59,101 research outputs found
Multimedia Multicast Transport Service for
Reliability carries different meanings for different applications. For example, in a replicated database setting, reliability means that messages are never lost, and that messages arrive in the same order at all sites. In order to guarantee this reliability property, it is acceptable to sacrifice real-time message delivery: some messages may be greatly delayed, and at certain periods message transmission may even be blocked. While this is perfectly acceptable behavior for a reliable database application, this behavior is intolerable for a reliable video server. For a continuous MPEG video player [20, 19], reliability means real-time message delivery, at a certain bandwidth; It is acceptable for some messages to be lost, as long as the available bandwidth complies with certain predetermined stochastic assumptions. Introducing database style reliability (i.e. message recovery and order constraints) may violate these assumptions, rendering the MPEG decoding algorithm incorrect. Many CSCW groupware and multimedia applications require quality of service multicast for most of their messages, and may greatly benefit from reliable multicast for a small portion of “critical ” messages. Furthermore, such applications often need to be fault-tolerant, and need to support smooth reconfiguration when parties join or leave
Making Code Voting Secure against Insider Threats using Unconditionally Secure MIX Schemes and Human PSMT Protocols
Code voting was introduced by Chaum as a solution for using a possibly
infected-by-malware device to cast a vote in an electronic voting application.
Chaum's work on code voting assumed voting codes are physically delivered to
voters using the mail system, implicitly requiring to trust the mail system.
This is not necessarily a valid assumption to make - especially if the mail
system cannot be trusted. When conspiring with the recipient of the cast
ballots, privacy is broken.
It is clear to the public that when it comes to privacy, computers and
"secure" communication over the Internet cannot fully be trusted. This
emphasizes the importance of using: (1) Unconditional security for secure
network communication. (2) Reduce reliance on untrusted computers.
In this paper we explore how to remove the mail system trust assumption in
code voting. We use PSMT protocols (SCN 2012) where with the help of visual
aids, humans can carry out addition correctly with a 99\% degree of
accuracy. We introduce an unconditionally secure MIX based on the combinatorics
of set systems.
Given that end users of our proposed voting scheme construction are humans we
\emph{cannot use} classical Secure Multi Party Computation protocols.
Our solutions are for both single and multi-seat elections achieving:
\begin{enumerate}[i)]
\item An anonymous and perfectly secure communication network secure against
a -bounded passive adversary used to deliver voting,
\item The end step of the protocol can be handled by a human to evade the
threat of malware. \end{enumerate} We do not focus on active adversaries
Renormalization group theory for percolation in time-varying networks
Motivated by multi-hop communication in unreliable wireless networks, we
present a percolation theory for time-varying networks. We develop a
renormalization group theory for a prototypical network on a regular grid,
where individual links switch stochastically between active and inactive
states. The question whether a given source node can communicate with a
destination node along paths of active links is equivalent to a percolation
problem. Our theory maps the temporal existence of multi-hop paths on an
effective two-state Markov process. We show analytically how this Markov
process converges towards a memory-less Bernoulli process as the hop distance
between source and destination node increases. Our work extends classical
percolation theory to the dynamic case and elucidates temporal correlations of
message losses. Quantification of temporal correlations has implications for
the design of wireless communication and control protocols, e.g. in
cyber-physical systems such as self-organized swarms of drones or smart traffic
networks.Comment: 8 pages, 3 figure
- …