scholarly journals Cryptography for #MeToo

2019 ◽  
Vol 2019 (3) ◽  
pp. 409-429
Author(s):  
Benjamin Kuykendall ◽  
Hugo Krawczyk ◽  
Tal Rabin

Abstract Reporting sexual assault and harassment is an important and difficult problem. Since late 2017, it has received increased attention as the viral #MeToo movement has brought about accusations against high-profile individuals and a wider discussion around the prevalence of sexual violence. Addressing occurrences of sexual assault requires a system to record and process accusations. It is natural to ask what security guarantees are necessary and achievable in such a system. In particular, we focus on detecting repeat offenders: only when a set number of accusations are lodged against the same party will the accusations be revealed to a legal counselor. Previous solutions to this privacy-preserving reporting problem, such as the Callisto Protocol of Rajan et al., have focused on the confidentiality of accusers. This paper proposes a stronger security model that ensures the confidentiality of the accuser and the accused as well as the traceability of false accusations. We propose the WhoToo protocol to achieve this notion of security using suitable cryptographic techniques. The protocol design emphasizes practicality, preferring fast operations that are implemented in existing software libraries. We estimate that an implementation would be suitably performant for real-world deployment.

2016 ◽  
Vol 18 (3) ◽  
pp. 316-330
Author(s):  
Nicholas Coulton

While the English Church shared in celebrating the 800th anniversary of Magna Carta, not least its own part in gaining those rights for everyone, the Church of England was reversing the principle that people are innocent until proved guilty. Such is the pressure of today's concern about child abuse, historic and present. As evidence mounts of the injustices done by false accusations against some high-profile public figures, we are less aware of the toll on other individuals whose turmoil does not hit the headlines. Those teaching and caring are often targeted for claims, and the Church of England has been toughening its procedures.


2018 ◽  
Vol 31 (1) ◽  
pp. 133-153
Author(s):  
Mia J. Abboud ◽  
Guangzhen Wu ◽  
Amelie Pedneault ◽  
Mary K. Stohr ◽  
Craig Hemmens

Educator sexual misconduct is a problem that has gained increased attention because of the high-profile cases reported by the news media. Yet, the diversity in state law regarding this offense remains somewhat unexplored. In this article, we compare and evaluate state statutory provisions regarding educator sexual misconduct; our focus is on what constitutes educator sexual misconduct, and what penalties are provided for offenders. As such, we explore the differences and similarities in statutory provisions across states in terms of the definition of child sexual assault, the age of consent, the penalties for various types of sexual misconduct perpetrated by teachers, and any requirement for registration as sex offenders. Our findings indicate that though the number of applicable statutes has almost doubled since 2010, there remains a wide variety in the definition and penalties included in those laws, and 21 states have not chosen to enact a specific law at all.


2021 ◽  
Vol 2021 (4) ◽  
pp. 549-574
Author(s):  
Alexandra Boldyreva ◽  
Tianxin Tang

Abstract We study the problem of privacy-preserving approximate kNN search in an outsourced environment — the client sends the encrypted data to an untrusted server and later can perform secure approximate kNN search and updates. We design a security model and propose a generic construction based on locality-sensitive hashing, symmetric encryption, and an oblivious map. The construction provides very strong security guarantees, not only hiding the information about the data, but also the access, query, and volume patterns. We implement, evaluate efficiency, and compare the performance of two concrete schemes based on an oblivious AVL tree and an oblivious BSkiplist.


Author(s):  
Richard Wright

This essay focuses on the role of law and policy in sexual assault and offending. Comparing and contrasting U.S., Canadian, and European policy approaches, the review examines how various governments have prioritized their legal approaches to sexual offending prevention and response. These responses have included broad-based conviction-focused schemes, narrowly focused laws centered on high-risk repeat offenders, and prioritization with stranger-based assault. There has been great variance in terms of the emphasis placed on treatment and public notification. The essay analyses how these nations have learned from each other and how their sex offending policies have evolved, if and how they reflect the science of sexual offending and risk, and which demonstrate the most promise for sexual assault reduction with the fewest unintended consequences.


2020 ◽  
Vol 7 (1) ◽  
Author(s):  
Gousiya Begum ◽  
S. Zahoor Ul Huq ◽  
A. P. Siva Kumar

Abstract Extensive usage of Internet based applications in day to day life has led to generation of huge amounts of data every minute. Apart from humans, data is generated by machines like sensors, satellite, CCTV etc. This huge collection of heterogeneous data is often referred as Big Data which can be processed to draw useful insights. Apache Hadoop has emerged has widely used open source software framework for Big Data Processing and it is a cluster of cooperative computers enabling distributed parallel processing. Hadoop Distributed File System is used to store data blocks replicated and spanned across different nodes. HDFS uses an AES based cryptographic techniques at block level which is transparent and end to end in nature. However cryptography provides security from unauthorized access to the data blocks, but a legitimate user can still harm the data. One such example was execution of malicious map reduce jar files by legitimate user which can harm the data in the HDFS. We developed a mechanism where every map reduce jar will be tested by our sandbox security to ensure the jar is not malicious and suspicious jar files are not allowed to process the data in the HDFS. This feature is not present in the existing Apache Hadoop framework and our work is made available in github for consideration and inclusion in the future versions of Apache Hadoop.


2018 ◽  
pp. 215-273
Author(s):  
Suzannah Lipscomb

Section 1 considers sexual intercourse outside marriage, known as paillardise. Drawing on two hundred cases, it examines attitudes to sexual sin and the circumstances that aroused suspicion. It looks at the prevalence of sex after engagement, and how sex acted as a step in marriage formation, meaning women could be lured into sex by promises to marry. It also considers sex outside the context of promises to marry, and the cohabitation of unmarried couples. Section 2 considers over a hundred cases of sexual assault, many outside the legal contemporary definition of rape. It considers the identity of the predators, the circumstances of sexual abuse, the use of force and coercion, plus threats, promises, and persuasion. It also considers sexual assault in the context of conditional consent, the consequences of assault for women, and women’s strategies in the context of rape and abuse. It finishes by looking at false accusations.


2017 ◽  
Vol 30 (4) ◽  
pp. 100-123 ◽  
Author(s):  
Alexandra Rutherford

College campus-based surveys of sexual assault in the United States have generated one of the most high-profile and contentious figures in the history of social science: the ‘1 in 5’ statistic. Referring to the number of women who have experienced either attempted or completed sexual assault since their time in college, ‘1 in 5’ has done significant work in making the prevalence of this experience legible to the public and to policy-makers. Here I examine how sexual assault surveys have participated in structuring the ontology of date/acquaintance rape from the 1980s to today. I review the foundational work of feminist social scientists Diana Russell and Mary Koss, with particular attention to the methodological practices through which the concept of the ‘hidden’ or ‘unacknowledged’ rape victim emerged. I then examine a selection of early 21st-century sexual assault surveys and highlight the ongoing preoccupation with survey methodology in responses to their results. I argue that the survey itself has been a central actor in the ontological politics of sexual assault, and only by closely attending to its performativity can we understand the paradoxical persistence both of critical responses to the ‘1 in 5’ statistic and of its effective deployment in anti-violence policy.


2013 ◽  
Vol 28 (2) ◽  
pp. 441-466
Author(s):  
Hina Azam

The contemporary treatment of rape in the penal codes of Muslim nations has come under increasing scrutiny over the last two decades, as several high-profile cases have arisen in which women have claimed sexual assault but been unable to bring sufficient proof of non-consent. In some cases, claimants have subsequently been punished for fornication (zinā) because their accusations were seen as constituting confession to consensual illicit sex, while in other cases, a resulting pregnancy has been taken as evidence of the same. These cases have illustrated the particular problems that stem from defining rape as a coercive variant of fornication, or zinā.These cases have largely arisen in the context of national efforts to Islamize the legal code by bringing laws into line with perceived sharī'a guidelines. This slew of cases has prompted journalists, human rights groups and Muslim reformers to ask whether contemporary “Islamic” rape laws are really continuous with the classical Islamic juristic tradition, or whether they may in fact represent distortions of that tradition. A central point of debate has been over whether Islamic juristic discourse truly placed rape—that is, a man's unlawful sexual intercourse with a woman against her will—under the category of zinā, or not.


Author(s):  
Martin R. Albrecht ◽  
Torben Brandt Hansen ◽  
Kenneth G. Paterson

Boldyreva et al. (Eurocrypt 2012) defined a fine-grained security model capturing ciphertext fragmentation attacks against symmetric encryption schemes. The model was extended by Albrecht et al. (CCS 2016) to include an integrity notion. The extended security model encompasses important security goals of SSH that go beyond confidentiality and integrity to include length hiding and denial-of-service resistance properties. Boldyreva et al. also defined and analysed the InterMAC scheme, while Albrecht et al. showed that InterMAC satisfies stronger security notions than all currently available SSH encryption schemes. In this work, we take the InterMAC scheme and make it fully ready for use in practice. This involves several steps. First, we modify the InterMAC scheme to support encryption of arbitrary length plaintexts and we replace the use of Encrypt-then-MAC in InterMAC with modern noncebased authenticated encryption. Second, we describe a reference implementation of the modified InterMAC scheme in the form of the library libInterMAC. We give a performance analysis of libInterMAC. Third, to test the practical performance of libInterMAC, we implement several InterMAC-based encryption schemes in OpenSSH and carry out a performance analysis for the use-case of file transfer using SCP. We measure the data throughput and the data overhead of using InterMAC-based schemes compared to existing schemes in OpenSSH. Our analysis shows that, for some network set-ups, using InterMAC-based schemes in OpenSSH only moderately affects performance whilst providing stronger security guarantees compared to existing schemes.


Sign in / Sign up

Export Citation Format

Share Document