From impartial expert to adversary in the wake of Ake.
نویسنده
چکیده
In deciding Ake v. Oklahoma, the Supreme Court held that, when defendants demonstrate that their sanity is likely to be a significant factor at trial, the State must assure them access to a competent psychiatrist who will not only examine them but also render other assistance to the defense. There have been 28 known subsequent decisions in which appellate courts have ruled on the validity of Ake-based claims; in only four did the defendant prevail. The case nonetheless raises issues relative to the proper role of the psychiatric expert. The Supreme Court's decisions, although not introducing a new ethical topic, appear to be favoring a more adversarial posture, at least within certain parameters. I suggest that impartiality, independence, and advocacy need not be mutually exclusive concepts and that some of our traditional beliefs about what part we should play in criminal law may have to be modified and expanded.
منابع مشابه
In the wake of Ake: the ethics of expert testimony in an advocate's world.
The decision of the U.S. Supreme Court in Ake v. Oklahoma redefined the role of psychiatrists as experts in criminal cases. In addition to the expert's serving as evaluator and witness, the Court stressed the importance of the defense having a psychiatrist available to act as a consultant in the preparation and presentation of its case. This broader conception of the expert's role has raised et...
متن کاملAuthenticated Key Exchange under Bad Randomness
We initiate the formal study on authenticated key exchange (AKE) under bad randomness. This could happen when (1) an adversary compromises the randomness source and hence directly controls the randomness of each AKE session; and (2) the randomness repeats in different AKE sessions due to reset attacks.We construct two formal security models, Reset-1 and Reset-2, to capture these two bad randomn...
متن کاملAdaptively-Secure Authenticated Key Exchange Protocol in Standard Model
Design a Secure Authenticated Key Exchange (AKE) protocol is a wide research area. Many works have been done in this field and remain few open problems. Design an AKE-secure without NAXOS approach is remaining as an open problem. NAXOS approach [18] is used to hide the ephemeral secret key from an adversary even if the adversary in somehow may obtain the ephemeral secret key. Using NAXOS approa...
متن کاملEfficient and Leakage-Resilient Authenticated Key Transport Protocol Based on RSA
In this paper, we prove the security of the RSA-AKE protocol [9] in the random oracle model. The proof states that the RSA-AKE protocol is secure against an adversary who gets the client’s stored secret or the server’s RSA private key. To our best knowledge, the RSA-AKE protocol is the most efficient among their kinds (i.e., RSA and password based AKE protocols). The other security properties a...
متن کاملNotes on weaknesses in a leakage-resilient authenticated key transport protocol
Tang et al., [1] have showed weaknesses in a leakage-resilient authenticated key transport (so-called RSA-AKE) protocol [2] and then proposed an enhanced protocol. The objective of this paper is two-fold. First, we clarify some ambiguities that may cause misunderstandings on the RSA-AKE protocol by [1]. Second, we show that Tang’s protocol is insecure against a weaker adversary who gets the cli...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- The Bulletin of the American Academy of Psychiatry and the Law
دوره 16 1 شماره
صفحات -
تاریخ انتشار 1988