Identity-Based Cryptography on Hidden-Order Groups
|
|
- Drusilla Douglas
- 5 years ago
- Views:
Transcription
1 vailable olie at Procedia Egieerig 9 (0) Iteratioal Worshop o Iformatio ad Electroics Egieerig (IWIEE) Idetity-Based Cryptography o Hidde-Order Groups Chalgu Li a a Key Laboratory of Networ Security ad Cryptology, Fujia Normal Uiversity, Fuzhou, P..Chia bstract ecetly, Saxea ad Soh preseted oe ovel cryptographic primitive based o associative oe-way fuctios, called oracle-based group with ifeasible iversio (O-GII), ad it requires the order of group is hidde. I this paper, we propose three ID-based cryptographic schemes, such as ID-based o-iteractive ey sharig (ID-NIKS) scheme, hierarchical ID-based ecryptio (HIBE) scheme, ad ID-based sigature (IBS) scheme, based o hidde-order groups. We say that the security proof of our proposed schemes is a ope problem. 0 Published by Elsevier Ltd. Selectio ad/or peer-review uder resposibility of Harbi Uiversity of Sciece ad Techology Ope access uder CC BY-NC-ND licese. Keywords: ID-based o-iteractive ey sharig; Hierarchical ID-based ecryptio; ID-based sigature; Group iversio problem. Itroductio Idetity-based cryptograhy (IBC) [6,3] is a public ey cryptography which the public ey ca be a arbitrary strig, such as the recipiet s address. The user s private ey is geerated by a trusted authority, called the private ey geerator (PKG), which applies its master ey to the user s idetity after the user autheticates itself. Shamir [6] gave the otio of IBC for simplifyig public ey ad the certificate maagemet ad proposed the first ID-based sigature (IBS) scheme. However, it is ot util much later that Boeh ad Frali [3] preseted the first secure ad truly practical ID-based ecryptio (IBE) scheme. d they proved its security i the radom oracle model []. Subsequetly, may practical IBC, icludig IBS [5,6], (H)IBE [,7,6], ad ID-based ey distributio [0,6] etc., are proposed. There are several classes of existig IBC based o differet assumptios ad mathematic tools. Some of them are based o groups with a biliear map [3,8,6,4]; some of them are based o quadratic Correspodig author. Tel.: Fax: address: clli@fju.edu.c Published by Elsevier Ltd. Ope access uder CC BY-NC-ND licese. doi:0.06/j.proeg
2 068 Chalgu Li / Procedia Egieerig 9 (0) residuosity problem modulo a composite [7,4]; others are based o hard problems o lattices [9,]. ecetly, Saxea ad Soh [5] preseted a ew cryptographic primitive, called a oracle-based group with ifeasible iversio (O-GII), which is a strog associative oe-way fuctio (SOWF) alog with a oracle allowig verifiable computatio, ad proposed a practical oe roud ey agreemet protocol for arbitrary size groups. I additio, they poited out that this cryptographic primitive ca be used to desig IBC ad proposed the IBE scheme based o hidde-order groups. However, they claimed that the security proof of this proposed IBE scheme is a ope problem. I this paper, we do ot focus o the security of IBC ad pay our attetios o how to costruct some ID-based cryptographic schemes based o hiddeorder groups, that is, oracle-based group with ifeasible iversio problem. We propose ID-based oiteractive ey sharig (ID-NIKS) scheme, hierarchical ID-based ecryptio (HIBE) scheme, ad IDbased sigature (IBS) scheme, based o hidde-order groups.. Prelimiaries We oly describe the group iversio problem (GIP) for the oracle-based group with ifeasible iversio (O-GII For more iformatio about strog associative oe-way fuctios (O-SOWFs) ad group with ifeasible iversio (GII), the readers are referred to [5]. Defiitio (O-GII [5] blac-box costructio of a SOWF implemeted with a PV-Oracle, O, is called a Oracle-GII (O-GII Cocretely, a O-GII costructio has three PPT algorithms: Setup, Sample, ad Compute. Group Iversio Problem (GIP We say that a PPT algorithm breas the O-GII if it is able to ivert the O-GII ad compute iverse i G by havig oly blac-box access to the Compute algorithm. We call this as the group iversio problem (GIP Formally, the advatage of i solvig GIP is defied as: O( Compute( master-ey,, P ) ( P, ): GIP params dv ( τ) = Pr ( params, master-ey ) Setup( τ) ;. ( P, σ P) ( Sample params Defiitio (GIP [5] We say that algorithm ( KO, δ, ε ) -breas the O-GII f if rus at most timeδ ; maes at most K adaptive queries to the oracle O by implemetig the Compute algorithm; ad O GIP dv ( τ ) is at least ε. lteratively, we say that the O-GII is ( K, δ, ε ) O attac if o such algorithm exists. -secure uder a adaptive emar. ) GII must have hidde order for the group. Sice the group G is of fiite order, the oly way to achieve o-ivertibility is to eep the order of this group hidde; ) the defiitios for IBC are referred to [3, 6]. 3. Three ID-based Cryptographic Schemes I the followig three subsectios, we propose ID-based o-iteractive ey sharig (ID-NIKS) scheme, hierarchical ID-based ecryptio (HIBE) scheme, ad ID-based sigature (IBS) scheme, based o hidde-order groups (group iversio problem
3 Chalgu Li / Procedia Egieerig 9 (0) ID-based No-iteractive Key Sharig (ID-INSK) Scheme There are three algorithms for the ID-based o-iteractive ey sharig (ID-INSK) scheme, that are, setup algorithm, ey geeratio algorithm ad shared ey algorithm, deoted by Setup-NIKS, KeyGe ad SharedKey, respectively. The detailed descriptios of them are as follows. Setup-NIKS:. Set (, σ ),( Y, σy) Sample( params );. Let { } H : { 0, } ey are as follows respectively: par ={ Y, Z, H, H }, m-ey ={ σ, σ }. H : 0, Z ad G be two cryptographic hash fuctios. The system parameters par ad the master ey m- KeyGe: Let { 0,} id be the idetity bit strig.. Set i = H id Z ;. i Compute ( σ, iy, ) = Y G. So the private ey is prv-ey id = Y G. SharedKey: Give the system parameter par, the private ey prv-ey ad the idetity id id B of B, where id idb, do:. Set i = H id ad i B = H idb ;. -i Compute ( ˆ B i i+ ib K = H ( ε( prv- ey, i), ε( Yi, ))) = H( Y, B id B -i It is easy to compute that ˆ B i i+ ib KB, = H( ( ε( prv- eyid, i), (, ))) ( B ε YiB = H Y This implies that the etities ad B ca compute a commo secret ey without iteractive ay iformatio each other expect for oly usig the public idetity. 3. Hierarchical Idetity-Based Ecryptio Scheme I IBE scheme, there is a sigle PKG which should verify the idetity ad establish secure chaels to trasfer user s private eys. However, it may be a bottleec i a large etwor. Hierarchical ID-based ecryptio (HIBE) setups a several levels of PKGs ad the root PKG delegates to geerate the private ey ad oly verify the idetity for the lower-level PKGs. The advatage of HIBE is that the autheticatio ad trasmissio of private ey ca be doe locally. Here, we propose a HIBE is based o hidde-order groups. There are four algorithms as follows: Setup-HIBE:. Set Y 0 0 Y 0 0 Z ( σ,, Y ) = Y ; 3. Let H { } Z ad H { } Y (, σ ), (, σ ) Sample params ;. Compute : 0, : 0, G be two cryptographic hash fuctios. They are treated as radom oracles i the security aalysis. The system parameters par ad the,,, σ, σ. master ey m-ey are as follows respectively: par ={ } Y0 Z0 H H, m-ey = { } 0 Y0 KeyGe: Let IDt = ( I,..., It) {0,} be the idetity strig of depth t for t. The correspodig private ey d t ca be geerated by givig the paret idetity IDt = ( I,..., It ) ad the correspodig private ey d t. If t =, the do as follows:. Compute i = H ( I ) Z ;. Compute d = ( σ, i, Y ) = Y. If t, the do as follows: 3. Compute it = H( I,..., It) Z ; 4. Set t t t Yt (, σ ),( Y, σ ) Sample params, the σ t i σ t t it Y is the sample iformatio for. t Yt 5. t t
4 070 Chalgu Li / Procedia Egieerig 9 (0) t t Yt t t t t 0 0 j= j j i it it it it i t j j Compute d = ( σ σ,, d ) = Y d = Y ( Y ); 6. Compute t = σ Yt t = t t Z (,, ) Y. HID-Ecrypt: To ecrypt a message { 0,} follows:. Compute ij = H( I,..., I j) Z, for j,..., t; m for < log usig the idetity IDt = ( I,..., It), do as =. Geerate (, σ ) Sample params ; 3. i + Compute C = m H ( ( σ,, ε( Y, i + ))) = m H ( Y ); Compute (,, j (, )) j Z i l i l l j ( i C = σ ε Z i = = Y Y i ), for j =,..., t. j l= l l l= l 0 0 l= l l The, the ciphertext is C = ( C0, C, C,..., C t HID-Decrypt: To decrypt the ciphertext C = ( C0, C, C,..., C t ), usig the private ey d t, do as follows:. Compute ˆ(, ) ( i ) j ( il l ) i t ( j ij ) i + D = O C d = Y Y Y Y = Y.. t t 0 0 l= l l 0 0 j= j j 0 The, the decrypted message is m = C H ( D 3.3 ID-Based Sigature Scheme The ID-based sigature (IBS) scheme by usig the O-GII icludes the followig four algorithms: Setup: it does as the followig steps.. Set (, ),( Y, ) Y 3. Let H { } Z ad H { } σ σ Sample params ;. Compute Z ( σ,, Y) = Y; : 0, : 0, G be two cryptographic hash fuctios. The system parameters par ad the master ey m-ey are as follows respectively: par,,, σ, σ. ={ Y Z H H },m-ey ={ } KeyGe: Let Y id {0,} be the idetity bit strig.. Set i = H ; id Z. Compute ( σ, iy, ) = Y G. So the private ey is prv- eyid = Y. Sig: Let M {0,} be the message. To sig M, a siger computes m = H M Z (we would have m Z with overwhelmig probability The siger computes α ε( -, ) ( i m m m prv ey m id = Y ) = Y. So, the sigature of the siger o M is ( id, M, α Verify: To verify a sigature ( id, M, α ) o message M, compute i = H ( id) ad H M Z ad the? chec that the equality ε( Y, ( i + ) m) = O ( αε, ( Z, im)) holds. The correct of the above sigature ca be guarateed by the followig equatio ( i+ ) m? im m m im im Y = α Z = ( Y ) ( Y 4. Coclusios I this paper, we propose three ID-based cryptographic schemes, such as ID-based o-iteractive ey sharig (ID-NIKS) scheme, hierarchical ID-based ecryptio (HIBE) scheme, ad ID-based sigature (IBS) scheme, based o hidde-order groups. Their security proofs are still a ope problem.
5 Chalgu Li / Procedia Egieerig 9 (0) cowledgemets This research is supported by the Natioal Natural Sciece Foudatio of Chia uder Grat No , the Natural Sciece Foudatio of Fujia Provice uder Grat No. 0J0547, ad the esearch Foudatio of Educatio Bureau of Fujia Provice uder Grat No. JB07. efereces []. Bellare ad P. ogaway. adom oracles are practical: paradigm for desigig efficiet protocols. I: Proceedigs of First ual Cof. Computer ad Commuicatios Security, CM, pages 6 73, 993. [] D. Boeh ad. Boye. Secure idetity based ecryptio without radom oracles. I: dvaces i Cryptology - CYPTO 04, volume 35 of LNCS, pages Spriger-Verlag, 004. [3] D. Boeh ad M. K. Frali. Idetity based ecryptio from the Weil pairig. I: dvaces i Cryptology - CYPTO 0, volume 39 of LNCS, pages 3 9. Spriger-Verlag, 00. [4] D. Boeh, C. Getry, ad M. Hamburg. Space-efficiet idetity based ecryptiowithout pairigs. I: Proceedigs of the 48th ual IEEE Symposium o Foudatios of Computer Sciece, pages IEEE Computer Society, 007. [5] D. Boeh, B. Ly, ad H. Shacham. Short sigatures from the Weil pairig. I: dvaces i Cryptology - siacrypt 00, volume 48 of LNCS, pages Spriger-Verlag, 00. [6] S. Chatterjee ad P. Sarar. Idetity-based ecryptio. Spriger-Heidelberg Publisher, Lodo, 00. [7] C. Cocs. idetity based ecryptio scheme based o quadratic residues. I: Proceedigs of Cryptography ad Codig 00, volume 60 of LNCS, pages Spriger-Verlag, 00. [8] C. Getry. Practical idetity based ecryptio without radom oracles. I: dvaces i Cryptology - EUOCYPT 06, volume 4004 of LNCS, pages Spriger-Verlag, 006. [9] C. Getry, C. Peiert, ad V. Vaiutaatha. Trapdoors for hard lattices ad ew cryptographic costructios. I: Proceedigs of the 40th aual CM symposium o Theory of computig, pages CM, 008. [0] K. G. Paterso, S. Sriivasa, O the relatios betwee o-iteractive ey distributio, idetity-based ecryptio ad trapdoor discrete log groups, Des. Codes Cryptogr., 5, pages 9 4, 009. [] C. Peiert. Some recet progress i lattice-based cryptography. I: Proceedigs of TCC 09, volume 5444 of LNCS, page 7 7. Spriger-Verlag, 009. [] M. abi ad. Sherma. ssociative oe way fuctios: ew paradigm for secret-ey agreemet ad digital sigatures. I: Tech. ep. CST-383/UMICS-T-93-4, 993. [3] M. abi ad. Sherma. observatio o associative oe-way fuctios i complexity theory. If. Proc. Lett., pages 39 44, 997. [4]. Sahai ad H. Seyalioglu. Fully secure accoutable-authority idetity-based ecryptio. I: Proceedigs of PKC, volume 657 of LNCS, pages Spriger-Verlag, 0. [5]. Saxea ad B. Soh. cryptographic primitive based o hidde-order groups. Joural of Mathematical Cryptology, 3():89 3, 009. [6]. Shamir. Idetity based cryptosystems ad sigature schemes. I: dvaces i Cryptology - CYPTO 84, volume 96 of LNCS, pages Spriger-Verlag, 984. [7] B. Waters. Efficiet idetity based ecryptio without radom oracles. I: dvaces i Cryptology- EUOCYPT 05, volume 3494 of LNCS, pages 4 7. Spriger-Verlag, 005.
Message Authentication Codes. Reading: Chapter 4 of Katz & Lindell
Message Autheticatio Codes Readig: Chapter 4 of Katz & Lidell 1 Message autheticatio Bob receives a message m from Alice, he wats to ow (Data origi autheticatio) whether the message was really set by Alice.
More informationA New Bound between Higher Order Nonlinearity and Algebraic Immunity
Available olie at wwwsciecedirectcom Procedia Egieerig 9 (01) 788 79 01 Iteratioal Workshop o Iformatio ad Electroics Egieerig (IWIEE) A New Boud betwee Higher Order Noliearity ad Algebraic Immuity Xueyig
More informationOblivious Transfer using Elliptic Curves
Oblivious Trasfer usig Elliptic Curves bhishek Parakh Louisiaa State Uiversity, ato Rouge, L May 4, 006 bstract: This paper proposes a algorithm for oblivious trasfer usig elliptic curves lso, we preset
More informationFurther More on Key Wrapping. 2011/2/17 SKEW2011 Lyngby Nagoya University Yasushi Osaki, Tetsu Iwata
Further More o Key Wrappig 011//17 SKEW011 Lygby Nagoya Uiversity Yasushi Osaki, Tetsu Iwata 1 What is key wrappig? Used to ecrypt specialized data, such as cryptographic keys A key wrappig that also esures
More informationFour-dimensional Vector Matrix Determinant and Inverse
I.J. Egieerig ad Maufacturig 013 30-37 Published Olie Jue 01 i MECS (http://www.mecs-press.et) DOI: 10.5815/iem.01.03.05 vailable olie at http://www.mecs-press.et/iem Four-dimesioal Vector Matrix Determiat
More informationA Block Cipher Using Linear Congruences
Joural of Computer Sciece 3 (7): 556-560, 2007 ISSN 1549-3636 2007 Sciece Publicatios A Block Cipher Usig Liear Cogrueces 1 V.U.K. Sastry ad 2 V. Jaaki 1 Academic Affairs, Sreeidhi Istitute of Sciece &
More informationTwo-Input Functional Encryption for Inner Products from Bilinear Maps
Two-Iput Fuctioal Ecryptio for Ier Products from Biliear Maps Kwagsu Lee Dog Hoo Lee Abstract Fuctioal ecryptio is a ew paradigm of public-key ecryptio that allows a user to compute f x o ecrypted data
More informationSUCCESSIVE INTERFERENCE CANCELLATION DECODING FOR THE K -USER CYCLIC INTERFERENCE CHANNEL
Joural of Theoretical ad Applied Iformatio Techology 31 st December 212 Vol 46 No2 25-212 JATIT & LLS All rights reserved ISSN: 1992-8645 wwwatitorg E-ISSN: 1817-3195 SCCESSIVE INTERFERENCE CANCELLATION
More informationLecture 11: Pseudorandom functions
COM S 6830 Cryptography Oct 1, 2009 Istructor: Rafael Pass 1 Recap Lecture 11: Pseudoradom fuctios Scribe: Stefao Ermo Defiitio 1 (Ge, Ec, Dec) is a sigle message secure ecryptio scheme if for all uppt
More informationReview of Elementary Cryptography. For more material, see my notes of CSE 5351, available on my webpage
Review of Elemetary Cryptography For more material, see my otes of CSE 5351, available o my webpage Outlie Security (CPA, CCA, sematic security, idistiguishability) RSA ElGamal Homomorphic ecryptio 2 Two
More informationInternational Journal of Advanced Research in Computer Science and Software Engineering
Volume 2, Issue 11, November 2012 ISSN: 2277 128X Iteratioal Joural of Advaced Research i Computer Sciece ad Software Egieerig Research Paper Available olie at: www.ijarcsse.com A Digital Sigature Algorim
More informationLecture 11: Hash Functions and Random Oracle Model
CS 7810 Foudatios of Cryptography October 16, 017 Lecture 11: Hash Fuctios ad Radom Oracle Model Lecturer: Daiel Wichs Scribe: Akshar Varma 1 Topic Covered Defiitio of Hash Fuctios Merkle-Damgaård Theorem
More informationModified Logistic Maps for Cryptographic Application
Applied Mathematics, 25, 6, 773-782 Published Olie May 25 i SciRes. http://www.scirp.org/joural/am http://dx.doi.org/.4236/am.25.6573 Modified Logistic Maps for Cryptographic Applicatio Shahram Etemadi
More informationResearch Article A Note on Ergodicity of Systems with the Asymptotic Average Shadowing Property
Discrete Dyamics i Nature ad Society Volume 2011, Article ID 360583, 6 pages doi:10.1155/2011/360583 Research Article A Note o Ergodicity of Systems with the Asymptotic Average Shadowig Property Risog
More informationOn Lower Bounds for the Communication Complexity of Private Information Retrieval
IEICE TRANS FUNDAMENTALS, VOLE84 A, NO JANUARY 200 57 PAPER Special Sectio o Cryptography ad Iformatio Security O Lower Bouds for the Commuicatio Complexity of Private Iformatio Retrieval Toshiya ITOH,
More informationMediated encryption: analysis and design
Uiversity of Wollogog Research Olie Faculty of Egieerig ad Iformatio Scieces - Papers: Part A Faculty of Egieerig ad Iformatio Scieces 2015 Mediated ecryptio: aalysis ad desig I Elashry Uiversity of Wollogog,
More informationVolume 3, Number 2, 2017 Pages Jordan Journal of Electrical Engineering ISSN (Print): , ISSN (Online):
JJEE Volume 3, Number, 07 Pages 50-58 Jorda Joural of Electrical Egieerig ISSN (Prit: 409-9600, ISSN (Olie: 409-969 Liftig Based S-Box for Scalable Bloc Cipher Desig Based o Filter Bas Saleh S. Saraireh
More informationID-based Encryption Scheme Secure against Chosen Ciphertext Attacks
ID-based Encryption Scheme Secure against Chosen Ciphertext Attacks ongxing Lu and Zhenfu Cao Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai 200030, P.. China {cao-zf,
More informationAn extension of the RSA trapdoor in a KEM/DEM framework
A extesio of the RSA trapdoor i a KEM/DEM framework Bogda Groza Politehica Uiversity of Timisoara Faculty of Automatics ad Computers Bd. Vasile Parva r. 2, 300223 Timisoara, Romaia mail: bogda.groza@aut.upt.ro
More informationDecoupling Zeros of Positive Discrete-Time Linear Systems*
Circuits ad Systems,,, 4-48 doi:.436/cs..7 Published Olie October (http://www.scirp.org/oural/cs) Decouplig Zeros of Positive Discrete-Time Liear Systems* bstract Tadeusz Kaczorek Faculty of Electrical
More informationA Note on the Kolmogorov-Feller Weak Law of Large Numbers
Joural of Mathematical Research with Applicatios Mar., 015, Vol. 35, No., pp. 3 8 DOI:10.3770/j.iss:095-651.015.0.013 Http://jmre.dlut.edu.c A Note o the Kolmogorov-Feller Weak Law of Large Numbers Yachu
More informationA Provably Secure Signature Scheme based on Factoring and Discrete Logarithms
Appl. Math. If. Sci. 8, No. 4, 1553-1558 2014) 1553 Applied Mathematics & Iformatio Scieces A Iteratioal Joural http://dx.doi.org/10.12785/amis/080408 A Provably Secure Sigature Scheme based o Factorig
More informationThe Paillier Cryptosystem
E-Votig Semiar The Paillier Cryptosystem Adreas Steffe Hochschule für Techik Rapperswil adreas.steffe@hsr.ch Adreas Steffe, 17.1.010, Paillier.pptx 1 Ageda Some mathematical properties Ecryptio ad decryptio
More informationThe improvement of the volume ratio measurement method in static expansion vacuum system
Available olie at www.sciecedirect.com Physics Procedia 32 (22 ) 492 497 8 th Iteratioal Vacuum Cogress The improvemet of the volume ratio measuremet method i static expasio vacuum system Yu Hogya*, Wag
More informationThe fundamental mappings over group E a,b
157 The fudametal mappigs over group E Abdelhakim Chillali M hammed Boulgouaz ICM 2012, 11-14 March, Al Ai Abstract I this work we study the fudametal mappigs of group E [5], group of a elliptic curve
More informationA collocation method for singular integral equations with cosecant kernel via Semi-trigonometric interpolation
Iteratioal Joural of Mathematics Research. ISSN 0976-5840 Volume 9 Number 1 (017) pp. 45-51 Iteratioal Research Publicatio House http://www.irphouse.com A collocatio method for sigular itegral equatios
More informationAsymptotic Coupling and Its Applications in Information Theory
Asymptotic Couplig ad Its Applicatios i Iformatio Theory Vicet Y. F. Ta Joit Work with Lei Yu Departmet of Electrical ad Computer Egieerig, Departmet of Mathematics, Natioal Uiversity of Sigapore IMS-APRM
More informationSecurity of Identity-based Encryption Schemes from Quadratic Residues
I: Bica I., Reyhaitabar R. eds Iovative Security Solutios for Iformatio Techology ad Commuicatios. SECITC 2016. Lecture Notes i Computer Sciece, vol 10006. pp 63-77, 2016,Spriger, Cham Security of Idetity-based
More informationASYMMETRIC CIPHER PROTOCOL USING DECOMPOSITION PROBLEM
Iteratioal ook Series "Iformatio Sciece ad Computig" 7 ASYETIC CIPHE POTOCO USING DECOPOSITION POE Adrius aulyaitis, Saulius Japertas Abstract: The asymmetric cipher protocol based o decompositio problem
More informationROTATION-EQUIVALENCE CLASSES OF BINARY VECTORS. 1. Introduction
t m Mathematical Publicatios DOI: 10.1515/tmmp-2016-0033 Tatra Mt. Math. Publ. 67 (2016, 93 98 ROTATION-EQUIVALENCE CLASSES OF BINARY VECTORS Otokar Grošek Viliam Hromada ABSTRACT. I this paper we study
More informationA Secure Anonymous Proxy Multi-signature Scheme
A Secure Aoymous Proxy Multi-sigature Scheme Vishal Saraswat ad Rajeev Aad Sahu C.R.Rao Advaced Istitute of Mathematics Statistics ad Computer Sciece Hyderabad, Idia {vishal.saraswat, rajeevs.crypto}@gmail.com
More informationEstimation of Backward Perturbation Bounds For Linear Least Squares Problem
dvaced Sciece ad Techology Letters Vol.53 (ITS 4), pp.47-476 http://dx.doi.org/.457/astl.4.53.96 Estimatio of Bacward Perturbatio Bouds For Liear Least Squares Problem Xixiu Li School of Natural Scieces,
More informationResearch Article A Unified Weight Formula for Calculating the Sample Variance from Weighted Successive Differences
Discrete Dyamics i Nature ad Society Article ID 210761 4 pages http://dxdoiorg/101155/2014/210761 Research Article A Uified Weight Formula for Calculatig the Sample Variace from Weighted Successive Differeces
More informationFLUID LIMIT FOR CUMULATIVE IDLE TIME IN MULTIPHASE QUEUES. Akademijos 4, LT-08663, Vilnius, LITHUANIA 1,2 Vilnius University
Iteratioal Joural of Pure ad Applied Mathematics Volume 95 No. 2 2014, 123-129 ISSN: 1311-8080 (prited versio); ISSN: 1314-3395 (o-lie versio) url: http://www.ijpam.eu doi: http://dx.doi.org/10.12732/ijpam.v95i2.1
More informationStatistical Properties of the Square Map Modulo a Power of Two
Statistical Properties of the Square Map Modulo a Power of Two S. M. Dehavi, A. Mahmoodi Rishakai, M. R. Mirzee Shamsabad 3, Hamidreza Maimai, Eiollah Pasha Kharazmi Uiversity, Faculty of Mathematical
More informationOn the security of Jhanwar-Barua Identity-Based Encryption Scheme
On the security of Jhanwar-Barua Identity-Based Encryption Scheme Adrian G. Schipor aschipor@info.uaic.ro 1 Department of Computer Science Al. I. Cuza University of Iași Iași 700506, Romania Abstract In
More informationCommutativity in Permutation Groups
Commutativity i Permutatio Groups Richard Wito, PhD Abstract I the group Sym(S) of permutatios o a oempty set S, fixed poits ad trasiet poits are defied Prelimiary results o fixed ad trasiet poits are
More informationPower Comparison of Some Goodness-of-fit Tests
Florida Iteratioal Uiversity FIU Digital Commos FIU Electroic Theses ad Dissertatios Uiversity Graduate School 7-6-2016 Power Compariso of Some Goodess-of-fit Tests Tiayi Liu tliu019@fiu.edu DOI: 10.25148/etd.FIDC000750
More informationGamma Distribution and Gamma Approximation
Gamma Distributio ad Gamma Approimatio Xiaomig Zeg a Fuhua (Frak Cheg b a Xiame Uiversity, Xiame 365, Chia mzeg@jigia.mu.edu.c b Uiversity of Ketucky, Leigto, Ketucky 456-46, USA cheg@cs.uky.edu Abstract
More informationPAijpam.eu ON TENSOR PRODUCT DECOMPOSITION
Iteratioal Joural of Pure ad Applied Mathematics Volume 103 No 3 2015, 537-545 ISSN: 1311-8080 (prited versio); ISSN: 1314-3395 (o-lie versio) url: http://wwwijpameu doi: http://dxdoiorg/1012732/ijpamv103i314
More informationEnergy of a Hypercube and its Complement
Iteratioal Joural of Algebra, Vol. 6, 01, o. 16, 799-805 Eergy of a Hypercube ad its Complemet Xiaoge Che School of Iformatio Sciece ad Techology, Zhajiag Normal Uiversity Zhajiag Guagdog, 54048 P.R. Chia
More informationWarped, Chirp Z-Transform: Radar Signal Processing
arped, Chirp Z-Trasform: Radar Sigal Processig by Garimella Ramamurthy Report o: IIIT/TR// Cetre for Commuicatios Iteratioal Istitute of Iformatio Techology Hyderabad - 5 3, IDIA Jauary ARPED, CHIRP Z
More informationAlgorithm of Superposition of Boolean Functions Given with Truth Vectors
IJCSI Iteratioal Joural of Computer Sciece Issues, Vol 9, Issue 4, No, July ISSN (Olie: 694-84 wwwijcsiorg 9 Algorithm of Superpositio of Boolea Fuctios Give with Truth Vectors Aatoly Plotikov, Aleader
More informationA Relationship Between the One-Way MANOVA Test Statistic and the Hotelling Lawley Trace Test Statistic
http://ijspccseetorg Iteratioal Joural of Statistics ad Probability Vol 7, No 6; 2018 A Relatioship Betwee the Oe-Way MANOVA Test Statistic ad the Hotellig Lawley Trace Test Statistic Hasthika S Rupasighe
More informationNotes for Lecture 5. 1 Grover Search. 1.1 The Setting. 1.2 Motivation. Lecture 5 (September 26, 2018)
COS 597A: Quatum Cryptography Lecture 5 (September 6, 08) Lecturer: Mark Zhadry Priceto Uiversity Scribe: Fermi Ma Notes for Lecture 5 Today we ll move o from the slightly cotrived applicatios of quatum
More informationAnalysis of Deutsch-Jozsa Quantum Algorithm
Aalysis of Deutsch-Jozsa Quatum Algorithm Zhegju Cao Jeffrey Uhlma Lihua Liu 3 Abstract. Deutsch-Jozsa quatum algorithm is of great importace to quatum computatio. It directly ispired Shor s factorig algorithm.
More informationA constructive analysis of convex-valued demand correspondence for weakly uniformly rotund and monotonic preference
MPRA Muich Persoal RePEc Archive A costructive aalysis of covex-valued demad correspodece for weakly uiformly rotud ad mootoic preferece Yasuhito Taaka ad Atsuhiro Satoh. May 04 Olie at http://mpra.ub.ui-mueche.de/55889/
More informationDouble Stage Shrinkage Estimator of Two Parameters. Generalized Exponential Distribution
Iteratioal Mathematical Forum, Vol., 3, o. 3, 3-53 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/.9/imf.3.335 Double Stage Shrikage Estimator of Two Parameters Geeralized Expoetial Distributio Alaa M.
More informationUniform Strict Practical Stability Criteria for Impulsive Functional Differential Equations
Global Joural of Sciece Frotier Research Mathematics ad Decisio Scieces Volume 3 Issue Versio 0 Year 03 Type : Double Blid Peer Reviewed Iteratioal Research Joural Publisher: Global Jourals Ic (USA Olie
More informationCalderbank-Shor-Steane
ISSN -985, CODEN RUXUEW E-mail: os@iscas.ac.c Joural of Software, Vol.7, No.3, March 6, pp.59 55 http://www.os.org.c DOI:.36/os759 Tel/Fax: +86--656563 6 by Joural of Software. All rights reserved. Calderbak-Shor-Steae,+,
More informationADVANCED SOFTWARE ENGINEERING
ADVANCED SOFTWARE ENGINEERING COMP 3705 Exercise Usage-based Testig ad Reliability Versio 1.0-040406 Departmet of Computer Ssciece Sada Narayaappa, Aeliese Adrews Versio 1.1-050405 Departmet of Commuicatio
More informationLossy Trapdoor Functions from Smooth Homomorphic Hash Proof Systems
Electroic Colloquium o Computatioal Complexity, Revisio 1 of Report No 127 (2009) Lossy Trapdoor Fuctios from Smooth Homomorphic Hash Proof Systems July 4, 2010 Abstract I STOC 08, Peikert ad Waters itroduced
More informationGentry s ideal-lattice based encryption scheme. Gentry s STOC 09 paper - Part III
Getry s ideal-lattice based ecryptio scheme Getry s STOC 09 paper - Part 1 From Micciacio's paper Why ideal lattices --- as opposed to just ideals or lattices? We described a ideal-based ecryptio scheme
More informationInformation Hiding Problems: Hiding Capacity and Key Design
Iformatio Hidig Problems: Hidig Capacity ad Key Desig Joseph. O Sulliva Electroic Systems ad Sigals Research Laboratory Departmet of Electrical Egieerig Washigto Uiversity i St. Louis Iformatio Hidig Problems
More informationSome Explicit Formulae of NAF and its Left-to-Right. Analogue Based on Booth Encoding
Vol.7, No.6 (01, pp.69-74 http://dx.doi.org/10.1457/ijsia.01.7.6.7 Some Explicit Formulae of NAF ad its Left-to-Right Aalogue Based o Booth Ecodig Dog-Guk Ha, Okyeo Yi, ad Tsuyoshi Takagi Kookmi Uiversity,
More informationA numerical Technique Finite Volume Method for Solving Diffusion 2D Problem
The Iteratioal Joural Of Egieerig d Sciece (IJES) Volume 4 Issue 10 Pages PP -35-41 2015 ISSN (e): 2319 1813 ISSN (p): 2319 1805 umerical Techique Fiite Volume Method for Solvig Diffusio 2D Problem 1 Mohammed
More informationElement sampling: Part 2
Chapter 4 Elemet samplig: Part 2 4.1 Itroductio We ow cosider uequal probability samplig desigs which is very popular i practice. I the uequal probability samplig, we ca improve the efficiecy of the resultig
More informationORTHOGONAL MATRIX IN CRYPTOGRAPHY
Orthogoal Matrix i Cryptography ORTHOGONAL MATRIX IN CRYPTOGRAPHY Yeray Cachó Sataa Member of CriptoRed (U.P.M.) ABSTRACT I this work is proposed a method usig orthogoal matrix trasform properties to ecrypt
More informationExponential transient rotating waves and their bifurcations in a ring of unidirectionally coupled bistable Lorenz systems
Available olie at www.sciecedirect.com Procedia IUTAM 5 (2012 ) 283 287 IUTAM Symposium o 50 Years of Chaos: Applied ad Theoretical Expoetial trasiet rotatig waves ad their bifurcatios i a rig of uidirectioally
More informationMinimum-Knowledge Schemes for low-power, low-memory Devices
Miimum-Kowledge Schemes for low-power, low-memory Deices T. Newe & T. Coffey Data Commuicatios Security Group, Departmet of lectroic & Computer gieerig, Uiersity of imerick, relad. Fax: 353-61-338176 Abstract
More informationThe average-shadowing property and topological ergodicity
Joural of Computatioal ad Applied Mathematics 206 (2007) 796 800 www.elsevier.com/locate/cam The average-shadowig property ad topological ergodicity Rogbao Gu School of Fiace, Najig Uiversity of Fiace
More informationSection 14. Simple linear regression.
Sectio 14 Simple liear regressio. Let us look at the cigarette dataset from [1] (available to dowload from joural s website) ad []. The cigarette dataset cotais measuremets of tar, icotie, weight ad carbo
More informationConfidence interval for the two-parameter exponentiated Gumbel distribution based on record values
Iteratioal Joural of Applied Operatioal Research Vol. 4 No. 1 pp. 61-68 Witer 2014 Joural homepage: www.ijorlu.ir Cofidece iterval for the two-parameter expoetiated Gumbel distributio based o record values
More informationHFEM. Breaking the HFEM public key scheme
4 Vol.4 No. 0 Joural o Commuicatios March 0 doi:0.969/j.iss.000-46x.0.0.00 HFEM (. 00. 007. 00,, MQ HFEM MQ MQ P09. A 000-46X(0)0-0085-05 reaig the HFEM pulic ey scheme GU Chu-sheg,, (. chool of Computer
More informationComparison of Minimum Initial Capital with Investment and Non-investment Discrete Time Surplus Processes
The 22 d Aual Meetig i Mathematics (AMM 207) Departmet of Mathematics, Faculty of Sciece Chiag Mai Uiversity, Chiag Mai, Thailad Compariso of Miimum Iitial Capital with Ivestmet ad -ivestmet Discrete Time
More informationA New Class of Ternary Zero Correlation Zone Sequence Sets Based on Mutually Orthogonal Complementary Sets
IOSR Joural of Electroics ad Commuicatio Egieerig (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 0, Issue 3, Ver. I (May - Ju.205), PP 08-3 www.iosrjourals.org A New Class of Terary Zero Correlatio
More informationelliptic curve cryptosystems using efficient exponentiation
See discussios, stats, ad author profiles for this publicatio at: https://www.researchgate.et/publicatio/665870 elliptic curve cryptosystems usig efficiet expoetiatio Article Jauary 007 CITATIONS 0 READS
More informationRecursive Algorithm for Generating Partitions of an Integer. 1 Preliminary
Recursive Algorithm for Geeratig Partitios of a Iteger Sug-Hyuk Cha Computer Sciece Departmet, Pace Uiversity 1 Pace Plaza, New York, NY 10038 USA scha@pace.edu Abstract. This article first reviews the
More informationNew Exponential Strengthening Buffer Operators and Numerical Simulation
Sesors & Trasducers, Vol. 59, Issue, November 0, pp. 7-76 Sesors & Trasducers 0 by IFSA http://www.sesorsportal.com New Expoetial Stregtheig Buffer Operators ad Numerical Simulatio Cuifeg Li, Huajie Ye,
More informationAn efficient variant of Boneh-Gentry-Hamburg's identity-based encryption without pairing
University of Wollongong Research Online Faculty of Engineering and Information Sciences - Papers: Part A Faculty of Engineering and Information Sciences 2015 An efficient variant of Boneh-Gentry-Hamburg's
More informationAdaptively Attribute-Hiding (Hierarchical) Inner Product Encryption
daptively ttribute-hidig (Hierarchical) Ier Product Ecryptio Tatsuaki Okamoto 1 ad Katsuyuki Takashima 2 1 NTT okamoto.tatsuaki@lab.tt.co.jp 2 Mitsubishi Electric Takashima.Katsuyuki@aj.MitsubishiElectric.co.jp
More informationFormulas for the Number of Spanning Trees in a Maximal Planar Map
Applied Mathematical Scieces Vol. 5 011 o. 64 3147-3159 Formulas for the Number of Spaig Trees i a Maximal Plaar Map A. Modabish D. Lotfi ad M. El Marraki Departmet of Computer Scieces Faculty of Scieces
More informationThe multiplicative structure of finite field and a construction of LRC
IERG6120 Codig for Distributed Storage Systems Lecture 8-06/10/2016 The multiplicative structure of fiite field ad a costructio of LRC Lecturer: Keeth Shum Scribe: Zhouyi Hu Notatios: We use the otatio
More informationLecture 19: Convergence
Lecture 19: Covergece Asymptotic approach I statistical aalysis or iferece, a key to the success of fidig a good procedure is beig able to fid some momets ad/or distributios of various statistics. I may
More informationMinimax Estimation of the Parameter of Maxwell Distribution Under Different Loss Functions
America Joural of heoretical ad Applied Statistics 6; 5(4): -7 http://www.sciecepublishiggroup.com/j/ajtas doi:.648/j.ajtas.654.6 ISSN: 6-8999 (Prit); ISSN: 6-96 (Olie) Miimax Estimatio of the Parameter
More informationAn Introduction to Randomized Algorithms
A Itroductio to Radomized Algorithms The focus of this lecture is to study a radomized algorithm for quick sort, aalyze it usig probabilistic recurrece relatios, ad also provide more geeral tools for aalysis
More informationResearch Article Approximate Riesz Algebra-Valued Derivations
Abstract ad Applied Aalysis Volume 2012, Article ID 240258, 5 pages doi:10.1155/2012/240258 Research Article Approximate Riesz Algebra-Valued Derivatios Faruk Polat Departmet of Mathematics, Faculty of
More informationExplicit Maximal and Minimal Curves over Finite Fields of Odd Characteristics
Explicit Maximal ad Miimal Curves over Fiite Fields of Odd Characteristics Ferruh Ozbudak, Zülfükar Saygı To cite this versio: Ferruh Ozbudak, Zülfükar Saygı. Explicit Maximal ad Miimal Curves over Fiite
More informationGenerating Functions for Laguerre Type Polynomials. Group Theoretic method
It. Joural of Math. Aalysis, Vol. 4, 2010, o. 48, 257-266 Geeratig Fuctios for Laguerre Type Polyomials α of Two Variables L ( xy, ) by Usig Group Theoretic method Ajay K. Shula* ad Sriata K. Meher** *Departmet
More informationMOMENT-METHOD ESTIMATION BASED ON CENSORED SAMPLE
Vol. 8 o. Joural of Systems Sciece ad Complexity Apr., 5 MOMET-METHOD ESTIMATIO BASED O CESORED SAMPLE I Zhogxi Departmet of Mathematics, East Chia Uiversity of Sciece ad Techology, Shaghai 37, Chia. Email:
More informationSymmetric Two-User Gaussian Interference Channel with Common Messages
Symmetric Two-User Gaussia Iterferece Chael with Commo Messages Qua Geg CSL ad Dept. of ECE UIUC, IL 680 Email: geg5@illiois.edu Tie Liu Dept. of Electrical ad Computer Egieerig Texas A&M Uiversity, TX
More informationSeed and Sieve of Odd Composite Numbers with Applications in Factorization of Integers
IOSR Joural of Mathematics (IOSR-JM) e-issn: 78-578, p-issn: 319-75X. Volume 1, Issue 5 Ver. VIII (Sep. - Oct.01), PP 01-07 www.iosrjourals.org Seed ad Sieve of Odd Composite Numbers with Applicatios i
More informationFull shifts and irregular sets
São Paulo Joural of Mathematical Scieces 6, 2 (2012), 135 143 Full shifts ad irregular sets Luis Barreira Departameto de Matemática, Istituto Superior Técico 1049-001 Lisboa, Portugal E-mail address: barreira@math.ist.utl.pt
More informationIdentity-based Encryption from Codes with Rank Metric
Idetity-based Ecryptio from Codes with Rak Metric Philippe Gaborit 1, Adrie Hauteville 1,2, Duog Hieu Pha 1, ad Jea-Pierre Tillich 2 1 Uiversité de Limoges, XLIM-DMI, 123, Av. Albert Thomas, 87060 Limoges
More informationTRACES OF HADAMARD AND KRONECKER PRODUCTS OF MATRICES. 1. Introduction
Math Appl 6 2017, 143 150 DOI: 1013164/ma201709 TRACES OF HADAMARD AND KRONECKER PRODUCTS OF MATRICES PANKAJ KUMAR DAS ad LALIT K VASHISHT Abstract We preset some iequality/equality for traces of Hadamard
More informationQuantum Simulation: Solving Schrödinger Equation on a Quantum Computer
Purdue Uiversity Purdue e-pubs Birc Poster Sessios Birc Naotechology Ceter 4-14-008 Quatum Simulatio: Solvig Schrödiger Equatio o a Quatum Computer Hefeg Wag Purdue Uiversity, wag10@purdue.edu Sabre Kais
More information1 Hash tables. 1.1 Implementation
Lecture 8 Hash Tables, Uiversal Hash Fuctios, Balls ad Bis Scribes: Luke Johsto, Moses Charikar, G. Valiat Date: Oct 18, 2017 Adapted From Virgiia Williams lecture otes 1 Hash tables A hash table is a
More informationReport on Private Information Retrieval over Unsynchronized Databases
Report o Private Iformatio Retrieval over Usychroized Databases Lembit Valgma Supervised by Vitaly Skachek May 25, 217 1 Problem Statemet There are may challeges cocerig olie privacy. Private iformatio
More informationSome properties of Boubaker polynomials and applications
Some properties of Boubaker polyomials ad applicatios Gradimir V. Milovaović ad Duša Joksimović Citatio: AIP Cof. Proc. 179, 1050 (2012); doi: 10.1063/1.756326 View olie: http://dx.doi.org/10.1063/1.756326
More informationON POINTWISE BINOMIAL APPROXIMATION
Iteratioal Joural of Pure ad Applied Mathematics Volume 71 No. 1 2011, 57-66 ON POINTWISE BINOMIAL APPROXIMATION BY w-functions K. Teerapabolar 1, P. Wogkasem 2 Departmet of Mathematics Faculty of Sciece
More informationOn Some Inverse Singular Value Problems with Toeplitz-Related Structure
O Some Iverse Sigular Value Problems with Toeplitz-Related Structure Zheg-Jia Bai Xiao-Qig Ji Seak-Weg Vog Abstract I this paper, we cosider some iverse sigular value problems for Toeplitz-related matrices
More informationA Note on Matrix Rigidity
A Note o Matrix Rigidity Joel Friedma Departmet of Computer Sciece Priceto Uiversity Priceto, NJ 08544 Jue 25, 1990 Revised October 25, 1991 Abstract I this paper we give a explicit costructio of matrices
More informationOPTIMAL PIECEWISE UNIFORM VECTOR QUANTIZATION OF THE MEMORYLESS LAPLACIAN SOURCE
Joural of ELECTRICAL EGIEERIG, VOL. 56, O. 7-8, 2005, 200 204 OPTIMAL PIECEWISE UIFORM VECTOR QUATIZATIO OF THE MEMORYLESS LAPLACIA SOURCE Zora H. Perić Veljo Lj. Staović Alesadra Z. Jovaović Srdja M.
More informationHigher-order iterative methods by using Householder's method for solving certain nonlinear equations
Math Sci Lett, No, 7- ( 7 Mathematical Sciece Letters A Iteratioal Joural http://dxdoiorg/785/msl/5 Higher-order iterative methods by usig Householder's method for solvig certai oliear equatios Waseem
More informationPROBABILISTIC SOLUTION OF YAO S MILLIONAIRES PROBLEM
PROBABILISTIC SOLUTION OF YAO S MILLIONAIRES PROBLEM MARIYA BESSONOV, DIMA GRIGORIEV, AND VLADIMIR SHPILRAIN ABSTRACT. We offer a probabilistic solutio of Yao s millioaires problem that gives correct aswer
More informationREMARKS ON IBE SCHEME OF WANG AND CAO
REMARKS ON IBE SCEME OF WANG AND CAO Sunder Lal and Priyam Sharma Derpartment of Mathematics, Dr. B.R.A.(Agra), University, Agra-800(UP), India. E-mail- sunder_lal@rediffmail.com, priyam_sharma.ibs@rediffmail.com
More informationProof of a conjecture of Amdeberhan and Moll on a divisibility property of binomial coefficients
Proof of a cojecture of Amdeberha ad Moll o a divisibility property of biomial coefficiets Qua-Hui Yag School of Mathematics ad Statistics Najig Uiversity of Iformatio Sciece ad Techology Najig, PR Chia
More informationarxiv: v1 [cs.sc] 2 Jan 2018
Computig the Iverse Melli Trasform of Holoomic Sequeces usig Kovacic s Algorithm arxiv:8.9v [cs.sc] 2 Ja 28 Research Istitute for Symbolic Computatio RISC) Johaes Kepler Uiversity Liz, Alteberger Straße
More informationInternational Journal of Engineering Science Invention Research & Development; Vol. II Issue VIII February e-issn:
Iteratioal Joural of Egieerig Sciece Ivetio Research & Developmet; Vol. II Issue VIII February 216 www.ijesird.com eissn: 236 MULTIPLE ENCRYPTIONS OF VARIOUS CIPHERS A. ChadraSekhar*,1, B.Ravi Kumar 2,
More informationOn forward improvement iteration for stopping problems
O forward improvemet iteratio for stoppig problems Mathematical Istitute, Uiversity of Kiel, Ludewig-Mey-Str. 4, D-24098 Kiel, Germay irle@math.ui-iel.de Albrecht Irle Abstract. We cosider the optimal
More information