705 research outputs found

    Content Analysis of Acculturation Research in Counseling and Counseling Psychology: A 22-Year Review

    Get PDF
    The authors conducted a 22-year (1988–2009) content analysis of quantitative empirical research that included acculturation and/or enculturation as a study variable(s). A total of 138 studies in 134 articles were systematically evaluated from 5 major American Psychological Association and American Counseling Association journals in counseling and counseling psychology, including Journal of Counseling Psychology, The Counseling Psychologist, Journal of Counseling and Development, Journal of Multicultural Counseling and Development, and Cultural Diversity and Ethnic Minority Psychology. To guide the analysis, the authors conceptualized acculturation/enculturation as a “bilinear” (i.e., developing cultural orientations to both majority and ethnic cultures) and “multidimensional” (i.e., across multiple areas such as behaviors, values, identity, and knowledge) cultural socialization process that occurs in interaction with “social contexts” (e.g., home, school, work, West Coast, Midwest). Findings include the patterns and trends of acculturation/enculturation research in (a) conceptualization and use of acculturation/enculturation variable(s), (b) research designs (e.g., sample characteristics, instruments, data collection, and analysis methods), (c) content areas, and (d) changes in total publications and trends over time. Additionally, meta-analyses were conducted on the relationship of acculturation/enculturation and a few key variables of mental health, adjustment, and well-being. Major findings and directions for future research are discussed

    Primary angiosarcoma of the abdominal aorta: multi-row computed tomography

    Get PDF
    Primary angiosarcoma of the aorta is a rare tumor. The symptoms resemble those of atherosclerotic occlusive disease, and the radiomorphologic pattern is often nonspecific. In most published cases, the malignant vascular obstruction was diagnosed histopathologically after surgical vascular reconstruction. We report on interventional and CT-angiographic features of an abdominal aortic angiosarcoma, observed in a 71-year-old patient. The polyploid intimal alteration is clearly depicted on CT images. Morphology and the segmental obstruction of the aortic lumen without aneurysmal or extensive atherosclerotic mural changes should lead to the differential diagnosis of an intravascular malignanc

    Factors Related to the Racial Socialization of Asian American Children

    Get PDF
    Within the last decade, research on racial awareness, ethnic identity, and racial socialization strategies among transracially adoptive parents\u27 has increased, reflecting the unique racial, cultural, and family dynamics among American families. The purpose of this study is to expand upon this literature, exploring the racial makeup of adoptive parents\u27 interpersonal relationships and how this relates to racial awareness and racial socialization practices of children adopted from Asian countries. Given that this study specifically focuses on parents\u27 of children adopted from Asian countries, this study will also look at adoptive parents\u27 knowledge concerning the racial reality faced by Asian Americans in the United States. Based on Allport\u27s Intergroup Contact theory, increased intergroup contact with other racial groups should explain the relationship between parents\u27 racial attitudes and their knowledge of Asian American racial reality and racial socialization practices

    On the Multi-User Security of LWE-based NIKE

    Get PDF
    Non-interactive key exchange (NIKE) schemes like the Diffie-Hellman key exchange are a widespread building block in several cryptographic protocols. Since the Diffie-Hellman key exchange is not post-quantum secure, it is important to investigate post-quantum alternatives. We analyze the security of the LWE-based NIKE by Ding et al. (ePrint 2012) and Peikert (PQCrypt 2014) in a multi-user setting where the same public key is used to generate shared keys with multiple other users. The Diffie-Hellman key exchange achieves this security notion. The mentioned LWE-based NIKE scheme comes with an inherent correctness error (Guo et al., PKC 2020), and this has significant implications for the multi-user security, necessitating a closer examination. Single-user security generically implies multi-user security when all users generate their keys honestly for NIKE schemes with negligible correctness error. However, the LWE-based NIKE requires a super-polynomial modulus to achieve a negligible correctness error, which makes the scheme less efficient. We show that - generically, single-user security does not imply multi-user security when the correctness error is non-negligible, but despite this - the LWE-based NIKE with polynomial modulus is multi-user secure for honest users when the number of users is fixed in advance. This result takes advantage of the leakage-resilience properties of LWE. We then turn to a stronger model of multi-user security that allows adversarially generated public keys. For this model, we consider a variant of the LWE-based NIKE where each public key is equipped with a NIZKPoK of the secret key. Adding NIZKPoKs is a standard technique for this stronger model and Hesse et al. (Crypto 2018) showed that this is sufficient to achieve security in the stronger multi-user security model for perfectly correct NIKEs (which the LWE-based NIKE is not). We show that - for certain parameters that include all parameters with polynomial modulus, the LWE-based NIKE can be efficiently attacked with adversarially generated public keys, despite the use of NIZKPoKs, but - for suitable parameters (that require a super-polynomial modulus), this security notion is achieved by the LWE-based NIKE with NIZKPoKs. This stronger security notion has been previously achieved for LWE-based NIKE only in the QROM, while all our results are in the standard model

    On Deniable Authentication against Malicious Verifiers

    Get PDF
    Deniable authentication allows Alice to authenticate a message to Bob, while retaining deniability towards third parties. In particular, not even Bob can convince a third party that Alice authenticated that message. Clearly, in this setting Bob should not be considered trustworthy. Furthermore, deniable authentication is necessary for deniable key exchange, as explicitly desired by Signal and off-the-record (OTR) messaging. In this work we focus on (publicly verifiable) designated verifier signatures (DVS), which are a widely used primitive to achieve deniable authentication. We propose a definition of deniability against malicious verifiers for DVS. We give a construction that achieves this notion in the random oracle (RO) model. Moreover, we show that our notion is not achievable in the standard model with a concrete attack; thereby giving a non-contrived example of the RO heuristic failing. All previous protocols that claim to achieve deniable authentication against malicious verifiers (like Signal\u27s initial handshake protocols X3DH and PQXDH) rely on the Extended Knowledge of Diffie–Hellman (EKDH) assumption. We show that this assumption is broken and that these protocols do not achieve deniability against malicious verifiers

    Non-Interactive Key Exchange: New Notions, New Constructions, and Forward Security

    Get PDF
    Non-interactive key exchange (NIKE) is a simple and elegant cryptographic primitive that allows two or more users to agree on a secret shared key without any interaction. NIKE schemes have been formalized in different scenarios (such as the public-key, or the identity-based setting), and have found many applications in cryptography. In this work, we propose a NIKE variant that generalizes public-key and identity-based NIKE: a multi-authority identity-based NIKE (MA-ID-NIKE) is defined like an identity-based NIKE, only with several identity domains (i.e., several instances of an identity-based NIKE), and such that users from different identity domains can compute shared keys. This makes MA-ID-NIKE schemes more versatile than existing NIKE or identity-based NIKE schemes, for instance, in an application in which users from different (centrally managed) companies need to compute shared keys. We show several results for MA-ID-NIKE schemes: - We show that MA-ID-NIKE schemes generically imply public-key NIKEs, identity-based NIKEs, as well as forward-secure NIKE schemes, the latter of which are notoriously hard to construct. - We propose two simple constructions of MA-ID-NIKE schemes from indistinguishability obfuscation (iO) and multilinear maps, respectively. These constructions achieve only selective security, but can be leveraged to adaptive security for small groups of users (that want to be able to agree on a joint shared key) in the random oracle model. - We give a simple and elegant construction of MA-ID-NIKEs from identity-based encryption (IBE) and universal samplers. This construction achieves adaptive security also for large groups of users based on the adaptive security of the used universal samplers. Universal samplers, in turn, are known to be achievable using iO in the random oracle model. As a nice feature, the same construction yields hierarchical MA-ID-NIKEs or public-key NIKEs when instantiated with hierarchical IBE or public-key encryption instead of IBE schemes. While these results are clearly only feasibility results, they do demonstrate the achievability of a concept that itself has very practical use cases
    corecore