On the Security of an Anonymous Multi-Receiver Encryption Protocol

2014 ◽  
Vol 971-973 ◽  
pp. 1667-1672
Author(s):  
Gang Zeng

Anonymous multi-receiver encryption (AME) achieves the security properties of confidentiality and anonymity. Thus, it can be used in VoIP (Voice over Internet Protocol), pay-TV systems, et al. In 2012, Zhang et al. proposed an efficient anonymous multi-receiver encryption protocol. They claimed that their protocol can protect the receiver identity privacy and keep message confidential. In this paper, we point out the weaknesses of Zhang et al.'s protocol. Their protocol cannot satisfy the anonymity against the inner attackers. On the other hand, their AME protocol cannot satisfy the indistinguishability of encryptions under selective multi-identity, chosen ciphertext attacks (IND-AME-CCA). Thus, Zhang et al.'s protocol is insecure. The analysis is important for the engineer to mitigate the security risks.

Human Affairs ◽  
2016 ◽  
Vol 26 (3) ◽  
Author(s):  
Josef Koudelka

AbstractWhen governments create refugee policies they consider several factors (security, economics, ethics, etc.). There are reasons why admitting refugees could have negative consequences (for example, security risks). On the other hand, if the recipient societies have ideals that stress the importance of helping other people, they should act according to their values. The aim of this article is to examine the concept of human dignity and show that European states should admit and help refugees because it is in accordance with their ethical values and the international agreements they have signed. This is important because when European countries hesitate to help refugees, they act not only contrary to their humane tradition, but they can harm them. The western concept of human dignity is one of the main values that stresses that each person is important—that they are equal and free.


Author(s):  
Hosnieh Rafiee ◽  
Christoph Meinel

Security and privacy have become important issues when dealing with Internet Protocol version 6 (IPv6) networks. On one hand, anonymity, which is related to privacy, makes it hard for current security systems to differentiate between legitimate users and illegitimate users, especially when the users need to be authenticated by those systems whose services they require. On the other hand, a lack of privacy exposes legitimate users to abuse, which can result from the information gained from privacy-related attacks. The current problems inherent within IPv6-enabled networks are due, in part, to the fact that there is no standard available telling companies about the current deficiencies that exist within IPv6 networks. The purpose of this chapter is to show a balance between the use of privacy and security, and to describe a framework that can offer the minimum standard requirement needed for providing security and privacy to IPv6 networks.


Author(s):  
Hosnieh Rafiee ◽  
Christoph Meinel

Security and privacy have become important issues when dealing with Internet Protocol version 6 (IPv6) networks. On one hand, anonymity, which is related to privacy, makes it hard for current security systems to differentiate between legitimate users and illegitimate users, especially when the users need to be authenticated by those systems whose services they require. On the other hand, a lack of privacy exposes legitimate users to abuse, which can result from the information gained from privacy-related attacks. The current problems inherent within IPv6-enabled networks are due, in part, to the fact that there is no standard available telling companies about the current deficiencies that exist within IPv6 networks. The purpose of this chapter is to show a balance between the use of privacy and security, and to describe a framework that can offer the minimum standard requirement needed for providing security and privacy to IPv6 networks.


Author(s):  
László Bokor ◽  
Gábor Jeney

Nowadays, the Internet Protocol is facing the version change; IPv4 (the old version of IP) will be replaced by IPv6 (the new version of IP) in the long run. Although they are based on the very same concept, the two protocols are not compatible with each other. This chapter deals with the coexistence issues, which might arise due to the simultaneous existence of IPv4 and IPv6. On the other hand, this chapter also covers transition concepts: how IPv6 only hosts can communicate either over IPv4 only networks, or with IPv4 only hosts in the Internet of the future.


Author(s):  
Fernando Almeida ◽  
José Pinheiro ◽  
Vítor Oliveira

Increasingly social networks are used both in the personal and professional levels, being companies and employees also exposed to the risks posed by them. In this sense, it is relevant to analyze employees' perception of the risks and vulnerabilities posed by the use of social networks in corporate environments. For this purpose, a questionnaire was developed and distributed to 372 employees of small and medium-sized companies that allowed the characterization and analysis of those risks. The results indicate that the security risks are perceived moderately by employees, emphasizing the risk of defamation and cyberbullying as being the most pertinent. On the other hand, the findings indicate that older employees, the existence of lower academic qualifications, and those working in medium-sized companies are more aware of these risks.


1999 ◽  
Vol 173 ◽  
pp. 249-254
Author(s):  
A.M. Silva ◽  
R.D. Miró

AbstractWe have developed a model for theH2OandOHevolution in a comet outburst, assuming that together with the gas, a distribution of icy grains is ejected. With an initial mass of icy grains of 108kg released, theH2OandOHproductions are increased up to a factor two, and the growth curves change drastically in the first two days. The model is applied to eruptions detected in theOHradio monitorings and fits well with the slow variations in the flux. On the other hand, several events of short duration appear, consisting of a sudden rise ofOHflux, followed by a sudden decay on the second day. These apparent short bursts are frequently found as precursors of a more durable eruption. We suggest that both of them are part of a unique eruption, and that the sudden decay is due to collisions that de-excite theOHmaser, when it reaches the Cometopause region located at 1.35 × 105kmfrom the nucleus.


Author(s):  
A. V. Crewe

We have become accustomed to differentiating between the scanning microscope and the conventional transmission microscope according to the resolving power which the two instruments offer. The conventional microscope is capable of a point resolution of a few angstroms and line resolutions of periodic objects of about 1Å. On the other hand, the scanning microscope, in its normal form, is not ordinarily capable of a point resolution better than 100Å. Upon examining reasons for the 100Å limitation, it becomes clear that this is based more on tradition than reason, and in particular, it is a condition imposed upon the microscope by adherence to thermal sources of electrons.


Author(s):  
K.H. Westmacott

Life beyond 1MeV – like life after 40 – is not too different unless one takes advantage of past experience and is receptive to new opportunities. At first glance, the returns on performing electron microscopy at voltages greater than 1MeV diminish rather rapidly as the curves which describe the well-known advantages of HVEM often tend towards saturation. However, in a country with a significant HVEM capability, a good case can be made for investing in instruments with a range of maximum accelerating voltages. In this regard, the 1.5MeV KRATOS HVEM being installed in Berkeley will complement the other 650KeV, 1MeV, and 1.2MeV instruments currently operating in the U.S. One other consideration suggests that 1.5MeV is an optimum voltage machine – Its additional advantages may be purchased for not much more than a 1MeV instrument. On the other hand, the 3MeV HVEM's which seem to be operated at 2MeV maximum, are much more expensive.


2005 ◽  
Vol 19 (3) ◽  
pp. 129-132 ◽  
Author(s):  
Reimer Kornmann

Summary: My comment is basically restricted to the situation in which less-able students find themselves and refers only to literature in German. From this point of view I am basically able to confirm Marsh's results. It must, however, be said that with less-able pupils the opposite effect can be found: Levels of self-esteem in these pupils are raised, at least temporarily, by separate instruction, academic performance however drops; combined instruction, on the other hand, leads to improved academic performance, while levels of self-esteem drop. Apparently, the positive self-image of less-able pupils who receive separate instruction does not bring about the potential enhancement of academic performance one might expect from high-ability pupils receiving separate instruction. To resolve the dilemma, it is proposed that individual progress in learning be accentuated, and that comparisons with others be dispensed with. This fosters a self-image that can in equal measure be realistic and optimistic.


Author(s):  
Stefan Krause ◽  
Markus Appel

Abstract. Two experiments examined the influence of stories on recipients’ self-perceptions. Extending prior theory and research, our focus was on assimilation effects (i.e., changes in self-perception in line with a protagonist’s traits) as well as on contrast effects (i.e., changes in self-perception in contrast to a protagonist’s traits). In Experiment 1 ( N = 113), implicit and explicit conscientiousness were assessed after participants read a story about either a diligent or a negligent student. Moderation analyses showed that highly transported participants and participants with lower counterarguing scores assimilate the depicted traits of a story protagonist, as indicated by explicit, self-reported conscientiousness ratings. Participants, who were more critical toward a story (i.e., higher counterarguing) and with a lower degree of transportation, showed contrast effects. In Experiment 2 ( N = 103), we manipulated transportation and counterarguing, but we could not identify an effect on participants’ self-ascribed level of conscientiousness. A mini meta-analysis across both experiments revealed significant positive overall associations between transportation and counterarguing on the one hand and story-consistent self-reported conscientiousness on the other hand.


Sign in / Sign up

Export Citation Format

Share Document