70 research outputs found

    Theory and application of computationally independent one-way functions: Interactive proof of ability - Revisited

    Get PDF
    We introduce the concept of computationally independent pair of one-way functions (CI-OWF). We also provide two rich classes of examples of such functions based on standard assumptions. We revisit two-party interactive protocols for proving possession of computational power and existing two-flow challenge-response protocols. We analyze existing protocols for proof of computation power and propose a new two-flow protocol using CI-OWF based on square Diffie-Hellman problem

    On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes

    Get PDF
    Abstract. Universal hash functions are commonly used primitives for fast and secure message authentication in the form of Message Authentication Codes (MACs) or Authenticated Encryption with Associated Data (AEAD) schemes. These schemes are widely used and standardised, the most well known being McGrew and Viega’s Galois/Counter Mode (GCM). In this paper we identify some properties of hash functions based on polynomial evaluation that arise from the underlying algebraic structure. As a result we are able to describe a general forgery attack, of which Saarinen’s cycling attack from FSE 2012 is a special case. Our attack removes the requirement for long messages and applies regardless of the field in which the hash function is evaluated. Furthermore we provide a common description of all published attacks against GCM, by showing that the existing attacks are the result of these algebraic properties of the polynomial-based hash function. We also greatly expand the number of known weak GCM keys and show that almost every subset of the keyspace is a weak key class. Finally, we demonstrate that these algebraic properties and corresponding attacks are highly relevant to GCM/2 +, a variant of GCM designed to increase the efficiency in software

    Two rapid assays for screening of patulin biodegradation

    Get PDF
    Artículo sobre distintos ensayos para comprobar la biodegradación de la patulinaThe mycotoxin patulin is produced by the blue mould pathogen Penicillium expansum in rotting apples during postharvest storage. Patulin is toxic to a wide range of organisms, including humans, animals, fungi and bacteria. Wash water from apple packing and processing houses often harbours patulin and fungal spores, which can contaminate the environment. Ubiquitous epiphytic yeasts, such as Rhodosporidium kratochvilovae strain LS11 which is a biocontrol agent of P. expansum in apples, have the capacity to resist the toxicity of patulin and to biodegrade it. Two non-toxic products are formed. One is desoxypatulinic acid. The aim of the work was to develop rapid, high-throughput bioassays for monitoring patulin degradation in multiple samples. Escherichia coli was highly sensitive to patulin, but insensitive to desoxypatulinic acid. This was utilized to develop a detection test for patulin, replacing time-consuming thin layer chromatography or high-performance liquid chromatography. Two assays for patulin degradation were developed, one in liquid medium and the other in semi-solid medium. Both assays allow the contemporary screening of a large number of samples. The liquid medium assay utilizes 96-well microtiter plates and was optimized for using a minimum of patulin. The semisolid medium assay has the added advantage of slowing down the biodegradation, which allows the study and isolation of transient degradation products. The two assays are complementary and have several areas of utilization, from screening a bank of microorganisms for biodegradation ability to the study of biodegradation pathways

    Industry-supported meta-analyses compared with meta-analyses with non-profit or no support: Differences in methodological quality and conclusions

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>Studies have shown that industry-sponsored meta-analyses of drugs lack scientific rigour and have biased conclusions. However, these studies have been restricted to certain medical specialities. We compared all industry-supported meta-analyses of drug-drug comparisons with those without industry support.</p> <p>Methods</p> <p>We searched PubMed for all meta-analyses that compared different drugs or classes of drugs published in 2004. Two authors assessed the meta-analyses and independently extracted data. We used a validated scale for judging the methodological quality and a binary scale for judging conclusions. We divided the meta-analyses according to the type of support in 3 categories: industry-supported, non-profit support or no support, and undeclared support.</p> <p>Results</p> <p>We included 39 meta-analyses. Ten had industry support, 18 non-profit or no support, and 11 undeclared support. On a 0–7 scale, the median quality score was 6 for meta-analyses with non-profit or no support and 2.5 for the industry-supported meta-analyses (P < 0.01). Compared with industry-supported meta-analyses, more meta-analyses with non-profit or no support avoided bias in the selection of studies (P = 0.01), more often stated the search methods used to find studies (P = 0.02), searched comprehensively (P < 0.01), reported criteria for assessing the validity of the studies (P = 0.02), used appropriate criteria (P = 0.04), described methods of allocation concealment (P = 0.05), described methods of blinding (P = 0.05), and described excluded patients (P = 0.08) and studies (P = 0.15). Forty percent of the industry-supported meta-analyses recommended the experimental drug without reservations, compared with 22% of the meta-analyses with non-profit or no support (P = 0.57).</p> <p>In a sensitivity analysis, we contacted the authors of the meta-analyses with undeclared support. Eight who replied that they had not received industry funding were added to those with non-profit or no support, and 3 who did not reply were added to those with industry support. This analysis did not change the results much.</p> <p>Conclusion</p> <p>Transparency is essential for readers to make their own judgment about medical interventions guided by the results of meta-analyses. We found that industry-supported meta-analyses are less transparent than meta-analyses with non-profit support or no support.</p

    The potential for research-based information in public health: Identifying unrecognised information needs

    Get PDF
    OBJECTIVE: To explore whether there is a potential for greater use of research-based information in public health practice in a local setting. Secondly, if research-based information is relevant, to explore the extent to which this generates questioning behaviour. DESIGN: Qualitative study using focus group discussions, observation and interviews. SETTING: Public health practices in Norway. PARTICIPANTS: 52 public health practitioners. RESULTS: In general, the public health practitioners had a positive attitude towards research-based information, but believed that they had few cases requiring this type of information. They did say, however, that there might be a potential for greater use. During five focus groups and six observation days we identified 28 questions/cases where it would have been appropriate to seek out research evidence according to our definition. Three of the public health practitioners identified three of these 28 cases as questions for which research-based information could have been relevant. This gap is interpreted as representing unrecognised information needs. CONCLUSIONS: There is an unrealised potential in public health practice for more frequent and extensive use of research-based information. The practitioners did not appear to reflect on the need for scientific information when faced with new cases and few questions of this type were generated

    Alcohol use and misuse: What are the contributions of occupation and work organization conditions?

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>This research examines the specific contribution of occupation and work organization conditions to alcohol use and misuse. It is based on a social-action model that takes into account agent personality, structures of daily life, and macro social structures.</p> <p>Methods</p> <p>Data come from a representative sample of 10,155 workers in Quebec, Canada. Multinomial regression models corrected for sample design effect have been used to predict low-risk and high-risk drinking compared to non-drinkers. The contribution of occupation and work organization conditions (skill used, decision authority, physical and psychological demands, hours worked, irregular work schedule, harassment, unionization, job insecurity, performance pay, prestige) have been adjusted for family situation, social network outside the workplace, and individual characteristics.</p> <p>Results</p> <p>Compared to non-qualified blue-collars, both low-risk and high-risk drinking are associated with qualified blue-collars, semi-qualified white-collars, and middle managers; high-risk drinking is associated with upper managers. For constraints-resources related to work organization conditions, only workplace harassment is an important determinant of both low-risk and high-risk drinking, but it is modestly moderated by occupation. Family situation, social support outside work, and personal characteristics of individuals are also associated with alcohol use and misuse. Non-work factors mediated/suppressed the role of occupation and work organization conditions.</p> <p>Conclusion</p> <p>Occupation and workplace harassment are important factors associated with alcohol use and misuse. The results support the theoretical model conceptualizing alcohol use and misuse as being the product of stress caused by constraints and resources brought to bear simultaneously by agent personality, structures of daily life, and macro social structures. Occupational alcohol researchers must expand their theoretical perspectives to avoid erroneous conclusions about the specific role of the workplace.</p

    What Will It Take to Eliminate Pediatric HIV? Reaching WHO Target Rates of Mother-to-Child HIV Transmission in Zimbabwe: A Model-Based Analysis

    Get PDF
    Using a simulation model, Andrea Ciaranello and colleagues find that the latest WHO PMTCT (prevention of mother to child transmission of HIV) guidelines plus better access to PMTCT programs, better retention of women in care, and better adherence to drugs are needed to eliminate pediatric HIV in Zimbabwe

    Systematic meta-review of supported self-management for asthma: a healthcare perspective

    Get PDF
    BACKGROUND: Supported self-management has been recommended by asthma guidelines for three decades; improving current suboptimal implementation will require commitment from professionals, patients and healthcare organisations. The Practical Systematic Review of Self-Management Support (PRISMS) meta-review and Reducing Care Utilisation through Self-management Interventions (RECURSIVE) health economic review were commissioned to provide a systematic overview of supported self-management to inform implementation. We sought to investigate if supported asthma self-management reduces use of healthcare resources and improves asthma control; for which target groups it works; and which components and contextual factors contribute to effectiveness. Finally, we investigated the costs to healthcare services of providing supported self-management. METHODS: We undertook a meta-review (systematic overview) of systematic reviews updated with randomised controlled trials (RCTs) published since the review search dates, and health economic meta-analysis of RCTs. Twelve electronic databases were searched in 2012 (updated in 2015; pre-publication update January 2017) for systematic reviews reporting RCTs (and update RCTs) evaluating supported asthma self-management. We assessed the quality of included studies and undertook a meta-analysis and narrative synthesis. RESULTS: A total of 27 systematic reviews (n = 244 RCTs) and 13 update RCTs revealed that supported self-management can reduce hospitalisations, accident and emergency attendances and unscheduled consultations, and improve markers of control and quality of life for people with asthma across a range of cultural, demographic and healthcare settings. Core components are patient education, provision of an action plan and regular professional review. Self-management is most effective when delivered in the context of proactive long-term condition management. The total cost (n = 24 RCTs) of providing self-management support is offset by a reduction in hospitalisations and accident and emergency visits (standard mean difference 0.13, 95% confidence interval -0.09 to 0.34). CONCLUSIONS: Evidence from a total of 270 RCTs confirms that supported self-management for asthma can reduce unscheduled care and improve asthma control, can be delivered effectively for diverse demographic and cultural groups, is applicable in a broad range of clinical settings, and does not significantly increase total healthcare costs. Informed by this comprehensive synthesis of the literature, clinicians, patient-interest groups, policy-makers and providers of healthcare services should prioritise provision of supported self-management for people with asthma as a core component of routine care. SYSTEMATIC REVIEW REGISTRATION: RECURSIVE: PROSPERO CRD42012002694 ; PRISMS: PROSPERO does not register meta-reviews

    Optimal Forgeries Against Polynomial-Based MACs and GCM

    Get PDF
    Polynomial-based authentication algorithms, such as GCM and Poly1305, have seen widespread adoption in practice. Due to their importance, a significant amount of attention has been given to understanding and improving both proofs and attacks against such schemes. At EUROCRYPT 2005, Bernstein published the best known analysis of the schemes when instantiated with PRPs, thereby establishing the most lenient limits on the amount of data the schemes can process per key. A long line of work, initiated by Handschuh and Preneel at CRYPTO 2008, finds the best known attacks, advancing our understanding of the fragility of the schemes. Yet surprisingly, no known attacks perform as well as the predicted worst-case attacks allowed by Bernstein\u27s analysis, nor has there been any advancement in proofs improving Bernstein\u27s bounds, and the gap between attacks and analysis is significant. We settle the issue by finding a novel attack against polynomial-based authentication algorithms using PRPs, and combine it with new analysis, to show that Bernstein\u27s bound, and our attacks, are optimal

    Alloplastische Implantate in der Kopf- und Halschirurgie.

    Get PDF
    corecore