115 resultados para dishonest signer


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Implementation of an electronic tendering (e-tendering) systems requires careful attention to the needs of the system and its various participants. Fairness in an e-tendering is of utmost importance. Current proposals and implementations do not provide fairness and thus, are vulnerable to collusion and favourism. Dishonest participants, either the principal or tenderer may collude to alter or view competing tenders which would give the favoured tenderer a greater chance of winning the contract. This paper proposes an e-tendering system that is secure and fair to all participants. We employ the techniques of anonymous token system along with signed commitment approach to achieve a publicly verifiable fair e-tendering protocol. We also provide an analysis of the protocol that confirms the security of our proposal against security goals for an e-tendering system.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Digital signatures are often used by trusted authorities to make unique bindings between a subject and a digital object; for example, certificate authorities certify a public key belongs to a domain name, and time-stamping authorities certify that a certain piece of information existed at a certain time. Traditional digital signature schemes however impose no uniqueness conditions, so a trusted authority could make multiple certifications for the same subject but different objects, be it intentionally, by accident, or following a (legal or illegal) coercion. We propose the notion of a double-authentication-preventing signature, in which a value to be signed is split into two parts: a subject and a message. If a signer ever signs two different messages for the same subject, enough information is revealed to allow anyone to compute valid signatures on behalf of the signer. This double-signature forgeability property discourages signers from misbehaving---a form of self-enforcement---and would give binding authorities like CAs some cryptographic arguments to resist legal coercion. We give a generic construction using a new type of trapdoor functions with extractability properties, which we show can be instantiated using the group of sign-agnostic quadratic residues modulo a Blum integer.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

One-time proxy signatures are one-time signatures for which a primary signer can delegate his or her signing capability to a proxy signer. In this work we propose two one-time proxy signature schemes with different security properties. Unlike other existing one-time proxy signatures that are constructed from public key cryptography, our proposed schemes are based one-way functions without trapdoors and so they inherit the communication and computation efficiency from the traditional one-time signatures. Although from a verifier point of view, signatures generated by the proxy are indistinguishable from those created by the primary signer, a trusted authority can be equipped with an algorithm that allows the authority to settle disputes between the signers. In our constructions, we use a combination of one-time signatures, oblivious transfer protocols and certain combinatorial objects. We characterise these new combinatorial objects and present constructions for them.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Universal Designated-Verifier Signature (UDVS) schemes are digital signature schemes with additional functionality which allows any holder of a signature to designate the signature to any desired designated-verifier such that the designated-verifier can verify that the message was signed by the signer, but is unable to convince anyone else of this fact. Since UDVS schemes reduce to standard signatures when no verifier designation is performed, it is natural to ask how to extend the classical Schnorr or RSA signature schemes into UDVS schemes, so that the existing key generation and signing implementation infrastructure for these schemes can be used without modification. We show how this can be efficiently achieved, and provide proofs of security for our schemes in the random oracle model.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Multi-party key agreement protocols indirectly assume that each principal equally contributes to the final form of the key. In this paper we consider three malleability attacks on multi-party key agreement protocols. The first attack, called strong key control allows a dishonest principal (or a group of principals) to fix the key to a pre-set value. The second attack is weak key control in which the key is still random, but the set from which the key is drawn is much smaller than expected. The third attack is named selective key control in which a dishonest principal (or a group of dishonest principals) is able to remove a contribution of honest principals to the group key. The paper discusses the above three attacks on several key agreement protocols, including DH (Diffie-Hellman), BD (Burmester-Desmedt) and JV (Just-Vaudenay). We show that dishonest principals in all three protocols can weakly control the key, and the only protocol which does not allow for strong key control is the DH protocol. The BD and JV protocols permit to modify the group key by any pair of neighboring principals. This modification remains undetected by honest principals.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Motivated by privacy issues associated with dissemination of signed digital certificates, we define a new type of signature scheme called a ‘Universal Designated-Verifier Signature’ (UDVS). A UDVS scheme can function as a standard publicly-verifiable digital signature but has additional functionality which allows any holder of a signature (not necessarily the signer) to designate the signature to any desired designated-verifier (using the verifier’s public key). Given the designated-signature, the designated-verifier can verify that the message was signed by the signer, but is unable to convince anyone else of this fact. We propose an efficient deterministic UDVS scheme constructed using any bilinear group-pair. Our UDVS scheme functions as a standard Boneh-Lynn-Shacham (BLS) signature when no verifier-designation is performed, and is therefore compatible with the key-generation, signing and verifying algorithms of the BLS scheme. We prove that our UDVS scheme is secure in the sense of our unforgeability and privacy notions for UDVS schemes, under the Bilinear Diffie-Hellman (BDH) assumption for the underlying group-pair, in the random-oracle model. We also demonstrate a general constructive equivalence between a class of unforgeable and unconditionally-private UDVS schemes having unique signatures (which includes the deterministic UDVS schemes) and a class of ID-Based Encryption (IBE) schemes which contains the Boneh-Franklin IBE scheme but not the Cocks IBE scheme.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The four studies presented in this dissertation were designed to examine the influence of socially desirable responding (SDR) on personality research outcomes. The assessment of personality relies heavily on the use of self-report questionnaires. Their validity could be threatened by people being dishonest in their self-descriptions and ascribing more desirable traits to themselves than would be warranted by their behaviour. Scales designed to detect SDR have been around for half a century, but their status continues to be debated. Paulhus (1991) Balanced Inventory of Desirable Responding (BIDR) is perhaps the most prominent of the scales developed to distinguish between those individuals who have distorted their responses and those who have not. The first two studies included in this dissertation mostly deal with the properties of the BIDR. The other two studies are less focused on SDR scales and investigate, more generally, the potential effects of SDR on two phenomena that are of central interest to the general personality discourse personality stability over time and volunteering as participants in psychological research. The data of Studies I and II showed that Paulhus BIDR scales, designed to be indicators of SDR, are not pure measures both the communion management and self-deceptive enhancement scales are, at once, measures of response bias and measures of more substantive individual differences in behaviour. The data further suggested that the communion management and self-deceptive enhancement scales of the BIDR are somewhat accurate measures of communal and agentic bias, respectively. No evidence for a suppressor model of SDR, and only weak evidence for a moderator model, was found in those studies. Concerning research on personality stability, some data in Study I suggested that SDR may add reliable and common variance to a personality questionnaire administered at two different points in time, thus artificially inflating the test-retest correlation of that questionnaire. Furthermore, Study III demonstrated that the maturity-stability hypothesis may be in part, but not entirely, a product of SDR. Study IV suggested that some of the observed personality differences between research volunteers and nonvolunteers may be due to heightened SDR of volunteers. However, those personality differences were by no means exclusively attributable to differences in SDR. In sum, the work presented in this thesis reveals some ambiguity regarding the effects of SDR on personality research, as is true of much of the previous research on SDR. Clear-cut conclusions are difficult to reach, as the data were neither fully consistent with the view that SDR can be ignored, nor with the view that SDR needs to be controlled in some way. The struggle to understand the influence of SDR on personality research continues.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Morgen hat Reserve Ruh / Auf Wiedersehen / Beste Gruesse; postcard signer Gottschalk; addressee: L Nurzinsky, Altona-Othmarschen, Aidikes Str.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Morgen hat Reserve Ruh / Auf Wiedersehen / Beste Gruesse; postcard signer Gottschalk; addressee: L Nurzinsky, Altona-Othmarschen, Aidikes Str.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Pastor and the Bible: Finnish Evangelical Lutheran Pastors Relationship with the Bible Since 1970s there has been extensive discussion in Finland about questions relating to the interpretation of the Bible. The themes of this discussion have focused on the trustworthiness and authority of the Bible, and the discussion has attracted participation not only from representatives of the Evangelical Lutheran Church of Finland but also from representatives of the academic community. The discussion has resulted in extensive publication on the relation of postmodern theology to the Bible. Despite this debate and the texts that have been produced, there is little empirical data on how Evangelical Lutheran pastors with theological education view the Bible. In the present study, 22 pastors of the Evangelical Lutheran Church of Finland were interviewed about how they defined their relationship with the Bible. The interview material was analyzed by means of data-based content analysis. The analysis showed, first, that the pastors viewed the Bible as a mirror of the spiritual growth that they had experienced in the past. Second, the Bible was viewed as a source in the interpretation of matters of faith. The third theme concerned the pastors key experiences in their relationship with the authority of the Bible. The time periods that were significant in defining pastors spiritual growth and past perspective on the Bible included childhood, youth, the period of theological education, and the time spent as a pastor. In childhood, the Bible was part of the spiritual atmosphere of the home, and parents and grandparents made a crucial contribution to the child s emerging view of the Bible. In childhood, the Bible was essentially the Old Testament and its exciting stories. In youth, reading the Bible became more personal, and the teachings of Jesus began to take on a more central role. In youth, most of the interviewees had strong experiences of faith and began to view the Bible as an absolute and divine source of dogma. The period of theological studies meant a change in their relationship with the Bible and particularly, revelation of the human aspects of the Bible. These changes were associated with a deepening of belief in the Bible and also a painful crisis in questions related to the trustworthiness of the Bible. For many of the interviewees, their relationship with the Bible changed also when they started their work as pastors. When faced with a call to work as a pastor, the interviewees created a synthesis of the secure faith that they had experienced in their childhood and the more critical views with which they had become acquainted during their theological education. Pastorhood meant the beginning of public teaching of the Bible. The interviewees felt that, in this new role, they discovered again - but now in a deeper sense - the trustworthiness in the bible that they had experienced during their childhood. Based on the interviewees experiences during the periods mentioned above, five different interpretations were formed regarding how the interviewed pastors viewed their past relationship with the Bible. These interpretations were detachment from literal interpretation of the Bible (1), changes in their relationship with the Bible arising from experiences of faith (2), a slow process during which their relationship with the Bible became more human (3), overcoming hardships (4), and no change in their relationship with the Bible (5). In interpretations 1-3, the past was described as a linear development and journey towards a more coherent relationship with the Bible. Interpretations 4-5, in turn, reflected a desire to detach oneself from the perspectives of linear development and change and, instead, emphasize the immutable and process-like nature of one s relationship with the Bible. Concerning the Bible as a source in matters of faith, a conspicuous aspect of the interviews was that all pastors wanted to disconnect themselves from a fundamentalistic view of the Bible, regarding this as an intellectually dishonest relationship with the Bible. On the other hand, none of the interviewees supported a totally relativist view of the Bible. Instead, all interviewees regarded the Bible as a vital source for both them and the Evangelical Lutheran Church. Between the two poles of extremely fundamental and extremely relativistic views, four different categories of viewing the Bible emerged from the interviews: absolute truth (a), a book about the message of salvation (b), a book about holiness and generous love (c), and a source of inspiration (d). The views in categories (a) and (b) emphasized the divine nature of the Bible. According to the pastors who expressed these views, the Bible contains a clear and trustworthy message of God. The views in categories (c) and (d), in turn, emphasized the human aspects of the Bible. The pastors who expressed these views regarded the Bible as a collection of books that was born in a specific historical and cultural context and includes material characteristic to this time. Due to the time-bound nature of the Bible, each generation has to update its view of the Bible. The views in categories (c) and (d) arose from human reality. Comparisons of the views in the different categories indicated that despite their obvious differences, they also shared some common features. The views in categories (a) and (d) shared the common feature of absoluteness, which was seen in category (a) as an emphasis on dogmatism and in category (d) as an emphasis on rationalism. The views in categories (b) and (c), in turn, shared the common feature of a flexible and dynamic relationship with the Bible. The key experiences that appeared to characterize pastors relationship with the authority of the Bible were a joy that arises from self-evidence, awakening to confusion, fear of openness, falling back upon paradoxes, and new confidence. These experiences reveal the circular nature of the process that was common to all interviewees interpretation of their relationship with the Bible. That is, the interviewees experiences of their relationship with the Bible seem to go through a circular process that is activated again and again in new life events. It is like a journey from self-evidence towards critical questions and again back to new confidence. The interview material showed, hence, that relationship with the Bible are characterized by a process that involves experiences of trust, questioning and new trust. The present study brings out the multifaceted reality of pastors relationship with the Bible. The study breaks down contradictions between conservative and liberal views of the Bible by showing how representatives of these opposing poles share commonalities in their attitudes. The study points to a close association between an individual s life history and his or her relationship with the Bible, and lays the groundwork for future studies to investigate the relation between personality and view of the Bible.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Mobile ad hoc networks (MANETs) is one of the successful wireless network paradigms which offers unrestricted mobility without depending on any underlying infrastructure. MANETs have become an exciting and im- portant technology in recent years because of the rapid proliferation of variety of wireless devices, and increased use of ad hoc networks in various applications. Like any other networks, MANETs are also prone to variety of attacks majorly in routing side, most of the proposed secured routing solutions based on cryptography and authentication methods have greater overhead, which results in latency problems and resource crunch problems, especially in energy side. The successful working of these mechanisms also depends on secured key management involving a trusted third authority, which is generally difficult to implement in MANET environ-ment due to volatile topology. Designing a secured routing algorithm for MANETs which incorporates the notion of trust without maintaining any trusted third entity is an interesting research problem in recent years. This paper propose a new trust model based on cognitive reasoning,which associates the notion of trust with all the member nodes of MANETs using a novel Behaviors-Observations- Beliefs(BOB) model. These trust values are used for detec- tion and prevention of malicious and dishonest nodes while routing the data. The proposed trust model works with the DTM-DSR protocol, which involves computation of direct trust between any two nodes using cognitive knowledge. We have taken care of trust fading over time, rewards, and penalties while computing the trustworthiness of a node and also route. A simulator is developed for testing the proposed algorithm, the results of experiments shows incorporation of cognitive reasoning for computation of trust in routing effectively detects intrusions in MANET environment, and generates more reliable routes for secured routing of data.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Esta tese baseia-se em trabalho etnográfico que investiga performances de gênero em um Clube de Mulheres no Rio de Janeiro, onde, após um show de strip-tease masculino para uma platéia exclusivamente feminina, tem início uma festa dançante com a presença de público masculino. No espetáculo são encenados atos (hetero)sexuais em duplas ou em grupo, envolvendo os strippers e as mulheres que voluntariamente sobem ao palco. A trilha sonora, marcada pelo estilo pornofunk, traz elementos alusivos à infidelidade conjugal masculina e feminina, à orgia e à prostituição masculina e feminina. Como em rituais de inversão, há, durante o show, tanto uma suspensão controlada das convenções de gênero tradicionais, quanto sua paradoxal reafirmação. Para o deleite de um público feminino, os strippers mantêm no palco a representação do papel ativo na cópula, e tanto sua hexis corporal quanto suas performances realçam a prontidão para o ato sexual, a virilidade e o controle sobre a conduta feminina. As mulheres, por sua vez, encenam uma parcial submissão ao controle masculino. Elas manifestam alguma reatividade e heteronomia em relação aos homens na festa que acontece depois, quando pares heterossexuais relativamente anônimos interagem através de aproximações sucessivas que englobam carícias e beijos na boca. Neste contexto, como sujeitos ou objetos, tanto os strippers quanto as mulheres desempenham posições conflitantes com as tradicionais expectativas de gênero, que permanecem, entretanto, preservadas em grande medida pela idéia de que elas dependem de estímulos especiais para, no campo do erotismo e da sexualidade, desejar ou fazer coisas para as quais os homens estariam supostamente sempre prontos. A tese procura mostrar que, como espécie de preço a pagar pelas inversões que ocorrem nesse espaço, tanto a imagem das mulheres quanto a dos strippers é desvalorizada, recaindo sobre eles os estigmas que ainda cercam as rupturas relativas às convenções de gênero.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Handshape is a key articulatory parameter in sign language, and thus handshape recognition from signing video is essential for sign recognition and retrieval. Handshape transitions within monomorphemic lexical signs (the largest class of signs in signed languages) are governed by phonological rules. For example, such transitions normally involve either closing or opening of the hand (i.e., to exclusively use either folding or unfolding of the palm and one or more fingers). Furthermore, akin to allophonic variations in spoken languages, both inter- and intra- signer variations in the production of specific handshapes are observed. We propose a Bayesian network formulation to exploit handshape co-occurrence constraints, also utilizing information about allophonic variations to aid in handshape recognition. We propose a fast non-rigid image alignment method to gain improved robustness to handshape appearance variations during computation of observation likelihoods in the Bayesian network. We evaluate our handshape recognition approach on a large dataset of monomorphemic lexical signs. We demonstrate that leveraging linguistic constraints on handshapes results in improved handshape recognition accuracy. As part of the overall project, we are collecting and preparing for dissemination a large corpus (three thousand signs from three native signers) of American Sign Language (ASL) video. The video have been annotated using SignStream® [Neidle et al.] with labels for linguistic information such as glosses, morphological properties and variations, and start/end handshapes associated with each ASL sign.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We propose a new notion of cryptographic tamper evidence. A tamper-evident signature scheme provides an additional procedure Div which detects tampering: given two signatures, Div can determine whether one of them was generated by the forger. Surprisingly, this is possible even after the adversary has inconspicuously learned (exposed) some-or even all-the secrets in the system. In this case, it might be impossible to tell which signature is generated by the legitimate signer and which by the forger. But at least the fact of the tampering will be made evident. We define several variants of tamper-evidence, differing in their power to detect tampering. In all of these, we assume an equally powerful adversary: she adaptively controls all the inputs to the legitimate signer (i.e., all messages to be signed and their timing), and observes all his outputs; she can also adaptively expose all the secrets at arbitrary times. We provide tamper-evident schemes for all the variants and prove their optimality. Achieving the strongest tamper evidence turns out to be provably expensive. However, we define a somewhat weaker, but still practical, variant: α-synchronous tamper-evidence (α-te) and provide α-te schemes with logarithmic cost. Our α-te schemes use a combinatorial construction of α-separating sets, which might be of independent interest. We stress that our mechanisms are purely cryptographic: the tamper-detection algorithm Div is stateless and takes no inputs except the two signatures (in particular, it keeps no logs), we use no infrastructure (or other ways to conceal additional secrets), and we use no hardware properties (except those implied by the standard cryptographic assumptions, such as random number generators). Our constructions are based on arbitrary ordinary signature schemes and do not require random oracles.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Locating hands in sign language video is challenging due to a number of factors. Hand appearance varies widely across signers due to anthropometric variations and varying levels of signer proficiency. Video can be captured under varying illumination, camera resolutions, and levels of scene clutter, e.g., high-res video captured in a studio vs. low-res video gathered by a web cam in a user’s home. Moreover, the signers’ clothing varies, e.g., skin-toned clothing vs. contrasting clothing, short-sleeved vs. long-sleeved shirts, etc. In this work, the hand detection problem is addressed in an appearance matching framework. The Histogram of Oriented Gradient (HOG) based matching score function is reformulated to allow non-rigid alignment between pairs of images to account for hand shape variation. The resulting alignment score is used within a Support Vector Machine hand/not-hand classifier for hand detection. The new matching score function yields improved performance (in ROC area and hand detection rate) over the Vocabulary Guided Pyramid Match Kernel (VGPMK) and the traditional, rigid HOG distance on American Sign Language video gestured by expert signers. The proposed match score function is computationally less expensive (for training and testing), has fewer parameters and is less sensitive to parameter settings than VGPMK. The proposed detector works well on test sequences from an inexpert signer in a non-studio setting with cluttered background.