55 research outputs found

    On alternative approach for verifiable secret sharing

    Get PDF
    Secret sharing allows split/distributed control over the secret (e.g. master key). Verifiable secret sharing (VSS) is the secret sharing extended by verification capacity. Usually verification comes at the price. We propose "free lunch", the approach that allows to overcome this inconvenience.Comment: This is poster that was presented on ESORICS2002 conference in Zurich. It consists of 4 color pages, with proposal and flowchart

    Estimating the volatility of property assets

    Get PDF
    When an investor is allocating assets between equities, bonds and property, this allocation needs to provide a portfolio with an appropriate risk/return trade-off: for instance, a pension scheme may prefer a robust portfolio that holds its aggregate value in a number of different situations. In order to do this, some estimate needs to be made of the volatility or uncertainty in the property assets, in order to use that in the same way as the volatilities of equities and bonds are used in the allocation. However, property assets are only valued monthly or quarterly (and are sold only rarely) whereas equities and bonds are priced continuously and recorded daily. Currently many actuaries may assume that the volatility of property assets is between those of equities and bonds, but without quantifying it from real data. The challenge for the Study Group is to produce a model for estimating the volatility or uncertainty in property asset values, for use in portfolio planning. The Study Group examined contexts for the use of volatility estimates, particularly in relation to solvency calculations as required by the Financial Services Authority, fund trustees and corporate boards, and it proposed a number of possible approaches. This report summarises that work, and it suggests directions for further investigation

    Cryptographic techniques used to provide integrity of digital content in long-term storage

    Get PDF
    The main objective of the project was to obtain advanced mathematical methods to guarantee the verification that a required level of data integrity is maintained in long-term storage. The secondary objective was to provide methods for the evaluation of data loss and recovery. Additionally, we have provided the following initial constraints for the problem: a limitation of additional storage space, a minimal threshold for desired level of data integrity and a defined probability of a single-bit corruption. With regard to the main objective, the study group focused on the exploration methods based on hash values. It has been indicated that in the case of tight constraints, suggested by PWPW, it is not possible to provide any method based only on the hash values. This observation stems from the fact that the high probability of bit corruption leads to unacceptably large number of broken hashes, which in turn stands in contradiction with the limitation for additional storage space. However, having loosened the initial constraints to some extent, the study group has proposed two methods that use only the hash values. The first method, based on a simple scheme of data subdivision in disjoint subsets, has been provided as a benchmark for other methods discussed in this report. The second method ("hypercube" method), introduced as a type of the wider class of clever-subdivision methods, is built on the concept of rewriting data-stream into a n-dimensional hypercube and calculating hash values for some particular (overlapping) sections of the cube. We have obtained interesting results by combining hash value methods with error-correction techniques. The proposed framework, based on the BCH codes, appears to have promising properties, hence further research in this field is strongly recommended. As a part of the report we have also presented features of secret sharing methods for the benefit of novel distributed data-storage scenarios. We have provided an overview of some interesting aspects of secret sharing techniques and several examples of possible applications
    • …
    corecore