8,861 research outputs found

    IMS signalling for multiparty services based on network level multicast

    Get PDF
    3rd EURO-NGI Conference on Next Generation Internet Networks. Norwegian University of Science and Technology, Trondheim, Norway, 21-23 may 2007.The standardization process of the UMTS technology has led to the development of the IP Multimedia Subsystem (IMS). IMS provides a framework that supports the negotiation of the next generation multimedia services with QoS requirements that are envisioned for 3G networks. But even though many of these services involve the participation of multiple users in a multiparty arrangement, the delivery technology at network level is still unicast based. This approach is not optimum, in terms of transmission efficiency. In this paper, a new approach is presented proposing to use a network level multicast delivery technology for the multiparty services that are signalled through IMS. The main advantages and drawbacks related with this new approach are analyzed in the article. Finally, as a starting point in the development of the presented solution, a new SIP signalling dialogue is proposed allowing the negotiation of a generic multiparty service, and supporting at the same time the configuration of the corresponding network level multicast delivery service with QoS requirements that will be used in the user plane.Publicad

    ARPA Whitepaper

    Get PDF
    We propose a secure computation solution for blockchain networks. The correctness of computation is verifiable even under malicious majority condition using information-theoretic Message Authentication Code (MAC), and the privacy is preserved using Secret-Sharing. With state-of-the-art multiparty computation protocol and a layer2 solution, our privacy-preserving computation guarantees data security on blockchain, cryptographically, while reducing the heavy-lifting computation job to a few nodes. This breakthrough has several implications on the future of decentralized networks. First, secure computation can be used to support Private Smart Contracts, where consensus is reached without exposing the information in the public contract. Second, it enables data to be shared and used in trustless network, without disclosing the raw data during data-at-use, where data ownership and data usage is safely separated. Last but not least, computation and verification processes are separated, which can be perceived as computational sharding, this effectively makes the transaction processing speed linear to the number of participating nodes. Our objective is to deploy our secure computation network as an layer2 solution to any blockchain system. Smart Contracts\cite{smartcontract} will be used as bridge to link the blockchain and computation networks. Additionally, they will be used as verifier to ensure that outsourced computation is completed correctly. In order to achieve this, we first develop a general MPC network with advanced features, such as: 1) Secure Computation, 2) Off-chain Computation, 3) Verifiable Computation, and 4)Support dApps' needs like privacy-preserving data exchange

    Multiparty talk in the novel: the distribution of tea and talk in a scene from Evelyn Waugh's Black Mischief

    Get PDF
    This article argues that studies of fictional dialogue have hitherto neglected the specific dynamics of multiparty talk. I will contend that this neglect contributes to the perpetuation of an "ideal" of conversation that allows no space for either the frustrations and inequalities of such encounters or the unique pleasures they may bring to the reader. I urge the importance of distinguishing between group talk, in which there is some element of cohesion and shared goals, and multiparty talk, in which the representation foregrounds fragmentation and explores the often subtle power games played by the participants. Focusing on a scene from Evelyn Waugh's Black Mischief (1986 [1932]), I argue that Waugh is sensitive to the dynamics of multiparty talk while orchestrating the representation for comic effect. I propose that analyzing such scenes of multiparty talk must make us reassess not only how we theorize fictional dialogue, but how far our models of everyday speech serve to privilege and universalize certain conversational practices and mechanisms based almost exclusively on the duologue

    Experimental demonstration of four-party quantum secret sharing

    Get PDF
    Secret sharing is a multiparty cryptographic task in which some secret information is splitted into several pieces which are distributed among the participants such that only an authorized set of participants can reconstruct the original secret. Similar to quantum key distribution, in quantum secret sharing, the secrecy of the shared information relies not on computational assumptions, but on laws of quantum physics. Here, we present an experimental demonstration of four-party quantum secret sharing via the resource of four-photon entanglement

    Democracy and Education Spending: Has Africas Move to Multiparty Elections Made a Difference to Policy?

    Get PDF
    While it is generally recognized that electoral competition can have a major influence on public spending decisions, there has been little effort to consider whether the move to multiparty elections in African countries in recent years has led to a redistribution of public expenditures between social groups. In this paper I develop a hypothesis, illustrated with a simple game-theoretic model, which suggests that the need to obtain an electoral majority may have prompted African governments to devote greater resources to primary schools. I test this proposition using panel data on electoral competition and education spending in thirty-five African countries over the period 1981-1996. The results show that democratization has indeed been associated with greater spending on primary schools, and these findings are robust to controls for unobserved country effects. They are also supported by evidence from recent country cases. Though the reemergence of multiparty democracy in Africa has not led to a wholesale transformation of economic policies, these findings nonetheless suggest that it may be having a significant impact in individual policy areas.Primary education, political economy, democracy, electoral competition.

    Combining behavioural types with security analysis

    Get PDF
    Today's software systems are highly distributed and interconnected, and they increasingly rely on communication to achieve their goals; due to their societal importance, security and trustworthiness are crucial aspects for the correctness of these systems. Behavioural types, which extend data types by describing also the structured behaviour of programs, are a widely studied approach to the enforcement of correctness properties in communicating systems. This paper offers a unified overview of proposals based on behavioural types which are aimed at the analysis of security properties

    The Crypto-democracy and the Trustworthy

    Full text link
    In the current architecture of the Internet, there is a strong asymmetry in terms of power between the entities that gather and process personal data (e.g., major Internet companies, telecom operators, cloud providers, ...) and the individuals from which this personal data is issued. In particular, individuals have no choice but to blindly trust that these entities will respect their privacy and protect their personal data. In this position paper, we address this issue by proposing an utopian crypto-democracy model based on existing scientific achievements from the field of cryptography. More precisely, our main objective is to show that cryptographic primitives, including in particular secure multiparty computation, offer a practical solution to protect privacy while minimizing the trust assumptions. In the crypto-democracy envisioned, individuals do not have to trust a single physical entity with their personal data but rather their data is distributed among several institutions. Together these institutions form a virtual entity called the Trustworthy that is responsible for the storage of this data but which can also compute on it (provided first that all the institutions agree on this). Finally, we also propose a realistic proof-of-concept of the Trustworthy, in which the roles of institutions are played by universities. This proof-of-concept would have an important impact in demonstrating the possibilities offered by the crypto-democracy paradigm.Comment: DPM 201
    corecore