35,370 research outputs found

    Are the poor too poor to demand health insurance?

    Get PDF
    Community based micro insurance has aroused much interest and hope in meeting health care challenges facing the poor. In this paper we explore how institutional rigidities such as credit constraint impinge on demand for health insurance and how insurance could potentially prevent poor households from fallinginto poverty trap. In this setting, we argue that the appropriate public intervention in generating demand for insurance is not to subsidise premium but to remove these rigidities (easing credit constraint in the present context). Thus from insurance perspective as well, our analysis highlights the importance of having appropriate savings and borrowing instruments for the poor.Micro-insurance, Micro-credit, Credit Constraint, Demand for Insurance

    Can Micro Health Insurance Reduce Poverty? Evidence from Bangladesh

    Get PDF
    This paper examines the impact of micro health insurance on poverty reduction in rural areas of Bangladesh. The research is based on household level primary data collected from the operating areas of the Grameen Bank during 2006. A number of outcome measures relating to poverty status are considered; these include household income, stability of household income via food sufficiency and ownership of non-land assets, and also the probability of being above or below the poverty line. The results show that micro health insurance has a positive association with all of these indicators, and this is statistically significant and quantitatively important for food sufficiency

    Concurrent Knowledge-Extraction in the Public-Key Model

    Get PDF
    Knowledge extraction is a fundamental notion, modelling machine possession of values (witnesses) in a computational complexity sense. The notion provides an essential tool for cryptographic protocol design and analysis, enabling one to argue about the internal state of protocol players without ever looking at this supposedly secret state. However, when transactions are concurrent (e.g., over the Internet) with players possessing public-keys (as is common in cryptography), assuring that entities ``know'' what they claim to know, where adversaries may be well coordinated across different transactions, turns out to be much more subtle and in need of re-examination. Here, we investigate how to formally treat knowledge possession by parties (with registered public-keys) interacting over the Internet. Stated more technically, we look into the relative power of the notion of ``concurrent knowledge-extraction'' (CKE) in the concurrent zero-knowledge (CZK) bare public-key (BPK) model.Comment: 38 pages, 4 figure
    • …
    corecore