203 research outputs found

    Security and Efficiency Analysis of the Hamming Distance Computation Protocol Based on Oblivious Transfer

    Get PDF
    open access articleBringer et al. proposed two cryptographic protocols for the computation of Hamming distance. Their first scheme uses Oblivious Transfer and provides security in the semi-honest model. The other scheme uses Committed Oblivious Transfer and is claimed to provide full security in the malicious case. The proposed protocols have direct implications to biometric authentication schemes between a prover and a verifier where the verifier has biometric data of the users in plain form. In this paper, we show that their protocol is not actually fully secure against malicious adversaries. More precisely, our attack breaks the soundness property of their protocol where a malicious user can compute a Hamming distance which is different from the actual value. For biometric authentication systems, this attack allows a malicious adversary to pass the authentication without knowledge of the honest user's input with at most O(n)O(n) complexity instead of O(2n)O(2^n), where nn is the input length. We propose an enhanced version of their protocol where this attack is eliminated. The security of our modified protocol is proven using the simulation-based paradigm. Furthermore, as for efficiency concerns, the modified protocol utilizes Verifiable Oblivious Transfer which does not require the commitments to outputs which improves its efficiency significantly

    Greater Expectations?

    Get PDF
    Physically Unclonable Functions (PUFs) are key tools in the construction of lightweight authentication and key exchange protocols. So far, all existing PUF-based authentication protocols follow the same paradigm: A resource-constrained prover, holding a PUF, wants to authenticate to a resource-rich verifier, who has access to a database of pre-measured PUF challenge-response pairs (CRPs). In this paper we consider application scenarios where all previous PUF-based authentication schemes fail to work: The verifier is resource-constrained (and holds a PUF), while the prover is resource-rich (and holds a CRP-database). We construct the first and efficient PUF-based authentication protocol for this setting, which we call converse PUF-based authentication. We provide an extensive security analysis against passive adversaries, show that a minor modification also allows for authenticated key exchange and propose a concrete instantiation using controlled Arbiter PUFs

    Maximising transparency in a doctoral thesis: The complexities of writing about the use of QSR*NVIVO within a grounded theory study

    Get PDF
    This paper discusses the challenges of how to provide a transparent account of the use of the software programme QSR*NVIVO (QSR 2000) within a Grounded Theory framework (Glaser and Strauss 1967; Strauss and Corbin 1998). Psychology students are increasingly pursuing qualitative research projects such to the extent that the UK Economic and Social Research Council (ESRC) advise that students should have skill in the use of computer assisted qualitative data analysis software (CAQDAS) (Economic and Social Research Council 2001). Unlike quantitative studies, rigid formulae do not exist for writing-up qualitative projects for doctoral theses. Most authors, however, agree that transparency is essential when communicating the findings of qualitative research. Sparkes (2001) recommends that evaluative criteria for qualitative research should be commensurable with the aims, objectives, and epistemological assumptions of the research project. Likewise, the use of CAQDAS should vary according to the research methodology followed, and thus researchers should include a discussion of how CAQDAS was used. This paper describes how the evolving process of coding data, writing memos, categorising, and theorising were integrated into the written thesis. The structure of the written document is described including considerations about restructuring and the difficulties of writing about an iterative process within a linear document

    Recent Advances in SMAP RFI Processing

    Get PDF
    The measurements made by the Soil Moisture Active/Passive (SMAP) mission are affected by the presence of Radio Frequency Interference (RFI) in the protected 1400-1427 MHz band. In SMAP data processing, the main protection against RFI is a sophisticated RFI detection algorithm which flags sub-samples in time and frequency that are contaminated by RFI and removes them before estimating the brightness temperature. This contribution presents two additional approaches that have been developed to address the RFI concern in SMAP. The first consists in locating sources of RFI; once located, it becomes possible to report RFI sources to spectrum management authorities, which can lead to less RFI being experienced by SMAP in the future. The second is a new RFI detection method that is based on detecting outliers in the spatial distribution of measured antenna temperatures

    Using Resonances to Control Chaotic Mixing within a Translating and Rotating Droplet

    Full text link
    Enhancing and controlling chaotic advection or chaotic mixing within liquid droplets is crucial for a variety of applications including digital microfluidic devices which use microscopic ``discrete'' fluid volumes (droplets) as microreactors. In this work, we consider the Stokes flow of a translating spherical liquid droplet which we perturb by imposing a time-periodic rigid-body rotation. Using the tools of dynamical systems, we have shown in previous work that the rotation not only leads to one or more three-dimensional chaotic mixing regions, in which mixing occurs through the stretching and folding of material lines, but also offers the possibility of controlling both the size and the location of chaotic mixing within the drop. Such a control was achieved through appropriate tuning of the amplitude and frequency of the rotation in order to use resonances between the natural frequencies of the system and those of the external forcing. In this paper, we study the influence of the orientation of the rotation axis on the chaotic mixing zones as a third parameter, as well as propose an experimental set up to implement the techniques discussed.Comment: 15 pages, 6 figure

    Defining appropriateness in coach-athlete sexual relationships: The voice of coaches

    Get PDF
    The sporting culture, with omnipotent coaches, fierce competition for recognition and funding, and ‘win at all cost’ ethos, creates an environment conducive to sexual exploitation of athletes. Recent increased public awareness and the development of child protection policies in sport have led to the questioning of previously accepted coach-athlete relationships. This study is an exploratory investigation into male swimming coaches’ perceptions of appropriateness of coach-athlete sexual relationships. Sexual relationships with athletes under the age of 16 were unanimously considered totally inappropriate. With regard to sexual relationships with athletes above the age of consent for heterosexual sex, opinions ranged from “totally inappropriate” to “it’s a question of civil liberties.” These results are discussed in relation to how coaches have adapted their own behaviours in the face of public scrutiny but are still reluctant to restrict the rights of their fellow coaches

    Kondo Effect in a Metal with Correlated Conduction Electrons: Diagrammatic Approach

    Full text link
    We study the low-temperature behavior of a magnetic impurity which is weakly coupled to correlated conduction electrons. To account for conduction electron interactions a diagrammatic approach in the frame of the 1/N expansion is developed. The method allows us to study various consequences of the conduction electron correlations for the ground state and the low-energy excitations. We analyse the characteristic energy scale in the limit of weak conduction electron interactions. Results are reported for static properties (impurity valence, charge susceptibility, magnetic susceptibility, and specific heat) in the low-temperature limit.Comment: 16 pages, 9 figure

    Polymer depletion interaction between two parallel repulsive walls

    Get PDF
    The depletion interaction between two parallel repulsive walls confining a dilute solution of long and flexible polymer chains is studied by field-theoretic methods. Special attention is paid to self-avoidance between chain monomers relevant for polymers in a good solvent. Our direct approach avoids the mapping of the actual polymer chains on effective hard or soft spheres. We compare our results with recent Monte Carlo simulations [A. Milchev and K. Binder, Eur. Phys. J. B 3, 477 (1998)] and with experimental results for the depletion interaction between a spherical colloidal particle and a planar wall in a dilute solution of nonionic polymers [D. Rudhardt, C. Bechinger, and P. Leiderer, Phys. Rev. Lett. 81, 1330 (1998)].Comment: 17 pages, 3 figures. Final version as publishe

    Efficient Verifiable Computation of XOR for Biometric Authentication

    Full text link
    This work addresses the security and privacy issues in remotebiometric authentication by proposing an efficient mechanism to verifythe correctness of the outsourced computation in such protocols.In particular, we propose an efficient verifiable computation of XORingencrypted messages using an XOR linear message authenticationcode (MAC) and we employ the proposed scheme to build a biometricauthentication protocol. The proposed authentication protocol is bothsecure and privacy-preserving against malicious (as opposed to honest-but-curious) adversaries. Specifically, the use of the verifiable computation scheme together with an homomorphic encryption protects the privacy of biometric templates against malicious adversaries. Furthermore, in order to achieve unlinkability of authentication attempts, while keeping a low communication overhead, we show how to apply Oblivious RAM and biohashing to our protocol. We also provide a proof of security for the proposed solution. Our simulation results show that the proposed authentication protocol is efficient
    • 

    corecore