13 Hits in 11.9 sec

Malleability and ownership of proxy signatures: Towards a stronger definition and its limitations

Sanjit Chatterjee, ,Department of Computer Science and Automation, Indian Institute of Science, India, Berkant Ustaoğlu, ,Izmir Institute of Technology, Urla, Izmir, 35430 Turkey
2019 Advances in Mathematics of Communications  
Our analysis indicates certain limitations of their definition that arise due to malleability of proxy signature as well as signature ownership in the context of standard signature.  ...  We propose a stronger definition of proxy signature to address these issues.  ...  A case for a stronger definition The most natural construction of a proxy signature is through delegation-bycertificate.  ... 
doi:10.3934/amc.2020015 fatcat:s5dw2ms6zzgzbnrfyvlmyx5ie4

Analysis of a Decentralised Digital Token Architecture for Public Transport [article]

Oscar King, Geoffrey Goodell
2021 arXiv   pre-print
It was observed that for loads between 1 and 5 requests per second the proof-of-concept performs within acceptable limits with a maximum median response time of 438 milliseconds.  ...  Finally, its performance is tested in a local environment to better understand the technical challenges and assess such a system's technical feasibility in a production setting.  ...  The user then proves ownership of the credential used in the setup phase and requests a signature on [z] (7) .  ... 
arXiv:2012.01382v2 fatcat:lyyaoxlsqbfsthey5quirgjop4

Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies

Florian Tschorsch, Bjorn Scheuermann
2016 IEEE Communications Surveys and Tutorials  
In the process, we deduce the fundamental structures and insights at the core of the Bitcoin protocol and its applications.  ...  Besides attracting a billion dollar economy, Bitcoin revolutionized the field of digital currencies and influenced many adjacent areas. This also induced significant scientific interest.  ...  The user needs to provide her public key and her signature to prove ownership.  ... 
doi:10.1109/comst.2016.2535718 fatcat:xmdaafdgsvc6tam2kzmaeyorta

Socialising design? From consumption to production

Fran Tonkiss
2017 City  
Part of the problem lies in a limited definition of a consultation 'process' as a series of formulaic motions geared to particular ends, rather than understanding process as something which might be open-ended  ...  Spatial design is a matter of social concern not only in its orientation towards potential users but as a set of social processes in itself, one which includes a complex field of social actors variously  ... 
doi:10.1080/13604813.2017.1412923 fatcat:fh3q4oezpjbnbjivkpgt2dtwhe

An Incentive-Aligned Approach to Patent Reform

Daniel R. Cahoy
2005 Social Science Research Network  
rights ownership and enforcement and (2) cultural biases toward property ownership, and intellectual property ownership in particular.  ...  This places a limit on the power that should be conveyed to create incentives; stronger patents are not always better.  ... 
doi:10.2139/ssrn.719723 fatcat:m6jdkeya4ndgjmpwki7rzee4le

Flow-Limited Authorization

Owen Arden, Jed Liu, Andrew C. Myers
2015 2015 IEEE 28th Computer Security Foundations Symposium  
It is an approach to information flow control in that it can be used to reason about whether a flow of information is secure.  ...  Flow-limited authorization is an approach to authorization in that it can be used to reason about whether a principal is permitted to perform an action.  ...  In FLAM, we express ownership as a special class of authority projections called ownership projections.  ... 
doi:10.1109/csf.2015.42 dblp:conf/csfw/ArdenLM15 fatcat:sxrbaf5vyffyfdhafjvqnqmyry

Prêt à Voter Providing Everlasting Privacy [chapter]

Denise Demirel, Maria Henning, Jeroen van de Graaf, Peter Y. A. Ryan, Johannes Buchmann
2013 Lecture Notes in Computer Science  
Hugo Jonker for organising a PhD workshop on voting in 2012 at which the authors of this paper met and came up with the ideas for this paper.  ...  in part by the German Federal Ministry of Education and Research (BMBF) via the project "BoRoVo -BoardRoomVoting".  ...  and a signature accepts the signature as valid or rejects it.  ... 
doi:10.1007/978-3-642-39185-9_10 fatcat:5dkjajb5rjfstef4csslxlu4cm

Sustaining International Law: History, Nature, and the Politics of Global Ordering

Aaron Wu
2018 Social Science Research Network  
It established a Central African Power Corporation ('CAPCO') under the joint ownership and control of the two governments.  ...  Its definition retained, within it, an inherent stability: it was both an inclusion, and an exclusion, of certain logics.  ...  Nuclear Tests Examination Request (New Zealand v France) [1995] ICJ Reports 288 Territorial Jurisdiction of the International Commission on the River Oder [1929] PCIJ 23 Trail Smelter (United States  ... 
doi:10.2139/ssrn.3331610 fatcat:ht553xbk65huhbj3usougr3vha

Asian Social Science, Vol. 5, No. 10, 2009. All in one PDF file

Editor ASS
2009 Asian Social Science  
Besides, this article was read at the international seminar (Beijing, China, Oct. 22-Oct. 23, 2005) of "Community of Transient Population" and "Urban Poverty and Social Protection", and received comments  ...  Acknowledgements Ms Kong Ping from Bureau of Civil Affairs in W District gave cordial assistance for this study; Prof. Xia Yuzhen and Prof.  ...  While Nida's definition does not limit the level of equivalence, so it maybe at any level.  ... 
doi:10.5539/ass.v5n10p0 fatcat:tqpc4rwrk5ahtb7tkvn4pdscky

Decentralized Anonymous Micropayments [chapter]

Alessandro Chiesa, Matthew Green, Jingcheng Liu, Peihan Miao, Ian Miers, Pratyush Mishra
2017 Lecture Notes in Computer Science  
One of the key ingredients of our construction is fractional message transfer (FMT), a primitive that enables probabilistic message transmission between two parties, and for which we give an efficient  ...  Wheeler (1996) and Rivest (1997) proposed probabilistic payments as a technique to achieve micropayments: a merchant receives a macro-value payment with a given probability so that, in expectation, he  ...  Such an agency acts as a proxy to the subset of merchants it serves, and its only task is to "monitor" the cumulative values of a M and w M for merchants in the agency.  ... 
doi:10.1007/978-3-319-56614-6_21 fatcat:yplgiwomajfhjl5zqvttmx34ou

Trading up: Postnuptial Agreements, Fairness, and a Principled New Suitor for California

Rebecca Glass
2004 California Law Review  
This usage should not suggest to the reader a disinterest in the rights of the financially stronger party, but simply that those concerns are addressed in the predictability prong. 16 ownership and control  ...  trend toward contractual autonomy, it refrained from adopting the Act and its freedom of contract philosophy unreservedly.  ... 
doi:10.2307/3481447 fatcat:76qxcwfecrghbjelgcdhmstwii

Competitive Moves: The Influence of Industry Context and Individual Cognitive Factors

Lee J. Zane, William Kline
2017 Entrepreneurship Research Journal  
We conducted a two-by-two within-subjects design experiment to test our hypotheses with a sample consisting of service industry professionals.  ...  This paper discusses how ventures launch competitive moves, particularly the speed and intensity of action, under contrasting conditions of exogenous uncertainty and first-mover advantage.  ...  Qualitative investigations focusing on the nature of well-being and how it is experienced by employees would be enlightening. Achieving effective leadership is not a simple task.  ... 
doi:10.1515/erj-2015-0037 fatcat:7tsosyzt6ffuhjmikxxmsmyc7i

Access denied: the practice and policy of global Internet filtering

2008 ChoiceReviews  
Two Kurdish Web sites, and, were blocked, as was the Web site of the United States Committee for a Free Lebanon (, which campaigns for an end to Syrian influence  ...  Although the tests indicate that Syria now blocks fewer Web sites than it has in the past, many sites remain blocked.  ...  Notable advancements in regulation at the EU level-although not directly in the area of filtering-include the definition of ISP liability toward illegal content and obligations toward data retention.  ... 
doi:10.5860/choice.45-6833 fatcat:qhuziwkinrdtldsaylvbmumopu