18 research outputs found
Reinventing BEDs: Formal Treatment of Broadcast Encryption with Dealership and Practical Constructions
Broadcast Encryption allows a sender to send a message to more than one receiver. In a typical broadcast encryption, the broadcaster decides the privileged set as in who all can decrypt a particular ciphertext. Gritti et al. (IJIS\u2716) introduced a new primitive called Broadcast Encryption with Dealership (BED), where the dealer/wholesaler decides the privileged set. This rather recently introduced primitive allows a wholesaler to buy content from the broadcaster and sell it to users. Following their construction, to date, three more constructions of broadcast encryption with dealership have been proposed. Among them, the first showed the BED construction of Gritti et al. (IJIS\u2716) to be insecure.
All the state-of-the-arts works were unable to fully identify the requirements of a BED scheme. We first identify and propose a new security requirement that has not been considered before. After formally defining a BED scheme, we show simple pairing-based attacks on all previous constructions rendering all of them useless. We then give the first secure BED construction in the composite-order pairing groups. This construction achieves constant-size ciphertext and secret keys but achieves selectively secure message hiding only. We then give our second construction from Li and Gong\u27s (PKC\u2718) anonymous broadcast encryption. This construction achieves adaptively secure message hiding but has ciphertext size dependent on the size of the privileged set. Following that, we propose our third and final construction that achieves constant size ciphertext in the standard model and achieves adaptive message hiding security
Propertization Metaphors for Bargaining Power and Control of the Self in the Information Age
This Article argues that the threatening consequences of this commodification and propertization of consumers\u27 electronic selves represent only part of the picture. Information era technological developments provide more tools than ever available before by which consumers can place boundaries around their right to consent and exclude others from that arena. Thus, Internet-based contracting allows consumers to access a broad range of bargaining power inputs to protect their power to withhold consent. Instead of an amorphous, indefinable quality of contracting parties, bargaining power may now be characterized as a series of discrete inputs that can be identified, evaluated, exchanged and owned. In essence, bargaining power may be treated as property or a commodity that in turn serves as a protection against unwanted manifestations of the self through coerced or unwitting exercises of consent
22nd Annual Conference on Legal Issues for Financial Institutions
Materials from the 22nd Annual Conference on Legal Issues for Financial Institutions held by UK/CLE in April of 2002
Essentials of forensic accounting
https://egrove.olemiss.edu/aicpa_guides/2728/thumbnail.jp
Recommended from our members
Communications Law and Policy: Cases and Materials (Edition 8.0)
This is the most current edition of this book.
Disclaimer: This book is intended to be used for academic and reference purposes only. The publisher and authors are not rendering legal or professional advice and this book is not a substitute for such advice. Any opinions expressed in this book are the authors’ alone and should not be imputed to their employers or affiliated organizations.
This text has gone through eight editions across nearly a quarter century. The first edition appeared in 2001, published by Aspen Law & Business. The next three editions were published by Foundation Press, up to 2012. In 2016, Jerry Kang added Alan Butler as a co-author, and we decided to self-publish the fifth edition. Even back then the costs of legal casebooks had gotten out-of-hand, and legal publishers were doing little more than binding pages into a physical item. So, we decided to cut out the intermediary and provide substantial cost savings for students. In 2023, Blake Reid joined the author team, and we took the further step of releasing edition 7.5 of the book as a free PDF under a Creative Commons license. We’ve now reached the substantially revised eighth edition.
Throughout all editions, the book has retained one fundamental pedagogical principle: Organize learning first by concepts, then by industry. Our goal has been to prioritize a deeper conceptual understanding over industry-specific details because industries, and the technologies that make them possible, are always in flux. The current list of concepts is: (1) power, (2) entry, (3) pricing, (4) indecent content, (5) access, (6) classification, (7) internet platforms, and (8) privacy. The book devotes a chapter to each concept, with the first four chapters exploring a particular concept across multiple industries ranging from legacy telephony, broadcast, and cable TV to modern day internet. Chapters 5 and 6 jointly tackle the concepts of access and classification, with Chapter 5 focusing particularly on access issues in legacy industries and Chapter 6 examining how the legal classification of internet service providers has shaped access policy in the context of net neutrality. Chapter 7 shifts upward in the internet’s layer stack, to explore the responsibility of internet platforms for the content that they host. The final chapter surveys communications privacy topics that are appropriate for both communications law courses and privacy law courses. Although law and technology have evolved over the past quarter century, the book’s pedagogical commitments have remained the same, even as we have updated, simplified, and pruned.
One word of caution to faculty and students alike: the Supreme Court’s titanic decisions in Loper Bright and NetChoice on the last opinion day of the 2023–2024 term (just weeks before the release of this edition) are likely to have enormous, difficult-to-predict impacts on the future of American communications law. We have done our level best in this edition’s updates to set the table for vibrant conversations in your classrooms about the shifting administrative and constitutional law foundations of this field. But caveat emptor: things may evolve significantly and unpredictably over the next year. We encourage an especially high degree of situational awareness.</p
Recommended from our members
Communications Law and Policy: Cases and Materials (Edition 7.5)
This book is intended to be used for academic and reference purposes only. The publisher and authors are not rendering legal or professional advice and this book is not a substitute for such advice. Any opinions expressed in this book are the authors’ alone and should not be imputed to their employers or affiliated organizations.</p
2022 Year in Review
Meeting proceedings of a seminar by the same name, held December 14-15, 2022
Accountant\u27s business manual, 2007, volume 2 (Supplement 40)
https://egrove.olemiss.edu/aicpa_guides/2818/thumbnail.jp