930 resultados para Ring signatures
Resumo:
Basing signature schemes on strong lattice problems has been a long standing open issue. Today, two families of lattice-based signature schemes are known: the ones based on the hash-and-sign construction of Gentry et al.; and Lyubashevsky’s schemes, which are based on the Fiat-Shamir framework. In this paper we show for the first time how to adapt the schemes of Lyubashevsky to the ring signature setting. In particular we transform the scheme of ASIACRYPT 2009 into a ring signature scheme that provides strong properties of security under the random oracle model. Anonymity is ensured in the sense that signatures of different users are within negligible statistical distance even under full key exposure. In fact, the scheme satisfies a notion which is stronger than the classical full key exposure setting as even if the keypair of the signing user is adversarially chosen, the statistical distance between signatures of different users remains negligible. Considering unforgeability, the best lattice-based ring signature schemes provide either unforgeability against arbitrary chosen subring attacks or insider corruption in log-sized rings. In this paper we present two variants of our scheme. In the basic one, unforgeability is ensured in those two settings. Increasing signature and key sizes by a factor k (typically 80 − 100), we provide a variant in which unforgeability is ensured against insider corruption attacks for arbitrary rings. The technique used is pretty general and can be adapted to other existing schemes.
Resumo:
Neste estudo são apresentadas as análises espaciais e temporais dos dados sinóticos coletados durante quatro campanhas oceanográficas do programa “REVIZEE/SCORE-N” realizadas em março-abril de 1995, outubro-novembro de 1997, abril-maio de 1999 e agosto-setembro de 2001. Em complemento às análises dos dados hidrológicos, foram utilizados resultados do modelo numérico CLIPPER - Experimento ATL6 (1/6 deg.). A ênfase deste artigo é avaliar o deslocamento sazonal e espacial da pluma de água Amazônica nas regiões localizadas à sudoeste, noroeste e em frente à foz do rio Amazonas. Dados hidrológicos e resultados do modelo demonstram que durante os meses de março-maio a pluma do rio Amazonas move-se para sudoeste, ao longo da costa norte brasileiro, tendendo a diminuir o deslocamento da pluma para sudoeste durante os meses de agosto-setembro. De outubro a novembro, não foi observado ou registrado o deslocamento da pluma para sudoeste. Resultados do modelo revelam anéis gerados pela retroflexão da Corrente Norte do Brasil (CNB) em torno de 7º N, e também a influência de água proveniente do rio Amazonas em volta desses anéis durante o mês de agosto.
Resumo:
Lattice-based cryptographic primitives are believed to offer resilience against attacks by quantum computers. We demonstrate the practicality of post-quantum key exchange by constructing cipher suites for the Transport Layer Security (TLS) protocol that provide key exchange based on the ring learning with errors (R-LWE) problem, we accompany these cipher suites with a rigorous proof of security. Our approach ties lattice-based key exchange together with traditional authentication using RSA or elliptic curve digital signatures: the post-quantum key exchange provides forward secrecy against future quantum attackers, while authentication can be provided using RSA keys that are issued by today's commercial certificate authorities, smoothing the path to adoption. Our cryptographically secure implementation, aimed at the 128-bit security level, reveals that the performance price when switching from non-quantum-safe key exchange is not too high. With our R-LWE cipher suites integrated into the Open SSL library and using the Apache web server on a 2-core desktop computer, we could serve 506 RLWE-ECDSA-AES128-GCM-SHA256 HTTPS connections per second for a 10 KiB payload. Compared to elliptic curve Diffie-Hellman, this means an 8 KiB increased handshake size and a reduction in throughput of only 21%. This demonstrates that provably secure post-quantum key-exchange can already be considered practical.
Resumo:
To determine the influence of fire and thermokarst in a boreal landscape, we investigated peat cores within and adjacent to a permafrost collapse feature on the Tanana River Floodplain of Interior Alaska. Radioisotope dating, diatom assemblages, plant macrofossils, charcoal fragments, and carbon and nitrogen content of the peat profile indicate ~600 years of vegetation succession with a transition from a terrestrial forest to a sedge-dominated wetland over 100 years ago, and to a Sphagnum-dominated peatland in approximately 1970. The shift from sedge to Sphagnum, and a decrease in the detrended tree-ring width index of black spruce trees adjacent to the collapse coincided with an increase in the growing season temperature record from Fairbanks. This concurrent wetland succession and reduced growth of black spruce trees indicates a step-wise ecosystem-level response to a change in regional climate. In 2001, fire was observed coincident with permafrost collapse and resulted in lateral expansion of the peatland. These observations and the peat profile suggest that future warming and/or increased fire disturbance could promote permafrost degradation, peatland expansion, and increase carbon storage across this landscape; however, the development of drought conditions could reduce the success of both black spruce and Sphagnum, and potentially decrease the long-term ecosystem carbon storage.
Resumo:
One could argue that there are many approaches to site specifically as there are specific sites. Each site has a variety of influences such as visibility and natural and cultural histories. Human impositions that endure do so because of some canniness, some appreciation of how the current will live with the past.
Resumo:
Public key cryptography, and with it,the ability to compute digital signatures, have made it possible for electronic commerce to flourish. It is thus unsurprising that the proposed Australian NECS will also utilise digital signatures in its system so as to provide a fully automated process from the creation of electronic land title instrument to the digital signing, and electronic lodgment of these instruments. This necessitates an analysis of the fraud risks raised by the usage of digital signatures because a compromise of the integrity of digital signatures will lead to a compromise of the Torrens system itself. This article will show that digital signatures may in fact offer greater security against fraud than handwritten signatures; but to achieve this, digital signatures require an infrastructure whereby each component is properly implemented and managed.
Resumo:
The structure of the 1:1 proton-transfer compound from the reaction of L-tartaric acid with the azo-dye precursor aniline yellow [4-(phenylazo)aniline], 4-(phenyldiazenyl)anilinium hydrogen 2R,3R-tartrate C12H12N3+ . C4H6O6- has been determined at 200 K. The asymmetric unit of the compound contains two independent phenylazoanilinium cations and two hydrogen L-tartrate anions. The structure is unusual in that all four phenyl rings of both cations have identical 50% rotational disorder. The two hydrogen L-tartrate anions form independent but similar chains through head-to-tail carboxylic O--H...O~carboxyl~ hydrogen bonds [graph set C7] which are then extended into a two-dimensional hydrogen-bonded sheet structure through hydroxyl O--H...O hydrogen-bonding links. The anilinium groups of the phenyldiazenyl cations are incorporated into the sheets and also provide internal hydrogen-bonding extensions while their aromatic tails layer in the structure without significant interaction except for weak \p--\p interactions [minimum ring centroid separation, 3.844(3) \%A]. The hydrogen L-tartrate residues of both anions have the common short intramolecular hydroxyl O--H...O~carboxyl~ hydogen bonds. This work has provided a solution to the unusual disorder problem inherent in the structure of this salt as well as giving another example of the utility of the hydrogen tartrate in the generation of sheet substructures in molecular assembly processes.