1,257 research outputs found

    Hash-based signatures for the internet of things

    Get PDF
    While numerous digital signature schemes exist in the literature, most real-world system rely on RSA-based signature schemes or on the digital signature algorithm (DSA), including its elliptic curve cryptography variant ECDSA. In this position paper we review a family of alternative signature schemes, based on hash functions, and we make the case for their application in Internet of Things (IoT) settings. Hash-based signatures provide postquantum security, and only make minimal security assumptions, in general requiring only a secure cryptographic hash function. This makes them extremely flexible, as they can be implemented on top of any hash function that satisfies basic security properties. Hash-based signatures also feature numerous parameters defining aspects such as signing speed and key size, that enable trade-offs in constrained environments. Simplicity of implementation and customization make hash based signatures an attractive candidate for the IoT ecosystem, which is composed of a number of diverse, constrained devices

    VerSum: Verifiable Computations over Large Public Logs

    Get PDF
    VerSum allows lightweight clients to outsource expensive computations over large and frequently changing data structures, such as the Bitcoin or Namecoin blockchains, or a Certificate Transparency log. VerSum clients ensure that the output is correct by comparing the outputs from multiple servers. VerSum assumes that at least one server is honest, and crucially, when servers disagree, VerSum uses an efficient conflict resolution protocol to determine which server(s) made a mistake and thus obtain the correct output. VerSum's contribution lies in achieving low server-side overhead for both incremental re-computation and conflict resolution, using three key ideas: (1) representing the computation as a functional program, which allows memoization of previous results; (2) recording the evaluation trace of the functional program in a carefully designed computation history to help clients determine which server made a mistake; and (3) introducing a new authenticated data structure for sequences, called SeqHash, that makes it efficient for servers to construct summaries of computation histories in the presence of incremental re-computation. Experimental results with an implementation of VerSum show that VerSum can be used for a variety of computations, that it can support many clients, and that it can easily keep up with Bitcoin's rate of new blocks with transactions.United States. Defense Advanced Research Projects Agency. Clean-slate design of Resilient, Adaptive, Secure Hosts (CRASH) Program (Contract N66001-10-2-4089)National Science Foundation (U.S.) (Award CNS-1053143)National Science Foundation (U.S.) (Award CNS-1413920

    Unifying Parsimonious Tree Reconciliation

    Full text link
    Evolution is a process that is influenced by various environmental factors, e.g. the interactions between different species, genes, and biogeographical properties. Hence, it is interesting to study the combined evolutionary history of multiple species, their genes, and the environment they live in. A common approach to address this research problem is to describe each individual evolution as a phylogenetic tree and construct a tree reconciliation which is parsimonious with respect to a given event model. Unfortunately, most of the previous approaches are designed only either for host-parasite systems, for gene tree/species tree reconciliation, or biogeography. Hence, a method is desirable, which addresses the general problem of mapping phylogenetic trees and covering all varieties of coevolving systems, including e.g., predator-prey and symbiotic relationships. To overcome this gap, we introduce a generalized cophylogenetic event model considering the combinatorial complete set of local coevolutionary events. We give a dynamic programming based heuristic for solving the maximum parsimony reconciliation problem in time O(n^2), for two phylogenies each with at most n leaves. Furthermore, we present an exact branch-and-bound algorithm which uses the results from the dynamic programming heuristic for discarding partial reconciliations. The approach has been implemented as a Java application which is freely available from http://pacosy.informatik.uni-leipzig.de/coresym.Comment: Peer-reviewed and presented as part of the 13th Workshop on Algorithms in Bioinformatics (WABI2013

    Aluminium metallisation for interdigitated back contact silicon heterojunction solar cells

    Get PDF
    Back contact silicon heterojunction solar cells with an efficiency of 22 were manufactured, featuring a simple aluminium metallisation directly on the doped amorphous silicon films. Both the open circuit voltage and the fill factor heavily depend on the parameters of the annealing step after aluminium layer deposition. Using numerical device simulations and in accordance with the literature, we demonstrate that the changes in solar cell parameters with annealing can be explained by the formation of an aluminium silicide layer at temperatures as low as 150 C, improving the contact resistance and thus enhancing the fill factor. Further annealing at higher temperatures initialises the crystallisation of the amorphous silicon layers, yielding even lower contact resistances, but also introduces more defects, diminishing the open circuit voltag

    Chosen-ciphertext security from subset sum

    Get PDF
    We construct a public-key encryption (PKE) scheme whose security is polynomial-time equivalent to the hardness of the Subset Sum problem. Our scheme achieves the standard notion of indistinguishability against chosen-ciphertext attacks (IND-CCA) and can be used to encrypt messages of arbitrary polynomial length, improving upon a previous construction by Lyubashevsky, Palacio, and Segev (TCC 2010) which achieved only the weaker notion of semantic security (IND-CPA) and whose concrete security decreases with the length of the message being encrypted. At the core of our construction is a trapdoor technique which originates in the work of Micciancio and Peikert (Eurocrypt 2012

    Cyber Space Odyssey: A Competitive, Team-Oriented Serious Game in Computer Networking

    Get PDF
    Cyber Space Odyssey (CSO) is a novel serious game supporting computer networking education by engaging students in a race to successfully perform various cybersecurity tasks in order to collect clues and solve a puzzle in virtual near-Earth 3D space. Each team interacts with the game server through a dedicated client presenting a multimodal interface, using a game controller for navigation and various desktop computer networking tools of the trade for cybersecurity tasks on the game\u27s physical network. Specifically, teams connect to wireless access points, use packet monitors to intercept network traffic, decrypt and reverse engineer that traffic, craft well-formed and meaningful responses, and transmit those responses. Successful completion of these physical network actions to solve a sequence of increasingly complex problems is necessary to progress through the virtual, story-driven adventure. Use of the networking tools reinforces networking theory and offers hands-on practical training requisite for today\u27s cyberoperators. This paper presents the learning outcomes targeted by a classroom intervention based on CSO, the design and implementation of the game, a pedagogical overview of the overall intervention, and four years of quantitative and qualitative data assessing its effectiveness

    Authenticated data structures, generically

    Full text link

    A comparative transcriptomic analysis of glucagon-like peptide-1 receptor- and glucose-dependent insulinotropic polypeptide-expressing cells in the hypothalamus

    Get PDF
    ObjectiveThe hypothalamus is a key region of the brain implicated in homeostatic regulation, and is an integral centre for the control of feeding behaviour. Glucagon-like peptide-1 (GLP-1) and glucose-dependent insulinotropic polypeptide (GIP) are incretin hormones with potent glucoregulatory function through engagement of their respective cognate receptors, GLP-1R and GIPR. Recent evidence indicates that there is a synergistic effect of combining GIP- and GLP-1-based pharmacology on appetite and body weight. The mechanisms underlying the enhanced weight loss exhibited by GIPR/GLP-1R co-agonism are unknown. Gipr and Glp1r are expressed in the hypothalamus in both rodents and humans. To better understand incretin receptor-expressing cell populations, we compared the cell types and expression profiles of Gipr- and Glp1r-expressing hypothalamic cells using single-cell RNA sequencing.MethodsUsing Glp1r-Cre or Gipr-Cre transgenic mouse lines, fluorescent reporters were introduced into either Glp1r- or Gipr-expressing cells, respectively, upon crossing with a ROSA26-EYFP reporter strain. From the hypothalami of these mice, fluorescent Glp1rEYFP+ or GiprEYFP+ cells were FACS-purified and sequenced using single-cell RNA sequencing. Transcriptomic analysis provided a survey of both non-neuronal and neuronal cells, and comparisons between Glp1rEYFP+ and GiprEYFP + populations were made.ResultsA total of 14,091 Glp1rEYFP+ and GiprEYFP+ cells were isolated, sequenced and taken forward for bioinformatic analysis. Both Glp1rEYFP+ and GiprEYFP+ hypothalamic populations were transcriptomically highly heterogeneous, representing vascular cell types, oligodendrocytes, astrocytes, microglia, and neurons. The majority of GiprEYFP+ cells were non-neuronal, whereas the Glp1rEYFP+ population was evenly split between neuronal and non-neuronal cell types. Both Glp1rEYFP+ and GiprEYFP+ oligodendrocytes express markers for mature, myelin-forming oligodendrocytes. While mural cells are represented in both Glp1rEYFP+ and GiprEYFP+ populations, Glp1rEYFP+ mural cells are largely smooth muscle cells, while the majority of GiprEYFP+ mural cells are pericytes. The co-expression of regional markers indicate that clusters of Glp1rEYFP+ and GiprEYFP+ neurons have been isolated from the arcuate, ventromedial, lateral, tuberal, suprachiasmatic, and premammillary nuclei of the hypothalamus.ConclusionsWe have provided a detailed comparison of Glp1r and Gipr cells of the hypothalamus with single-cell resolution. This resource will provide mechanistic insight into how engaging Gipr- and Glp1r-expressing cells of the hypothalamus may result in changes in feeding behaviour and energy balance

    Scalable Verification for Outsourced Dynamic Databases

    Get PDF
    Query answers from servers operated by third parties need to be verified, as the third parties may not be trusted or their servers may be compromised. Most of the existing authentication methods construct validity proofs based on the Merkle hash tree (MHT). The MHT, however, imposes severe concurrency constraints that slow down data updates. We introduce a protocol, built upon signature aggregation, for checking the authenticity, completeness and freshness of query answers. The protocol offers the important property of allowing new data to be disseminated immediately, while ensuring that outdated values beyond a pre-set age can be detected. We also propose an efficient verification technique for ad-hoc equijoins, for which no practical solution existed. In addition, for servers that need to process heavy query workloads, we introduce a mechanism that significantly reduces the proof construction time by caching just a small number of strategically chosen aggregate signatures. The efficiency and efficacy of our proposed mechanisms are confirmed through extensive experiments. 1
    • …
    corecore