689 research outputs found

    Forward-secure hierarchical predicate encryption

    Get PDF
    Secrecy of decryption keys is an important pre-requisite for security of any encryption scheme and compromised private keys must be immediately replaced. \emph{Forward Security (FS)}, introduced to Public Key Encryption (PKE) by Canetti, Halevi, and Katz (Eurocrypt 2003), reduces damage from compromised keys by guaranteeing confidentiality of messages that were encrypted prior to the compromise event. The FS property was also shown to be achievable in (Hierarchical) Identity-Based Encryption (HIBE) by Yao, Fazio, Dodis, and Lysyanskaya (ACM CCS 2004). Yet, for emerging encryption techniques, offering flexible access control to encrypted data, by means of functional relationships between ciphertexts and decryption keys, FS protection was not known to exist.\smallskip In this paper we introduce FS to the powerful setting of \emph{Hierarchical Predicate Encryption (HPE)}, proposed by Okamoto and Takashima (Asiacrypt 2009). Anticipated applications of FS-HPE schemes can be found in searchable encryption and in fully private communication. Considering the dependencies amongst the concepts, our FS-HPE scheme implies forward-secure flavors of Predicate Encryption and (Hierarchical) Attribute-Based Encryption.\smallskip Our FS-HPE scheme guarantees forward security for plaintexts and for attributes that are hidden in HPE ciphertexts. It further allows delegation of decrypting abilities at any point in time, independent of FS time evolution. It realizes zero-inner-product predicates and is proven adaptively secure under standard assumptions. As the ``cross-product" approach taken in FS-HIBE is not directly applicable to the HPE setting, our construction resorts to techniques that are specific to existing HPE schemes and extends them with what can be seen as a reminiscent of binary tree encryption from FS-PKE

    TAPESTRY:A Blockchain based Service for Trusted Interaction Online

    Get PDF
    We present a novel blockchain based service for proving the provenance of online digital identity, exposed as an assistive tool to help non-expert users make better decisions about whom to trust online. Our service harnesses the digital personhood (DP); the longitudinal and multi-modal signals created through users' lifelong digital interactions, as a basis for evidencing the provenance of identity. We describe how users may exchange trust evidence derived from their DP, in a granular and privacy-preserving manner, with other users in order to demonstrate coherence and longevity in their behaviour online. This is enabled through a novel secure infrastructure combining hybrid on- and off-chain storage combined with deep learning for DP analytics and visualization. We show how our tools enable users to make more effective decisions on whether to trust unknown third parties online, and also to spot behavioural deviations in their own social media footprints indicative of account hijacking.Comment: Submitted to IEEE TSC Special Issue on Blockchain Services, May 201

    Repression of the auxin response pathway increases Arabidopsis susceptibility to necrotrophic fungi

    Full text link
    In plants, resistance to necrotrophic pathogens depends on the interplay between different hormone systems, such as those regulated by salicylic acid (SA), jasmonic acid (JA), ethylene, and abscisic acid. Repression of auxin signaling by the SA pathway was recently shown to contribute to antibacterial resistance. Here, we demonstrate that Arabidopsis auxin signaling mutants axr1, axr2, and axr6 that have defects in the auxin-stimulated SCF (Skp1¿Cullin¿ F-box) ubiquitination pathway exhibit increased susceptibility to the necrotrophic fungi Plectosphaerella cucumerina and Botrytis cinerea. Also, stabilization of the auxin transcriptional repressor AXR3 that is normally targeted for removal by the SCF-ubiquitin/proteasome machinery occurs upon P. cucumerina infection. Pharmacological inhibition of auxin transport or proteasome function each compromise necrotroph resistance of wild-type plants to a similar extent as in non-treated auxin response mutants. These results suggest that auxin signaling is important for resistance to the necrotrophic fungi P. cucumerina and B. cinerea. SGT1b (one of two Arabidopsis SGT1 genes encoding HSP90/HSC70 co-chaperones) promotes the functions of SCF E3-ubiquitin ligase complexes in auxin and JA responses and resistance conditioned by certain Resistance (R) genes to biotrophic pathogens. We find that sgt1b mutants are as resistant to P. cucumerina as wild-type plants. Conversely, auxin/SCF signaling mutants are uncompromised in RPP4-triggered resistance to the obligate biotrophic oomycete, Hyaloperonospora parasitica. Thus, the predominant action of SGT1b in R gene-conditioned resistance to oomycetes appears to be at a site other than assisting SCF E3-ubiquitin ligases. However, genetic additivity of sgt1b axr1 double mutants in susceptibility to H. parasitica suggests that SCF-mediated ubiquitination contributes to limiting biotrophic pathogen colonization once plant¿pathogen compatibility is established

    Phyllosphere microbiology with special reference to diversity and plant genotype

    Get PDF
    The phyllosphere represents the habitat provided by the aboveground parts of plants, and on a global scale supports a large and complex microbial community. Microbial interactions in the phyllosphere can affect the fitness of plants in natural communities, the productivity of agricultural crops, and the safety of horticultural produce for human consumption. The structure of phyllosphere communities reflects immigration, survival and growth of microbial colonists, which is influenced by numerous environmental factors in addition to leaf physico-chemical properties. The recent use of culture-independent techniques has demonstrated considerable previously unrecognized diversity in phyllosphere bacterial communities. Furthermore, there is significant recent evidence that plant genotype can play a major role in determining the structure of phyllosphere microbial communities. The main aims of this review are: (i) to discuss the diversity of phyllosphere microbial populations; (ii) to consider the processes by which microbes colonize the phyllosphere; (iii) to address the leaf characteristics and environmental factors that determine the survival and growth of colonists; (iv) to discuss microbial adaptations that allow establishment in the phyllosphere habitat and (v) to evaluate evidence for plant genotypic control of phyllosphere communities. Finally, we suggest approaches and priority areas for future research on phyllosphere microbiology

    Authenticated wireless roaming via tunnels : making mobile guests feel at home

    Get PDF
    In wireless roaming a mobile device obtains a service from some foreign network while being registered for the similar service at its own home network. However, recent proposals try to keep the service provider role behind the home network and let the foreign network create a tunnel connection through which all service requests of the mobile device are sent to and answered directly by the home network. Such Wireless Roaming via Tunnels (WRT) others several (security) benefits but states also new security challenges on authentication and key establishment, as the goal is not only to protect the end-to-end communication between the tunnel peers but also the tunnel itself. In this paper we formally specify mutual authentication and key establishment goals for WRT and propose an efficient and provably secure protocol that can be used to secure such roaming session. Additionally, we describe some modular protocol extensions to address resistance against DoS attacks, anonymity of the mobile device and unlinkability of its roaming sessions, as well as the accounting claims of the foreign network in commercial scenarios

    Wide-Eyed

    Get PDF

    Key agreement for heterogeneous mobile ad-hoc groups

    Full text link
    Security of various group-oriented applications for mobile ad-hoc groups requires a group secret shared between all participants. Contributory Group Key Agreement (CGKA) protocols can be used in mobile ad-hoc scenarios due to the absence of any trusted central authority (group manager) that actively participates in the computation of the group key. Members of spontaneously formed mobile ad-hoc groups are usually equipped with different kinds of mobile devices with varying performance capabilities. This heterogeneity opens new ways for the design of CGKA protocols and states additional security requirements with regard to the trustworthiness of the devices. In this paper we propose a CGKA protocol for mobile ad hoc groups that fairly distributes the computation costs amongst mobile devices by taking into account their performance limitations and preventing possible cheating through Trusted Computing techniques

    Study of the plutino object (208996) 2003 AZ84 from stellar occultations: size, shape and topographic features

    Full text link
    We present results derived from four stellar occultations by the plutino object (208996) 2003~AZ84_{84}, detected at January 8, 2011 (single-chord event), February 3, 2012 (multi-chord), December 2, 2013 (single-chord) and November 15, 2014 (multi-chord). Our observations rule out an oblate spheroid solution for 2003~AZ84_{84}'s shape. Instead, assuming hydrostatic equilibrium, we find that a Jacobi triaxial solution with semi axes (470±20)×(383±10)×(245±8)(470 \pm 20) \times (383 \pm 10) \times (245 \pm 8)~km % axis ratios b/a=0.82±0.05b/a= 0.82 \pm 0.05 and c/a=0.52±0.02c/a= 0.52 \pm 0.02, can better account for all our occultation observations. Combining these dimensions with the rotation period of the body (6.75~h) and the amplitude of its rotation light curve, we derive a density ρ=0.87±0.01\rho=0.87 \pm 0.01~g~cm3^{-3} a geometric albedo pV=0.097±0.009p_V= 0.097 \pm 0.009. A grazing chord observed during the 2014 occultation reveals a topographic feature along 2003~AZ84_{84}'s limb, that can be interpreted as an abrupt chasm of width 23\sim 23~km and depth >8> 8~km or a smooth depression of width 80\sim 80~km and depth 13\sim 13~km (or an intermediate feature between those two extremes)

    The Centurion 18 telescope of the Wise Observatory

    Full text link
    We describe the second telescope of the Wise Observatory, a 0.46-m Centurion 18 (C18) installed in 2005, which enhances significantly the observing possibilities. The telescope operates from a small dome and is equipped with a large-format CCD camera. In the last two years this telescope was intensively used in a variety of monitoring projects. The operation of the C18 is now automatic, requiring only start-up at the beginning of a night and close-down at dawn. The observations are mostly performed remotely from the Tel Aviv campus or even from the observer's home. The entire facility was erected for a component cost of about 70k$ and a labor investment of a total of one man-year. We describe three types of projects undertaken with this new facility: the measurement of asteroid light variability with the purpose of determining physical parameters and binarity, the following-up of transiting extrasolar planets, and the study of AGN variability. The successful implementation of the C18 demonstrates the viability of small telescopes in an age of huge light-collectors, provided the operation of such facilities is very efficient.Comment: 16 pages, 13 figures, some figures quality was degraded, accepted for publication in Astrophysics and Space Scienc
    corecore