ON "THE POWER OF VERIFICATION QUERIES" IN UNCONDITIONALLY SECURE MESSAGE AUTHENTICATION

2011 ◽  
Vol 03 (03) ◽  
pp. 287-303
Author(s):  
DONGVU TONIEN ◽  
REIHANEH SAFAVI-NAINI ◽  
PETER WILD

In this paper, we consider authentication codes where the adversary has access to a verification oracle. We formally study two attack games: offline attack and online attack. In an offline impersonation attack with verification query of order i, the adversary launches its attack through two stages. In the first stage — the query stage — the adversary can adaptively choose i distinct messages to query the verification oracle. The verification oracle will answer whether these queried messages are valid or invalid under the secret encoding rule agreed by the transmitter and the receiver. In the later stage — the spoofing stage — the adversary creates a fraudulent message which is different from all its queried messages and sends this message to the receiver. The adversary wins if the receiver accepts the fraudulent message as a valid message. In an online impersonation attack with verification query of order i, the adversary has i + 1 chances to query the verification oracle and wins as soon as one of the queries is a valid message. We make use of strategy trees, which allow optimal strategies in both attack games to be identified, to establish a number of relationships between the value of the two games. This allows us to formally prove a relationship between the value of the game when the adversary has i queries, and the one in which he does not have any. The relationship, though widely believed to be true, was only recently proved for computationally secure systems. Our result complements this latter work for the information theoretic setting.

2014 ◽  
Vol 18 (1) ◽  
pp. 22-35 ◽  
Author(s):  
Domenico Celenza ◽  
Fabrizio Rossi

Purpose – The aim of this paper is to investigate the relationship between corporate performance and Value Added Intellectual Coefficient (VAICTM) on the one hand, and the relationship between the variations in market value and the variations in VAIC on the other hand. Design/methodology/approach – Starting from the VAIC model, 23 Italian listed companies were examined with the aim of investigating the relationship between VAIC and the performance of the firms in the sample. The analysis was divided into two stages. In the first stage, eight models of linear regression were estimated to verify the presence of a positive and statistically significant relationship between M/BV and VAIC and between accounting performance indicators (ROE, ROI, ROS) and the VAIC. In the second stage, six other models were tested, considering as an independent variable the variations in VAIC and the variations in profitability indicators. Findings – The outcomes of the application stress the importance of VAIC in the explanation of the variations in MV and its role as “additional coefficient” in the analysis of equity performance. Originality/value – This methodology highlights some very interesting aspects. In particular, whereas the relationship between M/BV and VAIC and between profitability indicators (ROI, ROE, ROS) and VAIC is statistically insignificant, the subsequent analysis highlights the importance of VAIC as a variable capable of increasing the explanatory power of the regression in a cross-sectional perspective.


2021 ◽  
Vol 13 (4) ◽  
pp. 2132
Author(s):  
Valentina Beretta ◽  
Maria Chiara Demartini ◽  
Laura Lico ◽  
Sara Trucco

This study’s purpose is twofold. On the one hand, it analyzes the relationship between the profitability of firms and the tone of nonfinancial disclosures; on the other hand, it tests the relationship between the environmental, social, and governing (ESG) performance of firms and the tone of nonfinancial disclosures on the automotive sector under two different and competing approaches, which are incremental information and impression management. The sample is composed of 68 nonfinancial reports issued by 17 automotive organizations between the years 2016 and 2020. Data analysis proceeded in two stages. First, a content analysis was performed to assess the linguistic attributes of the nonfinancial disclosure. Second, an inferential regression analysis was performed to test the hypothesized associations between firms’ performance and tone of their disclosures. The results of this study are aimed at providing evidence of the determinants of the verbal tone in the corporate nonfinancial reporting in a specific industry.


Author(s):  
Jesse Schotter

The first chapter of Hieroglyphic Modernisms exposes the complex history of Western misconceptions of Egyptian writing from antiquity to the present. Hieroglyphs bridge the gap between modern technologies and the ancient past, looking forward to the rise of new media and backward to the dispersal of languages in the mythical moment of the Tower of Babel. The contradictory ways in which hieroglyphs were interpreted in the West come to shape the differing ways that modernist writers and filmmakers understood the relationship between writing, film, and other new media. On the one hand, poets like Ezra Pound and film theorists like Vachel Lindsay and Sergei Eisenstein use the visual languages of China and of Egypt as a more primal or direct alternative to written words. But Freud, Proust, and the later Eisenstein conversely emphasize the phonetic qualities of Egyptian writing, its similarity to alphabetical scripts. The chapter concludes by arguing that even avant-garde invocations of hieroglyphics depend on narrative form through an examination of Hollis Frampton’s experimental film Zorns Lemma.


2015 ◽  
Vol 15 (3) ◽  
pp. 33-39 ◽  
Author(s):  
David Evans

This paper considers the relationship between social science and the food industry, and it suggests that collaboration can be intellectually productive and morally rewarding. It explores the middle ground that exists between paid consultancy models of collaboration on the one hand and a principled stance of nonengagement on the other. Drawing on recent experiences of researching with a major food retailer in the UK, I discuss the ways in which collaborating with retailers can open up opportunities for accessing data that might not otherwise be available to social scientists. Additionally, I put forward the argument that researchers with an interest in the sustainability—ecological or otherwise—of food systems, especially those of a critical persuasion, ought to be empirically engaging with food businesses. I suggest that this is important in terms of generating better understandings of the objectionable arrangements that they seek to critique, and in terms of opening up conduits through which to affect positive changes. Cutting across these points is the claim that while resistance to commercial engagement might be misguided, it is nevertheless important to acknowledge the power-geometries of collaboration and to find ways of leveling and/or leveraging them. To conclude, I suggest that universities have an important institutional role to play in defining the terms of engagement as well as maintaining the boundaries between scholarship and consultancy—a line that can otherwise become quite fuzzy when the worlds of commerce and academic research collide.


1968 ◽  
Vol 8 (4) ◽  
pp. 606-617
Author(s):  
Mohammad Anisur Rahman

The purpose of this paper is to re-examine the relationship between the degree of aggregate labour-intensity and the aggregate volume of saving in an economy where a Cobb-6ouglas production function in its traditional form can be assumed to give a good approximation to reality. The relationship in ques¬tion has an obviously important bearing on economic development policy in the area of choice of labour intensity. To the extent that and in the range where an increase in labour intensity would adversely affect the volume of savings, a con¬flict arises between two important social objectives, i.e., higher rate of capital formation on the one hand and greater employment and distributive equity on the other. If relative resource endowments in the economy are such that such a "competitive" range of labour-intensity falls within the nation's attainable range of choice, development planners will have to arrive at a compromise between these two social goals.


Author(s):  
Peter Coss

In the introduction to his great work of 2005, Framing the Early Middle Ages, Chris Wickham urged not only the necessity of carefully framing our studies at the outset but also the importance of closely defining the words and concepts that we employ, the avoidance ‘cultural sollipsism’ wherever possible and the need to pay particular attention to continuities and discontinuities. Chris has, of course, followed these precepts on a vast scale. My aim in this chapter is a modest one. I aim to review the framing of thirteenth-century England in terms of two only of Chris’s themes: the aristocracy and the state—and even then primarily in terms of the relationship between the two. By the thirteenth century I mean a long thirteenth century stretching from the period of the Angevin reforms of the later twelfth century on the one hand to the early to mid-fourteenth on the other; the reasons for taking this span will, I hope, become clearer during the course of the chapter, but few would doubt that it has a validity.


Author(s):  
Keith M. Martin

This chapter discusses cryptographic mechanisms for providing data integrity. We begin by identifying different levels of data integrity that can be provided. We then look in detail at hash functions, explaining the different security properties that they have, as well as presenting several different applications of a hash function. We then look at hash function design and illustrate this by discussing the hash function SHA-3. Next, we discuss message authentication codes (MACs), presenting a basic model and discussing basic properties. We compare two different MAC constructions, CBC-MAC and HMAC. Finally, we consider different ways of using MACs together with encryption. We focus on authenticated encryption modes, and illustrate these by describing Galois Counter mode.


Cancers ◽  
2021 ◽  
Vol 13 (13) ◽  
pp. 3141
Author(s):  
Aurora Laborda-Illanes ◽  
Lidia Sánchez-Alcoholado ◽  
Soukaina Boutriq ◽  
Isaac Plaza-Andrades ◽  
Jesús Peralta-Linero ◽  
...  

In this review we summarize a possible connection between gut microbiota, melatonin production, and breast cancer. An imbalance in gut bacterial population composition (dysbiosis), or changes in the production of melatonin (circadian disruption) alters estrogen levels. On the one hand, this may be due to the bacterial composition of estrobolome, since bacteria with β-glucuronidase activity favour estrogens in a deconjugated state, which may ultimately lead to pathologies, including breast cancer. On the other hand, it has been shown that these changes in intestinal microbiota stimulate the kynurenine pathway, moving tryptophan away from the melatonergic pathway, thereby reducing circulating melatonin levels. Due to the fact that melatonin has antiestrogenic properties, it affects active and inactive estrogen levels. These changes increase the risk of developing breast cancer. Additionally, melatonin stimulates the differentiation of preadipocytes into adipocytes, which have low estrogen levels due to the fact that adipocytes do not express aromatase. Consequently, melatonin also reduces the risk of breast cancer. However, more studies are needed to determine the relationship between microbiota, melatonin, and breast cancer, in addition to clinical trials to confirm the sensitizing effects of melatonin to chemotherapy and radiotherapy, and its ability to ameliorate or prevent the side effects of these therapies.


Sign in / Sign up

Export Citation Format

Share Document