943 resultados para Standard
Resumo:
NTRUEncrypt is a fast and practical lattice-based public-key encryption scheme, which has been standardized by IEEE, but until recently, its security analysis relied only on heuristic arguments. Recently, Stehlé and Steinfeld showed that a slight variant (that we call pNE) could be proven to be secure under chosen-plaintext attack (IND-CPA), assuming the hardness of worst-case problems in ideal lattices. We present a variant of pNE called NTRUCCA, that is IND-CCA2 secure in the standard model assuming the hardness of worst-case problems in ideal lattices, and only incurs a constant factor overhead in ciphertext and key length over the pNE scheme. To our knowledge, our result gives the first IND-CCA2 secure variant of NTRUEncrypt in the standard model, based on standard cryptographic assumptions. As an intermediate step, we present a construction for an All-But-One (ABO) lossy trapdoor function from pNE, which may be of independent interest. Our scheme uses the lossy trapdoor function framework of Peikert and Waters, which we generalize to the case of (k − 1)-of-k-correlated input distributions.
Resumo:
Standard Monte Carlo (sMC) simulation models have been widely used in AEC industry research to address system uncertainties. Although the benefits of probabilistic simulation analyses over deterministic methods are well documented, the sMC simulation technique is quite sensitive to the probability distributions of the input variables. This phenomenon becomes highly pronounced when the region of interest within the joint probability distribution (a function of the input variables) is small. In such cases, the standard Monte Carlo approach is often impractical from a computational standpoint. In this paper, a comparative analysis of standard Monte Carlo simulation to Markov Chain Monte Carlo with subset simulation (MCMC/ss) is presented. The MCMC/ss technique constitutes a more complex simulation method (relative to sMC), wherein a structured sampling algorithm is employed in place of completely randomized sampling. Consequently, gains in computational efficiency can be made. The two simulation methods are compared via theoretical case studies.
Resumo:
This paper presents ongoing work toward constructing efficient completely non-malleable public-key encryption scheme based on lattices in the standard (common reference string) model. An encryption scheme is completely non-malleable if it requires attackers to have negligible advantage, even if they are allowed to transform the public key under which the related message is encrypted. Ventre and Visconti proposed two inefficient constructions of completely non-malleable schemes, one in the common reference string model using non-interactive zero-knowledge proofs, and another using interactive encryption schemes. Recently, two efficient public-key encryption schemes have been proposed, both of them are based on pairing identity-based encryption.
Resumo:
In an attempt to preserve proximal femoral bone stock and achieve a better fit in smaller femora, especially in the Asian population, several new shorter stem designs have become available. We investigated the torque to periprosthetic femoral fracture of the Exeter short stem compared with the conventional length Exeter stem in a Sawbone model. 42 stems; 21 shorter and 21 conventional stems both with three different offsets were cemented in a composite Sawbone model and torqued to fracture. Results showed that Sawbone femurs break at a statistically significantly lower torque to failure with a shorter compared to conventional length Exeter stem of the same offset. Both standard and short stem designs are safe to use as the torque to failure is 7-10 times that seen in activities of daily living.
Resumo:
Chronic leg ulcers are costly to manage for health service providers. Although evidence-based care leads to improved healing rates and reduced costs, a significant evidence-practice gap is known to exist. Lack of access to specialist skills in wound care is one reason suggested for this gap. The aim of this study was to model the change to total costs and health outcomes under two versions of health services for patients with leg ulcers: routine health services for community-living patients; and care provided by specialist wound clinics. Mean weekly treatment and health services costs were estimated from participants’ data (n=70) for the twelve months prior to their entry to a study specialist wound clinic, and prospectively for 24 weeks after entry. For the retrospective phase mean weekly costs of care were $AU130.30 (SD $12.64) and these fell to $AU53.32 (SD $6.47) for the prospective phase. Analysis at a population level suggests if 10,000 individuals receive 12 weeks of specialist evidence-based care, the cost savings are likely to be AU$9,238,800. Significant savings could be made by the adoption of evidence-based care such as that provided by the community and outpatient specialist wound clinics in this study.
Efficient extension of standard Schnorr/RSA signatures into Universal Designated-Verifier Signatures
Resumo:
Universal Designated-Verifier Signature (UDVS) schemes are digital signature schemes with additional functionality which allows any holder of a signature to designate the signature to any desired designated-verifier such that the designated-verifier can verify that the message was signed by the signer, but is unable to convince anyone else of this fact. Since UDVS schemes reduce to standard signatures when no verifier designation is performed, it is natural to ask how to extend the classical Schnorr or RSA signature schemes into UDVS schemes, so that the existing key generation and signing implementation infrastructure for these schemes can be used without modification. We show how this can be efficiently achieved, and provide proofs of security for our schemes in the random oracle model.
Resumo:
Cancer can be defined as a deregulation or hyperactivity in the ongoing network of intracellular and extracellular signaling events. Reverse phase protein microarray technology may offer a new opportunity to measure and profile these signaling pathways, providing data on post-translational phosphorylation events not obtainable by gene microarray analysis. Treatment of ovarian epithelial carcinoma almost always takes place in a metastatic setting since unfortunately the disease is often not detected until later stages. Thus, in addition to elucidation of the molecular network within a tumor specimen, critical questions are to what extent do signaling changes occur upon metastasis and are there common pathway elements that arise in the metastatic microenvironment. For individualized combinatorial therapy, ideal therapeutic selection based on proteomic mapping of phosphorylation end points may require evaluation of the patient's metastatic tissue. Extending these findings to the bedside will require the development of optimized protocols and reference standards. We have developed a reference standard based on a mixture of phosphorylated peptides to begin to address this challenge.
Resumo:
We consider the problem of increasing the threshold parameter of a secret-sharing scheme after the setup (share distribution) phase, without further communication between the dealer and the shareholders. Previous solutions to this problem require one to start off with a non-standard scheme designed specifically for this purpose, or to have secure channels between shareholders. In contrast, we show how to increase the threshold parameter of the standard CRT secret-sharing scheme without secure channels between the shareholders. Our method can thus be applied to existing CRT schemes even if they were set up without consideration to future threshold increases. Our method is a positive cryptographic application for lattice reduction algorithms, and we also use techniques from lattice theory (geometry of numbers) to prove statements about the correctness and information-theoretic security of our constructions.
Resumo:
We consider the problem of increasing the threshold parameter of a secret-sharing scheme after the setup (share distribution) phase, without further communication between the dealer and the shareholders. Previous solutions to this problem require one to start off with a non-standard scheme designed specifically for this purpose, or to have communication between shareholders. In contrast, we show how to increase the threshold parameter of the standard Shamir secret-sharing scheme without communication between the shareholders. Our technique can thus be applied to existing Shamir schemes even if they were set up without consideration to future threshold increases. Our method is a new positive cryptographic application for lattice reduction algorithms, inspired by recent work on lattice-based list decoding of Reed-Solomon codes with noise bounded in the Lee norm. We use fundamental results from the theory of lattices (Geometry of Numbers) to prove quantitative statements about the information-theoretic security of our construction. These lattice-based security proof techniques may be of independent interest.
Resumo:
In 2012, the Bureau of Meteorology under the banner of the Water Accounting Standards Board released the Australian Water Accounting Standard 1 (AWAS 1). This standard has been in development since 2007 with key milestones being the release of the Preliminary Australian Water Accounting Standard in 2009, and the exposure draft of the Australian Water Accounting Standard in 2010. Throughout this period, the Minerals Council of Australia’s Water Accounting Framework has developed concurrently with the Australian standards and the standards have informed elements of the framework. However, the framework is not identical to the standard as the objectives between the two are different. The objective of the Water Accounting Framework is to create consistency in water reporting of the minerals industry and to assist companies reporting to corporate sustainability initiatives. The objective of AWAS 1 is to provide information to water management bodies to facilitate decisions about the allocation of water resources. Companies are to report on an annual basis, not only physical flows of water but contractual requirements to supply and obtain water, regardless of whether the transaction has been fulfilled in the reporting period. In contrast, the Water Accounting Framework only reports on flows that have physically happened. The paper will provide summary information on aspects of AWAS 1 that are most relevant to the minerals industry, show the alignment and differences between AWAS 1 and the Water Accounting Framework and explain how to obtain the information for the AWAS 1 reporting statements.
Resumo:
Introduction: In an attempt to reduce stress shielding in the proximal femur multiple new shorter stem design have become available. We investigated the load to fracture of a new polished tapered cemented short stem in comparison to the conventional polished tapered Exeter stem. Method: A total of forty-two stems, twenty-one short stems and twenty-one conventional stems both with three different offsets were cemented in a composite sawbone model and loaded to fracture. Results: study showed that femurs will break at a significantly lower load to failure with a shorter compared to conventional length Exeter stem. Conclusion: This Both standard and short stem design are safe to use as the torque to failure is 7–10 times as much as the torques seen in activities of daily living.
Resumo:
Aim A new method of penumbral analysis is implemented which allows an unambiguous determination of field size and penumbra size and quality for small fields and other non-standard fields. Both source occlusion and lateral electronic disequilibrium will affect the size and shape of cross-axis profile penumbrae; each is examined in detail. Method A new method of penumbral analysis is implemented where the square of the derivative of the cross-axis profile is plotted. The resultant graph displays two peaks in the place of the two penumbrae. This allows a strong visualisation of the quality of a field penumbra, as well as a mathematically consistent method of determining field size (distance between the two peak’s maxima), and penumbra (full-widthtenth-maximum of peak). Cross-axis profiles were simulated in a water phantom at a depth of 5 cm using Monte Carlo modelling, for field sizes between 5 and 30 mm. The field size and penumbra size of each field was calculated using the method above, as well as traditional definitions set out in IEC976. The effect of source occlusion and lateral electronic disequilibrium on the penumbrae was isolated by repeating the simulations removing electron transport and using an electron spot size of 0 mm, respectively. Results All field sizes calculated using the traditional and proposed methods agreed within 0.2 mm. The penumbra size measured using the proposed method was systematically 1.8 mm larger than the traditional method at all field sizes. The size of the source had a larger effect on the size of the penumbra than did lateral electronic disequilibrium, particularly at very small field sizes. Conclusion Traditional methods of calculating field size and penumbra are proved to be mathematically adequate for small fields. However, the field size definition proposed in this study would be more robust amongst other nonstandard fields, such as flattening filter free. Source occlusion plays a bigger role than lateral electronic disequilibrium in small field penumbra size.
Resumo:
Occupational standards concerning the allowable concentrations of chemical compounds in the ambient air of workplaces have been established in several countries at national levels. With the integration of the European Union, a need exists for establishing harmonized Occupational Exposure Limits. For analytical developments, it is apparent that methods for speciation or fractionation of carcinogenic metal compounds will be of increasing practical importance for standard setting. Criteria of applicability under field conditions, cost-effectiveness, and robustness are practical driving forces for new developments. When the European Union issued a list of 62 chemical substances with Occupational Exposure Limits in 2000, 25 substances received a 'skin' notation. The latter indicates that toxicologically significant amounts may be taken up via the skin. Similar notations exist on national levels. For such substances, monitoring concentrations in ambient air will not be sufficient; biological monitoring strategies will gain further importance in the medical surveillance of workers who are exposed to such compounds. Proceedings in establishing legal frameworks for a biological monitoring of chemical exposures within Europe are paralleled by scientific advances in this field. A new aspect is the possibility of a differential adduct monitoring, using blood proteins of different half-life or lifespan. This technique allows differentiation between long-term mean exposure to reactive chemicals and short-term episodes, for example, by accidental overexposure. For further analytical developments, the following issues have been addressed as being particularly important: New dose monitoring strategies, sensitive and reliable methods for detection of DNA adducts, cytogenetic parameters in biological monitoring, methods to monitor exposure to sensitizing chemicals, and parameters for individual susceptibilities to chemical toxicants.
Resumo:
The benefits of using eXtensible Business Reporting Language (XBRL) as a business reporting standard have been widely canvassed in the extant literature, in particular, as the enabling technology for standard business reporting tools. One of the key benefits noted is the ability of standard business reporting to create significant efficiencies in the regulatory reporting process. Efficiency-driven cost reductions are highly desirable by data and report producers. However, they may not have the same potential to create long-term firm value as improved effectiveness of decision making. This study assesses the perceptions of Australian business stakeholders in relation to the benefits of the Australian standard business reporting instantiation (SBR) for financial reporting. These perceptions were drawn from interviews of persons knowledgeable in XBRL-based standard business reporting and submissions to Treasury relative to SBR reporting options. The combination of interviews and submissions permit insights into the views of various groups of stakeholders in relation to the potential benefits. In line with predictions based on a transaction-cost economics perspective, interviewees who primarily came from a data and report-producer background mentioned benefits that centre largely on asset specificity and efficiency. The interviewees who principally came from a data and report-consumer background mentioned benefits that centre on reducing decision-making uncertainty and decision-making effectiveness. The data and report consumers also took a broader view of the benefits of SBR to the financial reporting supply chain. Our research suggests that advocates of SBR have successfully promoted its efficiency benefits to potential users. However, the effectiveness benefits of SBR, for example, the decision-making benefits offered to investors via standardised reports, while becoming more broadly acknowledged, remain not a priority for all stakeholders.
Resumo:
Purpose: The purpose of this work was to evaluate the patient-borne financial cost of common, adverse breast cancer treatment-associated effects, comparing cost across women with or without these side-effects. Methods: 287 Australian women diagnosed with early-stage breast cancer were prospectively followed starting at six months post-surgery for 12 months, with three-monthly assessment of detailed treatment-related side effects and their direct and indirect patient costs attributable to breast cancer. Bootstrapping statistics were used to analyze cost data and adjusted logistic regression was used to evaluate the association between costs and adverse events from breast cancer. Costs were inflated and converted from 2002 Australian to 2014 US dollars. Results: More than 90% of women experienced at least one adverse effect (i.e. post-surgical issue, reaction to radiotherapy, upper-body symptoms or reduced function, lymphedema, fatigue or weight gain). On average, women paid $5,636 (95%CI: $4,694, $6,577) in total costs. Women with any one of the following symptoms (fatigue, reduced upper-body function, upper-body symptoms) or women who report ≥4 adverse treatment-related effects, have 1.5 to nearly 4 times the odds of having higher healthcare costs than women who do not report these complaints (p<0.05). Conclusions: Women face substantial economic burden due to a range of treatment-related health problems, which may persist beyond the treatment period. Improving breast cancer care by incorporating prospective surveillance of treatment-related side effects, and strategies for prevention and treatment of concerns (e.g., exercise) has real potential for reducing patient-borne costs.