229 research outputs found

    Security and Efficiency Analysis of the Hamming Distance Computation Protocol Based on Oblivious Transfer

    Get PDF
    open access articleBringer et al. proposed two cryptographic protocols for the computation of Hamming distance. Their first scheme uses Oblivious Transfer and provides security in the semi-honest model. The other scheme uses Committed Oblivious Transfer and is claimed to provide full security in the malicious case. The proposed protocols have direct implications to biometric authentication schemes between a prover and a verifier where the verifier has biometric data of the users in plain form. In this paper, we show that their protocol is not actually fully secure against malicious adversaries. More precisely, our attack breaks the soundness property of their protocol where a malicious user can compute a Hamming distance which is different from the actual value. For biometric authentication systems, this attack allows a malicious adversary to pass the authentication without knowledge of the honest user's input with at most O(n)O(n) complexity instead of O(2n)O(2^n), where nn is the input length. We propose an enhanced version of their protocol where this attack is eliminated. The security of our modified protocol is proven using the simulation-based paradigm. Furthermore, as for efficiency concerns, the modified protocol utilizes Verifiable Oblivious Transfer which does not require the commitments to outputs which improves its efficiency significantly

    Observational constraints on the afterglow of GRB 020531

    Get PDF
    We present the data acquired by the TAROT automated observatory on the afterglow of GRB 020531. Up to now, no convincing afterglow emission has been reported for this short/hard GRB at any wavelength, including X-ray and optical. The combination of our early limits, with other published data allows us to put severe constraints on the afterglow magnitude and light curve. The limiting magnitude is 18.5 in R band, 88 minutes after the GRB, and the decay slope power law index could be larger than 2.2.Comment: 4 pages, submitted to A&A (letter

    Limits on the early afterglow phase of gamma-ray burst sources from TAROT-1

    Get PDF
    The T\'elescope \`a Action Rapide pour les Objets Transitoires (TAROT-1) has as prime objective the observation of the prompt and delayed emission of cosmic gamma-ray bursts (GRBs). We have performed a search for optical emission from 6 GRBs detected by BATSE. The positioning error circle was fully covered within typically thirty minutes after the trigger. No detection of the early afterglow phase was made, and magnitude limits in the range of mR=13−15 \mathrm{m}_{\mathrm{R}} = 13-15 were estimated using 20s exposures. These limits are compared to optical afterglow data obtained in later phases and the results are interpreted in terms of source distances. They correspond to a median redshift of z = 0.5. With HETE-2 and the planned instrument upgrade, TAROT-1 will be able to detect the early optical emission of GRBs up to a redshift of the order of 5.Comment: 7 pages, accepted in Astronomy and Astrophysic

    Early re-brightening of the afterglow of GRB 050525a

    Full text link
    We present time resolved optical data acquired by the TAROT automated observatory on the afterglow of GRB 050525a from 6 to 136 minutes after the GRB. We evidence a rapid re-brightening of 0.65 magnitude of the afterglow at ∌\sim 33 min after the GRB. The decay slope α\alpha is 1.14±0.071.14\pm 0.07 in the first part and is 1.23±0.271.23\pm 0.27 after the re-brightening event. The afterglow of GRB 050525a is the third known afterglow that exhibits a re-brightening event begining at 0.01--0.02 day in the rest time frame.Comment: 4 pages, 2 figures, submitted to A&

    Kondo Effect in a Metal with Correlated Conduction Electrons: Diagrammatic Approach

    Full text link
    We study the low-temperature behavior of a magnetic impurity which is weakly coupled to correlated conduction electrons. To account for conduction electron interactions a diagrammatic approach in the frame of the 1/N expansion is developed. The method allows us to study various consequences of the conduction electron correlations for the ground state and the low-energy excitations. We analyse the characteristic energy scale in the limit of weak conduction electron interactions. Results are reported for static properties (impurity valence, charge susceptibility, magnetic susceptibility, and specific heat) in the low-temperature limit.Comment: 16 pages, 9 figure

    Diurnal salivary cortisol concentrations in Parkinson’s disease: increased total secretion and morning cortisol concentrations

    Get PDF
    Background:Parkinson’s disease (PD) is a chronic neurodegenerative disorder. There is limited knowledge about the function of the hypothalamic-pituitary-adrenal axis in PD. The primary aim of this prospective study was to analyze diurnal salivary cortisol concentrations in patients with PD and correlate these with age, gender, body mass index (BMI), duration of PD, and pain. The secondary aim was to compare the results with a healthy reference group. Methods:Fifty-nine PD patients, 35 women and 24 men, aged 50–79 years, were recruited. The reference group comprised healthy individuals matched for age, gender, BMI, and time point for sampling. Salivary cortisol was collected at 8 am, 1 pm, and 8 pm, and 8 am the next day using cotton-based Salivette ¼tubes and analyzed using Spectria¼Cortisol I125. A visual analog scale was used for estimation of pain. Results:The median cortisol concentration was 16.0 (5.8–30.2) nmol/L at 8 am, 5.8 (3.0–16.4) at 1 pm, 2.8 (1.6–8.0) at 8 pm, and 14.0 (7.5–28.7) at 8 am the next day. Total secretion and rate of cortisol secretion during the day (8 am–8 pm) and the concentration of cortisol on the next morning were lower (12.5 nmol/L) in the reference group. No significant correlations with age, gender, BMI, duration of PD, Hoehn and Yahr score, Unified Parkinson’s Disease Rating Scale III score, gait, pain, or cortisol concentrations were found. Conclusion:The neurodegenerative changes in PD does not seem to interfere with the hypothalamic-pituitary-adrenal axis. Salivary cortisol concentrations in PD patients were increased in the morning compared with the reference group, and were not influenced by motor dysfunction, duration of disease, or coexistence of chronic or acute pain

    ClbP is a prototype of a peptidase subgroup involved in biosynthesis of nonribosomal peptides

    Get PDF
    The pks genomic island of Escherichia coli encodes polyketide (PK) and nonribosomal peptide (NRP) synthases that allow assembly of a putative hybrid PK-NRP compound named colibactin that induces DNA double-strand breaks in eukaryotic cells. The pks-encoded machinery harbors an atypical essential protein, ClbP. ClbP crystal structure and mutagenesis experiments revealed a serine-active site and original structural features compatible with peptidase activity, which was detected by biochemical assays. Ten ClbP homologs were identified in silico in NRP genomic islands of closely and distantly related bacterial species. All tested ClbP homologs were able to complement a clbP-deficient E. coli mutant. ClbP is therefore a prototype of a new subfamily of extracytoplasmic peptidases probably involved in the maturation of NRP compounds. Such peptidases will be powerful tools for the manipulation of NRP biosynthetic pathways

    Recent Advances in SMAP RFI Processing

    Get PDF
    The measurements made by the Soil Moisture Active/Passive (SMAP) mission are affected by the presence of Radio Frequency Interference (RFI) in the protected 1400-1427 MHz band. In SMAP data processing, the main protection against RFI is a sophisticated RFI detection algorithm which flags sub-samples in time and frequency that are contaminated by RFI and removes them before estimating the brightness temperature. This contribution presents two additional approaches that have been developed to address the RFI concern in SMAP. The first consists in locating sources of RFI; once located, it becomes possible to report RFI sources to spectrum management authorities, which can lead to less RFI being experienced by SMAP in the future. The second is a new RFI detection method that is based on detecting outliers in the spatial distribution of measured antenna temperatures

    The characteristics of sexual abuse in sport: A multidimensional scaling analysis of events described in media reports

    Get PDF
    Most research on sexual abuse has been conducted within family settings (Fergusson & Mullen, 1999). In recent years, following several high profile convictions and scandals, research into sexual abuse has also encompassed institutional and community settings such as sport and the church (Gallagher, 2000; Wolfe et al., 2003). Research into sexual abuse in sport, for example, began with both prevalence studies (Kirby & Greaves, 1996; Leahy, Pretty & Tenenbaum, 2002) and qualitative analyses of the processes and experiences of athlete sexual abuse (Brackenridge, 1997; Cense & Brackenridge, 2001, Toftegaard Nielsen, 2001). From such work, descriptions of the modus operandi of abusers in sport, and the experiences and consequences for athlete victims, have been provided, informing both abuse prevention work and coach education. To date, however, no study has provided empirical support for multiple associations or identified patterns of sex offending in sport in ways that might allow comparisons with research-generated models of offending outside sport. This paper reports on an analysis of 159 cases of criminally defined sexual abuse, reported in the print media over a period of 15 years. The main aim of the study was to identify the nature of sex offending in sport focusing on the methods and locations of offences. The data were analysed using multidimensional scaling (MDS), as a data reduction method, in order to identify the underlying themes within the abuse and explore the inter-relationships of behaviour, victim and context variables. The findings indicate that there are specific themes that can be identified within the perpetrator strategies that include ‘intimate’, ‘aggressive’, and ‘’dominant’ modes of interaction. The same patterns that are described here within the specific context of sport are consistent with themes that emerge from similar behavioural analyses of rapists (Canter & Heritage, 1990; Bishopp, 2003) and child molester groups (Canter, Hughes & Kirby, 1998). These patterns show a correspondence to a broader behavioural model – the interpersonal circumplex (e.g., Leary 1957). Implications for accreditation and continuing professional education of sport psychologists are noted

    Secure biometric authentication with improved accuracy

    Get PDF
    We propose a new hybrid protocol for cryptographically secure biometric authentication. The main advantages of the proposed protocol over previous solutions can be summarised as follows: (1) potential for much better accuracy using different types of biometric signals, including behavioural ones; and (2) improved user privacy, since user identities are not transmitted at any point in the protocol execution. The new protocol takes advantage of state-of-the-art identification classifiers, which provide not only better accuracy, but also the possibility to perform authentication without knowing who the user claims to be. Cryptographic security is based on the Paillier public key encryption scheme
    • 

    corecore