39 research outputs found
Identity-Based Encryption for Fair Anonymity Applications: Defining, Implementing, and Applying Rerandomizable RCCA-secure IBE
Our context is anonymous encryption schemes hiding their receiver, but in a setting which allows authorities to reveal the receiver when needed. While anonymous Identity-Based Encryption (IBE) is a natural candidate for such fair anonymity (it gives trusted authority access by design), the de facto security standard (a.k.a. IND-ID-CCA) is incompatible with the ciphertext rerandomizability which is crucial to anonymous communication. Thus, we seek to extend IND-ID-CCA security for IBE to a notion that can be meaningfully relaxed for rerandomizability while it still protects against active adversaries.
To the end, inspired by the notion of replayable adaptive chosen-ciphertext attack (RCCA) security (Canetti et al., Crypto\u2703), we formalize a new security notion called Anonymous Identity-Based RCCA (ANON-ID-RCCA) security for rerandomizable IBE and propose the first construction with rigorous security analysis. The core of our scheme is a novel extension of the double-strand paradigm, which was originally proposed by Golle et al. (CT-RSA\u2704) and later extended by Prabhakaran and Rosulek (Crypto\u2707), to the well-known Gentry-IBE (Eurocrypt\u2706). Notably, our scheme is the first IBE that simultaneously satisfies adaptive security, rerandomizability, and recipient-anonymity to date. As the application of our new notion, we design a new universal mixnet in the identity-based setting that does not require public key distribution (with fair anonymity). More generally, our new notion is also applicable to most existing rerandomizable RCCA-secure applications to eliminate the need for public key distribution infrastructure while allowing fairness
Recommended from our members
A critical reflection on the construction of the cyberterrorist threat in the United Kingdom of Great Britain and Northern Ireland
Cyberterrorism has not occurred. Furthermore, the definitional parameters of cyberterrorism have not been conclusively defined by either policymakers or academia. However, in 2010 the threat posed by the terrorist application of cyber weaponry to target British critical national infrastructure became a 'Tier One' threat to the UK. This thesis is the first comprehensive mapping and analysis of the official British construction of the threat of cyberterrorism between 12th May 2010 and 24th June 2016. By using interpretive discourse analysis, this thesis identifies 'strands' from a comprehensive corpus of policy documents, statements and speeches from Ministers, MPs and Peers. This thesis examines how the threat of cyberterrorism was constructed in the UK, and what this securitisation has made possible. In addition, this thesis makes novel contributions to the Copenhagen School's 'securitisation theory' framework. Accordingly: this thesis outlines the framework for a 'tiered', rather than monolithic audience; refines the 'temporal' and 'spatial' conditioning of securitisation with reference to the unique characteristics of cyberterrorism; and lastly, details the way in which popular fiction can be ascribed agency in securitising moves to 'fill in' a lack of case studies threat with gripping vicarious fictional narratives. It is identified that the 2010 British Coalition Government's classification of cyberterrorism as a 'Tier One' threat created central strand upon which discursive securitisation was established. Despite the absence of a 'cyberterrorist' incident across period under scrutiny, the securitisation did not recede. The threat posed by cyberterrorism was articulated partially within a 'New Terrorism' frame, and it was deemed by Ministers, MPs Lords to be a threat that was likely to escalate in both severity and possibility over time. A notable finding is the positioning of securitisation against a particular 'cyberterrorist' identity epitomised by social actors using cyberspace, rather than the tangible environments or cyberspace
Onions based on universal re-encryption – anonymous communication immune against repetitive attack
Abstract. Encapsulating messages in onions is one of the major techniques providing anonymous communication in computer networks. To some extent, it provides security against traffic analysis by a passive adversary. However, it can be highly vulnerable to attacks by an active adversary. For instance, the adversary may perform a simple so–called repetitive attack: a malicious server sends the same massage twice, then the adversary traces places where the same message appears twice – revealing the route of the original message. A repetitive attack was examined for mix–networks. However, none of the countermeasures designed is suitable for onion–routing. In this paper we propose an “onion-like ” encoding design based on universal reencryption. The onions constructed in this way can be used in a protocol that achieves the same goals as the classical onions, however, at the same time we achieve immunity against a repetitive attack. Even if an adversary disturbs communication and prevents processing a message somewhere on the onion path, it is easy to identify the malicious server performing the attack and provide an evidence of its illegal behavior
Social work with airports passengers
Social work at the airport is in to offer to passengers social services. The main
methodological position is that people are under stress, which characterized by a
particular set of characteristics in appearance and behavior. In such circumstances
passenger attracts in his actions some attention. Only person whom he trusts can help him
with the documents or psychologically
Post Memes
Art-form, send-up, farce, ironic disarticulation, pastiche, propaganda, trololololol, mode of critique, mode of production, means of politicisation, even of subjectivation -- memes are the inner currency of the internet’s circulatory system. Independent of any one set value, memes are famously the mode of conveyance for the alt-right, the irony left, and the apoliticos alike, and they are impervious to many economic valuations: the attempts made in co-opting their discourse in advertising and big business have made little headway, and have usually been derailed by retaliative meming. Post-Memes: Seizing the Memes of Production takes advantage of the meme’s subversive adaptability and ripeness for a focused, in-depth study. Pulling together the interrogative forces of a raft of thinkers at the forefront of tech theory and media dissection, this collection of essays paves a way to articulating the semiotic fabric of the early 21st century’s most prevalent means of content posting, and aims at the very seizing of the memes of production for the imagining and creation of new political horizons.With contributions from Scott and McKenzie Wark, Patricia Reed, Jay Owens, Thomas Hobson and Kaajal Modi, Dominic Pettman, Bogna M. Konior, and Eric Wilson, among others, this essay volume offers the freshest approaches available in the field of memes studies and inaugurates a new kind of writing about the newest manifestations of the written online. The book aims to become the go-to resource for all students and scholars of memes, and will be of the utmost interest to anyone interested in the internet’s most viral phenomenon
Recommended from our members
Federal Register
Daily publication of the U.S. Office of the Federal Register contains rules and regulations, proposed legislation and rule changes, and other notices, including "Presidential proclamations and Executive Orders, Federal agency documents having general applicability and legal effect, documents required to be published by act of Congress, and other Federal agency documents of public interest" (p. ii). Table of Contents starts on page iii
Research into the design of distributed directory services
Distributed, computer based communication is becoming established within many working environments. Furthermore, the near future is likely to see an increase in the scale, complexity and usage of telecommunications services and distributed applications. As a result, there is a critical need for a global Directory service to store and manage communication information and therefore support the emerging world-wide telecommunications environment.
This thesis describes research into the design of distributed Directory services. It addresses a number of Directory issues ranging from the abstract structure of information to the concrete implementation of a prototype system. In particular, it examines a number of management related issues concerning the management of communication information and the management of the Directory service itself.
The following work develops models describing different aspects of Directory services. These include data access control and data integrity control models concerning the abstract structure and management of information as well as knowledge management, distributed operation and replication models concerning the realisation of the Directory as a distributed system.
In order to clarify the relationships between these models, a layered directory architecture is proposed. This architecture provides a framework for the discussion of directory issues and defines the overall structure of this thesis.
This thesis also describes the implementation of a prototype Directory service, supported by software tools typical of those currently available within many environments. It should be noted that, although this thesis emphasises the design of abstract directory models, development of the prototype consumed a large amount of time and effort and prototyping activities accounted for a substantial portion of this research.
Finally, this thesis reaches a number of conclusions which are applied to the emerging ISO/CCITT X. 500 standard for Directory services, resulting in possible input for the 1988-92 study period