142 research outputs found

    Robust Combiners for Software Hardening

    Get PDF
    All practical software hardening schemes, as well as practical encryption schemes, e.g., AES, were not proven to be secure. One technique to enhance security is {\em robust combiners}. An algorithm CC is a robust combiner for specification SS, e.g., privacy, if for any two implementations XX and YY, of a cryptographic scheme, the combined scheme C(X,Y)C(X,Y) satisfies SS provided {\em either} XX {\em or} YY satisfy SS. We present the first robust combiners for software hardening, specifically for obfuscation \cite{barak:obfuscation}, and for White-Box Remote Program Execution (\w) \cite{herzberg2009towards}. WBRPE and obfuscators are software hardening techniques that are employed to protect execution of programs in remote, hostile environment. \w\ provides a software only platform allowing secure execution of programs on untrusted, remote hosts, ensuring privacy of the program, and of the inputs to the program, as well as privacy and integrity of the result of the computation. Obfuscators protect the code (and secret data) of the program that is sent to the remote host for execution. Robust combiners are particularly important for software hardening, where there is no standard whose security is established. In addition, robust combiners for software hardening are interesting from software engineering perspective since they introduce new techniques of reductions and code manipulation

    Toward a conceptual framework of emotional relationship marketing: an examination of two UK political parties

    Get PDF
    The purpose of this paper is to review the notion of branding and evaluate its applicability to political parties. As ideological politics is in decline, branding may provide a consistent narrative where voters feel a sense of warmth and belonging. The paper aims to build an understanding of the complexity of building a political brand where a combination of image, logo, leadership, and values can all contribute to a compelling brand narrative. It investigates how competing positive and negative messages attempt to build and distort the brand identity. A critical review of bran ding, relationship marketing, and political science literature articulates the conceptual development of branding and its applicability to political parties. The success or failure of negative campaigning is due to the authenticity of a political party’s brand values — creating a coherent brand story — if there is no distance between the brand values articulated by the political party and the values their community perceives then this creates an "authentic" brand. However, if there is a gap this paper illustrates how negative campaigning can be used to build a "doppelganger brand," which undermines the credibility of the authentic political brand. The paper argues that political parties need to understand how brand stories are developed but also how they can be used to protect against negative advertising. This has implications for political marketing strategists and political parties. This paper draws together branding theory and relationship marketing and incorporates them into a framework that makes a contribution to the political marketing literature

    Online brand communities: when consumers are negatively engaged

    Get PDF
    The goal of the current research is to explore the influence of negative engagement on committing participants in hate online brand communities. To reach this aim, three brands are used to assess this phenomenon (Starbucks, Apple, and McDonald’s), and three related hate online brand communities of such brands are involved. An online questionnaire is developed based on previously validated scales and fulfilled by 300 online members of mentioned communities. Findings reveal the importance of Brand influence, Helping, and Self-expression dimensions on participants to be committed to hating brand communities.info:eu-repo/semantics/acceptedVersio

    Fast Distributed RSA Key Generation for Semi-Honest and Malicious Adversaries

    Get PDF
    We present two new, highly efficient, protocols for securely generating a distributed RSA key pair in the two-party setting. One protocol is semi-honestly secure and the other maliciously secure. Both are constant round and do not rely on any specific number-theoretic assumptions and improve significantly over the state-of-the-art by allowing a slight leakage (which we show to not affect security). For our maliciously secure protocol our most significant improvement comes from executing most of the protocol in a ``strong\u27\u27 semi-honest manner and then doing a single, light, zero-knowledge argument of correct execution. We introduce other significant improvements as well. One such improvement arrives in showing that certain, limited leakage does not compromise security, which allows us to use lightweight subprotocols. Another improvement, which may be of independent interest, comes in our approach for multiplying two large integers using OT, in the malicious setting, without being susceptible to a selective-failure attack. Finally, we implement our malicious protocol and show that its performance is an order of magnitude better than the best previous protocol, which provided only semi-honest security

    Multiparty Generation of an RSA Modulus

    Get PDF
    We present a new multiparty protocol for the distributed generation of biprime RSA moduli, with security against any subset of maliciously colluding parties assuming oblivious transfer and the hardness of factoring. Our protocol is highly modular, and its uppermost layer can be viewed as a template that generalizes the structure of prior works and leads to a simpler security proof. We introduce a combined sampling-and-sieving technique that eliminates both the inherent leakage in the approach of Frederiksen et al. (Crypto\u2718), and the dependence upon additively homomorphic encryption in the approach of Hazay et al. (JCrypt\u2719). We combine this technique with an efficient, privacy-free check to detect malicious behavior retroactively when a sampled candidate is not a biprime, and thereby overcome covert rejection-sampling attacks and achieve both asymptotic and concrete efficiency improvements over the previous state of the art

    Contextualising social capital in online brand communities

    Get PDF
    Online brand communities (OBC) are growing in number and becoming an increasingly important interface where marketers can effectively facilitate the relationship between their brand and consumers. A qualitative study using a four-month netnography over three OBCs followed by focus groups with OBC members explored the dynamics of social capital in these communities. Findings indicate that social capital is an important driver in the success of OBCs, and all the elements of social capital including a shared language, shared vision, social trust and reciprocity are evident. Moreover, results from this study indicate that these elements are crucial in developing the network ties that are integral to building loyalty and brand equity

    Consumer–brand identification revisited: An integrative framework of brand identification, customer satisfaction, and price image and their role for brand loyalty and word of mouth

    Get PDF
    Consumer–brand identification has received considerable attraction among scholars and practitioners in recent years. We contribute to previous research by proposing an integrative model that includes consumer–brand identification, customer satisfaction, and price image to investigate the interrelationships among these constructs as well as their effects on brand loyalty and positive word of mouth. To provide general results, we empirically test the model using a sample of 1443 respondents from a representative consumer panel and 10 service/product brands. The results demonstrate that identification, satisfaction, and price image significantly influence both loyalty and word of mouth. Moreover, we find significant interrelationships among the constructs: Identification positively influences both satisfaction and price image, which also increases satisfaction. By disclosing the relative importance of three separate ways of gaining and retaining customers, this study helps managers more appropriately choose the right mix of branding, pricing, and relationship marketing. From an academic point of view, our research is the first to explicitly examine the effects of the concept of identification for price management and to integrate variables from the fields of branding, relationship marketing, and behavioral pricing, which have separately been identified as particularly important determinants of marketing outcomes
    • 

    corecore