949 resultados para cleft constructions
Resumo:
Universal One-Way Hash Functions (UOWHFs) may be used in place of collision-resistant functions in many public-key cryptographic applications. At Asiacrypt 2004, Hong, Preneel and Lee introduced the stronger security notion of higher order UOWHFs to allow construction of long-input UOWHFs using the Merkle-Damgård domain extender. However, they did not provide any provably secure constructions for higher order UOWHFs. We show that the subset sum hash function is a kth order Universal One-Way Hash Function (hashing n bits to m < n bits) under the Subset Sum assumption for k = O(log m). Therefore we strengthen a previous result of Impagliazzo and Naor, who showed that the subset sum hash function is a UOWHF under the Subset Sum assumption. We believe our result is of theoretical interest; as far as we are aware, it is the first example of a natural and computationally efficient UOWHF which is also a provably secure higher order UOWHF under the same well-known cryptographic assumption, whereas this assumption does not seem sufficient to prove its collision-resistance. A consequence of our result is that one can apply the Merkle-Damgård extender to the subset sum compression function with ‘extension factor’ k+1, while losing (at most) about k bits of UOWHF security relative to the UOWHF security of the compression function. The method also leads to a saving of up to m log(k+1) bits in key length relative to the Shoup XOR-Mask domain extender applied to the subset sum compression function.
Resumo:
One-time proxy signatures are one-time signatures for which a primary signer can delegate his or her signing capability to a proxy signer. In this work we propose two one-time proxy signature schemes with different security properties. Unlike other existing one-time proxy signatures that are constructed from public key cryptography, our proposed schemes are based one-way functions without trapdoors and so they inherit the communication and computation efficiency from the traditional one-time signatures. Although from a verifier point of view, signatures generated by the proxy are indistinguishable from those created by the primary signer, a trusted authority can be equipped with an algorithm that allows the authority to settle disputes between the signers. In our constructions, we use a combination of one-time signatures, oblivious transfer protocols and certain combinatorial objects. We characterise these new combinatorial objects and present constructions for them.
Resumo:
We consider the problem of increasing the threshold parameter of a secret-sharing scheme after the setup (share distribution) phase, without further communication between the dealer and the shareholders. Previous solutions to this problem require one to start off with a non-standard scheme designed specifically for this purpose, or to have secure channels between shareholders. In contrast, we show how to increase the threshold parameter of the standard CRT secret-sharing scheme without secure channels between the shareholders. Our method can thus be applied to existing CRT schemes even if they were set up without consideration to future threshold increases. Our method is a positive cryptographic application for lattice reduction algorithms, and we also use techniques from lattice theory (geometry of numbers) to prove statements about the correctness and information-theoretic security of our constructions.
Resumo:
We consider the following problem: a user stores encrypted documents on an untrusted server, and wishes to retrieve all documents containing some keywords without any loss of data confidentiality. Conjunctive keyword searches on encrypted data have been studied by numerous researchers over the past few years, and all existing schemes use keyword fields as compulsory information. This however is impractical for many applications. In this paper, we propose a scheme of keyword field-free conjunctive keyword searches on encrypted data, which affirmatively answers an open problem asked by Golle et al. at ACNS 2004. Furthermore, the proposed scheme is extended to the dynamic group setting. Security analysis of our constructions is given in the paper.
Resumo:
The paper addresses the cheating prevention in secret sharing. We consider secret sharing with binary shares. The secret also is binary. This model allows us to use results and constructions from the well developed theory of cryptographically strong boolean functions. In particular, we prove that for given secret sharing, the average cheating probability over all cheating vectors and all original vectors, i.e., 1/n 2n ∑c=1...n ∑α∈V n ρc,α , denoted by ρ, satisfies ρ ≥ ½, and the equality holds if and only if ρc,α satisfies ρc,α= ½ for every cheating vector δc and every original vector α. In this case the secret sharing is said to be cheating immune. We further establish a relationship between cheating-immune secret sharing and cryptographic criteria of boolean functions.This enables us to construct cheating-immune secret sharing.
Resumo:
We study the natural problem of secure n-party computation (in the passive, computationally unbounded attack model) of the n-product function f G (x 1,...,x n ) = x 1 ·x 2 ⋯ x n in an arbitrary finite group (G,·), where the input of party P i is x i ∈ G for i = 1,...,n. For flexibility, we are interested in protocols for f G which require only black-box access to the group G (i.e. the only computations performed by players in the protocol are a group operation, a group inverse, or sampling a uniformly random group element). Our results are as follows. First, on the negative side, we show that if (G,·) is non-abelian and n ≥ 4, then no ⌈n/2⌉-private protocol for computing f G exists. Second, on the positive side, we initiate an approach for construction of black-box protocols for f G based on k-of-k threshold secret sharing schemes, which are efficiently implementable over any black-box group G. We reduce the problem of constructing such protocols to a combinatorial colouring problem in planar graphs. We then give two constructions for such graph colourings. Our first colouring construction gives a protocol with optimal collusion resistance t < n/2, but has exponential communication complexity O(n*2t+1^2/t) group elements (this construction easily extends to general adversary structures). Our second probabilistic colouring construction gives a protocol with (close to optimal) collusion resistance t < n/μ for a graph-related constant μ ≤ 2.948, and has efficient communication complexity O(n*t^2) group elements. Furthermore, we believe that our results can be improved by further study of the associated combinatorial problems.
Resumo:
The Children’s Book Council of Australia (CBCA) administers the oldest national prize for children’s literature in Australia. Each year, the CBCA confers “Book of the Year” awards to literature for young people in five categories. In 2001, the establishment of an “Early Childhood” category opened up the venerable “Picture Book” category (first awarded in 1955) to books with an implied readership up to 18 years of age. As a result, this category has emerged in recent years as a highly visible space within which the CBCA can contest discourses of cultural marginalisation insofar as Australian (“colonial”) literature is constructed as inferior or adjunct to the major Anglophone literary traditions, and the consistent identification of children’s literature (and, indeed, of children) as lesser than its ‘adult’ counterparts. The CBCA is engaged in defining, evaluating, and legitimising a tradition of Australian children’s literature which is underpinned by a canonical impulse, and is a reflexive practice of self-definition, self-evaluation and self-legitimisation for the CBCA itself. While it is obviously problematic to identify award winners as a canon, it is equally obvious that literary prizing is a cultural practice derived from the logic of canonicity. In his discussion of the United States’s Newbery Medal, Kenneth Kidd notes that “Medal books are instant classics, the selection process an ostensible simulation of the test of time” (169) and that “the Medal is part of the canonical architecture of children's literature” (169). Thus, it is instructive to consider the visions and values of the national, of the social, and of the literary-aesthetic, in the picture books chosen by the Children’s Book Council of Australia (CBCA) as the “best” of the early twenty-first century. These books not only constitute a kind of canon for contemporary Australian children’s literature, but may well come to define what contemporary Australian children’s literature means in the wider literary field. The Book of the Year: Picture Book awards given by the CBCA since 2001 demonstrate that it is not only true of the Booker Prize that, “The choices of winning books reflect not only on the books themselves, then, but also back on the Prize, affecting its reputation and creating journalistic capital which is vital for the Prize to achieve its prominence and impact.” (81). Many of the twenty-first century CBCA award-winning picture books complicate traditional or comfortable understanding of Australianness, children’s literature, or “appropriate” modes of form and content, reminding us that “moments when texts resist or complicate recuperation into national discourses offer fruitful points for exploring the relationships between text and celebratory context” (Roberts 6). The CBCA has taken the opportunities offered by the liberation of the Picture Book category from an implied readership to challenge dominant constructions of children’s literature in Australia, and in so doing, are engaged in overt practices of canonicity with potentially long-lasting effects. Works Cited: Kidd, Kenneth. “Prizing Children’s Literature: The Case of Newbery Gold.” Children's Literature 35 (2007): 166-190. Roberts, Gillian. Prizing Literature: The Celebration and Circulation of National Culture. Toronto: U Toronto P, 2011. Squires, Claire. “Book Marketing and the Booker Prize.” Judging a Book by Its Cover: Fans, Publishers, Designers, and the Marketing of Fiction. Eds. Nicole Matthews and Nickianne Moody. Aldershot: Ashgate, 2007. 71-82.
Resumo:
Silver palace is a multi-channel screen-based installation that explores the part that the landscape and narration play in cinematic constructions of gendered identity. The exhibition examines the ways in which our experience as a viewer of cinematic imagery can be both constructed and expanded within a gallery context.
Resumo:
'Across the sea' is a multi-channel screen-based installation that explores the part that the landscape and narration play in cinematic constructions of gendered identity. The work is informed by new wave cinema, feminist film theory and emergent ideas of a female gaze. across the sea considers both the role of the artist, as well as the auteur in cinema, to question how the outcomes differ when a female rather than a male gaze is writing, directing and filming the imagery. The screen-based installation of 'across the sea' seeks to further examine the ways in which our experience as a viewer of cinematic imagery can be both constructed and expanded within a gallery context. across the sea investigates the spaces that exist between the gallery and the cinema, in an effort to consider notions of femininity that exist between and throughout the varied spaces of film and art.
Resumo:
The passage of indeterminacy in the intensification of being is a digital video projection by Daniel McKewen. The work used digital visual effects and experimentation with time-based video synchronisation to manipulate images of celebrities plundered from the internet and television. The result was a sequence of images that served as both portrait of the constructed nature of screen-based imagery, as well as portrait of the pop culture audience that consumes such constructions.
Resumo:
Supporting a dying child and family surrounding the child’s death is one of the most significant and challenging roles undertaken by health professionals in paediatric end of life care. An Australian study of parent and health professional constructions of meanings around post mortem care and communication revealed the practice of health professionals speaking to a child after death. This practice conveyed respect for the personhood of the deceased child, recognised the presence of the deceased child, and assisted in involving parents in their child’s post-mortem care. Such findings illuminate an area of end of life care practice that is not often addressed. Talking to a deceased child appeared as a socially symbolic practice that may promote a continued bond between parent and child.
Resumo:
Fire resistance rating of light gauge steel frame (LSF) wall systems is obtained from fire tests based on the standard fire time-temperature curve. However, fire severity has increased in modern buildings due to higher fuel loads as a result of modern furniture and light weight constructions that make use of thermoplastics materials, synthetic foams and fabrics. Some of these materials are high in calorific values and increase both the spread of fire growth and heat release rate, thus increasing the fire severity beyond that of the standard fire curve. Further, the standard fire curve does not include a decay phase that is present in natural fires. Despite the increasing usage of LSF walls, their behaviour in real building fires is not fully understood. This paper presents the details of a research study aimed at developing realistic design fire curves for use in the fire tests of LSF walls. It includes a review of the characteristics of building fires, previously developed fire time-temperature curves, computer models and available parametric equations. The paper highlights that real building fire time-temperature curves depend on the fuel load representing the combustible building contents, ventilation openings and thermal properties of wall lining materials, and provides suitable values of many required parameters including fuel loads in residential buildings. Finally, realistic design fire time-temperature curves simulating the fire conditions in modern residential buildings are proposed for the testing of LSF walls.
Resumo:
While identity construction continues to be a widely discussed and researched area in contemporary social sciences, the existing theories have overlooked the importance of understanding why and how identities as semiotic constructions emerge in individuals' consciousness in the flow of their everyday functioning. This article seeks to address this limitation in the theorizing by proposing an alternative conceptualization of identity, according to which identity construction is triggered by rupturing life-experience, which surfaces another perspective and makes the person aware of a possibility to be otherwise or of the reality of being different. Theoretical claims put forward in the paper are drawn from data gathered in a recent study, which explored lived-through experiences of young Estonians, who made study-visits to the United Kingdom. The discussed data will also highlight some interesting aspects in Estonians' self-definition as it is constructed in relation to Eastern-European identity in the context of contemporary Britain.
Resumo:
National or International Significance Flows of cultural heritage in textual practices are vital to sustaining Indigenous communities - a national and international priority (Commonwealth of Australia, 2011). Indigenous heritage, whether passed on by oral tradition or ubiquitous social media, can be seen as a "conversation between the past and the future" (Fairclough, 2012, p. xv). Indigenous heritage involves appropriating memories within a cultural flow to pass on a spiritual legacy. This presentation reports ethnographic research of social media practices in a small independent Aboriginal school in Southeast Queensland, Australia that is resided over by the Yuggera elders and an Aboriginal principal. Quality of Research The purpose was to rupture existing notions of white literacies in schools, and to deterritorialize the uses of digital media by dominant cultures in the public sphere. Examples of learning experiences included the following: i. Integrating Indigenous language and knowledge into media text production; ii. Classroom visits from Indigenous elders; and iii. Publishing oral histories through digital scrapbooking. The program aligned with the Australian National Curriculum English (ACARA, 2014), which mandates the teaching of multimodal text creation. Data sources included a class set of digital scrapbooks collaboratively created in a preparatory-one primary classroom. The digital scrapbooks combined digitally encoded words, images of material artifacts, and digital music files. A key feature of the writing and digital design task was to retell and digitally display and archive a cultural narrative of significance to the Indigenous Australian community and its memories and material traces of the past for the future. Data analysis of the students' digital stories involved the application of key themes of negotiated, material, and digitally mediated forms of heritage practice. It drew on Australian Indigenous research by Keddie et al. (2013) to guard against the homogenizing of culture that can arise from a focus on a static view of culture. The interpretation of findings located Indigenous appropriation of social media within broader racialized politics that enables Indigenous literacy to be understood as a dynamic, negotiated, and transgenerational flows of practice. It demonstrates that Indigenous children's use of media production reflects "shifting and negotiated identities" in response to changing media environments that can function to sustain Indigenous cultural heritages (Appadurai, 1696, p. xv). Impact on practice, policy or theory The findings are important for teachers at a time when Aboriginal and Torres Strait Islander Histories and Cultures is a cross-curricular policy priority in the Australian Curriculum (ACARA, 2014). The findings show how curriculum policies can be applied to classroom practice in ways that are epistemologically consistent with Indigenous ways of knowing and being. Theoretically, it demonstrates how the children's experiences of culture are layered over time, as successive generations inherit, interweave, and hear others' cultural stories or maps. Practically, recommendations are provided for an approach to appropriating social media in schools that explicitly attends to the dynamic nature of Indigenous practices, negotiated through intercultural constructions and flows, and opening space for a critical anti-racist approach to multimodal text production. Timeliness The research is timely in the context of the accessibility and role of digital and multimodal forms of communication, including for Aboriginal and Torres Strait Islander communities.
Resumo:
The experience of disability in the global South remains relatively underreported in spite of the greater focus on disability as both an impediment to development and frequently as a result of development. This article reports a qualitative study using ethnographic techniques undertaken in the province of Khon Kaen in Northeast Thailand. The primary participants were men who had experienced a severe spinal cord injury at a time when they were breadwinners, a role which is significant in the context of a modernising state that is an active participant in a global economy. The experiences, constructions and beliefs of these men, their family carers, and other informants illustrate the complex ways in which social and cultural factors interact with the opportunities, challenges and constraints of the transition modernity. The findings, interpreted according to the ‘three bodies’ approach, illustrate the intersection of colonising effects, governmentality and resistance, and embodied experience in a cultural context.