7,163 research outputs found

    Discrete Logarithms in Generalized Jacobians

    Get PDF
    D\'ech\`ene has proposed generalized Jacobians as a source of groups for public-key cryptosystems based on the hardness of the Discrete Logarithm Problem (DLP). Her specific proposal gives rise to a group isomorphic to the semidirect product of an elliptic curve and a multiplicative group of a finite field. We explain why her proposal has no advantages over simply taking the direct product of groups. We then argue that generalized Jacobians offer poorer security and efficiency than standard Jacobians

    Finding Significant Fourier Coefficients: Clarifications, Simplifications, Applications and Limitations

    Get PDF
    Ideas from Fourier analysis have been used in cryptography for the last three decades. Akavia, Goldwasser and Safra unified some of these ideas to give a complete algorithm that finds significant Fourier coefficients of functions on any finite abelian group. Their algorithm stimulated a lot of interest in the cryptography community, especially in the context of `bit security'. This manuscript attempts to be a friendly and comprehensive guide to the tools and results in this field. The intended readership is cryptographers who have heard about these tools and seek an understanding of their mechanics and their usefulness and limitations. A compact overview of the algorithm is presented with emphasis on the ideas behind it. We show how these ideas can be extended to a `modulus-switching' variant of the algorithm. We survey some applications of this algorithm, and explain that several results should be taken in the right context. In particular, we point out that some of the most important bit security problems are still open. Our original contributions include: a discussion of the limitations on the usefulness of these tools; an answer to an open question about the modular inversion hidden number problem

    Distortion maps for genus two curves

    Get PDF
    Distortion maps are a useful tool for pairing based cryptography. Compared with elliptic curves, the case of hyperelliptic curves of genus g > 1 is more complicated since the full torsion subgroup has rank 2g. In this paper we prove that distortion maps always exist for supersingular curves of genus g>1 and we construct distortion maps in genus 2 (for embedding degrees 4,5,6 and 12).Comment: 16 page

    Medical education on fitness to drive : a survey of all UK medical schools

    Get PDF
    Aim: To identify the extent to which medical aspects of fitness to drive (FTD) are taught within UK medical schools. Methods: A survey of all 32 UK medical schools. In-depth interviews with a range of staff at two medical schools; telephone survey of 30 schools. Results: Two thirds of schools reported specific teaching on medical aspects of FTD but few covered it in any depth or in relation to specific medical conditions. Only one school taught FTD in relation to elderly medicine. FTD was an examination topic at only 12 schools. Conclusion: Teaching on FTD is inconsistent across UK medical schools. Many new doctors will graduate with limited knowledge of medical aspects of FTD

    Efficient algorithms for pairing-based cryptosystems

    Get PDF
    We describe fast new algorithms to implement recent cryptosystems based on the Tate pairing. In particular, our techniques improve pairing evaluation speed by a factor of about 55 compared to previously known methods in characteristic 3, and attain performance comparable to that of RSA in larger characteristics.We also propose faster algorithms for scalar multiplication in characteristic 3 and square root extraction over Fpm, the latter technique being also useful in contexts other than that of pairing-based cryptography

    Keyword-Based Delegable Proofs of Storage

    Full text link
    Cloud users (clients) with limited storage capacity at their end can outsource bulk data to the cloud storage server. A client can later access her data by downloading the required data files. However, a large fraction of the data files the client outsources to the server is often archival in nature that the client uses for backup purposes and accesses less frequently. An untrusted server can thus delete some of these archival data files in order to save some space (and allocate the same to other clients) without being detected by the client (data owner). Proofs of storage enable the client to audit her data files uploaded to the server in order to ensure the integrity of those files. In this work, we introduce one type of (selective) proofs of storage that we call keyword-based delegable proofs of storage, where the client wants to audit all her data files containing a specific keyword (e.g., "important"). Moreover, it satisfies the notion of public verifiability where the client can delegate the auditing task to a third-party auditor who audits the set of files corresponding to the keyword on behalf of the client. We formally define the security of a keyword-based delegable proof-of-storage protocol. We construct such a protocol based on an existing proof-of-storage scheme and analyze the security of our protocol. We argue that the techniques we use can be applied atop any existing publicly verifiable proof-of-storage scheme for static data. Finally, we discuss the efficiency of our construction.Comment: A preliminary version of this work has been published in International Conference on Information Security Practice and Experience (ISPEC 2018

    Turbulent nitrate fluxes in the Lower St. Lawrence Estuary, Canada

    Get PDF
    Turbulent vertical nitrate fluxes were calculated using new turbulent microstructure observations in the Lower St. Lawrence Estuary (LSLE), Canada. Two stations were compared: the head of the Laurentian Channel (HLC), where intense mixing occurs on the shallow sill that marks the upstream limit of the LSLE, and another station located about 100 km downstream (St. 23), more representative of the LSLE mean mixing conditions. Mean turbulent diffusivities and nitrate fluxes at the base of the surface layer for both stations were, respectively (with 95% confidence intervals): inline image and inline image. Observations suggest that the interplay between large isopleth heaving near the sill and strong turbulence is the key mechanism to sustain such high turbulent nitrate fluxes at the HLC (two to three orders of magnitude higher than those at Station 23). Calculations also suggest that nitrate fluxes at the HLC alone can sustain primary production rates of inline image over the whole LSLE, approximately enough to account for a large part of the phytoplankton bloom and for most of the postbloom production. Surfacing nitrates are also believed to be consumed within the LSLE, not leaving much to be exported to the rest of the Gulf of St. Lawrence

    Anonymous Single-Sign-On for n designated services with traceability

    Get PDF
    Anonymous Single-Sign-On authentication schemes have been proposed to allow users to access a service protected by a verifier without revealing their identity which has become more important due to the introduction of strong privacy regulations. In this paper we describe a new approach whereby anonymous authentication to different verifiers is achieved via authorisation tags and pseudonyms. The particular innovation of our scheme is authentication can only occur between a user and its designated verifier for a service, and the verification cannot be performed by any other verifier. The benefit of this authentication approach is that it prevents information leakage of a user's service access information, even if the verifiers for these services collude which each other. Our scheme also supports a trusted third party who is authorised to de-anonymise the user and reveal her whole services access information if required. Furthermore, our scheme is lightweight because it does not rely on attribute or policy-based signature schemes to enable access to multiple services. The scheme's security model is given together with a security proof, an implementation and a performance evaluation.Comment: 3
    corecore