Identity-Based Cryptography on Hidden-Order Groups

Size: px
Start display at page:

Download "Identity-Based Cryptography on Hidden-Order Groups"

Transcription

1 vailable olie at Procedia Egieerig 9 (0) Iteratioal Worshop o Iformatio ad Electroics Egieerig (IWIEE) Idetity-Based Cryptography o Hidde-Order Groups Chalgu Li a a Key Laboratory of Networ Security ad Cryptology, Fujia Normal Uiversity, Fuzhou, P..Chia bstract ecetly, Saxea ad Soh preseted oe ovel cryptographic primitive based o associative oe-way fuctios, called oracle-based group with ifeasible iversio (O-GII), ad it requires the order of group is hidde. I this paper, we propose three ID-based cryptographic schemes, such as ID-based o-iteractive ey sharig (ID-NIKS) scheme, hierarchical ID-based ecryptio (HIBE) scheme, ad ID-based sigature (IBS) scheme, based o hidde-order groups. We say that the security proof of our proposed schemes is a ope problem. 0 Published by Elsevier Ltd. Selectio ad/or peer-review uder resposibility of Harbi Uiversity of Sciece ad Techology Ope access uder CC BY-NC-ND licese. Keywords: ID-based o-iteractive ey sharig; Hierarchical ID-based ecryptio; ID-based sigature; Group iversio problem. Itroductio Idetity-based cryptograhy (IBC) [6,3] is a public ey cryptography which the public ey ca be a arbitrary strig, such as the recipiet s address. The user s private ey is geerated by a trusted authority, called the private ey geerator (PKG), which applies its master ey to the user s idetity after the user autheticates itself. Shamir [6] gave the otio of IBC for simplifyig public ey ad the certificate maagemet ad proposed the first ID-based sigature (IBS) scheme. However, it is ot util much later that Boeh ad Frali [3] preseted the first secure ad truly practical ID-based ecryptio (IBE) scheme. d they proved its security i the radom oracle model []. Subsequetly, may practical IBC, icludig IBS [5,6], (H)IBE [,7,6], ad ID-based ey distributio [0,6] etc., are proposed. There are several classes of existig IBC based o differet assumptios ad mathematic tools. Some of them are based o groups with a biliear map [3,8,6,4]; some of them are based o quadratic Correspodig author. Tel.: Fax: address: clli@fju.edu.c Published by Elsevier Ltd. Ope access uder CC BY-NC-ND licese. doi:0.06/j.proeg

2 068 Chalgu Li / Procedia Egieerig 9 (0) residuosity problem modulo a composite [7,4]; others are based o hard problems o lattices [9,]. ecetly, Saxea ad Soh [5] preseted a ew cryptographic primitive, called a oracle-based group with ifeasible iversio (O-GII), which is a strog associative oe-way fuctio (SOWF) alog with a oracle allowig verifiable computatio, ad proposed a practical oe roud ey agreemet protocol for arbitrary size groups. I additio, they poited out that this cryptographic primitive ca be used to desig IBC ad proposed the IBE scheme based o hidde-order groups. However, they claimed that the security proof of this proposed IBE scheme is a ope problem. I this paper, we do ot focus o the security of IBC ad pay our attetios o how to costruct some ID-based cryptographic schemes based o hiddeorder groups, that is, oracle-based group with ifeasible iversio problem. We propose ID-based oiteractive ey sharig (ID-NIKS) scheme, hierarchical ID-based ecryptio (HIBE) scheme, ad IDbased sigature (IBS) scheme, based o hidde-order groups.. Prelimiaries We oly describe the group iversio problem (GIP) for the oracle-based group with ifeasible iversio (O-GII For more iformatio about strog associative oe-way fuctios (O-SOWFs) ad group with ifeasible iversio (GII), the readers are referred to [5]. Defiitio (O-GII [5] blac-box costructio of a SOWF implemeted with a PV-Oracle, O, is called a Oracle-GII (O-GII Cocretely, a O-GII costructio has three PPT algorithms: Setup, Sample, ad Compute. Group Iversio Problem (GIP We say that a PPT algorithm breas the O-GII if it is able to ivert the O-GII ad compute iverse i G by havig oly blac-box access to the Compute algorithm. We call this as the group iversio problem (GIP Formally, the advatage of i solvig GIP is defied as: O( Compute( master-ey,, P ) ( P, ): GIP params dv ( τ) = Pr ( params, master-ey ) Setup( τ) ;. ( P, σ P) ( Sample params Defiitio (GIP [5] We say that algorithm ( KO, δ, ε ) -breas the O-GII f if rus at most timeδ ; maes at most K adaptive queries to the oracle O by implemetig the Compute algorithm; ad O GIP dv ( τ ) is at least ε. lteratively, we say that the O-GII is ( K, δ, ε ) O attac if o such algorithm exists. -secure uder a adaptive emar. ) GII must have hidde order for the group. Sice the group G is of fiite order, the oly way to achieve o-ivertibility is to eep the order of this group hidde; ) the defiitios for IBC are referred to [3, 6]. 3. Three ID-based Cryptographic Schemes I the followig three subsectios, we propose ID-based o-iteractive ey sharig (ID-NIKS) scheme, hierarchical ID-based ecryptio (HIBE) scheme, ad ID-based sigature (IBS) scheme, based o hidde-order groups (group iversio problem

3 Chalgu Li / Procedia Egieerig 9 (0) ID-based No-iteractive Key Sharig (ID-INSK) Scheme There are three algorithms for the ID-based o-iteractive ey sharig (ID-INSK) scheme, that are, setup algorithm, ey geeratio algorithm ad shared ey algorithm, deoted by Setup-NIKS, KeyGe ad SharedKey, respectively. The detailed descriptios of them are as follows. Setup-NIKS:. Set (, σ ),( Y, σy) Sample( params );. Let { } H : { 0, } ey are as follows respectively: par ={ Y, Z, H, H }, m-ey ={ σ, σ }. H : 0, Z ad G be two cryptographic hash fuctios. The system parameters par ad the master ey m- KeyGe: Let { 0,} id be the idetity bit strig.. Set i = H id Z ;. i Compute ( σ, iy, ) = Y G. So the private ey is prv-ey id = Y G. SharedKey: Give the system parameter par, the private ey prv-ey ad the idetity id id B of B, where id idb, do:. Set i = H id ad i B = H idb ;. -i Compute ( ˆ B i i+ ib K = H ( ε( prv- ey, i), ε( Yi, ))) = H( Y, B id B -i It is easy to compute that ˆ B i i+ ib KB, = H( ( ε( prv- eyid, i), (, ))) ( B ε YiB = H Y This implies that the etities ad B ca compute a commo secret ey without iteractive ay iformatio each other expect for oly usig the public idetity. 3. Hierarchical Idetity-Based Ecryptio Scheme I IBE scheme, there is a sigle PKG which should verify the idetity ad establish secure chaels to trasfer user s private eys. However, it may be a bottleec i a large etwor. Hierarchical ID-based ecryptio (HIBE) setups a several levels of PKGs ad the root PKG delegates to geerate the private ey ad oly verify the idetity for the lower-level PKGs. The advatage of HIBE is that the autheticatio ad trasmissio of private ey ca be doe locally. Here, we propose a HIBE is based o hidde-order groups. There are four algorithms as follows: Setup-HIBE:. Set Y 0 0 Y 0 0 Z ( σ,, Y ) = Y ; 3. Let H { } Z ad H { } Y (, σ ), (, σ ) Sample params ;. Compute : 0, : 0, G be two cryptographic hash fuctios. They are treated as radom oracles i the security aalysis. The system parameters par ad the,,, σ, σ. master ey m-ey are as follows respectively: par ={ } Y0 Z0 H H, m-ey = { } 0 Y0 KeyGe: Let IDt = ( I,..., It) {0,} be the idetity strig of depth t for t. The correspodig private ey d t ca be geerated by givig the paret idetity IDt = ( I,..., It ) ad the correspodig private ey d t. If t =, the do as follows:. Compute i = H ( I ) Z ;. Compute d = ( σ, i, Y ) = Y. If t, the do as follows: 3. Compute it = H( I,..., It) Z ; 4. Set t t t Yt (, σ ),( Y, σ ) Sample params, the σ t i σ t t it Y is the sample iformatio for. t Yt 5. t t

4 070 Chalgu Li / Procedia Egieerig 9 (0) t t Yt t t t t 0 0 j= j j i it it it it i t j j Compute d = ( σ σ,, d ) = Y d = Y ( Y ); 6. Compute t = σ Yt t = t t Z (,, ) Y. HID-Ecrypt: To ecrypt a message { 0,} follows:. Compute ij = H( I,..., I j) Z, for j,..., t; m for < log usig the idetity IDt = ( I,..., It), do as =. Geerate (, σ ) Sample params ; 3. i + Compute C = m H ( ( σ,, ε( Y, i + ))) = m H ( Y ); Compute (,, j (, )) j Z i l i l l j ( i C = σ ε Z i = = Y Y i ), for j =,..., t. j l= l l l= l 0 0 l= l l The, the ciphertext is C = ( C0, C, C,..., C t HID-Decrypt: To decrypt the ciphertext C = ( C0, C, C,..., C t ), usig the private ey d t, do as follows:. Compute ˆ(, ) ( i ) j ( il l ) i t ( j ij ) i + D = O C d = Y Y Y Y = Y.. t t 0 0 l= l l 0 0 j= j j 0 The, the decrypted message is m = C H ( D 3.3 ID-Based Sigature Scheme The ID-based sigature (IBS) scheme by usig the O-GII icludes the followig four algorithms: Setup: it does as the followig steps.. Set (, ),( Y, ) Y 3. Let H { } Z ad H { } σ σ Sample params ;. Compute Z ( σ,, Y) = Y; : 0, : 0, G be two cryptographic hash fuctios. The system parameters par ad the master ey m-ey are as follows respectively: par,,, σ, σ. ={ Y Z H H },m-ey ={ } KeyGe: Let Y id {0,} be the idetity bit strig.. Set i = H ; id Z. Compute ( σ, iy, ) = Y G. So the private ey is prv- eyid = Y. Sig: Let M {0,} be the message. To sig M, a siger computes m = H M Z (we would have m Z with overwhelmig probability The siger computes α ε( -, ) ( i m m m prv ey m id = Y ) = Y. So, the sigature of the siger o M is ( id, M, α Verify: To verify a sigature ( id, M, α ) o message M, compute i = H ( id) ad H M Z ad the? chec that the equality ε( Y, ( i + ) m) = O ( αε, ( Z, im)) holds. The correct of the above sigature ca be guarateed by the followig equatio ( i+ ) m? im m m im im Y = α Z = ( Y ) ( Y 4. Coclusios I this paper, we propose three ID-based cryptographic schemes, such as ID-based o-iteractive ey sharig (ID-NIKS) scheme, hierarchical ID-based ecryptio (HIBE) scheme, ad ID-based sigature (IBS) scheme, based o hidde-order groups. Their security proofs are still a ope problem.

5 Chalgu Li / Procedia Egieerig 9 (0) cowledgemets This research is supported by the Natioal Natural Sciece Foudatio of Chia uder Grat No , the Natural Sciece Foudatio of Fujia Provice uder Grat No. 0J0547, ad the esearch Foudatio of Educatio Bureau of Fujia Provice uder Grat No. JB07. efereces []. Bellare ad P. ogaway. adom oracles are practical: paradigm for desigig efficiet protocols. I: Proceedigs of First ual Cof. Computer ad Commuicatios Security, CM, pages 6 73, 993. [] D. Boeh ad. Boye. Secure idetity based ecryptio without radom oracles. I: dvaces i Cryptology - CYPTO 04, volume 35 of LNCS, pages Spriger-Verlag, 004. [3] D. Boeh ad M. K. Frali. Idetity based ecryptio from the Weil pairig. I: dvaces i Cryptology - CYPTO 0, volume 39 of LNCS, pages 3 9. Spriger-Verlag, 00. [4] D. Boeh, C. Getry, ad M. Hamburg. Space-efficiet idetity based ecryptiowithout pairigs. I: Proceedigs of the 48th ual IEEE Symposium o Foudatios of Computer Sciece, pages IEEE Computer Society, 007. [5] D. Boeh, B. Ly, ad H. Shacham. Short sigatures from the Weil pairig. I: dvaces i Cryptology - siacrypt 00, volume 48 of LNCS, pages Spriger-Verlag, 00. [6] S. Chatterjee ad P. Sarar. Idetity-based ecryptio. Spriger-Heidelberg Publisher, Lodo, 00. [7] C. Cocs. idetity based ecryptio scheme based o quadratic residues. I: Proceedigs of Cryptography ad Codig 00, volume 60 of LNCS, pages Spriger-Verlag, 00. [8] C. Getry. Practical idetity based ecryptio without radom oracles. I: dvaces i Cryptology - EUOCYPT 06, volume 4004 of LNCS, pages Spriger-Verlag, 006. [9] C. Getry, C. Peiert, ad V. Vaiutaatha. Trapdoors for hard lattices ad ew cryptographic costructios. I: Proceedigs of the 40th aual CM symposium o Theory of computig, pages CM, 008. [0] K. G. Paterso, S. Sriivasa, O the relatios betwee o-iteractive ey distributio, idetity-based ecryptio ad trapdoor discrete log groups, Des. Codes Cryptogr., 5, pages 9 4, 009. [] C. Peiert. Some recet progress i lattice-based cryptography. I: Proceedigs of TCC 09, volume 5444 of LNCS, page 7 7. Spriger-Verlag, 009. [] M. abi ad. Sherma. ssociative oe way fuctios: ew paradigm for secret-ey agreemet ad digital sigatures. I: Tech. ep. CST-383/UMICS-T-93-4, 993. [3] M. abi ad. Sherma. observatio o associative oe-way fuctios i complexity theory. If. Proc. Lett., pages 39 44, 997. [4]. Sahai ad H. Seyalioglu. Fully secure accoutable-authority idetity-based ecryptio. I: Proceedigs of PKC, volume 657 of LNCS, pages Spriger-Verlag, 0. [5]. Saxea ad B. Soh. cryptographic primitive based o hidde-order groups. Joural of Mathematical Cryptology, 3():89 3, 009. [6]. Shamir. Idetity based cryptosystems ad sigature schemes. I: dvaces i Cryptology - CYPTO 84, volume 96 of LNCS, pages Spriger-Verlag, 984. [7] B. Waters. Efficiet idetity based ecryptio without radom oracles. I: dvaces i Cryptology- EUOCYPT 05, volume 3494 of LNCS, pages 4 7. Spriger-Verlag, 005.

Message Authentication Codes. Reading: Chapter 4 of Katz & Lindell

Message Authentication Codes. Reading: Chapter 4 of Katz & Lindell Message Autheticatio Codes Readig: Chapter 4 of Katz & Lidell 1 Message autheticatio Bob receives a message m from Alice, he wats to ow (Data origi autheticatio) whether the message was really set by Alice.

More information

A New Bound between Higher Order Nonlinearity and Algebraic Immunity

A New Bound between Higher Order Nonlinearity and Algebraic Immunity Available olie at wwwsciecedirectcom Procedia Egieerig 9 (01) 788 79 01 Iteratioal Workshop o Iformatio ad Electroics Egieerig (IWIEE) A New Boud betwee Higher Order Noliearity ad Algebraic Immuity Xueyig

More information

Oblivious Transfer using Elliptic Curves

Oblivious Transfer using Elliptic Curves Oblivious Trasfer usig Elliptic Curves bhishek Parakh Louisiaa State Uiversity, ato Rouge, L May 4, 006 bstract: This paper proposes a algorithm for oblivious trasfer usig elliptic curves lso, we preset

More information

Further More on Key Wrapping. 2011/2/17 SKEW2011 Lyngby Nagoya University Yasushi Osaki, Tetsu Iwata

Further More on Key Wrapping. 2011/2/17 SKEW2011 Lyngby Nagoya University Yasushi Osaki, Tetsu Iwata Further More o Key Wrappig 011//17 SKEW011 Lygby Nagoya Uiversity Yasushi Osaki, Tetsu Iwata 1 What is key wrappig? Used to ecrypt specialized data, such as cryptographic keys A key wrappig that also esures

More information

Four-dimensional Vector Matrix Determinant and Inverse

Four-dimensional Vector Matrix Determinant and Inverse I.J. Egieerig ad Maufacturig 013 30-37 Published Olie Jue 01 i MECS (http://www.mecs-press.et) DOI: 10.5815/iem.01.03.05 vailable olie at http://www.mecs-press.et/iem Four-dimesioal Vector Matrix Determiat

More information

A Block Cipher Using Linear Congruences

A Block Cipher Using Linear Congruences Joural of Computer Sciece 3 (7): 556-560, 2007 ISSN 1549-3636 2007 Sciece Publicatios A Block Cipher Usig Liear Cogrueces 1 V.U.K. Sastry ad 2 V. Jaaki 1 Academic Affairs, Sreeidhi Istitute of Sciece &

More information

Two-Input Functional Encryption for Inner Products from Bilinear Maps

Two-Input Functional Encryption for Inner Products from Bilinear Maps Two-Iput Fuctioal Ecryptio for Ier Products from Biliear Maps Kwagsu Lee Dog Hoo Lee Abstract Fuctioal ecryptio is a ew paradigm of public-key ecryptio that allows a user to compute f x o ecrypted data

More information

SUCCESSIVE INTERFERENCE CANCELLATION DECODING FOR THE K -USER CYCLIC INTERFERENCE CHANNEL

SUCCESSIVE INTERFERENCE CANCELLATION DECODING FOR THE K -USER CYCLIC INTERFERENCE CHANNEL Joural of Theoretical ad Applied Iformatio Techology 31 st December 212 Vol 46 No2 25-212 JATIT & LLS All rights reserved ISSN: 1992-8645 wwwatitorg E-ISSN: 1817-3195 SCCESSIVE INTERFERENCE CANCELLATION

More information

Lecture 11: Pseudorandom functions

Lecture 11: Pseudorandom functions COM S 6830 Cryptography Oct 1, 2009 Istructor: Rafael Pass 1 Recap Lecture 11: Pseudoradom fuctios Scribe: Stefao Ermo Defiitio 1 (Ge, Ec, Dec) is a sigle message secure ecryptio scheme if for all uppt

More information

Review of Elementary Cryptography. For more material, see my notes of CSE 5351, available on my webpage

Review of Elementary Cryptography. For more material, see my notes of CSE 5351, available on my webpage Review of Elemetary Cryptography For more material, see my otes of CSE 5351, available o my webpage Outlie Security (CPA, CCA, sematic security, idistiguishability) RSA ElGamal Homomorphic ecryptio 2 Two

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 2, Issue 11, November 2012 ISSN: 2277 128X Iteratioal Joural of Advaced Research i Computer Sciece ad Software Egieerig Research Paper Available olie at: www.ijarcsse.com A Digital Sigature Algorim

More information

Lecture 11: Hash Functions and Random Oracle Model

Lecture 11: Hash Functions and Random Oracle Model CS 7810 Foudatios of Cryptography October 16, 017 Lecture 11: Hash Fuctios ad Radom Oracle Model Lecturer: Daiel Wichs Scribe: Akshar Varma 1 Topic Covered Defiitio of Hash Fuctios Merkle-Damgaård Theorem

More information

Modified Logistic Maps for Cryptographic Application

Modified Logistic Maps for Cryptographic Application Applied Mathematics, 25, 6, 773-782 Published Olie May 25 i SciRes. http://www.scirp.org/joural/am http://dx.doi.org/.4236/am.25.6573 Modified Logistic Maps for Cryptographic Applicatio Shahram Etemadi

More information

Research Article A Note on Ergodicity of Systems with the Asymptotic Average Shadowing Property

Research Article A Note on Ergodicity of Systems with the Asymptotic Average Shadowing Property Discrete Dyamics i Nature ad Society Volume 2011, Article ID 360583, 6 pages doi:10.1155/2011/360583 Research Article A Note o Ergodicity of Systems with the Asymptotic Average Shadowig Property Risog

More information

On Lower Bounds for the Communication Complexity of Private Information Retrieval

On Lower Bounds for the Communication Complexity of Private Information Retrieval IEICE TRANS FUNDAMENTALS, VOLE84 A, NO JANUARY 200 57 PAPER Special Sectio o Cryptography ad Iformatio Security O Lower Bouds for the Commuicatio Complexity of Private Iformatio Retrieval Toshiya ITOH,

More information

Mediated encryption: analysis and design

Mediated encryption: analysis and design Uiversity of Wollogog Research Olie Faculty of Egieerig ad Iformatio Scieces - Papers: Part A Faculty of Egieerig ad Iformatio Scieces 2015 Mediated ecryptio: aalysis ad desig I Elashry Uiversity of Wollogog,

More information

Volume 3, Number 2, 2017 Pages Jordan Journal of Electrical Engineering ISSN (Print): , ISSN (Online):

Volume 3, Number 2, 2017 Pages Jordan Journal of Electrical Engineering ISSN (Print): , ISSN (Online): JJEE Volume 3, Number, 07 Pages 50-58 Jorda Joural of Electrical Egieerig ISSN (Prit: 409-9600, ISSN (Olie: 409-969 Liftig Based S-Box for Scalable Bloc Cipher Desig Based o Filter Bas Saleh S. Saraireh

More information

ID-based Encryption Scheme Secure against Chosen Ciphertext Attacks

ID-based Encryption Scheme Secure against Chosen Ciphertext Attacks ID-based Encryption Scheme Secure against Chosen Ciphertext Attacks ongxing Lu and Zhenfu Cao Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai 200030, P.. China {cao-zf,

More information

An extension of the RSA trapdoor in a KEM/DEM framework

An extension of the RSA trapdoor in a KEM/DEM framework A extesio of the RSA trapdoor i a KEM/DEM framework Bogda Groza Politehica Uiversity of Timisoara Faculty of Automatics ad Computers Bd. Vasile Parva r. 2, 300223 Timisoara, Romaia mail: bogda.groza@aut.upt.ro

More information

Decoupling Zeros of Positive Discrete-Time Linear Systems*

Decoupling Zeros of Positive Discrete-Time Linear Systems* Circuits ad Systems,,, 4-48 doi:.436/cs..7 Published Olie October (http://www.scirp.org/oural/cs) Decouplig Zeros of Positive Discrete-Time Liear Systems* bstract Tadeusz Kaczorek Faculty of Electrical

More information

A Note on the Kolmogorov-Feller Weak Law of Large Numbers

A Note on the Kolmogorov-Feller Weak Law of Large Numbers Joural of Mathematical Research with Applicatios Mar., 015, Vol. 35, No., pp. 3 8 DOI:10.3770/j.iss:095-651.015.0.013 Http://jmre.dlut.edu.c A Note o the Kolmogorov-Feller Weak Law of Large Numbers Yachu

More information

A Provably Secure Signature Scheme based on Factoring and Discrete Logarithms

A Provably Secure Signature Scheme based on Factoring and Discrete Logarithms Appl. Math. If. Sci. 8, No. 4, 1553-1558 2014) 1553 Applied Mathematics & Iformatio Scieces A Iteratioal Joural http://dx.doi.org/10.12785/amis/080408 A Provably Secure Sigature Scheme based o Factorig

More information

The Paillier Cryptosystem

The Paillier Cryptosystem E-Votig Semiar The Paillier Cryptosystem Adreas Steffe Hochschule für Techik Rapperswil adreas.steffe@hsr.ch Adreas Steffe, 17.1.010, Paillier.pptx 1 Ageda Some mathematical properties Ecryptio ad decryptio

More information

The improvement of the volume ratio measurement method in static expansion vacuum system

The improvement of the volume ratio measurement method in static expansion vacuum system Available olie at www.sciecedirect.com Physics Procedia 32 (22 ) 492 497 8 th Iteratioal Vacuum Cogress The improvemet of the volume ratio measuremet method i static expasio vacuum system Yu Hogya*, Wag

More information

The fundamental mappings over group E a,b

The fundamental mappings over group E a,b 157 The fudametal mappigs over group E Abdelhakim Chillali M hammed Boulgouaz ICM 2012, 11-14 March, Al Ai Abstract I this work we study the fudametal mappigs of group E [5], group of a elliptic curve

More information

A collocation method for singular integral equations with cosecant kernel via Semi-trigonometric interpolation

A collocation method for singular integral equations with cosecant kernel via Semi-trigonometric interpolation Iteratioal Joural of Mathematics Research. ISSN 0976-5840 Volume 9 Number 1 (017) pp. 45-51 Iteratioal Research Publicatio House http://www.irphouse.com A collocatio method for sigular itegral equatios

More information

Asymptotic Coupling and Its Applications in Information Theory

Asymptotic Coupling and Its Applications in Information Theory Asymptotic Couplig ad Its Applicatios i Iformatio Theory Vicet Y. F. Ta Joit Work with Lei Yu Departmet of Electrical ad Computer Egieerig, Departmet of Mathematics, Natioal Uiversity of Sigapore IMS-APRM

More information

Security of Identity-based Encryption Schemes from Quadratic Residues

Security of Identity-based Encryption Schemes from Quadratic Residues I: Bica I., Reyhaitabar R. eds Iovative Security Solutios for Iformatio Techology ad Commuicatios. SECITC 2016. Lecture Notes i Computer Sciece, vol 10006. pp 63-77, 2016,Spriger, Cham Security of Idetity-based

More information

ASYMMETRIC CIPHER PROTOCOL USING DECOMPOSITION PROBLEM

ASYMMETRIC CIPHER PROTOCOL USING DECOMPOSITION PROBLEM Iteratioal ook Series "Iformatio Sciece ad Computig" 7 ASYETIC CIPHE POTOCO USING DECOPOSITION POE Adrius aulyaitis, Saulius Japertas Abstract: The asymmetric cipher protocol based o decompositio problem

More information

ROTATION-EQUIVALENCE CLASSES OF BINARY VECTORS. 1. Introduction

ROTATION-EQUIVALENCE CLASSES OF BINARY VECTORS. 1. Introduction t m Mathematical Publicatios DOI: 10.1515/tmmp-2016-0033 Tatra Mt. Math. Publ. 67 (2016, 93 98 ROTATION-EQUIVALENCE CLASSES OF BINARY VECTORS Otokar Grošek Viliam Hromada ABSTRACT. I this paper we study

More information

A Secure Anonymous Proxy Multi-signature Scheme

A Secure Anonymous Proxy Multi-signature Scheme A Secure Aoymous Proxy Multi-sigature Scheme Vishal Saraswat ad Rajeev Aad Sahu C.R.Rao Advaced Istitute of Mathematics Statistics ad Computer Sciece Hyderabad, Idia {vishal.saraswat, rajeevs.crypto}@gmail.com

More information

Estimation of Backward Perturbation Bounds For Linear Least Squares Problem

Estimation of Backward Perturbation Bounds For Linear Least Squares Problem dvaced Sciece ad Techology Letters Vol.53 (ITS 4), pp.47-476 http://dx.doi.org/.457/astl.4.53.96 Estimatio of Bacward Perturbatio Bouds For Liear Least Squares Problem Xixiu Li School of Natural Scieces,

More information

Research Article A Unified Weight Formula for Calculating the Sample Variance from Weighted Successive Differences

Research Article A Unified Weight Formula for Calculating the Sample Variance from Weighted Successive Differences Discrete Dyamics i Nature ad Society Article ID 210761 4 pages http://dxdoiorg/101155/2014/210761 Research Article A Uified Weight Formula for Calculatig the Sample Variace from Weighted Successive Differeces

More information

FLUID LIMIT FOR CUMULATIVE IDLE TIME IN MULTIPHASE QUEUES. Akademijos 4, LT-08663, Vilnius, LITHUANIA 1,2 Vilnius University

FLUID LIMIT FOR CUMULATIVE IDLE TIME IN MULTIPHASE QUEUES. Akademijos 4, LT-08663, Vilnius, LITHUANIA 1,2 Vilnius University Iteratioal Joural of Pure ad Applied Mathematics Volume 95 No. 2 2014, 123-129 ISSN: 1311-8080 (prited versio); ISSN: 1314-3395 (o-lie versio) url: http://www.ijpam.eu doi: http://dx.doi.org/10.12732/ijpam.v95i2.1

More information

Statistical Properties of the Square Map Modulo a Power of Two

Statistical Properties of the Square Map Modulo a Power of Two Statistical Properties of the Square Map Modulo a Power of Two S. M. Dehavi, A. Mahmoodi Rishakai, M. R. Mirzee Shamsabad 3, Hamidreza Maimai, Eiollah Pasha Kharazmi Uiversity, Faculty of Mathematical

More information

On the security of Jhanwar-Barua Identity-Based Encryption Scheme

On the security of Jhanwar-Barua Identity-Based Encryption Scheme On the security of Jhanwar-Barua Identity-Based Encryption Scheme Adrian G. Schipor aschipor@info.uaic.ro 1 Department of Computer Science Al. I. Cuza University of Iași Iași 700506, Romania Abstract In

More information

Commutativity in Permutation Groups

Commutativity in Permutation Groups Commutativity i Permutatio Groups Richard Wito, PhD Abstract I the group Sym(S) of permutatios o a oempty set S, fixed poits ad trasiet poits are defied Prelimiary results o fixed ad trasiet poits are

More information

Power Comparison of Some Goodness-of-fit Tests

Power Comparison of Some Goodness-of-fit Tests Florida Iteratioal Uiversity FIU Digital Commos FIU Electroic Theses ad Dissertatios Uiversity Graduate School 7-6-2016 Power Compariso of Some Goodess-of-fit Tests Tiayi Liu tliu019@fiu.edu DOI: 10.25148/etd.FIDC000750

More information

Gamma Distribution and Gamma Approximation

Gamma Distribution and Gamma Approximation Gamma Distributio ad Gamma Approimatio Xiaomig Zeg a Fuhua (Frak Cheg b a Xiame Uiversity, Xiame 365, Chia mzeg@jigia.mu.edu.c b Uiversity of Ketucky, Leigto, Ketucky 456-46, USA cheg@cs.uky.edu Abstract

More information

PAijpam.eu ON TENSOR PRODUCT DECOMPOSITION

PAijpam.eu ON TENSOR PRODUCT DECOMPOSITION Iteratioal Joural of Pure ad Applied Mathematics Volume 103 No 3 2015, 537-545 ISSN: 1311-8080 (prited versio); ISSN: 1314-3395 (o-lie versio) url: http://wwwijpameu doi: http://dxdoiorg/1012732/ijpamv103i314

More information

Energy of a Hypercube and its Complement

Energy of a Hypercube and its Complement Iteratioal Joural of Algebra, Vol. 6, 01, o. 16, 799-805 Eergy of a Hypercube ad its Complemet Xiaoge Che School of Iformatio Sciece ad Techology, Zhajiag Normal Uiversity Zhajiag Guagdog, 54048 P.R. Chia

More information

Warped, Chirp Z-Transform: Radar Signal Processing

Warped, Chirp Z-Transform: Radar Signal Processing arped, Chirp Z-Trasform: Radar Sigal Processig by Garimella Ramamurthy Report o: IIIT/TR// Cetre for Commuicatios Iteratioal Istitute of Iformatio Techology Hyderabad - 5 3, IDIA Jauary ARPED, CHIRP Z

More information

Algorithm of Superposition of Boolean Functions Given with Truth Vectors

Algorithm of Superposition of Boolean Functions Given with Truth Vectors IJCSI Iteratioal Joural of Computer Sciece Issues, Vol 9, Issue 4, No, July ISSN (Olie: 694-84 wwwijcsiorg 9 Algorithm of Superpositio of Boolea Fuctios Give with Truth Vectors Aatoly Plotikov, Aleader

More information

A Relationship Between the One-Way MANOVA Test Statistic and the Hotelling Lawley Trace Test Statistic

A Relationship Between the One-Way MANOVA Test Statistic and the Hotelling Lawley Trace Test Statistic http://ijspccseetorg Iteratioal Joural of Statistics ad Probability Vol 7, No 6; 2018 A Relatioship Betwee the Oe-Way MANOVA Test Statistic ad the Hotellig Lawley Trace Test Statistic Hasthika S Rupasighe

More information

Notes for Lecture 5. 1 Grover Search. 1.1 The Setting. 1.2 Motivation. Lecture 5 (September 26, 2018)

Notes for Lecture 5. 1 Grover Search. 1.1 The Setting. 1.2 Motivation. Lecture 5 (September 26, 2018) COS 597A: Quatum Cryptography Lecture 5 (September 6, 08) Lecturer: Mark Zhadry Priceto Uiversity Scribe: Fermi Ma Notes for Lecture 5 Today we ll move o from the slightly cotrived applicatios of quatum

More information

Analysis of Deutsch-Jozsa Quantum Algorithm

Analysis of Deutsch-Jozsa Quantum Algorithm Aalysis of Deutsch-Jozsa Quatum Algorithm Zhegju Cao Jeffrey Uhlma Lihua Liu 3 Abstract. Deutsch-Jozsa quatum algorithm is of great importace to quatum computatio. It directly ispired Shor s factorig algorithm.

More information

A constructive analysis of convex-valued demand correspondence for weakly uniformly rotund and monotonic preference

A constructive analysis of convex-valued demand correspondence for weakly uniformly rotund and monotonic preference MPRA Muich Persoal RePEc Archive A costructive aalysis of covex-valued demad correspodece for weakly uiformly rotud ad mootoic preferece Yasuhito Taaka ad Atsuhiro Satoh. May 04 Olie at http://mpra.ub.ui-mueche.de/55889/

More information

Double Stage Shrinkage Estimator of Two Parameters. Generalized Exponential Distribution

Double Stage Shrinkage Estimator of Two Parameters. Generalized Exponential Distribution Iteratioal Mathematical Forum, Vol., 3, o. 3, 3-53 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/.9/imf.3.335 Double Stage Shrikage Estimator of Two Parameters Geeralized Expoetial Distributio Alaa M.

More information

Uniform Strict Practical Stability Criteria for Impulsive Functional Differential Equations

Uniform Strict Practical Stability Criteria for Impulsive Functional Differential Equations Global Joural of Sciece Frotier Research Mathematics ad Decisio Scieces Volume 3 Issue Versio 0 Year 03 Type : Double Blid Peer Reviewed Iteratioal Research Joural Publisher: Global Jourals Ic (USA Olie

More information

Calderbank-Shor-Steane

Calderbank-Shor-Steane ISSN -985, CODEN RUXUEW E-mail: os@iscas.ac.c Joural of Software, Vol.7, No.3, March 6, pp.59 55 http://www.os.org.c DOI:.36/os759 Tel/Fax: +86--656563 6 by Joural of Software. All rights reserved. Calderbak-Shor-Steae,+,

More information

ADVANCED SOFTWARE ENGINEERING

ADVANCED SOFTWARE ENGINEERING ADVANCED SOFTWARE ENGINEERING COMP 3705 Exercise Usage-based Testig ad Reliability Versio 1.0-040406 Departmet of Computer Ssciece Sada Narayaappa, Aeliese Adrews Versio 1.1-050405 Departmet of Commuicatio

More information

Lossy Trapdoor Functions from Smooth Homomorphic Hash Proof Systems

Lossy Trapdoor Functions from Smooth Homomorphic Hash Proof Systems Electroic Colloquium o Computatioal Complexity, Revisio 1 of Report No 127 (2009) Lossy Trapdoor Fuctios from Smooth Homomorphic Hash Proof Systems July 4, 2010 Abstract I STOC 08, Peikert ad Waters itroduced

More information

Gentry s ideal-lattice based encryption scheme. Gentry s STOC 09 paper - Part III

Gentry s ideal-lattice based encryption scheme. Gentry s STOC 09 paper - Part III Getry s ideal-lattice based ecryptio scheme Getry s STOC 09 paper - Part 1 From Micciacio's paper Why ideal lattices --- as opposed to just ideals or lattices? We described a ideal-based ecryptio scheme

More information

Information Hiding Problems: Hiding Capacity and Key Design

Information Hiding Problems: Hiding Capacity and Key Design Iformatio Hidig Problems: Hidig Capacity ad Key Desig Joseph. O Sulliva Electroic Systems ad Sigals Research Laboratory Departmet of Electrical Egieerig Washigto Uiversity i St. Louis Iformatio Hidig Problems

More information

Some Explicit Formulae of NAF and its Left-to-Right. Analogue Based on Booth Encoding

Some Explicit Formulae of NAF and its Left-to-Right. Analogue Based on Booth Encoding Vol.7, No.6 (01, pp.69-74 http://dx.doi.org/10.1457/ijsia.01.7.6.7 Some Explicit Formulae of NAF ad its Left-to-Right Aalogue Based o Booth Ecodig Dog-Guk Ha, Okyeo Yi, ad Tsuyoshi Takagi Kookmi Uiversity,

More information

A numerical Technique Finite Volume Method for Solving Diffusion 2D Problem

A numerical Technique Finite Volume Method for Solving Diffusion 2D Problem The Iteratioal Joural Of Egieerig d Sciece (IJES) Volume 4 Issue 10 Pages PP -35-41 2015 ISSN (e): 2319 1813 ISSN (p): 2319 1805 umerical Techique Fiite Volume Method for Solvig Diffusio 2D Problem 1 Mohammed

More information

Element sampling: Part 2

Element sampling: Part 2 Chapter 4 Elemet samplig: Part 2 4.1 Itroductio We ow cosider uequal probability samplig desigs which is very popular i practice. I the uequal probability samplig, we ca improve the efficiecy of the resultig

More information

ORTHOGONAL MATRIX IN CRYPTOGRAPHY

ORTHOGONAL MATRIX IN CRYPTOGRAPHY Orthogoal Matrix i Cryptography ORTHOGONAL MATRIX IN CRYPTOGRAPHY Yeray Cachó Sataa Member of CriptoRed (U.P.M.) ABSTRACT I this work is proposed a method usig orthogoal matrix trasform properties to ecrypt

More information

Exponential transient rotating waves and their bifurcations in a ring of unidirectionally coupled bistable Lorenz systems

Exponential transient rotating waves and their bifurcations in a ring of unidirectionally coupled bistable Lorenz systems Available olie at www.sciecedirect.com Procedia IUTAM 5 (2012 ) 283 287 IUTAM Symposium o 50 Years of Chaos: Applied ad Theoretical Expoetial trasiet rotatig waves ad their bifurcatios i a rig of uidirectioally

More information

Minimum-Knowledge Schemes for low-power, low-memory Devices

Minimum-Knowledge Schemes for low-power, low-memory Devices Miimum-Kowledge Schemes for low-power, low-memory Deices T. Newe & T. Coffey Data Commuicatios Security Group, Departmet of lectroic & Computer gieerig, Uiersity of imerick, relad. Fax: 353-61-338176 Abstract

More information

The average-shadowing property and topological ergodicity

The average-shadowing property and topological ergodicity Joural of Computatioal ad Applied Mathematics 206 (2007) 796 800 www.elsevier.com/locate/cam The average-shadowig property ad topological ergodicity Rogbao Gu School of Fiace, Najig Uiversity of Fiace

More information

Section 14. Simple linear regression.

Section 14. Simple linear regression. Sectio 14 Simple liear regressio. Let us look at the cigarette dataset from [1] (available to dowload from joural s website) ad []. The cigarette dataset cotais measuremets of tar, icotie, weight ad carbo

More information

Confidence interval for the two-parameter exponentiated Gumbel distribution based on record values

Confidence interval for the two-parameter exponentiated Gumbel distribution based on record values Iteratioal Joural of Applied Operatioal Research Vol. 4 No. 1 pp. 61-68 Witer 2014 Joural homepage: www.ijorlu.ir Cofidece iterval for the two-parameter expoetiated Gumbel distributio based o record values

More information

HFEM. Breaking the HFEM public key scheme

HFEM. Breaking the HFEM public key scheme 4 Vol.4 No. 0 Joural o Commuicatios March 0 doi:0.969/j.iss.000-46x.0.0.00 HFEM (. 00. 007. 00,, MQ HFEM MQ MQ P09. A 000-46X(0)0-0085-05 reaig the HFEM pulic ey scheme GU Chu-sheg,, (. chool of Computer

More information

Comparison of Minimum Initial Capital with Investment and Non-investment Discrete Time Surplus Processes

Comparison of Minimum Initial Capital with Investment and Non-investment Discrete Time Surplus Processes The 22 d Aual Meetig i Mathematics (AMM 207) Departmet of Mathematics, Faculty of Sciece Chiag Mai Uiversity, Chiag Mai, Thailad Compariso of Miimum Iitial Capital with Ivestmet ad -ivestmet Discrete Time

More information

A New Class of Ternary Zero Correlation Zone Sequence Sets Based on Mutually Orthogonal Complementary Sets

A New Class of Ternary Zero Correlation Zone Sequence Sets Based on Mutually Orthogonal Complementary Sets IOSR Joural of Electroics ad Commuicatio Egieerig (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 0, Issue 3, Ver. I (May - Ju.205), PP 08-3 www.iosrjourals.org A New Class of Terary Zero Correlatio

More information

elliptic curve cryptosystems using efficient exponentiation

elliptic curve cryptosystems using efficient exponentiation See discussios, stats, ad author profiles for this publicatio at: https://www.researchgate.et/publicatio/665870 elliptic curve cryptosystems usig efficiet expoetiatio Article Jauary 007 CITATIONS 0 READS

More information

Recursive Algorithm for Generating Partitions of an Integer. 1 Preliminary

Recursive Algorithm for Generating Partitions of an Integer. 1 Preliminary Recursive Algorithm for Geeratig Partitios of a Iteger Sug-Hyuk Cha Computer Sciece Departmet, Pace Uiversity 1 Pace Plaza, New York, NY 10038 USA scha@pace.edu Abstract. This article first reviews the

More information

New Exponential Strengthening Buffer Operators and Numerical Simulation

New Exponential Strengthening Buffer Operators and Numerical Simulation Sesors & Trasducers, Vol. 59, Issue, November 0, pp. 7-76 Sesors & Trasducers 0 by IFSA http://www.sesorsportal.com New Expoetial Stregtheig Buffer Operators ad Numerical Simulatio Cuifeg Li, Huajie Ye,

More information

An efficient variant of Boneh-Gentry-Hamburg's identity-based encryption without pairing

An efficient variant of Boneh-Gentry-Hamburg's identity-based encryption without pairing University of Wollongong Research Online Faculty of Engineering and Information Sciences - Papers: Part A Faculty of Engineering and Information Sciences 2015 An efficient variant of Boneh-Gentry-Hamburg's

More information

Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption

Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption daptively ttribute-hidig (Hierarchical) Ier Product Ecryptio Tatsuaki Okamoto 1 ad Katsuyuki Takashima 2 1 NTT okamoto.tatsuaki@lab.tt.co.jp 2 Mitsubishi Electric Takashima.Katsuyuki@aj.MitsubishiElectric.co.jp

More information

Formulas for the Number of Spanning Trees in a Maximal Planar Map

Formulas for the Number of Spanning Trees in a Maximal Planar Map Applied Mathematical Scieces Vol. 5 011 o. 64 3147-3159 Formulas for the Number of Spaig Trees i a Maximal Plaar Map A. Modabish D. Lotfi ad M. El Marraki Departmet of Computer Scieces Faculty of Scieces

More information

The multiplicative structure of finite field and a construction of LRC

The multiplicative structure of finite field and a construction of LRC IERG6120 Codig for Distributed Storage Systems Lecture 8-06/10/2016 The multiplicative structure of fiite field ad a costructio of LRC Lecturer: Keeth Shum Scribe: Zhouyi Hu Notatios: We use the otatio

More information

Lecture 19: Convergence

Lecture 19: Convergence Lecture 19: Covergece Asymptotic approach I statistical aalysis or iferece, a key to the success of fidig a good procedure is beig able to fid some momets ad/or distributios of various statistics. I may

More information

Minimax Estimation of the Parameter of Maxwell Distribution Under Different Loss Functions

Minimax Estimation of the Parameter of Maxwell Distribution Under Different Loss Functions America Joural of heoretical ad Applied Statistics 6; 5(4): -7 http://www.sciecepublishiggroup.com/j/ajtas doi:.648/j.ajtas.654.6 ISSN: 6-8999 (Prit); ISSN: 6-96 (Olie) Miimax Estimatio of the Parameter

More information

An Introduction to Randomized Algorithms

An Introduction to Randomized Algorithms A Itroductio to Radomized Algorithms The focus of this lecture is to study a radomized algorithm for quick sort, aalyze it usig probabilistic recurrece relatios, ad also provide more geeral tools for aalysis

More information

Research Article Approximate Riesz Algebra-Valued Derivations

Research Article Approximate Riesz Algebra-Valued Derivations Abstract ad Applied Aalysis Volume 2012, Article ID 240258, 5 pages doi:10.1155/2012/240258 Research Article Approximate Riesz Algebra-Valued Derivatios Faruk Polat Departmet of Mathematics, Faculty of

More information

Explicit Maximal and Minimal Curves over Finite Fields of Odd Characteristics

Explicit Maximal and Minimal Curves over Finite Fields of Odd Characteristics Explicit Maximal ad Miimal Curves over Fiite Fields of Odd Characteristics Ferruh Ozbudak, Zülfükar Saygı To cite this versio: Ferruh Ozbudak, Zülfükar Saygı. Explicit Maximal ad Miimal Curves over Fiite

More information

Generating Functions for Laguerre Type Polynomials. Group Theoretic method

Generating Functions for Laguerre Type Polynomials. Group Theoretic method It. Joural of Math. Aalysis, Vol. 4, 2010, o. 48, 257-266 Geeratig Fuctios for Laguerre Type Polyomials α of Two Variables L ( xy, ) by Usig Group Theoretic method Ajay K. Shula* ad Sriata K. Meher** *Departmet

More information

MOMENT-METHOD ESTIMATION BASED ON CENSORED SAMPLE

MOMENT-METHOD ESTIMATION BASED ON CENSORED SAMPLE Vol. 8 o. Joural of Systems Sciece ad Complexity Apr., 5 MOMET-METHOD ESTIMATIO BASED O CESORED SAMPLE I Zhogxi Departmet of Mathematics, East Chia Uiversity of Sciece ad Techology, Shaghai 37, Chia. Email:

More information

Symmetric Two-User Gaussian Interference Channel with Common Messages

Symmetric Two-User Gaussian Interference Channel with Common Messages Symmetric Two-User Gaussia Iterferece Chael with Commo Messages Qua Geg CSL ad Dept. of ECE UIUC, IL 680 Email: geg5@illiois.edu Tie Liu Dept. of Electrical ad Computer Egieerig Texas A&M Uiversity, TX

More information

Seed and Sieve of Odd Composite Numbers with Applications in Factorization of Integers

Seed and Sieve of Odd Composite Numbers with Applications in Factorization of Integers IOSR Joural of Mathematics (IOSR-JM) e-issn: 78-578, p-issn: 319-75X. Volume 1, Issue 5 Ver. VIII (Sep. - Oct.01), PP 01-07 www.iosrjourals.org Seed ad Sieve of Odd Composite Numbers with Applicatios i

More information

Full shifts and irregular sets

Full shifts and irregular sets São Paulo Joural of Mathematical Scieces 6, 2 (2012), 135 143 Full shifts ad irregular sets Luis Barreira Departameto de Matemática, Istituto Superior Técico 1049-001 Lisboa, Portugal E-mail address: barreira@math.ist.utl.pt

More information

Identity-based Encryption from Codes with Rank Metric

Identity-based Encryption from Codes with Rank Metric Idetity-based Ecryptio from Codes with Rak Metric Philippe Gaborit 1, Adrie Hauteville 1,2, Duog Hieu Pha 1, ad Jea-Pierre Tillich 2 1 Uiversité de Limoges, XLIM-DMI, 123, Av. Albert Thomas, 87060 Limoges

More information

TRACES OF HADAMARD AND KRONECKER PRODUCTS OF MATRICES. 1. Introduction

TRACES OF HADAMARD AND KRONECKER PRODUCTS OF MATRICES. 1. Introduction Math Appl 6 2017, 143 150 DOI: 1013164/ma201709 TRACES OF HADAMARD AND KRONECKER PRODUCTS OF MATRICES PANKAJ KUMAR DAS ad LALIT K VASHISHT Abstract We preset some iequality/equality for traces of Hadamard

More information

Quantum Simulation: Solving Schrödinger Equation on a Quantum Computer

Quantum Simulation: Solving Schrödinger Equation on a Quantum Computer Purdue Uiversity Purdue e-pubs Birc Poster Sessios Birc Naotechology Ceter 4-14-008 Quatum Simulatio: Solvig Schrödiger Equatio o a Quatum Computer Hefeg Wag Purdue Uiversity, wag10@purdue.edu Sabre Kais

More information

1 Hash tables. 1.1 Implementation

1 Hash tables. 1.1 Implementation Lecture 8 Hash Tables, Uiversal Hash Fuctios, Balls ad Bis Scribes: Luke Johsto, Moses Charikar, G. Valiat Date: Oct 18, 2017 Adapted From Virgiia Williams lecture otes 1 Hash tables A hash table is a

More information

Report on Private Information Retrieval over Unsynchronized Databases

Report on Private Information Retrieval over Unsynchronized Databases Report o Private Iformatio Retrieval over Usychroized Databases Lembit Valgma Supervised by Vitaly Skachek May 25, 217 1 Problem Statemet There are may challeges cocerig olie privacy. Private iformatio

More information

Some properties of Boubaker polynomials and applications

Some properties of Boubaker polynomials and applications Some properties of Boubaker polyomials ad applicatios Gradimir V. Milovaović ad Duša Joksimović Citatio: AIP Cof. Proc. 179, 1050 (2012); doi: 10.1063/1.756326 View olie: http://dx.doi.org/10.1063/1.756326

More information

ON POINTWISE BINOMIAL APPROXIMATION

ON POINTWISE BINOMIAL APPROXIMATION Iteratioal Joural of Pure ad Applied Mathematics Volume 71 No. 1 2011, 57-66 ON POINTWISE BINOMIAL APPROXIMATION BY w-functions K. Teerapabolar 1, P. Wogkasem 2 Departmet of Mathematics Faculty of Sciece

More information

On Some Inverse Singular Value Problems with Toeplitz-Related Structure

On Some Inverse Singular Value Problems with Toeplitz-Related Structure O Some Iverse Sigular Value Problems with Toeplitz-Related Structure Zheg-Jia Bai Xiao-Qig Ji Seak-Weg Vog Abstract I this paper, we cosider some iverse sigular value problems for Toeplitz-related matrices

More information

A Note on Matrix Rigidity

A Note on Matrix Rigidity A Note o Matrix Rigidity Joel Friedma Departmet of Computer Sciece Priceto Uiversity Priceto, NJ 08544 Jue 25, 1990 Revised October 25, 1991 Abstract I this paper we give a explicit costructio of matrices

More information

OPTIMAL PIECEWISE UNIFORM VECTOR QUANTIZATION OF THE MEMORYLESS LAPLACIAN SOURCE

OPTIMAL PIECEWISE UNIFORM VECTOR QUANTIZATION OF THE MEMORYLESS LAPLACIAN SOURCE Joural of ELECTRICAL EGIEERIG, VOL. 56, O. 7-8, 2005, 200 204 OPTIMAL PIECEWISE UIFORM VECTOR QUATIZATIO OF THE MEMORYLESS LAPLACIA SOURCE Zora H. Perić Veljo Lj. Staović Alesadra Z. Jovaović Srdja M.

More information

Higher-order iterative methods by using Householder's method for solving certain nonlinear equations

Higher-order iterative methods by using Householder's method for solving certain nonlinear equations Math Sci Lett, No, 7- ( 7 Mathematical Sciece Letters A Iteratioal Joural http://dxdoiorg/785/msl/5 Higher-order iterative methods by usig Householder's method for solvig certai oliear equatios Waseem

More information

PROBABILISTIC SOLUTION OF YAO S MILLIONAIRES PROBLEM

PROBABILISTIC SOLUTION OF YAO S MILLIONAIRES PROBLEM PROBABILISTIC SOLUTION OF YAO S MILLIONAIRES PROBLEM MARIYA BESSONOV, DIMA GRIGORIEV, AND VLADIMIR SHPILRAIN ABSTRACT. We offer a probabilistic solutio of Yao s millioaires problem that gives correct aswer

More information

REMARKS ON IBE SCHEME OF WANG AND CAO

REMARKS ON IBE SCHEME OF WANG AND CAO REMARKS ON IBE SCEME OF WANG AND CAO Sunder Lal and Priyam Sharma Derpartment of Mathematics, Dr. B.R.A.(Agra), University, Agra-800(UP), India. E-mail- sunder_lal@rediffmail.com, priyam_sharma.ibs@rediffmail.com

More information

Proof of a conjecture of Amdeberhan and Moll on a divisibility property of binomial coefficients

Proof of a conjecture of Amdeberhan and Moll on a divisibility property of binomial coefficients Proof of a cojecture of Amdeberha ad Moll o a divisibility property of biomial coefficiets Qua-Hui Yag School of Mathematics ad Statistics Najig Uiversity of Iformatio Sciece ad Techology Najig, PR Chia

More information

arxiv: v1 [cs.sc] 2 Jan 2018

arxiv: v1 [cs.sc] 2 Jan 2018 Computig the Iverse Melli Trasform of Holoomic Sequeces usig Kovacic s Algorithm arxiv:8.9v [cs.sc] 2 Ja 28 Research Istitute for Symbolic Computatio RISC) Johaes Kepler Uiversity Liz, Alteberger Straße

More information

International Journal of Engineering Science Invention Research & Development; Vol. II Issue VIII February e-issn:

International Journal of Engineering Science Invention Research & Development; Vol. II Issue VIII February e-issn: Iteratioal Joural of Egieerig Sciece Ivetio Research & Developmet; Vol. II Issue VIII February 216 www.ijesird.com eissn: 236 MULTIPLE ENCRYPTIONS OF VARIOUS CIPHERS A. ChadraSekhar*,1, B.Ravi Kumar 2,

More information

On forward improvement iteration for stopping problems

On forward improvement iteration for stopping problems O forward improvemet iteratio for stoppig problems Mathematical Istitute, Uiversity of Kiel, Ludewig-Mey-Str. 4, D-24098 Kiel, Germay irle@math.ui-iel.de Albrecht Irle Abstract. We cosider the optimal

More information