18 research outputs found

    Reinventing BEDs: Formal Treatment of Broadcast Encryption with Dealership and Practical Constructions

    Get PDF
    Broadcast Encryption allows a sender to send a message to more than one receiver. In a typical broadcast encryption, the broadcaster decides the privileged set as in who all can decrypt a particular ciphertext. Gritti et al. (IJIS\u2716) introduced a new primitive called Broadcast Encryption with Dealership (BED), where the dealer/wholesaler decides the privileged set. This rather recently introduced primitive allows a wholesaler to buy content from the broadcaster and sell it to users. Following their construction, to date, three more constructions of broadcast encryption with dealership have been proposed. Among them, the first showed the BED construction of Gritti et al. (IJIS\u2716) to be insecure. All the state-of-the-arts works were unable to fully identify the requirements of a BED scheme. We first identify and propose a new security requirement that has not been considered before. After formally defining a BED scheme, we show simple pairing-based attacks on all previous constructions rendering all of them useless. We then give the first secure BED construction in the composite-order pairing groups. This construction achieves constant-size ciphertext and secret keys but achieves selectively secure message hiding only. We then give our second construction from Li and Gong\u27s (PKC\u2718) anonymous broadcast encryption. This construction achieves adaptively secure message hiding but has ciphertext size dependent on the size of the privileged set. Following that, we propose our third and final construction that achieves constant size ciphertext in the standard model and achieves adaptive message hiding security

    Propertization Metaphors for Bargaining Power and Control of the Self in the Information Age

    Get PDF
    This Article argues that the threatening consequences of this commodification and propertization of consumers\u27 electronic selves represent only part of the picture. Information era technological developments provide more tools than ever available before by which consumers can place boundaries around their right to consent and exclude others from that arena. Thus, Internet-based contracting allows consumers to access a broad range of bargaining power inputs to protect their power to withhold consent. Instead of an amorphous, indefinable quality of contracting parties, bargaining power may now be characterized as a series of discrete inputs that can be identified, evaluated, exchanged and owned. In essence, bargaining power may be treated as property or a commodity that in turn serves as a protection against unwanted manifestations of the self through coerced or unwitting exercises of consent

    Propertization Metaphors for Bargaining Power and Control of the Self in the Information Age

    Get PDF

    22nd Annual Conference on Legal Issues for Financial Institutions

    Get PDF
    Materials from the 22nd Annual Conference on Legal Issues for Financial Institutions held by UK/CLE in April of 2002

    Essentials of forensic accounting

    Get PDF
    https://egrove.olemiss.edu/aicpa_guides/2728/thumbnail.jp

    2022 Year in Review

    Get PDF
    Meeting proceedings of a seminar by the same name, held December 14-15, 2022
    corecore