463 research outputs found

    Security and Efficiency Analysis of the Hamming Distance Computation Protocol Based on Oblivious Transfer

    Get PDF
    open access articleBringer et al. proposed two cryptographic protocols for the computation of Hamming distance. Their first scheme uses Oblivious Transfer and provides security in the semi-honest model. The other scheme uses Committed Oblivious Transfer and is claimed to provide full security in the malicious case. The proposed protocols have direct implications to biometric authentication schemes between a prover and a verifier where the verifier has biometric data of the users in plain form. In this paper, we show that their protocol is not actually fully secure against malicious adversaries. More precisely, our attack breaks the soundness property of their protocol where a malicious user can compute a Hamming distance which is different from the actual value. For biometric authentication systems, this attack allows a malicious adversary to pass the authentication without knowledge of the honest user's input with at most O(n)O(n) complexity instead of O(2n)O(2^n), where nn is the input length. We propose an enhanced version of their protocol where this attack is eliminated. The security of our modified protocol is proven using the simulation-based paradigm. Furthermore, as for efficiency concerns, the modified protocol utilizes Verifiable Oblivious Transfer which does not require the commitments to outputs which improves its efficiency significantly

    Maximising transparency in a doctoral thesis: The complexities of writing about the use of QSR*NVIVO within a grounded theory study

    Get PDF
    This paper discusses the challenges of how to provide a transparent account of the use of the software programme QSR*NVIVO (QSR 2000) within a Grounded Theory framework (Glaser and Strauss 1967; Strauss and Corbin 1998). Psychology students are increasingly pursuing qualitative research projects such to the extent that the UK Economic and Social Research Council (ESRC) advise that students should have skill in the use of computer assisted qualitative data analysis software (CAQDAS) (Economic and Social Research Council 2001). Unlike quantitative studies, rigid formulae do not exist for writing-up qualitative projects for doctoral theses. Most authors, however, agree that transparency is essential when communicating the findings of qualitative research. Sparkes (2001) recommends that evaluative criteria for qualitative research should be commensurable with the aims, objectives, and epistemological assumptions of the research project. Likewise, the use of CAQDAS should vary according to the research methodology followed, and thus researchers should include a discussion of how CAQDAS was used. This paper describes how the evolving process of coding data, writing memos, categorising, and theorising were integrated into the written thesis. The structure of the written document is described including considerations about restructuring and the difficulties of writing about an iterative process within a linear document

    Recent developments on micrometric fission chambers for high neutron fluxes

    No full text
    ISBN 9781424452071International audiencewith the development of innovative nuclear systems and new generation neutron sources, the nuclear instrumentation should be adapted. Since several years, we developed microscopic fission chambers to study the transmutation of minor actinides in high thermal-neutron fluxes. The recent developments done to fulfill the drastic conditions of irradiations are described in this paper together with the feedback from the measurements. Two installations were used: the HFR of the ILL for its highest thermal neutron flux of the world and the MEGAPIE target which was the first 1 MW liquid Pb-Bi spallation target in the world

    Greater Expectations?

    Get PDF
    Physically Unclonable Functions (PUFs) are key tools in the construction of lightweight authentication and key exchange protocols. So far, all existing PUF-based authentication protocols follow the same paradigm: A resource-constrained prover, holding a PUF, wants to authenticate to a resource-rich verifier, who has access to a database of pre-measured PUF challenge-response pairs (CRPs). In this paper we consider application scenarios where all previous PUF-based authentication schemes fail to work: The verifier is resource-constrained (and holds a PUF), while the prover is resource-rich (and holds a CRP-database). We construct the first and efficient PUF-based authentication protocol for this setting, which we call converse PUF-based authentication. We provide an extensive security analysis against passive adversaries, show that a minor modification also allows for authenticated key exchange and propose a concrete instantiation using controlled Arbiter PUFs

    The characteristics of sexual abuse in sport: A multidimensional scaling analysis of events described in media reports

    Get PDF
    Most research on sexual abuse has been conducted within family settings (Fergusson & Mullen, 1999). In recent years, following several high profile convictions and scandals, research into sexual abuse has also encompassed institutional and community settings such as sport and the church (Gallagher, 2000; Wolfe et al., 2003). Research into sexual abuse in sport, for example, began with both prevalence studies (Kirby & Greaves, 1996; Leahy, Pretty & Tenenbaum, 2002) and qualitative analyses of the processes and experiences of athlete sexual abuse (Brackenridge, 1997; Cense & Brackenridge, 2001, Toftegaard Nielsen, 2001). From such work, descriptions of the modus operandi of abusers in sport, and the experiences and consequences for athlete victims, have been provided, informing both abuse prevention work and coach education. To date, however, no study has provided empirical support for multiple associations or identified patterns of sex offending in sport in ways that might allow comparisons with research-generated models of offending outside sport. This paper reports on an analysis of 159 cases of criminally defined sexual abuse, reported in the print media over a period of 15 years. The main aim of the study was to identify the nature of sex offending in sport focusing on the methods and locations of offences. The data were analysed using multidimensional scaling (MDS), as a data reduction method, in order to identify the underlying themes within the abuse and explore the inter-relationships of behaviour, victim and context variables. The findings indicate that there are specific themes that can be identified within the perpetrator strategies that include ‘intimate’, ‘aggressive’, and ‘’dominant’ modes of interaction. The same patterns that are described here within the specific context of sport are consistent with themes that emerge from similar behavioural analyses of rapists (Canter & Heritage, 1990; Bishopp, 2003) and child molester groups (Canter, Hughes & Kirby, 1998). These patterns show a correspondence to a broader behavioural model – the interpersonal circumplex (e.g., Leary 1957). Implications for accreditation and continuing professional education of sport psychologists are noted

    Secure biometric authentication with improved accuracy

    Get PDF
    We propose a new hybrid protocol for cryptographically secure biometric authentication. The main advantages of the proposed protocol over previous solutions can be summarised as follows: (1) potential for much better accuracy using different types of biometric signals, including behavioural ones; and (2) improved user privacy, since user identities are not transmitted at any point in the protocol execution. The new protocol takes advantage of state-of-the-art identification classifiers, which provide not only better accuracy, but also the possibility to perform authentication without knowing who the user claims to be. Cryptographic security is based on the Paillier public key encryption scheme

    Defining appropriateness in coach-athlete sexual relationships: The voice of coaches

    Get PDF
    The sporting culture, with omnipotent coaches, fierce competition for recognition and funding, and ‘win at all cost’ ethos, creates an environment conducive to sexual exploitation of athletes. Recent increased public awareness and the development of child protection policies in sport have led to the questioning of previously accepted coach-athlete relationships. This study is an exploratory investigation into male swimming coaches’ perceptions of appropriateness of coach-athlete sexual relationships. Sexual relationships with athletes under the age of 16 were unanimously considered totally inappropriate. With regard to sexual relationships with athletes above the age of consent for heterosexual sex, opinions ranged from “totally inappropriate” to “it’s a question of civil liberties.” These results are discussed in relation to how coaches have adapted their own behaviours in the face of public scrutiny but are still reluctant to restrict the rights of their fellow coaches

    Kondo Effect in a Metal with Correlated Conduction Electrons: Diagrammatic Approach

    Full text link
    We study the low-temperature behavior of a magnetic impurity which is weakly coupled to correlated conduction electrons. To account for conduction electron interactions a diagrammatic approach in the frame of the 1/N expansion is developed. The method allows us to study various consequences of the conduction electron correlations for the ground state and the low-energy excitations. We analyse the characteristic energy scale in the limit of weak conduction electron interactions. Results are reported for static properties (impurity valence, charge susceptibility, magnetic susceptibility, and specific heat) in the low-temperature limit.Comment: 16 pages, 9 figure

    Polymer depletion interaction between two parallel repulsive walls

    Get PDF
    The depletion interaction between two parallel repulsive walls confining a dilute solution of long and flexible polymer chains is studied by field-theoretic methods. Special attention is paid to self-avoidance between chain monomers relevant for polymers in a good solvent. Our direct approach avoids the mapping of the actual polymer chains on effective hard or soft spheres. We compare our results with recent Monte Carlo simulations [A. Milchev and K. Binder, Eur. Phys. J. B 3, 477 (1998)] and with experimental results for the depletion interaction between a spherical colloidal particle and a planar wall in a dilute solution of nonionic polymers [D. Rudhardt, C. Bechinger, and P. Leiderer, Phys. Rev. Lett. 81, 1330 (1998)].Comment: 17 pages, 3 figures. Final version as publishe
    • 

    corecore