330 research outputs found

    Keyword-Based Delegable Proofs of Storage

    Full text link
    Cloud users (clients) with limited storage capacity at their end can outsource bulk data to the cloud storage server. A client can later access her data by downloading the required data files. However, a large fraction of the data files the client outsources to the server is often archival in nature that the client uses for backup purposes and accesses less frequently. An untrusted server can thus delete some of these archival data files in order to save some space (and allocate the same to other clients) without being detected by the client (data owner). Proofs of storage enable the client to audit her data files uploaded to the server in order to ensure the integrity of those files. In this work, we introduce one type of (selective) proofs of storage that we call keyword-based delegable proofs of storage, where the client wants to audit all her data files containing a specific keyword (e.g., "important"). Moreover, it satisfies the notion of public verifiability where the client can delegate the auditing task to a third-party auditor who audits the set of files corresponding to the keyword on behalf of the client. We formally define the security of a keyword-based delegable proof-of-storage protocol. We construct such a protocol based on an existing proof-of-storage scheme and analyze the security of our protocol. We argue that the techniques we use can be applied atop any existing publicly verifiable proof-of-storage scheme for static data. Finally, we discuss the efficiency of our construction.Comment: A preliminary version of this work has been published in International Conference on Information Security Practice and Experience (ISPEC 2018

    Anonymous Single-Sign-On for n designated services with traceability

    Get PDF
    Anonymous Single-Sign-On authentication schemes have been proposed to allow users to access a service protected by a verifier without revealing their identity which has become more important due to the introduction of strong privacy regulations. In this paper we describe a new approach whereby anonymous authentication to different verifiers is achieved via authorisation tags and pseudonyms. The particular innovation of our scheme is authentication can only occur between a user and its designated verifier for a service, and the verification cannot be performed by any other verifier. The benefit of this authentication approach is that it prevents information leakage of a user's service access information, even if the verifiers for these services collude which each other. Our scheme also supports a trusted third party who is authorised to de-anonymise the user and reveal her whole services access information if required. Furthermore, our scheme is lightweight because it does not rely on attribute or policy-based signature schemes to enable access to multiple services. The scheme's security model is given together with a security proof, an implementation and a performance evaluation.Comment: 3

    Quantum resource estimates for computing elliptic curve discrete logarithms

    Get PDF
    We give precise quantum resource estimates for Shor's algorithm to compute discrete logarithms on elliptic curves over prime fields. The estimates are derived from a simulation of a Toffoli gate network for controlled elliptic curve point addition, implemented within the framework of the quantum computing software tool suite LIQUiUi|\rangle. We determine circuit implementations for reversible modular arithmetic, including modular addition, multiplication and inversion, as well as reversible elliptic curve point addition. We conclude that elliptic curve discrete logarithms on an elliptic curve defined over an nn-bit prime field can be computed on a quantum computer with at most 9n+2log2(n)+109n + 2\lceil\log_2(n)\rceil+10 qubits using a quantum circuit of at most 448n3log2(n)+4090n3448 n^3 \log_2(n) + 4090 n^3 Toffoli gates. We are able to classically simulate the Toffoli networks corresponding to the controlled elliptic curve point addition as the core piece of Shor's algorithm for the NIST standard curves P-192, P-224, P-256, P-384 and P-521. Our approach allows gate-level comparisons to recent resource estimates for Shor's factoring algorithm. The results also support estimates given earlier by Proos and Zalka and indicate that, for current parameters at comparable classical security levels, the number of qubits required to tackle elliptic curves is less than for attacking RSA, suggesting that indeed ECC is an easier target than RSA.Comment: 24 pages, 2 tables, 11 figures. v2: typos fixed and reference added. ASIACRYPT 201

    Solving discrete logarithms on a 170-bit MNT curve by pairing reduction

    Get PDF
    Pairing based cryptography is in a dangerous position following the breakthroughs on discrete logarithms computations in finite fields of small characteristic. Remaining instances are built over finite fields of large characteristic and their security relies on the fact that the embedding field of the underlying curve is relatively large. How large is debatable. The aim of our work is to sustain the claim that the combination of degree 3 embedding and too small finite fields obviously does not provide enough security. As a computational example, we solve the DLP on a 170-bit MNT curve, by exploiting the pairing embedding to a 508-bit, degree-3 extension of the base field.Comment: to appear in the Lecture Notes in Computer Science (LNCS

    Snarky Signatures: Minimal Signatures of Knowledge from Simulation-Extractable SNARKs

    Get PDF
    We construct a pairing based simulation-extractable SNARK (SE-SNARK) that consists of only 3 group elements and has highly efficient verification. By formally linking SE-SNARKs to signatures of knowledge, we then obtain a succinct signature of knowledge consisting of only 3 group elements. SE-SNARKs enable a prover to give a proof that they know a witness to an instance in a manner which is: (1) succinct - proofs are short and verifier computation is small; (2) zero-knowledge - proofs do not reveal the witness; (3) simulation-extractable - it is only possible to prove instances to which you know a witness, even when you have already seen a number of simulated proofs. We also prove that any pairing based signature of knowledge or SE-NIZK argument must have at least 3 group elements and 2 verification equations. Since our constructions match these lower bounds, we have the smallest size signature of knowledge and the smallest size SE-SNARK possible

    The Role of Individual Variables, Organizational Variables and Moral Intensity Dimensions in Libyan Management Accountants’ Ethical Decision Making

    Get PDF
    This study investigates the association of a broad set of variables with the ethical decision making of management accountants in Libya. Adopting a cross-sectional methodology, a questionnaire including four different ethical scenarios was used to gather data from 229 participants. For each scenario, ethical decision making was examined in terms of the recognition, judgment and intention stages of Rest’s model. A significant relationship was found between ethical recognition and ethical judgment and also between ethical judgment and ethical intention, but ethical recognition did not significantly predict ethical intention—thus providing support for Rest’s model. Organizational variables, age and educational level yielded few significant results. The lack of significance for codes of ethics might reflect their relative lack of development in Libya, in which case Libyan companies should pay attention to their content and how they are supported, especially in the light of the under-development of the accounting profession in Libya. Few significant results were also found for gender, but where they were found, males showed more ethical characteristics than females. This unusual result reinforces the dangers of gender stereotyping in business. Personal moral philosophy and moral intensity dimensions were generally found to be significant predictors of the three stages of ethical decision making studied. One implication of this is to give more attention to ethics in accounting education, making the connections between accounting practice and (in Libya) Islam. Overall, this study not only adds to the available empirical evidence on factors affecting ethical decision making, notably examining three stages of Rest’s model, but also offers rare insights into the ethical views of practising management accountants and provides a benchmark for future studies of ethical decision making in Muslim majority countries and other parts of the developing world

    "Then you get a teacher" - Guidelines for excellence in teaching

    Get PDF
    Background: Current literature calls for the explicit teaching to health-science educators of the skills, knowledge and dispositions that are required for successful teaching in higher education. Aims: This paper draws on evidence from an Oral Hygiene department at a South African university in order to illustrate these teaching-competency needs. Insights from the evidence are synthesised with current literature regarding best teaching practice, in support of an appropriate framework for the development of teaching competencies to health-science educators. Description: A qualitative approach, using a case study, was adopted. The cohort comprised fifteen students in the first-year Oral Hygiene cohort class and the ten educators who taught their programme. Data was collected through semistructured interviews and open-ended questionnaires. The topics that emerged from the combined analysis of the interviews and the questionnaires were organised into a grid so that common themes could be identified. Current literature regarding teaching and learning was used as a framework for interpreting the empirical evidence, from which three categories emerged. The first category included suggestions from students regarding what to do to teach better. A review of the literature indicates that these competencies can be effectively learnt from self-help guides. The second category included requests for skills development. Literature review suggests that these might effectively be learnt from single-event workshops facilitated by more able peers. Responses in the final category highlighted the need for an underpinning theory of teaching and learning, and signalled the need for a more theoretically grounded and detailed approach to teacher development. Conclusion: The framework developed from the empirical study and current literature makes it possible for individual clinical teachers, and staff developers, to construct teaching-competency development plans that are pertinent to individual teachers’ needs, relevant and practical, educationally sound, and cost-effective in terms of time and effort

    The swimming kinematics of larval Atlantic cod, Gadus morhua L., are resilient to elevated seawater pCO2

    Get PDF
    Kinematics of swimming behavior of larval Atlantic cod, aged 12 and 27 days post-hatch (dph) and cultured under three pCO2 conditions (control-370, medium-1800, and high-4200 μatm) from March to May 2010, were extracted from swim path recordings obtained using silhouette video photography. The swim paths were analyzed for swim duration, distance and speed, stop duration, and horizontal and vertical turn angles to determine whether elevated seawater pCO2—at beyond near-future ocean acidification levels—affects the swimming kinematics of Atlantic cod larvae. There were no significant differences in most of the variables tested: the swimming kinematics of Atlantic cod larvae at 12 and 27 dph were highly resilient to extremely elevated pCO2 levels. Nonetheless, cod larvae cultured at the highest pCO2 concentration displayed vertical turn angles that were more restricted (median turn angle, 15°) than larvae in the control (19°) and medium (19°) treatments at 12 dph (but not at 27 dph). Significant reduction in the stop duration of cod larvae from the high treatment (median stop duration, 0.28 s) was also observed compared to the larvae from the control group (0.32 s) at 27 dph (but not at 12 dph). The functional and ecological significance of these subtle differences are unclear and, therefore, require further investigation in order to determine whether they are ecologically relevant or spurious
    corecore