26 research outputs found

    A Fast and Flexible Multi-Client Functional Encryption for Set Intersection

    Get PDF
    A Multi-Client Functional Encryption (MCFE) scheme for set intersection is a cryptographic primitive that enables an evaluator to learn the intersection from all sets of a pre-determined number of clients, without need to learn the plaintext set of each individual client. In this paper, we propose a flexible version of the MCFE schemes for the set intersection, called Flexible Multi-Client Functional Encryption for Set Intersection (FMCFE). In our FMCFE scheme, the evaluator can learn the intersection from any flexible choice of sets (instead of all sets). In this regard, we redefine syntax and security notions of the MCFE schemes for the FMCFE schemes. In the literature, solving multi-client set intersection problem in polynomial time, such that only the intersection result is revealed (without additional information), is an open problem. In this paper, we propose a relaxed solution using FMCFE schemes to solve secure set intersection in polynomial time. We analyze that for practical use of secure multi-client set intersection, this relaxation is necessary. We also show that our scheme has the adaptive indistinguishability-based security under passive corruption. Our proof relies on the Symmetric eXternal Diffie-Hellman (SXDH) assumption in the standard model

    Introducing a New Evaluation Criteria for EMD-Base Steganography Method

    Full text link
    Steganography is a technique to hide the presence of secret communication. When one of the communication elements is under the influence of the enemy, it can be used. The main measure to evaluate steganography methods in a certain capacity is security. Therefore, in a certain capacity, reducing the amount of changes in the cover media, creates a higher embedding efficiency and thus more security of an steganography method. Mostly, security and capacity are in conflict with each other, the increase of one lead to the decrease of the other. The presence of a single criterion that represents security and capacity at the same time be useful in comparing steganography methods. EMD and the relevant methods are a group of steganography techniques, which optimize the amount of changes resulting from embedding (security). The present paper is aimed to provide an evaluation criterion for this group of steganography methods. In this study, after a general review and comparison of EMD-based steganography techniques, we present a method to compare them exactly, from the perspective of embedding efficiency. First, a formula is presented to determine the value of embedding efficiency, which indicates the effect of one or more changes on one or more pixels. The results demonstrate that the proposed embedding efficiency formula shows the performance of the methods better when several changes are made on a pixel compared to the existing criteria. In the second step, we have obtained an upper bound, which determines the best efficiency for each certain capacity. Finally, based on the introduced bound, another evaluation criterion for a better comparison of the methods is presented

    Security of Multi-Adjustable Join Schemes: Separations and Implications

    Get PDF
    Database management systems (DBMS) are one of cloud services with great interests in industry and business. In such services, since there is no trust in the cloud servers, the databases are encrypted prior to outsourcing. One of the most challenging issues in designing these services is supporting SQL join queries on the encrypted database. The multi-adjustable join scheme (M-Adjoin) [Khazaei-Rafiee 2019], an extension of Adjoin [Popa-Zeldovich 2012 and Mironov-Segev-Shahaf 2017], is a symmetric-key primitive that supports the join queries for a list of column labels on an encrypted database. In previous works, the following security notions were introduced for Adjoin and M-Adjoin schemes: 3Partition, M3Partition and M3P k , for every integer k . Additionally, simulation-based and indistinguishability-based security notions have been defined by Mironov et al. for Adjoin scheme. In this paper, we extend their results to M-Adjoin and study the relations between all security notions for M-Adjoin. Some non-trivial relations are proved which resolve some open problems raised by [Mironov-Segev-Shahaf 2017]

    Towards More Secure Constructions of Adjustable Join Schemes

    Get PDF
    An adjustable join (\nadjoin) scheme [Popa-Zeldovich 2012] is a symmetric-key primitive that enables a user to securely outsource his database to a server, and later to issue join queries for a pair of columns. When queries are extended to a list of columns, \tp security of Adjoin schemes [Mironov-Segev-Shahaf 2017] does not capture the expected security. To address this deficiency, we introduce the syntax and security notion of multi-adjustable join (\nmadjoin) schemes. We propose a new security notion for this purpose, which we refer to as \mtp. The \tp security of \nadjoin extends to the \mtp security of \nmadjoin in a straightforward way. The gap between \tp and \mtp is filled with a sequence \{\smtpk{k}\}_{k\in\mathbb{N}} of security definitions where \smtpk{1} and \smtpk{\infty}, respectively, correspond to \tp and \mtp. We propose constructions for achieving both \mtp and \smtpk{k} security levels. Our \mtp-secure scheme joins mm columns, each containing nn elements, in time O(nm1)\mathcal{O}(n^{m-1}). Our \smtpk{k}-secure scheme uses ideas from secret sharing in its construction and does the job in time O((m1)nk/k)\mathcal{O}((m-1)n^{k}/k) with some leakage that we refer to as kk-monotonous. It remains open if this barrier is inherent to the security definitions. Our schemes are substantially more efficient than previous ones

    The Effect of Changing Policies to Increase the Birth Rate on Reproductive Health Rate over a Twelve-Year Period in Islamshahr

    Get PDF
    Introduction: In recent years, population growth, birth rate promotion and reproductive health policies have been the main approach of population control programs. In this study, the researcher was going to investigate and got a close look to this important issue in the city of Islamshahr. The comparative study of prophylactic methods and their prevalence was conducted among fertile women in 2004 and 2016 to examine how their approach change following the changes in national policy has affected on reproductive health.Materials and Methods: Two thousand reproductive-age women who reside in Islamshahr voluntarily and confidential participated using a questionnaire. All data were analyzed using SPSS software.Results: The findings indicated that despite the decrease in contraceptive use in 2016 compared to 2004 (from 90.8% to 42%), the level of public awareness has been increased about their benefits and reproductive health So that we observed an increased awareness of sexually transmitted diseases and ways to fight them (from 27% to 56%). A decline in illegal abortion rate (from 60% to 22%) and an increase in the knowledge of appropriate lactation methods (from 25.8% to 40%) observed during the study period. Natural methods had the highest prevalence among contraceptive methods at both times of the survey. The knowledge of women about the proper methods for early marriage (from 25.3 to 11%) and emergencies showed a decrease (from 12.2% to 5.6%)

    Electronic Customer Relationship Management: Opportunities and Challenges of Digital World

    Get PDF
    Management information systems (MIS) considerably changed business processes. According to this, Electronic customer relationship management (ECRM) emerged in conjunction with evolution of traditional customer relationship management in e-business contexts. In an analogy, Electronic customer relationship management is similar to a double-edged sword i.e. it provides some opportunities for the system performers, on one side; and challenges the firms, on the other side. In this paper we are seeking for marketing opportunities such as better communication and interactions with customers as well as created choices regarding any customer data storage that ECRM offered as a potential source to benefit from firms’ competitive advantages. On the other hand, it studies the challenges including on-line channel management as well as integrating data and issues related to information technology architecture firms encounter in implementing ECRM

    Construction and Implementation of Non-Load Bearing Walls by Using Polymer-precast Panels with Plaster Matrix and Comparing Them with Existence Systems

    Get PDF
    Abstract In order to constant developing principles, use of technologies as an appropriate substitution for materials and traditional methods discussed. Meanwhile non-load bearing walls -as a part of structural main members-dedicated a great share in using of traditional methods. Expenditure and imp lementation speed, dead load and structural performance, environmental co mpatibility and pollutions min imizing, construction ease, utilizing native specialties, using national interior resources and easiness in transportation and displacing considered in modern toward traditional method. Precast plaster panels produced in Australia in early 1990's and then utilized by other countries (India & China). In this regard, widespread researches on plaster materials and their applications in construction industry were in itiated in Industrial university of Amirkabir since 1999 & poly mer precast panels with plaster matrix in 50cm width, 10cm depth, and floor up to roof-integrated height and with a hollow section, as a industrial solution been studied and successfully passed the semi-industrial production. In this paper introducing of production manner of th is panels & surveying & co mparing with non-loading bearing walls traditional method in industrializing frame been presented

    A Case Study of Water Quality Modeling of the Gargar River, Iran

    Get PDF
    Human activities in the recent years have considerably increased the rate of water pollution in many regions of the world. In this case study, the main sources of wastewater discharging into the Gargar River were identified. Using river and point source flow rates and water quality parameters measured along the river, the river water quality was simulated using a commonly used, one-dimensional water quality model, the QUAL2K model. Simulated values of DO, CBOD, NH4-N and NO3-N demonstrated the accuracy of the model and despite a significant data shortage in the study area, QUAL2K model was found to be an acceptable tool for the assessment of water quality. Still, for this case study, it was found that the model was most sensitive to river and point source flows and moderate to fast CBOD oxidation, and nitrification rates

    Physicians’ and nurses’ decision making to encounter neonates with poor prognosis in the neonatal intensive care unit

    Get PDF
    This is an Accepted Manuscript of an article published by Sage in Clinical Ethics on 03/06/2020. Available online: https://journals.sagepub.com/doi/abs/10.1177/1477750920927173This is an Accepted Manuscript of an article published by Sage in Clinical Ethics on 03/06/2020.Available online: https://journals.sagepub.com/doi/abs/10.1177/1477750920927173acceptedVersio

    The global burden of adolescent and young adult cancer in 2019 : a systematic analysis for the Global Burden of Disease Study 2019

    Get PDF
    Background In estimating the global burden of cancer, adolescents and young adults with cancer are often overlooked, despite being a distinct subgroup with unique epidemiology, clinical care needs, and societal impact. Comprehensive estimates of the global cancer burden in adolescents and young adults (aged 15-39 years) are lacking. To address this gap, we analysed results from the Global Burden of Diseases, Injuries, and Risk Factors Study (GBD) 2019, with a focus on the outcome of disability-adjusted life-years (DALYs), to inform global cancer control measures in adolescents and young adults. Methods Using the GBD 2019 methodology, international mortality data were collected from vital registration systems, verbal autopsies, and population-based cancer registry inputs modelled with mortality-to-incidence ratios (MIRs). Incidence was computed with mortality estimates and corresponding MIRs. Prevalence estimates were calculated using modelled survival and multiplied by disability weights to obtain years lived with disability (YLDs). Years of life lost (YLLs) were calculated as age-specific cancer deaths multiplied by the standard life expectancy at the age of death. The main outcome was DALYs (the sum of YLLs and YLDs). Estimates were presented globally and by Socio-demographic Index (SDI) quintiles (countries ranked and divided into five equal SDI groups), and all estimates were presented with corresponding 95% uncertainty intervals (UIs). For this analysis, we used the age range of 15-39 years to define adolescents and young adults. Findings There were 1.19 million (95% UI 1.11-1.28) incident cancer cases and 396 000 (370 000-425 000) deaths due to cancer among people aged 15-39 years worldwide in 2019. The highest age-standardised incidence rates occurred in high SDI (59.6 [54.5-65.7] per 100 000 person-years) and high-middle SDI countries (53.2 [48.8-57.9] per 100 000 person-years), while the highest age-standardised mortality rates were in low-middle SDI (14.2 [12.9-15.6] per 100 000 person-years) and middle SDI (13.6 [12.6-14.8] per 100 000 person-years) countries. In 2019, adolescent and young adult cancers contributed 23.5 million (21.9-25.2) DALYs to the global burden of disease, of which 2.7% (1.9-3.6) came from YLDs and 97.3% (96.4-98.1) from YLLs. Cancer was the fourth leading cause of death and tenth leading cause of DALYs in adolescents and young adults globally. Interpretation Adolescent and young adult cancers contributed substantially to the overall adolescent and young adult disease burden globally in 2019. These results provide new insights into the distribution and magnitude of the adolescent and young adult cancer burden around the world. With notable differences observed across SDI settings, these estimates can inform global and country-level cancer control efforts. Copyright (C) 2021 The Author(s). Published by Elsevier Ltd.Peer reviewe
    corecore