60 research outputs found

    All or Nothing at All

    Get PDF
    We continue a study of unconditionally secure all-or-nothing transforms (AONT) begun in \cite{St}. An AONT is a bijective mapping that constructs s outputs from s inputs. We consider the security of t inputs, when s-t outputs are known. Previous work concerned the case t=1; here we consider the problem for general t, focussing on the case t=2. We investigate constructions of binary matrices for which the desired properties hold with the maximum probability. Upper bounds on these probabilities are obtained via a quadratic programming approach, while lower bounds can be obtained from combinatorial constructions based on symmetric BIBDs and cyclotomy. We also report some results on exhaustive searches and random constructions for small values of s.Comment: 23 page

    Design of Self-Healing Key Distribution Schemes

    Get PDF
    A self-healing key distribution scheme enables dynamic groups of users of an unreliable network to establish group keys for secure communication. In such a scheme, a group manager, at the beginning of each session, in order to provide a key to each member of the group, sends packets over a broadcast channel. Every user, belonging to the group, computes the group key by using the packets and some private information. The group manager can start multiple sessions during a certain time-interval, by adding/removing users to/from the initial group. The main property of the scheme is that, if during a certain session some broadcasted packet gets lost, then users are still capable of recovering the group key for that session simply by using the packets they have received during a previous session and the packets they will receive at the beginning of a subsequent one, without requesting additional transmission from the group manager. Indeed, the only requirement that must be satisfied, in order for the user to recover the lost keys, is membership in the group both before and after the sessions in which the broadcast messages containing the keys are sent. This novel and appealing approach to key distribution is quite suitable in certain military applications and in several Internet-related settings, where high security requirements need to be satisfied. In this paper we continue the study of self-healing key distribution schemes, introduced by Staddon et al. [37]. We analyze some existing constructions: we show an attack that can be applied to one of these constructions, in order to recover session keys, and two problems in another construction. Then, we present a new mechanism for implementing the self-healing approach, and we present an efficient construction which is optimal in terms of user memory storage. Finally, we extend the self-healing approach to key distribution, and we present a scheme which enables a user to recover from a single broadcast message all keys associated with sessions in which he is member of the communication group

    On Unconditionally Secure Distributed Oblivious Transfer.

    Get PDF
    This paper is about the Oblivious Transfer in the distributed model proposed by M. Naor and B. Pinkas. In this setting a Sender has n secrets and a Receiver is interested in one of them. During a set up phase, the Sender gives information about the secrets to m Servers. Afterwards, in a recovering phase, the Receiver can compute the secret she wishes by interacting with any k of them. More precisely, from the answers received she computes the secret in which she is interested but she gets no information on the others and, at the same time, any coalition of k − 1 Servers can neither compute any secret nor figure out which one the Receiver has recovered. We present an analysis and new results holding for this model: lower bounds on the resources required to implement such a scheme (i.e., randomness, memory storage, communication complexity); some impossibility results for one-round distributed oblivi- ous transfer protocols; two polynomial-based constructions implementing 1-out-of-n dis- tributed oblivious transfer, which generalize and strengthen the two constructions for 1-out-of-2 given by Naor and Pinkas; as well as new one-round and two-round distributed oblivious transfer protocols, both for threshold and general access structures on the set of Servers, which are optimal with respect to some of the given bounds. Most of these constructions are basically combinatorial in nature

    Safety of a 3-weekly schedule of carboplatin plus pegylated liposomal doxorubicin as first line chemotherapy in patients with ovarian cancer: preliminary results of the MITO-2 randomized trial

    Get PDF
    BACKGROUND: The MITO-2 (Multicentre Italian Trials in Ovarian cancer) study is a randomized phase III trial comparing carboplatin plus paclitaxel to carboplatin plus pegylated liposomal doxorubicin in first-line chemotherapy of patients with ovarian cancer. Due to the paucity of published phase I data on the 3-weekly experimental schedule used, an early safety analysis was planned. METHODS: Patients with ovarian cancer (stage Ic-IV), aged < 75 years, ECOG performance status ≤ 2, were randomized to carboplatin AUC 5 plus paclitaxel 175 mg/m(2), every 3 weeks or to carboplatin AUC 5 plus pegylated liposomal doxorubicin 30 mg/m(2), every 3 weeks. Treatment was planned for 6 cycles. Toxicity was coded according to the NCI-CTC version 2.0. RESULTS: The pre-planned safety analysis was performed in July 2004. Data from the first 50 patients treated with carboplatin plus pegylated liposomal doxorubicin were evaluated. Median age was 60 years (range 34–75). Forty-three patients (86%) completed 6 cycles. Two thirds of the patients had at least one cycle delayed due to toxicity, but 63% of the cycles were administered on time. In most cases the reason for chemotherapy delay was neutropenia or other hematological toxicity. No delay due to palmar-plantar erythrodysesthesia (PPE) was recorded. No toxic death was recorded. Reported hematological toxicities were: grade (G) 3 anemia 16%, G3/G4 neutropenia 36% and 10% respectively, G3/4 thrombocytopenia 22% and 4% respectively. Non-haematological toxicity was infrequent: pulmonary G1 6%, heart rhythm G1 4%, liver toxicity G1 6%, G2 4% and G3 2%. Complete hair loss was reported in 6% of patients, and G1 neuropathy in 2%. PPE was recorded in 14% of the cases (G1 10%, G2 2%, G3 2%). CONCLUSION: This safety analysis shows that the adopted schedule of carboplatin plus pegylated liposomal doxorubicin given every 3 weeks is feasible as first line treatment in ovarian cancer patients, although 37% of the cycles were delayed due to haematological toxicity. Toxicities that are common with standard combination of carboplatin plus paclitaxel (neurotoxicity and hair loss) are infrequent with this experimental schedule, and skin toxicity appears manageable

    Blockchain and Applications - 3rd International Congress, BLOCKCHAIN 2021

    No full text

    Generalized Zig-zag Functions and Oblivious Transfer Reductions.

    No full text
    corecore