137 research outputs found

    Contextualizing Alternative Models of Secret Sharing

    Get PDF
    A secret sharing scheme is a means of distributing information to a set of players such that any authorized subset of players can recover a secret and any unauthorized subset does not learn any information about the secret. In over forty years of research in secret sharing, there has been an emergence of new models and extended capabilities of secret sharing schemes. In this thesis, we study various models of secret sharing and present them in a consistent manner to provide context for each definition. We discuss extended capabilities of secret sharing schemes, including a comparison of methods for updating secrets via local computations on shares and an analysis of approaches to reproducing/repairing shares. We present an analysis of alternative adversarial settings which have been considered in the area of secret sharing. In this work, we present a formalization of a deniability property which is inherent to some classical secret sharing schemes. We provide new, game-based definitions for different notions of verifiability and robustness. By using consistent terminology and similar game-based definitions, we are able to demystify the subtle differences in each notion raised in the literature

    Improved attacks against key reuse in learning with errors key exchange

    Get PDF
    Basic key exchange protocols built from the learning with errors (LWE) assumption are insecure if secret keys are reused in the face of active attackers. One example of this is Fluhrer’s attack on the Ding, Xie, and Lin (DXL) LWE key exchange protocol, which exploits leakage from the signal function for error correction. Protocols aiming to achieve security against active attackers generally use one of two techniques: demonstrating well-formed keyshares using re-encryption like in the Fujisaki–Okamoto transform; or directly combining multiple LWE values, similar to MQV-style Diffie–Hellman-based protocols. In this work, we demonstrate improved and new attacks exploiting key reuse in several LWE-based key exchange protocols. First, we show how to greatly reduce the number of samples required to carry out Fluhrer’s attack and reconstruct the secret period of a noisy square waveform, speeding up the attack on DXL key exchange by a factor of over 200. We show how to adapt this to attack a protocol of Ding, Branco, and Schmitt (DBS) designed to be secure with key reuse, breaking the claimed 128-bit security level in under a minute. We also apply our technique to a second authenticated key exchange protocol of DBS that uses an additive MQV design, although in this case our attack makes use of ephemeral key compromise powers of the eCK security model, which was not in scope of the claimed BR-model security proof. Our results show that building secure authenticated key exchange protocols directly from LWE remains a challenging and mostly open problem

    An intergenerational study of perceptions of changes in active free play among families from rural areas of Western Canada

    Get PDF
    Background: Children's engagement in active free play has declined across recent generations. Therefore, the purpose of this study was to examine perceptions of intergenerational changes in active free play among families from rural areas. We addressed two research questions: (1) How has active free play changed across three generations? (2) What suggestions do participants have for reviving active free play? Methods: Data were collected via 49 individual interviews with members of 16 families (15 grandparents, 16 parents, and 18 children) residing in rural areas/small towns in the Province of Alberta (Canada). Interview recordings were transcribed verbatim and subjected to thematic analysis guided by an ecological framework of active free play. Results: Factors that depicted the changing nature of active free play were coded in the themes of less imagination/more technology, safety concerns, surveillance, other children to play with, purposeful physical activity, play spaces/organized activities, and the good parenting ideal. Suggestions for reviving active free play were coded in the themes of enhance facilities to keep kids entertained, provide more opportunities for supervised play, create more community events, and decrease use of technology. Conclusions: These results reinforce the need to consider multiple levels of social ecology in the study of active free play, and highlight the importance of community-based initiatives to revive active free play in ways that are consistent with contemporary notions of good parentin

    In-situ estimation of ice crystal properties at the South Pole using LED calibration data from the IceCube Neutrino Observatory

    Get PDF
    The IceCube Neutrino Observatory instruments about 1 km3 of deep, glacial ice at the geographic South Pole using 5160 photomultipliers to detect Cherenkov light emitted by charged relativistic particles. A unexpected light propagation effect observed by the experiment is an anisotropic attenuation, which is aligned with the local flow direction of the ice. Birefringent light propagation has been examined as a possible explanation for this effect. The predictions of a first-principles birefringence model developed for this purpose, in particular curved light trajectories resulting from asymmetric diffusion, provide a qualitatively good match to the main features of the data. This in turn allows us to deduce ice crystal properties. Since the wavelength of the detected light is short compared to the crystal size, these crystal properties do not only include the crystal orientation fabric, but also the average crystal size and shape, as a function of depth. By adding small empirical corrections to this first-principles model, a quantitatively accurate description of the optical properties of the IceCube glacial ice is obtained. In this paper, we present the experimental signature of ice optical anisotropy observed in IceCube LED calibration data, the theory and parametrization of the birefringence effect, the fitting procedures of these parameterizations to experimental data as well as the inferred crystal properties.</p

    Conditional normalizing flows for IceCube event reconstruction

    Get PDF
    • …
    corecore