1,507 research outputs found

    Efficient algorithms for pairing-based cryptosystems

    Get PDF
    We describe fast new algorithms to implement recent cryptosystems based on the Tate pairing. In particular, our techniques improve pairing evaluation speed by a factor of about 55 compared to previously known methods in characteristic 3, and attain performance comparable to that of RSA in larger characteristics.We also propose faster algorithms for scalar multiplication in characteristic 3 and square root extraction over Fpm, the latter technique being also useful in contexts other than that of pairing-based cryptography

    Privacy protection in electronic education based on polymorphic pseudonymization

    Get PDF
    In [13.] Dutch government proposes an identity scheme supporting personal data exchange of pupils with private e-textbook publishers. This design propagates sharing personal numbers of pupils among private parties violating the data minimisation principle in privacy laws. We describe a privacy friendly alternative, giving pupils (and parents) control on exchange of their personal data. Three generic forms based on homomorphic encryption are used as building blocks. These forms do not yield personal numbers, or even personal data from a legal perspective, and have strong, unlinkability properties. Only if required a school provides a party with a party-specific {\em pseudonym} identifying a pupil. For this the school is provided an {\em encrypted pseudonym} by a central party based on a {\em polymorphic pseudonym} formed by the school. Only intended parties, not even schools, have access to pseudonyms. Different publishers can send pupil test results to a school without being able to assess whether pupils are identical. We also describe support for privacy friendly attributes and user inspection as required by privacy laws

    Practical backward unlinkable revocation in FIDO, German e-ID, Idemix and U-Prove

    Get PDF
    FIDO, German e-ID, Idemix and U-Prove constitute privacy-enhanced public-key infrastructures allowing users to authenticate in an anonymous way. This however hampers timely revocation in a privacy friendly way. From a legal perspective, revocation typically should be effective within 24 hours after user reporting. It should also be backward unlinkable, i.e. user anonymity cannot be removed after revocation. We describe a new, generic revocation mechanism based on pairing based encryption and apply it to supplement the systems mentioned. This allows for both flexible and privacy friendly revocation. Protocol execution takes less than a quarter of a second on modern smartcards. An additional property is that usage after revocation is linkable, allowing users to identify fraudulent usage after revocation. Our technique is the first Verifier Local Revocation scheme with backwards unlinkable revocation for the systems mentioned. This also allows for a setup resembling the well-known Online Certificate Status Protocol (OCSP). Here the service provider sends a pseudonym to a revocation provider that returns its status. As the information required for this is not secret the status service can be distributed over many cloud services. In addition to the status service our technique also supports the publication of a central revocation list

    Activate Later Certificates for V2X -- Combining ITS efficiency with privacy

    Get PDF
    We specify Issue First Activate Later (IFAL). This is an ETSI type of V2X Public Key Infrastructure based on short-lived pseudonymous certificates without Certificate Revocation Lists. IFAL certificates are valid in the future but can only be used together with periodically provided activation codes. IFAL supports controlled de-pseudonymization enabling provisioning to stop for misbehaving vehicles. IFAL allows for flexible policies, trade-offs between three essential V2X properties: trust, privacy and usability. IFAL activation codes are small and can be sent in an SMS, through roadside equipment or even broadcasted. Like the Butterfly scheme, IFAL uses key derivation with one base private/public key pair. However in IFAL the security module can be simple as it can be kept oblivious of key derivation

    Explaining engagement levels of opportunity and necessity entrepreneurs

    Get PDF
    This paper investigates differences between opportunity and necessity entrepreneurs in terms of socio-demographics, attitudes and perception of obstacles . We use the 2004 Flash Eurobarometer Survey data. Explanatory variables include gender, age, education level and self-employed parents, risk tolerance, locus of control, perceptions of four obstacles and country effects. The obstacle variables include the perception of availibility of financial support; administrative complexity; of access to information on new venture creation and an unfavorable economic climate. Using probit equations we investigate differences in the preference for self-employment of opportunity and necessity entrepreneurs. A probit equation is estimated relating the explanatory variables to opportunity versus necessity entrepreneurship. Moreover, differences in the entrepreneurial engagement of opportunity and necessity entrepreneurs are investigated on the basis of a (ordered) multinomial logit model. Findings indicate that opportunity entrepreneurs have a higher preference for self-employment because of family encouragement. Also, opportunity entrepreneurs are found to perceive of administrative complexity and an unfavorable economic climate, negatively influencing their entrepreneurial involvement, while this is not the case for necessity entrepreneurs

    Reliability and validity of the Dutch dimensional assessment of personality pathology-short form(DAPP-SF), a shortened version of the DAPP-Basic questionnaire

    Get PDF
    The Dimensional Assessment of Personality Pathology-Basic Questionnaire (DAPP-BQ) appears to be a good choice for the assessment of personality pathology. However, due to its length, administration of the instrument is rather time-consuming, hindering standard inclusion of the DABB-BQ in a battery of assessment instruments at intake. We developed the 136-item DAPP-SF (Short Form), and investigated its psychometric characteristics in various samples, i.e., a community-based sample (n = 487), patients with mood-, anxiety-, and somatoform disorders (n = 1,329), and patients with personality disorders (n = 1,393). Results revealed high internal consistency for almost all dimensions. The factor structure appeared almost identical as compared to the factor structure of the original DAPP-BQ, and was shown to be invariant across the various patient and community samples. Indices for convergent, discriminant and criterion related validity were satisfactory. It is concluded that the good psychometric characteristics of the original DAPP-BQ were preserved in the shortened version of the instrument
    corecore