30 research outputs found

    Cross-platform Identity-based Cryptography using WebAssembly

    Get PDF
    The explosive spread of the devices connected to the Internet has increased the need for efficient and portable cryptographic routines. Despite this fact, truly platformindependent implementations are still hard to find. In this paper, an Identitybased Cryptography library, called CryptID is introduced. The main goal of this library is to provide an efficient and opensource IBC implementation for the desktop, the mobile, and the IoT platforms. Powered by WebAssembly, which is a specification aiming to securely speed up code execution in various embedding environments, CryptID can be utilized on both the client and the server-side. The second novelty of CrpytID is the use of structured public keys, opening up a wide range of domain-specific use cases via arbitrary metadata embedded into the public key. Embedded metadata can include, for example, a geolocation value when working with geolocation-based Identitybased Cryptography, or a timestamp, enabling simple and efficient generation of singleuse keypairs. Thanks to these characteristics, we think, that CryptID could serve as a real alternative to the current Identitybased Cryptography implementations

    FairBlock: Preventing Blockchain Front-running with Minimal Overheads

    Get PDF
    While blockchain systems are quickly gaining popularity, front-running remains a major obstacle to fair exchange. Front-running is a family of strategies in which a malicious party manipulates the order of transactions such that a transaction tx_2 which is broadcasted in time t_2 executes before the transaction of victim tx_1 which is broadcasted earlier in time t_1 (t_1 < t_2). In this thesis, we show how to apply Identity-Based Encryption (IBE) to prevent front-running with minimal bandwidth overheads. In our approach, to decrypt a block of N transactions, the number of messages sent across the network only grows linearly with the size of decrypting committees, S. That is, to decrypt a set of N transactions sequenced at a specific block, a committee only needs to exchange S decryption shares (independent of N). In comparison, previous solutions are based on threshold decryption schemes, where each transaction in a block must be decrypted separately by the committee, resulting in bandwidth overhead of N*S. Along the way, we present a model for fair block processing, explore technical challenges, and build prototype implementations. We show that on a sample of 1000 messages with 1000 validators our work saves 42.53 MB of bandwidth which is 99.6% less compared with the standard threshold decryption paradigm

    The representation and mediation of national identity in the production of post-apartheid, South African cinema

    Get PDF
    Includes bibliographical references (p. 218-236).In 1994, South Africa was emancipated from apartheid, and in 1996, a new democratic Constitution was released. This charter envisioned a progressive society and placed emphasis on equality, multiculturalism, reconciliation and freedom. The state targeted the cultural industries, including cinema, to carry this new vision to the nation. The problem, however, was that the production, exhibition and distribution infrastructure inherited from apartheid was not only dominated by Hollywood, but also exclusively catered for the white sector of the nation. This monopolised, racially skewed structure continues to pose an obstacle to the dissemination of progressive identities and the sustainability of local cinema. Through an analysis of relevant film policy, industry structure and specific cinematic texts, this study aims to trace the intersection between the dynamics of national identity representation and South Africa's political and economic position as a developing nation in the global marketplace. The research presented took place over a period of three years (2007-2010) and incorporated both quantitative and qualitative methods

    Un/Dead Animal Art: Ethical Encounters Through Rogue Taxidermy Sculpture

    Get PDF
    Beginning in 2004, the Minnesota Association of Rogue Taxidermists began an art movement of taxidermied animal sculptures that challenged conventional forms of taxidermied objects massively produced and displayed on an international scale. In contrast to taxidermied ‘specimens’ found in museums, taxidermied ‘exotic’ wildlife decapitated and mounted on hunters\u27 walls, or synthetic taxidermied heads bought in department stores, rogue taxidermy artists create unconventional sculptures that are arguably antithetical to the ideologies shaped by previous generations: realism, colonialism, masculinity. As a pop-surrealist art movement chiefly practiced among women artists, rogue taxidermy artists follow an ethical mandate to never kill animals for the purposes of art and often display their sculptures in ways that are self-reflexive of speciesism and express criticisms of anthropocentrism. Through an intersectional feminist lens and alongside critical insights from (and debates within) postcolonialism, deconstruction, and affect theory, I analyze the art pieces created by Sarina Brewer, Angela Singer, Polly Morgan, Scott Bibus, and Robert Marbury. In doing so, I explore the ethical ambiguities of using postmortem animal bodies in an art movement that is informed by animal rights, and also discuss the complexity of animal-human relationships in the face of human conceptualized impressions of life and death. Brushing up against the history of public autopsies and other forms of body preservation, I look to the ways in which bodies are made ‘taxidermic’ through violence, trauma, objectification, commodification, bio-engineered artificiality, extinction, and the discriminatory practices that represented certain (animal and human) bodies as ‘unruly.’ Tackling the frames that produce ‘taxidermic’ bodies (as exposable and exploitable skins), I challenge the anthropocentrism foundational to human thought and highlight the ways that humans produce and perpetuate hollowed out crypts of meaning as it applies to animality. Essentially, this project attempts to undermine anthropocentric worldviews that construct humans as separate and unique from what is understood and described as the ‘nonhuman,’ and, also, invites readers to confront and acknowledge how vulnerability and mortality are shared among humans (animals) and other nonhuman beings

    2018 EURēCA Abstract Book

    Get PDF
    Listing of student participant abstracts

    Inductive analysis of security protocols in Isabelle/HOL with applications to electronic voting

    Get PDF
    Security protocols are predefined sequences of message exchanges. Their uses over computer networks aim to provide certain guarantees to protocol participants. The sensitive nature of many applications resting on protocols encourages the use of formal methods to provide rigorous correctness proofs. This dissertation presents extensions to the Inductive Method for protocol verification in the Isabelle/HOL interactive theorem prover. The current state of the Inductive Method and of other protocol analysis techniques are reviewed. Protocol composition modelling in the Inductive Method is introduced and put in practice by holistically verifying the composition of a certification protocol with an authentication protocol. Unlike some existing approaches, we are not constrained by independence requirements or search space limitations. A special kind of identity-based signatures, auditable ones, are specified in the Inductive Method and integrated in an analysis of a recent ISO/IEC 9798-3 protocol. A side-by-side verification features both a version of the protocol with auditable identity-based signatures and a version with plain ones. The largest part of the thesis presents extensions for the verification of electronic voting protocols. Innovative specification and verification strategies are described. The crucial property of voter privacy, being the impossibility of knowing how a specific voter voted, is modelled as an unlinkability property between pieces of information. Unlinkability is then specified in the Inductive Method using novel message operators. An electronic voting protocol by Fujioka, Okamoto and Ohta is modelled in the Inductive Method. Its classic confidentiality properties are verified, followed by voter privacy. The approach is shown to be generic enough to be re-usable on other protocols while maintaining a coherent line of reasoning. We compare our work with the widespread process equivalence model and examine respective strengths

    The Role of Water in Shaping Futures in Rural Kenya: Using a New Materialities Approach to Understand the Co-productive Correspondences Between Bodies, Culture and Water.

    Get PDF
    Using mixed methods and multiple sites, this thesis reflects on how water acts as a connective material through which socio-cultural, ritual, economic, and ecological relationships are formed and played out. By adopting a New Materialities approach the brute physicality of relationships is drawn into the foreground to illustrate the agency of materials and people as they co-produce each other together. By focusing on water’s behaviours, this thesis demonstrates that distinctions typically placed between people and other materials are problematic and consequently require reconsideration. Therefore, in rejection of a human exceptionalist focus, this thesis attempts to level the representational ‘playing field’ between bodies and water so as to bring water into discourse as multi-species ethnographies have done for other entities. My research is geographically situated in both rural Wales and an outlying location in the Eastern Coastal Province of Kenya where creeping desertification is increasingly troubling subsistence for a group of Giriama horticultural-pastoralists. It examines the socio-economic, cultural and material consequences of regular piped water flowing into a community that until 2015 relied exclusively on a climatically governed water supply, alongside a series of phenomenological experiences had with water in Wales. I establish the role water plays in co-constructing Giriama authenticity and social life whilst simultaneously producing what can be loosely called an ‘ethnography’ of water. In combination, this thesis demonstrates how the material behaviours of water reveal it to be an active agent that co-produces the materiality, and the behaviours, of being human. The Wenner Gren Foundation supported the fieldwork for this research, under the title The Role of 'New' Water in Shaping and Regulating Futures in Rural Kenya

    Innovating with Emerging IT in Highly Structured Environments - An Organising Vision Perspective on Blockchain and Digital Identity Wallets

    Get PDF
    This cumulative thesis explores the challenges and institutional mechanisms of innovating with emerging information technologies (IT) in highly structured environments. Emerging technologies are often difficult to implement because they arrive on the market in an immature state and with unclear use cases. To make sense of the emerging IT, members of the innovation community develop various interpretations. These are typically replete with wishful and unbalanced claims, resulting in a vibrant IT discourse that is characterized by a plethora of discursive frames and value-laden buzz words. When this discourse becomes coherent, it often leads to contagion and motivates organizations to engage with the emerging IT. Such engagement is challenging even for the most flexible organizations with innovation-friendly structures – and it can be downright daunting in highly structured environments. The latter organizations often face high structural and cultural barriers that encumber digital innovation with emerging IT. Adopting the macro-level cognitive institutional perspective of organizing vision theory, this thesis sets out to investigate how organizations in these environments can nevertheless make sense of emerging IT and materialize it in applications that create organizational value. My thesis examines the challenges of surfacing a pertinent business problematic from the organizing vision and of unpacking the technologies’ abilities and limitations. Moreover, it segues into pathways for navigating the aforementioned structural and cultural barriers. I develop four conjectures that provide practical guidelines for organizations in highly structured environments that are willing to engage with emerging IT. These insights build on 15 research papers, which are part of this thesis

    Winthrop University Undergraduate Scholarship & Creative Activity 2019

    Get PDF
    University College and Winthrop University proudly present Undergraduate Scholarship and Creative Activity 2019. This eighth annual University-wide compilation of undergraduate work chronicles the accomplishments of students and faculty mentors from at least 34 academic departments and programs, spanning all five colleges of the university: College of Arts and Sciences (CAS), College of Business Administration (CBA), College of Education (COE), College of Visual and Performing Arts (CVPA) and University College (UC).https://digitalcommons.winthrop.edu/undergradresearch_abstractbooks/1017/thumbnail.jp
    corecore