arxiv: v1 [cs.cr] 24 Jan 2019

Size: px
Start display at page:

Download "arxiv: v1 [cs.cr] 24 Jan 2019"

Transcription

1 A Descrpton and Proof of a Generalsed and Optmsed Varant of Wkström s Mxnet Thomas Hanes arxv: v [cs.cr] 24 Jan 209 Introducton Polyas GmbH In ths paper, we descrbe an optmsed varant of Wkström s mxnet whch shuffles vectors of ElGamal cphertexts n parallel. We then show n detal that ths constructon s secure. A verfable shuffle takes a packet of cphertexts, whch t re-encrypts and shuffles to produce an output packet. More specfcally, a cryptographc shuffle of ElGamal encryptons e=e,...,e ) s another lst of ElGamal encryptons e =e,...,e ), whch contans the same plantexts m n permuted order. Gven e and e we may wsh to prove that they have ths relatonshp, ths called a proof of shuffle. Wkström s verfable mxnet as we refer to t here was frst presented n Proofs of Restrcted Shuffles by Terelus and Wkström[2], buldng on Wkström s prevous work n [3]. Specfcally we take the optmsed varant for ElGamal whch appears to be n common use; for nstance, t s presented n Haenn et al s pseudo-code algorthms for mplementng Wkström s verfable mxnet []. We extend the mxnet to support parallel shuffles, where each e and e are themselves vectors of related cphertexts. The possblty of dong ths s proven by the Wkström s result but we wsh to show that ths partcular nstance wth ts optmsatons s secure.) 2 otaton G q s a cyclc group of prme order q n whch both the decsonal and computatonal Dffe-Hellman problems are hard. We wll use the multplcatve notaton for the group operaton. As usually, byz q we denote the feld of ntegers modulo q. A s the set of vectors of length contanng elements of A. We wll denote vectors n bold, for nstance a. We wll denote the th element usng subscrpt; for nstance as a. Smlarly, A s the set of square matrces of order contanng elements of A. We wll denote matrces usng upper case letters, for nstance M. We wll denote the th column of M as M and the element th row and th column as M,. A matrx M, contanng only 0 and values, s a permutaton matrx, f every column and every row contans exactly one.

2 PC h,h m,r), for m,r Z q and h,h G q, s defned as h r h m note that h and h are group elements and hence the multplcaton here denotes the group multplcaton). PC h,h m,r) s known as a Pedersen commtment. EPC h,h,...,h m,r), for m Z q and r Z q, s defned as h r = hm otherwse known as an extended Pedersen commtment). C h,h,...,h M,r), for M Z q and r Z q, s c,...,c n ) where c = h r = hm,, whch means that c s the extended Pedersen commtment to the th column of M. Enc g,pk m,r) for m G q and r Z q sg r, pk r m) the ElGamal encrypton of the group element m) ReEnc g,pk e,r), for e G 2 q and r Z q se g r,e 2 pk r ). Enc g,pk m,r), for m G w q and r Z w q, s Enc g,pk m,r ),...,Enc g,pk m w,r w ) ReEnc g,pk e,r), for e G 2 q) w and r Z w q, s ReEnc g,pk e,r ),...,ReEnc g,pk e w,r w ) a,b, for a Z q and b Z q s = a b mod q. AB, for A Z n m q and B Z m w q th column s equal m k= A,kB k,, s a matrx nz n w where the value n the th row and Mx, for M Zq M and x Z q, s a vector of length M where th poston s equal to = M, x. ote that both ths and the next defnton are consstent wth treatng x as a column, and row vector respectvely, and applyng the defnton of matrx multplcaton defnton from above. xm, for M Z M q and x Z q, s a vector of length M where the th poston s equal to = x M,. ax, for a Z q and x Z q, s a vector of length where th poston s equal to ax. x a, for a Z q and x Z q, s a vector of length where th poston s equal to x a. For two vectors x,y Z q we some sometmes abuse notaton by wrtng x+y, x y, and x y to denote the parwse addton, multplcaton, and exponentaton of the vectors respectvely. For a matrx M, by π M we denote the permutaton of the set {,...,} defned by M, that s such a permutaton that for each vector x we have x=y π),...,y π) ), where y=mx. A bnary relaton R for a set statements of S and wtnesses W s a subset of the cartesan product of S and W. For two bnary relatons R and R, we denote by R R a relaton betweens S ) and W W ) the cartesan product of the statements and wtness of R and R. The relaton s sad to hold when both the subrelatons hold. For two bnary relatons R and R, we denote by R R a relaton betweens S ) and W W ). The relaton s sad to hold when ether subrelatons holds. For two bnary relatons R and R where W = W, we denote by R R a relaton between S S ) and W). The relaton s sad to hold when both the subrelatons hold. We wll abuse notaton by wrtng R R when W W but are both cartesan products wth subgroups n common. 2 q

3 3 Shuffle Proof - Descrpton and Proof Algorthm : Interactve ZK-Proof of Extended Shuffle Common Input :A group generator g G q, publc key pk G q, matrx commtment c G q, commtment parameters h,h,...,h G q, cphertext vectors e,...,e G 2 q) w and e,...,e G2 q) w. Prvate Input :Permutaton matrx M Zq, randomness r Z q and randomness R Zw q, such that c= C h,h,...,h M,r) and e = ReEnc g,pke πm ),R πm )). V chooses u Z q randomly and hands u to P. 2 P computes u = Mu. Then P chooses ˆr Z q at random and computes r = r + + r, r= r,u, ) r = ˆr + ˆr u, r = Ru = =+ P randomly chooses ˆω, ω Z q, ω,ω 2,ω 3 Z q, and ω 4 Z w q, and hands the followng values to V: ĉ 0 = h, ĉ = hˆr ĉ u {,...,}) t = h ω t 2 = h ω 2 t 3 = h ω 3 = hω t 4 = ReEnc g,pk = e ω, ω 4 ) ˆt = h ˆω ĉ ω {,...,}) 3 V chooses a challenge c Z q at random and sends t to P. 4 P then responds, s = ω + c r s 2 = ω 2 + c r s 3 = ω 3 + c r s 4 = ω 4 + c r ŝ= ˆω+ c ˆr s = ω + c u 5 V accepts f and only f t = = c / = h ) c h s t 2 =ĉ /h = u ) c h s 2 t 3 = = cu ) c h s 3 = hs t 4 = ReEnc g,pk = eu ) c = e s, s 4 ) ˆt = ĉ c hŝĉ s 3

4 Formal Securty Statement In the securty statement for the presented shuffle algorthm, we wll use the followng notaton. R com h,h,...,h )m,r,m,r ) s a relatonshp between the commtment parameters h,h,...,h ) andm,m Z q r,r Z q ) whch holds f and only f EPCm,r) = EPCm,r ) and m m. R π h,h,...,h,c)m,r) s the relatonshp between the commtment parametersh,h,...,h ), a commtment c G q, a permutaton matrx M Z q, and r Z q whch holds f C h,h,...,h M,r)=c. R shu f ReEnc g,pk g, pk,e,...,e ),e,...,e ))π M,r,...,r )), where π M s a permutaton of the set {,... }, s the relaton whch holds f an only f e = ReEnc g,pke πm ),r π M ) ). Proposton. Algorthm 2 s a perfectly complete, sound, and statstcal honest verfer zero-knowledge 4-message proof of the relatonshp R com R π R shu f ReEnc g,pk ). Snce t s nfeasble under the dscrete logarthm assumpton to fnd a par satsfyng R com. Thus, the proposton computatonally mples a proof of knowledge of R π R shu f ReEnc g,pk. That s for a statementh,h,...,h,c,g, pk,e,...,e ),e,...,e )) we can extract a wtness M,r,r,...,r )) such that R πh,h,...,h,c)m,r) and R shu f ReEnc g,pk g, pk,e,...,e ),e,...,e )) π M,r,...,r )), unless we fnd a dscrete log. To prove the proposton, one needs to show the correctness, the zero-knowledge, and the soundness propertes. For completeness of the presentaton, we demonstrate those propertes n the followng subsectons. Zero-knowledge The honest-verfer zero-knowledge smulator chooses ĉ,...,ĉ G q, ŝ,s,u Z q, s 4 Z w q, and s,s 2,s 3,c Z q randomly and defnes t,t 2,t 3,t 4,,ˆt by the equatons n step fve. We can observer that the statstcal dstance between a real and a smulated transcrpt s neglgble n q: u are dstrbuted unformly n Z q n both. ĉ,...,ĉ are dstrbuted unformly n both transcrpts. In the smulated one, t s easly seen by constructon. In the real transcrpt ĉ = gˆrĉ u, where ˆr R Z q, whch randomly dstrbutes them n G q as well. The challenge c s unformly dstrbuted n both In both transcrpts, S = s,s 2,s 3,s 4,ŝ,s are dstrbuted unformly n ther domans by ther defntons n the smulated transcrpt t s readly vsble; n the real transcrpt, t s because ω s are dstrbuted unformly). In both transcrpts, the above values determne the values of t,t 2,t 3,t 4,ˆt by the equatons of Step 5. 4

5 Correctness We wll now show the above protocol s correct, whch means that n an honest run, the verfer accepts the proof. We frst show the shape of honest ĉ. ĉ = hˆr h u by defnton of ĉ and ĉ 0 ĉ 2 = hˆr 2 c u 2 by defnton of ĉ 2 ĉ 2 = hˆr 2 hˆr h u )u 2 by defnton of ĉ ĉ 2 = hˆr 2+ˆr u 2 h u u 2 by algebrac manpulaton ĉ 2 = hˆr 2+ 2 = ˆr 2 =+ u h 2 = u by algebrac manpulaton ow we wll contnue by nducton: ĉ α = hˆrα ĉ u α α ĉ α = hˆr α hˆr α + α 2 = ˆr α =+ u h α = u by defnton of ĉ α ) u α by defnton of ĉ α nd. hypothess) ĉ α = hˆr α h α = ˆr α =+ u h α = u by algebrac manpulaton ĉ α = hˆr α+ α = ˆr α =+ u h α = u by algebrac manpulaton ow on to the man thng. ote that n the followng, we use the fact that c s a commtment to a permutaton matrx M and we wll use the defnton of a permutaton matrx). h = r = = c / h / = = t? = = c / h ω? = h ω? = = = h ) c? = h c r c / c / h ) c? = h c = r h c = r = h c = r = = = h ) c h s verfcaton defnton Step 5) h ) c h s by defnton of t h ) c h ω +c r by defnton of s by algebrac manpulaton by defnton of c and r by algebrac manpulaton 5

6 t 2? =ĉ /h = u ) c h s 2 verfcaton defnton h ω 2 h ω 2? =ĉ /h = u ) c h s 2 by defnton of t 2? =ĉ /h = u ) c h ω 2+c r by defnton of s 2 ĉ /h = u ) c? = h c r by algebrac manpulaton hˆr + = ˆr =+ u h = u /h = u ) c? = h c r by the propertes of ĉ h c ˆr + = ˆr =+ u )? = h c r by algebrac manpulaton and defnton of u h c ˆr + = ˆr =+ u ) = h c ˆr + = ˆr =+ u ) by defnton r = = = h ω 3 = h ω 3? t 3 = c u ) c h s 3 = h ω h ω = c u =? =? = c u = c u = ) c? = h c r = ) c h s 3 = = h s ) c h ω 3+c r h c u EPCM,r ) u ) c? = EPCc u,c r) Verfcaton defnton h s By defnton of t 3 = EPCM,r ) u ) c? = EPCc u,c r,u ) EPCu M,r,u )) c? = EPCc u,c r,u ) EPCMu, r,u )) c? = EPCc u,c r,u ) EPCc Mu,c r,u )? = EPCc u,c r,u ) h ω +c u By defnton of s 3 and s By algebrac manpulaton By defnton of c By defnton of r By algebrac manpulaton By algebrac manpulaton By algebrac manpulaton EPCc Mu,c r,u )=EPCc Mu,c r,u ) By defnton u 6

7 ReEnc = = =? t 4 = ReEnc e u ) c = e ω, ω 4 )? = ReEnc e ω Enc, ω 4 )? = e ω Enc, ω 4 )? = = = = = e u = e u = e ω? = e u = e ω? = e u = e u = ) c ) c ) c e s = e s = ) c = ) c = e s e s = e s = ), s 4 ) )Enc, s 4 ) Verfcaton defnton ), s 4 ) By defnton of t 4 By defnton of ReEnc )Enc, ω 4 c r ) By defnton of s 4 )Enc, c r ) e ω +c u By algebrac manpulaton, )Enc, c r ) By defnton of s e u ) c? = = e u ) c Enc, c r ) By algebrac manpulaton e u ) c? = e Enc,R )) u ) c Enc, c r ) By defnton of e and u = Enc,c r )? = = Enc pk,r ) u ) c Enc,c r )? = Enc,c Ru) Enc,c r )=Enc,c r ) By algebrac manpulaton By algebrac manpulaton By defnton of r h ˆωĉ ω h ˆωĉ ω ˆt? = ĉ c ĉ c? = ĉ c? = ĉ c hŝĉ s hŝĉ s? = h c ˆrĉ c u hˆrĉ u )c? = h c ˆrĉ c u h c ˆrĉ c u = hc ˆrĉ c u h ˆω +c ˆrĉ ω +c u Verfcaton defnton By defnton of ˆt By defnton of ŝ and s By algebrac manpulaton By defnton of ĉ By algebrac manpulaton Soundness We follow the structure of the orgnal proof, as presented n [2], and present the extractor n two parts. Frst, we show that, for two dfferent transcrpts wth the same u but dfferent c, we can extract wtness for certan sub-statements. In the extended extractor 7

8 we show that, gven wtnesses for these sub-statements whch hold for n dfferent u, we can extract wtness to the man statements. Basc extractor. Gven two acceptng transcrpts wth c c, the basc extractor computes u,ĉ,t,t 2,t 3,t 4,ˆt,c,s,s 2,s 3,s 4,ŝ,s ) u,ĉ,t,t 2,t 3,t 4,ˆt,c,s,s 2,s 3,s 4,ŝ,s ) r=s s )/c c ), r =s 2 s 2 )/c c ), r=s 3 s 3 )/c c ), r =s 4 s 4 )/c c ), ˆr=ŝ ŝ )/c c ), u =s s )/c c ). ote that we reuse symbols from the Algorthm. Whle they denote analogous enttes, they are not necessarly dentcal f the transcrpts have not been obtaned n the honest way). We wll prove that = c = EPC, r) c u = = EPCu, r) = e u = Enc pk,r ) = e u ĉ = PC h,ĉ u, ˆr ) ĉ = PC h,h The proof conssts of smple algebrac transformatons: = u,r ) = c ) c t = c ) c t h s / = h ) c h s / = h ) c ) c c = ) c c = h s s c c = h = = = = c c c EPC, s s c c )= c = EPC, r)= c = Tautology By the verfcaton defnton By algebrac manpulaton By defnton of EPC By defnton of r 8

9 = c u ) c t 3 = cu ) c t 3 h s 3 = hs h s 3 = h s h s 3 s 3 c c = h ) c c = ) c c = s s c c = = = = c u c u c u EPC s s c c, s 3 s 3 c c )= c u = EPCu, r)= c u = Tautology By verfcaton defnton By algebrac manpulaton By defnton of EPC By defnton of u and r = e ) u ) c t 4 = e ) u ) c t 4 = e )s Enc, s4 ) = e )s Enc, s 4 ) e s s c c = ) c c = = ) c c = = Enc, s 4 s 4 c c )= = e s s c c = = e u e u e u = Enc, s 4 s 4 c c ) = e u = Enc pk,r ) u e = e u Tautology By verfcaton defnton By algebrac manpulaton By algebrac manpulaton By defnton of r and u 9

10 ow, for each {,...,} ) ĉc c c ˆt = ĉ ˆt ĉ c h ŝĉ s hŝ ĉ s ) c c = ĉ h ŝ ŝ s s c c c c ĉ PC h,ĉ s s c c, ŝ ŝ c c )=ĉ PC h,ĉ u, ˆr )=ĉ Tautology By verfcaton defnton = ĉ By algebrac manpulatons By algebrac manpulatons By defnton of u and ˆr = u ĉc t 2 ĉ c t 2 h ) c h s 2 h = u ) c h s 2 ) c c = ĉ c c =ĉ Tautology By verfcaton defnton PC h s 2 s 2 c c h = u = ĉ By algebrac manpulaton = PC h,h u, s 2 s 2 c c )=ĉ = u,r )=ĉ By algebrac manpulaton By defnton of r Extended Extractor We now sketch the extended extractor whch, for a gven statement see the common nput n Algorthm ), for n dfferent wtnesses extracted by the basc extractor, produces the wtnesses to the man statement. Let the collectve output of the basc extractors be denoted as r,r, r Z n q, R Z W q the prmary challenges U Z q, and ˆR,U Z q extracted from. We denote by U the th column of U whch s the challenge vector from the th run of the basc extractor, and by U, the element of the challenge vector from the th run of the basc extractor. Frst note wth overwhelmng probablty the set of U s s lnearly ndependent, concretely the probablty s bounded by q 2 q. From lnear ndependence, t follows that ther exsts A Z q such that UA l s the lth standard unt vector nz q whch we wll denote by I l. A s the nverse of U. Clearly, 0

11 c l = c l = c l = c l = c l = c l = = c = U, A,l = c UA l ) snce UA l s I l = = = = = c l = EPC = c U, A,l ) c U, ) A,l EPCU, r ) A,l by defnton of UA l by algebrac manpulaton by algebrac manpulaton by some algebrac manpulaton and EPCU A,l, r A,l ) by algebrac manpulaton = c l = EPCU A l, r,a l ) U A,l, r,a l ) by algebrac manpulaton by algebrac manpulaton = c U, = EPCU, r ) Therefore, we can open c to the matrx M, where the lth column of M s U A l, wth randomness r,a l. In other words we open c= U A usng randomness ra. We expect M to be a permutaton matrx, but f t s not, then one can fnd a wtness to R com whch, as has been mentoned, can only happen wth neglgble probablty, under our securty assumptons). We extract n two dfferent ways dependng on whether M. Opton one If M, then let u = M and note that u and EPC, r )= = c = c = = EPCu, ra) n whch case we found a wtness breakng the commtment scheme. Opton two If M =, then recall Theorem from Proofs of Restrcted Shuffles, whch states that M s a permutaton matrx f and only f M= and = m,x = x = 0. Snce M = and M s not a permutaton matrx, then = m,x = x 0. The Schwartz Zppel says that f you sample, a non-zero polynomal, at a random pont the chance that t equals zero s neglgble n the order of the underlyng feld; hence, wth overwhelmng probablty there exsts {,...,} such = m,u = U, 0. Snce ths s true wth overwhelmng probablty, we requre t to be true and rewnd f ths s not

12 the case. Strctly speakng we should take + extractons from the basc extractor, f we recover a dfferent M we wn, f we get the same M then U l+ s actually ndependent of M and the lemma can be appled.) Let u = MU and note that u U Whch must be true snce U =, = =U, u = = U = = U follows from the base statements and = U = u by defnton of u and = m,u = U, 0. EPCU, r )= c U, = = EPCu, ra,u ) Ths completes the proof that M s a permutaton matrx or we have found a wtness to R com. The correctness of U We now show that U l = MU l for all l [,] or we can fnd a wtnesses to R com. Let u = MU l and by assumpton u U l. EPCU l, r l)= = c U,l = EPCu, ra,u l ) Extractng the randomness We havng shown that f M s not a permutaton matrx we can extract a wtness to R com. We now show that we can extract R Z w q such that e = 2

13 ReEnc pk e π),r π) ). = = e UA l ) snce UA l si l ) e = U, A,l by defnton of UA l 2) ) e U, A,l by algebrac manpulaton 3) = = A,l e = U, ) by algebrac manpulaton 4) = A,l e = U, Enc pk, R )) snce = e = U, A,l Enc pk, R A,l ) = = = = = = ) = e U, = = e U, Enc pk, R ) 5) by algebrac manpulaton 6) e = U, A,lEnc pk, R,A l ) by algebrac manpulaton 7) e U A l ) Enc pk, R,A l ) by algebrac manpulaton 8) e MUA l ) Enc pk, R,A l ) snce U = MU 9) e MI l ) Enc pk, R,A l ) snce UA l =I l 0) e M l ) Enc pk, R,A l ) snce MI l = M l ) e π M l)enc pk, R,A l ) by defnton of π M 2) We have now shown that ReEnc pk e l, R l,a l ) = e π l) ; hence, R l = R l,a l whch concludes the proof. 3) References. Rolf Haenn, Phlpp Locher, Reto Koeng, and Erc Dubus. Pseudo-code algorthms for verfable reencrypton mx-nets. In Internatonal Conference on Fnancal Cryptography and Data Securty, pages Sprnger,

14 2. Börn Terelus and Douglas Wkström. Proofs of Restrcted Shuffles. In Danel J. Bernsten and Tana Lange, edtors, Progress n Cryptology - AFRICACRYPT 200, Thrd Internatonal Conference on Cryptology n Afrca, volume 6055 of Lecture otes n Computer Scence, pages Sprnger, Douglas Wkström. A commtment-consstent proof of a shuffle. In Australasan Conference on Informaton Securty and Prvacy, pages Sprnger,

2 More examples with details

2 More examples with details Physcs 129b Lecture 3 Caltech, 01/15/19 2 More examples wth detals 2.3 The permutaton group n = 4 S 4 contans 4! = 24 elements. One s the dentty e. Sx of them are exchange of two objects (, j) ( to j and

More information

APPENDIX A Some Linear Algebra

APPENDIX A Some Linear Algebra APPENDIX A Some Lnear Algebra The collecton of m, n matrces A.1 Matrces a 1,1,..., a 1,n A = a m,1,..., a m,n wth real elements a,j s denoted by R m,n. If n = 1 then A s called a column vector. Smlarly,

More information

G /G Advanced Cryptography 12/9/2009. Lecture 14

G /G Advanced Cryptography 12/9/2009. Lecture 14 G22.3220-001/G63.2180 Advanced Cryptography 12/9/2009 Lecturer: Yevgeny Dods Lecture 14 Scrbe: Arsteds Tentes In ths lecture we covered the Ideal/Real paradgm and the noton of UC securty. Moreover, we

More information

SL n (F ) Equals its Own Derived Group

SL n (F ) Equals its Own Derived Group Internatonal Journal of Algebra, Vol. 2, 2008, no. 12, 585-594 SL n (F ) Equals ts Own Derved Group Jorge Macel BMCC-The Cty Unversty of New York, CUNY 199 Chambers street, New York, NY 10007, USA macel@cms.nyu.edu

More information

Lecture 5 Decoding Binary BCH Codes

Lecture 5 Decoding Binary BCH Codes Lecture 5 Decodng Bnary BCH Codes In ths class, we wll ntroduce dfferent methods for decodng BCH codes 51 Decodng the [15, 7, 5] 2 -BCH Code Consder the [15, 7, 5] 2 -code C we ntroduced n the last lecture

More information

Polynomials. 1 More properties of polynomials

Polynomials. 1 More properties of polynomials Polynomals 1 More propertes of polynomals Recall that, for R a commutatve rng wth unty (as wth all rngs n ths course unless otherwse noted), we defne R[x] to be the set of expressons n =0 a x, where a

More information

j) = 1 (note sigma notation) ii. Continuous random variable (e.g. Normal distribution) 1. density function: f ( x) 0 and f ( x) dx = 1

j) = 1 (note sigma notation) ii. Continuous random variable (e.g. Normal distribution) 1. density function: f ( x) 0 and f ( x) dx = 1 Random varables Measure of central tendences and varablty (means and varances) Jont densty functons and ndependence Measures of assocaton (covarance and correlaton) Interestng result Condtonal dstrbutons

More information

8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS

8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS SECTION 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS 493 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS All the vector spaces you have studed thus far n the text are real vector spaces because the scalars

More information

12 MATH 101A: ALGEBRA I, PART C: MULTILINEAR ALGEBRA. 4. Tensor product

12 MATH 101A: ALGEBRA I, PART C: MULTILINEAR ALGEBRA. 4. Tensor product 12 MATH 101A: ALGEBRA I, PART C: MULTILINEAR ALGEBRA Here s an outlne of what I dd: (1) categorcal defnton (2) constructon (3) lst of basc propertes (4) dstrbutve property (5) rght exactness (6) localzaton

More information

2.3 Nilpotent endomorphisms

2.3 Nilpotent endomorphisms s a block dagonal matrx, wth A Mat dm U (C) In fact, we can assume that B = B 1 B k, wth B an ordered bass of U, and that A = [f U ] B, where f U : U U s the restrcton of f to U 40 23 Nlpotent endomorphsms

More information

Example: (13320, 22140) =? Solution #1: The divisors of are 1, 2, 3, 4, 5, 6, 9, 10, 12, 15, 18, 20, 27, 30, 36, 41,

Example: (13320, 22140) =? Solution #1: The divisors of are 1, 2, 3, 4, 5, 6, 9, 10, 12, 15, 18, 20, 27, 30, 36, 41, The greatest common dvsor of two ntegers a and b (not both zero) s the largest nteger whch s a common factor of both a and b. We denote ths number by gcd(a, b), or smply (a, b) when there s no confuson

More information

FINITELY-GENERATED MODULES OVER A PRINCIPAL IDEAL DOMAIN

FINITELY-GENERATED MODULES OVER A PRINCIPAL IDEAL DOMAIN FINITELY-GENERTED MODULES OVER PRINCIPL IDEL DOMIN EMMNUEL KOWLSKI Throughout ths note, s a prncpal deal doman. We recall the classfcaton theorem: Theorem 1. Let M be a fntely-generated -module. (1) There

More information

FACTORIZATION IN KRULL MONOIDS WITH INFINITE CLASS GROUP

FACTORIZATION IN KRULL MONOIDS WITH INFINITE CLASS GROUP C O L L O Q U I U M M A T H E M A T I C U M VOL. 80 1999 NO. 1 FACTORIZATION IN KRULL MONOIDS WITH INFINITE CLASS GROUP BY FLORIAN K A I N R A T H (GRAZ) Abstract. Let H be a Krull monod wth nfnte class

More information

Week 2. This week, we covered operations on sets and cardinality.

Week 2. This week, we covered operations on sets and cardinality. Week 2 Ths week, we covered operatons on sets and cardnalty. Defnton 0.1 (Correspondence). A correspondence between two sets A and B s a set S contaned n A B = {(a, b) a A, b B}. A correspondence from

More information

CHALMERS GÖTEBORGS UNIVERSITET. TDA352 (Chalmers) - DIT250 (GU) 12 Jan. 2017, 14:00-18:00

CHALMERS GÖTEBORGS UNIVERSITET. TDA352 (Chalmers) - DIT250 (GU) 12 Jan. 2017, 14:00-18:00 CHALMERS GÖTEBORGS UNIVERSITET CRYPTOGRAPHY TDA352 (Chalmers) - DIT250 (GU) 12 Jan. 2017, 14:00-18:00 No extra materal s allowed durng the exam except for pens and a smple calculator (not smartphones).

More information

The Order Relation and Trace Inequalities for. Hermitian Operators

The Order Relation and Trace Inequalities for. Hermitian Operators Internatonal Mathematcal Forum, Vol 3, 08, no, 507-57 HIKARI Ltd, wwwm-hkarcom https://doorg/0988/mf088055 The Order Relaton and Trace Inequaltes for Hermtan Operators Y Huang School of Informaton Scence

More information

Introduction to Algorithms

Introduction to Algorithms Introducton to Algorthms 6.046J/8.40J Lecture 7 Prof. Potr Indyk Data Structures Role of data structures: Encapsulate data Support certan operatons (e.g., INSERT, DELETE, SEARCH) Our focus: effcency of

More information

A Commitment-Consistent Proof of a Shuffle

A Commitment-Consistent Proof of a Shuffle A Commtment-Consstent Proof of a Shuffle Douglas Wkström CSC KTH Stockholm, Sweden dog@csc.kth.se Aprl 2, 2011 Abstract We ntroduce a pre-computaton technque that drastcally reduces the onlne computatonal

More information

Homomorphic Trapdoor Commitments to Group Elements

Homomorphic Trapdoor Commitments to Group Elements Homomorphc Trapdoor Commtments to Group Elements Jens Groth Unversty College London j.groth@ucl.ac.uk Abstract We present homomorphc trapdoor commtments to group elements. In contrast, prevous homomorphc

More information

Affine transformations and convexity

Affine transformations and convexity Affne transformatons and convexty The purpose of ths document s to prove some basc propertes of affne transformatons nvolvng convex sets. Here are a few onlne references for background nformaton: http://math.ucr.edu/

More information

Lectures - Week 4 Matrix norms, Conditioning, Vector Spaces, Linear Independence, Spanning sets and Basis, Null space and Range of a Matrix

Lectures - Week 4 Matrix norms, Conditioning, Vector Spaces, Linear Independence, Spanning sets and Basis, Null space and Range of a Matrix Lectures - Week 4 Matrx norms, Condtonng, Vector Spaces, Lnear Independence, Spannng sets and Bass, Null space and Range of a Matrx Matrx Norms Now we turn to assocatng a number to each matrx. We could

More information

DIFFERENTIAL FORMS BRIAN OSSERMAN

DIFFERENTIAL FORMS BRIAN OSSERMAN DIFFERENTIAL FORMS BRIAN OSSERMAN Dfferentals are an mportant topc n algebrac geometry, allowng the use of some classcal geometrc arguments n the context of varetes over any feld. We wll use them to defne

More information

Graph Reconstruction by Permutations

Graph Reconstruction by Permutations Graph Reconstructon by Permutatons Perre Ille and Wllam Kocay* Insttut de Mathémathques de Lumny CNRS UMR 6206 163 avenue de Lumny, Case 907 13288 Marselle Cedex 9, France e-mal: lle@ml.unv-mrs.fr Computer

More information

n α j x j = 0 j=1 has a nontrivial solution. Here A is the n k matrix whose jth column is the vector for all t j=0

n α j x j = 0 j=1 has a nontrivial solution. Here A is the n k matrix whose jth column is the vector for all t j=0 MODULE 2 Topcs: Lnear ndependence, bass and dmenson We have seen that f n a set of vectors one vector s a lnear combnaton of the remanng vectors n the set then the span of the set s unchanged f that vector

More information

6.842 Randomness and Computation February 18, Lecture 4

6.842 Randomness and Computation February 18, Lecture 4 6.842 Randomness and Computaton February 18, 2014 Lecture 4 Lecturer: Rontt Rubnfeld Scrbe: Amartya Shankha Bswas Topcs 2-Pont Samplng Interactve Proofs Publc cons vs Prvate cons 1 Two Pont Samplng 1.1

More information

LECTURE V. 1. More on the Chinese Remainder Theorem We begin by recalling this theorem, proven in the preceeding lecture.

LECTURE V. 1. More on the Chinese Remainder Theorem We begin by recalling this theorem, proven in the preceeding lecture. LECTURE V EDWIN SPARK 1. More on the Chnese Remander Theorem We begn by recallng ths theorem, proven n the preceedng lecture. Theorem 1.1 (Chnese Remander Theorem). Let R be a rng wth deals I 1, I 2,...,

More information

Chapter 11: Simple Linear Regression and Correlation

Chapter 11: Simple Linear Regression and Correlation Chapter 11: Smple Lnear Regresson and Correlaton 11-1 Emprcal Models 11-2 Smple Lnear Regresson 11-3 Propertes of the Least Squares Estmators 11-4 Hypothess Test n Smple Lnear Regresson 11-4.1 Use of t-tests

More information

a b a In case b 0, a being divisible by b is the same as to say that

a b a In case b 0, a being divisible by b is the same as to say that Secton 6.2 Dvsblty among the ntegers An nteger a ε s dvsble by b ε f there s an nteger c ε such that a = bc. Note that s dvsble by any nteger b, snce = b. On the other hand, a s dvsble by only f a = :

More information

THE SUMMATION NOTATION Ʃ

THE SUMMATION NOTATION Ʃ Sngle Subscrpt otaton THE SUMMATIO OTATIO Ʃ Most of the calculatons we perform n statstcs are repettve operatons on lsts of numbers. For example, we compute the sum of a set of numbers, or the sum of the

More information

MTH 819 Algebra I S13. Homework 1/ Solutions. 1 if p n b and p n+1 b 0 otherwise ) = 0 if p q or n m. W i = rw i

MTH 819 Algebra I S13. Homework 1/ Solutions. 1 if p n b and p n+1 b 0 otherwise ) = 0 if p q or n m. W i = rw i MTH 819 Algebra I S13 Homework 1/ Solutons Defnton A. Let R be PID and V a untary R-module. Let p be a prme n R and n Z +. Then d p,n (V) = dm R/Rp p n 1 Ann V (p n )/p n Ann V (p n+1 ) Note here that

More information

Inner Product. Euclidean Space. Orthonormal Basis. Orthogonal

Inner Product. Euclidean Space. Orthonormal Basis. Orthogonal Inner Product Defnton 1 () A Eucldean space s a fnte-dmensonal vector space over the reals R, wth an nner product,. Defnton 2 (Inner Product) An nner product, on a real vector space X s a symmetrc, blnear,

More information

Min Cut, Fast Cut, Polynomial Identities

Min Cut, Fast Cut, Polynomial Identities Randomzed Algorthms, Summer 016 Mn Cut, Fast Cut, Polynomal Identtes Instructor: Thomas Kesselhem and Kurt Mehlhorn 1 Mn Cuts n Graphs Lecture (5 pages) Throughout ths secton, G = (V, E) s a mult-graph.

More information

Notes on Frequency Estimation in Data Streams

Notes on Frequency Estimation in Data Streams Notes on Frequency Estmaton n Data Streams In (one of) the data streamng model(s), the data s a sequence of arrvals a 1, a 2,..., a m of the form a j = (, v) where s the dentty of the tem and belongs to

More information

A Novel Feistel Cipher Involving a Bunch of Keys supplemented with Modular Arithmetic Addition

A Novel Feistel Cipher Involving a Bunch of Keys supplemented with Modular Arithmetic Addition (IJACSA) Internatonal Journal of Advanced Computer Scence Applcatons, A Novel Festel Cpher Involvng a Bunch of Keys supplemented wth Modular Arthmetc Addton Dr. V.U.K Sastry Dean R&D, Department of Computer

More information

The Geometry of Logit and Probit

The Geometry of Logit and Probit The Geometry of Logt and Probt Ths short note s meant as a supplement to Chapters and 3 of Spatal Models of Parlamentary Votng and the notaton and reference to fgures n the text below s to those two chapters.

More information

HMMT February 2016 February 20, 2016

HMMT February 2016 February 20, 2016 HMMT February 016 February 0, 016 Combnatorcs 1. For postve ntegers n, let S n be the set of ntegers x such that n dstnct lnes, no three concurrent, can dvde a plane nto x regons (for example, S = {3,

More information

COMPLEX NUMBERS AND QUADRATIC EQUATIONS

COMPLEX NUMBERS AND QUADRATIC EQUATIONS COMPLEX NUMBERS AND QUADRATIC EQUATIONS INTRODUCTION We know that x 0 for all x R e the square of a real number (whether postve, negatve or ero) s non-negatve Hence the equatons x, x, x + 7 0 etc are not

More information

Homework Notes Week 7

Homework Notes Week 7 Homework Notes Week 7 Math 4 Sprng 4 #4 (a Complete the proof n example 5 that s an nner product (the Frobenus nner product on M n n (F In the example propertes (a and (d have already been verfed so we

More information

The Multiple Classical Linear Regression Model (CLRM): Specification and Assumptions. 1. Introduction

The Multiple Classical Linear Regression Model (CLRM): Specification and Assumptions. 1. Introduction ECONOMICS 5* -- NOTE (Summary) ECON 5* -- NOTE The Multple Classcal Lnear Regresson Model (CLRM): Specfcaton and Assumptons. Introducton CLRM stands for the Classcal Lnear Regresson Model. The CLRM s also

More information

Anti-van der Waerden numbers of 3-term arithmetic progressions.

Anti-van der Waerden numbers of 3-term arithmetic progressions. Ant-van der Waerden numbers of 3-term arthmetc progressons. Zhanar Berkkyzy, Alex Schulte, and Mchael Young Aprl 24, 2016 Abstract The ant-van der Waerden number, denoted by aw([n], k), s the smallest

More information

arxiv: v1 [cs.cr] 22 Oct 2018

arxiv: v1 [cs.cr] 22 Oct 2018 CRYPTOGRAPHIC ANALYSIS OF THE MODIFIED MATRIX MODULAR CRYPTOSYSTEM arxv:181109876v1 [cscr] 22 Oct 2018 VITALIĬ ROMAN KOV Abstract We show that the Modfed Matrx Modular Cryptosystem proposed by SK Rososhek

More information

Subset Topological Spaces and Kakutani s Theorem

Subset Topological Spaces and Kakutani s Theorem MOD Natural Neutrosophc Subset Topologcal Spaces and Kakutan s Theorem W. B. Vasantha Kandasamy lanthenral K Florentn Smarandache 1 Copyrght 1 by EuropaNova ASBL and the Authors Ths book can be ordered

More information

The Pseudoblocks of Endomorphism Algebras

The Pseudoblocks of Endomorphism Algebras Internatonal Mathematcal Forum, 4, 009, no. 48, 363-368 The Pseudoblocks of Endomorphsm Algebras Ahmed A. Khammash Department of Mathematcal Scences, Umm Al-Qura Unversty P.O.Box 796, Makkah, Saud Araba

More information

Foundations of Arithmetic

Foundations of Arithmetic Foundatons of Arthmetc Notaton We shall denote the sum and product of numbers n the usual notaton as a 2 + a 2 + a 3 + + a = a, a 1 a 2 a 3 a = a The notaton a b means a dvdes b,.e. ac = b where c s an

More information

DISCRIMINANTS AND RAMIFIED PRIMES. 1. Introduction A prime number p is said to be ramified in a number field K if the prime ideal factorization

DISCRIMINANTS AND RAMIFIED PRIMES. 1. Introduction A prime number p is said to be ramified in a number field K if the prime ideal factorization DISCRIMINANTS AND RAMIFIED PRIMES KEITH CONRAD 1. Introducton A prme number p s sad to be ramfed n a number feld K f the prme deal factorzaton (1.1) (p) = po K = p e 1 1 peg g has some e greater than 1.

More information

Cryptanalysis of pairing-free certificateless authenticated key agreement protocol

Cryptanalysis of pairing-free certificateless authenticated key agreement protocol Cryptanalyss of parng-free certfcateless authentcated key agreement protocol Zhan Zhu Chna Shp Development Desgn Center CSDDC Wuhan Chna Emal: zhuzhan0@gmal.com bstract: Recently He et al. [D. He J. Chen

More information

THE CHINESE REMAINDER THEOREM. We should thank the Chinese for their wonderful remainder theorem. Glenn Stevens

THE CHINESE REMAINDER THEOREM. We should thank the Chinese for their wonderful remainder theorem. Glenn Stevens THE CHINESE REMAINDER THEOREM KEITH CONRAD We should thank the Chnese for ther wonderful remander theorem. Glenn Stevens 1. Introducton The Chnese remander theorem says we can unquely solve any par of

More information

Learning Theory: Lecture Notes

Learning Theory: Lecture Notes Learnng Theory: Lecture Notes Lecturer: Kamalka Chaudhur Scrbe: Qush Wang October 27, 2012 1 The Agnostc PAC Model Recall that one of the constrants of the PAC model s that the data dstrbuton has to be

More information

Lecture Space-Bounded Derandomization

Lecture Space-Bounded Derandomization Notes on Complexty Theory Last updated: October, 2008 Jonathan Katz Lecture Space-Bounded Derandomzaton 1 Space-Bounded Derandomzaton We now dscuss derandomzaton of space-bounded algorthms. Here non-trval

More information

Exercises. 18 Algorithms

Exercises. 18 Algorithms 18 Algorthms Exercses 0.1. In each of the followng stuatons, ndcate whether f = O(g), or f = Ω(g), or both (n whch case f = Θ(g)). f(n) g(n) (a) n 100 n 200 (b) n 1/2 n 2/3 (c) 100n + log n n + (log n)

More information

3.1 Expectation of Functions of Several Random Variables. )' be a k-dimensional discrete or continuous random vector, with joint PMF p (, E X E X1 E X

3.1 Expectation of Functions of Several Random Variables. )' be a k-dimensional discrete or continuous random vector, with joint PMF p (, E X E X1 E X Statstcs 1: Probablty Theory II 37 3 EPECTATION OF SEVERAL RANDOM VARIABLES As n Probablty Theory I, the nterest n most stuatons les not on the actual dstrbuton of a random vector, but rather on a number

More information

Finding Primitive Roots Pseudo-Deterministically

Finding Primitive Roots Pseudo-Deterministically Electronc Colloquum on Computatonal Complexty, Report No 207 (205) Fndng Prmtve Roots Pseudo-Determnstcally Ofer Grossman December 22, 205 Abstract Pseudo-determnstc algorthms are randomzed search algorthms

More information

Stanford University CS254: Computational Complexity Notes 7 Luca Trevisan January 29, Notes for Lecture 7

Stanford University CS254: Computational Complexity Notes 7 Luca Trevisan January 29, Notes for Lecture 7 Stanford Unversty CS54: Computatonal Complexty Notes 7 Luca Trevsan January 9, 014 Notes for Lecture 7 1 Approxmate Countng wt an N oracle We complete te proof of te followng result: Teorem 1 For every

More information

A New Refinement of Jacobi Method for Solution of Linear System Equations AX=b

A New Refinement of Jacobi Method for Solution of Linear System Equations AX=b Int J Contemp Math Scences, Vol 3, 28, no 17, 819-827 A New Refnement of Jacob Method for Soluton of Lnear System Equatons AX=b F Naem Dafchah Department of Mathematcs, Faculty of Scences Unversty of Gulan,

More information

Attacks on RSA The Rabin Cryptosystem Semantic Security of RSA Cryptology, Tuesday, February 27th, 2007 Nils Andersen. Complexity Theoretic Reduction

Attacks on RSA The Rabin Cryptosystem Semantic Security of RSA Cryptology, Tuesday, February 27th, 2007 Nils Andersen. Complexity Theoretic Reduction Attacks on RSA The Rabn Cryptosystem Semantc Securty of RSA Cryptology, Tuesday, February 27th, 2007 Nls Andersen Square Roots modulo n Complexty Theoretc Reducton Factorng Algorthms Pollard s p 1 Pollard

More information

Lecture 3. Ax x i a i. i i

Lecture 3. Ax x i a i. i i 18.409 The Behavor of Algorthms n Practce 2/14/2 Lecturer: Dan Spelman Lecture 3 Scrbe: Arvnd Sankar 1 Largest sngular value In order to bound the condton number, we need an upper bound on the largest

More information

Short Pairing-based Non-interactive Zero-Knowledge Arguments

Short Pairing-based Non-interactive Zero-Knowledge Arguments Short Parng-based Non-nteractve Zero-Knowledge Arguments Jens Groth Unversty College London j.groth@ucl.ac.uk October 26, 2010 Abstract. We construct non-nteractve zero-knowledge arguments for crcut satsfablty

More information

Lecture 4: Universal Hash Functions/Streaming Cont d

Lecture 4: Universal Hash Functions/Streaming Cont d CSE 5: Desgn and Analyss of Algorthms I Sprng 06 Lecture 4: Unversal Hash Functons/Streamng Cont d Lecturer: Shayan Oves Gharan Aprl 6th Scrbe: Jacob Schreber Dsclamer: These notes have not been subjected

More information

A combinatorial problem associated with nonograms

A combinatorial problem associated with nonograms A combnatoral problem assocated wth nonograms Jessca Benton Ron Snow Nolan Wallach March 21, 2005 1 Introducton. Ths work was motvated by a queston posed by the second named author to the frst named author

More information

REGULAR POSITIVE TERNARY QUADRATIC FORMS. 1. Introduction

REGULAR POSITIVE TERNARY QUADRATIC FORMS. 1. Introduction REGULAR POSITIVE TERNARY QUADRATIC FORMS BYEONG-KWEON OH Abstract. A postve defnte quadratc form f s sad to be regular f t globally represents all ntegers that are represented by the genus of f. In 997

More information

1 Matrix representations of canonical matrices

1 Matrix representations of canonical matrices 1 Matrx representatons of canoncal matrces 2-d rotaton around the orgn: ( ) cos θ sn θ R 0 = sn θ cos θ 3-d rotaton around the x-axs: R x = 1 0 0 0 cos θ sn θ 0 sn θ cos θ 3-d rotaton around the y-axs:

More information

Cryptanalysis of a Public-key Cryptosystem Using Lattice Basis Reduction Algorithm

Cryptanalysis of a Public-key Cryptosystem Using Lattice Basis Reduction Algorithm www.ijcsi.org 110 Cryptanalyss of a Publc-key Cryptosystem Usng Lattce Bass Reducton Algorthm Roohallah Rastagh 1, Hamd R. Dall Oskoue 2 1,2 Department of Electrcal Engneerng, Aeronautcal Unversty of Snce

More information

Basic Regular Expressions. Introduction. Introduction to Computability. Theory. Motivation. Lecture4: Regular Expressions

Basic Regular Expressions. Introduction. Introduction to Computability. Theory. Motivation. Lecture4: Regular Expressions Introducton to Computablty Theory Lecture: egular Expressons Prof Amos Israel Motvaton If one wants to descrbe a regular language, La, she can use the a DFA, Dor an NFA N, such L ( D = La that that Ths

More information

Using T.O.M to Estimate Parameter of distributions that have not Single Exponential Family

Using T.O.M to Estimate Parameter of distributions that have not Single Exponential Family IOSR Journal of Mathematcs IOSR-JM) ISSN: 2278-5728. Volume 3, Issue 3 Sep-Oct. 202), PP 44-48 www.osrjournals.org Usng T.O.M to Estmate Parameter of dstrbutons that have not Sngle Exponental Famly Jubran

More information

On a CCA2-secure variant of McEliece in the standard model

On a CCA2-secure variant of McEliece in the standard model On a CCA2-secure varant of McElece n the standard model Edoardo Perschett Department of Mathematcs, Unversty of Auckland, New Zealand. e.perschett@math.auckland.ac.nz Abstract. We consder publc-key encrypton

More information

Calculation of time complexity (3%)

Calculation of time complexity (3%) Problem 1. (30%) Calculaton of tme complexty (3%) Gven n ctes, usng exhaust search to see every result takes O(n!). Calculaton of tme needed to solve the problem (2%) 40 ctes:40! dfferent tours 40 add

More information

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module 3 LOSSY IMAGE COMPRESSION SYSTEMS Verson ECE IIT, Kharagpur Lesson 6 Theory of Quantzaton Verson ECE IIT, Kharagpur Instructonal Objectves At the end of ths lesson, the students should be able to:

More information

College of Computer & Information Science Fall 2009 Northeastern University 20 October 2009

College of Computer & Information Science Fall 2009 Northeastern University 20 October 2009 College of Computer & Informaton Scence Fall 2009 Northeastern Unversty 20 October 2009 CS7880: Algorthmc Power Tools Scrbe: Jan Wen and Laura Poplawsk Lecture Outlne: Prmal-dual schema Network Desgn:

More information

More metrics on cartesian products

More metrics on cartesian products More metrcs on cartesan products If (X, d ) are metrc spaces for 1 n, then n Secton II4 of the lecture notes we defned three metrcs on X whose underlyng topologes are the product topology The purpose of

More information

Difference Equations

Difference Equations Dfference Equatons c Jan Vrbk 1 Bascs Suppose a sequence of numbers, say a 0,a 1,a,a 3,... s defned by a certan general relatonshp between, say, three consecutve values of the sequence, e.g. a + +3a +1

More information

A Threshold Digital Signature Issuing Scheme without Secret Communication

A Threshold Digital Signature Issuing Scheme without Secret Communication A Threshold Dgtal Sgnature Issung Scheme wthout Secret Communcaton Kazuo Takarag, Kunhko Myazak, Masash Takahash Systems Development Laboratory, Htach, Ltd e-mal: {takara, kunhko, takahas}@sdlhtachcop

More information

Perron Vectors of an Irreducible Nonnegative Interval Matrix

Perron Vectors of an Irreducible Nonnegative Interval Matrix Perron Vectors of an Irreducble Nonnegatve Interval Matrx Jr Rohn August 4 2005 Abstract As s well known an rreducble nonnegatve matrx possesses a unquely determned Perron vector. As the man result of

More information

Singular Value Decomposition: Theory and Applications

Singular Value Decomposition: Theory and Applications Sngular Value Decomposton: Theory and Applcatons Danel Khashab Sprng 2015 Last Update: March 2, 2015 1 Introducton A = UDV where columns of U and V are orthonormal and matrx D s dagonal wth postve real

More information

Information-Theoretic Timed-Release Security: Key-Agreement, Encryption, and Authentication Codes

Information-Theoretic Timed-Release Security: Key-Agreement, Encryption, and Authentication Codes Informaton-Theoretc Tmed-Release Securty: Key-Agreement, Encrypton, and Authentcaton Codes Yohe Watanabe, Takenobu Seto, Junj Shkata Graduate School of Envronment and Informaton Scences, Yokohama Natonal

More information

First day August 1, Problems and Solutions

First day August 1, Problems and Solutions FOURTH INTERNATIONAL COMPETITION FOR UNIVERSITY STUDENTS IN MATHEMATICS July 30 August 4, 997, Plovdv, BULGARIA Frst day August, 997 Problems and Solutons Problem. Let {ε n } n= be a sequence of postve

More information

Section 8.3 Polar Form of Complex Numbers

Section 8.3 Polar Form of Complex Numbers 80 Chapter 8 Secton 8 Polar Form of Complex Numbers From prevous classes, you may have encountered magnary numbers the square roots of negatve numbers and, more generally, complex numbers whch are the

More information

The path of ants Dragos Crisan, Andrei Petridean, 11 th grade. Colegiul National "Emil Racovita", Cluj-Napoca

The path of ants Dragos Crisan, Andrei Petridean, 11 th grade. Colegiul National Emil Racovita, Cluj-Napoca Ths artcle s wrtten by students. It may nclude omssons and mperfectons, whch were dentfed and reported as mnutely as possble by our revewers n the edtoral notes. The path of ants 07-08 Students names and

More information

Introduction to Algorithms

Introduction to Algorithms Introducton to Algorthms 6.046J/18.401J Lecture 7 Prof. Potr Indyk Data Structures Role of data structures: Encapsulate data Support certan operatons (e.g., INSERT, DELETE, SEARCH) What data structures

More information

Linear, affine, and convex sets and hulls In the sequel, unless otherwise specified, X will denote a real vector space.

Linear, affine, and convex sets and hulls In the sequel, unless otherwise specified, X will denote a real vector space. Lnear, affne, and convex sets and hulls In the sequel, unless otherwse specfed, X wll denote a real vector space. Lnes and segments. Gven two ponts x, y X, we defne xy = {x + t(y x) : t R} = {(1 t)x +

More information

An Introduction to Morita Theory

An Introduction to Morita Theory An Introducton to Morta Theory Matt Booth October 2015 Nov. 2017: made a few revsons. Thanks to Nng Shan for catchng a typo. My man reference for these notes was Chapter II of Bass s book Algebrac K-Theory

More information

On the set of natural numbers

On the set of natural numbers On the set of natural numbers by Jalton C. Ferrera Copyrght 2001 Jalton da Costa Ferrera Introducton The natural numbers have been understood as fnte numbers, ths wor tres to show that the natural numbers

More information

Determinants Containing Powers of Generalized Fibonacci Numbers

Determinants Containing Powers of Generalized Fibonacci Numbers 1 2 3 47 6 23 11 Journal of Integer Sequences, Vol 19 (2016), Artcle 1671 Determnants Contanng Powers of Generalzed Fbonacc Numbers Aram Tangboonduangjt and Thotsaporn Thanatpanonda Mahdol Unversty Internatonal

More information

Matrix Approximation via Sampling, Subspace Embedding. 1 Solving Linear Systems Using SVD

Matrix Approximation via Sampling, Subspace Embedding. 1 Solving Linear Systems Using SVD Matrx Approxmaton va Samplng, Subspace Embeddng Lecturer: Anup Rao Scrbe: Rashth Sharma, Peng Zhang 0/01/016 1 Solvng Lnear Systems Usng SVD Two applcatons of SVD have been covered so far. Today we loo

More information

Salmon: Lectures on partial differential equations. Consider the general linear, second-order PDE in the form. ,x 2

Salmon: Lectures on partial differential equations. Consider the general linear, second-order PDE in the form. ,x 2 Salmon: Lectures on partal dfferental equatons 5. Classfcaton of second-order equatons There are general methods for classfyng hgher-order partal dfferental equatons. One s very general (applyng even to

More information

Smarandache-Zero Divisors in Group Rings

Smarandache-Zero Divisors in Group Rings Smarandache-Zero Dvsors n Group Rngs W.B. Vasantha and Moon K. Chetry Department of Mathematcs I.I.T Madras, Chenna The study of zero-dvsors n group rngs had become nterestng problem snce 1940 wth the

More information

Problem Set 9 Solutions

Problem Set 9 Solutions Desgn and Analyss of Algorthms May 4, 2015 Massachusetts Insttute of Technology 6.046J/18.410J Profs. Erk Demane, Srn Devadas, and Nancy Lynch Problem Set 9 Solutons Problem Set 9 Solutons Ths problem

More information

Composite Hypotheses testing

Composite Hypotheses testing Composte ypotheses testng In many hypothess testng problems there are many possble dstrbutons that can occur under each of the hypotheses. The output of the source s a set of parameters (ponts n a parameter

More information

Expected Value and Variance

Expected Value and Variance MATH 38 Expected Value and Varance Dr. Neal, WKU We now shall dscuss how to fnd the average and standard devaton of a random varable X. Expected Value Defnton. The expected value (or average value, or

More information

CHAPTER III Neural Networks as Associative Memory

CHAPTER III Neural Networks as Associative Memory CHAPTER III Neural Networs as Assocatve Memory Introducton One of the prmary functons of the bran s assocatve memory. We assocate the faces wth names, letters wth sounds, or we can recognze the people

More information

Economics 130. Lecture 4 Simple Linear Regression Continued

Economics 130. Lecture 4 Simple Linear Regression Continued Economcs 130 Lecture 4 Contnued Readngs for Week 4 Text, Chapter and 3. We contnue wth addressng our second ssue + add n how we evaluate these relatonshps: Where do we get data to do ths analyss? How do

More information

Cocyclic Butson Hadamard matrices and Codes over Z n via the Trace Map

Cocyclic Butson Hadamard matrices and Codes over Z n via the Trace Map Contemporary Mathematcs Cocyclc Butson Hadamard matrces and Codes over Z n va the Trace Map N. Pnnawala and A. Rao Abstract. Over the past couple of years trace maps over Galos felds and Galos rngs have

More information

= = = (a) Use the MATLAB command rref to solve the system. (b) Let A be the coefficient matrix and B be the right-hand side of the system.

= = = (a) Use the MATLAB command rref to solve the system. (b) Let A be the coefficient matrix and B be the right-hand side of the system. Chapter Matlab Exercses Chapter Matlab Exercses. Consder the lnear system of Example n Secton.. x x x y z y y z (a) Use the MATLAB command rref to solve the system. (b) Let A be the coeffcent matrx and

More information

MATH 5707 HOMEWORK 4 SOLUTIONS 2. 2 i 2p i E(X i ) + E(Xi 2 ) ä i=1. i=1

MATH 5707 HOMEWORK 4 SOLUTIONS 2. 2 i 2p i E(X i ) + E(Xi 2 ) ä i=1. i=1 MATH 5707 HOMEWORK 4 SOLUTIONS CİHAN BAHRAN 1. Let v 1,..., v n R m, all lengths v are not larger than 1. Let p 1,..., p n [0, 1] be arbtrary and set w = p 1 v 1 + + p n v n. Then there exst ε 1,..., ε

More information

PRIMES 2015 reading project: Problem set #3

PRIMES 2015 reading project: Problem set #3 PRIMES 2015 readng project: Problem set #3 page 1 PRIMES 2015 readng project: Problem set #3 posted 31 May 2015, to be submtted around 15 June 2015 Darj Grnberg The purpose of ths problem set s to replace

More information

Provable Security Signatures

Provable Security Signatures Provable Securty Sgnatures UCL - Louvan-la-Neuve Wednesday, July 10th, 2002 LIENS-CNRS Ecole normale supéreure Summary Introducton Sgnature FD PSS Forkng Lemma Generc Model Concluson Provable Securty -

More information

Recover plaintext attack to block ciphers

Recover plaintext attack to block ciphers Recover plantext attac to bloc cphers L An-Png Bejng 100085, P.R.Chna apl0001@sna.com Abstract In ths paper, we wll present an estmaton for the upper-bound of the amount of 16-bytes plantexts for Englsh

More information

MEM 255 Introduction to Control Systems Review: Basics of Linear Algebra

MEM 255 Introduction to Control Systems Review: Basics of Linear Algebra MEM 255 Introducton to Control Systems Revew: Bascs of Lnear Algebra Harry G. Kwatny Department of Mechancal Engneerng & Mechancs Drexel Unversty Outlne Vectors Matrces MATLAB Advanced Topcs Vectors A

More information

Lecture 10: May 6, 2013

Lecture 10: May 6, 2013 TTIC/CMSC 31150 Mathematcal Toolkt Sprng 013 Madhur Tulsan Lecture 10: May 6, 013 Scrbe: Wenje Luo In today s lecture, we manly talked about random walk on graphs and ntroduce the concept of graph expander,

More information

THERE ARE NO POINTS OF ORDER 11 ON ELLIPTIC CURVES OVER Q.

THERE ARE NO POINTS OF ORDER 11 ON ELLIPTIC CURVES OVER Q. THERE ARE NO POINTS OF ORDER 11 ON ELLIPTIC CURVES OVER Q. IAN KIMING We shall prove the followng result from [2]: Theorem 1. (Bllng-Mahler, 1940, cf. [2]) An ellptc curve defned over Q does not have a

More information

The Second Anti-Mathima on Game Theory

The Second Anti-Mathima on Game Theory The Second Ant-Mathma on Game Theory Ath. Kehagas December 1 2006 1 Introducton In ths note we wll examne the noton of game equlbrum for three types of games 1. 2-player 2-acton zero-sum games 2. 2-player

More information