scholarly journals Reputable List Curation from Decentralized Voting

2020 ◽  
Vol 2020 (4) ◽  
pp. 297-320
Author(s):  
Elizabeth C. Crites ◽  
Mary Maller ◽  
Sarah Meiklejohn ◽  
Rebekah Mercer

AbstractToken-curated registries (TCRs) are a mechanism by which a set of users are able to jointly curate a reputable list about real-world information. Entries in the registry may have any form, so this primitive has been proposed for use—and deployed—in a variety of decentralized applications, ranging from the simple joint creation of lists to helping to prevent the spread of misinformation online. Despite this interest, the security of this primitive is not well understood, and indeed existing constructions do not achieve strong or provable notions of security or privacy. In this paper, we provide a formal cryptographic treatment of TCRs as well as a construction that provably hides the votes cast by individual curators. Along the way, we provide a model and proof of security for an underlying voting scheme, which may be of independent interest. We also demonstrate, via an implementation and evaluation, that our construction is practical enough to be deployed even on a constrained decentralized platform like Ethereum.

Author(s):  
Mahalingam Ramkumar

Approaches for securing digital assets of information systems can be classified as active approaches based on attack models, and passive approaches based on system-models. Passive approaches are inherently superior to active ones. However, taking full advantage of passive approaches calls for a rigorous standard for a low-complexity-high-integrity execution environment for security protocols. We sketch broad outlines of mirror network (MN) modules, as a candidate for such a standard. Their utility in assuring real-world information systems is illustrated with examples.


2020 ◽  
Author(s):  
Jing Fan

UNSTRUCTURED Smartphone-based contact tracing is proven to be effective in epidemic containment. To maintain its utilization meanwhile ensure the protection of personal privacy, different countries came up with different practices, new exploratory solutions may come into real-world practice soon as well.


Author(s):  
Kaori Kashimura ◽  
Takafumi Kawasaki Jr. ◽  
Nozomi Ikeya ◽  
Dave Randall

This chapter provides an ethnography of a complex scenario involving the construction of a power plant and, in so doing, tries to show the importance of a practice-based approach to the problem of technical and organizational change. The chapter reports on fieldwork conducted in a highly complex and tightly coupled environment: power plant construction. The ethnography describes work practices on three different sites and describes and analyses their interlocking dependencies, showing the difficulties encountered at each location and the way in which the delays that result cascade through the different sites. It goes on to describe some technological solutions that are associated with augmented reality and that are being designed in response to the insights gained from the fieldwork. The chapter also reflects more generally on the relationship between fieldwork and design in real-world contexts.


Author(s):  
Olivia Caramello

This chapter develops a general theory of extensions of flat functors along geometric morphisms of toposes; the attention is focused in particular on geometric morphisms between presheaf toposes induced by embeddings of categories and on geometric morphisms to the classifying topos of a geometric theory induced by a small category of set-based models of the latter. A number of general results of independent interest are established on the way, including developments on colimits of internal diagrams in toposes and a way of representing flat functors by using a suitable internalized version of the Yoneda lemma. These general results will be instrumental for establishing in Chapter 6 the main theorem characterizing the class of geometric theories classified by a presheaf topos and for applying it.


2015 ◽  
Vol 218 ◽  
pp. 51-100
Author(s):  
Jörg Brüdern ◽  
Olivier Robert

AbstractAn asymptotic formula is obtained for the number of rational points of bounded height on the class of varieties described in the title line. The formula is proved via the Hardy-Littlewood method, and along the way we establish two new results on Weyl sums that are of some independent interest.


AKSEN ◽  
2021 ◽  
Vol 6 (1) ◽  
pp. 19-31
Author(s):  
Andrey Caesar Effendi ◽  
LMF Purwanto

The use of digital technology today can be said to be inseparable in our daily lives. Digital technology isslowly changing the way we communicate with others and the environment. Socialization that is usuallyface-to-face in the real world now can be done to not having to meet face-to-face in cyberspace. Thisliterature review aims to see a change in the way of obtaining data that is growing, with the use of digitaltechnology in ethnographic methods. The method used in this paper is to use descriptive qualitativeresearch methods by analyzing the existing literature. So it can be concluded that the use of digitalethnography in the architectural programming process can be a new way of searching for data at thearchitectural programming stage.


Author(s):  
Shafali Agarwal

The chapter intends to propose a hybrid cryptosystem based on a chaotic map and a fractal function. The sequential order of process execution provides a computationally less expensive and simple approach that still designed a secure cryptosystem. A one-dimensional Ricker map and its modified form are employed to initially shuffle the image pixels twice, and also a pseudo-random sequence is generated using both maps. The algorithm implemented a sequence of pixel confusion-diffusion steps using the image rotation and a transcendental anti-Mandelbrot fractal function (TAMFF) and its Mann-iterated fractal function (Sup-TAMFF). Finally, the pixel value of an image obtained in the last step and the recent two pixels of the encrypted image is XORed with the corresponding pseudo-random matrix value to get the cipher image. Subsequently, various performance tests are conducted to verify the suitability of the given method to be used in real-world information transmission.


spontaneously invented a name for the creature derived from the most prominent features of its anatomy: kamdopardalis [the normal Greek word for ‘giraffe*]. (10.27.1-4) It is worth spending a little time analysing what is going on in this passage. The first point to note is that an essential piece of information, the creature’s name, is not divulged until the last possible moment, after the description is completed. The information contained in the description itself is not imparted directly by the narrator to the reader. Instead it is chan­ nelled through the perceptions of the onlooking crowd. They have never seen a giraffe before, and the withholding of its name from the reader re-enacts their inability to put a word to what they see. From their point of view the creature is novel and alien: this is conveyed partly by the naive wonderment of the description, and partly by their attempts to control the new phenomenon by fitting it into familiar categories. Hence the comparisons with leopards, camels, lions, swans, ostriches, eyeliner and ships. Eventually they assert conceptual mastery over visual experience by coining a new word to name the animal, derived from the naively observed fea­ tures of its anatomy. However, their neologism is given in Greek (kamdopardalis), although elsewhere Heliodoros is scrupulously naturalistic in observing that Ethiopians speak Ethiopian. The reader is thus made to watch the giraffe from, as it were, inside the skull of a member of the Ethiopian crowd. The narration does not objectively describe what they saw but subjectively re­ enacts their ignorance, their perceptions and processes of thought. This mode of presentation, involving the suppression of an omniscient narrator in direct communication with the reader, has the effect that the reader is made to engage with the material with the same immediacy as the fictional audience within the frame of the story: it becomes, in imagination, as real for him as it is for them. But there is a double game going on, since the reader, as a real person in the real world, differs from the fictional audience inside the novel precisely in that he does know what a giraffe is. This assumption is implicit in the way the description is structured. If Heliodoros* primary aim had been to describe a giraffe for the benefit of an ignorant reader, he would surely have begun with the animal’s name, not withheld it. So for the reader the encounter


Sign in / Sign up

Export Citation Format

Share Document