Filters








9 Hits in 7.1 sec

Anonymous sealed bid auction protocol based on a variant of the dining cryptographers' protocol

Mihály Bárász, Péter Ligeti, László Mérai, Dániel A. Nagy
2012 Periodica Mathematica Hungarica  
In this paper we present a cryptographic protocol realizing anonymous sealed bid auctions, such as first price or Vickrey auction, based on this variant.  ...  In a recent paper (Another Twist in the Dining Cryptographers' Protocol, submitted to Journal of Cryptology) the authors propose a variant of the original DC eliminating its main disadvantages.  ...  An application of the presented "Angry Mob" protocol for a different purpose could be a simple verifiable shuffle similar to that proposed by Andrew Neff [13, 14] .  ... 
doi:10.1007/s10998-012-6512-6 fatcat:2t7znomd5rdbvffvoglo5rqlgi

Towards Formal Analysis of Insider Threats for Auctions

Florian Kammueller, Manfred Kerber, Christian W. Probst
2016 Proceedings of the 2016 International Workshop on Managing Insider Security Threats - MIST '16  
As a case study, we use the cocaine auction protocol that represents a nice combination of cryptographic techniques, protocols, and privacy goals suitable for highlighting insider threats for auctions.  ...  For online-auction systems, like eBay, but also for high-value one-off auction algorithms as they are used for selling radio wave frequencies, the use of rigorous machine supported modelling and verification  ...  This publication reflects only the authors' views and the Union is not liable for any use that may be made of the information contained herein.  ... 
doi:10.1145/2995959.2995963 fatcat:xidr5xq34ncnljogzk7kn4ucie

ANOTHER TWIST IN THE DINING CRYPTOGRAPHERS' PROTOCOL

Mihály Bárász, Péter Ligeti, Krisztina Lója, László Mérai, Dániel A. Nagy
2013 Tatra Mountains Mathematical Publications  
In this paper, we explore the Dining Cryptographers' protocol over a cyclic group with a one-way homomorphic image, using a boardroom voting protocol as an illustration of its desirable security properties  ...  In particular, we address the problem of anonymous disruption, which is one of the main disadvantages of DC over more usual groups like binary vectors.  ...  C h a u m proposed the so-called Dining Cryptographers' Protocol [3] (denoted, henceforth, by DC) which allows one participant to broadcast a message anonymously.  ... 
doi:10.2478/tmmp-2013-0037 fatcat:urozo5kllreoromkh445wqna5u

The Security Reference Architecture for Blockchains: Towards a Standardized Model for Studying Vulnerabilities, Threats, and Defenses

Ivan Homoliak, Sarad Venugopalan, Daniel Reijsbergen, Qingze Hum, Richard Schumi, Pawel Szalachowski
2020 IEEE Communications Surveys and Tutorials  
Finally, we provide designers of blockchain platforms and applications with a design methodology following the model of SRA and its hierarchy.  ...  Next, to enable better reasoning about security aspects of blockchains by the practitioners, we propose a blockchain-specific version of the threat-risk assessment standard ISO/IEC 15408 by embedding the  ...  ACKNOWLEDGMENT The authors would like to thank our colleagues Pieter Hartel, Stefanos Leonardos, and Mark van Staalduinen for their valuable feedback.  ... 
doi:10.1109/comst.2020.3033665 fatcat:hcrsvvkb2ffmbdlspshy66wg2y

The Security Reference Architecture for Blockchains: Towards a Standardized Model for Studying Vulnerabilities, Threats, and Defenses [article]

Ivan Homoliak, Sarad Venugopalan, Qingze Hum, Daniel Reijsbergen, Richard Schumi, Pawel Szalachowski
2020 arXiv   pre-print
Finally, we provide designers of blockchain platforms and applications with a design methodology following the model of SRA and its hierarchy.  ...  Next, to enable better reasoning about security aspects of blockchains by the practitioners, we propose a blockchain-specific version of the threat-risk assessment standard ISO/IEC 15408 by embedding the  ...  Finally, the authors propose an extension of their scheme to support the anonymity of all bidders by blinding RSA signatures and Dining Cryptographers (DC) network.  ... 
arXiv:1910.09775v2 fatcat:xvxnekjhtbbt7dc4b3kxy3m6xi

Chasing the AIDS virus

Thomas Lengauer, André Altmann, Alexander Thielen, Rolf Kaiser
2010 Communications of the ACM  
The authors find that, surprisingly, their filter-based gist is rather good at predicting the number of instances of a given object category that might be present in the scene, as well as their likely  ...  All errors and omissions are my own (though of course I faced constraints on length and number of citations).  ...  A simple example of such a payment rule is the second-price sealed-bid auction for a single item. In this auction, the bidder with the highest bid wins, but only pays the second-highest bid.  ... 
doi:10.1145/1666420.1666440 fatcat:o2qllqh4tzhh5dzgvnjewl52vq

The Passions and the Interests: Unpacking the 'Sharing Economy'

Cristiano Codagnone, Federico Biagi, Fabienne Abadie
2016 Social Science Research Network  
It does so in a unique way, because of the extensive evidence base used and the inter-disciplinary approach it takes in which theoretical and empirical economics, sociology, anthropology, regulatory and  ...  and empirically-grounded typology, (iii) maps the controversies against available empirical evidence on the functioning and on the impacts of 'sharing' platforms, (iv) reviews the debate and the literature  ...  Descriptively the main finding is that reviews on Airbnb are generally positive and informative: 97% of guests privately and anonymously report having positive experiences and 74% of guests submit a five  ... 
doi:10.2139/ssrn.2793901 fatcat:bpayzisofngsdo6quqzvjuouka

Prometheus wired: the hope for democracy in the age of network technology

2001 ChoiceReviews  
Ted White, MP, Reform Party of Canada. Personal correspondence, 22 November 1995. technology and politics to bear on a number of the questions facing us as we head into the age of networks.  ...  Hope frees our minds so they can set to work on freeing our bodies. Fire was a means but, without the support of hope, its flames could be contained. In the face of hope, Zeus was doomed.  ...  This grammar is known as a network "protocol", and the first one was drafted by "an adhocracy of intensely creative, sleep-deprived, idiosyncratic, well-meaning computer geniuses8' based at the first four  ... 
doi:10.5860/choice.38-2996 fatcat:r6oqbybt7rhx5acnwrai6rszny

Singularities: technoculture, transhumanism, and science fiction in the 21st Century SINGULARITIES: TECHNOCULTURE, TRANSHUMANISM, AND SCIENCE FICTION IN THE 21 ST CENTURY

Joshua Raulerson, Joshua Raulerson, Charles Stross, Cory Doctorow, Neal Stephenson, Bruce Sterling, Rudy Rucker, William Gibson, Joshua Raulerson
2010 unpublished
Primary readings are drawn from a wide-ranging selection of twentieth-and twenty-first-century technocultural fiction, with emphasis on SF works by  ...  , demanding both a reevaluation of SF's conception of and orientation toward the future, and a new narrative model capable of grappling with the alien and often paradoxical complexity of the postsingular  ...  (55) Manfred's private army of zombie corporations does his bidding while shielding him cryptographically from liability, by sheer virtue of the complexity of the structure: in order to locate and serve  ... 
fatcat:qmpgwpi74jdfhipo4bt7o2wy3q