Gentry s ideal-lattice based encryption scheme. Gentry s STOC 09 paper - Part III
|
|
- Harry Franklin Todd
- 6 years ago
- Views:
Transcription
1 Getry s ideal-lattice based ecryptio scheme Getry s STOC 09 paper - Part 1
2 From Micciacio's paper
3 Why ideal lattices --- as opposed to just ideals or lattices? We described a ideal-based ecryptio scheme Σ. Ec ( B ) Recall X Samp, P ad X R mod B. The scheme is correct for circuit C if x,, x X, g( C) x,, x X. Dec ( ) 1 t Ec 1 t Dec For Σ to be correct as a ordiary ecryptio scheme, we require: X X. For Σ Ec Dec to be additively ad multiplicatively homomorphic, we require: XEc + XEc XDec ad XEc XEc XDec. 3
4 Our goal is to have gc ( ) ( X ) Ec Dec circuits C, icludig the decryptio circuit D. X for deep eough Σ So, we wat to aalyze, for example, how ( ) ( ) ( ) X + X X + X X X Ec Ec Ec Ec expad, ad how to esure ( ) ( ) ( ) Ec X + X X + X X X Ec Ec Ec Ec Ec Ec Ec X Dec. Coectig ideals with lattices makes such aalysis possible, because, with R= [ x] ( f( x)), X ad X become subsets of Ec Dec ad we ca aalyze them geometrically. 4
5 statiate the ideal-based scheme To istatiate the (abstract) ideal-based ecryptio scheme usig ideal lattices, we will do the followig. Choose a polyomial ( ) let rig R= [ x] f( x). f( x) with iteger coefficiets ad Choose a elemet s R, ideal = s, B = the rotatio basis. Plaitext space M: a subset of C( B ), cetered parallelepiped. Samp: choose a rage for Samp. Samp ( ) Choose a ideal ad a good basis B. pk Let B = HNF( B ). 5
6 deal Lattices 6
7 [ x] ( f( x ) ) : a polyomial rig [ x]: the rig of all polyomials with iteger coefficiets. f( x): a moic polyomial of degree i [ x] Moic meas the leadig coefficiet is 1 Ofte choose f( x) to be irreducible. ( f( x) ) : the ideal geerated by f( x). ( f( x) ) = f( x) [ x] = { f( x) g( x): g x x } ( ) [ ]. gx ( ) h( x)mod f( x) iff g( x) hx ( ) is divisible by f( x). [ x] is divided ito classes (cosets) such that gx ( ) ad hx ( ) are i the same class (coset) iff gx ( ) hx ( )mod f( x). 7
8 [ x] ( f( x) ): [ x] ( f( x)) deotes the set of those classes (cosets). Each class has exactly oe polyomial of degree 1. Thus, [ x] ( f x ) ( ) may also be polyomials of degree 1, i.e., defied as the set of all ( ) { 1 = } a1x + a0 ai [ x] f( x) a x : Additio ad multiplicatio i [ x] ( f ( x)) are like regular polyomial additio ad multiplicatio except that the result is reduced modulo f( x). ( f x ) [ x] ( ) is a commutative rig with idetity.. 8
9 f a( x) = a x + + ax+ a ad b( x) = b x + + bx+ b, the ax ( ) + bx ( ) = ( a + b ) x + + ( a+ b) x+ ( a + b). The group [ x] ( f( x)) [x] ( f ( x)) as a additive group is isomorphic to the lattice. a + ax+ + a x ( a, a,, a ). Defie multiplicatio i by way of multiplicatio i [ x] ( f( x)), ad the we have multiplicatio i. Each ideal i [x] ( f( x)) defies a sublattice i. Lattices correspodig to ideals are ideal latti ces. 9
10 Rotatio basis for pricipal ideal ( v) Sice R= [ x] ( f( x)), we do ot distiguish betwee rig elemets i R ad lattice poits/vectors i. Ay ideal i R correspods to a lattice i. ( ) [ ] particular, the ideal v geerated by 0 v R defies a lattice with basis B= v,, v, where v i = v 0 1 x i mod f( x). This basis is called the rotatio basis for the ideal lattice ( v). Not every ideal has a rotatio basis. 10
11 Examples ( ) = R = e = [ e e v ] deal Rotatio basis,,,. deal lattice = ( ) = R= { R eve } [ e e v ] deal 2 2 all polyomials i with coefficiets. Rotatio basis: 2, 2,, all lattice poits i Correspodig lattice, 2 =. with eve coordiates ( + x) ( + ) Q: Fid the rotatio basis of 2 or 2 e e
12 [ x] ( f( x)) ad fractioal ideals [ x]: the rig of polyomials with ratioal coefficiets. { 1 } i [ x] ( f( x)) = a x + + ax+ a : a. R= x f x 1 { v [ x] ( f( x)) : v R} R. 1 f is a ideal i [ ] ( ( )), defie as 1 is a fractioal ideal. t behaves like a ideal of except that it is ot ecessarily cotaied i R.. is said to be ivertible if =. 1 1 R R All ivertible (fractioal) ideals form a group with as the idetity. R R 12
13 [x] ( f( x)) ad fractioal ideals ( ) ( ) f, the is geerated by [ ] ( ( )). = v = v v x f x v 1 exists if f( x) is irreducible. 1 defies a lattice i, ot ecessarily i. ( t ) We have de ( 1 det ) = 1. [ ] ( ) ( ) Recall: det = det B = det L( B ) = vol P( B ), the volum of the fudametal parallelepiped of the lattice defied by. det = the idex R: the umber of elemets i R. 13
14 Review Hermite oral form (HNF): a basis which is iy, ew, ad will be used as a pk. Cetered [ ) [ ] fudametal parallelepiped: // B= b,, b // P( B) xibi : xi 12, 12 i= 1 t mod B the uique t P( B) with t t L( B). tmod B ca be efficietly computed as t B B t x x rouded to the earest iteger. { } B max b : b B. i i 14
15 statiatig the ideal-based scheme usig ideal lattices 15
16 From Micciacio's paper
17 Recall: To istatiate the (abstract) ideal-based ecryptio scheme usig (ideal) lattices, we will do the followig. ( ) Choose a polyomial f( x) ad let rig R= [ x] f(). x Choose a vector s, let ideal = s, let B = the rotatio basis. ( ) Plaitext space M: a subset of P( B ). Samp: choose a rage Samp for Samp. Choose a ideal ad a good basis B. pk Let B = HNF( B ). Our goal is to have gc ( ) ( X ) circuits C, icludig the decryptio circui t D. Ec X Dec for deep eough Σ 17
18 Balls: Ec Dec B( r ) ad B( r ) Ec Ec ( M) X Samp B,. Dec X R mod B = P( B ). Defie: r the smallest radius s.t. X B ( r ), Ec r the largest radius s.t. B ( r ) X Ec Dec Dec Dec. Theorem ( a sufficiet coditio for permitted circuits): A mod B -circuit C (icludig the idetity circuit) with t 1 iputs is a permitted circuit for the schecme if: x,, x ( r ), gc ( ) 1 t Ec B ( ) x,, x B ( r ). 1 t Dec 18
19 X Ec X Dec B ( r ) Ec B ( r ) Dec 19
20 20
21 Expasio of vectors with operatios Startig from B : = B( r ), how does B expad with Ec additio ad multiplicatio? u+v u + v for all u, v R (triagle iequality). u v γ u v for all uv, R, where Mult is a factor depedet o R. Let m = γ. Mult γ Mult f iput vectors are i B( r), the after a m-fa-i additio or a 2-fa-i multiplicatio, the output vecto 2 r is i ( mr ). B 21
22 By iductio, if iput vectors are i B( r Ec ( ) Ec Ec ), the after k levels of m-fa-i additio ad/or 2-fa-i multiplicatio, k k k the result is i B( m r ) B ( mr ). We will have ( mr ) Ec 2 k r if k log log r log log mr. Dec Dec Ec Theorem: The proposed scheme correctly evaluates ( γ r ) circuits of depth up to log log r log log. To maximize the depth attempt to subject of Σ Dec Mult Ec permitted circuits, we will miimize r ad γ ad maximize to security costraits. Ec Mult Dec r 22
23 Security costraits Roughly: the ratio r r must be subexpoetial. Dec Ec Recall: the security of the abstract scheme relies o the hardess of CP. the settig of ideal lattices (where π is chose to be pk shorter tha rec ad t: = mod B ), CP becomes: Decide whether t is withi a small distace ( rec) of lattice, or is uiformly radom modulo. This is a decisio versio of BDDP, which is ot surprisig sice the abstract scheme is a variat of GGH ad the security of GGH relies o the hardess of BDDP. 23
24 Roughly: the ratio r r must be sub-expoetial. Dec Ec f r is too small, say r λ ( ) 2, BDDP ca be Ec Ec 1 solved usig, for example, the LLL algorithm. No algorithm is kow to solve BDDP if rec λ1 ( ) 2, c < 1. O the other had, by defiitio, we have rde c λ1( ). Thus, for BDDP to be hard, we require r r 2, c< 1 //sub-expoetial// Dec Ec 1 f we choose 2 c, r = Dec c γ Mult r = Ec ca hadle circuits of depth up to ( c 2 c2 c 1 2, the the scheme )log. c 24
25 Miimizig γ ( R) Mult Goal: Set f( x) so that R= [ x] ( f( x)) has a small γ ( R). Mult To this ed, we oly have to choose f( x) such that f( x) ad gx ( ) have small orms, due to the followig theorem. Theorem: f f( x) is a moic polyomial of degree the γ Mult ( ) ( R) f g, gx= Fx x x x where ( ) ( ) mod //iverse i [ ] ( ) // F( x) = x f(1 x) //reversig the coefficiets of f( x)// 2 = i = + + p a for px ( ) ax a //polyomial orm// 0 25
26 Theorem: f f( x) = x hx ( ) where hx ( ) has degree at most ( 1) k, k 2, the, for R= [ x] ( f( x)), γ Mult ( ( ) k ) ( R) ( k 1) f. Theorem: Let f( x) = x ± 1 ad R= [ x] ( f ( x)). The, γ Mult ( R). There are o-fatal attacks o hard problems over this rig. 26
27 Miimizig r Ec ( ) Let R= [ x] f( x) with f( x) = x 1 ad so γ ( R). Let s R, ad = ( s) the ideal geerated by s, Mult ( ) { } B = s,, s the rotatio basis of s, B = max s, 0 1 i L( B ) the lattice geerated by B, P( B ) the cetered fudametal parallelepiped, M P( B ) the message space, x M a message, ( ) = + 1 ( R) ( B, ) Samp B,x : x Samp s. We wat Samp M X B( r ). Samp 1 Ec Let be a upper boud o r, Ec r 1 ( R) Samp. 27
28 Theorem: r B + B. Proof : Ec Samp 1 ( ) { x r s x r } r = max + : M, Samp R. Ec 1 1 Sice x M P( B ) x s 2 B x+ r s x + i i= 0 r s B + B Samp 1. May choose s= 2 e to make B small. Q: why ot s = e? The size of Samp Samp 1 is a security. t eeds to be large eough to pk make t Samp ( R) mod B i CP sufficietly radom. May set = ad let Samp sample uiformly i B( ). 1.5 With this settig, rec
29 Maximizig r Dec Dec Dec Dec ( ψ B ) Recall: the decryptio equatio: π mod mod B. We wat B( r ) X P( B ). r To have a large, the shape of P( B ) is importat. We wat it to be "fat" (i.e. cotaiig a large ball). The "fattest" parallelepiped is that associated with basis ( ) t E= t e,, t e, cotaiig a ball of radius t. 1 So, we will choose our B to be "close" to t E. Q: why ot simply lettig B = t e,, t e? B ( ) 1 29
30 Theorem: Let t 4 s γ ( R). Suppose v t e + B( s), Mult 1 1 i.e., withi distace s of t e. Let B be the rotatio basis of v. The, P( B Proof: 1 1 ) circumscribes a ball of radius at least t 4. ( ) i 1 We have = 1,,, with i 1. The differece ( ) has legth z = v t e = v t e x s γ ( R). j j j j Mult For every poit a o the surface of P( B ), we have 1 a=± vi + 2 z = v t e a v j i B v v v = v j j j for some i ad a 1 2. j j j We will show a t 4, from which the theorem will follow. x 30
31 1 a=± vi + ajv j, aj j i 1 a ae, v, e + a v, e 2 i i i j j i j i = 1 1 t+ z, e + a z, e 2 2 i i j j i j i t 2 z, e t 2 z t 2 s γ ( R) j i j t 2 t 4 t 4, where we have used v, e = z + t e, e = t+ z, e i i i i i i i v, e = z + t e, e = z, e j i j j i j i Mult 31
32 Geeratig B ad B pk pk By the theorem, we may geerate B ad B as follows: Radomly geerate a vector v withi distace s of t e. Let B be the rotatio basis of v. Let B pk be the HNF of B. We have to choose s, t, to esure that r r is sub-expoetial. Samp Dec Ec 1 32
33 A example istatiatio of the abstract scheme ( ) γ Mult ( ) B ( e1 e) Ec { x x x } Rig: R= [ x] f( x), f( x) = x 1,. 32 deal: = 2 = 2. = 2,, 2. r Plaitext space: (a subset of) (,, ) : {0, 1}. Samp 1: samples uiformly i B( ). Samp( B, π): π+ 2 r with r Samp 1. deal: 1 i 33
34 How good is it? A improvemet over previous work. Boeh-Goh-Nissim (2005): quadratic formulas with ay umber of moomials. plaitext space: log λ bits for security prameter λ. Getry (2009): polyomials of degree log. plaitext space: larger. Not bootstrappable ye t! 34
35 Why ot bootstrappable? ( 1 ψ B B ) ψ ) Decryptio ( mod B ivolves addig vectors. Addig [ ) k-bit umbers i 0,1 requires a costat fa-i boolea circuit of depth Ω (log + log k) : 3-for-2: covert 3 umbers to 2 umbers with the same sum; this ca be doe with a circuit of costat depth, say depth c. t takes a circuit of depth clog to covert umbers to 2 umbers with the same sum. t eeds depth Ω(log k) to add the fial two umbers. The proposed scheme permits circuits of depth O(log )
36 Tweak 1 to simplify the decryptio circuit Tweak: Narrow the permitted circuits from B( r Dec ) o tb( r 2). Purpose: To esure that the ciphertexts vectors are closer to the lattice eeded to esure the correctess of decryptio. 1 Allowig the coefficiets of ( ) ψ to be very close to half-itegrs (i.e., tha they strictly eed to be, so that less precisio B ψ very close to the sphere of B( r Dec Dec is )) would require high precisio (large k) to esure correct roudig. 36
37 Lemma: f ψ is a valid ciphertext after tweak 1, 1 i.e., ψ < rdec 2, the each coefficiet of ( B ) ψ is withi 1 4 of a iteger. With Tweak 1, we ca reduce the precisio to ad cut the the circuit depth of addig Ω(log + log log ) =Ω(log ). ( r ) g( γ r ) Dec Mult Ec umbers to The ew maximum depth of permitted circuits is log log 2 loglo, origial O(log ) bits, almost the same as the depth, which ca be as large as O(log ). Ufortuately, the costat hidde i Ω (log ) is > 1, while that i O(log ) < 1. So, still ot bootstrappable. 37
38 Tweak 2, optioal, more techical, less essetial Tweak: Modify Decrypt (, ψ ) ( 1 ) ( ψ ( ψ ψ ψ ) 1 for some vector. from B B ) mod B v mod B v Purpose: To reduce the secret key size ( as well as public key size i bootstrappig) ad per-gate computatio i decryptio (from matrix-vector mult to rig mult). To use this tweak, we will eed to replace B ( rdec ) ( B 2 r ) Dec ( γ Mult B ) 38
39 Decryptio complexity of the tweaked scheme Decrypt, : ( ) ( ψ π ψ v ) ψ B = B 1 2 f Tweak 2 is used, ad is some rotatio matrix, otherwise, B = B ad B = B. ( ) mod B Split the computatio of decryptio ito three steps: 2 Step 1: Geerate vectors xi with sum B ψ. Step 2: From the vectors x, geerate iteger vectors y,, y, y with sum i xi. ( 1 ψ ) Step 3: Compute π B y mod B. i 39
40 Plaitext space As a somewhat homomorphic scheme, Getry's scheme provides a large plaitext space, However, i order to make the scheme bootstrappable, Getry Evaluate Rmod B = P( B ). has to limit the plaitext space to 0,1 mod B. evaluates mod B { } -circuits. For bootstrappig, the decryptio circuit must be composed of mod B -gates. Ordiary boolea operatios B mod operatios. ca be esaily emulated with 40
41 Decryptio complexity of the tweaked scheme Decrypt, : ( ) ( 1 2 ψ π ψ B B ψ ) 1 2 f Tweak 2 is used, B ad B is some rotatio matrix, otherwise, = B = B ad B ( k B ) 1 2 s 1. md o B Split the computatio of decryptio ito three steps: 2 Step 1: Geerate vectors i with i = ψ. Step 2: From the vectors x, geerate i teger vectors y,, y, y with i = x x B. yi = xi ( 1 ψ ) Step 3: Compute π B y mod B. i 41
42 Squashig the Decryptio Circuit 42
43 Squashig A techique to lower the complexity of the decryptio circuit, so as to make the ecryptio scheme bootstrapable. Basic idea is to split the decryptio algorithm ito two phases: computatioally itesive, secret-key idepedet, by the ecrypter. computatioally lightweight, secret-key depedet, by the decrypter : Properties: Does ot reduce the evaluatio capacity (i.e., the set of permitted circuits remais the same), but may potetially weakes security. 43
44 Squashig: geeric versio ε ε : the origial ecryptio scheme. : to be costructed from usig two algorithms, SplitKey ad ExpadCT. KeyGe( λ): ( pk, ) KeyGe ( λ) ε ( pk, ) SplitKey( pk, ) where is the (ew) secret key ad pk : = ( pk, τ ). Ecrypt( pk, π) : ψ Ecrypt ( pk, π ) x ExpadCT( pk, ψ ) //heavy use of τ // ψ (, x) ψ 44
45 Decrypt(, ψ) : decrypts ψ makig use of ad x. t is desired that Decrypt(, ψ ) works wheever Decrypt (, ψ ) does. Add( pk, ψ, ψ ) : ( ψ, ψ ) extracted from ( ψ, ψ ) Mult( pk, ψ, ψ ) : similar. 1 2 ψ Add ( pk, ψ, ψ ) x 1 2 ExpadCT( pk, ψ ) ψ ( ψ, x) 45
46 Squash: cocrete scheme ε Let be the ecryptio scheme with Tweak 2. Let v be 1 the secret key, which is a elemet of the fractioal ideal. Recall the decryptio equatio: π : = ψ ψ v mod B 1 Let ti u mod B, i U. //uiformly geerate a set of ti // Let S U be a sparse subset s.t. t = v mod B i S i SplitKey( pk, ) : { t } τ : =. pk : = ( pk, i i U τ ). : = S (ecodig of S). 46
47 ExpadCT( pk, ψ ) : //recall pk = ( pk, τ )// Compute c : = t ψ mod B for i U. i i { c } ( ψ ) i The expaded ciphertext is ψ : =,. i U Decrypt( pk, ψ ) : Recall π : = ψ ψ v mod B Recall v t mod B. i S Thus, v ψ t ψ c mod B. Thus, π : = ψ c i mod B. i S i i S i i S i 47
Lecture 11: Pseudorandom functions
COM S 6830 Cryptography Oct 1, 2009 Istructor: Rafael Pass 1 Recap Lecture 11: Pseudoradom fuctios Scribe: Stefao Ermo Defiitio 1 (Ge, Ec, Dec) is a sigle message secure ecryptio scheme if for all uppt
More informationLecture 9: Pseudo-random generators against space bounded computation,
Lecture 9: Pseudo-radom geerators agaist space bouded computatio, Primality Testig Topics i Pseudoradomess ad Complexity (Sprig 2018) Rutgers Uiversity Swastik Kopparty Scribes: Harsha Tirumala, Jiyu Zhag
More informationMath 299 Supplement: Real Analysis Nov 2013
Math 299 Supplemet: Real Aalysis Nov 203 Algebra Axioms. I Real Aalysis, we work withi the axiomatic system of real umbers: the set R alog with the additio ad multiplicatio operatios +,, ad the iequality
More informationPolynomial identity testing and global minimum cut
CHAPTER 6 Polyomial idetity testig ad global miimum cut I this lecture we will cosider two further problems that ca be solved usig probabilistic algorithms. I the first half, we will cosider the problem
More informationComplex Numbers Solutions
Complex Numbers Solutios Joseph Zoller February 7, 06 Solutios. (009 AIME I Problem ) There is a complex umber with imagiary part 64 ad a positive iteger such that Fid. [Solutio: 697] 4i + + 4i. 4i 4i
More informationWe are mainly going to be concerned with power series in x, such as. (x)} converges - that is, lims N n
Review of Power Series, Power Series Solutios A power series i x - a is a ifiite series of the form c (x a) =c +c (x a)+(x a) +... We also call this a power series cetered at a. Ex. (x+) is cetered at
More informationMetric Space Properties
Metric Space Properties Math 40 Fial Project Preseted by: Michael Brow, Alex Cordova, ad Alyssa Sachez We have already poited out ad will recogize throughout this book the importace of compact sets. All
More informationReview of Elementary Cryptography. For more material, see my notes of CSE 5351, available on my webpage
Review of Elemetary Cryptography For more material, see my otes of CSE 5351, available o my webpage Outlie Security (CPA, CCA, sematic security, idistiguishability) RSA ElGamal Homomorphic ecryptio 2 Two
More informationModern Algebra. Previous year Questions from 2017 to Ramanasri
Moder Algebra Previous year Questios from 017 to 199 Ramaasri 017 S H O P NO- 4, 1 S T F L O O R, N E A R R A P I D F L O U R M I L L S, O L D R A J E N D E R N A G A R, N E W D E L H I. W E B S I T E
More informationOptimally Sparse SVMs
A. Proof of Lemma 3. We here prove a lower boud o the umber of support vectors to achieve geeralizatio bouds of the form which we cosider. Importatly, this result holds ot oly for liear classifiers, but
More informationTEACHER CERTIFICATION STUDY GUIDE
COMPETENCY 1. ALGEBRA SKILL 1.1 1.1a. ALGEBRAIC STRUCTURES Kow why the real ad complex umbers are each a field, ad that particular rigs are ot fields (e.g., itegers, polyomial rigs, matrix rigs) Algebra
More informationChapter 6 Infinite Series
Chapter 6 Ifiite Series I the previous chapter we cosidered itegrals which were improper i the sese that the iterval of itegratio was ubouded. I this chapter we are goig to discuss a topic which is somewhat
More information6 Integers Modulo n. integer k can be written as k = qn + r, with q,r, 0 r b. So any integer.
6 Itegers Modulo I Example 2.3(e), we have defied the cogruece of two itegers a,b with respect to a modulus. Let us recall that a b (mod ) meas a b. We have proved that cogruece is a equivalece relatio
More informationACO Comprehensive Exam 9 October 2007 Student code A. 1. Graph Theory
1. Graph Theory Prove that there exist o simple plaar triagulatio T ad two distict adjacet vertices x, y V (T ) such that x ad y are the oly vertices of T of odd degree. Do ot use the Four-Color Theorem.
More informationLecture Notes for Analysis Class
Lecture Notes for Aalysis Class Topological Spaces A topology for a set X is a collectio T of subsets of X such that: (a) X ad the empty set are i T (b) Uios of elemets of T are i T (c) Fiite itersectios
More informationLecture 27. Capacity of additive Gaussian noise channel and the sphere packing bound
Lecture 7 Ageda for the lecture Gaussia chael with average power costraits Capacity of additive Gaussia oise chael ad the sphere packig boud 7. Additive Gaussia oise chael Up to this poit, we have bee
More informationLecture 2. The Lovász Local Lemma
Staford Uiversity Sprig 208 Math 233A: No-costructive methods i combiatorics Istructor: Ja Vodrák Lecture date: Jauary 0, 208 Origial scribe: Apoorva Khare Lecture 2. The Lovász Local Lemma 2. Itroductio
More information1 Generating functions for balls in boxes
Math 566 Fall 05 Some otes o geeratig fuctios Give a sequece a 0, a, a,..., a,..., a geeratig fuctio some way of represetig the sequece as a fuctio. There are may ways to do this, with the most commo ways
More informationMath 113, Calculus II Winter 2007 Final Exam Solutions
Math, Calculus II Witer 7 Fial Exam Solutios (5 poits) Use the limit defiitio of the defiite itegral ad the sum formulas to compute x x + dx The check your aswer usig the Evaluatio Theorem Solutio: I this
More information(A sequence also can be thought of as the list of function values attained for a function f :ℵ X, where f (n) = x n for n 1.) x 1 x N +k x N +4 x 3
MATH 337 Sequeces Dr. Neal, WKU Let X be a metric space with distace fuctio d. We shall defie the geeral cocept of sequece ad limit i a metric space, the apply the results i particular to some special
More information1 Hash tables. 1.1 Implementation
Lecture 8 Hash Tables, Uiversal Hash Fuctios, Balls ad Bis Scribes: Luke Johsto, Moses Charikar, G. Valiat Date: Oct 18, 2017 Adapted From Virgiia Williams lecture otes 1 Hash tables A hash table is a
More informationAnalytic Continuation
Aalytic Cotiuatio The stadard example of this is give by Example Let h (z) = 1 + z + z 2 + z 3 +... kow to coverge oly for z < 1. I fact h (z) = 1/ (1 z) for such z. Yet H (z) = 1/ (1 z) is defied for
More informationCHAPTER I: Vector Spaces
CHAPTER I: Vector Spaces Sectio 1: Itroductio ad Examples This first chapter is largely a review of topics you probably saw i your liear algebra course. So why cover it? (1) Not everyoe remembers everythig
More informationThe multiplicative structure of finite field and a construction of LRC
IERG6120 Codig for Distributed Storage Systems Lecture 8-06/10/2016 The multiplicative structure of fiite field ad a costructio of LRC Lecturer: Keeth Shum Scribe: Zhouyi Hu Notatios: We use the otatio
More information11. FINITE FIELDS. Example 1: The following tables define addition and multiplication for a field of order 4.
11. FINITE FIELDS 11.1. A Field With 4 Elemets Probably the oly fiite fields which you ll kow about at this stage are the fields of itegers modulo a prime p, deoted by Z p. But there are others. Now although
More informationAPPENDIX F Complex Numbers
APPENDIX F Complex Numbers Operatios with Complex Numbers Complex Solutios of Quadratic Equatios Polar Form of a Complex Number Powers ad Roots of Complex Numbers Operatios with Complex Numbers Some equatios
More informationSolutions to Math 347 Practice Problems for the final
Solutios to Math 347 Practice Problems for the fial 1) True or False: a) There exist itegers x,y such that 50x + 76y = 6. True: the gcd of 50 ad 76 is, ad 6 is a multiple of. b) The ifiimum of a set is
More informationPRELIM PROBLEM SOLUTIONS
PRELIM PROBLEM SOLUTIONS THE GRAD STUDENTS + KEN Cotets. Complex Aalysis Practice Problems 2. 2. Real Aalysis Practice Problems 2. 4 3. Algebra Practice Problems 2. 8. Complex Aalysis Practice Problems
More information1 Summary: Binary and Logic
1 Summary: Biary ad Logic Biary Usiged Represetatio : each 1-bit is a power of two, the right-most is for 2 0 : 0110101 2 = 2 5 + 2 4 + 2 2 + 2 0 = 32 + 16 + 4 + 1 = 53 10 Usiged Rage o bits is [0...2
More informationIntroduction to Optimization Techniques
Itroductio to Optimizatio Techiques Basic Cocepts of Aalysis - Real Aalysis, Fuctioal Aalysis 1 Basic Cocepts of Aalysis Liear Vector Spaces Defiitio: A vector space X is a set of elemets called vectors
More informationOn Random Line Segments in the Unit Square
O Radom Lie Segmets i the Uit Square Thomas A. Courtade Departmet of Electrical Egieerig Uiversity of Califoria Los Ageles, Califoria 90095 Email: tacourta@ee.ucla.edu I. INTRODUCTION Let Q = [0, 1] [0,
More informationLesson 10: Limits and Continuity
www.scimsacademy.com Lesso 10: Limits ad Cotiuity SCIMS Academy 1 Limit of a fuctio The cocept of limit of a fuctio is cetral to all other cocepts i calculus (like cotiuity, derivative, defiite itegrals
More informationIn number theory we will generally be working with integers, though occasionally fractions and irrationals will come into play.
Number Theory Math 5840 otes. Sectio 1: Axioms. I umber theory we will geerally be workig with itegers, though occasioally fractios ad irratioals will come ito play. Notatio: Z deotes the set of all itegers
More informationMath 220A Fall 2007 Homework #2. Will Garner A
Math 0A Fall 007 Homewor # Will Garer Pg 3 #: Show that {cis : a o-egative iteger} is dese i T = {z œ : z = }. For which values of q is {cis(q): a o-egative iteger} dese i T? To show that {cis : a o-egative
More information6.003 Homework #3 Solutions
6.00 Homework # Solutios Problems. Complex umbers a. Evaluate the real ad imagiary parts of j j. π/ Real part = Imagiary part = 0 e Euler s formula says that j = e jπ/, so jπ/ j π/ j j = e = e. Thus the
More informationSequences and Series of Functions
Chapter 6 Sequeces ad Series of Fuctios 6.1. Covergece of a Sequece of Fuctios Poitwise Covergece. Defiitio 6.1. Let, for each N, fuctio f : A R be defied. If, for each x A, the sequece (f (x)) coverges
More informationlim za n n = z lim a n n.
Lecture 6 Sequeces ad Series Defiitio 1 By a sequece i a set A, we mea a mappig f : N A. It is customary to deote a sequece f by {s } where, s := f(). A sequece {z } of (complex) umbers is said to be coverget
More informationThe Growth of Functions. Theoretical Supplement
The Growth of Fuctios Theoretical Supplemet The Triagle Iequality The triagle iequality is a algebraic tool that is ofte useful i maipulatig absolute values of fuctios. The triagle iequality says that
More informationComplex Analysis Spring 2001 Homework I Solution
Complex Aalysis Sprig 2001 Homework I Solutio 1. Coway, Chapter 1, sectio 3, problem 3. Describe the set of poits satisfyig the equatio z a z + a = 2c, where c > 0 ad a R. To begi, we see from the triagle
More informationChapter 2. Periodic points of toral. automorphisms. 2.1 General introduction
Chapter 2 Periodic poits of toral automorphisms 2.1 Geeral itroductio The automorphisms of the two-dimesioal torus are rich mathematical objects possessig iterestig geometric, algebraic, topological ad
More informationAddition: Property Name Property Description Examples. a+b = b+a. a+(b+c) = (a+b)+c
Notes for March 31 Fields: A field is a set of umbers with two (biary) operatios (usually called additio [+] ad multiplicatio [ ]) such that the followig properties hold: Additio: Name Descriptio Commutativity
More informationThe Boolean Ring of Intervals
MATH 532 Lebesgue Measure Dr. Neal, WKU We ow shall apply the results obtaied about outer measure to the legth measure o the real lie. Throughout, our space X will be the set of real umbers R. Whe ecessary,
More informationCALCULUS BASIC SUMMER REVIEW
CALCULUS BASIC SUMMER REVIEW NAME rise y y y Slope of a o vertical lie: m ru Poit Slope Equatio: y y m( ) The slope is m ad a poit o your lie is, ). ( y Slope-Itercept Equatio: y m b slope= m y-itercept=
More information10-701/ Machine Learning Mid-term Exam Solution
0-70/5-78 Machie Learig Mid-term Exam Solutio Your Name: Your Adrew ID: True or False (Give oe setece explaatio) (20%). (F) For a cotiuous radom variable x ad its probability distributio fuctio p(x), it
More informationChapter 2 The Solution of Numerical Algebraic and Transcendental Equations
Chapter The Solutio of Numerical Algebraic ad Trascedetal Equatios Itroductio I this chapter we shall discuss some umerical methods for solvig algebraic ad trascedetal equatios. The equatio f( is said
More informationLecture 2 Clustering Part II
COMS 4995: Usupervised Learig (Summer 8) May 24, 208 Lecture 2 Clusterig Part II Istructor: Nakul Verma Scribes: Jie Li, Yadi Rozov Today, we will be talkig about the hardess results for k-meas. More specifically,
More informationRADICAL EXPRESSION. If a and x are real numbers and n is a positive integer, then x is an. n th root theorems: Example 1 Simplify
Example 1 Simplify 1.2A Radical Operatios a) 4 2 b) 16 1 2 c) 16 d) 2 e) 8 1 f) 8 What is the relatioship betwee a, b, c? What is the relatioship betwee d, e, f? If x = a, the x = = th root theorems: RADICAL
More information, then cv V. Differential Equations Elements of Lineaer Algebra Name: Consider the differential equation. and y2 cos( kx)
Cosider the differetial equatio y '' k y 0 has particular solutios y1 si( kx) ad y cos( kx) I geeral, ay liear combiatio of y1 ad y, cy 1 1 cy where c1, c is also a solutio to the equatio above The reaso
More informationDefinitions and Theorems. where x are the decision variables. c, b, and a are constant coefficients.
Defiitios ad Theorems Remember the scalar form of the liear programmig problem, Miimize, Subject to, f(x) = c i x i a 1i x i = b 1 a mi x i = b m x i 0 i = 1,2,, where x are the decisio variables. c, b,
More informationMachine Learning Theory Tübingen University, WS 2016/2017 Lecture 11
Machie Learig Theory Tübige Uiversity, WS 06/07 Lecture Tolstikhi Ilya Abstract We will itroduce the otio of reproducig kerels ad associated Reproducig Kerel Hilbert Spaces (RKHS). We will cosider couple
More informationA Simple Derivation for the Frobenius Pseudoprime Test
A Simple Derivatio for the Frobeius Pseudoprime Test Daiel Loebeberger Bo-Aache Iteratioal Ceter for Iformatio Techology March 17, 2008 Abstract Probabilistic compositeess tests are of great practical
More informationIt is always the case that unions, intersections, complements, and set differences are preserved by the inverse image of a function.
MATH 532 Measurable Fuctios Dr. Neal, WKU Throughout, let ( X, F, µ) be a measure space ad let (!, F, P ) deote the special case of a probability space. We shall ow begi to study real-valued fuctios defied
More informationw (1) ˆx w (1) x (1) /ρ and w (2) ˆx w (2) x (2) /ρ.
2 5. Weighted umber of late jobs 5.1. Release dates ad due dates: maximimizig the weight of o-time jobs Oce we add release dates, miimizig the umber of late jobs becomes a sigificatly harder problem. For
More information18.01 Calculus Jason Starr Fall 2005
Lecture 18. October 5, 005 Homework. Problem Set 5 Part I: (c). Practice Problems. Course Reader: 3G 1, 3G, 3G 4, 3G 5. 1. Approximatig Riema itegrals. Ofte, there is o simpler expressio for the atiderivative
More information6.867 Machine learning, lecture 7 (Jaakkola) 1
6.867 Machie learig, lecture 7 (Jaakkola) 1 Lecture topics: Kerel form of liear regressio Kerels, examples, costructio, properties Liear regressio ad kerels Cosider a slightly simpler model where we omit
More informationReal Numbers R ) - LUB(B) may or may not belong to B. (Ex; B= { y: y = 1 x, - Note that A B LUB( A) LUB( B)
Real Numbers The least upper boud - Let B be ay subset of R B is bouded above if there is a k R such that x k for all x B - A real umber, k R is a uique least upper boud of B, ie k = LUB(B), if () k is
More informationA) is empty. B) is a finite set. C) can be a countably infinite set. D) can be an uncountable set.
M.A./M.Sc. (Mathematics) Etrace Examiatio 016-17 Max Time: hours Max Marks: 150 Istructios: There are 50 questios. Every questio has four choices of which exactly oe is correct. For correct aswer, 3 marks
More informationMATH 205 HOMEWORK #2 OFFICIAL SOLUTION. (f + g)(x) = f(x) + g(x) = f( x) g( x) = (f + g)( x)
MATH 205 HOMEWORK #2 OFFICIAL SOLUTION Problem 2: Do problems 7-9 o page 40 of Hoffma & Kuze. (7) We will prove this by cotradictio. Suppose that W 1 is ot cotaied i W 2 ad W 2 is ot cotaied i W 1. The
More informationNICK DUFRESNE. 1 1 p(x). To determine some formulas for the generating function of the Schröder numbers, r(x) = a(x) =
AN INTRODUCTION TO SCHRÖDER AND UNKNOWN NUMBERS NICK DUFRESNE Abstract. I this article we will itroduce two types of lattice paths, Schröder paths ad Ukow paths. We will examie differet properties of each,
More informationIntroduction to Optimization Techniques. How to Solve Equations
Itroductio to Optimizatio Techiques How to Solve Equatios Iterative Methods of Optimizatio Iterative methods of optimizatio Solutio of the oliear equatios resultig form a optimizatio problem is usually
More informationHOMEWORK #10 SOLUTIONS
Math 33 - Aalysis I Sprig 29 HOMEWORK # SOLUTIONS () Prove that the fuctio f(x) = x 3 is (Riema) itegrable o [, ] ad show that x 3 dx = 4. (Without usig formulae for itegratio that you leart i previous
More informationRecursive Algorithms. Recurrences. Recursive Algorithms Analysis
Recursive Algorithms Recurreces Computer Sciece & Egieerig 35: Discrete Mathematics Christopher M Bourke cbourke@cseuledu A recursive algorithm is oe i which objects are defied i terms of other objects
More informationMa 530 Introduction to Power Series
Ma 530 Itroductio to Power Series Please ote that there is material o power series at Visual Calculus. Some of this material was used as part of the presetatio of the topics that follow. What is a Power
More informationx x x Using a second Taylor polynomial with remainder, find the best constant C so that for x 0,
Math Activity 9( Due with Fial Eam) Usig first ad secod Taylor polyomials with remaider, show that for, 8 Usig a secod Taylor polyomial with remaider, fid the best costat C so that for, C 9 The th Derivative
More informationSequences. Notation. Convergence of a Sequence
Sequeces A sequece is essetially just a list. Defiitio (Sequece of Real Numbers). A sequece of real umbers is a fuctio Z (, ) R for some real umber. Do t let the descriptio of the domai cofuse you; it
More informationCS / MCS 401 Homework 3 grader solutions
CS / MCS 401 Homework 3 grader solutios assigmet due July 6, 016 writte by Jāis Lazovskis maximum poits: 33 Some questios from CLRS. Questios marked with a asterisk were ot graded. 1 Use the defiitio of
More informationEnd-of-Year Contest. ERHS Math Club. May 5, 2009
Ed-of-Year Cotest ERHS Math Club May 5, 009 Problem 1: There are 9 cois. Oe is fake ad weighs a little less tha the others. Fid the fake coi by weighigs. Solutio: Separate the 9 cois ito 3 groups (A, B,
More information1. (25 points) Use the limit definition of the definite integral and the sum formulas 1 to compute
Math, Calculus II Fial Eam Solutios. 5 poits) Use the limit defiitio of the defiite itegral ad the sum formulas to compute 4 d. The check your aswer usig the Evaluatio Theorem. ) ) Solutio: I this itegral,
More information# fixed points of g. Tree to string. Repeatedly select the leaf with the smallest label, write down the label of its neighbour and remove the leaf.
Combiatorics Graph Theory Coutig labelled ad ulabelled graphs There are 2 ( 2) labelled graphs of order. The ulabelled graphs of order correspod to orbits of the actio of S o the set of labelled graphs.
More information5. Matrix exponentials and Von Neumann s theorem The matrix exponential. For an n n matrix X we define
5. Matrix expoetials ad Vo Neuma s theorem 5.1. The matrix expoetial. For a matrix X we defie e X = exp X = I + X + X2 2! +... = 0 X!. We assume that the etries are complex so that exp is well defied o
More informationFall 2013 MTH431/531 Real analysis Section Notes
Fall 013 MTH431/531 Real aalysis Sectio 8.1-8. Notes Yi Su 013.11.1 1. Defiitio of uiform covergece. We look at a sequece of fuctios f (x) ad study the coverget property. Notice we have two parameters
More informationPRACTICE FINAL/STUDY GUIDE SOLUTIONS
Last edited December 9, 03 at 4:33pm) Feel free to sed me ay feedback, icludig commets, typos, ad mathematical errors Problem Give the precise meaig of the followig statemets i) a f) L ii) a + f) L iii)
More informationLast time, we talked about how Equation (1) can simulate Equation (2). We asserted that Equation (2) can also simulate Equation (1).
6896 Quatum Complexity Theory Sept 23, 2008 Lecturer: Scott Aaroso Lecture 6 Last Time: Quatum Error-Correctio Quatum Query Model Deutsch-Jozsa Algorithm (Computes x y i oe query) Today: Berstei-Vazirii
More informationLecture 19: Convergence
Lecture 19: Covergece Asymptotic approach I statistical aalysis or iferece, a key to the success of fidig a good procedure is beig able to fid some momets ad/or distributios of various statistics. I may
More information7. Modern Techniques. Data Encryption Standard (DES)
7. Moder Techiques. Data Ecryptio Stadard (DES) The objective of this chapter is to illustrate the priciples of moder covetioal ecryptio. For this purpose, we focus o the most widely used covetioal ecryptio
More information6.895 Essential Coding Theory October 20, Lecture 11. This lecture is focused in comparisons of the following properties/parameters of a code:
6.895 Essetial Codig Theory October 0, 004 Lecture 11 Lecturer: Madhu Suda Scribe: Aastasios Sidiropoulos 1 Overview This lecture is focused i comparisos of the followig properties/parameters of a code:
More informationSequences A sequence of numbers is a function whose domain is the positive integers. We can see that the sequence
Sequeces A sequece of umbers is a fuctio whose domai is the positive itegers. We ca see that the sequece 1, 1, 2, 2, 3, 3,... is a fuctio from the positive itegers whe we write the first sequece elemet
More informationREVISION SHEET FP1 (MEI) ALGEBRA. Identities In mathematics, an identity is a statement which is true for all values of the variables it contains.
The mai ideas are: Idetities REVISION SHEET FP (MEI) ALGEBRA Before the exam you should kow: If a expressio is a idetity the it is true for all values of the variable it cotais The relatioships betwee
More informationCS284A: Representations and Algorithms in Molecular Biology
CS284A: Represetatios ad Algorithms i Molecular Biology Scribe Notes o Lectures 3 & 4: Motif Discovery via Eumeratio & Motif Represetatio Usig Positio Weight Matrix Joshua Gervi Based o presetatios by
More informationThe Maximum-Likelihood Decoding Performance of Error-Correcting Codes
The Maximum-Lielihood Decodig Performace of Error-Correctig Codes Hery D. Pfister ECE Departmet Texas A&M Uiversity August 27th, 2007 (rev. 0) November 2st, 203 (rev. ) Performace of Codes. Notatio X,
More informationMath 61CM - Solutions to homework 3
Math 6CM - Solutios to homework 3 Cédric De Groote October 2 th, 208 Problem : Let F be a field, m 0 a fixed oegative iteger ad let V = {a 0 + a x + + a m x m a 0,, a m F} be the vector space cosistig
More informationZeros of Polynomials
Math 160 www.timetodare.com 4.5 4.6 Zeros of Polyomials I these sectios we will study polyomials algebraically. Most of our work will be cocered with fidig the solutios of polyomial equatios of ay degree
More informationLecture 1: Basic problems of coding theory
Lecture 1: Basic problems of codig theory Error-Correctig Codes (Sprig 016) Rutgers Uiversity Swastik Kopparty Scribes: Abhishek Bhrushudi & Aditya Potukuchi Admiistrivia was discussed at the begiig of
More informationLecture 4: Unique-SAT, Parity-SAT, and Approximate Counting
Advaced Complexity Theory Sprig 206 Lecture 4: Uique-SAT, Parity-SAT, ad Approximate Coutig Prof. Daa Moshkovitz Scribe: Aoymous Studet Scribe Date: Fall 202 Overview I this lecture we begi talkig about
More informationAppendix F: Complex Numbers
Appedix F Complex Numbers F1 Appedix F: Complex Numbers Use the imagiary uit i to write complex umbers, ad to add, subtract, ad multiply complex umbers. Fid complex solutios of quadratic equatios. Write
More informationFully homomorphic encryption scheme using ideal lattices. Gentry s STOC 09 paper - Part II
Fully homomorphic encryption scheme using ideal lattices Gentry s STOC 09 paper - Part GGH cryptosystem Gentry s scheme is a GGH-like scheme. GGH: Goldreich, Goldwasser, Halevi. ased on the hardness of
More informationSeunghee Ye Ma 8: Week 5 Oct 28
Week 5 Summary I Sectio, we go over the Mea Value Theorem ad its applicatios. I Sectio 2, we will recap what we have covered so far this term. Topics Page Mea Value Theorem. Applicatios of the Mea Value
More informationMA131 - Analysis 1. Workbook 2 Sequences I
MA3 - Aalysis Workbook 2 Sequeces I Autum 203 Cotets 2 Sequeces I 2. Itroductio.............................. 2.2 Icreasig ad Decreasig Sequeces................ 2 2.3 Bouded Sequeces..........................
More informationROSE WONG. f(1) f(n) where L the average value of f(n). In this paper, we will examine averages of several different arithmetic functions.
AVERAGE VALUES OF ARITHMETIC FUNCTIONS ROSE WONG Abstract. I this paper, we will preset problems ivolvig average values of arithmetic fuctios. The arithmetic fuctios we discuss are: (1)the umber of represetatios
More informationREGRESSION WITH QUADRATIC LOSS
REGRESSION WITH QUADRATIC LOSS MAXIM RAGINSKY Regressio with quadratic loss is aother basic problem studied i statistical learig theory. We have a radom couple Z = X, Y ), where, as before, X is a R d
More informationA sequence of numbers is a function whose domain is the positive integers. We can see that the sequence
Sequeces A sequece of umbers is a fuctio whose domai is the positive itegers. We ca see that the sequece,, 2, 2, 3, 3,... is a fuctio from the positive itegers whe we write the first sequece elemet as
More informationWeek 5-6: The Binomial Coefficients
Wee 5-6: The Biomial Coefficiets March 6, 2018 1 Pascal Formula Theorem 11 (Pascal s Formula For itegers ad such that 1, ( ( ( 1 1 + 1 The umbers ( 2 ( 1 2 ( 2 are triagle umbers, that is, The petago umbers
More informationFundamental Theorem of Algebra. Yvonne Lai March 2010
Fudametal Theorem of Algebra Yvoe Lai March 010 We prove the Fudametal Theorem of Algebra: Fudametal Theorem of Algebra. Let f be a o-costat polyomial with real coefficiets. The f has at least oe complex
More information4.1 Sigma Notation and Riemann Sums
0 the itegral. Sigma Notatio ad Riema Sums Oe strategy for calculatig the area of a regio is to cut the regio ito simple shapes, calculate the area of each simple shape, ad the add these smaller areas
More informationChimica Inorganica 3
himica Iorgaica Irreducible Represetatios ad haracter Tables Rather tha usig geometrical operatios, it is ofte much more coveiet to employ a ew set of group elemets which are matrices ad to make the rule
More informationCS161 Handout 05 Summer 2013 July 10, 2013 Mathematical Terms and Identities
CS161 Hadout 05 Summer 2013 July 10, 2013 Mathematical Terms ad Idetities Thaks to Ady Nguye ad Julie Tibshirai for their advice o this hadout. This hadout covers mathematical otatio ad idetities that
More informationRecitation 4: Lagrange Multipliers and Integration
Math 1c TA: Padraic Bartlett Recitatio 4: Lagrage Multipliers ad Itegratio Week 4 Caltech 211 1 Radom Questio Hey! So, this radom questio is pretty tightly tied to today s lecture ad the cocept of cotet
More information(for homogeneous primes P ) defining global complex algebraic geometry. Definition: (a) A subset V CP n is algebraic if there is a homogeneous
Math 6130 Notes. Fall 2002. 4. Projective Varieties ad their Sheaves of Regular Fuctios. These are the geometric objects associated to the graded domais: C[x 0,x 1,..., x ]/P (for homogeeous primes P )
More informationQuantum Computing Lecture 7. Quantum Factoring
Quatum Computig Lecture 7 Quatum Factorig Maris Ozols Quatum factorig A polyomial time quatum algorithm for factorig umbers was published by Peter Shor i 1994. Polyomial time meas that the umber of gates
More informationMachine Learning Brett Bernstein
Machie Learig Brett Berstei Week Lecture: Cocept Check Exercises Starred problems are optioal. Statistical Learig Theory. Suppose A = Y = R ad X is some other set. Furthermore, assume P X Y is a discrete
More information