12,748 research outputs found
The Impact of Distributional Preferences on (Experimental) Markets for Expert Services
Credence goods markets suffer from inefficiencies arising from informational asymmetries between expert sellers and customers. While standard theory predicts that inefficiencies disappear if customers can verify the quality received, verifiability fails to yield efficiency in experiments with endogenous prices. We identify heterogeneous distributional preferences as the main cause and design a parsimonious experiment with exogenous prices that allows classifying experts as either selfish, efficiency loving, inequality averse, inequality loving or competitive. Results show that most subjects exhibit non-standard distributional preferences, among which efficiency-loving and inequality aversion are most frequent. We discuss implications for institutional design and agent selection in credence goods markets.distributional preferences, credence goods, verifiability, experiment
Costly Evidence Production and the Limits of Verifiability
This paper explores the limits of "verifiability" induced by the process of costly evidence production in contractual relationships of complete information. I study how the cost of providing evidence (disclosing documents) influences the set of enforceable contracts. I show that evidence cost can be both beneficial and detrimental with regard to enlarging the set of settlement outcomes that can be implemented. Further, I study how what can be considered verifiable is influenced by parties’ incentives to produce evidence and by the particular evidence cost structure. My analysis includes the opportunity for contracting parties to renegotiate (or settle) prior to the enforcement phase. I also study how the availability of redundant documents expands the set of enforceable contracts, and discuss the relevance of my findings to the design of legal institutions.contracts, verifiability
Dynamic Provable Data Possession Protocols with Public Verifiability and Data Privacy
Cloud storage services have become accessible and used by everyone.
Nevertheless, stored data are dependable on the behavior of the cloud servers,
and losses and damages often occur. One solution is to regularly audit the
cloud servers in order to check the integrity of the stored data. The Dynamic
Provable Data Possession scheme with Public Verifiability and Data Privacy
presented in ACISP'15 is a straightforward design of such solution. However,
this scheme is threatened by several attacks. In this paper, we carefully
recall the definition of this scheme as well as explain how its security is
dramatically menaced. Moreover, we proposed two new constructions for Dynamic
Provable Data Possession scheme with Public Verifiability and Data Privacy
based on the scheme presented in ACISP'15, one using Index Hash Tables and one
based on Merkle Hash Trees. We show that the two schemes are secure and
privacy-preserving in the random oracle model.Comment: ISPEC 201
What proof do we prefer? Variants of verifiability in voting
In this paper, we discuss one particular feature of Internet
voting, verifiability, against the background of scientific
literature and experiments in the Netherlands. In order
to conceptually clarify what verifiability is about, we distinguish
classical verifiability from constructive veriability in
both individual and universal verification. In classical individual
verifiability, a proof that a vote has been counted can
be given without revealing the vote. In constructive individual
verifiability, a proof is only accepted if the witness (i.e.
the vote) can be reconstructed. Analogous concepts are de-
fined for universal veriability of the tally. The RIES system
used in the Netherlands establishes constructive individual
verifiability and constructive universal verifiability,
whereas many advanced cryptographic systems described
in the scientific literature establish classical individual
verifiability and classical universal verifiability.
If systems with a particular kind of verifiability continue
to be used successfully in practice, this may influence the
way in which people are involved in elections, and their image
of democracy. Thus, the choice for a particular kind
of verifiability in an experiment may have political consequences.
We recommend making a well-informed democratic
choice for the way in which both individual and universal
verifiability should be realised in Internet voting, in
order to avoid these unconscious political side-effects of the
technology used. The safest choice in this respect, which
maintains most properties of current elections, is classical
individual verifiability combined with constructive universal
verifiability. We would like to encourage discussion
about the feasibility of this direction in scientific research
Secure and Verifiable Electronic Voting in Practice: the use of vVote in the Victorian State Election
The November 2014 Australian State of Victoria election was the first
statutory political election worldwide at State level which deployed an
end-to-end verifiable electronic voting system in polling places. This was the
first time blind voters have been able to cast a fully secret ballot in a
verifiable way, and the first time a verifiable voting system has been used to
collect remote votes in a political election. The code is open source, and the
output from the election is verifiable. The system took 1121 votes from these
particular groups, an increase on 2010 and with fewer polling places
- …