scholarly journals Universally composable security: a new paradigm for cryptographic protocols

Author(s):  
R. Canetti
2018 ◽  
pp. 563-588
Author(s):  
Krishna Asawa ◽  
Akanksha Bhardwaj

With the emergence of technological revolution to host services over Internet, secure communication over World Wide Web becomes critical. Cryptographic protocols are being in practice to secure the data transmission over network. Researchers use complex mathematical problem, number theory, prime numbers etc. to develop such cryptographic protocols. RSA and Diffie Hellman public key crypto systems have proven to be secure due to the difficulty of factoring the product of two large primes or computing discrete logarithms respectively. With the advent of quantum computers a new paradigm shift on public key cryptography may be on horizon. Since superposition of the qubits and entanglement behavior exhibited by quantum computers could hold the potential to render most modern encryption useless. The aim of this chapter is to analyze the implications of quantum computing power on current public key cryptosystems and to show how these cryptosystems can be restructured to sustain in the new computing paradigm.


Author(s):  
Krishna Asawa ◽  
Akanksha Bhardwaj

With the emergence of technological revolution to host services over Internet, secure communication over World Wide Web becomes critical. Cryptographic protocols are being in practice to secure the data transmission over network. Researchers use complex mathematical problem, number theory, prime numbers etc. to develop such cryptographic protocols. RSA and Diffie Hellman public key crypto systems have proven to be secure due to the difficulty of factoring the product of two large primes or computing discrete logarithms respectively. With the advent of quantum computers a new paradigm shift on public key cryptography may be on horizon. Since superposition of the qubits and entanglement behavior exhibited by quantum computers could hold the potential to render most modern encryption useless. The aim of this chapter is to analyze the implications of quantum computing power on current public key cryptosystems and to show how these cryptosystems can be restructured to sustain in the new computing paradigm.


2004 ◽  
Vol 03 (04) ◽  
pp. 673-684
Author(s):  
SHIRLEY H. C. CHEUNG ◽  
C. H. LEE ◽  
YUNLEI ZHAO

Blind signatures play a critical role in digital cash systems. In this paper, we investigate the blind signature functionality in the framework of universally composable (UC) security — the strongest security guarantees up to now for cryptographic protocols over the Internet. We present the universally composable blind signature functionality, [Formula: see text]. Our approach is based on a new UC signature functionality [Formula: see text], which is a modified version of the original signature functionality [Formula: see text] presented by Canetti. We also prove that [Formula: see text] and [Formula: see text] are actually equivalent with respect to non-adaptive adversaries. Our result is of both theoretical and practical consequence to future research studies and practical implementations of digital cash systems with universally composable security.


2000 ◽  
Vol 179 ◽  
pp. 177-183
Author(s):  
D. M. Rust

AbstractSolar filaments are discussed in terms of two contrasting paradigms. The standard paradigm is that filaments are formed by condensation of coronal plasma into magnetic fields that are twisted or dimpled as a consequence of motions of the fields’ sources in the photosphere. According to a new paradigm, filaments form in rising, twisted flux ropes and are a necessary intermediate stage in the transfer to interplanetary space of dynamo-generated magnetic flux. It is argued that the accumulation of magnetic helicity in filaments and their coronal surroundings leads to filament eruptions and coronal mass ejections. These ejections relieve the Sun of the flux generated by the dynamo and make way for the flux of the next cycle.


Author(s):  
Markus Krüger ◽  
Horst Krist

Abstract. Recent studies have ascertained a link between the motor system and imagery in children. A motor effect on imagery is demonstrated by the influence of stimuli-related movement constraints (i. e., constraints defined by the musculoskeletal system) on mental rotation, or by interference effects due to participants’ own body movements or body postures. This link is usually seen as qualitatively different or stronger in children as opposed to adults. In the present research, we put this interpretation to further scrutiny using a new paradigm: In a motor condition we asked our participants (kindergartners and third-graders) to manually rotate a circular board with a covered picture on it. This condition was compared with a perceptual condition where the board was rotated by an experimenter. Additionally, in a pure imagery condition, children were instructed to merely imagine the rotation of the board. The children’s task was to mark the presumed end position of a salient detail of the respective picture. The children’s performance was clearly the worst in the pure imagery condition. However, contrary to what embodiment theories would suggest, there was no difference in participants’ performance between the active rotation (i. e., motor) and the passive rotation (i. e., perception) condition. Control experiments revealed that this was also the case when, in the perception condition, gaze shifting was controlled for and when the board was rotated mechanically rather than by the experimenter. Our findings indicate that young children depend heavily on external support when imagining physical events. Furthermore, they indicate that motor-assisted imagery is not generally superior to perceptually driven dynamic imagery.


Author(s):  
Sarah Schäfer ◽  
Dirk Wentura ◽  
Christian Frings

Abstract. Recently, Sui, He, and Humphreys (2012) introduced a new paradigm to measure perceptual self-prioritization processes. It seems that arbitrarily tagging shapes to self-relevant words (I, my, me, and so on) leads to speeded verification times when matching self-relevant word shape pairings (e.g., me – triangle) as compared to non-self-relevant word shape pairings (e.g., stranger – circle). In order to analyze the level at which self-prioritization takes place we analyzed whether the self-prioritization effect is due to a tagging of the self-relevant label and the particular associated shape or due to a tagging of the self with an abstract concept. In two experiments participants showed standard self-prioritization effects with varying stimulus features or different exemplars of a particular stimulus-category suggesting that self-prioritization also works at a conceptual level.


2003 ◽  
Vol 58 (4) ◽  
pp. 305-312 ◽  
Author(s):  
Carol J. Gill ◽  
Donald G. Kewman ◽  
Ruth W. Brannon

1995 ◽  
Vol 40 (11) ◽  
pp. 1072-1073
Author(s):  
Michael J. Lambert ◽  
R. Scott Nebeker

1981 ◽  
Vol 26 (7) ◽  
pp. 507-509 ◽  
Author(s):  
Craig T. Ramey ◽  
David MacPhee

PsycCRITIQUES ◽  
2005 ◽  
Vol 50 (47) ◽  
Author(s):  
Mark H. Waugh

Sign in / Sign up

Export Citation Format

Share Document