Report on Private Information Retrieval over Unsynchronized Databases
|
|
- Vincent Barton
- 5 years ago
- Views:
Transcription
1 Report o Private Iformatio Retrieval over Usychroized Databases Lembit Valgma Supervised by Vitaly Skachek May 25, Problem Statemet There are may challeges cocerig olie privacy. Private iformatio retrieval (PIR) tries to fid solutio to followig problem. Server has a database of records ad cliet wats to retrieve w-th record without revealig w to the server. PIR schemes ca be described for sigle-server ad multi-server case (where each server holds idetical copy of database). Curret report reviews a multi-server scheme proposed by Fati ad Ramchadra [1]. They adapt a previously described scheme [2] by addig ability to hadle some umber of usychroized records. Scheme also allows some servers to collaborate without discoverig w. 1.1 Formal Problem Descriptio We have d servers, each holdig a copy of database with records. Let f i represet the value of i-th database record, the etire database ca be described by f = [ f 1,..., f ] T. Cliet wats to retrieve f w without revealig w to server(s). Up to s records ca be usychroized. We assume that all of the records belog to fiite field GF(2 l ) (have l bits). Up to k < d servers ca collaborate with each other. All servers follow protocol, but will try to lear as much iformatio as possible (hoest-but-curious model). 1.2 Basic PIR Scheme Here we describe a simple PIR scheme with oly two servers which both hold idetical copy of f. For simplicity, let all records be sigle bit ( or 1). Cliet s iterest could be represeted by idicator vector e w {,1} which cosists of s except o w-th idex which is 1. To disguise e w, cliet chooses a radom vector a {,1} ad costructs two queries (oe for each server) q(1) = a, q(2) = a e w. Servers compute ier product betwee received query vector ad database records ad both retur aswer (oe bit) to cliet r(1) = a T f, r(2) = (a e w ) T f = a T f e T wf = a T f f w Cliet sums the aswers ad obtais f w (sice a T f cacel out) r(1) r(2) = a T f (a T f f w ) = (a T f a T f) f w = f w. 1
2 Sice a ad a e w appear radom bit-strigs ad servers caot commuicate with each other, the servers have o way of figurig out which record the cliet was iterested i. The scheme ca be easily exteded for records loger tha oe bit. Figure 1: Basic two-server PIR scheme [1] for database size = 3. Cliet is iterested i f 1 ad sets (e w ) 1 = 1. Whe summig the aswers, f 2 ad f 3 cacel out ad cliet obtais f Requiremets ad Proposed Solutio Described scheme was ice ad simple, but it assumes that 1. Both servers have idetical database (o record usychroized). 2. Servers do ot exchage iformatio. Neither of these assumptios is very realistic. Authors i [1] describe a scheme that deals with both of these issues. They take pragmatic two-step approach 1. Locate idices of usychroized records. 2. Costruct PIR query that avoids those records ad allows up to k servers to collude 1. As log as the umber of usychroized records is small ad at least some servers do ot collude, the scheme ca hide the idex of the record that cliet is iterested i. 2 Phase 1: Locatig Usychroized Records We have d servers (S 1,...,S d ) ad cliet wats to fid out the locatios of records that are ot idetical over all servers. There are at most s such records. Sice at this poit, cliet is ot iterested i the cotet of the records, we ca use hashes istead of full records to reduce the commuicatio ad computatioal complexity. Still we assume that hashes belog to GF(2 l ). Let f j represet the database of S j ad H(f j ) its elemetwise hashed vector. We kow that with very high probability, if the records are ot equal the hashes of that record are ot equal. 1 By collusio of k servers, we mea that after the protocol has fiished, ay collectio of up to k servers ca combie their iformatio ad based o that collective iformatio figure out which record, w, cliet was iterested i. Iformatio from all other servers is ukow. 2
3 2.1 Basic Method Give two servers, S 1 ad S 2, we defie vector r() = H(f 1 ) H(f 2 ). (1) If records are the same i both servers, r() is zero. Otherwise, it has o-zero etries where records are ot equal. Sice most of the database is assumed to be sychroized, r() cosists mostly of zeros ad has up to s o-zero elemets. Sice we are iterested oly i o-zero etries, we ca compress r() by left-multiplyig it with parity check matrix A (m ) to obtai vector of parity symbols y y = A r(). (2) Figure 2: Basic compressio setup [1] with parity check matrix A. Sparse r() ca be recovered from y which is of legth m <. If A is well costructed, r() ca be recostructed from y. I particular, authors i [1] use Reed- Solomo (RS) codes [4]. I systematic RS codes, the codeword cosists of origial vector ad 2s parity symbols that allow to fix s errors i the origial vector. Thus, for our case the RS codeword for r() would be [r() T,g 1,g 2,...,g 2s ], which would allow to fix up to s errors i r(). Sice there are up to s o-zero etries, we ca assume first elemets of codeword to be zero ad still ca recover origial r(). Thus oly 2s values eed to be set ad y = [g 1,g 2,...,g 2s ]. Sice r() is ot actually kow to ay server (sice it s the differece of database records), both servers have to separately apply A to its hash-vector ad sed the 2s values to cliet. Sice by liearity A r() = A ( H(f 1 ) H(f 2 ) ) = ( A H(f 1 ) ) ( A H(f 2 ) ) = r(1) r(2) = y, (3) cliet ca combie the replies to recostruct r(). That way cliet ca get compressed replies from all servers ad do pairwise recostructio to fid usychroized records betwee (S 1,S 2 ),(S 2,S 3 ),...(S d 1,S d ). Takig uio would give all usychroized records. Problem with this approach is that cliet eeds to do d recostructios which is computatioally expesive. Therefore authors describe a scheme for doig oly oe recostructio. 3
4 2.2 More Efficiet Method At first we describe the ucompressed method Defie a degree d 1 polyomial q(x) = X d 1 + X d X 2 + X. (4) Cliet calculates for each server S j the polyomial value q( j) ad seds each server its value. Server multiplies the each database hash with the received value ad seds the vector to cliet r( j) = q( j)h(f j ) (5) Cliet iterpolates where V is d d matrix ˆr() T = [,...,1] V 1 R, (6) }{{} 1 d V = 2 d 1 2 d , or V i, j = i d j (7) d d 1 d d 2... d ad R is d matrix r(1) T R =.... (8) r(d) T Authors [1] show that for such ˆr(), if f i is sychroized the ˆr() i = ad if f i is ot sychroized the with very high probability ˆr() i. Authors also show that ˆr() ca be similarly compressed usig RS codes. Each server multiplies its respose with A to get A r( j) ad seds oly 2s symbols, ˆr( j). Usig values ˆr( j) cliet ca costruct vector y y = [ˆr(1),..., ˆr(d)](V 1 ) T 1 = ART (V 1 ) T = A(V 1 R) T... = A([,...,,1]V 1 R) = Aˆr(). 1 Give y ad A, cliet ca recostruct ˆr() usig the RS decodig procedure, same way as i Basic method. As see, cliet oly had to do oe RS decodig procedure, sigificatly reducig computatioal complexity. To icrease efficiecy, values q( j), r( j) ca be precomputed by server ad cliet simply seds j ad s. 1 (9) 4
5 Figure 3: Idetifyig usychroized records without compressio [1], 3 records ad 3 servers. f 2 is differet i S 2 ad therefore the recovered ˆr() has o-zero etry o that locatio. 3 Phase 2: Retrievig the Wated Record At the ed of Phase 2, cliet kows the idices of usychroized records. Sice those records are ureliable, we wat to avoid usig their values i our scheme. Now we deal with database records directly, ot hashes aymore. Cosider the simple scheme preseted i 1.2. If we kow that f i is usychroized, we simply set a i =. The i the reply calculatios, elemet f i is multiplied with ad it does t have ay effect o the replies. We follow similar logic i the collusio resistat scheme. 3.1 Collusio Resistat Scheme We have d servers ad allow k of them to collude. The followig scheme preserves secrecy of w. Authors use polyomials. Namely, we show how to desig degree k polyomial r(x) such that r() = f w. The cliet seds istructios to each server how to evaluate the polyomial at differet poits (server S j evaluates r( j)) ad fially cliet ca iterpolate r(). Sice correct iterpolatio of degree k polyomial requires k + 1 values, up to k servers ca combie ifo ad still ot fid out f w. To achieve that, first cliet geerates for each record degree k polyomial q(x) i with radom coefficiets, however costat terms are for all polyomials except for q(x) w, where it is 1. The we have k q(x) i = a i, j X k j+1 + (e w ) i, i = 1,..., (1) j=1 where a i, j are radomly draw from GF(2 l ). Now cliet evaluates all polyomials at d distict poits to obtai d vectors of legth q( j) = [q( j) 1,q( j) 2,...,q( j) ], j = 1,...,d. (11) 5
6 Cliet seds to server S j vector q( j). Sice selectio of polyomial coefficiets was radom, q( j) also seems radom. Server calculates the ier product betwee q( j) ad f ad seds reply to cliet. That ier product represets our polyomial r(x) sice r(x) = q(x) T f = = = ( f i k j=1 ( ) k a i, j X k j+1 + (e w ) i j=1 a i, j X k j+1 ) + k f i a i, j )X j=1( k j+1 + f w. f i (e w ) i = ( ) k f i a i, j X k j+1 + f i (e w ) i j=1 ( ) k f i a i, j X k j+1 + f w j=1 We ca see that r(x) is degree k polyomial with coefficiets f ia i, j ad that r() = f w. For iterpolatio we ca use the matrix V defied i Equatio 7. The f i = [ ]... A T r = V e T f = V w... r() (12), (13) from where f w = r() = [,...,,1]V 1 r. (14) 3.2 Obfuscatig Usychroized Idices The method described i previous sectio assumed that there were o usychroized records. If cliet kows that some record f k is ot sychroized, he ca simply set the query vector elemet to zero, q( j) k = for all servers. To maitai the distributio of polyomials, it makes sese to first check if there exist ay zero polyomials for some record that is sychroized ad assig the origial k-th polyomial to that record. If there are eough zero polyomials, the this procedure would maitai the umber of zero polyomials ad simply permute the order of polyomials - sice they are radom ayway this would t affect the distributio. Assigig s to usyced records would still allow colludig servers to discover the usyced records (ad thus reducig somewhat the possible rage for w) if they see that some query idices are s for may servers. Thus, cliet ca pick a radom umber for each server, p(i) which to add to each query elemet ˆq( j) = q( j) + p( j). (15) Server reply would be ˆr( j) = ˆq( j) T f = (q( j) + p( j)) T f = q( j) T f + p( j) f i. (16) If server seds ˆr( j) ad f i, the cliet ca calculate p( j) f i ad subtract this from ˆr( j) to get origial r( j). 6
7 Figure 4: Example of Phase 2 of the PIR algorithm [1]. Agai 3 records, 3 servers. Cliet wats to obtai f 1 ad kows that f 2 i usychroized. He fids zero polyomial from sychroized records ad swaps it with secod polyomial. The evaluates polyomials at j ad adds radom umber p( j). Servers fid ier products ad also the sum of its records T j = f j i. Cliet subtracts p( j)t j from replies ad iterpolates to obtai f 1. 4 Efficiecy ad privacy I case of smaller database size ad there ot beig eough zero polyomials to swap (to usyced locatios), the cliet is forced to simply set zero polyomials to those locatios. As metioed, this ca leak iformatio for colludig servers ad reduce rage for w. Authors show that if umber of usychroized records grows subliearly i the database size, the leaked ifo is asymptotically egligible. 4.1 Efficiecy The described RS code based scheme has commuicatio complexity of dl(log 2 d + 2sclog l L + log 2 ζ + + ζ L) where = database size, d = umber of servers, L = record size, ζ = umber of records requested, 2 l = field size. Olie server computatio complexity of ad olie cliet computatioal complexity of L(ζ + 2s) O(d 3 ) + O(ζ 3 d 2 L). Largest computatioal overhead appears i the RS codig decode phase, which is cubic i database size. To solve that, authors also propose probabilistic compressio scheme PULSE [3]. It trades small error probability ad somewhat larger commuicatio vector for much better decodig speed (O(ds) istead of O(d 3 )). 7
8 Refereces [1] Giulia Fati ad Kaa Ramchadra. Efficiet private iformatio retrieval over usychroized databases. IEEE Joural of Selected Topics i Sigal Processig, 9(7): , , 2, 3, 4, 5, 7, 9 [2] Ia Goldberg. Improvig the robustess of private iformatio retrieval. I Security ad Privacy, 27. SP 7. IEEE Symposium o, pages IEEE, [3] Sameer Aadrao Pawar. Pulse: Peelig-based ultra-low complexity algorithms for sparse sigal estimatio. PhD thesis, Uiversity of Califoria, Berkeley, [4] Ro Roth. Itroductio to codig theory. Cambridge Uiversity Press,
9 5 Appedix A - Algorithms Figure 5: Detailed algorithms [1] for locatig usychroized records ad recoverig desired records. Additioally, Algorithm 2 here is parameter ζ that allows to recover several records with oe query. This allows to reduce the commuicatio overhead somewhat. 9
UC Berkeley CS 170: Efficient Algorithms and Intractable Problems Handout 17 Lecturer: David Wagner April 3, Notes 17 for CS 170
UC Berkeley CS 170: Efficiet Algorithms ad Itractable Problems Hadout 17 Lecturer: David Wager April 3, 2003 Notes 17 for CS 170 1 The Lempel-Ziv algorithm There is a sese i which the Huffma codig was
More informationMath 155 (Lecture 3)
Math 55 (Lecture 3) September 8, I this lecture, we ll cosider the aswer to oe of the most basic coutig problems i combiatorics Questio How may ways are there to choose a -elemet subset of the set {,,,
More informationStatistics 511 Additional Materials
Cofidece Itervals o mu Statistics 511 Additioal Materials This topic officially moves us from probability to statistics. We begi to discuss makig ifereces about the populatio. Oe way to differetiate probability
More informationLecture 11: Pseudorandom functions
COM S 6830 Cryptography Oct 1, 2009 Istructor: Rafael Pass 1 Recap Lecture 11: Pseudoradom fuctios Scribe: Stefao Ermo Defiitio 1 (Ge, Ec, Dec) is a sigle message secure ecryptio scheme if for all uppt
More information1 Generating functions for balls in boxes
Math 566 Fall 05 Some otes o geeratig fuctios Give a sequece a 0, a, a,..., a,..., a geeratig fuctio some way of represetig the sequece as a fuctio. There are may ways to do this, with the most commo ways
More information1 Hash tables. 1.1 Implementation
Lecture 8 Hash Tables, Uiversal Hash Fuctios, Balls ad Bis Scribes: Luke Johsto, Moses Charikar, G. Valiat Date: Oct 18, 2017 Adapted From Virgiia Williams lecture otes 1 Hash tables A hash table is a
More informationHashing and Amortization
Lecture Hashig ad Amortizatio Supplemetal readig i CLRS: Chapter ; Chapter 7 itro; Sectio 7.. Arrays ad Hashig Arrays are very useful. The items i a array are statically addressed, so that isertig, deletig,
More informationThe picture in figure 1.1 helps us to see that the area represents the distance traveled. Figure 1: Area represents distance travelled
1 Lecture : Area Area ad distace traveled Approximatig area by rectagles Summatio The area uder a parabola 1.1 Area ad distace Suppose we have the followig iformatio about the velocity of a particle, how
More informationThe Random Walk For Dummies
The Radom Walk For Dummies Richard A Mote Abstract We look at the priciples goverig the oe-dimesioal discrete radom walk First we review five basic cocepts of probability theory The we cosider the Beroulli
More informationThe multiplicative structure of finite field and a construction of LRC
IERG6120 Codig for Distributed Storage Systems Lecture 8-06/10/2016 The multiplicative structure of fiite field ad a costructio of LRC Lecturer: Keeth Shum Scribe: Zhouyi Hu Notatios: We use the otatio
More informationElement sampling: Part 2
Chapter 4 Elemet samplig: Part 2 4.1 Itroductio We ow cosider uequal probability samplig desigs which is very popular i practice. I the uequal probability samplig, we ca improve the efficiecy of the resultig
More informationSNAP Centre Workshop. Basic Algebraic Manipulation
SNAP Cetre Workshop Basic Algebraic Maipulatio 8 Simplifyig Algebraic Expressios Whe a expressio is writte i the most compact maer possible, it is cosidered to be simplified. Not Simplified: x(x + 4x)
More informationRandom Variables, Sampling and Estimation
Chapter 1 Radom Variables, Samplig ad Estimatio 1.1 Itroductio This chapter will cover the most importat basic statistical theory you eed i order to uderstad the ecoometric material that will be comig
More informationLecture 1: Basic problems of coding theory
Lecture 1: Basic problems of codig theory Error-Correctig Codes (Sprig 016) Rutgers Uiversity Swastik Kopparty Scribes: Abhishek Bhrushudi & Aditya Potukuchi Admiistrivia was discussed at the begiig of
More informationAnalysis of Algorithms. Introduction. Contents
Itroductio The focus of this module is mathematical aspects of algorithms. Our mai focus is aalysis of algorithms, which meas evaluatig efficiecy of algorithms by aalytical ad mathematical methods. We
More informationFilter banks. Separately, the lowpass and highpass filters are not invertible. removes the highest frequency 1/ 2and
Filter bas Separately, the lowpass ad highpass filters are ot ivertible T removes the highest frequecy / ad removes the lowest frequecy Together these filters separate the sigal ito low-frequecy ad high-frequecy
More informationInformation Theory and Statistics Lecture 4: Lempel-Ziv code
Iformatio Theory ad Statistics Lecture 4: Lempel-Ziv code Łukasz Dębowski ldebowsk@ipipa.waw.pl Ph. D. Programme 203/204 Etropy rate is the limitig compressio rate Theorem For a statioary process (X i)
More informationHOMEWORK 2 SOLUTIONS
HOMEWORK SOLUTIONS CSE 55 RANDOMIZED AND APPROXIMATION ALGORITHMS 1. Questio 1. a) The larger the value of k is, the smaller the expected umber of days util we get all the coupos we eed. I fact if = k
More informationLecture 4: April 10, 2013
TTIC/CMSC 1150 Mathematical Toolkit Sprig 01 Madhur Tulsiai Lecture 4: April 10, 01 Scribe: Haris Agelidakis 1 Chebyshev s Iequality recap I the previous lecture, we used Chebyshev s iequality to get a
More informationTHE ASYMPTOTIC COMPLEXITY OF MATRIX REDUCTION OVER FINITE FIELDS
THE ASYMPTOTIC COMPLEXITY OF MATRIX REDUCTION OVER FINITE FIELDS DEMETRES CHRISTOFIDES Abstract. Cosider a ivertible matrix over some field. The Gauss-Jorda elimiatio reduces this matrix to the idetity
More informationDisjoint set (Union-Find)
CS124 Lecture 7 Fall 2018 Disjoit set (Uio-Fid) For Kruskal s algorithm for the miimum spaig tree problem, we foud that we eeded a data structure for maitaiig a collectio of disjoit sets. That is, we eed
More informationCS / MCS 401 Homework 3 grader solutions
CS / MCS 401 Homework 3 grader solutios assigmet due July 6, 016 writte by Jāis Lazovskis maximum poits: 33 Some questios from CLRS. Questios marked with a asterisk were ot graded. 1 Use the defiitio of
More informationEstimation for Complete Data
Estimatio for Complete Data complete data: there is o loss of iformatio durig study. complete idividual complete data= grouped data A complete idividual data is the oe i which the complete iformatio of
More informationIntensive Algorithms Lecture 11. DFT and DP. Lecturer: Daniel A. Spielman February 20, f(n) O(g(n) log c g(n)).
Itesive Algorithms Lecture 11 DFT ad DP Lecturer: Daiel A. Spielma February 20, 2018 11.1 Itroductio The purpose of this lecture is to lear how use the Discrete Fourier Trasform to save space i Dyamic
More informationFortgeschrittene Datenstrukturen Vorlesung 11
Fortgeschrittee Datestruture Vorlesug 11 Schriftführer: Marti Weider 19.01.2012 1 Succict Data Structures (ctd.) 1.1 Select-Queries A slightly differet approach, compared to ra, is used for select. B represets
More informationProblem Set 2 Solutions
CS271 Radomess & Computatio, Sprig 2018 Problem Set 2 Solutios Poit totals are i the margi; the maximum total umber of poits was 52. 1. Probabilistic method for domiatig sets 6pts Pick a radom subset S
More informationModule 5 EMBEDDED WAVELET CODING. Version 2 ECE IIT, Kharagpur
Module 5 EMBEDDED WAVELET CODING Versio ECE IIT, Kharagpur Lesso 4 SPIHT algorithm Versio ECE IIT, Kharagpur Istructioal Objectives At the ed of this lesso, the studets should be able to:. State the limitatios
More informationRandom Matrices with Blocks of Intermediate Scale Strongly Correlated Band Matrices
Radom Matrices with Blocks of Itermediate Scale Strogly Correlated Bad Matrices Jiayi Tog Advisor: Dr. Todd Kemp May 30, 07 Departmet of Mathematics Uiversity of Califoria, Sa Diego Cotets Itroductio Notatio
More informationOn a Smarandache problem concerning the prime gaps
O a Smaradache problem cocerig the prime gaps Felice Russo Via A. Ifate 7 6705 Avezzao (Aq) Italy felice.russo@katamail.com Abstract I this paper, a problem posed i [] by Smaradache cocerig the prime gaps
More informationLinear Programming and the Simplex Method
Liear Programmig ad the Simplex ethod Abstract This article is a itroductio to Liear Programmig ad usig Simplex method for solvig LP problems i primal form. What is Liear Programmig? Liear Programmig is
More informationSECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES
SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES Read Sectio 1.5 (pages 5 9) Overview I Sectio 1.5 we lear to work with summatio otatio ad formulas. We will also itroduce a brief overview of sequeces,
More informationLet us consider the following problem to warm up towards a more general statement.
Lecture 4: Sequeces with repetitios, distributig idetical objects amog distict parties, the biomial theorem, ad some properties of biomial coefficiets Refereces: Relevat parts of chapter 15 of the Math
More informationSession 5. (1) Principal component analysis and Karhunen-Loève transformation
200 Autum semester Patter Iformatio Processig Topic 2 Image compressio by orthogoal trasformatio Sessio 5 () Pricipal compoet aalysis ad Karhue-Loève trasformatio Topic 2 of this course explais the image
More informationCS 171 Lecture Outline October 09, 2008
CS 171 Lecture Outlie October 09, 2008 The followig theorem comes very hady whe calculatig the expectatio of a radom variable that takes o o-egative iteger values. Theorem: Let Y be a radom variable that
More information4.3 Growth Rates of Solutions to Recurrences
4.3. GROWTH RATES OF SOLUTIONS TO RECURRENCES 81 4.3 Growth Rates of Solutios to Recurreces 4.3.1 Divide ad Coquer Algorithms Oe of the most basic ad powerful algorithmic techiques is divide ad coquer.
More informationLecture 3: August 31
36-705: Itermediate Statistics Fall 018 Lecturer: Siva Balakrisha Lecture 3: August 31 This lecture will be mostly a summary of other useful expoetial tail bouds We will ot prove ay of these i lecture,
More informationAn Introduction to Randomized Algorithms
A Itroductio to Radomized Algorithms The focus of this lecture is to study a radomized algorithm for quick sort, aalyze it usig probabilistic recurrece relatios, ad also provide more geeral tools for aalysis
More informationDiscrete Mathematics for CS Spring 2008 David Wagner Note 22
CS 70 Discrete Mathematics for CS Sprig 2008 David Wager Note 22 I.I.D. Radom Variables Estimatig the bias of a coi Questio: We wat to estimate the proportio p of Democrats i the US populatio, by takig
More informationECE 564/645 - Digital Communication Systems (Spring 2014) Final Exam Friday, May 2nd, 8:00-10:00am, Marston 220
ECE 564/645 - Digital Commuicatio Systems (Sprig 014) Fial Exam Friday, May d, 8:00-10:00am, Marsto 0 Overview The exam cosists of four (or five) problems for 100 (or 10) poits. The poits for each part
More informationShannon s noiseless coding theorem
18.310 lecture otes May 4, 2015 Shao s oiseless codig theorem Lecturer: Michel Goemas I these otes we discuss Shao s oiseless codig theorem, which is oe of the foudig results of the field of iformatio
More informationCSE 202 Homework 1 Matthias Springer, A Yes, there does always exist a perfect matching without a strong instability.
CSE 0 Homework 1 Matthias Spriger, A9950078 1 Problem 1 Notatio a b meas that a is matched to b. a < b c meas that b likes c more tha a. Equality idicates a tie. Strog istability Yes, there does always
More informationCALCULATION OF FIBONACCI VECTORS
CALCULATION OF FIBONACCI VECTORS Stuart D. Aderso Departmet of Physics, Ithaca College 953 Daby Road, Ithaca NY 14850, USA email: saderso@ithaca.edu ad Dai Novak Departmet of Mathematics, Ithaca College
More informationComplex Numbers Solutions
Complex Numbers Solutios Joseph Zoller February 7, 06 Solutios. (009 AIME I Problem ) There is a complex umber with imagiary part 64 ad a positive iteger such that Fid. [Solutio: 697] 4i + + 4i. 4i 4i
More information[ 11 ] z of degree 2 as both degree 2 each. The degree of a polynomial in n variables is the maximum of the degrees of its terms.
[ 11 ] 1 1.1 Polyomial Fuctios 1 Algebra Ay fuctio f ( x) ax a1x... a1x a0 is a polyomial fuctio if ai ( i 0,1,,,..., ) is a costat which belogs to the set of real umbers ad the idices,, 1,...,1 are atural
More informationClassification of problem & problem solving strategies. classification of time complexities (linear, logarithmic etc)
Classificatio of problem & problem solvig strategies classificatio of time complexities (liear, arithmic etc) Problem subdivisio Divide ad Coquer strategy. Asymptotic otatios, lower boud ad upper boud:
More informationOblivious Transfer using Elliptic Curves
Oblivious Trasfer usig Elliptic Curves bhishek Parakh Louisiaa State Uiversity, ato Rouge, L May 4, 006 bstract: This paper proposes a algorithm for oblivious trasfer usig elliptic curves lso, we preset
More informationOPTIMAL ALGORITHMS -- SUPPLEMENTAL NOTES
OPTIMAL ALGORITHMS -- SUPPLEMENTAL NOTES Peter M. Maurer Why Hashig is θ(). As i biary search, hashig assumes that keys are stored i a array which is idexed by a iteger. However, hashig attempts to bypass
More informationCHAPTER I: Vector Spaces
CHAPTER I: Vector Spaces Sectio 1: Itroductio ad Examples This first chapter is largely a review of topics you probably saw i your liear algebra course. So why cover it? (1) Not everyoe remembers everythig
More informationNICK DUFRESNE. 1 1 p(x). To determine some formulas for the generating function of the Schröder numbers, r(x) = a(x) =
AN INTRODUCTION TO SCHRÖDER AND UNKNOWN NUMBERS NICK DUFRESNE Abstract. I this article we will itroduce two types of lattice paths, Schröder paths ad Ukow paths. We will examie differet properties of each,
More informationw (1) ˆx w (1) x (1) /ρ and w (2) ˆx w (2) x (2) /ρ.
2 5. Weighted umber of late jobs 5.1. Release dates ad due dates: maximimizig the weight of o-time jobs Oce we add release dates, miimizig the umber of late jobs becomes a sigificatly harder problem. For
More informationAs stated by Laplace, Probability is common sense reduced to calculation.
Note: Hadouts DO NOT replace the book. I most cases, they oly provide a guidelie o topics ad a ituitive feel. The math details will be covered i class, so it is importat to atted class ad also you MUST
More informationRun-length & Entropy Coding. Redundancy Removal. Sampling. Quantization. Perform inverse operations at the receiver EEE
Geeral e Image Coder Structure Motio Video (s 1,s 2,t) or (s 1,s 2 ) Natural Image Samplig A form of data compressio; usually lossless, but ca be lossy Redudacy Removal Lossless compressio: predictive
More informationFall 2013 MTH431/531 Real analysis Section Notes
Fall 013 MTH431/531 Real aalysis Sectio 8.1-8. Notes Yi Su 013.11.1 1. Defiitio of uiform covergece. We look at a sequece of fuctios f (x) ad study the coverget property. Notice we have two parameters
More informationMAT1026 Calculus II Basic Convergence Tests for Series
MAT026 Calculus II Basic Covergece Tests for Series Egi MERMUT 202.03.08 Dokuz Eylül Uiversity Faculty of Sciece Departmet of Mathematics İzmir/TURKEY Cotets Mootoe Covergece Theorem 2 2 Series of Real
More informationTopic 9: Sampling Distributions of Estimators
Topic 9: Samplig Distributios of Estimators Course 003, 2018 Page 0 Samplig distributios of estimators Sice our estimators are statistics (particular fuctios of radom variables), their distributio ca be
More information6.867 Machine learning
6.867 Machie learig Mid-term exam October, ( poits) Your ame ad MIT ID: Problem We are iterested here i a particular -dimesioal liear regressio problem. The dataset correspodig to this problem has examples
More informationInfinite Sequences and Series
Chapter 6 Ifiite Sequeces ad Series 6.1 Ifiite Sequeces 6.1.1 Elemetary Cocepts Simply speakig, a sequece is a ordered list of umbers writte: {a 1, a 2, a 3,...a, a +1,...} where the elemets a i represet
More informationCALCULUS BASIC SUMMER REVIEW
CALCULUS BASIC SUMMER REVIEW NAME rise y y y Slope of a o vertical lie: m ru Poit Slope Equatio: y y m( ) The slope is m ad a poit o your lie is, ). ( y Slope-Itercept Equatio: y m b slope= m y-itercept=
More informationECE-S352 Introduction to Digital Signal Processing Lecture 3A Direct Solution of Difference Equations
ECE-S352 Itroductio to Digital Sigal Processig Lecture 3A Direct Solutio of Differece Equatios Discrete Time Systems Described by Differece Equatios Uit impulse (sample) respose h() of a DT system allows
More informationA sequence of numbers is a function whose domain is the positive integers. We can see that the sequence
Sequeces A sequece of umbers is a fuctio whose domai is the positive itegers. We ca see that the sequece,, 2, 2, 3, 3,... is a fuctio from the positive itegers whe we write the first sequece elemet as
More informationBinary codes from graphs on triples and permutation decoding
Biary codes from graphs o triples ad permutatio decodig J. D. Key Departmet of Mathematical Scieces Clemso Uiversity Clemso SC 29634 U.S.A. J. Moori ad B. G. Rodrigues School of Mathematics Statistics
More informationTopic 9: Sampling Distributions of Estimators
Topic 9: Samplig Distributios of Estimators Course 003, 2016 Page 0 Samplig distributios of estimators Sice our estimators are statistics (particular fuctios of radom variables), their distributio ca be
More informationAverage-Case Analysis of QuickSort
Average-Case Aalysis of QuickSort Comp 363 Fall Semester 003 October 3, 003 The purpose of this documet is to itroduce the idea of usig recurrece relatios to do average-case aalysis. The average-case ruig
More informationSequences A sequence of numbers is a function whose domain is the positive integers. We can see that the sequence
Sequeces A sequece of umbers is a fuctio whose domai is the positive itegers. We ca see that the sequece 1, 1, 2, 2, 3, 3,... is a fuctio from the positive itegers whe we write the first sequece elemet
More informationChapter 6 Principles of Data Reduction
Chapter 6 for BST 695: Special Topics i Statistical Theory. Kui Zhag, 0 Chapter 6 Priciples of Data Reductio Sectio 6. Itroductio Goal: To summarize or reduce the data X, X,, X to get iformatio about a
More informationLecture 27. Capacity of additive Gaussian noise channel and the sphere packing bound
Lecture 7 Ageda for the lecture Gaussia chael with average power costraits Capacity of additive Gaussia oise chael ad the sphere packig boud 7. Additive Gaussia oise chael Up to this poit, we have bee
More informationP1 Chapter 8 :: Binomial Expansion
P Chapter 8 :: Biomial Expasio jfrost@tiffi.kigsto.sch.uk www.drfrostmaths.com @DrFrostMaths Last modified: 6 th August 7 Use of DrFrostMaths for practice Register for free at: www.drfrostmaths.com/homework
More informationDS 100: Principles and Techniques of Data Science Date: April 13, Discussion #10
DS 00: Priciples ad Techiques of Data Sciece Date: April 3, 208 Name: Hypothesis Testig Discussio #0. Defie these terms below as they relate to hypothesis testig. a) Data Geeratio Model: Solutio: A set
More informationt distribution [34] : used to test a mean against an hypothesized value (H 0 : µ = µ 0 ) or the difference
EXST30 Backgroud material Page From the textbook The Statistical Sleuth Mea [0]: I your text the word mea deotes a populatio mea (µ) while the work average deotes a sample average ( ). Variace [0]: The
More informationProduct measures, Tonelli s and Fubini s theorems For use in MAT3400/4400, autumn 2014 Nadia S. Larsen. Version of 13 October 2014.
Product measures, Toelli s ad Fubii s theorems For use i MAT3400/4400, autum 2014 Nadia S. Larse Versio of 13 October 2014. 1. Costructio of the product measure The purpose of these otes is to preset the
More informationMath 61CM - Solutions to homework 3
Math 6CM - Solutios to homework 3 Cédric De Groote October 2 th, 208 Problem : Let F be a field, m 0 a fixed oegative iteger ad let V = {a 0 + a x + + a m x m a 0,, a m F} be the vector space cosistig
More informationSEQUENCES AND SERIES
Sequeces ad 6 Sequeces Ad SEQUENCES AND SERIES Successio of umbers of which oe umber is desigated as the first, other as the secod, aother as the third ad so o gives rise to what is called a sequece. Sequeces
More informationAxioms of Measure Theory
MATH 532 Axioms of Measure Theory Dr. Neal, WKU I. The Space Throughout the course, we shall let X deote a geeric o-empty set. I geeral, we shall ot assume that ay algebraic structure exists o X so that
More informationInformation-based Feature Selection
Iformatio-based Feature Selectio Farza Faria, Abbas Kazeroui, Afshi Babveyh Email: {faria,abbask,afshib}@staford.edu 1 Itroductio Feature selectio is a topic of great iterest i applicatios dealig with
More informationSolutions to Math 347 Practice Problems for the final
Solutios to Math 347 Practice Problems for the fial 1) True or False: a) There exist itegers x,y such that 50x + 76y = 6. True: the gcd of 50 ad 76 is, ad 6 is a multiple of. b) The ifiimum of a set is
More informationStatistical Inference (Chapter 10) Statistical inference = learn about a population based on the information provided by a sample.
Statistical Iferece (Chapter 10) Statistical iferece = lear about a populatio based o the iformatio provided by a sample. Populatio: The set of all values of a radom variable X of iterest. Characterized
More informationLinear regression. Daniel Hsu (COMS 4771) (y i x T i β)2 2πσ. 2 2σ 2. 1 n. (x T i β y i ) 2. 1 ˆβ arg min. β R n d
Liear regressio Daiel Hsu (COMS 477) Maximum likelihood estimatio Oe of the simplest liear regressio models is the followig: (X, Y ),..., (X, Y ), (X, Y ) are iid radom pairs takig values i R d R, ad Y
More informationLecture 10: Universal coding and prediction
0-704: Iformatio Processig ad Learig Sprig 0 Lecture 0: Uiversal codig ad predictio Lecturer: Aarti Sigh Scribes: Georg M. Goerg Disclaimer: These otes have ot bee subjected to the usual scrutiy reserved
More informationSTAT Homework 1 - Solutions
STAT-36700 Homework 1 - Solutios Fall 018 September 11, 018 This cotais solutios for Homework 1. Please ote that we have icluded several additioal commets ad approaches to the problems to give you better
More informationPolynomial Multiplication and Fast Fourier Transform
Polyomial Multiplicatio ad Fast Fourier Trasform Com S 477/577 Notes Ya-Bi Jia Sep 19, 2017 I this lecture we will describe the famous algorithm of fast Fourier trasform FFT, which has revolutioized digital
More informationIn algebra one spends much time finding common denominators and thus simplifying rational expressions. For example:
74 The Method of Partial Fractios I algebra oe speds much time fidig commo deomiators ad thus simplifyig ratioal epressios For eample: + + + 6 5 + = + = = + + + + + ( )( ) 5 It may the seem odd to be watig
More information1 Introduction to reducing variance in Monte Carlo simulations
Copyright c 010 by Karl Sigma 1 Itroductio to reducig variace i Mote Carlo simulatios 11 Review of cofidece itervals for estimatig a mea I statistics, we estimate a ukow mea µ = E(X) of a distributio by
More informationInduction: Solutions
Writig Proofs Misha Lavrov Iductio: Solutios Wester PA ARML Practice March 6, 206. Prove that a 2 2 chessboard with ay oe square removed ca always be covered by shaped tiles. Solutio : We iduct o. For
More informationImprovement of Generic Attacks on the Rank Syndrome Decoding Problem
Improvemet of Geeric Attacks o the Rak Sydrome Decodig Problem Nicolas Arago, Philippe Gaborit, Adrie Hauteville, Jea-Pierre Tillich To cite this versio: Nicolas Arago, Philippe Gaborit, Adrie Hauteville,
More informationProperties and Tests of Zeros of Polynomial Functions
Properties ad Tests of Zeros of Polyomial Fuctios The Remaider ad Factor Theorems: Sythetic divisio ca be used to fid the values of polyomials i a sometimes easier way tha substitutio. This is show by
More informationTopic 9: Sampling Distributions of Estimators
Topic 9: Samplig Distributios of Estimators Course 003, 2018 Page 0 Samplig distributios of estimators Sice our estimators are statistics (particular fuctios of radom variables), their distributio ca be
More informationMa 530 Introduction to Power Series
Ma 530 Itroductio to Power Series Please ote that there is material o power series at Visual Calculus. Some of this material was used as part of the presetatio of the topics that follow. What is a Power
More informationSome remarks for codes and lattices over imaginary quadratic
Some remarks for codes ad lattices over imagiary quadratic fields Toy Shaska Oaklad Uiversity, Rochester, MI, USA. Caleb Shor Wester New Eglad Uiversity, Sprigfield, MA, USA. shaska@oaklad.edu Abstract
More informationLecture 12: November 13, 2018
Mathematical Toolkit Autum 2018 Lecturer: Madhur Tulsiai Lecture 12: November 13, 2018 1 Radomized polyomial idetity testig We will use our kowledge of coditioal probability to prove the followig lemma,
More informationBasics of Probability Theory (for Theory of Computation courses)
Basics of Probability Theory (for Theory of Computatio courses) Oded Goldreich Departmet of Computer Sciece Weizma Istitute of Sciece Rehovot, Israel. oded.goldreich@weizma.ac.il November 24, 2008 Preface.
More information6.867 Machine learning, lecture 7 (Jaakkola) 1
6.867 Machie learig, lecture 7 (Jaakkola) 1 Lecture topics: Kerel form of liear regressio Kerels, examples, costructio, properties Liear regressio ad kerels Cosider a slightly simpler model where we omit
More informationCS434a/541a: Pattern Recognition Prof. Olga Veksler. Lecture 5
CS434a/54a: Patter Recogitio Prof. Olga Veksler Lecture 5 Today Itroductio to parameter estimatio Two methods for parameter estimatio Maimum Likelihood Estimatio Bayesia Estimatio Itroducto Bayesia Decisio
More informationMath 113 Exam 3 Practice
Math Exam Practice Exam will cover.-.9. This sheet has three sectios. The first sectio will remid you about techiques ad formulas that you should kow. The secod gives a umber of practice questios for you
More informationEntropies & Information Theory
Etropies & Iformatio Theory LECTURE I Nilajaa Datta Uiversity of Cambridge,U.K. For more details: see lecture otes (Lecture 1- Lecture 5) o http://www.qi.damtp.cam.ac.uk/ode/223 Quatum Iformatio Theory
More informationENGI 4421 Probability and Statistics Faculty of Engineering and Applied Science Problem Set 1 Solutions Descriptive Statistics. None at all!
ENGI 44 Probability ad Statistics Faculty of Egieerig ad Applied Sciece Problem Set Solutios Descriptive Statistics. If, i the set of values {,, 3, 4, 5, 6, 7 } a error causes the value 5 to be replaced
More informationSample Size Determination (Two or More Samples)
Sample Sie Determiatio (Two or More Samples) STATGRAPHICS Rev. 963 Summary... Data Iput... Aalysis Summary... 5 Power Curve... 5 Calculatios... 6 Summary This procedure determies a suitable sample sie
More informationCooperative Communication Fundamentals & Coding Techniques
3 th ICACT Tutorial Cooperative commuicatio fudametals & codig techiques Cooperative Commuicatio Fudametals & Codig Techiques 0..4 Electroics ad Telecommuicatio Research Istitute Kiug Jug 3 th ICACT Tutorial
More informationMASSACHUSETTS INSTITUTE OF TECHNOLOGY Department of Electrical Engineering and Computer Science. BACKGROUND EXAM September 30, 2004.
MASSACHUSETTS INSTITUTE OF TECHNOLOGY Departmet of Electrical Egieerig ad Computer Sciece 6.34 Discrete Time Sigal Processig Fall 24 BACKGROUND EXAM September 3, 24. Full Name: Note: This exam is closed
More informationSignals & Systems Chapter3
Sigals & Systems Chapter3 1.2 Discrete-Time (D-T) Sigals Electroic systems do most of the processig of a sigal usig a computer. A computer ca t directly process a C-T sigal but istead eeds a stream of
More informationSets and Probabilistic Models
ets ad Probabilistic Models Berli Che Departmet of Computer ciece & Iformatio Egieerig Natioal Taiwa Normal Uiversity Referece: - D. P. Bertsekas, J. N. Tsitsiklis, Itroductio to Probability, ectios 1.1-1.2
More information