scholarly journals Privacy-preserving FairSwap: Fairness and privacy interplay

2021 ◽  
Vol 2022 (1) ◽  
pp. 417-439
Author(s):  
Sepideh Avizheh ◽  
Preston Haffey ◽  
Reihaneh Safavi-Naini

Abstract Fair exchange protocols are among the most important cryptographic primitives in electronic commerce. A basic fair exchange protocol requires that two parties who want to exchange their digital items either receive what they have been promised, or lose nothing. Privacy of fair exchange requires that no one else (other than the two parties) learns anything about the items. Fairness and privacy have been considered as two distinct properties of an exchange protocol. In this paper, we show that subtle ways of leaking the exchange item to the third parties affect fairness in fair exchange protocols when the item is confidential. Our focus is on Fair-Swap, a recently proposed fair exchange protocol that uses a smart contract for dispute resolution, has proven security in UC (Universal Composability) framework, and provides privacy when both parties are honest. We demonstrate, however, that FairSwap’s dispute resolution protocol leaks information to the public and this leakage provides opportunities for the dishonest parties to influence the protocol’s fairness guarantee. We then propose an efficient privacy-enhanced version of Fair-Swap, prove its security and give an implementation and performance evaluation of our proposed system. Our privacy enhancement uses circuit randomization, and we prove its security and privacy in an extension of universal composability model for non-monolithic adversaries that would be of independent interest.

2014 ◽  
Vol 14 (3) ◽  
Author(s):  
Elfrida R Gultom

The objective of Busway development is to provide transportation services faster, safer, comfortable, and affordable for people in Jakarta. Ticket prices are subsidized by the local government busway. Busway given special line, however could not be separated from the accident. In a carriage, in the event of an accident then apply provisions of Law No. 22 of 2009 on Traffic and Transportation. If there is a loss that hit the third party then setting responsibilities Public Service Agency TransJakarta Busway to third parties refer to the provisions of Article 194 paragraph (1) which determines that the public transport companies are not responsible for any losses suffered by third parties, unless the third party may prove that the loss is caused by the fault of public transport company. Under these provisions, if the third party wants to sue for damages, ketigalah party must prove the fault of the carrier, the claim is based on the basis of tort or on the basis of error set forth in Article 1365 of the Civil Code which stipulates that any action unlawfully harming others, require the person who carries the loss offset. Keywords: transport, the responsibility of the carrier, a third party, transport law


2020 ◽  
Vol 5 (2) ◽  
pp. 72-82
Author(s):  
Nemer Aburumman ◽  
Jihad Fraij ◽  
Róbert Szilágyi

In a world of nonstop developing technology, Blockchain has become a trusted tool to apply transparency in the public sector. The consensus mechanism provides trusted data that can support clear and adjusted as well as well-structured procedures. Nowadays, the public sector can increase trust by adapting Blockchain applications in the services offered to be e-government portals. In this paper, the researchers review the literature to identify the potential use cases and application of Blockchain in e-government services. This new technology along with its related applications will be discussed and defined. Moreover, the possibilities of using Blockchain in the public sector and its impact on organizational transformation, financial management, and performance are increasing. The study concluded that the use of blockchain technologies and applications is still limited in the public sector. Obstacles and barriers are related mostly to (security and privacy) and law and by-laws support. This paper will provide a useful reference for researchers in blockchain applications and their impact on e-government and propose future research questions that need to be addressed to inform how the public sector should approach the blockchain technology adoption.


2020 ◽  
Vol 11 (3) ◽  
pp. 286-313
Author(s):  
Yu Yan ◽  
Michael Faure

Abstract Should pure economic loss be compensated in China? If so, to what extent? Both questions are left unsolved in the established literature. We contribute to the existing literature by showing that the Chinese courts have developed a relatively conservative attitude towards the compensation of pure economic loss and that the arguments adopted by the courts to deny recovery are neither fair nor reasonable. Using the law and economics analysis, we have recourse to four complementary solutions. First, pure economic loss cases involving socially relevant losses should be compensated. Second, when social losses are not involved, pure economic loss should also be compensated if the third parties are willing to pay or have paid for protection against such a loss. Third, to relieve the excessive pressure imposed by the compensation for such loss, the concepts of causation and the duty of the victim to mitigate damage need to be further clarified in Chinese laws. Fourth, when determining the amount of compensation for pure economic loss, we should carefully balance the trade-off among a variety of factors, including the extent to which the damage could have been foreseen, the nature of the loss, the blameworthiness of the tortfeasor, the size of the plaintiff class, the public policy toward professional standards, the victim’s private loss, the social loss, the courts’ capacities to calculate the loss, and the third parties’ willingness to pay for protection against the loss.


2020 ◽  
Author(s):  
Hui Cui ◽  
Russell Paulet ◽  
Surya Nepal ◽  
Xun Yi ◽  
Butrus Mbimbi

Abstract Biometric information is unique to a human, so it would be desirable to use the biometric characteristic as the private key in a cryptographic system to protect data security and privacy. In this paper, we introduce a notion called two-factor decryption (TFD). Informally speaking, a TFD scheme is a variant of the public-key encryption (PKE) scheme. In a TFD scheme, messages are encrypted under public keys as that in a standard PKE scheme, but both private keys (i.e. the first factor) and biometric inputs (i.e. the second factor) are required to decrypt the ciphertexts and obtain the underlying plaintexts. We first describe a framework of TFD, and then define a formal security model for TFD. Thereafter, we present a generic construction on TFD based on the cryptographic primitives of linear sketch and functional encryption (FE) with certain properties and analyse its security. In addition, we give instantiations of TFD by applying concrete FE schemes into the generic construction and show their applications.


In this growing world, Internet has changed so much to an extent that it turned into a powerful tool in every aspects of our lives.E-auction is one of those things which helps the bidders to take part in an auction online over the air. In a sealed bid third parties need to pay an extra cost to help the buyers and sellers carry out their exchange without any hassle. But there can be a breach of trust by the third parties. Owners of the auction or the company that is auctioning can have direct entry to it when the auction is run on a decentralized platform. When the users auction off something on the chain, the smart contract takes control of the auctioned asset and thereafter it manages the bids associated. In this paper, we execute a smart contract for a verifiable sealed-bid auction on the Ethereum blockchain. The type of auction used is sealed-bid in which the bidders submit their bids privately and each bidder can participate only once. As per the biddings received, the highest bidder wins and pays the highest corresponding highest submitted bid. Additionally, before the auction ends the bidder can withdraw the bid after submitting it. In such a case the bidder will have another chance to place the bid. This smart contract implementation abides by the true essence of a sealed-bid, to be precise, no information about the biddings is leaked to the bidders except for the highest bid


2015 ◽  
Vol 32 (1) ◽  
pp. 40-77
Author(s):  
Peter Mercer-Taylor

The notion that there might be autobiographical, or personally confessional, registers at work in Mendelssohn’s 1846 Elijah has long been established, with three interpretive approaches prevailing: the first, famously advanced by Prince Albert, compares Mendelssohn’s own artistic achievements with Elijah’s prophetic ones; the second, in Eric Werner’s dramatic formulation, discerns in the aria “It is enough” a confession of Mendelssohn’s own “weakening will to live”; the third portrays Elijah as a testimonial on Mendelssohn’s relationship to the Judaism of his birth and/or to the Christianity of his youth and adulthood. This article explores a fourth, essentially untested, interpretive approach: the possibility that Mendelssohn crafts from Elijah’s story a heartfelt affirmation of domesticity, an expression of his growing fascination with retiring to a quiet existence in the bosom of his family. The argument unfolds in three phases. In the first, the focus is on that climactic passage in Elijah’s Second Part in which God is revealed to the prophet in the “still small voice.” The turn from divine absence to divine presence is articulated through two clear and powerful recollections of music that Elijah had sung in the oratorio’s First Part, a move that has the potential to reconfigure our evaluation of his role in the public and private spheres in those earlier passages. The second phase turns to Elijah’s own brief sojourn into the domestic realm, the widow’s scene, paying particular attention to the motivations that may have underlain the substantial revisions to the scene that took place between the Birmingham premiere and the London premiere the following year. The final phase explores the possibility that the widow and her son, the “surrogate family” in the oratorio, do not disappear after the widow’s scene, but linger on as “para-characters” with crucial roles in the unfolding drama.


Author(s):  
Shaveta Bhatia

 The epoch of the big data presents many opportunities for the development in the range of data science, biomedical research cyber security, and cloud computing. Nowadays the big data gained popularity.  It also invites many provocations and upshot in the security and privacy of the big data. There are various type of threats, attacks such as leakage of data, the third party tries to access, viruses and vulnerability that stand against the security of the big data. This paper will discuss about the security threats and their approximate method in the field of biomedical research, cyber security and cloud computing.


2014 ◽  
Vol 1 (1) ◽  
Author(s):  
Colby Doyle ◽  
Matthew Gaudet ◽  
Dominic Lay ◽  
Amber McLeod ◽  
Robert Schaeffer

The primary goal of this research is to identify and examine the components of responsible drinking advertisements. We will examine industry and government related advertisements as we try to understand one of our major questions: does the source influence the validity of the message? The next group of major questions that we will be looking to answer is how are the vague quantifiers used in responsible drinking campaigns interpreted by the public?  How many drinks do people consider “too much?” What does “drink responsibly” really mean? The third major question is whether or not an individual’s current consumption patterns of alcohol have any effect on how individuals assess responsible drinking campaigns. Our qualitative research has indicated that social influences can be strongly related with drinking patterns; this will be further examined in our quantitative research. Also, we will be looking into some of the psychology behind industry and government sponsored advertisements as well as gathering and interpreting information from a sample of our target demographic. Our target demographic consists of both male and females between the ages 18-24. Our literature review and qualitative analysis gave us good insight into some of the potential answers to our questions. We will use these potential answers from our previous research to guide us as we attempt to conduct conclusive research based on a sample data of 169 individuals. Our findings will aid us in developing conclusions and recommendations for Alberta Health Services.


Sign in / Sign up

Export Citation Format

Share Document