1,267 research outputs found

    Combinatorial Bounds and Characterizations of Splitting Authentication Codes

    Full text link
    We present several generalizations of results for splitting authentication codes by studying the aspect of multi-fold security. As the two primary results, we prove a combinatorial lower bound on the number of encoding rules and a combinatorial characterization of optimal splitting authentication codes that are multi-fold secure against spoofing attacks. The characterization is based on a new type of combinatorial designs, which we introduce and for which basic necessary conditions are given regarding their existence.Comment: 13 pages; to appear in "Cryptography and Communications

    Quantum authentication with key recycling

    Get PDF
    We show that a family of quantum authentication protocols introduced in [Barnum et al., FOCS 2002] can be used to construct a secure quantum channel and additionally recycle all of the secret key if the message is successfully authenticated, and recycle part of the key if tampering is detected. We give a full security proof that constructs the secure channel given only insecure noisy channels and a shared secret key. We also prove that the number of recycled key bits is optimal for this family of protocols, i.e., there exists an adversarial strategy to obtain all non-recycled bits. Previous works recycled less key and only gave partial security proofs, since they did not consider all possible distinguishers (environments) that may be used to distinguish the real setting from the ideal secure quantum channel and secret key resource.Comment: 38+17 pages, 13 figures. v2: constructed ideal secure channel and secret key resource have been slightly redefined; also added a proof in the appendix for quantum authentication without key recycling that has better parameters and only requires weak purity testing code

    You read my mind: fMRI markers of threatening appraisals in people with persistent psychotic experiences

    Get PDF
    Anomalous perceptual experiences are relatively common in the general population. Evidence indicates that the key to distinguishing individuals with persistent psychotic experiences (PEs) with a need for care from those without is how they appraise their anomalous experiences. Here, we aimed to characterise the neural circuits underlying threatening and non-threatening appraisals in people with and without a need for care for PEs, respectively. A total of 48 participants, consisting of patients with psychosis spectrum disorder (clinical group, n = 16), non-need-for-care participants with PEs (non-clinical group, n = 16), and no-PE healthy control participants (n = 16), underwent functional magnetic resonance imaging while completing the Telepath task, designed to induce an anomalous perceptual experience. Appraisals of the anomalous perceptual experiences were examined, as well as functional brain responses during this window, for significant group differences. We also examined whether activation co-varied with the subjective threat appraisals reported in-task by participants. The clinical group reported elevated subjective threat appraisals compared to both the non-clinical and no-PE control groups, with no differences between the two non-clinical groups. This pattern of results was accompanied by reduced activation in the superior and inferior frontal gyri in the clinical group as compared to the non-clinical and control groups. Precuneus activation scaled with threat appraisals reported in-task. Resilience in the context of persistent anomalous experiences may be explained by intact functioning of fronto-parietal regions, and may correspond to the ability to contextualise and flexibly evaluate psychotic experiences

    Sperm death and dumping in Drosophila

    Get PDF
    Mating with more than one male is the norm for females of many species. In addition to generating competition between the ejaculates of different males, multiple mating may allow females to bias sperm use. In Drosophila melanogaster, the last male to inseminate a female sires approximately 80% of subsequent progeny. Both sperm displacement, where resident sperm are removed from storage by the incoming ejaculate of the copulating male, and sperm incapacitation, where incoming seminal fluids supposedly interfere with resident sperm, have been implicated in this pattern of sperm use. But the idea of incapacitation is problematic because there are no known mechanisms by which an individual could damage rival sperm and not their own. Females also influence the process of sperm use, but exactly how is unclear. Here we show that seminal fluids do not kill rival sperm and that any 'incapacitation' is probably due to sperm ageing during sperm storage. We also show that females release stored sperm from the reproductive tract (sperm dumping) after copulation with a second male and that this requires neither incoming sperm nor seminal fluids. Instead, males may cause stored sperm to be dumped or females may differentially eject sperm from the previous mating

    Climate Dynamics: A Network-Based Approach for the Analysis of Global Precipitation

    Get PDF
    Precipitation is one of the most important meteorological variables for defining the climate dynamics, but the spatial patterns of precipitation have not been fully investigated yet. The complex network theory, which provides a robust tool to investigate the statistical interdependence of many interacting elements, is used here to analyze the spatial dynamics of annual precipitation over seventy years (1941-2010). The precipitation network is built associating a node to a geographical region, which has a temporal distribution of precipitation, and identifying possible links among nodes through the correlation function. The precipitation network reveals significant spatial variability with barely connected regions, as Eastern China and Japan, and highly connected regions, such as the African Sahel, Eastern Australia and, to a lesser extent, Northern Europe. Sahel and Eastern Australia are remarkably dry regions, where low amounts of rainfall are uniformly distributed on continental scales and small-scale extreme events are rare. As a consequence, the precipitation gradient is low, making these regions well connected on a large spatial scale. On the contrary, the Asiatic South-East is often reached by extreme events such as monsoons, tropical cyclones and heat waves, which can all contribute to reduce the correlation to the short-range scale only. Some patterns emerging between mid-latitude and tropical regions suggest a possible impact of the propagation of planetary waves on precipitation at a global scale. Other links can be qualitatively associated to the atmospheric and oceanic circulation. To analyze the sensitivity of the network to the physical closeness of the nodes, short-term connections are broken. The African Sahel, Eastern Australia and Northern Europe regions again appear as the supernodes of the network, confirming furthermore their long-range connection structure. Almost all North-American and Asian nodes vanish, revealing that extreme events can enhance high precipitation gradients, leading to a systematic absence of long-range patterns

    You read my mind: fMRI markers of threatening appraisals in people with persistent psychotic experiences

    Get PDF
    Copyright © The Author(s) 2021. Anomalous perceptual experiences are relatively common in the general population. Evidence indicates that the key to distinguishing individuals with persistent psychotic experiences (PEs) with a need for care from those without is how they appraise their anomalous experiences. Here, we aimed to characterise the neural circuits underlying threatening and non-threatening appraisals in people with and without a need for care for PEs, respectively. A total of 48 participants, consisting of patients with psychosis spectrum disorder (clinical group, n = 16), non-need-for-care participants with PEs (non-clinical group, n = 16), and no-PE healthy control participants (n = 16), underwent functional magnetic resonance imaging while completing the Telepath task, designed to induce an anomalous perceptual experience. Appraisals of the anomalous perceptual experiences were examined, as well as functional brain responses during this window, for significant group differences. We also examined whether activation co-varied with the subjective threat appraisals reported in-task by participants. The clinical group reported elevated subjective threat appraisals compared to both the non-clinical and no-PE control groups, with no differences between the two non-clinical groups. This pattern of results was accompanied by reduced activation in the superior and inferior frontal gyri in the clinical group as compared to the non-clinical and control groups. Precuneus activation scaled with threat appraisals reported in-task. Resilience in the context of persistent anomalous experiences may be explained by intact functioning of fronto-parietal regions, and may correspond to the ability to contextualise and flexibly evaluate psychotic experiences.Medical Research Council; Institute of Psychiatry, Psychology, and Neuroscience, King’s College London; NIHR Maudsley Biomedical Research Centre

    Key-Policy Attribute-Based Encryption for Boolean Circuits from Bilinear Maps

    Get PDF
    We propose the first Key-policy Attribute-based Encryption (KP-ABE) scheme for (monotone) Boolean circuits based on bilinear maps. The construction is based on secret sharing and just one bilinear map, and can be viewed as an extension of the KP-ABE scheme in [7]. Selective security of the proposed scheme in the standard model is proved, and comparisons with the scheme in [5] based on leveled multilinear maps, are provided. Thus, for Boolean circuits representing multilevel access structures, our KP-ABE scheme is more efficient than the one in [5]

    Weak-Unforgeable Tags for Secure Supply Chain Management

    Get PDF
    Given the value of imported counterfeit and pirated goods, the need for secure supply chain management is pertinent. Maleki et al. (HOST 2017) propose a new management scheme based on RFID tags (with 2-3K bits NVM) which, if compared to other schemes, is competitive on several performance and security metrics. Its main idea is to have each RFID tag stores its reader events in its own NVM while moving through the supply chain. In order to bind a tag\u27s identity to each event such that an adversary is not able to impersonate the tag\u27s identity on another duplicate tag, a function with a weak form of unforgeability is needed. In this paper, we formally dene this security property, present three constructions (MULTIPLY-ADD, ADD-XOR, and S-Box-CBC) having this security property, and show how to bound the probability of successful impersonation in concrete parameter settings. Finally, we compare our constructions with the light-weight hash function PHOTON used by Maleki et al. in terms of security and circuit area needed. We conclude that our ADD-XOR and S-Box-CBC constructions have approximately 1/4 - 1/3 of PHOTON\u27s total circuit area (this also includes the control circuitry besides PHOTON) while maintaining an appropriate security level which takes care of economically motivated adversaries

    Subverting Decryption in AEAD

    Get PDF
    This work introduces a new class of Algorithm Substitution Attack (ASA) on Symmetric Encryption Schemes. ASAs were introduced by Bellare, Paterson and Rogaway in light of revelations concerning mass surveillance. An ASA replaces an encryption scheme with a subverted version that aims to reveal information to an adversary engaged in mass surveillance, while remaining undetected by users. Previous work posited that a particular class of AEAD scheme (satisfying certain correctness and uniqueness properties) is resilient against subversion. Many if not all real-world constructions – such as GCM, CCM and OCB – are members of this class. Our results stand in opposition to those prior results. We present a potent ASA that generically applies to any AEAD scheme, is undetectable in all previous frameworks and which achieves successful exfiltration of user keys. We give even more efficient non-generic attacks against a selection of AEAD implementations that are most used in practice. In contrast to prior work, our new class of attack targets the decryption algorithm rather than encryption. We argue that this attack represents an attractive opportunity for a mass surveillance adversary. Our work serves to refine the ASA model and contributes to a series of papers that raises awareness and understanding about what is possible with ASAs

    Negative phenotypic and genetic associations between copulation duration and longevity in male seed beetles

    Get PDF
    Reproduction can be costly and is predicted to trade-off against other characters. However, while these trade-offs are well documented for females, there has been less focus on aspects of male reproduction. Furthermore, those studies that have looked at males typically only investigate phenotypic associations, with the underlying genetics often ignored. Here, we report on phenotypic and genetic trade-offs in male reproductive effort in the seed beetle, Callosobruchus maculatus. We find that the duration of a male's first copulation is negatively associated with subsequent male survival, phenotypically and genetically. Our results are consistent with life-history theory and suggest that like females, males trade-off reproductive effort against longevity
    corecore