945 resultados para Key non-malleability


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Since their introduction, the notions of indistinguishability and non-malleability have been changed and extended by different authors to support different goals. In this paper, we propose new flavors of these notions, investigate their relative strengths with respect to previous notions, and provide the full picture of relationships (i.e., implications and separations) among the security notions for public-key encryption schemes. We take into account the two general security goals of indistinguishability and non-malleability, each in the message space, key space, and hybrid message-key space to find six specific goals, a couple of them, namely complete indistinguishability and key non-malleability, are new. Then for each pair of goals, coming from the indistinguishability or non-malleability classes, we prove either an implication or a separation, completing the full picture of relationships among all these security notions. The implications and separations are respectively supported by formal proofs (i.e., reductions) in the concrete-security framework and by counterexamples.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

An encryption scheme is non-malleable if giving an encryption of a message to an adversary does not increase its chances of producing an encryption of a related message (under a given public key). Fischlin introduced a stronger notion, known as complete non-malleability, which requires attackers to have negligible advantage, even if they are allowed to transform the public key under which the related message is encrypted. Ventre and Visconti later proposed a comparison-based definition of this security notion, which is more in line with the well-studied definitions proposed by Bellare et al. The authors also provide additional feasibility results by proposing two constructions of completely non-malleable schemes, one in the common reference string model using non-interactive zero-knowledge proofs, and another using interactive encryption schemes. Therefore, the only previously known completely non-malleable (and non-interactive) scheme in the standard model, is quite inefficient as it relies on generic NIZK approach. They left the existence of efficient schemes in the common reference string model as an open problem. Recently, two efficient public-key encryption schemes have been proposed by Libert and Yung, and Barbosa and Farshim, both of them are based on pairing identity-based encryption. At ACISP 2011, Sepahi et al. proposed a method to achieve completely non-malleable encryption in the public-key setting using lattices but there is no security proof for the proposed scheme. In this paper we review the mentioned scheme and provide its security proof in the standard model. Our study shows that Sepahi’s scheme will remain secure even for post-quantum world since there are currently no known quantum algorithms for solving lattice problems that perform significantly better than the best known classical (i.e., non-quantum) algorithms.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this paper we make progress towards solving an open problem posed by Katz and Yung at CRYPTO 2003. We propose the first protocol for key exchange among n ≥2k+1 parties which simultaneously achieves all of the following properties: 1. Key Privacy (including forward security) against active attacks by group outsiders, 2. Non-malleability — meaning in particular that no subset of up to k corrupted group insiders can ‘fix’ the agreed key to a desired value, and 3. Robustness against denial of service attacks by up to k corrupted group insiders. Our insider security properties above are achieved assuming the availability of a reliable broadcast channel.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This short film, created by David Megarrity and Luke Monsour, experimented within a short timeframe with the challenge of superimposition of hand-drawn backgrounds, non-verbal action, and a short, sharp shoot. The aim was also to find a single piece of standalone music that would act as an unedited soundtrack It won Best Queensland Film at the Woodford Film Festival in 2005, and was screened at Base-Court, Lausanne Switzerland in 2006, and the Westgarth Film Festival 2005. It was acquired by comedy website minimovie in 2007.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

A comprehensive one-dimensional meanline design approach for radial inflow turbines is described in the present work. An original code was developed in Python that takes a novel approach to the automatic selection of feasible machines based on pre-defined performance or geometry characteristics for a given application. It comprises a brute-force search algorithm that traverses the entire search space based on key non-dimensional parameters and rotational speed. In this study, an in-depth analysis and subsequent implementation of relevant loss models as well as selection criteria for radial inflow turbines is addressed. Comparison with previously published designs, as well as other available codes, showed good agreement. Sample (real and theoretical) test cases were trialed and results showed good agreement when compared to other available codes. The presented approach was found to be valid and the model was found to be a useful tool with regards to the preliminary design and performance estimation of radial inflow turbines, enabling its integration with other thermodynamic cycle analysis and three-dimensional blade design codes.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This thesis describes an investigation of retinal directional selectivity. We show intracellular (whole-cell patch) recordings in turtle retina which indicate that this computation occurs prior to the ganglion cell, and we describe a pre-ganglionic circuit model to account for this and other findings which places the non-linear spatio-temporal filter at individual, oriented amacrine cell dendrites. The key non-linearity is provided by interactions between excitatory and inhibitory synaptic inputs onto the dendrites, and their distal tips provide directionally selective excitatory outputs onto ganglion cells. Detailed simulations of putative cells support this model, given reasonable parameter constraints. The performance of the model also suggests that this computational substructure may be relevant within the dendritic trees of CNS neurons in general.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

BACKGROUND: Hypertension is the most prevalent comorbidity after heart transplantation (HT). Exercise training (ET) is widely recommended as a key non-pharmacologic intervention for the prevention and management of hypertension, but its effects on ambulatory blood pressure (ABP) and some mechanisms involved in the pathophysiology of hypertension have not been studied in this population. The primary purpose of this study was to investigate the effects of ET on ABP and arterial stiffness of HT recipients.METHODS: 40 HT patients, randomized to ET (n = 31) or a control group (n = 9) underwent a maximal graded exercise test, 24-hour ABP monitoring, and carotid-femoral pulse wave velocity (PWV) assessment before the intervention and at a 12-week follow-up assessment. The ET program was performed thrice-weekly and consisted primarily of endurance exercise (40 minutes) at similar to 70% of maximum oxygen uptake (Vo(2MAX))RESULTS: The ET group had reduced 24-hour (4.0 +/- 1.4 mm Hg, p < 0.01) and daytime (4.8 +/- 1.6 mm Hg, p < 0.01) systolic ABP, and 24-hour (7.0 +/- 1.4 mm Hg, p < 0.001) daytime (7.5 +/- 1.6 mm Hg, p < 0.001) and nighttime (5.9 +/- 1.5 mm Hg, p < 0.001) diastolic ABP after the intervention. The ET group also had improved Vo(2MAX) (9.7% +/- 2.6%, p < 0.001) after the intervention. However, PWV did not change after ET. No variable was changed in the control group after the intervention.CONCLUSIONS: The 12-week ET program was effective for reducing ABP but not PWV in heart transplant recipients. This result suggesfs that endurance ET may be a tool to counteract hypertension in this high-risk population. (C) 2015 International Society for Heart and Lung Transplantation. All rights reserved.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

1 Light availability may be crucial for understanding dynamics of plant–herbivore interactions in temperate and tropical forest communities. This is because local light availability can influence both tree seedling tolerance and susceptibility to herbivory – yet how they mediate levels of insect herbivory that vary with the density of host population is virtually unknown. Here we tested predictions of three key, non-mutually exclusive hypotheses of plant–herbivore interactions: the Limiting Resource Model (LRM), the Plant Vigour Hypothesis (PVH), and the Janzen-Connell Mechanism (JCM). 2 In an Amazonian forest, we planted Swietenia macrophylla seedlings (c. 5 months old) into natural canopy gaps and the shaded understorey and simulated the damage patterns of the specialist herbivore moth, Steniscadia poliophaea, by clipping seedling leaves. Over the next 8 months, we monitored seedling performance in terms of growth and survivorship and also quantified herbivory to new young leaves on a seasonal basis. 3 In support of the LRM, severe leaf damage (≥ 50%) was lethal for Swietenia macrophylla seedlings in the understorey, but in gaps only reduced seedling growth. In support of the PVH, gap seedlings suffered greater post-simulated herbivory (up to 100% defoliation) by S. poliophaea caterpillars than their understorey counterparts. 4 Adding a novel dimension to the Janzen–Connell hypothesis, we found that early wet season herbivory of seedlings in gaps increased with conspecific adult density within a 125-m radius; whereas in the understorey only those seedlings within 50 m of a Swietenia tree were attacked by caterpillars. 5 Synthesis. These results suggest lepidopterans that need young leaves for food may forage more widely in forests to find seedlings in light-rich canopy gaps. Moths may achieve this successfully by being first attracted to gaps, and then searching within them for suitable hosts. A conceptual model, integrating conspecific adult tree density with light-driven changes in seedling tolerance/vigour and their susceptibility to herbivory and mortality, is presented. Spatial variation in the light available to tree seedlings often affects their tolerance and vigour, which may have important consequences for leaf-chewing insects and the scale of density-dependent herbivory in forests.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This chapter investigates the conflicting demands faced by web designers in the development of social e-atmospherics that aim to encourage e-value creation, thus strengthening and prolonging market planning strategies. While recent studies have shown that significant shifts are occurring concerning the importance of users’ generated content by way of social e-communication tools (e.g. blogs), these trends are also creating expectations that social and cultural cues ought to become a greater part of e-atmospherics and e-business strategies. Yet, there is growing evidence that organizations are resisting such efforts, fearing that they will lose control of their e-marketing strategy. This chapter contributes to the theory and literature on online cross-cultural understanding and the impact website designers (meso-level) can have on improving the sustainability of e-business planning, departing from recent studies that focus mainly on firms’ e-business plans (macro-level) or final consumers (micro-level). A second contribution is made with respect to online behavior regarding the advancement of technologies that facilitate the development and shaping of new social e-atmospherics that affect users’ behavior and long term e-business strategies through the avoidance of traditional, formal decision making processes and marketing strategy mechanisms implemented by firms. These issues have been highlighted in the literature on the co-production and co-creation of value, which few organizations have thus far integrated in their strategic and pragmatic e-business plans. Drawing upon fifteen online interviews with web designers in the USA, as key non-institutional actors at the meso-level who are developing what future websites will be like, this chapter analyzes ways in which identifying points of resistance and conflicting demands can lead to engagement with the debate over the online co-creation of value and more sustainable future e-business planning. A number of points of resistance to the inclusion of more e-social atmospherics are identified, and the implications for web designers’ roles and web design planning are discussed along with the limitations of the study and potential future research for e-business studies.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Current research in secure messaging for Vehicular Ad hoc Networks (VANETs) appears to focus on employing a digital certificate-based Public Key Cryptosystem (PKC) to support security. The security overhead of such a scheme, however, creates a transmission delay and introduces a time-consuming verification process to VANET communications. This paper proposes a non-certificate-based public key management for VANETs. A comprehensive evaluation of performance and scalability of the proposed public key management regime is presented, which is compared to a certificate-based PKC by employing a number of quantified analyses and simulations. Not only does this paper demonstrate that the proposal can maintain security, but it also asserts that it can improve overall performance and scalability at a lower cost, compared to the certificate-based PKC. It is believed that the proposed scheme will add a new dimension to the key management and verification services for VANETs.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Non-communicable diseases (NCDs) dominate disease burdens globally and poor nutrition increasingly contributes to this global burden. Comprehensive monitoring of food environments, and evaluation of the impact of public and private sector policies on food environments is needed to strengthen accountability systems to reduce NCDs. The International Network for Food and Obesity/NCDs Research, Monitoring and Action Support (INFORMAS) is a global network of public-interest organizations and researchers that aims to monitor, benchmark and support public and private sector actions to create healthy food environments and reduce obesity, NCDs and their related inequalities. The INFORMAS framework includes two ‘process’ modules, that monitor the policies and actions of the public and private sectors, seven ‘impact’ modules that monitor the key characteristics of food environments and three ‘outcome’ modules that monitor dietary quality, risk factors and NCD morbidity and mortality. Monitoring frameworks and indicators have been developed for 10 modules to provide consistency, but allowing for stepwise approaches (‘minimal’, ‘expanded’, ‘optimal’) to data collection and analysis. INFORMAS data will enable benchmarking of food environments between countries, and monitoring of progress over time within countries. Through monitoring and benchmarking, INFORMAS will strengthen the accountability systems needed to help reduce the burden of obesity, NCDs and their related inequalities.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Multi-party key agreement protocols indirectly assume that each principal equally contributes to the final form of the key. In this paper we consider three malleability attacks on multi-party key agreement protocols. The first attack, called strong key control allows a dishonest principal (or a group of principals) to fix the key to a pre-set value. The second attack is weak key control in which the key is still random, but the set from which the key is drawn is much smaller than expected. The third attack is named selective key control in which a dishonest principal (or a group of dishonest principals) is able to remove a contribution of honest principals to the group key. The paper discusses the above three attacks on several key agreement protocols, including DH (Diffie-Hellman), BD (Burmester-Desmedt) and JV (Just-Vaudenay). We show that dishonest principals in all three protocols can weakly control the key, and the only protocol which does not allow for strong key control is the DH protocol. The BD and JV protocols permit to modify the group key by any pair of neighboring principals. This modification remains undetected by honest principals.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Two new statistics, namely Delta(chi 2) and Delta(chi), based on the extreme value theory, were derived by Gupta et al. We use these statistics to study the direction dependence in the HST Key Project data, which provides one of the most precise measurements of the Hubble constant. We also study the non-Gaussianity in this data set using these statistics. Our results for Delta(chi 2) show that the significance of direction-dependent systematics is restricted to well below the 1 sigma confidence limit; however, the presence of non-Gaussian features is subtle. On the other hand, the Delta(chi). statistic, which is more sensitive to direction dependence, shows direction dependence systematics to be at a slightly higher confidence level, and the presence of non-Gaussian features at a level similar to the Delta(chi 2) statistic.