scholarly journals A Novel User Collusion-Resistant Decentralized Multi-Authority Attribute-Based Encryption Scheme Using the Deposit on a Blockchain

2021 ◽  
Vol 2021 ◽  
pp. 1-15
Author(s):  
Siwan Noh ◽  
Donghyun Kim ◽  
Zhipeng Cai ◽  
Kyung-Hyune Rhee

Recently, the concept of a decentralized data marketplace is getting much attention to exchange user data. Multi-authority attribute-based encryption (ABE), which can provide flexibility and user-centric access control, is previously widely used in decentralized data sharing applications and also becoming a foundation to build decentralized data trading applications. It is known that users in a multi-authority ABE system can collude by sharing their secret information for malicious purposes. To address this issue, the collusion-resistant multi-authority ABE model was introduced in which a unique global identifier (GID) is issued by the central authority (CA) to each user. Unfortunately, such approach cannot be used directly to build a decentralized data marketplace as (a) such intervention of the CA is directly against the main motivation of the decentralized trading platform and, mostly importantly, (b) the CA can exploit its full knowledge on users’ GID to launch various attacks against users. Motivated by these observations, this paper introduces a novel user collusion-resistant decentralized multi-authority ABE scheme for privacy preserving data trading systems. In the existing multi-authority ABE systems, users utilize his/her GID that is solely assigned by the CA to generate his/her secret keys throughout the collaboration with authorities and a user can compute multi-authority keys by combining the secret keys (stem from the same GID) in various ways. In the proposed system, the CA only has a partial knowledge of users’ GIDs, and thus, users’ privacy can be protected. On the other hand, we set the user’s own partial GID as a secret which can be used to withdraw his/her deposit to discourage any possible collusion among users.

1902 ◽  
Vol 48 (202) ◽  
pp. 434-450 ◽  
Author(s):  
T. S. Clouston

Dr. Clouston said that when he suggested toxæmia to the secretary as a suitable subject for a discussion at this meeting he had not intended to be the first speaker, because his object was to bring out more fully the views of the younger members who had recently committed themselves so strongly to the toxæmic and bacterial etiology of insanity, and so to get light thrown on some of the difficulties which he and others had felt in applying this theory to many of their cases in practice. It was not that he did not believe in the toxic theory as explaining the onset of many cases, or that he under-rated its importance, but that he could not see how it applied so universally or generally as some of the modern pathological school were now inclined to insist on. He knew that it was difficult for those of the older psychological and clinical school to approach the subject with that full knowledge of recent bacteriological and pathological doctrine which the younger men possessed, or to breathe that all-pervading pathological atmosphere which they seemed to inhale. He desired to conduct this discussion in an absolutely non-controversial and purely scientific spirit. To do so he thought it best to put his facts, objections, and difficulties in a series of propositions which could be answered and explained by the other side. He thought it important to define toxæmia, but should be willing to accept Dr. Ford Robertson's definition of toxines, viz., “Substances which are taken up by the (cortical nerve) cell and then disorder its metabolism.” He took the following extracts from his address at the Cheltenham meeting of the British Association (1) as representing Dr. Ford Robertson's views and the general trend of much investigation and hypothesis on the Continent.


2020 ◽  
Author(s):  
Fei Meng ◽  
Leixiao Cheng ◽  
Mingqiang Wang

Abstract Smart city, as a promising technical tendency, greatly facilitates citizens and generates innumerable data, some of which is very private and sensitive. To protect data from unauthorized users, ciphertext-policy attribute-based encryption (CP-ABE) enables data owner to specify an access policy on encrypted data. However, There are two drawbacks in traditional CP-ABE schemes. On the one hand, the access policy is revealed in the ciphertext so that sensitive information contained in the policy is exposed to anyone who obtains the ciphertext. For example, both the plaintext and access policy of an encrypted recruitment may reveal the company's future development plan. On the other hand, the decryption time scales linearly with the complexity of the access, which makes it unsuitable for resource-limited end users. In this paper, we propose a CP-ABE scheme with hidden sensitive policy for recruitment in smart city. Specifically, we introduce a new security model chosen sensitive policy security: two access policies embedded in the ciphertext, one is public and the other is sensitive and fully hidden, only if user's attributes satisfy the public policy, it's possible for him/her to learn about the hidden policy, otherwise he/she cannot get any information (attribute name and its values) of it. When the user satisfies both access policies, he/she can obtain and decrypt the ciphertext. Compared with other CP-ABE schemes, our scheme supports a more expressive access policy, since the access policy of their schemes only work on the ``AND-gate'' structure. In addition, intelligent devices spread all over the smart city, so partial computational overhead of encryption of our scheme can be outsourced to these devices as fog nodes, while most part overhead in the decryption process is outsourced to the cloud. Therefore, our scheme is more applicable to end users with resource-constrained mobile devices. We prove our scheme to be selective secure under the decisional bilinear Diffie-Hellman (DBDH) assumption.


Author(s):  
Anne Layne-Farrar

As part of its “policy project to examine the legal and policy issues surrounding the problem of potential patent ‘hold-up' when patented technologies are included in collaborative standards,” the Federal Trade Commission held an all-day workshop on June 21, 2011. The first panel of the day focused on patent disclosure rules intended to encourage full knowledge of patents “essential” for a standard and therefore to prevent patent ambush. When patents are disclosed after a standard is defined, the patent holder may have enhanced bargaining power that it can exploit to charge excessive royalties (e.g., greater than the value the patented technology contributes to the product complying with the standard). In this chapter, the authors present a case study on patent disclosure within the ICT sector. Specifically, they take an empirical look at the timing of patent disclosures within the European Telecommunications Standards Institute, the body responsible for some of the world's most prevalent mobile telephony standards. They find that most members officially disclose their potentially relevant patents after the standard is published, and sometimes considerably so. On the other hand, the authors also find that the delay in declaring patents to ETSI standards has been shrinking over time, with disclosures occurring closer to (although for the most part still after) the standard publication date for more recent standard generations as compared to earlier ones. This latter finding coincides with ETSI policy changes, suggesting that standards bodies may be able to improve patent disclosure with more precise rules.


Author(s):  
Derek Hird ◽  
Geng Song

This chapter outlines transnational masculinities as a field of Study, and scholarship on transnationally inflected representations of Chinese masculinity and transnationally mobile Chinese men. It identifies three key key characteristics in the scholarly literature on Chinese masculinities in the context of globalization. First, the concept of cosmopolitanism is being increasingly used to explore the localization of globally circulating ideas and images in Chinese masculinities. Second, China’s integration with global financial and trading systems, which has been particularly pronounced since the 1990s, has forced the historically dominant intellectual or scholar-official (shi士‎) class to reconcile itself with the business activities traditionally carried out by the merchant (shang商‎) class. Third, the transnational circulation of models of emotionally expressive and caring fatherhood is significantly influencing Chinese discourses and practices of fathering. Through a detailed analysis of the other chapters in the volume, this chapter argues that it is possible to identify five broad patterns in the transformations of Chinese transnational masculinities: the embrace of localized cosmopolitan masculinities that are part-founded on historical notions and practices of Chinese masculinity; the enmeshment of intellectuals in business markets; emotionally engaged styles of fathering and intimate partnership; romantic involvement with non-Chinese women; and widespread anxiety and sensitivity about perceptions of Chinese masculinity. This chapter concludes that Chinese men are not unique in having to face such issues in transnational contexts; but, as the other chapters in this volume demonstrate, they negotiate them in unique—yet explainable—ways.


2020 ◽  
Author(s):  
Zhen Liu ◽  
Qiong Huang ◽  
Duncan S Wong

Abstract Attribute-based encryption (ABE) is a versatile one-to-many encryption primitive, which enables fine-grained access control over encrypted data. Due to its promising applications in practice, ABE schemes with high efficiency, security and expressivity have been continuously emerging. On the other hand, due to the nature of ABE, a malicious user may abuse its decryption privilege. Therefore, being able to identify such a malicious user is crucial towards the practicality of ABE. Although some specific ABE schemes in the literature enjoys the tracing function, they are only proceeded case by case. Most of the ABE schemes do not support traceability. It is thus meaningful and important to have a generic way of equipping any ABE scheme with traceability. In this work, we partially solve the aforementioned problem. Namely, we propose a way of transforming (non-traceable) ABE schemes satisfying certain requirements to fully collusion-resistant black-box traceable ABE schemes, which adds only $O(\sqrt{\mathcal{K}})$ elements to the ciphertext where ${\mathcal{K}}$ is the number of users in the system. And to demonstrate the practicability of our transformation, we show how to convert a couple of existing non-traceable ABE schemes to support traceability.


2008 ◽  
Vol 5 (27) ◽  
pp. 1193-1202 ◽  
Author(s):  
Roderich Groß ◽  
Alasdair I Houston ◽  
Edmund J Collins ◽  
John M McNamara ◽  
François-Xavier Dechaume-Moncharmont ◽  
...  

We consider an agent that must choose repeatedly among several actions. Each action has a certain probability of giving the agent an energy reward, and costs may be associated with switching between actions. The agent does not know which action has the highest reward probability, and the probabilities change randomly over time. We study two learning rules that have been widely used to model decision-making processes in animals—one deterministic and the other stochastic. In particular, we examine the influence of the rules' ‘learning rate’ on the agent's energy gain. We compare the performance of each rule with the best performance attainable when the agent has either full knowledge or no knowledge of the environment. Over relatively short periods of time, both rules are successful in enabling agents to exploit their environment. Moreover, under a range of effective learning rates, both rules are equivalent, and can be expressed by a third rule that requires the agent to select the action for which the current run of unsuccessful trials is shortest. However, the performance of both rules is relatively poor over longer periods of time, and under most circumstances no better than the performance an agent could achieve without knowledge of the environment. We propose a simple extension to the original rules that enables agents to learn about and effectively exploit a changing environment for an unlimited period of time.


2012 ◽  
Vol 89 (3) ◽  
pp. 268-283 ◽  
Author(s):  
Vladimir Božović ◽  
Daniel Socek ◽  
Rainer Steinwandt ◽  
Viktória I. Villányi

2004 ◽  
Vol 128 (3) ◽  
pp. 473-481 ◽  
Author(s):  
Alan Hale ◽  
Milt Davis ◽  
Jim Sirbaugh

Two primary aircraft propulsion subsystems are the inlet and the engine. Traditionally these subsystems have been designed, analyzed, and tested as isolated systems. The interaction between the subsystems is modeled primarily through evaluating inlet distortion in an inlet test and then simulating this distortion in engine tests via screens or similar devices. Recently, it has been recognized that significant improvements in both performance and operability can be realized when both the inlet and the engine are designed with full knowledge of the other. In this paper, a computational tool called Turbine Engine Analysis Compressor Code is used to evaluate the effect of inlet distortion on a three-stage military fan. This three-stage military fan is further connected to an F-16 inlet and forebody operating at an angle of attack and sideslip to demonstrate the effect of inlet distortion generated by flight maneuvers. The computational approach of simulating an integrated inlet-engine system is expected to provide additional insight over evaluating the components separately.


2010 ◽  
Vol 180 (13) ◽  
pp. 2618-2632 ◽  
Author(s):  
Huang Lin ◽  
Zhenfu Cao ◽  
Xiaohui Liang ◽  
Jun Shao

Cloud acts as a database for huge amount of data. It allows users to store the information or data related items in the cloud storage and allows them to use/ their data via network connection. There are different types of cloud, Public private hybrid and community. In case of public cloud the user rents the storage and stores the data in it. There exist some trust issues in storing data in the cloud since there are many untrusted users who also rented the cloud and there is need for the encryption of data there are many ways to encrypt the data the new trend in encryption is attribute based encryption. The main advantage in attribute based encryption is that it depends on the attributes of the user which differs vastly from one user to another. This paper explains about the use of attribute based encryption in cloud and how it differs from the other encryption algorithms and it advantages over other algorithms. This paper also explains about the cipher-text policy in ABE in various aspects


Sign in / Sign up

Export Citation Format

Share Document