University of Ireland in Maynooth demonstriert und liefert auch Aufschluss auf das in der Praxis zu erwartende Laufzeitverhalten.
Resumo:
La Criptografía Basada en la Identidad hace uso de curvas elípticas que satisfacen ciertas condiciones (pairingfriendly curves), en particular, el grado de inmersión de dichas curvas debe ser pequeño. En este trabajo se obtienen familias explicitas de curvas elípticas idóneas para este escenario. Dicha criptografía está basada en el cálculo de emparejamientos sobre curvas, cálculo factible gracias al algoritmo de Miller. Proponemos una versión más eficiente que la clásica de este algoritmo usando la representación de un número en forma no adyacente (NAF).
Resumo:
L’objectif général de ce mémoire est de comprendre l‘impact du genre sur l’identité de travail des cowboys, dans leur milieu de travail et de vie dans un ranch du Canada. Cette étude vise à contribuer aux études sur le genre en utilisant des théories existantes pour les appliquer à un nouveau champ. Sur la base d’une approche théorique fondée dans le féminisme et les études sur la masculinité, en utilisant aussi l’histoire des cowboys de l’Ouest, cette étude se penche sur la question de l’importance du genre dans la division du travail dans le ranch, celle de l’identité de travail des cowboys et sur la façon dont le genre affecte cette identité. La collecte des données s’est faite par l’observation participante et des entrevues semi-structurées. En utilisant une analyse thématique des données, l’étude conclut que le genre est un principe important dans la division du travail dans le ranch et que l’identité de travail est d’une extrême importance pour les cowboys. En outre, l’étude démontre que le genre jour de différentes façons dans l’identité de travail, l’hétéronormativité et les idéaux du cowboy allant dans le même sens, alors que la féminité s’oppose à cet idéal. Les traditions sont encore importantes pour les cowboys contemporains, mais en même temps, ceux-ci mentionnent la réalité du travail éreintant et sans fin comme contrepoids à l’image romantique de la vie des cowboys. Enfin, il y a des similitudes entre les cowboys de cette étude et les adolescentes suédoises étudies par Ambjörnsonn (2004) dans la façon dont le groupe se crée une identité sur la base du genre.
Resumo:
Collaborative sharing of information is becoming much more needed technique to achieve complex goals in today's fast-paced tech-dominant world. Personal Health Record (PHR) system has become a popular research area for sharing patients informa- tion very quickly among health professionals. PHR systems store and process sensitive information, which should have proper security mechanisms to protect patients' private data. Thus, access control mechanisms of the PHR should be well-defined. Secondly, PHRs should be stored in encrypted form. Cryptographic schemes offering a more suitable solution for enforcing access policies based on user attributes are needed for this purpose. Attribute-based encryption can resolve these problems, we propose a patient-centric framework that protects PHRs against untrusted service providers and malicious users. In this framework, we have used Ciphertext Policy Attribute Based Encryption scheme as an efficient cryptographic technique, enhancing security and privacy of the system, as well as enabling access revocation. Patients can encrypt their PHRs and store them on untrusted storage servers. They also maintain full control over access to their PHR data by assigning attribute-based access control to selected data users, and revoking unauthorized users instantly. In order to evaluate our system, we implemented CP-ABE library and web services as part of our framework. We also developed an android application based on the framework that allows users to register into the system, encrypt their PHR data and upload to the server, and at the same time authorized users can download PHR data and decrypt it. Finally, we present experimental results and performance analysis. It shows that the deployment of the proposed system would be practical and can be applied into practice.
Resumo:
We describe the concept, the fabrication, and the most relevant properties of a piezoelectric-polymer system: Two fluoroethylenepropylene (FEP) films with good electret properties are laminated around a specifically designed and prepared polytetrafluoroethylene (PTFE) template at 300 degrees C. After removing the PTFE template, a two-layer FEP film with open tubular channels is obtained. For electric charging, the two-layer FEP system is subjected to a high electric field. The resulting dielectric barrier discharges inside the tubular channels yield a ferroelectret with high piezoelectricity. d(33) coefficients of up to 160 pC/N have already been achieved on the ferroelectret films. After charging at suitable elevated temperatures, the piezoelectricity is stable at temperatures of at least 130 degrees C. Advantages of the transducer films include ease of fabrication at laboratory or industrial scales, a wide range of possible geometrical and processing parameters, straightforward control of the uniformity of the polymer system, flexibility, and versatility of the soft ferroelectrets, and a large potential for device applications e.g., in the areas of biomedicine, communications, production engineering, sensor systems, environmental monitoring, etc.
Resumo:
Deoxyribonucleic acid based gel solid electrolytes were prepared and their electric properties were characterized. Their ionic conductivity is in the range of 10(-4)-10(-5) S/cm at room temperature and increases linearly in function of temperature, obeying an Arrhenius-like relationship. The present study, combined with the literature data, suggests that the electrical conduction mechanism in these membranes involve ion motion and/or charge hopping, promoted most likely by a significant interaction between the membrane components. The good conductivity results, as found here, together with the good transparency and good adhesion to the electrodes show that the DNA-based gel polymer electrolytes are very promising materials for application in various electrochromic devices. (C) 2011 American Institute of Physics. [doi: 10.1063/1.3610951]
Resumo:
There is a wide agreement that identity is a multidisciplinary concept. The authors consider this an opportunity do develop a framework to assess identity. In a marketing context, literature reveals two approaches on identity: one focus on corporate identity and the other focus on branding. The aim of this paper is to integrate these two approaches to develop a synthesis framework to assess brand identity. Based on literature on identity the authors found nine components related to brand identity. Those components are described in this paper as well as the relation they have with brand identity. The authors hope that this synthesis approach contributes to a better understanding of the brand identity, and are very encouraging for refining this framework in the future.
Resumo:
In recent years, organizational culture has become one of the common themes of interest of scientific and academic research. Each organization has its own unique cultural identity. Based on the recognition that organizational culture is considered important to an organization’s results, and social economy organizations are concerned with improving managerial practices and results, our objective is to study organizational culture in cooperatives: identifying their organizational culture as a specific type of organization of the social economy, recognized as increasingly important economic agents; and in doing so, explore the usage of a widely known model, the Competing Values Framework (Quinn & Rohrbaugh 1983). Three cooperatives were studied. Their presidents were interviewed, and a questionnaire was applied to cooperative members to obtain demographic and organizational culture data. Differences between the cooperatives’ cultural profiles seem to be consistent with both the circumstances of Portuguese social economy organizations (SEOs), and to the organizations’ uniqueness regarding their trade, focuses, and history. International firm trends were compared with this study’s results, and also appear to be explained by the SEO’s management practices evolution standpoint: lack of structured way of working, and the need to improvise and innovate in order to get things done. The importance of our research is held in the fact that social economy, and the cooperative movement in particular, has a developing importance in the expansion of many economies, the lack of literature on culture in SEOs, and the exploratory usage of a well-known model of management literature in cooperatives.