838 research outputs found
Pairing-Based Cryptographic Protocols : A Survey
The bilinear pairing such as Weil pairing or Tate pairing on elliptic and hyperelliptic curves have recently been found applications in design of cryptographic protocols. In this survey, we have tried to cover different cryptographic protocols based on bilinear pairings which possess, to the best of our knowledge, proper security proofs in the existing security models
Optimistic fair exchange
A fair exchange guarantees that a participant only reveals its items (such as signatures, payments, or data) if it receives the expected items in exchange. Efficient fair exchange requires a so-called third party, which is assumed to be correct. Optimistic fair exchange involves this third party only if needed, i.e., if the participants cheat or disagree.
In Part I, we prove lower bounds on the message and time complexity of two particular instances of fair exchange in varying models, namely contract signing (fair exchange of two signatures under a contract) and certified mail (fair exchange of data for a receipt). We show that all given bounds are tight by describing provably time- and message-optimal protocols for all considered models and instances.
In Part II, we have a closer look at formalizing the security of fair exchange. We introduce a new formal notion of security (including secrecy) for reactive distributed systems. We illustrate this new formalism by a specification of certified mail as an alternative to the traditional specification given in Part I.
In Part III, we describe protocols for generic and optimistic fair exchange of arbitrary items. These protocols are embedded into the SEMPER Fair Exchange Layer, which is a central part of the SEMPER Framework for Secure Electronic Commerce.Ein Austausch ist fair, wenn eine Partei die angebotenen Güter, wie zum Beispiel digitale Signaturen, Zahlungen oder Daten, nur abgibt, wenn sie die erwarteten Güter im Tausch erhält. Ohne eine als korrekt angenommene dritte Partei, welche eine mit einem Notar vergleichbare Rolle übernimmt, ist fairer Austausch nicht effizient möglich. Ein fairer Austausch heißt optimistisch, falls diese dritte Partei nur in Problemfällen am Protokoll teilnimmt. In Teil I werden beweisbar zeit- und nachrichtenoptimale Protokolle für die Spezialfälle \u27;elektronische Vertragsunterzeichnung" (fairer Austausch zweier Signaturen; engl. contract signing) und \u27;elektronisches Einschreiben" (fairer Austausch von Daten gegen eine Quittung; engl. certified mail) von fairem Austausch vorgestellt. Teil II beschreibt einen neuen Integritäts- und Geheimhaltungsbegriff für reaktive Systeme. Dieser basiert auf einer Vergleichsrelation \u27;so sicher wie", welche die Sicherheit zweier Systeme vergleicht. Ein verteiltes, reaktives System wird dann als sicher bezeichnet, wenn es so sicher wie ein idealisiertes System (engl. trusted host) für diesen Dienst ist. Mit diesem Formalismus geben wir eine alternative Sicherheitsdefinition von \u27;elektronischem Einschreiben" an, deren Semantik im Gegensatz zu der in Teil I beschriebenen Definition nun unabhängig vom erbrachten Dienst ist. Teil III beschreibt ein Design und optimistische Protokolle für generischen fairen Austausch von zwei beliebigen Gütern und den darauf aufbauenden SEMPER Fair Exchange Layer. Dieser ist ein wesentlicher Baustein des SEMPER Framework for Secure Electronic Commerce
Design and Analysis of Fair Content Tracing Protocols
The work in this thesis examines protocols designed to
address the issues of tracing illegal distribution of digital content in a fair manner.
In digital content distribution, a client requests
content from a distributor, and the distributor sends content to the client.
The main concern is misuse of content by the client,
such as illegal distribution.
As a result, digital watermarking schemes that enable the distributor
to trace copies of content and identify the perpetrator were proposed.
However, such schemes do not provide a mechanism for the distributor
to prove to a third party that a client illegally distributed copies of content.
Furthermore, it is possible that the distributor falsely
accuses a client as he has total control of the tracing mechanisms.
Fair content tracing (FaCT)
protocols were thus proposed to allow tracing of content that
does not discriminate either the distributor or the client.
Many FaCT protocols have been proposed, mostly without an appropriate
design framework, and so there is no obvious and systematic way to evaluate them.
Therefore, we propose a framework that provides a definition
of security and which enables classification of FaCT protocols so
that they can be analysed in a systematic manner.
We define, based on our framework, four main categories of FaCT
protocols and propose new approaches to designing them.
The first category is protocols without trusted third parties.
As the name suggests, these protocols do not rely on a
central trusted party for fair tracing of content.
It is difficult to design such a protocol without drawing on
extra measures that increase communication and computation costs.
We show this is the case by demonstrating flaws in two recent proposals.
We also illustrate a possible repair based on relaxing
the assumption of trust on the distributor.
The second category is protocols with online trusted third parties,
where a central online trusted party is deployed.
This means a trusted party must always be available during
content distribution between the distributor and the client.
While the availability of a trusted third party may simplify
the design of such protocols, efficiency may suffer due to the
need to communicate with this third party.
The third category is protocols with offline trusted third parties,
where a central offline trusted party is deployed.
The difference between the offline and the online trusted party is
that the offline trusted party need not be available during content distribution.
It only needs to be available during the initial setup and
when there is a dispute between the distributor and the client.
This reduces the communication requirements compared to using an online trusted party.
Using a symmetric-based cryptographic primitive known as
Chameleon encryption, we proposed a new approach to
designing such protocols.
The fourth category is protocols with trusted hardware.
Previous protocols proposed in this category have abstracted away from
a practical choice of the underlying trusted hardware.
We propose new protocols based on a Trusted Platform Module (TPM).
Finally, we examine the inclusion of payment in a FaCT protocol,
and how adding payment motivates the requirement for
fair exchange of buying and selling digital content
Decentralized Inverse Transparency With Blockchain
Employee data can be used to facilitate work, but their misusage may pose
risks for individuals. Inverse transparency therefore aims to track all usages
of personal data, allowing individuals to monitor them to ensure accountability
for potential misusage. This necessitates a trusted log to establish an
agreed-upon and non-repudiable timeline of events. The unique properties of
blockchain facilitate this by providing immutability and availability. For
power asymmetric environments such as the workplace, permissionless blockchain
is especially beneficial as no trusted third party is required. Yet, two issues
remain: (1) In a decentralized environment, no arbiter can facilitate and
attest to data exchanges. Simple peer-to-peer sharing of data, conversely,
lacks the required non-repudiation. (2) With data governed by privacy
legislation such as the GDPR, the core advantage of immutability becomes a
liability. After a rightful request, an individual's personal data need to be
rectified or deleted, which is impossible in an immutable blockchain.
To solve these issues, we present Kovacs, a decentralized data exchange and
usage logging system for inverse transparency built on blockchain. Its
new-usage protocol ensures non-repudiation, and therefore accountability, for
inverse transparency. Its one-time pseudonym generation algorithm guarantees
unlinkability and enables proof of ownership, which allows data subjects to
exercise their legal rights regarding their personal data. With our
implementation, we show the viability of our solution. The decentralized
communication impacts performance and scalability, but exchange duration and
storage size are still reasonable. More importantly, the provided information
security meets high requirements. We conclude that Kovacs realizes
decentralized inverse transparency through secure and GDPR-compliant use of
permissionless blockchain.Comment: Peer-reviewed version accepted for publication in ACM Distributed
Ledger Technologies: Research and Practice (DLT). arXiv admin note:
substantial text overlap with arXiv:2104.0997
Optimistic fair exchange
A fair exchange guarantees that a participant only reveals its items (such as signatures, payments, or data) if it receives the expected items in exchange. Efficient fair exchange requires a so-called third party, which is assumed to be correct. Optimistic fair exchange involves this third party only if needed, i.e., if the participants cheat or disagree.
In Part I, we prove lower bounds on the message and time complexity of two particular instances of fair exchange in varying models, namely contract signing (fair exchange of two signatures under a contract) and certified mail (fair exchange of data for a receipt). We show that all given bounds are tight by describing provably time- and message-optimal protocols for all considered models and instances.
In Part II, we have a closer look at formalizing the security of fair exchange. We introduce a new formal notion of security (including secrecy) for reactive distributed systems. We illustrate this new formalism by a specification of certified mail as an alternative to the traditional specification given in Part I.
In Part III, we describe protocols for generic and optimistic fair exchange of arbitrary items. These protocols are embedded into the SEMPER Fair Exchange Layer, which is a central part of the SEMPER Framework for Secure Electronic Commerce.Ein Austausch ist fair, wenn eine Partei die angebotenen Güter, wie zum Beispiel digitale Signaturen, Zahlungen oder Daten, nur abgibt, wenn sie die erwarteten Güter im Tausch erhält. Ohne eine als korrekt angenommene dritte Partei, welche eine mit einem Notar vergleichbare Rolle übernimmt, ist fairer Austausch nicht effizient möglich. Ein fairer Austausch heißt optimistisch, falls diese dritte Partei nur in Problemfällen am Protokoll teilnimmt. In Teil I werden beweisbar zeit- und nachrichtenoptimale Protokolle für die Spezialfälle ';elektronische Vertragsunterzeichnung" (fairer Austausch zweier Signaturen; engl. contract signing) und ';elektronisches Einschreiben" (fairer Austausch von Daten gegen eine Quittung; engl. certified mail) von fairem Austausch vorgestellt. Teil II beschreibt einen neuen Integritäts- und Geheimhaltungsbegriff für reaktive Systeme. Dieser basiert auf einer Vergleichsrelation ';so sicher wie", welche die Sicherheit zweier Systeme vergleicht. Ein verteiltes, reaktives System wird dann als sicher bezeichnet, wenn es so sicher wie ein idealisiertes System (engl. trusted host) für diesen Dienst ist. Mit diesem Formalismus geben wir eine alternative Sicherheitsdefinition von ';elektronischem Einschreiben" an, deren Semantik im Gegensatz zu der in Teil I beschriebenen Definition nun unabhängig vom erbrachten Dienst ist. Teil III beschreibt ein Design und optimistische Protokolle für generischen fairen Austausch von zwei beliebigen Gütern und den darauf aufbauenden SEMPER Fair Exchange Layer. Dieser ist ein wesentlicher Baustein des SEMPER Framework for Secure Electronic Commerce
Verifiably encrypted cascade-instantiable blank signatures to secure progressive decision management
National Research Foundation (NRF) Singapore under NC
The New Synthesis of Bank Regulation and Bankruptcy in the Dodd-Frank Era
Since the enactment of the Dodd-Frank Act in 2010, U.S. bank regulation and bankruptcy have become far more closely intertwined. In this Article, I ask whether the new synthesis of bank regulation and bankruptcy is coherent, and whether it is likely to prove effective.
I begin by exploring some of the basic differences between bank resolution, which is a highly administrative process in the U.S., and bankruptcy, which relies more on courts and the parties themselves. I then focus on a series of remarkable new innovations designed to facilitate the rapid recapitalization of systemically important financial institutions: convertible contingent capital securities (“CoCos”); single point of entry resolution under the Dodd-Frank Act; and the quick sale strategy in bankruptcy. I conclude that the early trigger CoCos advocated by Calomiris and Herring and others are the most promising strategy for CoCos, and assess the virtues and potential pitfalls of single point of entry and quick sales. I conclude by considering the general coherence of the new synthesis. The most important frictions lie in the relationship between the Dodd-Frank Act’s resolution provisions and bankruptcy. While their differing treatment of managers could create beneficial incentives to use bankruptcy rather than resolution under the Dodd-Frank rules, the absence of a stay on derivatives in Chapter 11 diminishes the effectiveness of the new synthesis.
I argue that the overall objective of the new synthesis should be to funnel large, troubled financial institutions toward bankruptcy wherever possible
Recommended from our members
Decentralised computer systems
The architecture of the Web was designed to enable decentralised exchange of information. Early architects envisioned an egalitarian yet organic society thriving in cyberspace. The reality of the Web today, unfortunately, does not bear out these visions: information networks have repeatedly shown a tendency towards consolidation and centralisation with the current Web split between a handful of large corporations.
The advent of Bitcoin and successor blockchain networks re-ignited interest in developing alternatives to the centralised Web and paving a way back to the earlier architectural visions for the Web. This has led to immense hype around these technologies with the cryptocurrency market valued at several hundred billions of dollars at the time of writing. With great hype, apparently, come great scams. I start off by analysing the use of Bitcoin as an enabler for crime and then present both technical solutions as well as policy recommendations to mitigate the harm these crimes cause.
These policy recommendations then lead us on to look more closely at cryptocurrency's tamer cousin: permissioned blockchains. These systems, while less revolutionary in their premise, nevertheless aim to provide sweeping improvements in the efficiency and transparency of existing enterprise systems. To see whether they work in practice, I present the results of my work in delivering a production permissioned blockchain system to real users. This involves comparing several permissioned blockchain systems, exploring their deficiencies and developing solutions for the most egregious of those.
Lastly, I do a deep dive into one of the most persistent technical issues with permissioned blockchains, and decentralised networks in general: the lack of scalability in their consensus mechanisms. I present two novel consensus algorithms that aim to improve upon the state of the art in several ways. The first is designed to enable existing permissioned blockchain networks to scale to thousands of nodes. The second presents an entirely new way of building decentralised consensus systems utilising a trie-based data structure at its core as opposed to the usual linear ledgers used in current systems
Short One-Time Signatures
We present a new one-time signature scheme having short signatures. Our new scheme supports aggregation, batch verification, and admits efficient proofs of knowledge. It has a fast signing algorithm, requiring only modular additions, and its verification cost is comparable to ECDSA verification. These properties make our scheme suitable for applications on resource-constrained devices such as smart cards and sensor nodes. Along the way, we give a unified description of five previous one-time signature schemes and improve parameter selection for these schemes, and as a corollary we give a fail-stop signature scheme with short signatures
“It’s like a big freaking fake circus”: An exploration of intersectionality and women’s experiences in higher education fundraising
Women in higher education fundraising navigate the broad forces of sexism and racism in society and their profession, a profession in which they are being paid less than their male counterparts and are under-represented in leadership roles, despite being the majority of fundraising professionals. This study provided a platform for women in higher education fundraising to tell their stories and to explain, in their own words, how they navigated a traditionally White patriarchal system of philanthropy, interacted with fundraising prospects and donors, and experienced the fundraising profession. The research questions included:
• What do women say are their lived experiences as higher education fundraisers?
• What are the perceptions of access to professional advancement (pay and promotion) amongst women in higher education fundraising?
• What do women see as their advantages and barriers in higher education fundraising practice?
• How do women perceive race as a mediator of the experiences of women in higher education fundraising?
Tenets of feminist research and a conceptual framework rooted in intersectionality framed the lived experiences of women in higher education fundraising. Of a qualitative design and utilizing the portraiture approach, this study explored the interplay of power and privilege as women navigate the landscape of higher education fundraising. This context included their institutions, colleagues and supervisors, and interactions with fundraising prospects and donors. Five individual portraits revealed women fundraisers that were tenacious, hardworking, and committed. They were savvy about their identities and disclosed frank observations regarding the possibilities of fundraising in higher education as well as the unique challenges they faced as women in the profession. Women fundraisers described feeling motivated by the difference they could make for their institutions and students, shared the ways in which they tailored their personal performances and strategies to engage prospective donors, and revealed the complexities of navigating fundraising organizations. Advancement organizations, the researcher concluded, were encouraging women fundraisers to fit a prototypical standard. The results of the study inform the strategies employed by institutional advancement leaders as they support women in fundraising
- …