963 resultados para dual system encryption


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Waters, in 2009, introduced an important technique, called dual system encryption, to construct identity-based encryption (IBE) and related schemes. The resulting IBE scheme was described in the setting of symmetric pairing. A key feature of the construction is the presence of random tags in the ciphertext and decryption key. Later work by Lewko and Waters removed the tags and proceeding through composite-order pairings led to a more efficient dual system IBE scheme using asymmetric pairings whose security is based on non-standard but static assumptions. In this work, we have systematically simplified Waters 2009 IBE scheme in the setting of asymmetric pairing. The simplifications retain tags used in the original description. This leads to several variants, the first one of which is based on standard assumptions and in comparison to Waters’ original scheme reduces ciphertexts and keys by two elements each. Going through several stages of simplifications, we finally obtain a simple scheme whose security can be based on two standard assumptions and a natural and minimal extension of the decision Diffie-Hellman problem for asymmetric pairing groups. The scheme itself is also minimal in the sense that apart from the tags, both encryption and key generation use exactly one randomiser each. This final scheme is more efficient than both the previous dual system IBE scheme in the asymmetric setting due to Lewko and Waters and the more recent dual system IBE scheme due to Lewko. We extend the IBE scheme to hierarchical IBE (HIBE) and broadcast encryption (BE) schemes. Both primitives are secure in their respective full models and have better efficiencies compared to previously known schemes offering the same level and type of security.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Certificate-based encryption (CBE) is an important class of public key encryption but the existing schemes are secure only under the premise that the decryption key (or private key) and master secret key are absolutely secret. In fact, a lot of side channel attacks and cold boot attacks can leak secret information of a cryptographic system. In this case, the security of the cryptographic system is destroyed, so a new model called leakage-resilient (LR) cryptography is introduced to solve this problem. While some traditional public key encryption and identity-based encryption with resilient-leakage schemes have been constructed, as far as we know, there is no leakage-resilient scheme in certificate-based cryptosystems. This paper puts forward the first certificate-based encryption scheme which can resist not only the decryption key leakage but also the master secret key leakage. Based on composite order bilinear group assumption, the security of the scheme is proved by using dual system encryption. The relative leakage rate of key is close to 1/3.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Thesis (Ph.D.)--University of Washington, 2016-06

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The confidentiality of data is one of the most important issues in cloud storage system. We address the privacy issue of decentralized cloud storage system using threshold cryptography. The major challenge of designing this cloud storage system is to provide a better privacy guarantee. To achieve this goal, we propose a threshold encryption scheme and integrate it with a secure decentralized erasure code to form a secure cloud storage system, where the user generates a secret parameter participated in system encryption and decryption of plaintext blocks in the combine process. Our cloud storage system meets the requirements of data robustness and confidentiality.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Our daily lives become more and more dependent upon smartphones due to their increased capabilities. Smartphones are used in various ways, e.g. for payment systems or assisting the lives of elderly or disabled people. Security threats for these devices become more and more dangerous since there is still a lack of proper security tools for protection. Android emerges as an open smartphone platform which allows modification even on operating system level and where third-party developers first time have the opportunity to develop kernel-based low-level security tools. Android quickly gained its popularity among smartphone developers and even beyond since it bases on Java on top of "open" Linux in comparison to former proprietary platforms which have very restrictive SDKs and corresponding APIs. Symbian OS, holding the greatest market share among all smartphone OSs, was even closing critical APIs to common developers and introduced application certification. This was done since this OS was the main target for smartphone malwares in the past. In fact, more than 290 malwares designed for Symbian OS appeared from July 2004 to July 2008. Android, in turn, promises to be completely open source. Together with the Linux-based smartphone OS OpenMoko, open smartphone platforms may attract malware writers for creating malicious applications endangering the critical smartphone applications and owners privacy. Since signature-based approaches mainly detect known malwares, anomaly-based approaches can be a valuable addition to these systems. They base on mathematical algorithms processing data that describe the state of a certain device. For gaining this data, a monitoring client is needed that has to extract usable information (features) from the monitored system. Our approach follows a dual system for analyzing these features. On the one hand, functionality for on-device light-weight detection is provided. But since most algorithms are resource exhaustive, remote feature analysis is provided on the other hand. Having this dual system enables event-based detection that can react to the current detection need. In our ongoing research we aim to investigates the feasibility of light-weight on-device detection for certain occasions. On other occasions, whenever significant changes are detected on the device, the system can trigger remote detection with heavy-weight algorithms for better detection results. In the absence of the server respectively as a supplementary approach, we also consider a collaborative scenario. Here, mobile devices sharing a common objective are enabled by a collaboration module to share information, such as intrusion detection data and results. This is based on an ad-hoc network mode that can be provided by a WiFi or Bluetooth adapter nearly every smartphone possesses.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The integration of separate, yet complimentary, cortical pathways appears to play a role in visual perception and action when intercepting objects. The ventral system is responsible for object recognition and identification, while the dorsal system facilitates continuous regulation of action. This dual-system model implies that empirically manipulating different visual information sources during performance of an interceptive action might lead to the emergence of distinct gaze and movement pattern profiles. To test this idea, we recorded hand kinematics and eye movements of participants as they attempted to catch balls projected from a novel apparatus that synchronised or de-synchronised accompanying video images of a throwing action and ball trajectory. Results revealed that ball catching performance was less successful when patterns of hand movements and gaze behaviours were constrained by the absence of advanced perceptual information from the thrower's actions. Under these task constraints, participants began tracking the ball later, followed less of its trajectory, and adapted their actions by initiating movements later and moving the hand faster. There were no performance differences when the throwing action image and ball speed were synchronised or de-synchronised since hand movements were closely linked to information from ball trajectory. Results are interpreted relative to the two-visual system hypothesis, demonstrating that accurate interception requires integration of advanced visual information from kinematics of the throwing action and from ball flight trajectory.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Dual-system models suggest that English past tense morphology involves two processing routes: rule application for regular verbs and memory retrieval for irregular verbs (Pinker, 1999). In second language (L2) processing research, Ullman (2001a) suggested that both verb types are retrieved from memory, but more recently Clahsen and Felser (2006) and Ullman (2004) argued that past tense rule application can be automatised with experience by L2 learners. To address this controversy, we tested highly proficient Greek-English learners with naturalistic or classroom L2 exposure compared to native English speakers in a self-paced reading task involving past tense forms embedded in plausible sentences. Our results suggest that, irrespective to the type of exposure, proficient L2 learners of extended L2 exposure apply rule-based processing.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

A characterization of observability for linear time-varying descriptor systemsE(t)x(t)+F(t)x(t)=B(t)u(t), y(t)=C(t)x(t) was recently developed. NeitherE norC were required to have constant rank. This paper defines a dual system, and a type of controllability so that observability of the original system is equivalent to controllability of the dual system. Criteria for observability and controllability are given in terms of arrays of derivatives of the original coefficients. In addition, the duality results of this paper lead to an improvement on a previous fundamental structure result for solvable systems of the formE(t)x(t)+F(t)x(t)=f(tt).

Relevância:

80.00% 80.00%

Publicador:

Resumo:

According to dual-system accounts of English past-tense processing, regular forms are decomposed into their stem and affix (played=play+ed) based on an implicit linguistic rule, whereas irregular forms (kept) are retrieved directly from the mental lexicon. In second language (L2) processing research, it has been suggested that L2 learners do not have rule-based decomposing abilities, so they process regular past-tense forms similarly to irregular ones (Silva & Clahsen 2008), without applying the morphological rule. The present study investigates morphological processing of regular and irregular verbs in Greek-English L2 learners and native English speakers. In a masked-priming experiment with regular and irregular prime-target verb pairs (playedplay/kept-keep), native speakers showed priming effects for regular pairs, compared to unrelated pairs, indicating decomposition; conversely, L2 learners showed inhibitory effects. At the same time, both groups revealed priming effects for irregular pairs. We discuss these findings in the light of available theories on L2 morphological processing.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The globalization of trade in fish has created many challenges for the developing world specifically with regard to food safety and quality. International organisations have established a good basis for standards in international trade. Whilst these requirements are frequently embraced by the major importers (such as Japan, the EU and the USA), they often impose additional safety requirements and regularly identify batches which fail to meet their strict standards. Creating an effective national seafood control system which meets both the internal national needs as well the requirements for the export market can be challenging. Many countries adopt a dual system where seafood products for the major export markets are subject to tight control whilst the majority of the products (whether for the local market or for more regional trade) are less tightly controlled. With regional liberalization also occurring, deciding on appropriate controls is complex. In the Sultanate of Oman, fisheries production is one of the countries' chief sources of economic revenue after oil production and is a major source of the national food supply. In this paper the structure of the fish supply chain has been analysed and highlighted the different routes operating for the different markets. Although much of the fish are consumed within Oman, there is a major export trade to the local regional markets. Much smaller quantities meet the more stringent standards imposed by the major importing countries and exports to these are limited. The paper has considered the development of the Omani fish control system including the key legislative documents and the administrative structures that have been developed. Establishing modern controls which satisfy the demands of the major importers is possible but places additional costs on businesses. Enhanced controls such as HACCP and other management standards are required but can be difficult to justify when alternative markets do not specify these. These enhanced controls do however provide additional consumer protection and can bring benefits to local consumers. The Omani government is attempting to upgrade the system of controls and has made tremendous progress toward the implementation of HACCP and introducing enhanced management systems into its industrial sector. The existence of strengthened legislative and government support, including subsidies, has encouraged some businesses to implement HACCP. The current control systems have been reviewed and a SWOT analysis approach used to identify key factors for their future development. The study shows that seafood products in the supply chain are often exposed to lengthy handling and distribution process before reaching the consumers, a typical issue faced by many developing countries. As seafood products are often perishable, they safety is compromised if not adequately controlled. The enforcement of current food safety laws in the Sultanate of Oman is shared across various government agencies. Consequently, there is a need to harmonize all regulatory requirements, enhancing the domestic food protection and to continue to work towards a fully risk-based approach in order to compete successfully in the global market.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This thesis is concerned with the development of a funding mechanism, the Student Resource Index, which has been designed to resolve a number of difficulties which emerged following the introduction of integration or inclusion as an alternative means of providing educational support to students with disabilities in the Australian State of Victoria. Prior to 1984, the year in which the major integration or inclusion initiatives were introduced, the great majority of students with disabilities were educated in segregated special schools, however, by 1992 the integration initiatives had been successful in including within regular classes approximately half of the students in receipt of additional educational assistance on the basis of disability. The success of the integration program brought with it a number of administrative and financial problems which were the subject of three government enquiries. Central to these difficulties was the development of a dual system of special education provision. On one hand, additional resources were provided for the students attending segregated special schools by means of weighted student ratios, with one teacher being provided for each six students attending a special school. On the other hand, the requirements of individual students integrated into regular schools were assessed by school-based committees on the basis of their perceived extra educational needs. The major criticism of this dual system of special education funding was that it created inequities in the distribution of resources both between the systems and also within the systems. For example, three students with equivalent needs, one of whom attended a special school and two of whom attended different regular schools could each be funded at substantially differing levels. The solution to these inequities of funding was seen to be in the development of a needs based funding device which encompassed all students in receipt of additional disability related educational support. The Student Resource Index developed in this thesis is a set of behavioural descriptors designed to assess degree of additional educational need across a number of disability domains. These domains include hearing, vision, communication, health, co-ordination (manual and mobility), intellectual capacity and behaviour. The completed Student Resource Index provides a profile of the students’ needs across all of these domains and as such addresses the multiple nature of many disabling conditions. The Student Resource Index was validated in terms of its capacity to predict the ‘known’ membership or the type of special school which some 1200 students in the sample currently attended. The decision to use the existing special school populations as the criterion against which the Student Resource Index was validated was based on the premise that the differing resource levels of these schools had been historically determined by expert opinion, industrial negotiation and reference to other special education systems as the most reliable estimate of the enrolled students’ needs. When discriminant function analysis was applied to some 178 students attending one school for students with mild intellectual disability and one facility for students with moderate to severe intellectual disability the Student Resource Index was successful in predicting the student's known school in 92 percent of cases. An analysis of those students (8 percent) which the Student Resource Index had failed to predict their known school enrolment revealed that 13 students had, for a variety of reasons, been inappropriately placed in these settings. When these students were removed from the sample the predictive accuracy of the Student Resource Index was raised to 96 percent of the sample. By comparison the domains of the Vineland Adaptive Behaviour Scale accurately predicted known enrolments of 76 percent of the sample. By way of replication discriminant function analysis was then applied to the Student Resource Index profiles of 518 students attending Day Special Schools (Mild Intellectual Disability) and 287 students attending Special Developmental Schools (Moderate to Severe Intellectual Disability). In this case, the Student Resource Index profiles were successful in predicting the known enrolments of 85 percent of students. When a third group was added, 147 students attending Day Special Schools for students with physical disabilities, the Student Resource Index predicted known enrolments in 80 percent of cases. The addition of a fourth group of 116 students attending Day Special Schools (Hearing Impaired) to the discriminant analysis led to a small reduction in predictive accuracy from 80 percent to 78 percent of the sample. A final analysis which included students attending a School for the Deaf-Blind, a Hospital School and a Social and Behavioural Unit was successful in predicting known enrolments in 71 percent of the 1114 students in the sample. For reasons which are expanded upon within the thesis it was concluded that the Student Resource Index when used in conjunction with discriminant function analysis was capable of isolating four distinct groups on the basis of their additional educational needs. If the historically determined and varied funding levels provided to these groups, inherent in the cash equivalent of the staffing ratios of Day Special Schools (Mild Intellectual Disability), Special Development Schools (Moderate to Severe Intellectual Disability), Day Special Schools (Physical Disability) and Day Special Schools (Hearing Impairment) are accepted as reasonable reflections of these students’ needs these funding levels can be translated into funding bands. These funding bands can then be applied to students in segregated or inclusive placements. The thesis demonstrates that a new applicant for funding can be introduced into the existing data base and by the use of discriminant function analysis be allocated to one of the four groups. The analysis is in effect saying that this new student’s profile of educational needs has more in common with Group A than with the members of Groups B, C, or D. The student would then be funded at Group A level. It is immaterial from a funding point of view whether the student decides to attend a segregated or inclusive setting. The thesis then examines the impact of the introduction of Student Resource Index based funding upon the current funding of the special schools in one of the major metropolitan regions. Overall, such an initiative would lead to a reduction of 1.54 percent of the total funding accruing to the region’s special schools.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This paper compares the effects on corporate performance and managerial self-dealing in a situation in which the CEO reports to a single Board that is responsible for both monitoring management and establishing performance targets to an alternative in which the CEO reports to two Boards, each responsible for a different task. The equilibrium set of the common agency game induced by the dual board structure is fully characterized. Compared to a single board, a dual board demands less aggressive performance targets from the CEO, but exerts more monitoring. A consequence of the first feature is that the CEO always exerts less effort toward production with a dual board. The effect of a dual board on CEO self-dealing is ambiguous: there are equilibria in which, in spite of the higher monitoring, self-dealing is higher in a dual system. The model indicates that the strategic interdependence generated by the assignment of different tasks to different boards may yield results that are far from the desired ones.