330 research outputs found
Keyword-Based Delegable Proofs of Storage
Cloud users (clients) with limited storage capacity at their end can
outsource bulk data to the cloud storage server. A client can later access her
data by downloading the required data files. However, a large fraction of the
data files the client outsources to the server is often archival in nature that
the client uses for backup purposes and accesses less frequently. An untrusted
server can thus delete some of these archival data files in order to save some
space (and allocate the same to other clients) without being detected by the
client (data owner). Proofs of storage enable the client to audit her data
files uploaded to the server in order to ensure the integrity of those files.
In this work, we introduce one type of (selective) proofs of storage that we
call keyword-based delegable proofs of storage, where the client wants to audit
all her data files containing a specific keyword (e.g., "important"). Moreover,
it satisfies the notion of public verifiability where the client can delegate
the auditing task to a third-party auditor who audits the set of files
corresponding to the keyword on behalf of the client. We formally define the
security of a keyword-based delegable proof-of-storage protocol. We construct
such a protocol based on an existing proof-of-storage scheme and analyze the
security of our protocol. We argue that the techniques we use can be applied
atop any existing publicly verifiable proof-of-storage scheme for static data.
Finally, we discuss the efficiency of our construction.Comment: A preliminary version of this work has been published in
International Conference on Information Security Practice and Experience
(ISPEC 2018
Anonymous Single-Sign-On for n designated services with traceability
Anonymous Single-Sign-On authentication schemes have been proposed to allow
users to access a service protected by a verifier without revealing their
identity which has become more important due to the introduction of strong
privacy regulations. In this paper we describe a new approach whereby anonymous
authentication to different verifiers is achieved via authorisation tags and
pseudonyms. The particular innovation of our scheme is authentication can only
occur between a user and its designated verifier for a service, and the
verification cannot be performed by any other verifier. The benefit of this
authentication approach is that it prevents information leakage of a user's
service access information, even if the verifiers for these services collude
which each other. Our scheme also supports a trusted third party who is
authorised to de-anonymise the user and reveal her whole services access
information if required. Furthermore, our scheme is lightweight because it does
not rely on attribute or policy-based signature schemes to enable access to
multiple services. The scheme's security model is given together with a
security proof, an implementation and a performance evaluation.Comment: 3
Quantum resource estimates for computing elliptic curve discrete logarithms
We give precise quantum resource estimates for Shor's algorithm to compute
discrete logarithms on elliptic curves over prime fields. The estimates are
derived from a simulation of a Toffoli gate network for controlled elliptic
curve point addition, implemented within the framework of the quantum computing
software tool suite LIQ. We determine circuit implementations for
reversible modular arithmetic, including modular addition, multiplication and
inversion, as well as reversible elliptic curve point addition. We conclude
that elliptic curve discrete logarithms on an elliptic curve defined over an
-bit prime field can be computed on a quantum computer with at most qubits using a quantum circuit of at most Toffoli gates. We are able to classically simulate the
Toffoli networks corresponding to the controlled elliptic curve point addition
as the core piece of Shor's algorithm for the NIST standard curves P-192,
P-224, P-256, P-384 and P-521. Our approach allows gate-level comparisons to
recent resource estimates for Shor's factoring algorithm. The results also
support estimates given earlier by Proos and Zalka and indicate that, for
current parameters at comparable classical security levels, the number of
qubits required to tackle elliptic curves is less than for attacking RSA,
suggesting that indeed ECC is an easier target than RSA.Comment: 24 pages, 2 tables, 11 figures. v2: typos fixed and reference added.
ASIACRYPT 201
Solving discrete logarithms on a 170-bit MNT curve by pairing reduction
Pairing based cryptography is in a dangerous position following the
breakthroughs on discrete logarithms computations in finite fields of small
characteristic. Remaining instances are built over finite fields of large
characteristic and their security relies on the fact that the embedding field
of the underlying curve is relatively large. How large is debatable. The aim of
our work is to sustain the claim that the combination of degree 3 embedding and
too small finite fields obviously does not provide enough security. As a
computational example, we solve the DLP on a 170-bit MNT curve, by exploiting
the pairing embedding to a 508-bit, degree-3 extension of the base field.Comment: to appear in the Lecture Notes in Computer Science (LNCS
Rickia wasmannii (Laboulbeniales) influences the water consumption of Myrmica scabrinodis
24 - Social insect host-microbe interactions, Poste
Snarky Signatures: Minimal Signatures of Knowledge from Simulation-Extractable SNARKs
We construct a pairing based simulation-extractable SNARK (SE-SNARK) that consists of only 3 group elements and has highly efficient verification. By formally linking SE-SNARKs to signatures of knowledge, we then obtain a succinct signature of knowledge consisting of only 3 group elements.
SE-SNARKs enable a prover to give a proof that they know a witness to an instance in a manner which is: (1) succinct - proofs are short and verifier computation is small; (2) zero-knowledge - proofs do not reveal the witness; (3) simulation-extractable - it is only possible to prove instances to which you know a witness, even when you have already seen a number of simulated proofs.
We also prove that any pairing based signature of knowledge or SE-NIZK argument must have at least 3 group elements and 2 verification equations. Since our constructions match these lower bounds, we have the smallest size signature of knowledge and the smallest size SE-SNARK possible
The Role of Individual Variables, Organizational Variables and Moral Intensity Dimensions in Libyan Management Accountants’ Ethical Decision Making
This study investigates the association of a broad set of variables with the ethical decision making of management accountants in Libya. Adopting a cross-sectional methodology, a questionnaire including four different ethical scenarios was used to gather data from 229 participants. For each scenario, ethical decision making was examined in terms of the recognition, judgment and intention stages of Rest’s model. A significant relationship was found between ethical recognition and ethical judgment and also between ethical judgment and ethical intention, but ethical recognition did not significantly predict ethical intention—thus providing support for Rest’s model. Organizational variables, age and educational level yielded few significant results. The lack of significance for codes of ethics might reflect their relative lack of development in Libya, in which case Libyan companies should pay attention to their content and how they are supported, especially in the light of the under-development of the accounting profession in Libya. Few significant results were also found for gender, but where they were found, males showed more ethical characteristics than females. This unusual result reinforces the dangers of gender stereotyping in business. Personal moral philosophy and moral intensity dimensions were generally found to be significant predictors of the three stages of ethical decision making studied. One implication of this is to give more attention to ethics in accounting education, making the connections between accounting practice and (in Libya) Islam. Overall, this study not only adds to the available empirical evidence on factors affecting ethical decision making, notably examining three stages of Rest’s model, but also offers rare insights into the ethical views of practising management accountants and provides a benchmark for future studies of ethical decision making in Muslim majority countries and other parts of the developing world
"Then you get a teacher" - Guidelines for excellence in teaching
Background: Current literature calls for the explicit teaching to health-science educators of the skills, knowledge and dispositions
that are required for successful teaching in higher education.
Aims: This paper draws on evidence from an Oral Hygiene department at a South African university in order to
illustrate these teaching-competency needs. Insights from the evidence are synthesised with current literature regarding best
teaching practice, in support of an appropriate framework for the development of teaching competencies to health-science
educators.
Description: A qualitative approach, using a case study, was adopted. The cohort comprised fifteen students in the first-year Oral
Hygiene cohort class and the ten educators who taught their programme. Data was collected through semistructured interviews
and open-ended questionnaires. The topics that emerged from the combined analysis of the interviews and the questionnaires
were organised into a grid so that common themes could be identified. Current literature regarding teaching and learning was used
as a framework for interpreting the empirical evidence, from which three categories emerged. The first category included
suggestions from students regarding what to do to teach better. A review of the literature indicates that these competencies can be
effectively learnt from self-help guides. The second category included requests for skills development. Literature review suggests
that these might effectively be learnt from single-event workshops facilitated by more able peers. Responses in the final category
highlighted the need for an underpinning theory of teaching and learning, and signalled the need for a more theoretically
grounded and detailed approach to teacher development.
Conclusion: The framework developed from the empirical study and current literature makes it possible for individual clinical
teachers, and staff developers, to construct teaching-competency development plans that are pertinent to individual teachers’
needs, relevant and practical, educationally sound, and cost-effective in terms of time and effort
The swimming kinematics of larval Atlantic cod, Gadus morhua L., are resilient to elevated seawater pCO2
Kinematics of swimming behavior of larval Atlantic cod, aged 12 and 27 days post-hatch (dph) and cultured under three pCO2 conditions (control-370, medium-1800, and high-4200 μatm) from March to May 2010, were extracted from swim path recordings obtained using silhouette video photography. The swim paths were analyzed for swim duration, distance and speed, stop duration, and horizontal and vertical turn angles to determine whether elevated seawater pCO2—at beyond near-future ocean acidification levels—affects the swimming kinematics of Atlantic cod larvae. There were no significant differences in most of the variables tested: the swimming kinematics of Atlantic cod larvae at 12 and 27 dph were highly resilient to extremely elevated pCO2 levels. Nonetheless, cod larvae cultured at the highest pCO2 concentration displayed vertical turn angles that were more restricted (median turn angle, 15°) than larvae in the control (19°) and medium (19°) treatments at 12 dph (but not at 27 dph). Significant reduction in the stop duration of cod larvae from the high treatment (median stop duration, 0.28 s) was also observed compared to the larvae from the control group (0.32 s) at 27 dph (but not at 12 dph). The functional and ecological significance of these subtle differences are unclear and, therefore, require further investigation in order to determine whether they are ecologically relevant or spurious
- …
