security guarantees
Recently Published Documents


TOTAL DOCUMENTS

185
(FIVE YEARS 93)

H-INDEX

11
(FIVE YEARS 3)

2022 ◽  
Vol 30 (3) ◽  
pp. 0-0

The study aimed to develop recommendations for the optimization of settings in which the crowdsourcing project takes place. Findings show that crowdfunding projects are hybrid and include the elements of crowdsourcing, crowdsensing, crowdfunding, crowdworking, and crowdsourced recruitment. The predominant role of security guarantees was identified. It turned out that relations irreducible to a simple hierarchy pose many challenges. The results indicate that leading issues include the lack of financial guarantees and the likelihood of information leakage to competitors. Hence, the priority is to manage the exchange of money and information. An interesting finding demonstrates a positive correlation between project success, ethical conduct, and fair distribution of gains. The protection of intellectual property rights was no less important. As it was concluded in the course of analysis, the more successful the project, the more thoroughly it addresses the protection of someone else's intellectual property.


2022 ◽  
Vol 30 (3) ◽  
pp. 1-15
Author(s):  
Zhijiang Liu ◽  
Tatyana Sakulyeva ◽  
Alexey Mikheev ◽  
Diana Stepanova

The study aimed to develop recommendations for the optimization of settings in which the crowdsourcing project takes place. Findings show that crowdfunding projects are hybrid and include the elements of crowdsourcing, crowdsensing, crowdfunding, crowdworking, and crowdsourced recruitment. The predominant role of security guarantees was identified. It turned out that relations irreducible to a simple hierarchy pose many challenges. The results indicate that leading issues include the lack of financial guarantees and the likelihood of information leakage to competitors. Hence, the priority is to manage the exchange of money and information. An interesting finding demonstrates a positive correlation between project success, ethical conduct, and fair distribution of gains. The protection of intellectual property rights was no less important. As it was concluded in the course of analysis, the more successful the project, the more thoroughly it addresses the protection of someone else's intellectual property.


2022 ◽  
Author(s):  
Vijay Kumar Yadav ◽  
Nitish Andola ◽  
Shekhar Verma ◽  
S Venkatesan

Oblivious transfer (OT) protocol is an essential tool in cryptography that provides a wide range of applications like secure multi-party computation, private information retrieval, private set intersection, contract signing, and privacy-preserving location-based services. The OT protocol has different variants such as one-out-of-2, one-out-of- n , k -out-of- n , and OT extension. In the OT (one-out-of-2, one-out-of- n , and OT extension) protocol, the sender has a set of messages, whereas the receiver has a key. The receiver sends that key to the sender in a secure way; the sender cannot get any information about the received key. The sender encrypts every message by operating on every message using the received key and sends all the encrypted messages to the receiver. The receiver is able to extract only the required message using his key. However, in the k -out-of- n OT protocol, the receiver sends a set of k keys to the sender, and in replay, the sender sends all the encrypted messages. The receiver uses his keys and extracts the required messages, but it cannot gain any information about the messages that it has not requested. Generally, the OT protocol requires high communication and computation cost if we transfer millions of oblivious messages. The OT extension protocol provides a solution for this, where the receiver transfers a set of keys to the sender by executing a few numbers of OT protocols. Then, the sender encrypts all the messages using cheap symmetric key cryptography with the help of a received set of keys and transfer millions of oblivious messages to the receiver. In this work, we present different variants of OT protocols such as one-out-of-2, one-out-of- n , k -out-of- n , and OT extension. Furthermore, we cover various aspects of theoretical security guarantees such as semi-honest and malicious adversaries, universally composable, used techniques, computation, and communication efficiency aspects. From the analysis, we found that the semi-honest adversary-based OT protocols required low communication and computation costs as compared to malicious adversary-based OT protocols.


2021 ◽  
Vol 20 (2) ◽  
pp. 123-139
Author(s):  
Katarzyna Jadach

The key issue of this article is inclusive education in connection with the formal and legal aspects of students’ safety when they are staying in educational institutions. In the first part, author describes the basic assumptions of the social model of education and it’s international conditions, also referring to solutions that have been recently implemented in the Polish education system. The second part indicates the problems that may be met by educational institutions and teachers trying to achieve a state of full inclusion. They relate to the school’s caring function in terms of security guarantees. The diversity of student population, especially wide range of educational needs may make it impossible for teachers to develop specific approach to individual pupil. It’s caused by formal items, largely determined by the financial situation of particular local government units.


2021 ◽  
Vol 7 (3) ◽  
pp. 241
Author(s):  
Linda Sudiono

Women are one of the community groups most affected by Covid-19 because most are workers with lower incomes and unprotected financial security. Moreover, most women occupy the informal sector, which is more vulnerable in accessing social security guarantees. In addition, domestic violence against women increases in several countries during the pandemic. This article aims to analyze the causes of the negative impacts of the Covid-19 pandemic on Women and formulate the legal solution using the Feminist Legal Theory approach. The results show that there are broadly two causes of negative impacts for women dealing with Pandemic Covid-19. Firstly, due to the inequality in economic structure. Secondly is the gender stigmatized social structure. In this case, the feminist legal theory approach can be used to reconstruct and reform the negative impacts, as well as reanalysis the solutions in realizing women's legal justice due to the outbreak of the covid-19 pandemic. This study offers three solution methods. Firstly, analyzing the legal methods in giving gender implications and perpetuating women's subordination. Secondly, making gender the main category in conducting legal analysis. Thirdly, considering gender specificity in achieving legal equality for women.


2021 ◽  
Author(s):  
Xin Wang ◽  
Sisi Duan ◽  
James Clavin ◽  
Haibin Zhang

A blockchain is a distributed system that achieves strong security guarantees in storing, managing, and processing data. All blockchains achieve a common goal: building a decentralized system that provides a trustworthy service in an untrustworthy environment. A blockchain builds a Byzantine fault-tolerant system where decentralized nodes run a protocol to reach an agreement on the common system state. In this article, we focus on the research of BFT protocols. In particular, we categorize BFT protocols according to both the system models and workflow. We seek to answer a few important questions: How has the research in BFT evolved in the past four decades, especially with the rise of blockchains? What are the driven needs for BFT research in the future?


Quantum ◽  
2021 ◽  
Vol 5 ◽  
pp. 603
Author(s):  
Gorjan Alagic ◽  
Tommaso Gagliardoni ◽  
Christian Majenz

Cryptography with quantum states exhibits a number of surprising and counterintuitive features. In a 2002 work, Barnum et al. argue that these features imply that digital signatures for quantum states are impossible (Barnum et al., FOCS 2002). In this work, we ask: can all forms of signing quantum data, even in a possibly weak sense, be completely ruled out? We give two results which shed significant light on this basic question.First, we prove an impossibility result for digital signatures for quantum data, which extends the result of Barnum et al. Specifically, we show that no nontrivial combination of correctness and security requirements can be fulfilled, beyond what is achievable simply by measuring the quantum message and then signing the outcome. In other words, only classical signature schemes exist.We then show a positive result: a quantum state can be signed with the same security guarantees as classically, provided that it is also encrypted with the public key of the intended recipient. Following classical nomenclature, we call this notion quantum signcryption. Classically, signcryption is only interesting if it provides superior performance to encypt-then-sign. Quantumly, it is far more interesting: it is the only signing method available. We develop "as-strong-as-classical" security definitions for quantum signcryption and give secure constructions based on post-quantum public-key primitives. Along the way, we show that a natural hybrid method of combining classical and quantum schemes can be used to "upgrade" a secure classical scheme to the fully-quantum setting, in a wide range of cryptographic settings including signcryption, authenticated encryption, and CCA security.


Author(s):  
Andrea Caforio ◽  
Subhadeep Banik ◽  
Yosuke Todo ◽  
Willi Meier ◽  
Takanori Isobe ◽  
...  

Energy efficiency is critical in battery-driven devices, and designing energyoptimal symmetric-key ciphers is one of the goals for the use of ciphers in such environments. In the paper by Banik et al. (IACR ToSC 2018), stream ciphers were identified as ideal candidates for low-energy solutions. One of the main conclusions of this paper was that Trivium, when implemented in an unrolled fashion, was by far the most energy-efficient way of encrypting larger quantity of data. In fact, it was shown that as soon as the number of databits to be encrypted exceeded 320 bits, Trivium consumed the least amount of energy on STM 90 nm ASIC circuits and outperformed the Midori family of block ciphers even in the least energy hungry ECB mode (Midori was designed specifically for energy efficiency).In this work, we devise the first heuristic energy model in the realm of stream ciphers that links the underlying algebraic topology of the state update function to the consumptive behaviour. The model is then used to derive a metric that exhibits a heavy negative correlation with the energy consumption of a broad range of stream cipher architectures, i.e., the families of Trivium-like, Grain-like and Subterranean-like constructions. We demonstrate that this correlation is especially pronounced for Trivium-like ciphers which leads us to establish a link between the energy consumption and the security guarantees that makes it possible to find several alternative energy-optimal versions of Trivium that meet the requirements but consume less energy. We present two such designs Trivium-LE(F) and Trivium-LE(S) that consume around 15% and 25% less energy respectively making them the to date most energy-efficient encryption primitives. They inherit the same security level as Trivium, i.e., 80-bit security. We further present Triad-LE as an energy-efficient variant satisfying a higher security level. The simplicity and wide applicability of our model has direct consequences for the conception of future hardware-targeted stream ciphers as for the first time it is possible to optimize for energy during the design phase. Moreover, we extend the reach of our model beyond plain encryption primitives and propose a novel energy-efficient message authentication code Trivium-LE-MAC.


2021 ◽  
Vol 3 (3) ◽  
pp. 56-62
Author(s):  
Didik Iskandar

Ethics is one approach that is often used in public policy in the framework of public administration. The Family Hope Program is an empowerment program for underprivileged communities by providing conditional cash assistance. This study will to describe the benefits, great benefits, and benefits for as many people as possible in terms of the ethical perspective of utilitarianism from a policy in the form of a program, namely, implementation of the family of hope program in Palopo City. The object of this research is was family hope program at Palopo City. This study uses an evaluation method through a qualitative approach. Data obtained through data presentation, data reduction, verification and conclusion drawing. The results of the study indicate that the benefits obtained to implementation of family hope program in Palopo City are based on utilitarian ethics, namely there are additional costs in meeting education and health needs. Furthermore, great benefit that can be obtained to program recipients is a change in mindset to prioritize and care more about the importance of children's education and in the health sector, namely the importance of regular check-ups to the posyandu for pregnant women and toddlers. The great benefit for as many people as possible that will be found in implementation on this program is that there is an insurance effect for program recipients, namely future security guarantees for PKH participants as a means of motivation to see education and health as potential welfare.


Sign in / Sign up

Export Citation Format

Share Document