469 research outputs found

    Meeting rural demand: a case for combining community-based distribution and social marketing of injectable contraceptives in Tigray, Ethiopia.

    Get PDF
    BackgroundIn Sub-Saharan Africa, policy changes have begun to pave the way for community distribution of injectable contraceptives but sustaining such efforts remains challenging. Combining social marketing with community-based distribution provides an opportunity to recover some program costs and compensate workers with proceeds from contraceptive sales. This paper proposes a model for increasing access to injectable contraceptives in rural settings by using community-based distributers as social marketing agents and incorporating financing systems to improve sustainability.MethodsThis intervention was implemented in three districts of the Central Zone of Tigray, Ethiopia and program data has been collected from November 2011 through October 2012. A total of 137 Community Based Reproductive Health Agents (CBRHAs) were trained to provide injectable contraceptives and were provided with a loan of 25 injectable contraceptives from a drug revolving fund, created with project funds. The price of a single dose credited to a CBRHA was 3 birr (0.17)andtheyprovideinjectionstowomenfor5birr(0.17) and they provide injections to women for 5 birr (0.29), determined with willingness-to-pay data. Social marketing was used to create awareness and generate demand. Both quantitative and qualitative methods were used to examine important feasibility aspects of the intervention.ResultsForty-four percent of CBRHAs were providing family planning methods at the time of the training and 96% believed providing injectable contraceptives would improve their services. By October 2012, 137 CBRHAs had successfully completed training and provided 2541 injections. Of total injections, 47% were provided to new users of injectable contraceptives. Approximately 31% of injections were given for free to the poorest women, including adolescents.ConclusionsInsights gained from the first year of implementation of the model provide a framework for further expansion in Tigray, Ethiopia. Our experience highlights how program planners can tailor interventions to match family planning preferences and create more sustainable contraceptive service provision with greater impact

    Report and Trace Ring Signatures

    Get PDF
    We introduce report and trace ring signature schemes, balancing the desire for signer anonymity with the ability to report malicious behaviour and subsequently revoke anonymity. We contribute a formal security model for report and trace ring signatures that incorporates established properties of anonymity, unforgeability and traceability, and captures a new notion of reporter anonymity. We present a construction of a report and trace ring signature scheme, proving its security and analysing its efficiency, comparing with the state of the art in the accountable ring signatures literature. Our analysis demonstrates that our report and trace scheme is efficient, particularly for the choice of cryptographic primitives that we use to instantiate our construction. We contextualise our new primitive with respect to related work, and highlight, in particular, that report and trace ring signature schemes protect the identity of the reporter even after tracing is complete

    On the Incoercibility of Digital Signatures

    Get PDF

    Quality improvement programme at afrox limited: gas equipment factory

    Get PDF
    This Project Report deals with the investigation of quality improvement at Afrox Limited: Gas Equipment Factory (G.E.F),Germiston,South Africa, which employs the Just-In-Time/Total Quality Control (JIT/TQC) manufacturing philosophy. The investigation was carried out to determine the underlying causes of inconsistent product quality, high scrap and reject rates, and excessive rework in the Regulator cell. The Project Report documents a Quality Improvement Programme aimed specifically at the improvement of the tool setters' performance which was found to be largely responsible for poor quality. The programme is designed to organize the .'tool setters' machine setup activities in the most efficient and regulated way possible in order to achieve maximum quality and productivity improvement. The design of the Quality Improvement Programme is presently under consideration for implementation

    Partner support for family planning and modern contraceptive use in Luanda, Angola

    Get PDF
    Husband‘s/partner‘s support for family planning may influence a women‘s modern contraceptive use. Socio-demographic factors, couple communication about family planning, and fertility preferences are known to play a role in contraceptive use. We conducted logistic regression analysis to investigate the relationship between perceived husband‘s/partner‘s approval and husband‘s/partner‘s encouragement of modern contraceptive use, adjusting for socio-demographic factors and recent couple communication about family planning. We also examined mediating roles potentially played by perceived contraceptive accessibility and contraceptive self-efficacy (using index created by principal component analysis). Perceived husband‘s/partner‘s approval was associated with triple the odds of women‘s modern contraceptive use and remained significantly associated with 1.6 times the odds, after controlling for contraceptive accessibility and contraceptive self-efficacy. Husband‘s/partner‘s encouragement, while initially significantly associated with contraceptive use, became non-significant after adjustments for socio-demographic factors and couple communication. Perceived husband‘s/partner‘s approval, separate from a woman‘s sense of self-efficacy and perceived accessibility of contraceptives, appears strongly and positively associated with current modern contraceptive use. Increased couple communication may help women identify their husband‘s/partner‘s approval. Difference between the meaning of approval and encouragement should be explored. Interventions involving information education and communication campaigns geared to men and promoting male involvement in family planning could increase contraceptive prevalence.Keywords: Contraception, male involvement, approval, encouragement, sub-Saharan Afric

    Selectively Linkable Group Signatures - Stronger Security and Preserved Verifiability

    Get PDF
    Group signatures allow group members to sign on behalf of the group anonymously. They are therefore well suited to storing data in a way that preserves the users’ privacy, while guaranteeing its authenticity. Garms and Lehmann (PKC’19) introduced a new type of group signatures that balance privacy with utility by allowing to selectively link subsets of the group signatures via an oblivious entity, the converter. The conversion takes a batch of group signatures and blindly transforms signatures originating from the same user into a consistent representation. Their scheme essentially targets a setting where the entity receiving fully unlinkable signatures and the converted ones is the same: only pseudonyms but not full signatures are converted, and the input to the converter is assumed to be well-formed. Thus, the converted outputs are merely linkable pseudonyms but no longer signatures. In this work we extend and strengthen such convertibly linkable group signatures. Conversion can now be triggered by malicious entities too, and the converted outputs can be publicly verified. This preserves the authentication of data during the conversion process. We define the security of this scheme and give a provably secure instantiation. Our scheme makes use of controlled-malleable NIZKs, which allow proofs to be mauled in a controlled manner. This allows signatures to be blinded, while still ensuring they can be verified during conversions

    Improving the Efficiency of Report and Trace Ring Signatures

    Get PDF
    Ring signatures allow signers to produce verifiable signatures and remain anonymous within a set of signers (i.e., the ring) while doing so. They are well-suited to protocols that target anonymity as a primary goal, for example, anonymous cryptocurrencies. However, standard ring signatures do not ensure that signers are held accountable if they act maliciously. Fraser and Quaglia (CANS\u2721) introduced a ring signature variant that they called report and trace ring signatures which balances the anonymity guarantee of standard ring signatures with the need to hold signers accountable. In particular, report and trace ring signatures introduce a reporting system whereby ring members can report malicious message/signature pairs. A designated tracer can then revoke the signer\u27s anonymity if, and only if, a ring member submits a report to the tracer. Fraser and Quaglia present a generic construction of a report and trace ring signature scheme and outline an instantiation for which it is claimed that the complexity of signing is linear in the size of the ring ∣R∣|R|. In this paper, we introduce a new instantiation of Fraser and Quaglia\u27s generic report and trace ring signature construction. Our instantiation uses a pairing-based variant of ElGamal that we define. We demonstrate that our instantiation is more efficient. In fact, we highlight that the efficiency of Fraser and Quaglia\u27s instantiation omits a scaling factor of λ\lambda where λ\lambda is a security parameter. As such, the complexity of signing for their instantiation grows linearly in Î»â‹…âˆŁR∣\lambda \cdot |R|. Our instantiation, on the other hand, achieves signing complexity linear in ∣R∣|R|. We also introduce a new pairing-free report and trace ring signature construction reaching a similar signing complexity. Whilst this construction requires some additional group exponentiations, it can be instantiated over any prime order group for which the Decisional Diffie-Hellman assumption holds

    On the Incoercibility of Digital Signatures

    Get PDF
    We introduce incoercible digital signature schemes, a variant of a standard digital signature. Incoercible signatures enable signers, when coerced to produce a signature for a message chosen by an attacker, to generate fake signatures that are indistinguishable from real signatures, even if the signer is compelled to reveal their full history (including their secret signing keys and any randomness used to produce keys/signatures) to the attacker. Additionally, we introduce an authenticator that can detect fake signatures, which ensures that coercion is identified. We present a formal security model for incoercible signature schemes that comprises an established definition of unforgeability and captures new notions of weak receipt-freeness, strong receipt-freeness and coercion-resistance. We demonstrate that an incoercible signature scheme can be viewed as a transformation of any generic signature scheme. Indeed, we present two incoercible signature scheme constructions that are built from a standard signature scheme and a sender-deniable encryption scheme. We prove that our first construction satisfies coercion-resistance, and our second satisfies strong receipt-freeness. We conclude by presenting an extension to our security model: we show that our security model can be extended to the designated verifier signature scheme setting in an intuitive way as the designated verifier can assume the role of the authenticator and detect coercion during the verification process

    ‘Engage the World’: examining conflicts of engagement in public museums

    Get PDF
    Public engagement has become a central theme in the mission statements of many cultural institutions, and in scholarly research into museums and heritage. Engagement has emerged as the go-to-it-word for generating, improving or repairing relations between museums and society at large. But engagement is frequently an unexamined term that might embed assumptions and ignore power relationships. This article describes and examines the implications of conflicting and misleading uses of ‘engagement’ in relation to institutional dealings with contested questions about culture and heritage. It considers the development of an exhibition on the Dead Sea Scrolls by the Royal Ontario Museum, Toronto in 2009 within the new institutional goal to ‘Engage the World’. The chapter analyses the motivations, processes and decisions deployed by management and staff to ‘Engage the World’, and the degree to which the museum was able to re-think its strategies of public engagement, especially in relation to subjects,issues and publics that were more controversial in nature

    A multi-site service evaluation of silver diamine fluoride use for children

    Get PDF
    Introduction: The use of silver diamine fluoride (SDF) is relatively new to the UK. It is unknown how it is being used and for what indications in UK paediatric dental services. // Aim To: 1) establish how SDF is being used across different paediatric dental settings in the UK; and 2) consider parental and patient views on the treatment experience and side effect of discolouration. // Method: A multi-site service evaluation was carried out across six paediatric dentistry units covering hospital and community services. Data were collected prospectively from 17/02/2020 to 02/03/2022. Simple descriptive statistics were used to analyse the data. // Results: Data were collected for 54 patients. The included patients had an age range of 2-13 years, with a mean of 4.9 years. The reason SDF was chosen was reported as: to avoid general anaesthetic (n = 25); to avoid extractions (n = 8); stabilisation (n = 25); acclimatisation (n = 24); and insufficient cooperation for other treatment (n = 17). In total, 42 cases had SDF applied to the primary dentition. This was in the anterior dentition for 18 patients and the posterior dentition for 15, with nine patients having SDF applied both anteriorly and posteriorly. The majority of children and parents were accepting of the technique and immediate aesthetic outcome. // Conclusion: In the services involved in this multi-site service evaluation, SDF is used for young patients in the primary dentition for the purpose of caries arrest. The technique was viewed positively by the majority of parents and children
    • 

    corecore