928 resultados para Message
Resumo:
A secure protocol for electronic, sealed-bid, single item auctions is presented. The protocol caters to both first and second price (Vickrey) auctions and provides full price flexibility. Both computational and communication cost are linear with the number of bidders and utilize only standard cryptographic primitives. The protocol strictly divides knowledge of the bidder's identity and their actual bids between, respectively, a registration authority and an auctioneer, who are assumed not to collude but may be separately corrupt. This assures strong bidder-anonymity, though only weak bid privacy. The protocol is structured in two phases, each involving only off-line communication. Registration, requiring the use of the public key infrastructure, is simultaneous with hash-sealed bid-commitment and generates a receipt to the bidder containing a pseudonym. This phase is followed by encrypted bid-submission. Both phases involve the registration authority acting as a communication conduit but the actual message size is quite small. It is argued that this structure guarantees non-repudiation by both the winner and the auctioneer. Second price correctness is enforced either by observing the absence of registration of the claimed second-price bid or, where registered but lower than the actual second price, is subject to cooperation by the second price bidder - presumably motivated through self-interest. The use of the registration authority in other contexts is also considered with a view to developing an architecture for efficient secure multiparty transactions
Resumo:
Digital signature is a breakthrough of modern cryptographic systems. A (t, n) threshold digital signature allows every set of cardinality t or more (out-of n) co-signers to authenticate a message. In almost all existing threshold digital signatures the threshold parameter t is fixed. There are applications, however, in which the threshold parameter needs to be changed from time to time. This paper considers such a scenario, in order to discuss relevant problems, and proposes a model that solves the related problems.
Efficient extension of standard Schnorr/RSA signatures into Universal Designated-Verifier Signatures
Resumo:
Universal Designated-Verifier Signature (UDVS) schemes are digital signature schemes with additional functionality which allows any holder of a signature to designate the signature to any desired designated-verifier such that the designated-verifier can verify that the message was signed by the signer, but is unable to convince anyone else of this fact. Since UDVS schemes reduce to standard signatures when no verifier designation is performed, it is natural to ask how to extend the classical Schnorr or RSA signature schemes into UDVS schemes, so that the existing key generation and signing implementation infrastructure for these schemes can be used without modification. We show how this can be efficiently achieved, and provide proofs of security for our schemes in the random oracle model.
Resumo:
A parallel authentication and public-key encryption is introduced and exemplified on joint encryption and signing which compares favorably with sequential Encrypt-then-Sign (ɛtS) or Sign-then-Encrypt (Stɛ) schemes as far as both efficiency and security are concerned. A security model for signcryption, and thus joint encryption and signing, has been recently defined which considers possible attacks and security goals. Such a scheme is considered secure if the encryption part guarantees indistinguishability and the signature part prevents existential forgeries, for outsider but also insider adversaries. We propose two schemes of parallel signcryption, which are efficient alternative to Commit-then-Sign-and- Encrypt (Ct&G3&S). They are both provably secure in the random oracle model. The first one, called generic parallel encrypt and sign, is secure if the encryption scheme is semantically secure against chosen-ciphertext attacks and the signature scheme prevents existential forgeries against random-message attacks. The second scheme, called optimal parallel encrypt. and sign, applies random oracles similar to the OAEP technique in order to achieve security using encryption and signature components with very weak security requirements — encryption is expected to be one-way under chosen-plaintext attacks while signature needs to be secure against universal forgeries under random-plaintext attack, that is actually the case for both the plain-RSA encryption and signature under the usual RSA assumption. Both proposals are generic in the sense that any suitable encryption and signature schemes (i.e. which simply achieve required security) can be used. Furthermore they allow both parallel encryption and signing, as well as parallel decryption and verification. Properties of parallel encrypt and sign schemes are considered and a new security standard for parallel signcryption is proposed.
Resumo:
Standard signature schemes are usually designed only to achieve weak unforgeability – i.e. preventing forgery of signatures on new messages not previously signed. However, most signature schemes are randomised and allow many possible signatures for a single message. In this case, it may be possible to produce a new signature on a previously signed message. Some applications require that this type of forgery also be prevented – this requirement is called strong unforgeability. At PKC2006, Boneh Shen and Waters presented an efficient transform based on any randomised trapdoor hash function which converts a weakly unforgeable signature into a strongly unforgeable signature and applied it to construct a strongly unforgeable signature based on the CDH problem. However, the transform of Boneh et al only applies to a class of so-called partitioned signatures. Although many schemes fall in this class, some do not, for example the DSA signature. Hence it is natural to ask whether one can obtain a truly generic efficient transform based on any randomised trapdoor hash function which converts any weakly unforgeable signature into a strongly unforgeable one. We answer this question in the positive by presenting a simple modification of the Boneh-Shen-Waters transform. Our modified transform uses two randomised trapdoor hash functions.
Resumo:
The power of sharing computation in a cryptosystem is crucial in several real-life applications of cryptography. Cryptographic primitives and tasks to which threshold cryptosystems have been applied include variants of digital signature, identification, public-key encryption and block ciphers etc. It is desirable to extend the domain of cryptographic primitives which threshold cryptography can be applied to. This paper studies threshold message authentication codes (threshold MACs). Threshold cryptosystems usually use algebraically homomorphic properties of the underlying cryptographic primitives. A typical approach to construct a threshold cryptographic scheme is to combine a (linear) secret sharing scheme with an algebraically homomorphic cryptographic primitive. The lack of algebraic properties of MACs rules out such an approach to share MACs. In this paper, we propose a method of obtaining a threshold MAC using a combinatorial approach. Our method is generic in the sense that it is applicable to any secure conventional MAC by making use of certain combinatorial objects, such as cover-free families and their variants. We discuss the issues of anonymity in threshold cryptography, a subject that has not been addressed previously in the literature in the field, and we show that there are trade-offis between the anonymity and efficiency of threshold MACs.
Resumo:
Motivated by privacy issues associated with dissemination of signed digital certificates, we define a new type of signature scheme called a ‘Universal Designated-Verifier Signature’ (UDVS). A UDVS scheme can function as a standard publicly-verifiable digital signature but has additional functionality which allows any holder of a signature (not necessarily the signer) to designate the signature to any desired designated-verifier (using the verifier’s public key). Given the designated-signature, the designated-verifier can verify that the message was signed by the signer, but is unable to convince anyone else of this fact. We propose an efficient deterministic UDVS scheme constructed using any bilinear group-pair. Our UDVS scheme functions as a standard Boneh-Lynn-Shacham (BLS) signature when no verifier-designation is performed, and is therefore compatible with the key-generation, signing and verifying algorithms of the BLS scheme. We prove that our UDVS scheme is secure in the sense of our unforgeability and privacy notions for UDVS schemes, under the Bilinear Diffie-Hellman (BDH) assumption for the underlying group-pair, in the random-oracle model. We also demonstrate a general constructive equivalence between a class of unforgeable and unconditionally-private UDVS schemes having unique signatures (which includes the deterministic UDVS schemes) and a class of ID-Based Encryption (IBE) schemes which contains the Boneh-Franklin IBE scheme but not the Cocks IBE scheme.
Resumo:
Adolescent drivers are over-represented in distraction-related motor vehicle crashes. There are a number of potential reasons for such elevated risk with driving inexperience, high adoption of communication technology, increased peer involvement and tendency to take risks, rendering young drivers particularly vulnerable. Major legislative efforts in Graduated Licensing Systems that include passenger restrictions have shown positive effects. Restrictions on cell phone use are also being introduced however enforcement of such regulations is challenging. This paper argues that such contextual, legislative interventions are an essential prevention strategy however there is an unfilled need to introduce behavior change programs that may target adolescents, parents and friends. A theoretical framework is applied in which risk and protective factors are identified from research within community and jurisdiction contexts. In the literature on distraction social context and normative influences are the key elements used to inform program design for adolescent drivers with parental monitoring informing interventions targeting parents. Following from this assessment of the message content assessment, the design of strategies to deliver the messages are reviewed. In the current literature, school-based programs, simulations and web-delivered programs have been evaluated with supplementary strategies delivered by physicians and parents. Such developments are still at an early stage of development and ultimately will need controlled implementation and evaluation studies. There is of course, no likely single approach to prevent adolescent driver distraction and complementary approaches such as the further development of technological interventions to manage phone use are needed. Implications and Contributions The paper describes the intervention design process alongside key research in young driver distraction including selecting target behavior, audience, theoretically-derived strategies and delivery strategies. Currently graduated driver licensing and technology use and acceptance and parent-adolescent and adolescent-peer interactions are opportunities for further research and exploration.
Resumo:
A toolkit designed to facilitate greater understanding of the role of fashion design in society and the value of design thinking skills in solving wicked challenges. The program uses fashion as a catalyst to provide a framework for young people to address a systemic health issue (skin cancer), and in doing so, obtain a more acute awareness of the sun safety message (alternative to a scare campaign.
Resumo:
Despite rising levels of safe-sex knowledge in Australia, sexually transmitted infection notifications continue to increase. A culture-centred approach suggests it is useful in attempting to reach a target population first to understand their perspective on the issues. Twenty focus groups were conducted with 89 young people between the ages of 14 and 16 years. Key findings suggest that scientific information does not articulate closely with everyday practice, that young people get the message that sex is bad and they should not be preparing for it and that it is not appropriate to talk about sex. Understanding how young people think about these issues is particularly important because the focus groups also found that young people disengage from sources of information that do not match their own experiences.
Resumo:
Introduction- This study investigates the prevailing status of Nepalese media portrayal of natural disasters. It is contributing to the development of a disaster management model to improve the effectiveness and efficiency of news production throughout the continuum of prevention, preparedness, response and recovery (PPRR) phases of disaster management. Theoretical framework- Studies of media content often rely on framing as the theoretical underpinning of the study, as it describes how the press crafts the message. However there are additional theoretical perspectives that underline an understanding of the role of the media. This article outlines a conceptual understanding of the role of the media in modern society, the way that this conceptual understanding is used in the crafting of media messages and how those theoretical considerations are applied to the concepts that underpin effective disaster management. (R.M. Entman, 2003; Liu, 2007; Meng & Berger, 2008). Methodology- A qualitative descriptive design is used to analyse the disaster news of Nepal Television (NTV). However, this paper presents the preliminary findings of Nepal Television (a government owned Television station) using qualitative content analysis of 105 natural disaster related news scripts (June 2012-March 2013) based on the framing theory and PPRR cycle. Results- The preliminary results indicate that the media focus while framing natural disasters is dominated by human interest frame followed by responsibility frame. News about response phase was found to be most prominent in terms of PPRR cycle. Limited disaster reporting by NTV has impacted the national disaster management programs and strategies. The findings describe natural disasters are being reported within the limited understanding of the important principles of disaster management and PPRR cycle. Conclusion- This paper describes the current status of the coverage of natural disasters by Nepal Television to identify the frames used in the news content. It contributes to determining the characteristics of effective media reporting of natural disasters in the government owned media outlets, and also leads to including communities and agencies involved in disasters. It suggests the frames which are best suited for news making and how media responds to the different phases of the disaster cycle.
Resumo:
A short travel memoir about the village of Karoussades, Corfu. Early on my first day in the village, a message came that two respectable ladies of Karoussades, its shoe sellers, needed a section of wall lime-washed. They were willing to use the black market labour organized from the Pirate’s taverna, where I waited for my first job—but they did ask that he send someone polite...
Resumo:
Sharing Ink is a Guerrilla Kindness work by public artist Sayraphim Lothian. 30 handmade books will be given to 30 local writers and artists to inscribe with a lovely message to a stranger. From 1 – 10 August, 2013, these books will be left out in various places around the Melbourne CBD as a gift to whoever finds them.
Resumo:
"Tim Kring, Creator of the hit television show 'Heroes' tells how the big idea began, and where you can jump in. "A few years ago, I started thinking about an entirely new way to tell a story, far different from traditional TV. I didn't just want to talk about 'saving the world' in fiction, I wanted to create a narrative that spilled out into the streets. One that you could live inside of for a while. How cool would it be, I thought, to create a story that exists all around you all of the time? On your laptop, your mobile phone, on your sidewalks, as a secret message hidden in your favorite song or while standing at the bus stop on your way to work. And, taking it further, what if your participation over a few weeks or months actually impacts the story's development and creates positive change in the real world because a philanthropic mission is integrated into the narrative itself? The Conspiracy For Good is the culmination of this dream. This is the pilot project for a first-of-itskind interactive story that empowers its audience to take real-life action and create positive change in the world. Call it Social Benefit Storytelling. To achieve this, I need you to participate. Reality and fiction have to blur. Every story needs a villain and you will meet the villain in the STORY SO FAR section on this site. And every story needs a hero. That's where YOU come in. As part of The Conspiracy For Good you will join a collective of thinkers, artists, musicians, and causes, creating a unified voice to fight the forces of social and environmental injustice. This is our site, where together we can follow the story and build a community that focuses on changing the world for the better, one person and one action at a time. Welcome to the Conspiracy." Tim Kring"
Resumo:
IUCN´s core work involves generating knowledge and tools to influence policy and practice for nature conservation. Whilst it appears that we are collectively making progress in some areas, we acknowledge the need to improve our communication processes and practices to ´move to action´ in this regard. We need to extend the influence of the science and the knowledge beyond the documents to achieve effective impact and action. The training course will focus on the process of getting the conservation messages out to a wider audience. This interactive and participatory training course will develop the skills and knowledge needed to communicate effective conservation messages for a range of IUCN internal and external audiences. The course will cover: • what is communication for conservation? • the communication planning process (developing your communication objectives) • identifying and understanding your target audiences • developing your conservation message • choosing your communication media and • evaluating the effectiveness of your communication strategies. A unique feature of the training course will be the use of Web 2.0 tools in innovative conservation communications e.g. use of social media in concept branding and social marketing. In the spirit of the Forum´s objective of ´Sharing know how´, each participant will bring a current conservation issue to the training course and will leave with their own communication plan. Potentially, the training course adopts a cross-thematic approach as the issues addressed could be drawn from any of the IUCN´s program themes. Primarily though, the training course´s best fit is with the ´Valuing and Conserving Biodiversity´ theme since it will provide concrete and pragmatic solutions to enhancing the implementation of conservation measures through participatory planning and capacity building.