35,370 research outputs found
Are the poor too poor to demand health insurance?
Community based micro insurance has aroused much interest and hope in meeting health care challenges facing the poor. In this paper we explore how institutional rigidities such as credit constraint impinge on demand for health insurance and how insurance could potentially prevent poor households from fallinginto poverty trap. In this setting, we argue that the appropriate public intervention in generating demand for insurance is not to subsidise premium but to remove these rigidities (easing credit constraint in the present context). Thus from insurance perspective as well, our analysis highlights the importance of having appropriate savings and borrowing instruments for the poor.Micro-insurance, Micro-credit, Credit Constraint, Demand for Insurance
Can Micro Health Insurance Reduce Poverty? Evidence from Bangladesh
This paper examines the impact of micro health insurance on poverty reduction in rural areas of Bangladesh. The research is based on household level primary data collected from the operating areas of the Grameen Bank during 2006. A number of outcome measures relating to poverty status are considered; these include household income, stability of household income via food sufficiency and ownership of non-land assets, and also the probability of being above or below the poverty line. The results show that micro health insurance has a positive association with all of these indicators, and this is statistically significant and quantitatively important for food sufficiency
Concurrent Knowledge-Extraction in the Public-Key Model
Knowledge extraction is a fundamental notion, modelling machine possession of
values (witnesses) in a computational complexity sense. The notion provides an
essential tool for cryptographic protocol design and analysis, enabling one to
argue about the internal state of protocol players without ever looking at this
supposedly secret state. However, when transactions are concurrent (e.g., over
the Internet) with players possessing public-keys (as is common in
cryptography), assuring that entities ``know'' what they claim to know, where
adversaries may be well coordinated across different transactions, turns out to
be much more subtle and in need of re-examination. Here, we investigate how to
formally treat knowledge possession by parties (with registered public-keys)
interacting over the Internet. Stated more technically, we look into the
relative power of the notion of ``concurrent knowledge-extraction'' (CKE) in
the concurrent zero-knowledge (CZK) bare public-key (BPK) model.Comment: 38 pages, 4 figure
- …