12 research outputs found
Threshold cryptography with Chinese remainder theorem
Ankara : The Department of Computer Engineering and the Institute of Engineering and Science of Bilkent University, 2009.Thesis (Master's) -- Bilkent University, 2009.Includes bibliographical references leaves 84-91.Information security has become much more important since electronic communication
is started to be used in our daily life. The content of the term information
security varies according to the type and the requirements of the area. However,
no matter which algorithms are used, security depends on the secrecy of a key
which is supposed to be only known by the agents in the first place.
The requirement of the key being secret brings several problems. Storing
a secret key on only one person, server or database reduces the security of the
system to the security and credibility of that agent. Besides, not having a backup
of the key introduces the problem of losing the key if a software/hardware failure
occurs. On the other hand, if the key is held by more than one agent an adversary
with a desire for the key has more flexibility of choosing the target. Hence the
security is reduced to the security of the least secure or least credible of these
agents.
Secret sharing schemes are introduced to solve the problems above. The main
idea of these schemes is to share the secret among the agents such that only
predefined coalitions can come together and reveal the secret, while no other
coalition can obtain any information about the secret. Thus, the keys used in the
areas requiring vital secrecy like large-scale finance applications and commandcontrol
mechanisms of nuclear systems, can be stored by using secret sharing
schemes.
Threshold cryptography deals with a particular type of secret sharing schemes.
In threshold cryptography related secret sharing schemes, if the size of a coalition
exceeds a bound t, it can reveal the key. And, smaller coalitions can reveal no information
about the key. Actually, the first secret sharing scheme in the literature
is the threshold scheme of Shamir where he considered the secret as the constant
of a polynomial of degree t − 1, and distributed the points on the polynomial to
the group of users. Thus, a coalition of size t can recover the polynomial and
reveal the key but a smaller coalition can not. This scheme is widely accepted by
the researchers and used in several applications. Shamir’s secret sharing scheme
is not the only one in the literature. For example, almost concurrently, Blakley
proposed another secret sharing scheme depending on planar geometry and
Asmuth and Bloom proposed a scheme depending on the Chinese Remainder
Theorem. Although these schemes satisfy the necessary and sufficient conditions
for the security, they have not been considered for the applications requiring a
secret sharing scheme.
Secret sharing schemes constituted a building block in several other applications
other than the ones mentioned above. These applications simply contain a
standard problem in the literature, the function sharing problem. In a function
sharing scheme, each user has its own secret as an input to a function and the
scheme computes the outcome of the function without revealing the secrets. In
the literature, encryption or signature functions of the public key algorithms like
RSA, ElGamal and Paillier can be given as an example to the functions shared by
using a secret sharing scheme. Even new generation applications like electronic
voting require a function sharing scheme.
As mentioned before, Shamir’s secret sharing scheme has attracted much of the
attention in the literature and other schemes are not considered much. However,
as this thesis shows, secret sharing schemes depending on the Chinese Remainder
Theorem can be practically used in these applications. Since each application has
different needs, Shamir’s secret sharing scheme is used in applications with several
extensions. Basically, this thesis investigates how to adapt Chinese Remainder
Theorem based secret sharing schemes to the applications in the literature. We
first propose some modifications on the Asmuth-Bloom secret sharing scheme and
then by using this modified scheme we designed provably secure function sharing
schemes and security extensions.Kaya, KamerM.S
Lattice-based threshold-changeability for standard CRT secret-sharing schemes
We consider the problem of increasing the threshold parameter of a secret-sharing scheme after the setup (share distribution) phase, without further communication between the dealer and the shareholders. Previous solutions to this problem require one to start off with a non-standard scheme designed specifically for this purpose, or to have secure channels between shareholders. In contrast, we show how to increase the threshold parameter of the standard CRT secret-sharing scheme without secure channels between the shareholders. Our method can thus be applied to existing CRT schemes even if they were set up without consideration to future threshold increases. Our method is a positive cryptographic application for lattice reduction algorithms, and we also use techniques from lattice theory (geometry of numbers) to prove statements about the correctness and information-theoretic security of our constructions
Factors Influencing Customer Satisfaction towards E-shopping in Malaysia
Online shopping or e-shopping has changed the world of business and quite a few people have
decided to work with these features. What their primary concerns precisely and the responses from
the globalisation are the competency of incorporation while doing their businesses. E-shopping has
also increased substantially in Malaysia in recent years. The rapid increase in the e-commerce
industry in Malaysia has created the demand to emphasize on how to increase customer satisfaction
while operating in the e-retailing environment. It is very important that customers are satisfied with
the website, or else, they would not return. Therefore, a crucial fact to look into is that companies
must ensure that their customers are satisfied with their purchases that are really essential from the ecommerce’s
point of view. With is in mind, this study aimed at investigating customer satisfaction
towards e-shopping in Malaysia. A total of 400 questionnaires were distributed among students
randomly selected from various public and private universities located within Klang valley area.
Total 369 questionnaires were returned, out of which 341 questionnaires were found usable for
further analysis. Finally, SEM was employed to test the hypotheses. This study found that customer
satisfaction towards e-shopping in Malaysia is to a great extent influenced by ease of use, trust,
design of the website, online security and e-service quality. Finally, recommendations and future
study direction is provided.
Keywords: E-shopping, Customer satisfaction, Trust, Online security, E-service quality, Malaysia
Европейский и национальный контексты в научных исследованиях
В настоящем электронном сборнике «Европейский и национальный контексты в научных исследованиях. Технология» представлены работы молодых ученых по геодезии и картографии, химической технологии и машиностроению, информационным технологиям, строительству и радиотехнике. Предназначены для работников образования, науки и производства. Будут полезны студентам, магистрантам и аспирантам университетов.=In this Electronic collected materials “National and European dimension in research. Technology” works in the fields of geodesy, chemical technology, mechanical engineering, information technology, civil engineering, and radio-engineering are presented. It is intended for trainers, researchers and professionals. It can be useful for university graduate and post-graduate students
Information technology and military performance
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Political Science, 2011.Cataloged from PDF version of thesis.Includes bibliographical references (p. 519-544).Militaries have long been eager to adopt the latest technology (IT) in a quest to improve knowledge of and control over the battlefield. At the same time, uncertainty and confusion have remained prominent in actual experience of war. IT usage sometimes improves knowledge, but it sometimes contributes to tactical blunders and misplaced hubris. As militaries invest intensively in IT, they also tend to develop larger headquarters staffs, depend more heavily on planning and intelligence, and employ a larger percentage of personnel in knowledge work rather than physical combat. Both optimists and pessimists about the so-called "revolution in military affairs" have tended to overlook the ways in which IT is profoundly and ambiguously embedded in everyday organizational life. Technocrats embrace IT to "lift the fog of war," but IT often becomes a source of breakdowns, misperception, and politicization. To describe the conditions under which IT usage improves or degrades organizational performance, this dissertation develops the notion of information friction, an aggregate measure of the intensity of organizational struggle to coordinate IT with the operational environment. It articulates hypotheses about how the structure of the external battlefield, internal bureaucratic politics, and patterns of human-computer interaction can either exacerbate or relieve friction, which thus degrades or improves performance. Technological determinism alone cannot account for the increasing complexity and variable performances of information phenomena. Information friction theory is empirically grounded in a participant-observation study of U.S. special operations in Iraq from 2007 to 2008. To test the external validity of insights gained through fieldwork in Iraq, an historical study of the 1940 Battle of Britain examines IT usage in a totally different structural, organizational, and technological context.(cont.) These paired cases show that high information friction, and thus degraded performance, can arise with sophisticated IT, while lower friction and impressive performance can occur with far less sophisticated networks. The social context, not just the quality of technology, makes all the difference. Many shorter examples from recent military history are included to illustrate concepts. This project should be of broad interest to students of organizational knowledge, IT, and military effectiveness.by Jon Randall Lindsay.Ph.D
Investigating and Writing Achitectural History: Subjects, Methodologies and Frontiers.
The volume contains the abstracts and full texts of the 157 papers and position statements presented and discussed at the III EAHN (European Architectural History) International Meeting, Torino 19-21 June 201