239 research outputs found

    Combining Private Set-Intersection with Secure Two-Party Computation

    Get PDF
    Private Set-Intersection (PSI) is one of the most popular and practically relevant secure two-party computation (2PC) tasks. Therefore, designing special-purpose PSI protocols (which are more efficient than generic 2PC solutions) is a very active line of research. In particular, a recent line of work has proposed PSI protocols based on oblivious transfer (OT) which, thanks to recent advances in OT-extension techniques, is nowadays a very cheap cryptographic building block. Unfortunately, these protocols cannot be plugged into larger 2PC applications since in these protocols one party (by design) learns the output of the intersection. Therefore, it is not possible to perform secure post-processing of the output of the PSI protocol. In this paper we propose a novel and efficient OT-based PSI protocol that produces an encrypted output that can therefore be later used as an input to other 2PC protocols. In particular, the protocol can be used in combination with all common approaches to 2PC including garbled circuits, secret sharing and homomorphic encryption. Thus, our protocol can be combined with the right 2PC techniques to achieve more efficient protocols for computations of the form z=f(X∩Y)z=f(X\cap Y) for arbitrary functions ff

    Scalable Multi-Party Private Set-Intersection

    Get PDF
    In this work we study the problem of private set-intersection in the multi-party setting and design two protocols with the following improvements compared to prior work. First, our protocols are designed in the so-called star network topology, where a designated party communicates with everyone else, and take a new approach of leveraging the 2PC protocol of [FreedmanNP04]. This approach minimizes the usage of a broadcast channel, where our semi-honest protocol does not make any use of such a channel and all communication is via point-to-point channels. In addition, the communication complexity of our protocols scales with the number of parties. More concretely, (1) our first semi-honest secure protocol implies communication complexity that is linear in the input sizes, namely O((∑i=1nmi)⋅κ)O((\sum_{i=1}^n m_i)\cdot\kappa) bits of communication where κ\kappa is the security parameter and mim_i is the size of PiP_i\u27s input set, whereas overall computational overhead is quadratic in the input sizes only for a designated party, and linear for the rest. We further reduce this overhead by employing two types of hashing schemes. (2) Our second protocol is proven secure in the malicious setting. This protocol induces communication complexity O((n^2 + nm_\maxx + nm_\minn\log m_\maxx)\kappa) bits of communication where m_\minn (resp. m_\maxx) is the minimum (resp. maximum) over all input sets sizes and nn is the number of parties

    The perceptions of social responsibility for community resilience to flooding: the impact of past experience, age, gender and ethnicity

    Get PDF
    Community resilience to flooding depends, to a large extent, on the participation of community members to take more responsibility for enhancing their own resilience. The perception of social responsibility (SR) which is argued to be one of the antecedents influencing individual’s willingness to undertake resilient behaviours can significantly contribute to community resilience through individual and collective actions. Understanding of factors influencing the perceptions of SR of individuals within community might help with developing strategies to increase the perceptions of SR. This research explores perceptions of SR in relation to flooding for householders and local businesses and establishes their relationships with experience of flooding and demographic factors of age, gender and ethnicity. The data were obtained via a questionnaire survey of three communities in Birmingham and one community in South East London, UK, three with experience of flooding and one without. A total of 414 responses were received and used in the multiple regression analysis. The analysis identified ‘experience of flooding’, ‘age’ and ‘South Asian’ ethnic group as significant variables, suggesting that older individuals from South Asian ethnic groups with previous experience of flooding are likely to be more socially responsible than others without these attributes

    Improved Private Set Intersection against Malicious Adversaries

    Get PDF
    Private set intersection (PSI) refers to a special case of secure two-party computation in which the parties each have a set of items and compute the intersection of these sets without revealing any additional information. In this paper we present improvements to practical PSI providing security in the presence of {\em malicious} adversaries. Our starting point is the protocol of Dong, Chen \& Wen (CCS 2013) that is based on Bloom filters. We identify a bug in their malicious-secure variant and show how to fix it using a cut-and-choose approach that has low overhead while simultaneously avoiding one the main computational bottleneck in their original protocol. We also point out some subtleties that arise when using Bloom filters in malicious-secure cryptographic protocols. We have implemented our PSI protocols and report on its performance. Our improvements reduce the cost of Dong et al.\u27s protocol by a factor of 14−110×14-110\times on a single thread. When compared to the previous fastest protocol of De Cristofaro et al., we improve the running time by 8−24×8-24\times. For instance, our protocol has an online time of 14 seconds and an overall time of 2.1 minutes to securely compute the intersection of two sets of 1 million items each

    How to increase earthquake and home fire preparedness: the fix-it intervention

    Get PDF
    Published, evaluated community intervention studies concerning natural hazard preparedness are rare. Most lack a rigorous methodology, thereby hampering the development of evidence-based interventions. This paper describes the rationale and methodology of a cross-cultural, longitudinal intervention study on earthquake and home fire preparedness, termed fix-it. The aim is to evaluate whether and how the intervention brings about behaviour change in the targeted communities in two coastal cities with high seismic risk: Seattle, USA and Izmir, Turkey. Participants are adult residents of these cities. The intervention group attends a 6-h workshop, which focuses on securing items in the household. The control group does not attend the workshop. All participants complete baseline and post-intervention, as well as 3- and 12-month follow-up assessments. The primary outcome measure is an observational measure of nine preparedness items for earthquake and fire in participants’ homes. This is evaluated alongside participants’ self-reports concerning their preparedness levels. Secondary outcomes are changes in levels of self-efficacy, perceived outcome, trust, corruption, empowerment, anxiety and social cohesion. Results from the first of the studies, conducted in Seattle in September 2015, indicate that while the fix-it intervention is effective, in the longer term, multi-hazard preparedness is increased by the mere act of going into people’s homes to observe their preparedness levels along with assessing self-reported preparedness and sociopsychological orientation towards natural hazards. This protocol and study aim to augment the empirical literature on natural hazard preparedness, informing national and international policy on delivery of evidence-based community interventions to promote multi-hazard preparedness in households

    Linear Complexity Private Set Intersection for Secure Two-Party Protocols

    Get PDF
    In this paper, we propose a new private set intersection (PSI) protocol with bi-oblivious data transfer that computes the following functionality. One of the parties P1P_1 inputs a set of items XX and a set of data pairs D1={(d0j,d1j)}D_1 = \{ (d_0^j,d_1^j)\} and the other party P2P_2 inputs a set of items YY. While P1P_1 outputs nothing, P2P_2 outputs a set of data D2={dbjj∣bj∈{0,1}}D_2 = \{ d_{b_j}^j \mid b_j \in \{0,1\}\} dependent on the intersection of XX and YY. This functionality is generally required when the PSI protocol is used as a part of a larger secure two-party secure computation such as threshold PSI or any function of the whole intersecting set in general. Pinkas et al. presented a PSI protocol at Eurocrypt 2019 for this type of functionality, which has linear complexity only in communication. While there are PSI protocols with linear computation and communication complexities in the classical PSI setting where the intersection itself is revealed to one party, to the best of our knowledge, there is no PSI protocol, which outputs a function of the membership results and satisfies linear complexity in both communication and computation. We present the first PSI protocol that outputs only a function of the membership results with linear communication and computation complexities. While creating the protocol, as a side contribution, we provide a one-time batch oblivious programmable pseudo-random function based on garbled Bloom filters. We also implemented our protocol and provide performance results

    Assessment of atrial regional and global electromechanical function by tissue velocity echocardiography: a feasibility study on healthy individuals

    Get PDF
    BACKGROUND: The appropriate evaluation of atrial electrical function is only possible by means of invasive electrophysiology techniques, which are expensive and therefore not suitable for widespread use. Mechanical atrial function is mainly determined from atrial volumes and volume-derived indices that are load-dependent, time-consuming and difficult to reproduce because they are observer-dependent. AIMS: To assess the feasibility of tissue velocity echocardiography (TVE) to evaluate atrial electromechanical function in young, healthy volunteers. SUBJECTS AND METHODS: We studied 37 healthy individuals: 28 men and nine women with a mean age of 29 years (range 20–47). Standard two-dimensional (2-D) and Doppler echocardiograms with superimposed TVE images were performed. Standard echocardiographic images were digitized during three consecutive cardiac cycles in cine-loop format for off-line analysis. Several indices of regional atrial electrical and mechanical function were derived from both 2-D and TVE modalities. RESULTS: Some TVE-derived variables indirectly reflected the atrial electrical activation that follows the known activation process as revealed by invasive electrophysiology. Regionally, the atrium shows an upward movement of its walls at the region near the atrio-ventricular ring with a reduction of this movement towards the upper levels of the atrial walls. The atrial mechanical function as assessed by several TVE-derived indices was quite similar in all left atrium (LA) walls. However, all such indices were higher in the right (RA) than the LA. There were no correlations between the 2-D- and TVE-derived variables expressing atrial mechanical function. Values of measurement error and repeatability were good for atrial mechanical function, but only acceptable for atrial electrical function. CONCLUSION: TVE may provide a simple, easy to obtain, reproducible, repeatable and potentially clinically useful tool for quantifying atrial electromechanical function

    Team climate, intention to leave and turnover among hospital employees: Prospective cohort study

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>In hospitals, the costs of employee turnover are substantial and intentions to leave among staff may manifest as lowered performance. We examined whether team climate, as indicated by clear and shared goals, participation, task orientation and support for innovation, predicts intention to leave the job and actual turnover among hospital employees.</p> <p>Methods</p> <p>Prospective study with baseline and follow-up surveys (2–4 years apart). The participants were 6,441 (785 men, 5,656 women) hospital employees under the age of 55 at the time of follow-up survey. Logistic regression with generalized estimating equations was used as an analysis method to include both individual and work unit level predictors in the models.</p> <p>Results</p> <p>Among stayers with no intention to leave at baseline, lower self-reported team climate predicted higher likelihood of having intentions to leave at follow-up (odds ratio per 1 standard deviation decrease in team climate was 1.6, 95% confidence interval 1.4–1.8). Lower co-worker assessed team climate at follow-up was also association with such intentions (odds ratio 1.8, 95% confidence interval 1.4–2.4). Among all participants, the likelihood of actually quitting the job was higher for those with poor self-reported team climate at baseline. This association disappeared after adjustment for intention to leave at baseline suggesting that such intentions may explain the greater turnover rate among employees with low team climate.</p> <p>Conclusion</p> <p>Improving team climate may reduce intentions to leave and turnover among hospital employees.</p

    Socio-cognitive determinants of consumers’ support for the fair trade movement

    Get PDF
    Despite the reasonable explanatory power of existing models of consumers’ ethical decision making, a large part of the process remains unexplained. This article draws on previous research and proposes an integrated model that includes measures of the theory of planned behavior, personal norms, self-identity, neutralization, past experience, and attitudinal ambivalence. We postulate and test a variety of direct and moderating effects in the context of a large survey with a representative sample of the U.K. population. Overall, the resulting model represents an empirically robust and holistic attempt to identify the most important determinants of consumers’ support for the fair-trade movement. Implications and avenues for further research are discussed
    • …
    corecore