39 research outputs found

    Identity-Based Encryption for Fair Anonymity Applications: Defining, Implementing, and Applying Rerandomizable RCCA-secure IBE

    Get PDF
    Our context is anonymous encryption schemes hiding their receiver, but in a setting which allows authorities to reveal the receiver when needed. While anonymous Identity-Based Encryption (IBE) is a natural candidate for such fair anonymity (it gives trusted authority access by design), the de facto security standard (a.k.a. IND-ID-CCA) is incompatible with the ciphertext rerandomizability which is crucial to anonymous communication. Thus, we seek to extend IND-ID-CCA security for IBE to a notion that can be meaningfully relaxed for rerandomizability while it still protects against active adversaries. To the end, inspired by the notion of replayable adaptive chosen-ciphertext attack (RCCA) security (Canetti et al., Crypto\u2703), we formalize a new security notion called Anonymous Identity-Based RCCA (ANON-ID-RCCA) security for rerandomizable IBE and propose the first construction with rigorous security analysis. The core of our scheme is a novel extension of the double-strand paradigm, which was originally proposed by Golle et al. (CT-RSA\u2704) and later extended by Prabhakaran and Rosulek (Crypto\u2707), to the well-known Gentry-IBE (Eurocrypt\u2706). Notably, our scheme is the first IBE that simultaneously satisfies adaptive security, rerandomizability, and recipient-anonymity to date. As the application of our new notion, we design a new universal mixnet in the identity-based setting that does not require public key distribution (with fair anonymity). More generally, our new notion is also applicable to most existing rerandomizable RCCA-secure applications to eliminate the need for public key distribution infrastructure while allowing fairness

    Onions based on universal re-encryption – anonymous communication immune against repetitive attack

    No full text
    Abstract. Encapsulating messages in onions is one of the major techniques providing anonymous communication in computer networks. To some extent, it provides security against traffic analysis by a passive adversary. However, it can be highly vulnerable to attacks by an active adversary. For instance, the adversary may perform a simple so–called repetitive attack: a malicious server sends the same massage twice, then the adversary traces places where the same message appears twice – revealing the route of the original message. A repetitive attack was examined for mix–networks. However, none of the countermeasures designed is suitable for onion–routing. In this paper we propose an “onion-like ” encoding design based on universal reencryption. The onions constructed in this way can be used in a protocol that achieves the same goals as the classical onions, however, at the same time we achieve immunity against a repetitive attack. Even if an adversary disturbs communication and prevents processing a message somewhere on the onion path, it is easy to identify the malicious server performing the attack and provide an evidence of its illegal behavior

    Social work with airports passengers

    Get PDF
    Social work at the airport is in to offer to passengers social services. The main methodological position is that people are under stress, which characterized by a particular set of characteristics in appearance and behavior. In such circumstances passenger attracts in his actions some attention. Only person whom he trusts can help him with the documents or psychologically

    Post Memes

    Get PDF
    Art-form, send-up, farce, ironic disarticulation, pastiche, propaganda, trololololol, mode of critique, mode of production, means of politicisation, even of subjectivation -- memes are the inner currency of the internet’s circulatory system. Independent of any one set value, memes are famously the mode of conveyance for the alt-right, the irony left, and the apoliticos alike,  and they are impervious to many economic valuations: the attempts made in co-opting their discourse in advertising and big business have made little headway, and have usually been derailed by retaliative meming. Post-Memes: Seizing the Memes of Production takes advantage of the meme’s subversive adaptability and ripeness for a focused, in-depth study. Pulling together the interrogative forces of a raft of thinkers at the forefront of tech theory and media dissection, this collection of essays paves a way to articulating the semiotic fabric of the early 21st century’s most prevalent means of content posting, and aims at the very seizing of the memes of production for the imagining and creation of new political horizons.With contributions from Scott and McKenzie Wark, Patricia Reed, Jay Owens, Thomas Hobson and Kaajal Modi, Dominic Pettman, Bogna M. Konior, and Eric Wilson, among others, this essay volume offers the freshest approaches available in the field of memes studies and inaugurates a new kind of writing about the newest manifestations of the written online. The book aims to become the go-to resource for all students and scholars of memes, and will be of the utmost interest to anyone interested in the internet’s most viral phenomenon

    Research into the design of distributed directory services

    Get PDF
    Distributed, computer based communication is becoming established within many working environments. Furthermore, the near future is likely to see an increase in the scale, complexity and usage of telecommunications services and distributed applications. As a result, there is a critical need for a global Directory service to store and manage communication information and therefore support the emerging world-wide telecommunications environment. This thesis describes research into the design of distributed Directory services. It addresses a number of Directory issues ranging from the abstract structure of information to the concrete implementation of a prototype system. In particular, it examines a number of management related issues concerning the management of communication information and the management of the Directory service itself. The following work develops models describing different aspects of Directory services. These include data access control and data integrity control models concerning the abstract structure and management of information as well as knowledge management, distributed operation and replication models concerning the realisation of the Directory as a distributed system. In order to clarify the relationships between these models, a layered directory architecture is proposed. This architecture provides a framework for the discussion of directory issues and defines the overall structure of this thesis. This thesis also describes the implementation of a prototype Directory service, supported by software tools typical of those currently available within many environments. It should be noted that, although this thesis emphasises the design of abstract directory models, development of the prototype consumed a large amount of time and effort and prototyping activities accounted for a substantial portion of this research. Finally, this thesis reaches a number of conclusions which are applied to the emerging ISO/CCITT X. 500 standard for Directory services, resulting in possible input for the 1988-92 study period
    corecore