Overcoming Weak Expectations

Size: px
Start display at page:

Download "Overcoming Weak Expectations"

Transcription

1 Ovecoming Weak Expectations Yevgeniy Dodis Depatment of Compute Science New Yok Univesity (Invited Pape) Yu Yu Institute fo Intedisciplinay Infomation Sciences Tsinghua Univesity, Beijing, , P.R.China Abstact Recently, thee has been enewed inteest in basing cyptogaphic pimitives on weak secets, whee the only infomation about the secet is some non-tivial amount of (min-) entopy. Fom a fomal point of view, such esults equie to uppe bound the expectation of some function f(x), whee X is a weak souce in question. We show an elementay inequality which essentially uppe bounds such weak expectation by two tems, the fist of which is independent of f, while the second only depends on the vaiance of f unde unifom distibution. Quite emakably, as elatively simple coollaies of this elementay inequality, we obtain some unexpected esults, in seveal cases noticeably simplifying/impoving pio techniques fo the same poblem. Examples include non-malleable extactos, leakageesilient symmetic encyption, seed-dependent condenses and impoved entopy loss fo the leftove hash lemma. The full vesion of this (unefeeed) suvey is available hee [1]. I. INTRODUCTION Fomal cyptogaphic models take fo ganted the availability of pefect andomness. Howeve, in eality we may only obtain weak andom souces that ae fa fom unifom but only guaanteed with high unpedictability (fomalized with minentopy), such as biometic data [], [3], physical souces [4], [5], secets with patial leakage, and goup elements fom Diffie-Hellman key exchange [6], [7]. We efe to the fome as ideal model and the latte as eal model. Fom a fomal point of view, the standad (T, ε)-secuity (in the ideal model) of a cyptogaphic application P essentially equies that fo any advesay A with esouce 1 T, the expectation of f(u m ) is uppe bounded by ε, whee function f() denotes A s advantage conditioned on secet key being, and U m denotes unifom distibution ove {0,1} m. In the eal model, keys ae sampled fom some non-unifom distibution R and thus the esulting secuity is the expected value of f(r), which we call weak expectation. We would hope that if P is (T,ε)-secue in the ideal setting, then P is also (T,ε ) in the eal setting by eplacing U m with R of sufficiently high min-entopy, whee T and ε ae not much wose than T and ε espectively. In this pape, we pesent an elementay inequality that uppe bounds the weak expectation of f(r) by two tems: the fist tem only depends on the entopy iciency (i.e. the diffeence between the length of souce R and the amount of 1 We use the wod esouce to include all the efficiency measues we might cae about, such as unning time, cicuit size, numbe of oacle queies, etc. entopy it has), and the second is essentially the vaiance of f unde unifom distibution U m. Quite supisingly, some unexpected esults follow as simple coollaies of this inequality, such as non-malleable extactos [8], [9], [10], [11], leakage-esilient symmetic encyptions [1], seed-dependent condenses [13] and impoved entopy loss fo the leftove hash lemma [14]. We povide a unified poof fo these divesified poblems and in many cases significantly simply and/o impove known techniques fo the same poblems. II. PRELIMINARIES NOTATIONS AND DEFINITIONS. We use s S to denote sampling an element s accoding to distibution S. The minentopy of a andom vaiable X is ined as H (X) = log(max x P[X = x]). We use Col(X) to denote the collision pobability of X, i.e., Col(X) = x P[X = x] H (X), and collision entopy H (X) = log Col(X) H (X). We also ine aveage (aka conditional) collision entopy and aveage min-entopy of a andom vaiable X conditioned on anothe andom vaiable Z by H (X Z) = log ( [ ] ) E z Z x P[X = x Z = z] H (X Z) = log ( E z Z [ max x P[X = x Z = z] ] ) espectively, whee E z Z denotes the expected value ove z Z. We denote with D (X,Y ) the advantage of a cicuit D in distinguishing the andom vaiables X,Y : D (X,Y ) = P[D(X) = 1] P[D(Y ) = 1]. The statistical distance between two andom vaiables X,Y, denoted by SD(X,Y ), is ined by 1 P[X = x] P[Y = x] = max D (X,Y ) D x we wite SD(X,Y Z) as shothand fo SD((X,Z),(Y,Z)). ABSTRACT SECURITY GAMES. We fist ine the geneal type of applications whee ou technique applies. The secuity of an application P can be ined via an inteactive game between a pobabilistic attacke A and a pobabilistic challenge C(), whee A and C jointly compute function f on value (deived fom U m in the ideal setting and fom distibution R in the eal setting). The game can have an abitay stuctue, but at the end C() should output a bit, with output 1 indicating that A won the game and 0 othewise.

2 Fo unpedictability games, f() is the expected value of C() taken ove the intenal coins of A and C so that f() [0;1]; and fo indistinguishability games, f() is the expectation of C() 1/, and hence f() [ 1/;1/]. We will efe to E(f(U m )) as the secuity in the ideal model (against A), and to E(f(R)), with H c (R) m d and c {, }, as the secuity in the (m d)-eal c model. Note that a secuity esult in the eal model is moe desiable than (and implies) that in the eal model. III. OVERCOMING WEAK EXPECTATIONS UNPREDICTABILITY APPLICATIONS. Fo unpedictability applications (with non-negative f), the following inequality implies that the secuity degades at most by a facto of d compaed with the ideal model (which is stated as Coollay 3.1), whee d is the entopy iciency. Lemma 3.1: Fo any (deteministic) eal-valued function f : {0,1} m R + {0} and any andom vaiable R with H (R) m d, we have Poof: E[f(R)] = E[f(R)] d E[f(U m )] (1) P[R = ] f() d 1 m f() Coollay 3.1: If an unpedictability application P is (T,ε)-squae secue in the ideal model, then P is (T, d ε)- secue in the (m d)-eal model. The above only applies to all unpedictability applications such as one-way functions, MACs and digital signatues. INDISTINGUISHABILITY APPLICATIONS. Unfotunately, Coollay 3.1 citically depends on the non-negativity of f, and is geneally false when f can be negative, which happens fo indistinguishability applications. In fact, fo cetain indistinguishability applications, such as one-time pad, pseudoandom- geneatos and functions (PRGs and PRFs), thee exists R with d = 1 such that E[f(U m )] is negligible (o even zeo!) but E[f(R)] = 1/ (see [14] fo moe discussions). Fotunately, below we give anothe inequality fo geneal f, which will be useful fo othe indistinguishability applications. Lemma 3.: Fo any (deteministic) eal-valued function f : {0,1} m R and any andom vaiable R with H (R) m d, we have E[f(R)] d E[f(U m ) ] () Poof: Denote p() = P[R = ], and also ecall the Cauchy-Schwatz inequality a i b i ( a i ) ( b i ). We have E[f(R)] = p() f() m 1 p() m f() = d E[f(U m ) ] Lemma 3. uppe bounds the (squaed) weak expectation by the poduct of d and E[f(U m ) ]. Intuitively, d gives the secuity loss due to the entopy iciency, and E[f(U m )] ines the ideal model secuity of the application in consideation, but notice we only get E[f(U m ) ], fo which we ine the notion of squae secuity. Lemma 3. essentially applies to squae secue applications, which we state as Coollay 3.. Definition 3.1 (Squae Secuity): An application P is (T,σ)-squae secue if fo any T -bounded advesay A we have E[f(U m ) ] σ, whee f() denotes A s advantage conditioned on key being. Coollay 3. (Squae secuity implies eal model secuity): If P is (T,σ)-squae secue, then P is (T, d σ)-secue in the (m d)-eal model. WHAT APPLICATIONS HAVE SQUARE SECURITY? Fist, all (T, ε)-secue unpedictability applications P ae (T, ε)-squae secue, since fo non-negative f we have E[f(U m ) ] E[f(U m )]. Hence, we immediately get d ε-secuity in (m d)-eal model fo such application. Moving to indistinguishability applications, it is known that PRGs, PRFs, one-time pads cannot have good squae secuity (see [14]). To see why, conside a 1-bit one time pad encyption c = m, whee m,,c {0,1} ae the message, the key and the ciphetext, espectively, and is exclusive OR. Conside also the attacke A who guesses that m = c. When the key = 0, A is ight and f(0) = 1 1 = 1. Similaly, when the key = 1, A is wong and f(1) = 0 1 = 1. This gives pefect ε = E[f(U 1 )] = 0, but σ = E[f(U 1 ) ] = 1 4. Fotunately, thee ae still many inteesting indistinguishability objects whose squae secuity is of oughly the same ode as thei egula secuity, such as stateless CPA- and CCAsecue (symmetic-key and public-key) encyption schemes, weak pseudo-andom functions (weak PRFs), and q-wise independent hash functions. We now discuss some examples. A. Application to Encyption Schemes and Weak PRFs We will only show that CPA-secue symmetic-key encyption schemes ae squae secue, and we pove that using the double-un technique fom [14]. Othe schemes (mentioned above) can be poven similaly by adapting the double-un tick to the actual secuity game (see [14] fo the subtleties). Lemma 3.3 ([14]): Assume P is a symmetic-key encyption scheme which is ε-secue, in the ideal model, against all chosen-plaintext attackes with unning time t + O(1) and making q + 1 queies. Then P is ε-squae secue against all chosen-plaintext attackes with unning time t, and making q queies. Hence, (T = (t+o(1),q+1),ε)-secuity implies ((t,q),ε)-secuity. DOUBLE-RUN TRICK. We sketch the poof of the above lemma fo completeness. It suffices to show that fo any This bound is weake than the d ε bound in Coollay 3.1, although it applies wheneve H (R) m d (instead of only when H (R) m d). Still, we will find Lemma 3. useful even fo unpedictability applications when we talk about key deivation functions in Section IV.

3 and any attacke A with unning time t and q queies, thee exists anothe attacke B with unning time oughly t and q + 1 queies such that B s advantage is twice the squaed advantage of A. The stategy of B is that it fist simulates the challenge C (using one quey), uns A against the simulated C, and then uns A against the eal C. If A wins the game in its fist un (against the simulated C), then B etuns A s answe in the second un, o othewise B eveses the answe of A. Thus, P[B wins] = P[A wins twice] + P[A loses twice] = ( 1 ± ε) + ( 1 ε) = 1 + ε The following theoem immediately follows fom Coollay 3. and Lemma 3.3. Theoem 3.1: Assume P is a ((t + O(1), q), ε)-cpa secue symmetic-key encyption scheme in the ideal model. Then P is also ((t,q), d ε)-secue in the (m d)-eal model. Same agument (as Theoem 3.1) woks fo all afoementioned squae secue applications, such as stateless (publickey and symmetic-key) CPA- and CCA- secue encyption schemes, and weak PRFs, simplifying [1]. MULTI-RUN EXTENSION. In the double-un game we use a test-un to estimate the sign of the advantage (whethe it s positive o not), which advises attacke B whethe o not to evese A s answe in the eal un. We can genealize this to a multi-un setting: the attacke B test-uns A fo some odd (i+1) times, and takes a majoity vote befoe the actual un, which gives B moe accuate estimate on the sign of the advantage (using the technique of Bakeski and Goldeich [15]). This applies to all double-un-fiendly applications (like the CPA encyption), but we only state it fo the case of weak PRF fo conceteness, and also because it simplifies [1] a lot. Coollay 3.3 (Weak PRFs on Weak Keys): Fo any ε, d and c O(1/ d ε), if P is a (((1 + c 4 )t,(1 + c 4 )q),ε)- secue weak PRF in the ideal model, then P is also ((t,q),o( 1 c d ε))-secue in the (m d)-eal model. B. Application to Altenative LHL and NM-Extactos We now show that -wise and 4-wise independent hash functions give ise to stong and non-malleable extactos espectively. Fo ou convenience, we use the following inition fo (q, δ)-wise independence (slightly weake than the taditional q-wise independence), whee one point s is andomly chosen and the est q 1 points can be abitaily dependent on s (as long as they ae distinct fom s). Definition 3. ((q,δ)-wise independence): A family H of functions {h : {0,1} n {0,1} l {0,1} m } is (q,δ)-wise independent, if fo U m, s U n, and fo s 1,,s q 1 {0,1} n that ae distinct fom and abitaily coelated to s, we have SD( h (s), U l s,h (s 1 ),,h (s q 1 ) ) δ Notice, we can natually view the above inition as a game between a challenge C and the attacke A, whee (q 1) measues the esouces of A (distinct fom s points whee he leans the tue value of h ), and δ is the advantage of distinguishing h (s) fom andom. Thus, we can natually ine the (q,σ q )-squae secuity of H (with andom key U m ) and then use Coollay 3. to bound the secuity of H in the (m d)-eal model, when using a weak key R with H (R) m d. In fact, we can successfully apply the doubleun tick above to show that if H is (q,δ)-wise independent, then its squae secuity σ q as a q-wise (athe than q-wise) independent hash function is at most σ q δ + q, whee q n accounts fo the pobability that the eal challenge point n (chosen unifomly at andom) collides with the q points of the test-un. Applying now Coollay 3., we get Theoem 3.: If function family H is (q, δ)-wise independent, then H is also (q,ε)-wise independent in the (m d)- eal model, whee ε = (δ + q ) d. n ALTERNATIVE LHL. We will fist conside the consequences fo q = 1, whee the notion of (1,ε)-wise independence in the k = (m d)-eal model becomes a andomness extacto. Definition 3.3 (Extactos): We say that an efficient function Ext : {0,1} m {0,1} n {0,1} l is a stong (k,ε)- extacto, if fo all R (ove {0,1} m ) with H (R) k and fo andom S (unifom ove {0,1} n ), we get SD( Ext(R;S), U l S) ε whee coins S U n is the andom seed of Ext. The value L = k l is called the entopy loss of Ext. Applying Theoem 3. to paiwise independent hash functions (i.e., q =, δ = 0, k = m d), we get: Coollay 3.4 (Altenative LHL): If H = {h : {0,1} n {0,1} l {0,1} m } is paiwise independent, then Ext(;s) = h (s) is a stong (k, m k n ) extacto. To compae this esult with the standad LHL [16], the optimal key length m fo a family of paiwise independent hash functions fom n to l bits is known to be m = n + l (e.g., using Toeplitz matices o augmented inne poduct discussed below). Plugging this to ou bound in ε above, we get the same bound ε = l k = L/ as the leftove hash lemma, whee in both cases l is output size and k is the entopy of the souce. Inteestingly, standad leftove hashing [16] uses univesal H (see Definition 4.3 below), which is weake, but sets Ext(;s) = h s (), swapping the oles of souce and seed. 3 NON-MALLEABLE EXTRACTORS. Next, we conside the case of q =, whee the notion of (,ε)-wise independence in the k = (m d)-eal model becomes a non-malleable extacto. Definition 3.4 (Non-Malleable Extactos): We say that an efficient function nmext : {0,1} m {0,1} n {0,1} l is a (k,ε)-non-malleable extacto, if fo all R (ove {0,1} m ) with 3 Cuiously, when l divides n, the following augmented inne poduct function h (s) is simultaneously an optimal paiwise independent hash function when keyed by, and an optimal univesal function when keyed by s: h (s) = 1 s p s p+ p+1, whee p = n/l, = ( 1,..., p+1 ), s = (s 1,..., s p), and i and s j ae intepeted as elements of GF[ l ].

4 H (R) k, fo andom S (unifom ove {0,1} n ), and fo all functions g : {0,1} n {0,1} n, s.t. g(s) s fo all s, we get SD( nmext(r;s), U l S,nmExt(R;g(S)) ) ε Applying Theoem 3. to 4-wise independent hash functions (i.e., q = 4, δ = 0, k = m d), we get: Coollay 3.5 (Non-Malleable Extactos): If H = {h : {0,1} n {0,1} l {0,1} m } is 4-wise independent, then nmext(;s) = h (s) is a (k, m k n+1 )-non-malleable extacto. Fo a simple instantiation, let H be the following (optimal) 4-wise independent hash function with known paametes n = m/ and l = m/4 (using BCH codes; see [11]). The key {0,1} m is viewed as a tuple of 4 elements ( 1,, 3, 4 ) in GF[ m/4 ] = GF[ l ], and a seed s {0,1} n \0 n is viewed as a non-zeo point in GF[ n ]. Then, the m-bit value of (s s 3 ) is viewed as 4 elements (s 1,s,s 3,s 4 ) in GF[ l ], and the l-bit output of the function is set to h (s) = 1 s s 4. Using Coollay 3.5, this simple function is a (k, m/ k+1 )- non-malleable extacto, which impoves the constuction of [9] and matches the ecent esults of [11] with a much simplified poof. IV. KEY DERIVATION FUNCTIONS So fa we use weak souces diectly on ε-squae secue objects (and we still get extactos), which equies entopy iciency d < log (1/ε). Fo low entopy souces whee d log (1/ε), we need to apply a key deivation function (KDF) that pepocess the souce to get some bette andomness (by discading some bad bits), whee the setting is mainly chaacteized by the entopy of the souce k and the output size of the KDF m. Definition 4.1: (k,m)-eal c model (fo c {, }) efes to the key deivation setting whee a given KDF h with ange {0,1} m is applied to any souce X with H c (X) k to get a secet key R = h(x) (fo some application in question). Next we popose andomness condenses as genealization of extactos, and justify the use of condenses as key deivation functions. Intuitively, a condense is a pobabilistic function that educes entopy iciency. Definition 4. (Condenses): Let c {, }. We say that an efficient function Cond : {0,1} n {0,1} v {0,1} m is a ( k n m d m ) c-condense if fo H c (X) k and unifomly andom S we have H c ( Cond(X;S) S ) m d. Both H - and H - condenses ae useful in cyptogaphy. The fome connects well with Lemma 3.1, and the latte is moe in line with Lemma 3.. In the sequel, though, we will only use H (and let c = heeafte) since it seems to give stonge final bounds (even fo unpedictability applications), and applies to moe cases (e.g. indistinguishability applications). See [13] fo moe discussion. A. Impoved Leftove Hash Lemma We know by the standad leftove hash lemma [16] that univesal hash functions ae efficient extactos and thus ae good KDFs, but the entopy loss L (entopy of the souce minus the length of extacted andomness) must be positive. Below we ecall the notion of univesal hashing [17], and state thei condensing popeties. We show if they ae used as KDFs fo all squae-fiendly applications, 4 we impove L (educing it by half) and make it meaningful even fo L 0, whee entopy iciency d L. Definition 4.3 (Univesal Hashing): A family of functions G = {g s : {0,1} n {0,1} m s {0,1} v } is univesal, if fo any distinct x 1,x {0,1} n we have P [g s (x 1 ) = g s (x )] = m s U v Lemma 4.1: Univesal hash function family G = {g s : {0,1} n {0,1} m s {0,1} v } ines a ( k n m d m ) -condense Cond(x;s) d = 1 + m k. Poof: P[g S (X 1 ) = g S (X )] = g s (x), whee P[X 1 = X ] + P[ g S (X 1 ) = g S (X ) X 1 X ] k + m = m ( m k + 1) = d m We use a slightly diffeently vesion of Lemma 3. (whose poof is vey simila as well) fo the impoved entopy loss esults. Lemma 4. ([14]): Fo any (deteministic) eal-valued function f : {0,1} m R and any andom vaiable R with H (R) m d, we have E[f(R)] E[f(U m )] d 1 E[f(U m ) ] (3) Coollay 4.1 (Using Univesal Hashing as KDF): If P is (T,ε)-secue and (T,σ)-squae secue, then using R = g s (X) makes P (T,ε )-secue in the (k,m)-eal model, whee R {0,1} m, H (X) k, and ε ε + σ m k. REDUCED ENTROPY LOSS FOR LEFTOVER HASH LEMMA. Recall that we can have σ ε fo many squae-secue applications. Let L = k m denote entopy loss. To achieve ε ε we need to set L = log (1/ε), while the standad leftove hash lemma achieved a weake bound ε ε+ m k, and equied L = log (1/ε). Moeove, ou entopy loss is meaningful even fo negative L, in which case entopy iciency of R = g s (X) is d L and ε ε L ε d. B. Seed-Dependent Key Deivation We now genealize the notion of a condense to the seeddependent setting, whee the advesaial sample A can depend on the seed S but is computationally bounded. This challenging setting was consideed by [18] in the context of seeddependent extactos, whee the authos made a pessimistic conclusion that the complexity of the seed-dependent extacto 4 As obseved by [14], we can also compose univesal hashing with (squaefiendly) weak PRFs to also handle all computational (even non-squaefiendly ) applications, such as PRFs and PRGs.

5 must be lage than that of the sample A, making this notion not vey useful fo key deivation in pactical applications. In contast, we show that (stong enough) collision-esistant hash functions (CRHFs) must be seed-dependent condenses, and thus can be used as KDFs fo all squae secue applications, despite having much smalle complexity than the complexity of the sample A. This patially explains the use of CRHFs as KDFs in pactical applications. Definition 4.4 (Seed-Dependent Condenses): An efficient function Cond : {0,1} n {0,1} v {0,1} m is a ( k n m d m,t) -seed-dependent condense if fo all pobabilistic advesaies A of size t who take a andom seed s U v and output (using moe coins) a sample X A(s) of entopy H (X S) k, we have H ( Cond(X;S) S ) m d. Definition 4.5 (CRHF): A family of hash functions G = {g s : {0,1} n {0,1} m s {0,1} v } is (t,δ) -collisionesistant if fo any (non-unifom) attacke B of size t, we have P[g s (x 1 ) = g s (x ) x 1 x ] δ whee s U v and (x 1,x ) B(s). Lemma 4.3 (CRHFs ae seed-dependent condenses): A family of (t, D(t) )-collision-esistant hash functions m G = {g s : {0,1} n {0,1} m s {0,1} v } ines a seed-dependent ( k n m d m,t) -condense Cond(x;s) = g s (x), whee d = m k + D(t). Poof: P[g S (X 1 ) = g S (X )] P[X 1 = X ] + P[ g S (X 1 ) = g S (X ) X 1 X ] k + D(t) m = m ( m k + D(t)) = d m In the above, entopy iciency d is essentially the logaithm of D(t), which is a function on the sample s complexity t. We note D(t) = Ω(t ) due to bithday attacks, and this bound can be achieved in the andom oacle model. In geneal, it is easonable to assume D(t) = poly(t) fo stong enough CRHFs. Then, using the inition of condenses and Coollay 3., we get the following supising esult, which patially explains the pevalent use of CRHFs (which do not appea to have any extaction popeties based on thei inition) fo key deivation: Coollay 4. (Using CRHFs as KDFs): If P is (T, σ)- squae secue, {g s } is a family of (t, poly(t) )-CRHFs, and X m is a souce poduced by a sample A(s) of complexity at most t and having H (X S) k m O(log t), then using R = g s (X) makes P (T,ε )-secue, whee ε O( σ poly(t)). Fom an asymptotic point of view, fo squae-fiendly applications (e.g. CPA-secue encyptions, weak PRFs, unpedictability pimitives) with negligible ideal ε (and hence negligible σ ε), and all souce samples unning in polynomial time t (all in the secuity paamete ), we get negligible secuity ε =O( σ poly(t)) in the eal model. ACKNOWLEDGMENT We would like to thank ou co-authos in [14], [13] fo useful comments and suggestions. Yevgeniy Dodis was suppoted by NSF Gants CNS , CNS , CNS , CNS and Google Faculty Awad. Yu Yu was suppoted by the National Basic Reseach Pogam of China Gant 011CBA00300, 011CBA00301, the National Natual Science Foundation of China Gant , , , , , , and REFERENCES [1] Y. Dodis and Y. Yu, Ovecoming weak expectactions, 01, full vesion of this (unefeeed) suvey. Available at dodis/ps/weak-expe.pdf. [] Y. Dodis, R. Ostovsky, L. Reyzin, and A. Smith, Fuzzy extactos: How to geneate stong keys fom biometics and othe noisy data, SIAM Jounal on Computing, vol. 38, no. 1, pp , 008. [3] X. Boyen, Y. Dodis, J. Katz, R. Ostovsky, and A. Smith, Secue emote authentication using biometic data, in Advances in Cyptology EUROCRYPT 005, se. LNCS, R. Came, Ed., vol Spinge- Velag, 005, pp [4] B. Baak, R. Shaltiel, and E. Tome, Tue andom numbe geneatos secue in a changing envionment, in Poceedings of the 5th Cyptogaphic Hadwae and Embedded Systems, 003, pp [5] B. Baak and S. Halevi, A model and achitectue fo pseudo-andom geneation with applications to /dev/andom, in Poceedings of the 1th ACM Confeence on Compute and Communication Secuity, 005, pp [6] R. Gennao, H. Kawczyk, and T. Rabin, Secue hashed diffie-hellman ove non-ddh goups, in Advances in Cyptology EUROCRYPT 004, se. LNCS, C. Cachin and J. Camenisch, Eds., vol Spinge- Velag, 004, pp [7] H. Kawczyk, Cyptogaphic Extaction and Key Deivation: The HKDF Scheme, in Advances in Cyptology - CRYPTO 010, se. LNCS, T. Rabin, Ed., vol. 63. Spinge-Velag, 010, pp [8] Y. Dodis and D. Wichs, Non-malleable extactos and symmetic key cyptogaphy fom weak secets, in Poceedings of the 41st Annual ACM Symposium on Theoy of Computing, M. Mitzenmache, Ed. Bethesda, MD, USA: ACM, 009, pp [9] Y. Dodis, X. Li, T. D. Wooley, and D. Zuckeman, Pivacy amplification and non-malleable extactos via chaacte sums, in Poceedings of the 5nd IEEE Symposium on Foundation of Compute Science, 011, pp [10] G. Cohen, R. Raz, and G. Segev, Non-malleable extactos with shot seeds and applications to pivacy amplification, in Poceedings of the 7th Computational Complexity, 01, pp [11] X. Li, Non-malleable extactos, two-souce extactos and pivacy amplification, in Poceedings of the 53d IEEE Symposium on Foundation of Compute Science, 01, pp. xxx xxx. [1] K. Pietzak, A leakage-esilient mode of opeation, in Advances in Cyptology - EUROCRYPT 009, se. LNCS, A. Joux, Ed., vol Spinge-Velag, 009, pp [13] Y. Dodis, T. Ristenpat, and S. P. Vadhan, Randomness condenses fo efficiently samplable, seed-dependent souces, in 9th Theoy of Cyptogaphy Confeence, 01, pp [14] B. Baak, Y. Dodis, H. Kawczyk, O. Peeia, K. Pietzak, F.-X. Standaet, and Y. Yu, Leftove hash lemma, evisited, in CRYPTO, se. LNCS, P. Rogaway, Ed. Spinge, 011, pp [15] Z. Bakeski and O. Goldeich, Fom absolute distinguishability to positive distinguishability, Electonic Colloquium on Computational Complexity (ECCC), vol. 16, p. 31, 009. [16] J. Håstad, R. Impagliazzo, L. Levin, and M. Luby, Constuction of pseudoandom geneato fom any one-way function, SIAM Jounal on Computing, vol. 8, no. 4, pp , [17] J. Cate and M. Wegman, Univesal classes of hash functions, Jounal of Compute and System Sciences, vol. 18, pp , [18] L. Tevisan and S. Vadhan, Extacting andomness fom samplable distibutions, in 41st Annual Symposium on Foundations of Compute Science. Redondo Beach, Califonia: IEEE, Nov. 000, pp. 3 4.

Secret Exponent Attacks on RSA-type Schemes with Moduli N = p r q

Secret Exponent Attacks on RSA-type Schemes with Moduli N = p r q Secet Exponent Attacks on RSA-type Schemes with Moduli N = p q Alexande May Faculty of Compute Science, Electical Engineeing and Mathematics Univesity of Padebon 33102 Padebon, Gemany alexx@uni-padebon.de

More information

New problems in universal algebraic geometry illustrated by boolean equations

New problems in universal algebraic geometry illustrated by boolean equations New poblems in univesal algebaic geomety illustated by boolean equations axiv:1611.00152v2 [math.ra] 25 Nov 2016 Atem N. Shevlyakov Novembe 28, 2016 Abstact We discuss new poblems in univesal algebaic

More information

6 PROBABILITY GENERATING FUNCTIONS

6 PROBABILITY GENERATING FUNCTIONS 6 PROBABILITY GENERATING FUNCTIONS Cetain deivations pesented in this couse have been somewhat heavy on algeba. Fo example, detemining the expectation of the Binomial distibution (page 5.1 tuned out to

More information

10/04/18. P [P(x)] 1 negl(n).

10/04/18. P [P(x)] 1 negl(n). Mastemath, Sping 208 Into to Lattice lgs & Cypto Lectue 0 0/04/8 Lectues: D. Dadush, L. Ducas Scibe: K. de Boe Intoduction In this lectue, we will teat two main pats. Duing the fist pat we continue the

More information

Some RSA-based Encryption Schemes with Tight Security Reduction

Some RSA-based Encryption Schemes with Tight Security Reduction Some RSA-based Encyption Schemes with Tight Secuity Reduction Kaou Kuosawa 1 and Tsuyoshi Takagi 2 1 Ibaaki Univesity, 4-12-1 Nakanausawa, Hitachi, Ibaaki, 316-8511, Japan kuosawa@cis.ibaaki.ac.jp 2 Technische

More information

ON INDEPENDENT SETS IN PURELY ATOMIC PROBABILITY SPACES WITH GEOMETRIC DISTRIBUTION. 1. Introduction. 1 r r. r k for every set E A, E \ {0},

ON INDEPENDENT SETS IN PURELY ATOMIC PROBABILITY SPACES WITH GEOMETRIC DISTRIBUTION. 1. Introduction. 1 r r. r k for every set E A, E \ {0}, ON INDEPENDENT SETS IN PURELY ATOMIC PROBABILITY SPACES WITH GEOMETRIC DISTRIBUTION E. J. IONASCU and A. A. STANCU Abstact. We ae inteested in constucting concete independent events in puely atomic pobability

More information

Lecture 25: Pairing Based Cryptography

Lecture 25: Pairing Based Cryptography 6.897 Special Topics in Cyptogaphy Instucto: Ran Canetti May 5, 2004 Lectue 25: Paiing Based Cyptogaphy Scibe: Ben Adida 1 Intoduction The field of Paiing Based Cyptogaphy has exploded ove the past 3 yeas

More information

Lifting Private Information Retrieval from Two to any Number of Messages

Lifting Private Information Retrieval from Two to any Number of Messages Lifting Pivate Infomation Retieval fom Two to any umbe of Messages Rafael G.L. D Oliveia, Salim El Rouayheb ECE, Rutges Univesity, Piscataway, J Emails: d746@scaletmail.utges.edu, salim.elouayheb@utges.edu

More information

Stanford University CS259Q: Quantum Computing Handout 8 Luca Trevisan October 18, 2012

Stanford University CS259Q: Quantum Computing Handout 8 Luca Trevisan October 18, 2012 Stanfod Univesity CS59Q: Quantum Computing Handout 8 Luca Tevisan Octobe 8, 0 Lectue 8 In which we use the quantum Fouie tansfom to solve the peiod-finding poblem. The Peiod Finding Poblem Let f : {0,...,

More information

q i i=1 p i ln p i Another measure, which proves a useful benchmark in our analysis, is the chi squared divergence of p, q, which is defined by

q i i=1 p i ln p i Another measure, which proves a useful benchmark in our analysis, is the chi squared divergence of p, q, which is defined by CSISZÁR f DIVERGENCE, OSTROWSKI S INEQUALITY AND MUTUAL INFORMATION S. S. DRAGOMIR, V. GLUŠČEVIĆ, AND C. E. M. PEARCE Abstact. The Ostowski integal inequality fo an absolutely continuous function is used

More information

Probablistically Checkable Proofs

Probablistically Checkable Proofs Lectue 12 Pobablistically Checkable Poofs May 13, 2004 Lectue: Paul Beame Notes: Chis Re 12.1 Pobablisitically Checkable Poofs Oveview We know that IP = PSPACE. This means thee is an inteactive potocol

More information

Overcoming Weak Expectations

Overcoming Weak Expectations Overcoming Weak Expectations Yevgeniy Dodis 1 and Yu Yu 2 1 New York University. Email: dodis@cs.nyu.edu. 2 Institute for Interdisciplinary Information Sciences, Tsinghua University. Email: yuyu@yuyu.hk.

More information

Design and Analysis of Password-Based Key Derivation Functions

Design and Analysis of Password-Based Key Derivation Functions Design and Analysis of Passwod-Based Key Deivation Functions Fances F. Yao 1 and Yiqun Lisa Yin 2 1 Depatment of Compute Science City Univesity of Hong Kong Kowloon, Hong Kong Email: csfyao@cityu.edu.hk

More information

Provable Security in Cryptography

Provable Security in Cryptography Povable Secuity in Cyptogaphy Thomas Baignèes EPFL http://lasecwww.epfl.ch May 29, 2007 (ve. 25) These lectue notes ae a compilation of some of my eadings while I was pepaing two lectues given at EPFL

More information

NOTE. Some New Bounds for Cover-Free Families

NOTE. Some New Bounds for Cover-Free Families Jounal of Combinatoial Theoy, Seies A 90, 224234 (2000) doi:10.1006jcta.1999.3036, available online at http:.idealibay.com on NOTE Some Ne Bounds fo Cove-Fee Families D. R. Stinson 1 and R. Wei Depatment

More information

Lecture 18: Graph Isomorphisms

Lecture 18: Graph Isomorphisms INFR11102: Computational Complexity 22/11/2018 Lectue: Heng Guo Lectue 18: Gaph Isomophisms 1 An Athu-Melin potocol fo GNI Last time we gave a simple inteactive potocol fo GNI with pivate coins. We will

More information

Information-Theoretic

Information-Theoretic Infomation-Theoetic Key Ageement fom Close Secets Leonid Reyzin Januay 5, 2018 IISc 1 Infomation-Theoetic Key Ageement fom Close Secets: A Suvey 0 1 assume these ae close and patially secet 2 Infomation-Theoetic

More information

Design and Analysis of Password-Based Key Derivation Functions

Design and Analysis of Password-Based Key Derivation Functions Design and Analysis of Passwod-Based Key Deivation Functions 245 Fances F. Yao 1 and Yiqun Lisa Yin 2 1 Depatment of Compute Science, City Univesity of Hong Kong, Kowloon, Hong Kong csfyao@cityu.edu.hk

More information

9.1 The multiplicative group of a finite field. Theorem 9.1. The multiplicative group F of a finite field is cyclic.

9.1 The multiplicative group of a finite field. Theorem 9.1. The multiplicative group F of a finite field is cyclic. Chapte 9 Pimitive Roots 9.1 The multiplicative goup of a finite fld Theoem 9.1. The multiplicative goup F of a finite fld is cyclic. Remak: In paticula, if p is a pime then (Z/p) is cyclic. In fact, this

More information

3.1 Random variables

3.1 Random variables 3 Chapte III Random Vaiables 3 Random vaiables A sample space S may be difficult to descibe if the elements of S ae not numbes discuss how we can use a ule by which an element s of S may be associated

More information

LET a random variable x follows the two - parameter

LET a random variable x follows the two - parameter INTERNATIONAL JOURNAL OF MATHEMATICS AND SCIENTIFIC COMPUTING ISSN: 2231-5330, VOL. 5, NO. 1, 2015 19 Shinkage Bayesian Appoach in Item - Failue Gamma Data In Pesence of Pio Point Guess Value Gyan Pakash

More information

6 Matrix Concentration Bounds

6 Matrix Concentration Bounds 6 Matix Concentation Bounds Concentation bounds ae inequalities that bound pobabilities of deviations by a andom vaiable fom some value, often its mean. Infomally, they show the pobability that a andom

More information

Construction and Analysis of Boolean Functions of 2t + 1 Variables with Maximum Algebraic Immunity

Construction and Analysis of Boolean Functions of 2t + 1 Variables with Maximum Algebraic Immunity Constuction and Analysis of Boolean Functions of 2t + 1 Vaiables with Maximum Algebaic Immunity Na Li and Wen-Feng Qi Depatment of Applied Mathematics, Zhengzhou Infomation Engineeing Univesity, Zhengzhou,

More information

CALCULATING THE NUMBER OF TWIN PRIMES WITH SPECIFIED DISTANCE BETWEEN THEM BASED ON THE SIMPLEST PROBABILISTIC MODEL

CALCULATING THE NUMBER OF TWIN PRIMES WITH SPECIFIED DISTANCE BETWEEN THEM BASED ON THE SIMPLEST PROBABILISTIC MODEL U.P.B. Sci. Bull. Seies A, Vol. 80, Iss.3, 018 ISSN 13-707 CALCULATING THE NUMBER OF TWIN PRIMES WITH SPECIFIED DISTANCE BETWEEN THEM BASED ON THE SIMPLEST PROBABILISTIC MODEL Sasengali ABDYMANAPOV 1,

More information

The Iterated Random Function Problem,

The Iterated Random Function Problem, The Iteated Random Function Poblem, Ritam Bhaumik 1, ilanjan Datta 2, Avijit Dutta 1, icky Mouha 3,4, and Midul andi 1 1 Indian Statistical Institute, Kolkata, India. 2 Indian Institute of Technology,

More information

A Converse to Low-Rank Matrix Completion

A Converse to Low-Rank Matrix Completion A Convese to Low-Rank Matix Completion Daniel L. Pimentel-Alacón, Robet D. Nowak Univesity of Wisconsin-Madison Abstact In many pactical applications, one is given a subset Ω of the enties in a d N data

More information

AQI: Advanced Quantum Information Lecture 2 (Module 4): Order finding and factoring algorithms February 20, 2013

AQI: Advanced Quantum Information Lecture 2 (Module 4): Order finding and factoring algorithms February 20, 2013 AQI: Advanced Quantum Infomation Lectue 2 (Module 4): Ode finding and factoing algoithms Febuay 20, 203 Lectue: D. Mak Tame (email: m.tame@impeial.ac.uk) Intoduction In the last lectue we looked at the

More information

Lecture 28: Convergence of Random Variables and Related Theorems

Lecture 28: Convergence of Random Variables and Related Theorems EE50: Pobability Foundations fo Electical Enginees July-Novembe 205 Lectue 28: Convegence of Random Vaiables and Related Theoems Lectue:. Kishna Jagannathan Scibe: Gopal, Sudhasan, Ajay, Swamy, Kolla An

More information

On the ratio of maximum and minimum degree in maximal intersecting families

On the ratio of maximum and minimum degree in maximal intersecting families On the atio of maximum and minimum degee in maximal intesecting families Zoltán Lóánt Nagy Lale Özkahya Balázs Patkós Máté Vize Septembe 5, 011 Abstact To study how balanced o unbalanced a maximal intesecting

More information

Journal of Inequalities in Pure and Applied Mathematics

Journal of Inequalities in Pure and Applied Mathematics Jounal of Inequalities in Pue and Applied Mathematics COEFFICIENT INEQUALITY FOR A FUNCTION WHOSE DERIVATIVE HAS A POSITIVE REAL PART S. ABRAMOVICH, M. KLARIČIĆ BAKULA AND S. BANIĆ Depatment of Mathematics

More information

On the Poisson Approximation to the Negative Hypergeometric Distribution

On the Poisson Approximation to the Negative Hypergeometric Distribution BULLETIN of the Malaysian Mathematical Sciences Society http://mathusmmy/bulletin Bull Malays Math Sci Soc (2) 34(2) (2011), 331 336 On the Poisson Appoximation to the Negative Hypegeometic Distibution

More information

Overcoming Weak Expectations

Overcoming Weak Expectations Overcoming Weak Expectations Yevgeniy Dodis Yu Yu December 22, 2012 Abstract Recently, there has been renewed interest in basing cryptographic primitives on weak secrets, where the only information about

More information

Goodness-of-fit for composite hypotheses.

Goodness-of-fit for composite hypotheses. Section 11 Goodness-of-fit fo composite hypotheses. Example. Let us conside a Matlab example. Let us geneate 50 obsevations fom N(1, 2): X=nomnd(1,2,50,1); Then, unning a chi-squaed goodness-of-fit test

More information

On the ratio of maximum and minimum degree in maximal intersecting families

On the ratio of maximum and minimum degree in maximal intersecting families On the atio of maximum and minimum degee in maximal intesecting families Zoltán Lóánt Nagy Lale Özkahya Balázs Patkós Máté Vize Mach 6, 013 Abstact To study how balanced o unbalanced a maximal intesecting

More information

Surveillance Points in High Dimensional Spaces

Surveillance Points in High Dimensional Spaces Société de Calcul Mathématique SA Tools fo decision help since 995 Suveillance Points in High Dimensional Spaces by Benad Beauzamy Januay 06 Abstact Let us conside any compute softwae, elying upon a lage

More information

A Multivariate Normal Law for Turing s Formulae

A Multivariate Normal Law for Turing s Formulae A Multivaiate Nomal Law fo Tuing s Fomulae Zhiyi Zhang Depatment of Mathematics and Statistics Univesity of Noth Caolina at Chalotte Chalotte, NC 28223 Abstact This pape establishes a sufficient condition

More information

Pearson s Chi-Square Test Modifications for Comparison of Unweighted and Weighted Histograms and Two Weighted Histograms

Pearson s Chi-Square Test Modifications for Comparison of Unweighted and Weighted Histograms and Two Weighted Histograms Peason s Chi-Squae Test Modifications fo Compaison of Unweighted and Weighted Histogams and Two Weighted Histogams Univesity of Akueyi, Bogi, v/noduslód, IS-6 Akueyi, Iceland E-mail: nikolai@unak.is Two

More information

Multiple Criteria Secretary Problem: A New Approach

Multiple Criteria Secretary Problem: A New Approach J. Stat. Appl. Po. 3, o., 9-38 (04 9 Jounal of Statistics Applications & Pobability An Intenational Jounal http://dx.doi.og/0.785/jsap/0303 Multiple Citeia Secetay Poblem: A ew Appoach Alaka Padhye, and

More information

An Application of Fuzzy Linear System of Equations in Economic Sciences

An Application of Fuzzy Linear System of Equations in Economic Sciences Austalian Jounal of Basic and Applied Sciences, 5(7): 7-14, 2011 ISSN 1991-8178 An Application of Fuzzy Linea System of Equations in Economic Sciences 1 S.H. Nassei, 2 M. Abdi and 3 B. Khabii 1 Depatment

More information

Alternative Tests for the Poisson Distribution

Alternative Tests for the Poisson Distribution Chiang Mai J Sci 015; 4() : 774-78 http://epgsciencecmuacth/ejounal/ Contibuted Pape Altenative Tests fo the Poisson Distibution Manad Khamkong*[a] and Pachitjianut Siipanich [b] [a] Depatment of Statistics,

More information

Chem 453/544 Fall /08/03. Exam #1 Solutions

Chem 453/544 Fall /08/03. Exam #1 Solutions Chem 453/544 Fall 3 /8/3 Exam # Solutions. ( points) Use the genealized compessibility diagam povided on the last page to estimate ove what ange of pessues A at oom tempeatue confoms to the ideal gas law

More information

Functions Defined on Fuzzy Real Numbers According to Zadeh s Extension

Functions Defined on Fuzzy Real Numbers According to Zadeh s Extension Intenational Mathematical Foum, 3, 2008, no. 16, 763-776 Functions Defined on Fuzzy Real Numbes Accoding to Zadeh s Extension Oma A. AbuAaqob, Nabil T. Shawagfeh and Oma A. AbuGhneim 1 Mathematics Depatment,

More information

Method for Approximating Irrational Numbers

Method for Approximating Irrational Numbers Method fo Appoximating Iational Numbes Eic Reichwein Depatment of Physics Univesity of Califonia, Santa Cuz June 6, 0 Abstact I will put foth an algoithm fo poducing inceasingly accuate ational appoximations

More information

ST 501 Course: Fundamentals of Statistical Inference I. Sujit K. Ghosh.

ST 501 Course: Fundamentals of Statistical Inference I. Sujit K. Ghosh. ST 501 Couse: Fundamentals of Statistical Infeence I Sujit K. Ghosh sujit.ghosh@ncsu.edu Pesented at: 2229 SAS Hall, Depatment of Statistics, NC State Univesity http://www.stat.ncsu.edu/people/ghosh/couses/st501/

More information

JENSEN S INEQUALITY FOR DISTRIBUTIONS POSSESSING HIGHER MOMENTS, WITH APPLICATION TO SHARP BOUNDS FOR LAPLACE-STIELTJES TRANSFORMS

JENSEN S INEQUALITY FOR DISTRIBUTIONS POSSESSING HIGHER MOMENTS, WITH APPLICATION TO SHARP BOUNDS FOR LAPLACE-STIELTJES TRANSFORMS J. Austal. Math. Soc. Se. B 40(1998), 80 85 JENSEN S INEQUALITY FO DISTIBUTIONS POSSESSING HIGHE MOMENTS, WITH APPLICATION TO SHAP BOUNDS FO LAPLACE-STIELTJES TANSFOMS B. GULJAŠ 1,C.E.M.PEACE 2 and J.

More information

Relating Branching Program Size and. Formula Size over the Full Binary Basis. FB Informatik, LS II, Univ. Dortmund, Dortmund, Germany

Relating Branching Program Size and. Formula Size over the Full Binary Basis. FB Informatik, LS II, Univ. Dortmund, Dortmund, Germany Relating Banching Pogam Size and omula Size ove the ull Binay Basis Matin Saueho y Ingo Wegene y Ralph Wechne z y B Infomatik, LS II, Univ. Dotmund, 44 Dotmund, Gemany z ankfut, Gemany sauehof/wegene@ls.cs.uni-dotmund.de

More information

Gradient-based Neural Network for Online Solution of Lyapunov Matrix Equation with Li Activation Function

Gradient-based Neural Network for Online Solution of Lyapunov Matrix Equation with Li Activation Function Intenational Confeence on Infomation echnology and Management Innovation (ICIMI 05) Gadient-based Neual Netwok fo Online Solution of Lyapunov Matix Equation with Li Activation unction Shiheng Wang, Shidong

More information

The Substring Search Problem

The Substring Search Problem The Substing Seach Poblem One algoithm which is used in a vaiety of applications is the family of substing seach algoithms. These algoithms allow a use to detemine if, given two chaacte stings, one is

More information

Deterministic vs Non-deterministic Graph Property Testing

Deterministic vs Non-deterministic Graph Property Testing Deteministic vs Non-deteministic Gaph Popety Testing Lio Gishboline Asaf Shapia Abstact A gaph popety P is said to be testable if one can check whethe a gaph is close o fa fom satisfying P using few andom

More information

Unobserved Correlation in Ascending Auctions: Example And Extensions

Unobserved Correlation in Ascending Auctions: Example And Extensions Unobseved Coelation in Ascending Auctions: Example And Extensions Daniel Quint Univesity of Wisconsin Novembe 2009 Intoduction In pivate-value ascending auctions, the winning bidde s willingness to pay

More information

Moment-free numerical approximation of highly oscillatory integrals with stationary points

Moment-free numerical approximation of highly oscillatory integrals with stationary points Moment-fee numeical appoximation of highly oscillatoy integals with stationay points Sheehan Olve Abstact We pesent a method fo the numeical quadatue of highly oscillatoy integals with stationay points.

More information

Using Laplace Transform to Evaluate Improper Integrals Chii-Huei Yu

Using Laplace Transform to Evaluate Improper Integrals Chii-Huei Yu Available at https://edupediapublicationsog/jounals Volume 3 Issue 4 Febuay 216 Using Laplace Tansfom to Evaluate Impope Integals Chii-Huei Yu Depatment of Infomation Technology, Nan Jeon Univesity of

More information

Central Coverage Bayes Prediction Intervals for the Generalized Pareto Distribution

Central Coverage Bayes Prediction Intervals for the Generalized Pareto Distribution Statistics Reseach Lettes Vol. Iss., Novembe Cental Coveage Bayes Pediction Intevals fo the Genealized Paeto Distibution Gyan Pakash Depatment of Community Medicine S. N. Medical College, Aga, U. P., India

More information

COLLAPSING WALLS THEOREM

COLLAPSING WALLS THEOREM COLLAPSING WALLS THEOREM IGOR PAK AND ROM PINCHASI Abstact. Let P R 3 be a pyamid with the base a convex polygon Q. We show that when othe faces ae collapsed (otated aound the edges onto the plane spanned

More information

arxiv: v1 [math.co] 1 Apr 2011

arxiv: v1 [math.co] 1 Apr 2011 Weight enumeation of codes fom finite spaces Relinde Juius Octobe 23, 2018 axiv:1104.0172v1 [math.co] 1 Ap 2011 Abstact We study the genealized and extended weight enumeato of the - ay Simplex code and

More information

ANA BERRIZBEITIA, LUIS A. MEDINA, ALEXANDER C. MOLL, VICTOR H. MOLL, AND LAINE NOBLE

ANA BERRIZBEITIA, LUIS A. MEDINA, ALEXANDER C. MOLL, VICTOR H. MOLL, AND LAINE NOBLE THE p-adic VALUATION OF STIRLING NUMBERS ANA BERRIZBEITIA, LUIS A. MEDINA, ALEXANDER C. MOLL, VICTOR H. MOLL, AND LAINE NOBLE Abstact. Let p > 2 be a pime. The p-adic valuation of Stiling numbes of the

More information

arxiv: v1 [math.co] 4 May 2017

arxiv: v1 [math.co] 4 May 2017 On The Numbe Of Unlabeled Bipatite Gaphs Abdullah Atmaca and A Yavuz Ouç axiv:7050800v [mathco] 4 May 207 Abstact This pape solves a poblem that was stated by M A Haison in 973 [] This poblem, that has

More information

Application of Parseval s Theorem on Evaluating Some Definite Integrals

Application of Parseval s Theorem on Evaluating Some Definite Integrals Tukish Jounal of Analysis and Numbe Theoy, 4, Vol., No., -5 Available online at http://pubs.sciepub.com/tjant/// Science and Education Publishing DOI:.69/tjant--- Application of Paseval s Theoem on Evaluating

More information

arxiv: v2 [astro-ph] 16 May 2008

arxiv: v2 [astro-ph] 16 May 2008 New Anomalies in Cosmic Micowave Backgound Anisotopy: Violation of the Isotopic Gaussian Hypothesis in Low-l Modes Shi Chun, Su and M.-C., Chu Depatment of Physics and Institute of Theoetical Physics,

More information

E E E. Aggelos Kiayias. Cryptography. Primitives and Protocols. Based on notes by S. Pehlivanoglu, J. Todd, K. Samari, T. Zacharias and H.S.

E E E. Aggelos Kiayias. Cryptography. Primitives and Protocols. Based on notes by S. Pehlivanoglu, J. Todd, K. Samari, T. Zacharias and H.S. P1 P2 P3 E E E IV C1 C2 C3 Aggelos Kiayias Cyptogaphy Pimitives and Potocols Based on notes by S. Pehlivanoglu, J. Todd, K. Samai, T. Zachaias and H.S. Zhou CONTENTS 1 Contents 1 Intoduction 4 1.1 Flipping

More information

A pathway to matrix-variate gamma and normal densities

A pathway to matrix-variate gamma and normal densities Linea Algeba and its Applications 396 005 317 38 www.elsevie.com/locate/laa A pathway to matix-vaiate gamma and nomal densities A.M. Mathai Depatment of Mathematics and Statistics, McGill Univesity, 805

More information

Likelihood vs. Information in Aligning Biopolymer Sequences. UCSD Technical Report CS Timothy L. Bailey

Likelihood vs. Information in Aligning Biopolymer Sequences. UCSD Technical Report CS Timothy L. Bailey Likelihood vs. Infomation in Aligning Biopolyme Sequences UCSD Technical Repot CS93-318 Timothy L. Bailey Depatment of Compute Science and Engineeing Univesity of Califonia, San Diego 1 Febuay, 1993 ABSTRACT:

More information

Cryptography. Primitives and Protocols. Aggelos Kiayias

Cryptography. Primitives and Protocols. Aggelos Kiayias P1 P2 P3 E E E IV C1 C2 C3 Aggelos Kiayias Cyptogaphy Pimitives and Potocols Based on notes by G. Panagiotakos, S. Pehlivanoglu, J. Todd, K. Samai, T. Zachaias and H.S. Zhou CONTENTS 1 Contents 1 Intoduction

More information

Key Establishment Protocols. Cryptography CS 507 Erkay Savas Sabanci University

Key Establishment Protocols. Cryptography CS 507 Erkay Savas Sabanci University Key Establishment Potocols Cyptogaphy CS 507 Ekay Savas Sabanci Univesity ekays@sabanciuniv.edu Key distibution poblem Secuity of the keys Even if the cyptogaphic algoithms & potocols ae cyptogaphically

More information

Analytical Solutions for Confined Aquifers with non constant Pumping using Computer Algebra

Analytical Solutions for Confined Aquifers with non constant Pumping using Computer Algebra Poceedings of the 006 IASME/SEAS Int. Conf. on ate Resouces, Hydaulics & Hydology, Chalkida, Geece, May -3, 006 (pp7-) Analytical Solutions fo Confined Aquifes with non constant Pumping using Compute Algeba

More information

Hypothesis Test and Confidence Interval for the Negative Binomial Distribution via Coincidence: A Case for Rare Events

Hypothesis Test and Confidence Interval for the Negative Binomial Distribution via Coincidence: A Case for Rare Events Intenational Jounal of Contempoay Mathematical Sciences Vol. 12, 2017, no. 5, 243-253 HIKARI Ltd, www.m-hikai.com https://doi.og/10.12988/ijcms.2017.7728 Hypothesis Test and Confidence Inteval fo the Negative

More information

ON THE INVERSE SIGNED TOTAL DOMINATION NUMBER IN GRAPHS. D.A. Mojdeh and B. Samadi

ON THE INVERSE SIGNED TOTAL DOMINATION NUMBER IN GRAPHS. D.A. Mojdeh and B. Samadi Opuscula Math. 37, no. 3 (017), 447 456 http://dx.doi.og/10.7494/opmath.017.37.3.447 Opuscula Mathematica ON THE INVERSE SIGNED TOTAL DOMINATION NUMBER IN GRAPHS D.A. Mojdeh and B. Samadi Communicated

More information

Do Managers Do Good With Other People s Money? Online Appendix

Do Managers Do Good With Other People s Money? Online Appendix Do Manages Do Good With Othe People s Money? Online Appendix Ing-Haw Cheng Haison Hong Kelly Shue Abstact This is the Online Appendix fo Cheng, Hong and Shue 2013) containing details of the model. Datmouth

More information

Identification of the degradation of railway ballast under a concrete sleeper

Identification of the degradation of railway ballast under a concrete sleeper Identification of the degadation of ailway ballast unde a concete sleepe Qin Hu 1) and Heung Fai Lam ) 1), ) Depatment of Civil and Achitectual Engineeing, City Univesity of Hong Kong, Hong Kong SAR, China.

More information

Rate Splitting is Approximately Optimal for Fading Gaussian Interference Channels

Rate Splitting is Approximately Optimal for Fading Gaussian Interference Channels Rate Splitting is Appoximately Optimal fo Fading Gaussian Intefeence Channels Joyson Sebastian, Can Kaakus, Suhas Diggavi, I-Hsiang Wang Abstact In this pape, we study the -use Gaussian intefeence-channel

More information

On the Quasi-inverse of a Non-square Matrix: An Infinite Solution

On the Quasi-inverse of a Non-square Matrix: An Infinite Solution Applied Mathematical Sciences, Vol 11, 2017, no 27, 1337-1351 HIKARI Ltd, wwwm-hikaicom https://doiog/1012988/ams20177273 On the Quasi-invese of a Non-squae Matix: An Infinite Solution Ruben D Codeo J

More information

Vanishing lines in generalized Adams spectral sequences are generic

Vanishing lines in generalized Adams spectral sequences are generic ISSN 364-0380 (on line) 465-3060 (pinted) 55 Geomety & Topology Volume 3 (999) 55 65 Published: 2 July 999 G G G G T T T G T T T G T G T GG TT G G G G GG T T T TT Vanishing lines in genealized Adams spectal

More information

Conservative Averaging Method and its Application for One Heat Conduction Problem

Conservative Averaging Method and its Application for One Heat Conduction Problem Poceedings of the 4th WSEAS Int. Conf. on HEAT TRANSFER THERMAL ENGINEERING and ENVIRONMENT Elounda Geece August - 6 (pp6-) Consevative Aveaging Method and its Application fo One Heat Conduction Poblem

More information

KOEBE DOMAINS FOR THE CLASSES OF FUNCTIONS WITH RANGES INCLUDED IN GIVEN SETS

KOEBE DOMAINS FOR THE CLASSES OF FUNCTIONS WITH RANGES INCLUDED IN GIVEN SETS Jounal of Applied Analysis Vol. 14, No. 1 2008), pp. 43 52 KOEBE DOMAINS FOR THE CLASSES OF FUNCTIONS WITH RANGES INCLUDED IN GIVEN SETS L. KOCZAN and P. ZAPRAWA Received Mach 12, 2007 and, in evised fom,

More information

Hua Xu 3 and Hiroaki Mukaidani 33. The University of Tsukuba, Otsuka. Hiroshima City University, 3-4-1, Ozuka-Higashi

Hua Xu 3 and Hiroaki Mukaidani 33. The University of Tsukuba, Otsuka. Hiroshima City University, 3-4-1, Ozuka-Higashi he inea Quadatic Dynamic Game fo Discete-ime Descipto Systems Hua Xu 3 and Hioai Muaidani 33 3 Gaduate School of Systems Management he Univesity of suuba, 3-9- Otsua Bunyo-u, oyo -0, Japan xuhua@gssm.otsua.tsuuba.ac.jp

More information

A NEW VARIABLE STIFFNESS SPRING USING A PRESTRESSED MECHANISM

A NEW VARIABLE STIFFNESS SPRING USING A PRESTRESSED MECHANISM Poceedings of the ASME 2010 Intenational Design Engineeing Technical Confeences & Computes and Infomation in Engineeing Confeence IDETC/CIE 2010 August 15-18, 2010, Monteal, Quebec, Canada DETC2010-28496

More information

CSCE 478/878 Lecture 4: Experimental Design and Analysis. Stephen Scott. 3 Building a tree on the training set Introduction. Outline.

CSCE 478/878 Lecture 4: Experimental Design and Analysis. Stephen Scott. 3 Building a tree on the training set Introduction. Outline. In Homewok, you ae (supposedly) Choosing a data set 2 Extacting a test set of size > 3 3 Building a tee on the taining set 4 Testing on the test set 5 Repoting the accuacy (Adapted fom Ethem Alpaydin and

More information

Concurrent Blind Signatures without Random Oracles

Concurrent Blind Signatures without Random Oracles Concuent Blind Signatues without Random Oacles Aggelos Kiayias Hong-Sheng Zhou Abstact We pesent a blind signatue scheme that is efficient and povably secue without andom oacles unde concuent attacks utilizing

More information

On decompositions of complete multipartite graphs into the union of two even cycles

On decompositions of complete multipartite graphs into the union of two even cycles On decompositions of complete multipatite gaphs into the union of two even cycles A. Su, J. Buchanan, R. C. Bunge, S. I. El-Zanati, E. Pelttai, G. Rasmuson, E. Spaks, S. Tagais Depatment of Mathematics

More information

16 Modeling a Language by a Markov Process

16 Modeling a Language by a Markov Process K. Pommeening, Language Statistics 80 16 Modeling a Language by a Makov Pocess Fo deiving theoetical esults a common model of language is the intepetation of texts as esults of Makov pocesses. This model

More information

E E E. Aggelos Kiayias. Cryptography. Primitives and Protocols. Notes by S. Pehlivanoglu, J. Todd, and H.S. Zhou

E E E. Aggelos Kiayias. Cryptography. Primitives and Protocols. Notes by S. Pehlivanoglu, J. Todd, and H.S. Zhou P1 P2 P3 E E E IV C1 C2 C3 Aggelos Kiayias Cyptogaphy Pimitives and Potocols Notes by S. Pehlivanoglu, J. Todd, and H.S. Zhou CONTENTS 1 Contents 2 1 Intoduction To begin discussing the basic popeties

More information

Encapsulation theory: the transformation equations of absolute information hiding.

Encapsulation theory: the transformation equations of absolute information hiding. 1 Encapsulation theoy: the tansfomation equations of absolute infomation hiding. Edmund Kiwan * www.edmundkiwan.com Abstact This pape descibes how the potential coupling of a set vaies as the set is tansfomed,

More information

Measure Estimates of Nodal Sets of Polyharmonic Functions

Measure Estimates of Nodal Sets of Polyharmonic Functions Chin. Ann. Math. Se. B 39(5), 08, 97 93 DOI: 0.007/s40-08-004-6 Chinese Annals of Mathematics, Seies B c The Editoial Office of CAM and Spinge-Velag Belin Heidelbeg 08 Measue Estimates of Nodal Sets of

More information

Utility Estimation and Preference Aggregation under Uncertainty by Maximum Entropy Inference

Utility Estimation and Preference Aggregation under Uncertainty by Maximum Entropy Inference Utility Estimation and Pefeence Aggegation unde Uncetainty by Maximum Entopy Infeence Andé Ahua FenUnivesität in Hagen D-5884 Hagen ande.ahua@fenuni-hagen.de ABSTRACT. This pape deals with the poblem how

More information

International Journal of Mathematical Archive-3(12), 2012, Available online through ISSN

International Journal of Mathematical Archive-3(12), 2012, Available online through  ISSN Intenational Jounal of Mathematical Achive-3(), 0, 480-4805 Available online though www.ijma.info ISSN 9 504 STATISTICAL QUALITY CONTROL OF MULTI-ITEM EOQ MOEL WITH VARYING LEAING TIME VIA LAGRANGE METHO

More information

Weighted least-squares estimators of parametric functions of the regression coefficients under a general linear model

Weighted least-squares estimators of parametric functions of the regression coefficients under a general linear model Ann Inst Stat Math (2010) 62:929 941 DOI 10.1007/s10463-008-0199-8 Weighted least-squaes estimatos of paametic functions of the egession coefficients unde a geneal linea model Yongge Tian Received: 9 Januay

More information

Exploration of the three-person duel

Exploration of the three-person duel Exploation of the thee-peson duel Andy Paish 15 August 2006 1 The duel Pictue a duel: two shootes facing one anothe, taking tuns fiing at one anothe, each with a fixed pobability of hitting his opponent.

More information

Fractional Zero Forcing via Three-color Forcing Games

Fractional Zero Forcing via Three-color Forcing Games Factional Zeo Focing via Thee-colo Focing Games Leslie Hogben Kevin F. Palmowski David E. Robeson Michael Young May 13, 2015 Abstact An -fold analogue of the positive semidefinite zeo focing pocess that

More information

Bounds on the performance of back-to-front airplane boarding policies

Bounds on the performance of back-to-front airplane boarding policies Bounds on the pefomance of bac-to-font aiplane boading policies Eitan Bachmat Michael Elin Abstact We povide bounds on the pefomance of bac-to-font aiplane boading policies. In paticula, we show that no

More information

Temporal-Difference Learning

Temporal-Difference Learning .997 Decision-Making in Lage-Scale Systems Mach 17 MIT, Sping 004 Handout #17 Lectue Note 13 1 Tempoal-Diffeence Leaning We now conside the poblem of computing an appopiate paamete, so that, given an appoximation

More information

Solution to HW 3, Ma 1a Fall 2016

Solution to HW 3, Ma 1a Fall 2016 Solution to HW 3, Ma a Fall 206 Section 2. Execise 2: Let C be a subset of the eal numbes consisting of those eal numbes x having the popety that evey digit in the decimal expansion of x is, 3, 5, o 7.

More information

MEASURES OF BLOCK DESIGN EFFICIENCY RECOVERING INTERBLOCK INFORMATION

MEASURES OF BLOCK DESIGN EFFICIENCY RECOVERING INTERBLOCK INFORMATION MEASURES OF BLOCK DESIGN EFFICIENCY RECOVERING INTERBLOCK INFORMATION Walte T. Fedee 337 Waen Hall, Biometics Unit Conell Univesity Ithaca, NY 4853 and Tey P. Speed Division of Mathematics & Statistics,

More information

A new approach in classical electrodynamics to protect principle of causality

A new approach in classical electrodynamics to protect principle of causality A new appoach in classical electodynamics to potect pinciple of causality Biswaanjan Dikshit * Lase and Plasma Technology Division Bhabha Atomic Reseach Cente, Mumbai-400085 INDIA * Coesponding autho E-mail:

More information

Syntactical content of nite approximations of partial algebras 1 Wiktor Bartol Inst. Matematyki, Uniw. Warszawski, Warszawa (Poland)

Syntactical content of nite approximations of partial algebras 1 Wiktor Bartol Inst. Matematyki, Uniw. Warszawski, Warszawa (Poland) Syntactical content of nite appoximations of patial algebas 1 Wikto Batol Inst. Matematyki, Uniw. Waszawski, 02-097 Waszawa (Poland) batol@mimuw.edu.pl Xavie Caicedo Dep. Matematicas, Univ. de los Andes,

More information

On a quantity that is analogous to potential and a theorem that relates to it

On a quantity that is analogous to potential and a theorem that relates to it Su une quantité analogue au potential et su un théoème y elatif C R Acad Sci 7 (87) 34-39 On a quantity that is analogous to potential and a theoem that elates to it By R CLAUSIUS Tanslated by D H Delphenich

More information

Research Article On Alzer and Qiu s Conjecture for Complete Elliptic Integral and Inverse Hyperbolic Tangent Function

Research Article On Alzer and Qiu s Conjecture for Complete Elliptic Integral and Inverse Hyperbolic Tangent Function Abstact and Applied Analysis Volume 011, Aticle ID 697547, 7 pages doi:10.1155/011/697547 Reseach Aticle On Alze and Qiu s Conjectue fo Complete Elliptic Integal and Invese Hypebolic Tangent Function Yu-Ming

More information

Asymptotically Lacunary Statistical Equivalent Sequence Spaces Defined by Ideal Convergence and an Orlicz Function

Asymptotically Lacunary Statistical Equivalent Sequence Spaces Defined by Ideal Convergence and an Orlicz Function "Science Stays Tue Hee" Jounal of Mathematics and Statistical Science, 335-35 Science Signpost Publishing Asymptotically Lacunay Statistical Equivalent Sequence Spaces Defined by Ideal Convegence and an

More information

FUSE Fusion Utility Sequence Estimator

FUSE Fusion Utility Sequence Estimator FUSE Fusion Utility Sequence Estimato Belu V. Dasaathy Dynetics, Inc. P. O. Box 5500 Huntsville, AL 3584-5500 belu.d@dynetics.com Sean D. Townsend Dynetics, Inc. P. O. Box 5500 Huntsville, AL 3584-5500

More information

Math 301: The Erdős-Stone-Simonovitz Theorem and Extremal Numbers for Bipartite Graphs

Math 301: The Erdős-Stone-Simonovitz Theorem and Extremal Numbers for Bipartite Graphs Math 30: The Edős-Stone-Simonovitz Theoem and Extemal Numbes fo Bipatite Gaphs May Radcliffe The Edős-Stone-Simonovitz Theoem Recall, in class we poved Tuán s Gaph Theoem, namely Theoem Tuán s Theoem Let

More information

1) (A B) = A B ( ) 2) A B = A. i) A A = φ i j. ii) Additional Important Properties of Sets. De Morgan s Theorems :

1) (A B) = A B ( ) 2) A B = A. i) A A = φ i j. ii) Additional Important Properties of Sets. De Morgan s Theorems : Additional Impotant Popeties of Sets De Mogan s Theoems : A A S S Φ, Φ S _ ( A ) A ) (A B) A B ( ) 2) A B A B Cadinality of A, A, is defined as the numbe of elements in the set A. {a,b,c} 3, { }, while

More information