58 research outputs found

    A Survey on Design and Implementation of Protected Searchable Data in the Cloud

    Get PDF
    While cloud computing has exploded in popularity in recent years thanks to the potential efficiency and cost savings of outsourcing the storage and management of data and applications, a number of vulnerabilities that led to multiple attacks have deterred many potential users. As a result, experts in the field argued that new mechanisms are needed in order to create trusted and secure cloud services. Such mechanisms would eradicate the suspicion of users towards cloud computing by providing the necessary security guarantees. Searchable Encryption is among the most promising solutions - one that has the potential to help offer truly secure and privacy-preserving cloud services. We start this paper by surveying the most important searchable encryption schemes and their relevance to cloud computing. In light of this analysis we demonstrate the inefficiencies of the existing schemes and expand our analysis by discussing certain confidentiality and privacy issues. Further, we examine how to integrate such a scheme with a popular cloud platform. Finally, we have chosen - based on the findings of our analysis - an existing scheme and implemented it to review its practical maturity for deployment in real systems. The survey of the field, together with the analysis and with the extensive experimental results provides a comprehensive review of the theoretical and practical aspects of searchable encryption

    A Framework for Efficient Adaptively Secure Composable Oblivious Transfer in the ROM

    Get PDF
    Oblivious Transfer (OT) is a fundamental cryptographic protocol that finds a number of applications, in particular, as an essential building block for two-party and multi-party computation. We construct a round-optimal (2 rounds) universally composable (UC) protocol for oblivious transfer secure against active adaptive adversaries from any OW-CPA secure public-key encryption scheme with certain properties in the random oracle model (ROM). In terms of computation, our protocol only requires the generation of a public/secret-key pair, two encryption operations and one decryption operation, apart from a few calls to the random oracle. In~terms of communication, our protocol only requires the transfer of one public-key, two ciphertexts, and three binary strings of roughly the same size as the message. Next, we show how to instantiate our construction under the low noise LPN, McEliece, QC-MDPC, LWE, and CDH assumptions. Our instantiations based on the low noise LPN, McEliece, and QC-MDPC assumptions are the first UC-secure OT protocols based on coding assumptions to achieve: 1) adaptive security, 2) optimal round complexity, 3) low communication and computational complexities. Previous results in this setting only achieved static security and used costly cut-and-choose techniques.Our instantiation based on CDH achieves adaptive security at the small cost of communicating only two more group elements as compared to the gap-DH based Simplest OT protocol of Chou and Orlandi (Latincrypt 15), which only achieves static security in the ROM

    Do North American Migratory Barren-Ground Caribou Subpopulations Cycle?

    Get PDF
    Unlike all other members of the deer family, subpopulations of barren-ground caribou (Rangifer tarandus groenlandicus) are typically sine-cyclic. We used Bayesian Information Criteria (BIC) to rank competing population dynamics models for 11 North American barren-ground caribou subpopulations. Nine of these subpopulations were best described as sine-cyclic with periods ranging from a minimum of 26 years (Bluenose-East and Porcupine) to a maximum of 55 years (Western Arctic); and amplitudes ranging from a minimum of 8 455 (Cape Bathurst) to a maximum of 327 432 (George River). Time series estimates of subpopulation abundance generated by the sine cycle models showed good correspondence to published subpopulation estimates of abundance for all nine sine-cyclic subpopulations (r = 0.978; p < 0.001). Lack of demographic closure (migration between subpopulations) was evident in both of the subpopulations that were not identified as sine-cyclic. Barren-ground caribou subpopulation amplitudes were mostly determined by subpopulation total range size and summer range productivity (R2 = 0.962; p < 0.001) and subpopulation periods were mostly determined by amplitude, total range productivity, and land surface temperature (R2 = 0.950; p < 0.001). Time series estimates of subpopulation abundance generated from the respective environmental regression models were highly correlated (r = 0.964; p < 0.001) to the published subpopulation estimates of abundance for the set of 9 sine-cyclic subpopulations. Extended (> 3 generations) subpopulation declines are a natural feature of cyclic barren-ground caribou subpopulations. Trends in species abundance based on pooled assemblages of asynchronous cyclic subpopulations should be interpreted with caution.Contrairement Ă  tous les autres membres de la famille des cervidĂ©s, les sous-populations de caribous de la toundra (Rangifer tarandus groenlandicus) suivent gĂ©nĂ©ralement un cycle sinusoĂŻdal. Nous avons employĂ© des critĂšres d’information bayĂ©siens (BIC) pour classer des modĂšles de dynamique des populations concurrentiels pour 11 sous-populations nord-amĂ©ricaines de caribous de la toundra. Neuf de ces sous-populations correspondaient mieux Ă  une description de cycle sinusoĂŻdal avec des pĂ©riodes allant d’un minimum de 26 ans (Bluenose-Est et Porcupine) Ă  un maximum de 55 ans (Arctique de l’Ouest); et des amplitudes allant d’un minimum de 8 455 (cap Bathurst) Ă  un maximum de 327 432 (riviĂšre George). Les estimations des sĂ©ries chronologiques de l’abondance des sous-populations obtenues Ă  l’aide des modĂšles de cycles sinusoĂŻdaux ont affichĂ© une bonne correspondance par rapport aux estimations publiĂ©es de l’abondance des sous-populations pour l’ensemble des neuf sous-populations de cycle sinusoĂŻdal (r = 0,978; p < 0,001). Le manque de fermeture dĂ©mographique (migration entre les sous-populations) Ă©tait Ă©vident dans les deux sous-populations qui n’étaient pas considĂ©rĂ©es comme suivant un cycle sinusoĂŻdal. L’amplitude des sous-populations de caribous de la toundra Ă©tait principalement dĂ©terminĂ©e par la taille de l’aire de rĂ©partition totale et la productivitĂ© de l’aire d’estivage (R2 = 0,962; p < 0,001), et les pĂ©riodes de sous-populations Ă©taient principalement dĂ©terminĂ©es par l’amplitude, la productivitĂ© de l’aire de rĂ©partition totale et la tempĂ©rature en surface des terres (R2 = 0,950; p < 0,001). Les estimations des sĂ©ries chronologiques de l’abondance des sous-populations produites au moyen des modĂšles respectifs de rĂ©gression environnementale Ă©taient fortement corrĂ©lĂ©es (r = 0,964; p < 0,001) aux estimations publiĂ©es de l’abondance des sous-populations pour l’ensemble des neuf sous-populations de cycle sinusoĂŻdal. Les dĂ©clins prolongĂ©s (> 3 gĂ©nĂ©rations) de sous-populations sont une caractĂ©ristique naturelle des sous-populations cycliques de caribous de la toundra. Les tendances caractĂ©risant l’abondance des espĂšces en fonction d’assemblages regroupĂ©s de sous-populations cycliques asynchrones devraient ĂȘtre interprĂ©tĂ©es avec prudence

    A Survey on Exotic Signatures for Post-quantum Blockchain: Challenges and Research Directions

    Full text link
    Blockchain technology provides efficient and secure solutions to various online activities by utilizing a wide range of cryptographic tools. In this article, we survey the existing literature on post-quantum secure digital signatures that possess exotic advanced features and that are crucial cryptographic tools used in the blockchain ecosystem for (1) account management, (2) consensus efficiency, (3) empowering scriptless blockchain, and (4) privacy. The exotic signatures that we particularly focus on in this work are the following: multi-/aggregate, threshold, adaptor, blind, and ring signatures. Herein the term "exotic"refers to signatures with properties that are not just beyond the norm for signatures, e.g., unforgeability, but also imbue new forms of functionalities. Our treatment of such exotic signatures includes discussions on existing challenges and future research directions in the post-quantum space. We hope that this article will help to foster further research to make post-quantum cryptography more accessible so that blockchain systems can be made ready in advance of the approaching quantum threats

    Climate change effects on human health in a gender perspective: some trends in Arctic research

    Get PDF
    Background: Climate change and environmental pollution have become pressing concerns for the peoples in the Arctic region. Some researchers link climate change, transformations of living conditions and human health. A number of studies have also provided data on differentiating effects of climate change on women's and men's well-being and health. Objective: To show how the issues of climate and environment change, human health and gender are addressed in current research in the Arctic. The main purpose of this article is not to give a full review but to draw attention to the gaps in knowledge and challenges in the Arctic research trends on climate change, human health and gender. Methods: A broad literature search was undertaken using a variety of sources from natural, medical, social science and humanities. The focus was on the keywords. Results: Despite the evidence provided by many researchers on differentiating effects of climate change on well-being and health of women and men, gender perspective remains of marginal interest in climate change, environmental and health studies. At the same time, social sciences and humanities, and gender studies in particular, show little interest towards climate change impacts on human health in the Arctic. As a result, we still observe the division of labour between disciplines, the disciplinary-bound pictures of human development in the Arctic and terminology confusion. Conclusion: Efforts to bring in a gender perspective in the Arctic research will be successful only when different disciplines would work together. Multidisciplinary research is a way to challenge academic/disciplinary homogeneity and their boundaries, to take advantage of the diversity of approaches and methods in production of new integrated knowledge. Cooperation and dialogue across disciplines will help to develop adequate indicators for monitoring human health and elaborating efficient policies and strategies to the benefit of both women and men in the Arctic

    Community-based adaptation research in the Canadian Arctic

    Get PDF
    Community-based adaptation (CBA) has emerged over the last decade as an approach to empowering communities to plan for and cope with the impacts of climate change. While such approaches have been widely advocated, few have critically examined the tensions and challenges that CBA brings. Responding to this gap, this article critically examines the use of CBA approaches with Inuit communities in Canada. We suggest that CBA holds significant promise to make adaptation research more democratic and responsive to local needs, providing a basis for developing locally appropriate adaptations based on local/indigenous and Western knowledge. Yet, we argue that CBA is not a panacea, and its common portrayal as such obscures its limitations, nuances, and challenges. Indeed, if uncritically adopted, CBA can potentially lead to maladaptation, may be inappropriate in some instances, can legitimize outside intervention and control, and may further marginalize communities. We identify responsibilities for researchers engaging in CBA work to manage these challenges, emphasizing the centrality of how knowledge is generated, the need for project flexibility and openness to change, and the importance of ensuring partnerships between researchers and communities are transparent. Researchers also need to be realistic about what CBA can achieve, and should not assume that research has a positive role to play in community adaptation just because it utilizes participatory approaches

    Universal Composition with Responsive Environments

    Get PDF
    In universal composability frameworks, adversaries (or environments) and protocols/ideal functionalities often have to exchange meta-information on the network interface, such as algorithms, keys, signatures, ciphertexts, signaling information, and corruption-related messages. For these purely modeling-related messages, which do not reflect actual network communication, it would often be very reasonable and natural for adversaries/environments to provide the requested information immediately or give control back to the protocol/functionality immediately after having received some information. However, in none of the existing models for universal composability is this guaranteed. We call this the \emph{non-responsiveness problem}. As we will discuss in the paper, while formally non-responsiveness does not invalidate any of the universal composability models, it has many disadvantages, such as unnecessarily complex specifications and less expressivity. Also, this problem has often been ignored in the literature, leading to ill-defined and flawed specifications. Protocol designers really should not have to care about this problem at all, but currently they have to: giving the adversary/environment the option to not respond immediately to modeling-related requests does not translate to any real attack scenario. This paper solves the non-responsiveness problem and its negative consequences completely, by avoiding this artificial modeling problem altogether. We propose the new concepts of responsive environments and adversaries. Such environments and adversaries must provide a valid response to modeling-related requests before any other protocol/functionality is activated. Hence, protocol designers do no longer have to worry about artifacts resulting from such requests not being answered promptly. Our concepts apply to all existing models for universal composability, as exemplified for the UC, GNUC, and IITM models, with full definitions and proofs (simulation relations, transitivity, equivalence of various simulation notions, and composition theorems) provided for the IITM model

    Climate-sensitive health priorities in Nunatsiavut, Canada

    Get PDF
    Background: This exploratory study used participatory methods to identify, characterize, and rank climate-sensitive health priorities in Nunatsiavut, Labrador, Canada. Methods: A mixed method study design was used and involved collecting both qualitative and quantitative data at regional, community, and individual levels. In-depth interviews with regional health representatives were conducted throughout Nunatsiavut (n = 11). In addition, three PhotoVoice workshops were held with Rigolet community members (n = 11), where participants took photos of areas, items, or concepts that expressed how climate change is impacting their health. The workshop groups shared their photographs, discussed the stories and messages behind them, and then grouped photos into re-occurring themes. Two community surveys were administered in Rigolet to capture data on observed climatic and environmental changes in the area, and perceived impacts on health, wellbeing, and lifestyles (n = 187). Results: Climate-sensitive health pathways were described in terms of inter-relationships between environmental and social determinants of Inuit health. The climate-sensitive health priorities for the region included food security, water security, mental health and wellbeing, new hazards and safety concerns, and health services and delivery. Conclusions: The results highlight several climate-sensitive health priorities that are specific to the Nunatsiavut region, and suggest approaching health research and adaptation planning from an EcoHealth perspective

    On Homomorphic Encryption and Chosen-Ciphertext Security

    Get PDF
    Abstract. Chosen-Ciphertext (IND-CCA) security is generally consid-ered the right notion of security for a cryptosystem. Because of its central importance much effort has been devoted to constructing IND-CCA se-cure cryptosystems. In this work, we consider constructing IND-CCA secure cryptosystems from (group) homomorphic encryption. Our main results give natural and efficient constructions of IND-CCA secure cryptosystems from any homomorphic encryption scheme that satisfies weak cyclic properties, either in the plaintext, ciphertext or randomness space. Our results have the added benefit of being simple to describe and analyze
    • 

    corecore