12,748 research outputs found

    The Impact of Distributional Preferences on (Experimental) Markets for Expert Services

    Get PDF
    Credence goods markets suffer from inefficiencies arising from informational asymmetries between expert sellers and customers. While standard theory predicts that inefficiencies disappear if customers can verify the quality received, verifiability fails to yield efficiency in experiments with endogenous prices. We identify heterogeneous distributional preferences as the main cause and design a parsimonious experiment with exogenous prices that allows classifying experts as either selfish, efficiency loving, inequality averse, inequality loving or competitive. Results show that most subjects exhibit non-standard distributional preferences, among which efficiency-loving and inequality aversion are most frequent. We discuss implications for institutional design and agent selection in credence goods markets.distributional preferences, credence goods, verifiability, experiment

    Costly Evidence Production and the Limits of Verifiability

    Get PDF
    This paper explores the limits of "verifiability" induced by the process of costly evidence production in contractual relationships of complete information. I study how the cost of providing evidence (disclosing documents) influences the set of enforceable contracts. I show that evidence cost can be both beneficial and detrimental with regard to enlarging the set of settlement outcomes that can be implemented. Further, I study how what can be considered verifiable is influenced by parties’ incentives to produce evidence and by the particular evidence cost structure. My analysis includes the opportunity for contracting parties to renegotiate (or settle) prior to the enforcement phase. I also study how the availability of redundant documents expands the set of enforceable contracts, and discuss the relevance of my findings to the design of legal institutions.contracts, verifiability

    Dynamic Provable Data Possession Protocols with Public Verifiability and Data Privacy

    Full text link
    Cloud storage services have become accessible and used by everyone. Nevertheless, stored data are dependable on the behavior of the cloud servers, and losses and damages often occur. One solution is to regularly audit the cloud servers in order to check the integrity of the stored data. The Dynamic Provable Data Possession scheme with Public Verifiability and Data Privacy presented in ACISP'15 is a straightforward design of such solution. However, this scheme is threatened by several attacks. In this paper, we carefully recall the definition of this scheme as well as explain how its security is dramatically menaced. Moreover, we proposed two new constructions for Dynamic Provable Data Possession scheme with Public Verifiability and Data Privacy based on the scheme presented in ACISP'15, one using Index Hash Tables and one based on Merkle Hash Trees. We show that the two schemes are secure and privacy-preserving in the random oracle model.Comment: ISPEC 201

    What proof do we prefer? Variants of verifiability in voting

    Get PDF
    In this paper, we discuss one particular feature of Internet voting, verifiability, against the background of scientific literature and experiments in the Netherlands. In order to conceptually clarify what verifiability is about, we distinguish classical verifiability from constructive veriability in both individual and universal verification. In classical individual verifiability, a proof that a vote has been counted can be given without revealing the vote. In constructive individual verifiability, a proof is only accepted if the witness (i.e. the vote) can be reconstructed. Analogous concepts are de- fined for universal veriability of the tally. The RIES system used in the Netherlands establishes constructive individual verifiability and constructive universal verifiability, whereas many advanced cryptographic systems described in the scientific literature establish classical individual verifiability and classical universal verifiability. If systems with a particular kind of verifiability continue to be used successfully in practice, this may influence the way in which people are involved in elections, and their image of democracy. Thus, the choice for a particular kind of verifiability in an experiment may have political consequences. We recommend making a well-informed democratic choice for the way in which both individual and universal verifiability should be realised in Internet voting, in order to avoid these unconscious political side-effects of the technology used. The safest choice in this respect, which maintains most properties of current elections, is classical individual verifiability combined with constructive universal verifiability. We would like to encourage discussion about the feasibility of this direction in scientific research

    Secure and Verifiable Electronic Voting in Practice: the use of vVote in the Victorian State Election

    Full text link
    The November 2014 Australian State of Victoria election was the first statutory political election worldwide at State level which deployed an end-to-end verifiable electronic voting system in polling places. This was the first time blind voters have been able to cast a fully secret ballot in a verifiable way, and the first time a verifiable voting system has been used to collect remote votes in a political election. The code is open source, and the output from the election is verifiable. The system took 1121 votes from these particular groups, an increase on 2010 and with fewer polling places
    corecore