115 resultados para dishonest signer
Resumo:
Digital signatures are often used by trusted authorities to make unique bindings between a subject and a digital object; for example, certificate authorities certify a public key belongs to a domain name, and time-stamping authorities certify that a certain piece of information existed at a certain time. Traditional digital signature schemes however impose no uniqueness conditions, so a trusted authority could make multiple certifications for the same subject but different objects, be it intentionally, by accident, or following a (legal or illegal) coercion. We propose the notion of a double-authentication-preventing signature, in which a value to be signed is split into two parts: a subject and a message. If a signer ever signs two different messages for the same subject, enough information is revealed to allow anyone to compute valid signatures on behalf of the signer. This double-signature forgeability property discourages signers from misbehaving—a form of self-enforcement—and would give binding authorities like CAs some cryptographic arguments to resist legal coercion. We give a generic construction using a new type of trapdoor functions with extractability properties, which we show can be instantiated using the group of sign-agnostic quadratic residues modulo a Blum integer; we show an additional application of these new extractable trapdoor functions to standard digital signatures.
Resumo:
The 1st July 1997 heralded the implementation of a number of amendments to the Queensland Criminal Code including some intriguing changes affecting the principal property offences of stealing (section 398) and dishonest application (section 408C). This article discusses the impact of the changes. It examines the extent of the amendments and then aims to delineate the ambit of each offence drawing on some of the more recent judgments in the area. It concludes that the offences are moving closer together while retaining many of the complexities of proof experienced in the past.
Resumo:
Animal fights are typically preceded by displays and there is debate whether these are always honest. We investigated the prefight period in hermit crabs, Pagurus bernhardus, during which up to four types of display plus other activities that might provide information are performed. We determined how each display influences or predicts various fight decisions, and related these displays to the motivational state of the attacker, as determined by a startle response, and of the motivational state of the defender, as determined by the duration for which it resisted eviction from its shell. Two displays appeared to have consistent but different effects. Cheliped presentation, where the claws were held in a stationary position, often by both crabs but for longer by the larger, seemed to be honest, and allowed for mutual size assessment. This display enhanced the motivation and the success of the larger crab. In contrast, cheliped extension, involving the rapid thrust of the open chelae towards the opponent, did not seem to allow for mutual size assessment and may contain an element of bluff. It was performed more by the smaller crab and enhanced its success. The complexity of displays in this species appears to allow for both honesty and manipulation.
Resumo:
Référence bibliographique : Rol, 60430
Resumo:
Despite theoretical predictions, dishonest signalling has rarely been observed in aggressive interactions. We present evidence of such signalling in the nonpollinating. g wasp Philotrypesis sp. A ex Ficus rubiginosa. First, morphometric data indicated that an alternative 'atypical' male morph (17.8% of individuals) exists that tends to be larger in body size and has longer mandibles for a given body size than other 'typical' males. Second, behavioural observations suggested that males use mandible gape width (which depends on mandible length) as a cue to assess opponents before fights and retreat without escalating if they are unlikely to win, and, probably because their greater mandible gape width causes more opponents to retreat without escalating, that atypical males engaged in fewer fights than typical males for a given body size but had higher mating success. Third, atypical males were less likely to win fights than typical males of similar mandible length relative to opponents. In addition, we found that atypical males incur more injuries (greater receiver-dependent signal costs) than typical males of similar body size relative to rivals. We discuss the implications of our findings for future work on dishonest signalling. (C) 2009 The Association for the Study of Animal Behaviour. Published by Elsevier Ltd. All rights reserved.
Resumo:
Mode of access: Internet.
Resumo:
Dishonest Assistance and Accessory Liability, Paul S. Davies, Accessory Liability, Oxford: Hart Publishing, 2015, 294 pp, hb £54.99 In this essay review of Paul Davies' Accessory Liability, it is questioned whether dishonest assistance can be accommodated with other forms of third party liability in private law. It is argued that dishonest assistance does not involve the same conduct element as other forms of third party liability which are included in Davies’ book. Liability can arise for ‘weak’ causal links in dishonest assistance claims such as where a third party fails to intervene. It is also the case that liability can arise for involvement which arises ‘after the event’, which undermines Davies’ suggestion that there must be a causal link between a third party’s conduct and a primary wrong.
Resumo:
A strong designated verifier signature scheme makes it possible for a signer to convince a designated verifier that she has signed a message in such a way that the designated verifier cannot transfer the signature to a third party, and no third party can even verify the validity of a designated verifier signature. We show that anyone who intercepts one signature can verify subsequent signatures in Zhang-Mao ID-based designated verifier signature scheme and Lal-Verma ID-based designated verifier proxy signature scheme. We propose a new and efficient ID-based designated verifier signature scheme that is strong and unforgeable. As a direct corollary, we also get a new efficient ID-based designated verifier proxy signature scheme.
Resumo:
This book examines public worrying over 'ethnic crime' and what it tells us about Australia today. How, for instance, can the blame for a series of brutal group sexual assaults in Sydney be so widely attributed to whole ethnic communities? How is it that the arrival of a foundering boatload of asylum-seekers mostly seeking refuge from despotic regimes in 'the Middle East' can be manipulated to characterise complete cohorts of applicants for refuge 'and their immigrant compatriots' as dangerous, dishonest, criminally inclined and inhuman? How did the airborne terror attacks on the USA on 11 September 2001 exacerbate existing tendencies in Australia to stereotype Arabs and Muslims as backward, inassimilable, without respect for Western laws and values, and complicit with barbarism and terrorism? Bin Laden in the Suburbs argues that we are witnessing the emergence of the 'Arab Other' as the pre-eminent 'folk devil' of our time. This Arab Other functions in the national imaginary to prop up the project of national belonging. It has little to do with the lived experiences of Arab, Middle Eastern or Muslim Australians, and everything to do with a host of social anxieties which overlap in a series of moral panics. Bin Laden in the Suburbs analyses a decisive moment in the history of multiculturalism in Australia. 'Unlike most migrants, the Arab migrant is a subversive will ... They invade our shores, take over our neighbourhood and rape our women. They are all little bin Ladens and they are everywhere: Explicit bin Ladens and closet bin Ladens; Conscious bin Ladens and unconscious bin Ladens; bin Ladens on the beach and bin Ladens in the suburbs, as this book is aptly titled. Within this register ... even a single Arab is a threat. Contain the Arab or exterminate the Arab? A 'tolerable' presence in the suburbs, or caged in a concentration camp? ... The politics of the Western post-colonial state is constantly and dangerously oscillating between these tendencies today. It is this dangerous oscillation that is so lucidly exposed in this book'.
Resumo:
NSW Supreme Court decision - claim resulting from alleged damaging dental treatment of healthy teeth - failure of plaintiff to prove dishonest and fraudulent behaviour - assessment of damages.
Resumo:
"The success of Criminal Laws lies both in its distinctive features and in its appeal to a range of readerships. As one review put it, it is simultaneously a "textbook, casebook, handbook and reference work". As such it is ideal for criminal law and criminal justice courses as a teaching text, combining as it does primary sources with extensive critical commentary and a contextual perspective. It is likewise indispensable to practitioners for its detailed coverage of substantive law and its extensive references and inter-disciplinary approach make it a first point of call for researchers from all disciplines. This fifth edition strengthens these distinctive features. All chapters have been systematically updated to incorporate the plethora of legislative, case law, statistical and research material which has emerged since the previous edition. The critical, thematic, contextual and interdisciplinary perspectives have been continued."--Publisher's website. Table of Contents: 1. Some themes -- 2. Criminalisation -- 3. The criminal process -- 4. Components of criminal offences -- 5. Homicide: murder and involuntary manslaughter -- 6. Defences -- 7. Assault and sexual assault -- 8. Public order offences -- 9. Drugs offences -- 10. Dishonest acquisition -- 11. Extending criminal liability: complicity, conspiracy and association -- 12. Sentencing and penality.
Resumo:
Multiple-time signatures are digital signature schemes where the signer is able to sign a predetermined number of messages. They are interesting cryptographic primitives because they allow to solve many important cryptographic problems, and at the same time offer substantial efficiency advantage over ordinary digital signature schemes like RSA. Multiple-time signature schemes have found numerous applications, in ordinary, on-line/off-line, forward-secure signatures, and multicast/stream authentication. We propose a multiple-time signature scheme with very efficient signing and verifying. Our construction is based on a combination of one-way functions and cover-free families, and it is secure against the adaptive chosen-message attack.
Resumo:
A pseudonym provides anonymity by protecting the identity of a legitimate user. A user with a pseudonym can interact with an unknown entity and be confident that his/her identity is secret even if the other entity is dishonest. In this work, we present a system that allows users to create pseudonyms from a trusted master public-secret key pair. The proposed system is based on the intractability of factoring and finding square roots of a quadratic residue modulo a composite number, where the composite number is a product of two large primes. Our proposal is different from previously published pseudonym systems, as in addition to standard notion of protecting privacy of an user, our system offers colligation between seemingly independent pseudonyms. This new property when combined with a trusted platform that stores a master secret key is extremely beneficial to an user as it offers a convenient way to generate a large number of pseudonyms using relatively small storage.