17 research outputs found

    Deniable Ring Signatures

    Get PDF
    Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2007.Includes bibliographical references (p. 55-57).Ring Signatures were developed by Rivest, Shamir and Tauman, in a paper titled How to Leak a Secret, as a cryptographically secure way to authenticate messages with respect to ad-hoc groups while still maintaining the signer's anonymity. While their initial scheme assumed the existence of random oracles, in 2005 a scheme was developed that does not use random oracles and meets the strongest security definitions known in the literature. We argue that this scheme is not deniable, meaning if someone signs a message with respect to a ring of possible signers, and at a later time the secret keys of all of the possible signers are confiscated (including the author), then the author's anonymity is no longer guaranteed. We propose a modification to the scheme that guarantees anonymity even in this situation, using a scheme that depends on ring signature users generating keys that do not distinguish them from other users who did not intend to participate in ring signature schemes, so that our scheme can truly be called a deniable ring signature scheme.by Eitan Reich.M.Eng

    Computing Nash Equilibrium in Wireless Ad Hoc Networks: A Simulation-Based Approach

    Full text link
    This paper studies the problem of computing Nash equilibrium in wireless networks modeled by Weighted Timed Automata. Such formalism comes together with a logic that can be used to describe complex features such as timed energy constraints. Our contribution is a method for solving this problem using Statistical Model Checking. The method has been implemented in UPPAAL model checker and has been applied to the analysis of Aloha CSMA/CD and IEEE 802.15.4 CSMA/CA protocols.Comment: In Proceedings IWIGP 2012, arXiv:1202.422

    Rhomboid cleaves Star to regulate the levels of secreted Spitz

    No full text
    Intracellular trafficking of the precursor of Spitz (Spi), the major Drosophila EGF receptor (EGFR) ligand, is facilitated by the chaperone Star, a type II transmembrane protein. This study identifies a novel mechanism for modulating the activity of Star, thereby influencing the levels of active Spi ligand produced. We demonstrate that Star can efficiently traffic Spi even when present at sub-stoichiometric levels, and that in Drosophila S(2)R(+) cells, Spi is trafficked from the endoplasmic reticulum to the late endosome compartment, also enriched for Rhomboid, an intramembrane protease. Rhomboid, which cleaves the Spi precursor, is now shown to also cleave Star within its transmembrane domain both in cell culture and in flies, expanding the repertoire of known Rhomboid substrates to include both type I and type II transmembrane proteins. Cleavage of Star restricts the amount of Spi that is trafficked, and may explain the exceptional dosage sensitivity of the Star locus in flies
    corecore