1,009 research outputs found

    Blackbox secret sharing revisited: A coding-theoretic approach with application to expansionless near-threshold schemes

    Get PDF
    A blackbox secret sharing (BBSS) scheme works in exactly the same way for all finite Abelian groups G; it can be instantiated for any such group G and only black-box access to its group operations and to random group elements is required. A secret is a single group element and each of the n players’ shares is a vector of such elements. Share-computation and secret-reconstruction is by integer linear combinations. These do not depend on G, and neither do the privacy and reconstruction parameters t, r. This classical, fundamental primitive was introduced by Desmedt and Frankel (CRYPTO 1989) in their context of “threshold cryptography.” The expansion factor is the total number of group elements in a full sharing divided by n. For threshold BBSS with t-privacy (Formula presented)-reconstruction and arbitrary n, constructions with minimal expansion (Formula presented) exist (CRYPTO 2002, 2005). These results are firmly rooted in number theory; each makes (different) judicious choices of orders in number fields admitting a vector of elements of very large length (in the number field degree) whose corresponding Vandermonde-determinant is sufficiently controlled so as to enable BBSS by a suitable adaptation of Shamir’s scheme. Alternative approaches generally lead to very large expansion. The state of the art of BBSS has not changed for the last 17 years. Our contributions are two-fold. (1) We introduce a novel, nontrivial, effective construction of BBSS based on coding theory instead of number theory. For threshold-BBSS we also achieve minimal expansion factor O(log n).(2) Our method is more versatile. Namely, we show, for the first time, BBSS that is near-threshold, i.e., r-t is an arbitrarily small constant fraction of n, and that has expansion factor O(1), i.e., individual share-vectors of constant length (“asymptotically expansionless”). Threshold can be concentrated essentially freely across full range. We also show expansion is minimal for near-threshold and that such BBSS cannot be attained by previous methods. Our general construction is based on a well-known mathematical principle, the local-global principle. More precisely, we first construct BBSS over local rings through either Reed-Solomon or algebraic geometry codes. We then “glue” these schemes together in a dedicated manner to obtain a global secret sharing scheme, i.e., defined over the integers, which, as we finally prove using novel insights, has the desired BBSS properties. Though our main purpose here is advancing BBSS for its own sake, we also briefly address possible protocol applications

    Mind-body interventions for vasomotor symptoms in healthy menopausal women and breast cancer survivors. A systematic review

    Get PDF
    Mind–body therapies are commonly recommended to treat vasomotor symptoms, such as hot flushes and night sweats (HFNS). The purpose of this systematic review was to evaluate the available evidence to date for the efficacy of different mind–body therapies to alleviate HFNS in healthy menopausal women and breast cancer survivors. Randomized controlled trials (RCTs) were identified using seven electronic search engines, direct searches of specific journals and backwards searches through reference lists of related publications. Outcome measures included HFNS frequency and/or severity or self-reported problem rating at post-treatment. The methodological quality of all studies was systematically assessed using predefined criteria. Twenty-six RCTs met the inclusion criteria. Interventions included yoga (n = 5), hypnosis (n = 3), mindfulness (n = 2), relaxation (n = 7), paced breathing (n = 4), reflexology (n = 1) and cognitive behavioural therapy (CBT) (n = 4). Findings were consistent for the effectiveness of CBT and relaxation therapies for alleviating troublesome vasomotor symptoms. For the remaining interventions, although some trials indicated beneficial effects (within groups) at post-treatment and/or follow up, between group findings were mixed and overall, methodological differences across studies failed to provide convincing supporting evidence. Collectively, findings suggest that interventions that include breathing and relaxation techniques, as well as CBT, can be beneficial for alleviating vasomotor symptoms. Additional large, methodologically rigorous trials are needed to establish the efficacy of interventions on vasomotor symptoms, examine long-term outcomes and understand how they work

    Cloud-assisted Asynchronous Key Transport with Post-Quantum Security

    Get PDF
    In cloud-based outsourced storage systems, many users wish to securely store their files for later retrieval, and additionally to share them with other users. These retrieving users may not be online at the point of the file upload, and in fact they may never come online at all. In this asynchoronous environment, key transport appears to be at odds with any demands for forward secrecy. Recently, Boyd et al. (ISC 2018) presented a protocol that allows an initiator to use a modified key encapsulation primitive, denoted a blinded KEM (BKEM), to transport a file encryption key to potentially many recipients via the (untrusted) storage server, in a way that gives some guarantees of forward secrecy. Until now all known constructions of BKEMs are built using RSA and DDH, and thus are only secure in the classical setting. We further the understanding of the use of blinding in post-quantum cryptography in two aspects. First, we show how to generically build blinded KEMs from homomorphic encryption schemes with certain properties. Second, we construct the first post-quantum secure blinded KEMs, and the security of our constructions are based on hard lattice problems

    Translation of evidence-based Assistive Technologies into stroke rehabilitation: Users' perceptions of the barriers and opportunities

    Get PDF
    Background: Assistive Technologies (ATs), defined as "electrical or mechanical devices designed to help people recover movement", demonstrate clinical benefits in upper limb stroke rehabilitation; however translation into clinical practice is poor. Uptake is dependent on a complex relationship between all stakeholders. Our aim was to understand patients', carers' (P&Cs) and healthcare professionals' (HCPs) experience and views of upper limb rehabilitation and ATs, to identify barriers and opportunities critical to the effective translation of ATs into clinical practice. This work was conducted in the UK, which has a state funded healthcare system, but the findings have relevance to all healthcare systems. Methods. Two structurally comparable questionnaires, one for P&Cs and one for HCPs, were designed, piloted and completed anonymously. Wide distribution of the questionnaires provided data from HCPs with experience of stroke rehabilitation and P&Cs who had experience of stroke. Questionnaires were designed based on themes identified from four focus groups held with HCPs and P&Cs and piloted with a sample of HCPs (N = 24) and P&Cs (N = 8). Eight of whom (four HCPs and four P&Cs) had been involved in the development. Results: 292 HCPs and 123 P&Cs questionnaires were analysed. 120 (41%) of HCP and 79 (64%) of P&C respondents had never used ATs. Most views were common to both groups, citing lack of information and access to ATs as the main reasons for not using them. Both HCPs (N = 53 [34%]) and P&C (N = 21 [47%]) cited Functional Electrical Stimulation (FES) as the most frequently used AT. Research evidence was rated by HCPs as the most important factor in the design of an ideal technology, yet ATs they used or prescribed were not supported by research evidence. P&Cs rated ease of set-up and comfort more highly. Conclusion: Key barriers to translation of ATs into clinical practice are lack of knowledge, education, awareness and access. Perceptions about arm rehabilitation post-stroke are similar between HCPs and P&Cs. Based on our findings, improvements in AT design, pragmatic clinical evaluation, better knowledge and awareness and improvement in provision of services will contribute to better and cost-effective upper limb stroke rehabilitation. © 2014 Hughes et al.; licensee BioMed Central Ltd

    Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts

    Get PDF
    We provide a tight security proof for an IND-CCA Ring-LWE based Key Encapsulation Mechanism that is derived from a generic construction of Dent (IMA Cryptography and Coding, 2003). Such a tight reduction is not known for the generic construction. The resulting scheme has shorter ciphertexts than can be achieved with other generic constructions of Dent or by using the well-known Fujisaki-Okamoto constructions (PKC 1999, Crypto 1999). Our tight security proof is obtained by reducing to the security of the underlying Ring-LWE problem, avoiding an intermediate reduction to a CPA-secure encryption scheme. The proof technique maybe of interest for other schemes based on LWE and Ring-LWE

    The Rewiring of Ubiquitination Targets in a Pathogenic Yeast Promotes Metabolic Flexibility, Host Colonization and Virulence

    Get PDF
    Funding: This work was funded by the European Research Council [http://erc.europa.eu/], AJPB (STRIFE Advanced Grant; C-2009-AdG-249793). The work was also supported by: the Wellcome Trust [www.wellcome.ac.uk], AJPB (080088, 097377); the UK Biotechnology and Biological Research Council [www.bbsrc.ac.uk], AJPB (BB/F00513X/1, BB/K017365/1); the CNPq-Brazil [http://cnpq.br], GMA (Science without Borders fellowship 202976/2014-9); and the National Centre for the Replacement, Refinement and Reduction of Animals in Research [www.nc3rs.org.uk], DMM (NC/K000306/1). The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript. Acknowledgments We thank Dr. Elizabeth Johnson (Mycology Reference Laboratory, Bristol) for providing strains, and the Aberdeen Proteomics facility for the biotyping of S. cerevisiae clinical isolates, and to Euroscarf for providing S. cerevisiae strains and plasmids. We are grateful to our Microscopy Facility in the Institute of Medical Sciences for their expert help with the electron microscopy, and to our friends in the Aberdeen Fungal Group for insightful discussions.Peer reviewedPublisher PD

    On the statistical leak of the GGH13 multilinear map and some variants

    Get PDF
    At EUROCRYPT 2013, Garg, Gentry and Halevi proposed a candidate construction (later referred as GGH13) of cryptographic multilinear map (MMap). Despite weaknesses uncovered by Hu and Jia (EUROCRYPT 2016), this candidate is still used for designing obfuscators.The naive version of the GGH13 scheme was deemed susceptible to averaging attacks, i.e., it could suffer from a statistical leak (yet no precise attack was described). A variant was therefore devised, but it remains heuristic. Recently, to obtain MMaps with low noise and modulus, two variants of this countermeasure were developed by Döttling et al. (EPRINT:2016/599).In this work, we propose a systematic study of this statistical leakage for all these GGH13 variants. In particular, we confirm the weakness of the naive version o

    Shot noise in mesoscopic systems

    Get PDF
    This is a review of shot noise, the time-dependent fluctuations in the electrical current due to the discreteness of the electron charge, in small conductors. The shot-noise power can be smaller than that of a Poisson process as a result of correlations in the electron transmission imposed by the Pauli principle. This suppression takes on simple universal values in a symmetric double-barrier junction (suppression factor 1/2), a disordered metal (factor 1/3), and a chaotic cavity (factor 1/4). Loss of phase coherence has no effect on this shot-noise suppression, while thermalization of the electrons due to electron-electron scattering increases the shot noise slightly. Sub-Poissonian shot noise has been observed experimentally. So far unobserved phenomena involve the interplay of shot noise with the Aharonov-Bohm effect, Andreev reflection, and the fractional quantum Hall effect.Comment: 37 pages, Latex, 10 figures (eps). To be published in "Mesoscopic Electron Transport," edited by L. P. Kouwenhoven, G. Schoen, and L. L. Sohn, NATO ASI Series E (Kluwer Academic Publishing, Dordrecht

    The UK Pharmacy Care Plan service: Description, recruitment and initial views on a new community pharmacy intervention

    Get PDF
    Introduction: The UK government advocates person-centred healthcare which is ideal for supporting patients to make appropriate lifestyle choices and to address non-adherence. The Community Pharmacy Future group, a collaboration between community pharmacy companies and independents in the UK, introduced a person-centred service for patients with multiple long-term conditions in 50 pharmacies in Northern England. Objective: Describe the initial findings from the set up and delivery of a novel community pharmacy-based person-centred service. Method: Patients over fifty years of age prescribed more than one medicine including at least one for cardiovascular disease or diabetes were enrolled. Medication review and person-centred consultation resulted in agreed health goals and steps towards achieving them. Data were collated and analysed to determine appropriateness of patient recruitment process and quality of outcome data collection. A focus group of seven pharmacists was used to ascertain initial views on the service. Results: Within 3 months of service initiation, 683 patients had baseline clinical data recorded, of which 86.9% were overweight or obese, 53.7% had hypertension and 80.8% had high cardiovascular risk. 544 (77.2%) patients set at least one goal during the first consultation with 120 (22.1%) setting multiple goals. A majority of patients identified their goals as improvement in condition, activity or quality of life. Pharmacists could see the potential patient benefit and the extended role opportunities the service provided. Allowing patients to set their own goals occasionally identified gaps to be addressed in pharmacist knowledge. Conclusion: Pharmacists successfully recruited a large number of patients who were appropriate for such a service. Patients were willing to identify goals with the pharmacist, the majority of which, if met, may result in improvements in quality of life. While challenges in delivery were acknowledged, allowing patients to identify their own personalised goals was seen as a positive approach to providing patient services
    • 

    corecore