contract signing
Recently Published Documents


TOTAL DOCUMENTS

147
(FIVE YEARS 28)

H-INDEX

14
(FIVE YEARS 3)

2022 ◽  
Author(s):  
Vijay Kumar Yadav ◽  
Nitish Andola ◽  
Shekhar Verma ◽  
S Venkatesan

Oblivious transfer (OT) protocol is an essential tool in cryptography that provides a wide range of applications like secure multi-party computation, private information retrieval, private set intersection, contract signing, and privacy-preserving location-based services. The OT protocol has different variants such as one-out-of-2, one-out-of- n , k -out-of- n , and OT extension. In the OT (one-out-of-2, one-out-of- n , and OT extension) protocol, the sender has a set of messages, whereas the receiver has a key. The receiver sends that key to the sender in a secure way; the sender cannot get any information about the received key. The sender encrypts every message by operating on every message using the received key and sends all the encrypted messages to the receiver. The receiver is able to extract only the required message using his key. However, in the k -out-of- n OT protocol, the receiver sends a set of k keys to the sender, and in replay, the sender sends all the encrypted messages. The receiver uses his keys and extracts the required messages, but it cannot gain any information about the messages that it has not requested. Generally, the OT protocol requires high communication and computation cost if we transfer millions of oblivious messages. The OT extension protocol provides a solution for this, where the receiver transfers a set of keys to the sender by executing a few numbers of OT protocols. Then, the sender encrypts all the messages using cheap symmetric key cryptography with the help of a received set of keys and transfer millions of oblivious messages to the receiver. In this work, we present different variants of OT protocols such as one-out-of-2, one-out-of- n , k -out-of- n , and OT extension. Furthermore, we cover various aspects of theoretical security guarantees such as semi-honest and malicious adversaries, universally composable, used techniques, computation, and communication efficiency aspects. From the analysis, we found that the semi-honest adversary-based OT protocols required low communication and computation costs as compared to malicious adversary-based OT protocols.


Electronics ◽  
2021 ◽  
Vol 10 (12) ◽  
pp. 1457
Author(s):  
Josep-Lluis Ferrer-Gomila ◽  
M. Francisca Hinarejos

Fair digital signature of contracts and agreements is an essential process in any electronic commerce scenario, and therefore also in data marketplaces, where the relationships and agreements among the different parties (consumers and providers) are more dynamic. In multi-party contract signing, N parties wish to sign a contract in a such a way that either all signatories obtain evidence of the signing or none obtains conflicting evidence regarding the honest signatories; the exchange must be fair. In this paper, we propose a blockchain-based multi-party contract signing protocol. This solution does not require the existence or potential intervention of a trusted third party (TTP), thus avoiding the difficulty of N signatories agreeing upon a TTP. In addition, this proposal meets the necessary requirements: fairness, timeliness, non-repudiation of origin, and non-repudiation of receipt. Furthermore, confidentiality can be easily achieved. To minimize costs associated with the use of blockchain, it should be invoked in the case of exception (analogous to optimistic solutions with a TTP) and by only one of the N signatories. However, when the use of blockchain is required, we show that its cost is within perfectly manageable margins.


2021 ◽  
Vol 290 ◽  
pp. 02028
Author(s):  
Jia Liu ◽  
Ying Yang ◽  
Bao-Yao Xiao ◽  
Zhi-Tao Huang ◽  
Xiao-Hui Nie ◽  
...  

Exploring labor rights on the cognition of relationship with labor dispute is not only from the direct role of workers and HR, but also from the fight for labor rights of college students. However, many labor disputes in labor process are mainly related to labor rights. Therefore, we explore the relationship between labor rights and labor disputes, use neural network analysis and questionnaire survey method, and execute AI combining with big data analysis tools to collect first-hand data from two aspects of college students, workers in the industry, HR and labor dispatch personnel. Finally, the results show that: (1) there is a negative correlation between social security and labor disputes; (2) there is a negative correlation between labor safety and labor disputes; (3) there is a negative correlation between wages and labor disputes; (4) there is a negative correlation between labor contract signing and labor disputes; (5) there is a positive correlation between rights awareness and labor disputes.


2021 ◽  
Vol 263 ◽  
pp. 05004
Author(s):  
Nguyen Quoc Toan ◽  
Nguyen Dinh Phong ◽  
Nguyen Viet Huong ◽  
Nguyen Thi Tuyet Dung ◽  
Nguyen Tan

PPP investments have been in practice in Vietnam for more than 20 years, yet, many shortcomings and constraints have been revealed. This paper analyzes applicable legal regulations on Public-private partnership contracts of investment in Vietnam, and demonstrates barriers encountered by parties, particularly private sector, including discrepancies and non-coherence among legal documents resulting in losses, wastes of resources; absence of standard agreements/ contracts making negotiations and contract signing hard to conclude; insufficient clarity in provisions about concessioning, and responsibilities, among others. The analysis, hence, suggests how to deal with the situation by amendments, supplements to provisions on the agreements between public and private partners.


2020 ◽  
Vol 4 (4) ◽  
Author(s):  
Ashari Ashari

ABSTRAK Berbagai penyimpangan kerap terjadi dalam proses pengadaan barang dan jasa oleh pemerintah dalam menjalankan tugas dan jabatannya sesuai dengan kewenangannya,namun terdapat beberapa pandangan mengenai penyalahgunaan wewenang dalam prespektif hukum administrasi negara (pasal 17 UU No 30/ 2014 tentang administrasi pemerintah ) dan hukum pidana (pasal 3 UU No 20/2001 tentang tindak pidana korupsi). Tujuan peneltian ini untuk mengetahui pengaturan penyalahgunaan wewenang oleh pemerintah dalam UU No 30/2014 dan UU No 20/2001, dan bentuk penyalahgunaan wewenang dalam pengadaan barang dan jasa. Jenis penelitian, yuridis normatif dengan pendekatan perundang-undangan dan kasus. Hasil penelitian, yang dikategorikan sebagai tindakan menyalahgunakan wewenang dalam UU No 30/2014 adalah perbuatan yang menyimpang dari tujuan pemberian kewenangan, asas legalitas dan asas-asas umum pemerintahan yang baik, sedangkan tindakan menyalahgunakan wewenang dalam UU No 20/2001 tidak harus selalu berupa dikeluarkannya keputusan yang bertentangan atau menyalahi suatu aturan. Cukup perbuatan itu melanggar aturan tertulis sebagai dasar kewenangannya, memiliki maksud yang menyimpang, dan berpotensi merugikan Negara. Bentuk penyalahgunaan wewenang pada tahap penunjukan pemenang, tahap penandatangan kontrak yang terjadi dalam bentuk surat penunjukan yang tidak lengkap, dan tahap Penyerahan Barang dan Jasa kata kunci: penyalahgunaan wewenang, pemerintah, barang dan jasaABSTRAC Various irregularities often occur in the process of procuring goods and services by the government in carrying out their duties and positions in accordance with their authority, but there are several views regarding abuse of authority in the perspective of state administrative law (article 17 of Law No. 30/2014 on government administration) and criminal law (article 17). 3 Law No. 20/2001 on criminal acts of corruption). The purpose of this research is to determine the regulation of abuse of power by the government in Law No. 30/2014 and Law No. 20/2001, and forms of abuse of authority in the procurement of goods and services. This type of research, juridical normative with the approach of legislation and cases. The results of the research, which are categorized as acts of abuse of authority in Law No. 30/2014 are acts that deviate from the purpose of granting authority, legality principles and general principles of good governance, while acts of abusing authority in Law No. 20/2001 do not always involve issuing them. decisions that contradict or violate a rule. It is enough that the act violates written rules as the basis of its authority, has a deviant intention, and has the potential to harm the State. The form of abuse of authority at the stage of appointing the winner, the contract signing stage that occurs in the form of an incomplete appointment letter, and the stage of delivery of goods and serviceskeywords: abuse of authority, government, goods and services


2020 ◽  
Vol 535 ◽  
pp. 142-155 ◽  
Author(s):  
Liang Zhang ◽  
Hanlin Zhang ◽  
Jia Yu ◽  
Hequn Xian
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document