925 research outputs found

    An analysis of acceptance policies for blockchain transactions

    Get PDF
    The standard acceptance policy for a cryptocurrency transaction at most exchanges is to wait until the transaction is placed in the blockchain and followed by a certain number of blocks. However, as noted by Sompolinsky and Zohar [16], the amount of time for blocks to arrive should also be taken into account as it affects the probability of double spending. Specifically, they propose a dynamic policy for transaction acceptance that depends on both the number of confirmations and the amount of time since transaction broadcast. In this work we study the implications of using such a policy compared with the standard option that ignores block timing information. Using an exact expression for the probability of double spend, via numerical results, we analyze time to transaction acceptance (performance) as well as the time and cost to perform a double spend attack (security). We show that while expected time required for transaction acceptance is improved using a dynamic policy, the time and cost to perform a double spend attack for a particular transaction is reduced.First author draf

    Revealing the unseen: how to expose cloud usage while protecting user privacy

    Full text link
    Cloud users have little visibility into the performance characteristics and utilization of the physical machines underpinning the virtualized cloud resources they use. This uncertainty forces users and researchers to reverse engineer the inner workings of cloud systems in order to understand and optimize the conditions their applications operate. At Massachusetts Open Cloud (MOC), as a public cloud operator, we'd like to expose the utilization of our physical infrastructure to stop this wasteful effort. Mindful that such exposure can be used maliciously for gaining insight into other user's workloads, in this position paper we argue for the need for an approach that balances openness of the cloud overall with privacy for each tenant inside of it. We believe that this approach can be instantiated via a novel combination of several security and privacy technologies. We discuss the potential benefits, implications of transparency for cloud systems and users, and technical challenges/possibilities.Accepted manuscrip

    EasyUC: using EasyCrypt to mechanize proofs of universally composable security

    Get PDF
    We present a methodology for using the EasyCrypt proof assistant (originally designed for mechanizing the generation of proofs of game-based security of cryptographic schemes and protocols) to mechanize proofs of security of cryptographic protocols within the universally composable (UC) security framework. This allows, for the first time, the mechanization and formal verification of the entire sequence of steps needed for proving simulation-based security in a modular way: Specifying a protocol and the desired ideal functionality; Constructing a simulator and demonstrating its validity, via reduction to hard computational problems; Invoking the universal composition operation and demonstrating that it indeed preserves security. We demonstrate our methodology on a simple example: stating and proving the security of secure message communication via a one-time pad, where the key comes from a Diffie-Hellman key-exchange, assuming ideally authenticated communication. We first put together EasyCrypt-verified proofs that: (a) the Diffie-Hellman protocol UC-realizes an ideal key-exchange functionality, assuming hardness of the Decisional Diffie-Hellman problem, and (b) one-time-pad encryption, with a key obtained using ideal key-exchange, UC-realizes an ideal secure-communication functionality. We then mechanically combine the two proofs into an EasyCrypt-verified proof that the composed protocol realizes the same ideal secure-communication functionality. Although formulating a methodology that is both sound and workable has proven to be a complex task, we are hopeful that it will prove to be the basis for mechanized UC security analyses for significantly more complex protocols and tasks.Accepted manuscrip

    An Exploration of the Role of Principal Inertia Components in Information Theory

    Full text link
    The principal inertia components of the joint distribution of two random variables XX and YY are inherently connected to how an observation of YY is statistically related to a hidden variable XX. In this paper, we explore this connection within an information theoretic framework. We show that, under certain symmetry conditions, the principal inertia components play an important role in estimating one-bit functions of XX, namely f(X)f(X), given an observation of YY. In particular, the principal inertia components bear an interpretation as filter coefficients in the linear transformation of pf(X)Xp_{f(X)|X} into pf(X)Yp_{f(X)|Y}. This interpretation naturally leads to the conjecture that the mutual information between f(X)f(X) and YY is maximized when all the principal inertia components have equal value. We also study the role of the principal inertia components in the Markov chain BXYB^B\rightarrow X\rightarrow Y\rightarrow \widehat{B}, where BB and B^\widehat{B} are binary random variables. We illustrate our results for the setting where XX and YY are binary strings and YY is the result of sending XX through an additive noise binary channel.Comment: Submitted to the 2014 IEEE Information Theory Workshop (ITW

    Sanctioned Abuses: The Case of Migrant Domestic Workers

    Get PDF

    Guidelines for parents on homeschooling deaf children

    Get PDF
    Many families have turned their family room into classrooms. In 1993, homeschooling became legal in all 50 states, when the number of students staying at home for schooling tripled. This trend continues today because parents want to retain control over the education and socialization of their children. Homeschooling refers to education of school-age children with their parents\u27 guiding, directing, and monitoring them. It replaces full-time attendance at a traditional school. Parents express various reasons for educating their children at home; individualization, family time, strong academic, moral, and religious foundations. The problem with homeschooling, for parents of deaf children, is the lack of informational pamphlets to provide information and guide parents to educate their deaf children successfully. How can parents learn to guide their deaf children in their home without instructions on homeschooling? Where they find resources or materials they can use in homeschooling? Parents might have interrogations on homeschooling. Creating a pamphlet with guidelines for parents homeschooling their deaf children is suggested as a possible solution. These will help prepare parents in educating their deaf children in their home. Parents need to be aware of all aspects of children\u27s life illustrating social, academics, and other issues

    Bio-electrochemical systems for the remediation of metal-ion effluents

    Get PDF
    PhD ThesisThe roots of this study stem from the applied sciences of microbiology and electrochemistry to form the exciting new field of bio-electrochemistry. Our aim here being the application of bioelectrochemical processes for social and environmental value in toxic metal ion remediation and recovery from the discharge of aqueous mine and industrial effluents. This within a broader vision of reducing the present burden caused by industrial and mining anthropogenic activity on the planet we inhabit. These processes we have explored within a green chemistry philosophy with the application of chemical engineering principles. Our aims being (i) to further the scientific state of art and (ii) conceptualize the feasible engineering of novel metal remediation strategies, with the lucrative application of bacterial cells as green “nanofactories” and recovery of metallic biogenic nanoparticles with application in the ever growing field of nanotechnology. The proof of principle has been evaluated with a systematic study of Au3+, Co2+ and Fe3+ metallic cationic species (Co < 500 ppm) dissolved in acidic (pH < 3) aqueous electrolytes and their removal by microbiological (chapter 3) and bioelectrochemical (chapter 4) processes. Electrochemical remediation as described by electronation charge transfer at an electrified interface for various potentials causes the electrodeposition of metal ions upon electrode surfaces and hence separation by phase transformation. Of note, base cations such Co2+ and Fe3+ co-deposited with the evolution of hydrogen gas could be applied as electron donors for chemolithotrophic bacteria as part of dissimilatory respiration. Microbial biosorption of metal ions by means of ionized groups located on the outer membrane of the outer lipopolysaccharide leaf of gram negative bacteria, with some evidence of bio-reduction via dissimilatory and redox resistance mechanisms, with biogenic nanoparticles produced as a consequence. Bio-electrochemistry formed by the collaboration of these two processes where electroactive bacteria such as that of the Shewanella genus are known to respire by the application of cathodic currents directly via bio-nanowires or indirectly using in-situ electron mediators or in-situ hydrogen production. The effects of bacteria on electronation thermodynamics were investigated in chapter 4 with observed positive shifts in reversible potentials (Er) for AuCl3- electrodeposition

    Sanctioned Abuses: The Case of Migrant Domestic Workers

    Get PDF
    corecore