MVP: An Efficient Anonymous E-voting Protocol

Size: px
Start display at page:

Download "MVP: An Efficient Anonymous E-voting Protocol"

Transcription

1 MVP: An Efficient Anonymous E-voting Protocol You Zhou Yin Zhou Shigng Chen Smuel S. Wu Deprtment of Computer & Informtion Science & Engineering Deprtment of Biosttistics University of Florid, Ginesville, FL 32611, USA Emil: {youzhou, yin, Abstrct Thnks to the Internet, voters cn cst their bllots over the electronic voting (E-voting) systems conveniently nd efficiently without going to the polling sttions. However, existing E-voting protocols suffer from nonymity issues nd/or high deployment overhed. In this pper, we design prcticl nonymous E-voting protocol (referred to s MVP) bsed on novel dt collection technique clled dul rndom mtrix msking (DRMM), which gurntees nonymity with low overhed of computtion, nd chieves the security gols of receipt-freeness, double voting detection, firness, bllot secrecy, nd integrity. Through extensive nlyses on correctness, efficiency, nd security properties, we demonstrte our proposed MVP protocol cn be pplied to E-voting in vriety of situtions with ccurcy nd nonymity. I. INTRODUCTION The prcticl importnce of electronic voting (E-voting) technology hs ttrcted significnt reserch interest in recent yers [1] [4]. E-voting provides gret convenience for people to prticipte in votings without geogrphicl restriction nd time limittion. In prticulr, nonymous E-voting systems incorporte n importnt feture of nonymity [5] [8], which gurntees tht ny bllot cnnot be trced bck to the individul person who csts it. Anonymity is criticl in encourging voters to voice their true opinions on sensitive issues nd promoting prticiption in voting. There re mny importnt requirements for nonymous E-voting system design: Double Voting Detection: Only eligible nd verified voters re llowed to cst bllots. In ddition, ech qulified voter cn only cst one vlid vote. If voter csts multiple bllots, only one vote will be counted. Correctness: All votes must be counted correctly. All vlid bllots must be correctly counted into the finl tlly. No invlid bllot cn be counted into the finl tlly. Firness: No intermedite results cn be obtined before the voting period ends (so tht such informtion cnnot be used to ffect people who hve not voted). Receipt-freeness: An essentil property tht prevents voter from proving to ny third prty tht he/she hs voted for prticulr cndidte in order to void bllot buying. Bllot Secrecy: Besides the voter himself/herself, others cnnot know the ctul bllot tht the voter hs cst. Integrity: Any vlid bllot cst by ny individul voter cnnot be modified, duplicted, or removed. Any ttempt to tmper with the correct finl tlly will be detected. Efficiency: The computtion for individul voters nd voting servers should be s efficient s possible. There re two types of ttck ginst nonymous E-voting systems: pssive ttck nd ctive ttck. In pssive ttck, the dversry tries to obtin s much originl bllot dt nd voter identity informtion s possible. Active ttck is more severe: the dversry ttempts to sbotge the voting process by ltering the finl tlly. Existing reserch minly focuses on the pssive ttck. Most of the prior protocols rely on expensive cryptogrphic techniques [4] [10], nd they cn be clssified into three ctegories bsed on mix-nets, blind signtures, nd homomorphic encryption. While the existing protocols re ble to ddress mny importnt issues through different mens, they lso hve limittions in prcticlity, fetures nd efficiency, s we will explin in Section IV. None of them meets ll the bove requirements. Addressing those limittions will require us to explore new pproches tht differ from the pst ones. In this pper, we design prcticl nonymous E-voting protocol (referred to s MVP) bsed on novel dt collection technique clled dul rndom mtrix msking (DRMM), which gurntees nonymity with low computtion overhed nd chieves the forementioned requirements of receiptfreeness, double voting detection, firness, bllot secrecy nd integrity, under both pssive nd ctive ttcks. In the MVP protocol, voters cn cst bllots without disclosing their votes nd identity informtion. Through extensive nlyses on correctness, efficiency, nd security properties, we demonstrte our proposed MVP protocol cn be pplied to E-voting in vriety of situtions with ccurcy nd nonymity. II. PRELIMINARIES A. System Model We consider n nonymous electronic voting (E-voting) system s illustrted in Figure 1, which consists of three prties: Voters: The people who hve been uthorized to prticipte in the voting. Ech uthenticted voter cn only cst one vlid vote. If voter csts multiple bllots, only one vote should be counted into the finl tlly. Dt mngement center (DMC): An orgniztion tht holds the voting ctivities. It is the center of the voting, nd responsible for uthentiction of voters, counting vlid bllots, nd the nnouncement of the finl tlly. Voting Proxy Server (VPS): A server tht is responsible for collecting vlid msked bllots from uthenticted voters, nd forwrding msked group votes to the DMC. In our model, n nonymous E-voting system consists of voters, one or multiple VPS, DMC with bckend servers, /16/$ IEEE

2 cndidte, etc. We ssume the communiction chnnels between the three prties (voters, VPS, nd DMC) in our E-voting system re secure, which cn be esily relized through some known protocols (e.g., TLS or SSL), nd untppble (i.e., no listening or recording device cn be plced to record the voting process). With secure communiction chnnels nd proper uthentiction, no dt in the system will be disclosed to ny outsider dversry. Fig. 1. Anonymous E-voting system model. nd communictions between them. The DMC tht holds the voting builds server with dtbse of ll voters informtion, nd it is responsible for registrtion, uthentiction nd prevoting communictions with voters. Voters need to register themselves with the DMC before the voting. After obtining the uthentiction from the DMC, voters cn then cst their msked bllots through n E-voting website or n pp on their mobile devices to the dt collector VPS. For the purpose of nonymity, only msked vote dt will be sent to the VPS. The VPS cn be compny s web server or some other proxy server. It collects msked bllots from voters bsed on groups, then ggregtes nd msks ech group of bllots, nd trnsmits the msked group bllots to the DMC. Finlly, the DMC will count the votes bsed on the msked group bllots, nd publish the finl tlly result. B. Security Model We ssume the DMC is semi-honest. On the one hnd, it honestly fulfils its duty, including registrtion, uthentiction nd pre-voting communictions with voters, nd counting ech group s poll result bsed on the msked group bllots from the VPS. On the other hnd, the DMC my be curious bout nd intend to obtin the originl votes of individul voters. Other potentil dversry cn be either compromised VPS or some misbehved voter(s). Misbehved voters im to lter the tlly by double voting, but they re outnumbered by the honest voters. A sbotged VPS my try to obtin voters identity nd their individul or group vote informtion, or even modify the finl tlly, without being detected. In spot of ny dversry behvior during the voting process, the reputtion of the VPS will be dmged, nd the E-voting cn be efficiently restrted. More specificlly, we consider n ttck model with two outstnding potentil ttcks: the pssive ttck nd the more severe ctive ttck. In the pssive ttck, the dversry tries to obtin s much originl bllot dt nd voter identity informtion s possible in the voting process. For exmple, sbotged VPS my try to mine the voting result before the DMC publishes it, or digest individul vote informtion from the msked bllots. In the more severe ctive ttck, the dversry ttempts to sbotge the voting process to lter the finl tlly result without being detected. For instnce, misbehved voters my try to cst multiple bllots, or compromised VPS my modify or remove some collected bllots nd try to crete fke tlly result in fvor of prticulr C. Mtrix Msking Mtrix msking is the most populr technique used for dt collection with disclosure limittions [11] [14]. It refers to clss of sttisticl disclosure limittion (SDL) methods used to protect the confidentility of sttisticl dt, through some specific mtrices trnsforming dt mtrix to msked mtrix vi pre- nd post- multipliction nd possible ddition of noise or perturbtions. For exmple, Duncn [11] proposes to trnsform n n p (cses by vribles) dt mtrix X to the msked dt of the form: X AXB + C, where mtrix A is row opertor, mtrix B is column opertor, nd mtrix C is the noise or perturbtions dded to the dt. In our protocol, we dopt mtrix msking s building block to propose novel dul rndom mtrix msking (DRMM) technique. In prticulr, two mtrices A nd B reusedtomsk the originl dt X, where A is rndom orthogonl mtrix s row opertor only known to the dt collector VPS, nd B is rndom invertible mtrix s column opertor only known to the voting orgniztion DMC. We will prove tht our dt collection protocols bsed on DRMM chieves nonymity nd gurntees the sme finl tlly result s the originl dt X. 1) Msked dt disclosure limittion: In this pper, we use n invertible mtrix B to msk the originl dt X, nd the msked dt XB will be sent to the dt collector VPS: X XB. Since B is invertible, there exits sequence of row opertions P 1,P 2..., P s nd column opertions Q 1,Q 2,..., Q t such tht P s...p 2 P 1 BQ 1 Q 2...Q t = E B = P1 1 P2 1...Ps 1 EQ 1 t...q 1 2 Q 1 1, where P 1,P 2..., P s nd Q 1,Q 2,..., Q t re elementry invertible mtrices, nd E is the unit mtrix. In this cse, the msked dt cn be presented s follows: XB = XP1 1 P2 1...Ps 1 EQ 1 t...q 1 2 Q 1 1. (1) Since P1 1,P2 1..., Ps 1 nd Q 1 1,Q 1 2,..., Q 1 t in (1) re ll rndom column opertion mtrices used to do the rndom column switching, multipliction nd dding, without knowing ll these rndom mtrices in dvnce, the dversry cnnot get ny informtion relted to the columns of the originl dt X.

3 2) ROMM: Ting et l. propose new perturbtion method clled rndom orthogonl mtrix msking (ROMM) to protect confidentil dt [14]. ROMM is specil cse of the stndrd mtrix msking, under the conditions tht B is the identity mtrix, C is the zero mtrix, nd A is some rndom orthogonl mtrix drwn from some known distribution D. Therefore, the trnsformtion of ROMM is X AX. ROMM hs one criticl feture. It preserves the smple men nd smple covrince mtrix fter orthogonl pre-mtrix msking. We provide theorem tht formlly codifies this feture. Interested reders cn refer to [14] for the forml proof. Theorem 1. Let X nd Y = AX be the originl dt nd msked dt produced by ROMM, respectively. Denote the smple men nd the smple covrince mtrix of the originl dt X s x nd Σ x, nd denote the smple men nd the smple covrince mtrix of the msked dt Y s y nd Σ y. Then x = y, nd Σ x = Σ y, nd colsum{x} = colsum{y }, (2) where colsum{} is vector contining the sum of ech column in the input mtrix. Theorem 1 sttes tht the ROMM trnsformtion preserves the smple men nd smple covrince of the originl dt, which further implies tht the colsum on the perturbed dt is n unbised estimte of the colsum obtined from the originl dt. Therefore, in our protocols, the dt collector VPS cn simply publish the perturbed dt produced by ROMM, while preserving the sttisticl fetures like colsum of the originl dt. D. Noise Flooding Lemm Now, we introduce the noise flooding lemm, which will be used in our protocols. Lemm 1. Let c be constnt rel number in R representing the useful informtion, nd w be rndom vrible representing the noise. Denote the distribution of w s f w (), which is continuous function. Assume tht w = w, nd >1, then [ lim fw (w + c) f w (w ) ] =0, lim f w (w + c) f w (w ) dw =0. Proof: Since the distribution of w is f w (w) nd w = w, the distribution of w nd w + c is f w (w )= 1 f (w ) 1 w = f w(w), f w (w + c) = 1 f (w + c) 1 w = f ( c ) w w +. Then, lim = lim = lim lim = lim = [ fw (w + c) f w (w ) ] [ 1 f w { [ 1 This completes the proof. ( c ) 1 w + f w ( w + c ] f w(w) ]} ) fw (w) =0, f w (w + c) f w (w ) dw { 1 f (w w + c ) (w ) } fw dw ( lim c ) fw w + fw (w) dw =0. Lemm 1 sttes tht, s increses to infinity, the difference between f w (w ) nd f w (w +c) decreses to 0. An impliction is, when the noise w floods mong the whole observtion spce, i.e.,, we cnnot tell the useful informtion c perturbed by the noise w. Suppose there re two rndom vribles w 1 nd w 2, nd they re independent nd hve the sme distribution f w (w ) with very lrge. We rndomly pick one vrible nd dd constnt c to it. Then others cnnot tell which vrible hs incresed by c given limited number of smples of the vribles w 1 nd w 2. In other words, the noise hs overwhelmed the useful informtion c, so the dversry won t be ble to obtin c from its perturbed formt w + c. III. MVP: A NOVEL ANONYMOUS VOTING PROTOCOL In this section, we propose novel efficient mtrix msking nonymous voting protocol (MVP) bsed on novel technique dul rndom mtrix msking (DRMM). We first introduce some bsic functions to be pplied in MVP, then describe the full MVP protocol in detils. Finlly, we nlyze the correctness, efficiency, nd security properties of MVP. A. Functions Before describing the full MVP protocol, we first introduce some bsic functions in the protocol. Setup: Setup(Reg v ) (,Cert v,gid v,index v ) is function tht tkes the registrtion informtion Reg v of voter v s input, nd outputs some setup prmeters, including v s initil bllot noise ( ), certifiction (Cert v ), group ID GID v, nd group index Index v.the pir (GID v,index v ) is defined s v s voting identifier. Key Genertion: KeyGen(Entity, GID) (key) is rndomized lgorithm tht tkes the entity s nme nd group ID s input, nd outputs key for the entity. Through this function, the DMC obtins rndom invertible msking mtrix B, nd the VPS obtins rndom orthogonl msking mtrix A, for ech group. Messge Forwrding: Send(Msg,dst) is relible communiction function tht tkes the destintion dst nd the messge Msg s input, nd ccomplishes the secure messge forwrding tsk. In our protocols, ll messge

4 forwrding between voters, the DMC, nd the VPS re secured through this function. B. MVP Now we present our novel nonymous voting protocol MVP, which includes the following four phses: initiliztion, uthentiction, voting, nd counting. Suppose there re p cndidtes in the voting. 1) Initiliztion phse: In the beginning, the DMC nd the VPS generte their own pirs of symmetric keys, i.e., (K D, K + D ) for the DMC nd (K V, K+ V ) for the VPS, nd shred symmetric key κ. Ech voter v lso genertes its privte key Kv nd public key K v +, then uses its unique identifiction informtion (e.g., identifiction number, dte of birth, etc.) to register with the DMC. Upon receipt of v s registrtion request nd verifying v is legitimte voter, the DMC genertes piece of registrtion informtion Reg v, nd sends the encrypted registrtion E(K v +,E(K + D,Reg v)) to v. After tht, the DMC uses the setup function to produce group ID GID v, group index Index v, n initil bllot noise, nd certifiction Cert v for v, nd stores the informtion (Reg v, GID v, Index v,, Cert v ) in its dtbse. The DMC will lso shre the uthentiction informtion (Cert v, GID v, Index v ) with the VPS for it to lter verify uthorized voters. Finlly, for ech group of voters, the DMC will use the group ID GID s the seed to generte rndom invertible mtrix B, nd store the informtion (GID, B) in its dtbse. Similrly, for ech group of voters, the VPS will use the group ID GID s the seed to generte rndom orthogonl mtrix A, nd store the informtion (GID, A) in its dtbse. The initiliztion phse is summrized in the following: DMC : Setup(Reg v ) (,Cert v,gid v,index v ), KeyGen(DMC, GID) invertible mtrix B. VPS: KeyGen(VPS,GID) orthogonl mtrix A. 2) Authentiction phse: To gurntee only verified voters re llowed to cst bllots, voters must uthenticte themselves with the DMC to obtin necessry informtion for voting. In the uthentiction phse, ech voter v will decrypt its encrypted registrtion informtion obtined from the DMC to get D(Kv, E(K v +,E(K + D,Reg v))) = E(K + D,Reg v), encrypt it with its privte key, nd send E(Kv,E(K + D,Reg v)) to the DMC for verifiction. After decrypting the messge with K D nd K+ v, i.e., D(K D,D(K+ v,e(kv,e(k + D,Reg v)))) = Reg v, nd verifying tht Reg v is in its dtbse, the DMC will perform the following opertions: (i) The DMC uses Reg v to fetch v s group ID GID v, group index Index v, initil bllot noise, nd certifiction Cert v, nd uses GID v to fetch v s group msking mtrix B, from its dtbse. (ii) The DMC genertes messge M = (GID v,index v ), nd M b = E(κ, Cert v GID v Index v ) by encrypting v s uthentiction informtion with the shred key κ. (iii) The DMC computes p originl bllots, {OBv, 1..., OBv, j..., OBv}, p where OBv j represents voting for the j-th cndidte, nd is just 1 p vector consisting of 0 s nd 1 s such tht OBv[j] j =1, nd OBv[i] j =0, i = j. (iv) The DMC dds voter v s initil bllot noise to ech originl bllot to generte p perturbed bllots, {NBv, 1..., NBv, j..., NBv}, p i.e., NBv j = + OBv, j j [1,p]. (v) The DMC multiplies ech perturbed bllot with v s group msking mtrix B to generte p msked bllots, {MBv, 1..., MBv, j..., MBv}, p i.e., MBv j = NBv j B, j [1,p]. (vi) The DMC encrypts ech msked bllot with the shred key κ to generte p encrypted msked bllots, {EBv, 1..., EBv, j..., EBv}, p i.e., EBv j = E(κ, MBv), j j [1,p]. (vii) The DMC conctentes the p encrypted msked bllots to generte messge M c, i.e., M c = (EBv... EB 1 v j... EBv). p Finlly, the DMC sends bck messge M 1 to the voter v, which is n encrypted conctention of M, M b nd M c : M 1 = E(K v +,M M b M c ) = E(K v +,M E(κ, Cert v GID v Index v ) M c ). When the voter v receives the messge M 1, it will decode M 1 with its privte key to get M, M b nd M c : D(K v,m 1 )= (M M b M c ). M is v s voting identifier. Since the certifiction M b = E(κ, Cert v GID v Index v ) is encrypted by the key κ shred between the DMC nd the VPS only, the voter v cnnot decrypt M b to ccess its uthentiction informtion (Cert v, GID v, Index v ). This serves n importnt purpose of ssuring double voting detection, which we will explin more lter. 3) Voting Phse: In the voting phse, voters cst encrypted msked bllots to the VPS. The VPS gthers the encrypted msked bllots bsed on voters groups, further msks the group bllots, nd sends to the DMC. There re four steps. ) Step 1: voters cst encrypted msked bllots. From the previous uthentiction phse, ech voter v receives its uthentiction informtion M b, nd M c which conctentes p encrypted msked bllots. During the voting process, ech voter v will decide which cndidte to vote, nd choose the corresponding encrypted msked bllot EB v = E(κ, MB v ) = E(κ, ( + OB v ) B) from M c :ifv decides to vote for the j-th cndidte, v will select EBv j from M c, i.e., EB v = EBv. j After tht, v csts its vote by sending EB v with the uthentiction informtion M b in messge M 2 to the VPS: M 2 = E(K + V,EB v M b ) = E(K + V,EB (4) v E(κ, Cert v GID v Index v )). b) Step 2: VPS verifies ech individul vote. Upon receiving vote messge M 2, the VPS decodes M 2 with its own privte key K V nd the shred key κ: D(K V,M 2)=(EB v M b ), D(κ, EB v )=(MB v ), (5) D(κ, M b )=(Cert v GID v Index v ). The VPS looks up the uthentiction (Cert v GID v Index v ) in its dtbse, nd checks whether the voting identifier (GID v,index v ) is in the set S, which contins the (GID, Index) of ll lredy-voted voters to detect potentil double voting. If (Cert v GID v Index v ) exists in VPS s dtbse, nd (GID v,index v ) does not exist in S, it mens this bllot is the first (3)

5 vote of n uthenticted voter. So the VPS will ccept the bllot, store the MB v, nd insert (GID v,index v ) into S. Otherwise, the VPS will reject the bllot nd do nothing. c) Step 3: VPS genertes msked group bllots. When the voting period ends, the VPS finishes collecting ll voters msked bllots. Next, the VPS strts to ggregte these bllots bsed on voters groups: it will generte msked group bllot GB g for ech group g of voters. Suppose in group g, there re m voters {v 1, v 2,..., v m } who hve cst vlid bllots (i.e., their voting identifiers re in the set S), nd their msked bllots re {MB v1, MB v2,..., MB vm }. The msked group bllot GB g is n n p mtrix stisfying the following requirement: colsum{gb g B 1 } = m NB v. (6) To generte GB g bsed on the msked bllots {MB v1, MB v2,..., MB vm }, we provide the following Theorem 2. Theorem 2. If colsum{gb g } = colsum{ m k=1 MB v k }, then colsum{gb g B 1 } = m k=1 NB v k. Proof: For two rbitrry multiplible mtrices T 1 nd T 2, Therefore, colsum{t 1 T 2 } = colsum{t 1 } T 2. colsum{gb g B 1 } = colsum{gb g } B 1 m } =colsum{ k=1 MBv B 1 m } =colsum{ k k=1 MBv k B 1 =colsum { m k=1 NB } m v k = k=1 NB v k. This completes the proof. From Theorem 2, VPS cn esily generte GB g by producing pn 1column vectors GBg, 1..., GBg, j..., GBg, p such tht colsum{gbg} j = colsum{ m k=1 MB v k }[j], j [1,p]. To produce GBg, j VPS cn employ rndom number genertor to crete n 1 rndom numbers, r 1,r 2,...,r (n 1), s the first n 1 elements of GBg, j nd set the lst element of GBg j to be colsum{ m k=1 MB v k }[j] n 1 i=1 r i. Repeting this process by p times, VPS will obtin ll p column vectors of GB g. d) Step 4: VPS uplods dul-msked group bllots to the DMC. Now the VPS hs generted msked group bllot GB g for ech group g of voters. Next, it will multiply ech GB g by its corresponding group orthogonl mtrix A (note tht different groups hve different A, nd ech A is n n rndom orthogonl mtrix only known by the VPS), nd send A GB g with GID = g with the set S in messge M 3 to the DMC: M 3 = E(κ, {(A GB g,gid = g)} g {GID} S). (7) 4) Counting Phse: Upon receiving the messge M 3,the DMC decodes M 3 to obtin A GB g for ech group GID = g. Then the DMC uses the GID = g to fetch the group msking mtrix B from its dtbse, nd computes its inverse mtrix B 1. To obtin the ggregte tlly of ll voters in the group g, the DMC first multiplies A GB g by B 1 to recover the de-msked group bllot G g : G g = A GB g B 1. (8) Then, the DMC clcultes colsum{g g }, nd subtrcts the sum of the initil bllot noises of ll voters in the group g, who hve cst vlid bllots ccording to S, i.e., m k=1 k. The finl tlly result of group g is simply c g = colsum{g g } m. (9) In the next subsection, we will prove c g = x g, where x g = m k=1 OB v k is the sum of the originl bllots of ll voters who hve cst vlid bllots in group g. Finlly, for ech group g, the DMC verifies if the number of voters in group g mtches the number of votes in c g. If they ll mtch, the DMC will dd ll c g from every group g, nd publish the finl tlly nd the set S. This completes our MVP protocol. C. Correctness First, we prove tht for ech group g, the counting result of the DMC c g equls the ctul voting result x g = m k=1 OB v k. Proof: From (9), (8), Theorem 1, nd (6), we hve c g = colsum{g g } m = colsum{a GB g B 1 } m = colsum{gb g B 1 } m = m NB v m = m OB v = x g. This completes the proof. Next, the DMC clcultes the c g from (9) for ech group g {GID}, nd dds ll c g to obtins the finl result R. Clerly, R = c g = x g. (10) g {GID} g {GID} This demonstrtes the universl correctness of MVP. D. Efficiency Suppose there re totl of N voters in M groups. The computtion overhed of ech entity in MVP is given s follows: Ech voter only needs to pick one encrypted msked bllot nd cst it to the VPS. So its computtion cost is O(1). The VPS first ggregtes N voters msked bllots (1 p vectors) into M groups, whose cost is O(N p). Then it genertes M msked group bllots {GB g } g {GID} (n p mtrices), whose cost is O(M n p). Finlly, it multiplies ech of the M msked group bllots, GB g, with n n orthogonl mtrix A, to produce the dulmsked group bllots, whose cost is O(M n 2 p). So the totl computtion overhed of the VPS is O(N p + M n 2 p). The DMC needs to generte p msked bllots for ech voter, whose cost is O(N p 3 ). Also, for ech group g

6 of voters, the DMC needs to multiply the dul-msked group bllot A GB g by p p mtrix B 1 to recover the de-msked group bllot G g (n p mtrix), whose cost is O(M n p 2 ). Then it clcultes colsum{g g } nd subtrcts m k=1 k to compute c g, nd dd c g for ll M groups, whose cost is O(M n p + N p). SoDMC s totl computtion overhed is O(N p 3 + M n p 2 ). Since p nd n re constnt numbers fr smller thn M nd N, the computtion complexity for voters, the VPS, nd the DMC re ctully O(1), O(N + M), nd O(N + M), respectively. One cn see tht our MVP protocol is indeed very efficient. E. Security Anlysis 1) Receipt-freeness: Generlly speking, receipt-freeness mens voter cnnot provide ny proof to demonstrte to third prty tht he/she hs voted for prticulr cndidte, which mkes the vote-buying impossible. In our MVP protocol, receipt-freeness is chieved for the following three resons. First, the communiction chnnels in MVP re secure nd untppble, nd voters must uthenticte themselves with the DMC to vote. In other words, physicl recording nd msquerde re not possible. Second, the MVP protocol is designed in one-wy mnner. A voter v only obtins p encrypted msked bllots {EBv} j j [1,p] from the DMC, nd cn only cst one vlid bllot. After v csts his/her encrypted msked bllot EB v, the VPS will decrypt nd obtin its msked bllot MB v. But n honest VPS will not provide proof for v to demonstrte tht MB v is v s msked bllot. Even if the VPS is compromised to cooperte with the voter v, from its msked bllot MB v,thevoterv still cnnot prove his/her vote OB v, since neither the initil bllot noise nor the group msking mtrix B re known to v or the VPS. Finlly, since the DMC is semi-honest, it knows nd B, but will never prove to ny third prty tht nd B reusedtomskv s originl bllot OB v to llow vote-buying. Therefore, the voter v cnnot provide ny proof tht his/her cst bllot EB v indeed corresponds to the vote OB v fter he/she csts the bllot. 2) Double Voting Detection: In MVP, only verified voters re llowed to vote, nd ech qulified voter cn only cst one vlid vote. Voters must register nd uthenticte themselves with the DMC to obtin necessry informtion for voting. In prticulr, ech voter obtins unique voting identifier from the DMC, which must ccompny his/her vote for uthentiction. The VPS keeps trck of set S of the voting identifiers of ll lredy-voted voters. If misbehved voter v ttempts to cst multiple bllots, the VPS will only ccept v s first vote nd ignore v s other votes. Even if the VPS is compromised to cooperte with the voter to cst multiple bllots, the DMC cn esily detect this cheting behvior through mismtched number of voters nd the finl tlly derived from de-msking nd removing the initil bllot noises during the counting phse. Therefore, MVP chieves double voting detection. 3) Firness: MVP lso chieves firness by employing novel dt collection technique dul rndom mtrix msking (DRMM). Voters bllots re protected by two mtrices A nd B: the orthogonl msking mtrix A is only known to the VPS, while the invertible msking mtrix B is only known to the DMC. In MVP, voters individul msked bllots re collected by nd stored in the VPS. Since the group msking mtrix B is only known to the DMC, the VPS cnnot decode the msked bllots to obtin the originl bllots or the voting counts. Even if the VPS retrieves B, it still cnnot derive ny group bllot informtion without knowing the distribution of the initil bllot noise IB for this group of voters. Suppose the VPS tries to estimte the group voting result x g for the group g. The m originl bllots, u 1 = OB v1, u 2 = OB v2,..., u m = OB vm, re modeled s reliztions of m independent nd identiclly distributed (i.i.d.) rndom vribles (R.V.) U i, i [1,m], ech with the sme distribution s R.V. U. TheR.V.U cn only hve p different vlues {u j = OB j v j [1,p]}, where OB j v represents the originl bllot voting for the j-th cndidte. Similrly, the m initil bllot noises, w 1 = 1, w 2 = 2,..., w m = m,re viewed s reliztions of m i.i.d. R.V.s W i, i [1,m], ech with the sme distribution s R.V. W. The originl bllots re independent of the initil bllot noises, so U is independent of W. The VPS hs the perturbed bllot R.V. Z = U + W with m independent smples z 1 = NB v1 = u 1 + w 1, z 2 = NB v2 = u 2 + w 2,..., z m = NB vm = u m + w m, nd its purpose is to estimte the posterior probbility distribution of U, i.e., P (U = u i ), which cn revel the group voting result, with the perturbed bllots. Using Byes theorem, the posterior probbility distribution of U cn be written in terms of the density function f W of W s P (U = u j )= fz(z U=uj )P (U=u j ) f Z(z) = fz(z U=uj )P (U=u j ) p k=1 fz(z U=uk )P (U=u k ) = f W (z u j )P (U=u j ) p k=1 fw (z uk )P (U=u k ). However, since the VPS doesn t know the density function f W of W, it cnnot estimte the distribution of the originl bllots U from the m smples of perturbed bllots Z. Finlly, since the VPS will not uplod group bllots to the DMC for counting until ll voters hve finished voting, the DMC cn only count the finl tlly fter the voting period ends. Therefore, no intermedite results cn be obtined by ny entity. 4) Bllot Secrecy: MVP chieves bllot secrecy. In MVP, the VPS nd DMC ech holds key mtrix: VPS keeps the orthogonl mtrix A, nd DMC keeps the invertible mtrix B. They re both curious bout the originl bllot OB v of ech individul voter v, but they cnnot obtin OB v from MVP. For the DMC, it only hs ccess to dul-msked group bllot A GB g for ech group g, which is just rndom n p mtrix. Since A is only known to the VPS, the DMC cnnot decode the dul-msked group bllot to obtin ny individul bllot. Even if the DMC retrieves A, nd uses A 1 to recover the msked group bllot GB g, it still cnnot derive ny individul bllot from the group-rndomized bllot GB g. For the VPS, it hs ccess to the msked bllots MB v for ech voter v. However, since the group msking mtrix B is only known to the DMC, the VPS cnnot decode MB v to obtin v s originl vote OB v. Even if the VPS retrieves B, nd uses B 1 to recover the perturbed bllot NB v, it still cnnot derive the originl bllot OB v without the initil bllot

7 noise. Suppose the VPS ttempts to digest the originl bllot OB v from its perturbed bllot NB v = z. Through Lemm 1, when the noises flood mong the whole observtion spce, the VPS cnnot tell which noise hs been dded by 1 (the vote), which mens it cnnot retrieve the originl bllot OB v from the perturbed bllot NB v = z =[z 1,z 2,,z p ]= [w 1,w 2,,w p ]+OB v. In other words, if the noises fluctute with n mplitude higher thn certin vlue, the noises will overwhelm the originl bllot. Therefore, the bllot secrecy is preserved. 5) Integrity: In our MVP protocol, ech voter v only hs ccess to p encrypted msked bllots, ech corresponding to one vote for one prticulr cndidte. Since the bllots re encrypted nd msked by the DMC, v cnnot modify these bllots to throw multiple votes for some cndidte(s) in one bllot. In ddition, since the msking mtrix B nd the initil bllot noises re only known to the DMC, if compromised VPS ttempts to duplicte, modify, or replce ny individul bllot, the number of voters nd the finl tlly result will be mismtched during the counting phse, which cn be esily detected by the DMC. The VPS cnnot remove ny individul bllot either. When the DMC publishes the finl tlly result, ny voter v who hs voted cn check whether its voting identifer (GID v,index v )isinthesets or not. If (GID v,index v ) / S, then v cn detect the VPS hs removed its bllot nd report to the DMC. Therefore, no entity cn modify, duplicte, or remove ny individul bllot without being detected. The integrity of ech individul bllot is chieved in our MVP protocol. IV. RELATED WORK The existing nonymous E-voting protocols cn be briefly summrized into three ctegories: mix-nets, blind signtures, nd homomorphic encryption. Mix-net is chin of mixing servers (mixers) tht provide n nonymous communiction chnnel between the senders nd the receivers by re-rrnging the order of the messges from the senders [15]. The nonymous communiction chnnel offered by Mix-net cn be used to design nonymous voting protocols tht prevent the sever tht collects votes from knowing which vote comes from which voter [1], [5], [7], [10], [15]. However, the existing protocols bsed on Mix-net hve their deficiency [8]: They re generlly not efficient since computtionl effort is required for multiple mixers to prove the correctness. These mixers must be independently owned (such tht they will not collude), which increses the deployment difficulty in prctice. Protocols bsed on blind signtures [9], [16] re more prcticl with simpler procedures involving n uthorized uthentiction center tht produces blind signtures nd server tht collects the votes. Removing the need for trusted center tht genertes blind signtures, ring signture bsed protocol [8] is proposed for voters to sign their votes with linkble ring signtures [6]. The gretest drwbck of these protocols is the ssumption of n nonymous chnnel between the voters nd the server. Homomorphic encryption is nother technique frequently employed by nonymous E-voting protocols [4], [17]. Most of them do not conform to the receipt-freeness requirement. For the ones tht do [4], they cnnot ensure the integrity requirement when the proxy server (tht combines the homomorphiclly encrypted votes) is compromised. Moveover, the computtion overhed ssocited with homomorphic encryption is reltively high, nd ech voter must provide the proof of vlidity of his/her bllot, which needs to be verified by the proxy server. V. CONCLUSION In this pper, we propose two novel efficient nonymous E-voting protocol MVP. Unlike existing nonymous E- voting protocols which incur high computtion overhed for cryptogrphicl opertions, our protocols pply novel efficient dul rndom mtrix msking (DRMM) technique. Through nlysis, we demonstrte their correctness, receipt-freeness, double voting detection, firness, bllot secrecy, nd integrity. VI. ACKNOWLEDGMENT This work is supported in prt by the Ntionl Science Foundtion under grnt STC , nd grnt from Florid Cybersecurity Center. REFERENCES [1] A. Neff, A Verifible Secret Shuffle nd its Appliction to E-Voting, Proc. of ACM CCS, pp , [2] D. Chum, A. Essex, R. Crbck, J. Clrk, S. Popoveniuc, A. Shermn, nd P. Vor, Scntegrity: End-to-End Voter-Verifible Opticl- Scn Voting, Proc. of IEEE Security & Privcy, vol. 6, no. 3, pp , [3] B. Adid, Helios: Web-bsed Open-Audit Voting, Proc. of USENIX Security Symposium, vol. 17, pp , [4] A. P. Adewole, A. S. Sodiy, nd O. A. Arowolo, A Receipt-free Multi-Authority E-Voting System, Interntionl Journl of Computer Applictions, vol. 30, no. 6, pp , [5] M. Jkobsson, A. Juels, nd R. L. Rivest, Mking Mix Nets Robust For Electronic Voting By Rndomized Prtil Checking, Proc. of USENIX Security Symposium, pp , [6] J. Liu, V. Wei,, nd D. Wong, Linkble Spontneous Anonymous Group Signture for Ad Hoc Groups, Proc. of Informtion Security nd Privcy, pp , [7] D. Chum, Secret-Bllot Receipts: True Voter-Verifible Elections, Proc. of IEEE Security & Privcy, vol. 2, no. 1, pp , [8] S. Chow, J. Liu, nd D. Wong, Robust Receipt-Free Election System with Bllot Secrecy nd Verifibility, Proc. of NDSS, vol. 8, pp , [9] A. Fujiok, T. Okmoto,, nd K. Oht, A Prcticl Secret Voting Scheme for Lrge Scle Elections, Proc. of AUSCRYPT 92, pp , [10] A. Rier nd J. Borrell, Prcticl Approch to Anonymity in Lrge Scle Electronic Voting Schemes, Proc. of NDSS, [11] G. T. Duncn nd R. W. Person, Enhncing Access to Microdt While Protecting Confidentility: Prospects for the Future, Sttisticl Science, vol. 6, no. 3, pp , [12] S. Chwl, C. Dwork, F. McSherry, A. Smith, nd H. Wee, Towrd Privcy in Public Dtbses, Theory of Cryptogrphy, pp , [13] K. Murlidhr nd R. Srthy, Dt Shuffling-A New Msking Approch for Numericl Dt, Mngement Sci., vol. 52, no. 5, pp , [14] D. Ting, S. E. Fienberg, nd M. Trottini, Rndom Orthogonl Mtrix Msking Methodology for Microdt Relese, Interntionl Journl of Informtion nd Computer Security, vol. 2, no. 1, pp , [15] D. Chum, Untrceble Electronic Mil, Return Addresses, nd Digitl Pseudonyms, Communictions of the ACM, vol. 24, pp , [16], Elections with Unconditionlly-Secret Bllots nd Disruption Equivlent to Breking RSA, Proc. of EUROCRYPT 88, pp , [17] K. Peng, R. Adity, C. Boyd, E. Dwson, nd B. Lee, Multiplictive Homomorphic E-Voting, Proc. of INDOCRYPT 2004, pp , 2005.

1 Online Learning and Regret Minimization

1 Online Learning and Regret Minimization 2.997 Decision-Mking in Lrge-Scle Systems My 10 MIT, Spring 2004 Hndout #29 Lecture Note 24 1 Online Lerning nd Regret Minimiztion In this lecture, we consider the problem of sequentil decision mking in

More information

THE EXISTENCE-UNIQUENESS THEOREM FOR FIRST-ORDER DIFFERENTIAL EQUATIONS.

THE EXISTENCE-UNIQUENESS THEOREM FOR FIRST-ORDER DIFFERENTIAL EQUATIONS. THE EXISTENCE-UNIQUENESS THEOREM FOR FIRST-ORDER DIFFERENTIAL EQUATIONS RADON ROSBOROUGH https://intuitiveexplntionscom/picrd-lindelof-theorem/ This document is proof of the existence-uniqueness theorem

More information

New data structures to reduce data size and search time

New data structures to reduce data size and search time New dt structures to reduce dt size nd serch time Tsuneo Kuwbr Deprtment of Informtion Sciences, Fculty of Science, Kngw University, Hirtsuk-shi, Jpn FIT2018 1D-1, No2, pp1-4 Copyright (c)2018 by The Institute

More information

Generalized Fano and non-fano networks

Generalized Fano and non-fano networks Generlized Fno nd non-fno networks Nildri Ds nd Brijesh Kumr Ri Deprtment of Electronics nd Electricl Engineering Indin Institute of Technology Guwhti, Guwhti, Assm, Indi Emil: {d.nildri, bkri}@iitg.ernet.in

More information

The steps of the hypothesis test

The steps of the hypothesis test ttisticl Methods I (EXT 7005) Pge 78 Mosquito species Time of dy A B C Mid morning 0.0088 5.4900 5.5000 Mid Afternoon.3400 0.0300 0.8700 Dusk 0.600 5.400 3.000 The Chi squre test sttistic is the sum of

More information

How do we solve these things, especially when they get complicated? How do we know when a system has a solution, and when is it unique?

How do we solve these things, especially when they get complicated? How do we know when a system has a solution, and when is it unique? XII. LINEAR ALGEBRA: SOLVING SYSTEMS OF EQUATIONS Tody we re going to tlk bout solving systems of liner equtions. These re problems tht give couple of equtions with couple of unknowns, like: 6 2 3 7 4

More information

Extended nonlocal games from quantum-classical games

Extended nonlocal games from quantum-classical games Extended nonlocl gmes from quntum-clssicl gmes Theory Seminr incent Russo niversity of Wterloo October 17, 2016 Outline Extended nonlocl gmes nd quntum-clssicl gmes Entngled vlues nd the dimension of entnglement

More information

Weakness of Shim s New ID-based Tripartite. Multiple-key Agreement Protocol

Weakness of Shim s New ID-based Tripartite. Multiple-key Agreement Protocol Wekness of Shim s New ID-bsed Triprtite Multiple-key greement Protocol Jue-Sm hou* hu-hsing Lin** nd hi-hung hiu** jschou@mil.nhu.edu.tw chlin@thu.edu.tw hdilwy@islb.csie.thu.edu.tw *Deprtment of Informtion

More information

New Expansion and Infinite Series

New Expansion and Infinite Series Interntionl Mthemticl Forum, Vol. 9, 204, no. 22, 06-073 HIKARI Ltd, www.m-hikri.com http://dx.doi.org/0.2988/imf.204.4502 New Expnsion nd Infinite Series Diyun Zhng College of Computer Nnjing University

More information

Review of Calculus, cont d

Review of Calculus, cont d Jim Lmbers MAT 460 Fll Semester 2009-10 Lecture 3 Notes These notes correspond to Section 1.1 in the text. Review of Clculus, cont d Riemnn Sums nd the Definite Integrl There re mny cses in which some

More information

MAA 4212 Improper Integrals

MAA 4212 Improper Integrals Notes by Dvid Groisser, Copyright c 1995; revised 2002, 2009, 2014 MAA 4212 Improper Integrls The Riemnn integrl, while perfectly well-defined, is too restrictive for mny purposes; there re functions which

More information

Math 8 Winter 2015 Applications of Integration

Math 8 Winter 2015 Applications of Integration Mth 8 Winter 205 Applictions of Integrtion Here re few importnt pplictions of integrtion. The pplictions you my see on n exm in this course include only the Net Chnge Theorem (which is relly just the Fundmentl

More information

Acceptance Sampling by Attributes

Acceptance Sampling by Attributes Introduction Acceptnce Smpling by Attributes Acceptnce smpling is concerned with inspection nd decision mking regrding products. Three spects of smpling re importnt: o Involves rndom smpling of n entire

More information

Infinite Geometric Series

Infinite Geometric Series Infinite Geometric Series Finite Geometric Series ( finite SUM) Let 0 < r < 1, nd let n be positive integer. Consider the finite sum It turns out there is simple lgebric expression tht is equivlent to

More information

Chapter 14. Matrix Representations of Linear Transformations

Chapter 14. Matrix Representations of Linear Transformations Chpter 4 Mtrix Representtions of Liner Trnsformtions When considering the Het Stte Evolution, we found tht we could describe this process using multipliction by mtrix. This ws nice becuse computers cn

More information

SCHOOL OF ENGINEERING & BUILT ENVIRONMENT. Mathematics

SCHOOL OF ENGINEERING & BUILT ENVIRONMENT. Mathematics SCHOOL OF ENGINEERING & BUIL ENVIRONMEN Mthemtics An Introduction to Mtrices Definition of Mtri Size of Mtri Rows nd Columns of Mtri Mtri Addition Sclr Multipliction of Mtri Mtri Multipliction 7 rnspose

More information

Jin-Fu Li. Department of Electrical Engineering National Central University Jhongli, Taiwan

Jin-Fu Li. Department of Electrical Engineering National Central University Jhongli, Taiwan Trnsprent BIST for RAMs Jin-Fu Li Advnced d Relible Systems (ARES) Lb. Deprtment of Electricl Engineering Ntionl Centrl University Jhongli, Tiwn Outline Introduction Concept of Trnsprent Test Trnsprent

More information

Properties of Integrals, Indefinite Integrals. Goals: Definition of the Definite Integral Integral Calculations using Antiderivatives

Properties of Integrals, Indefinite Integrals. Goals: Definition of the Definite Integral Integral Calculations using Antiderivatives Block #6: Properties of Integrls, Indefinite Integrls Gols: Definition of the Definite Integrl Integrl Clcultions using Antiderivtives Properties of Integrls The Indefinite Integrl 1 Riemnn Sums - 1 Riemnn

More information

Operations with Polynomials

Operations with Polynomials 38 Chpter P Prerequisites P.4 Opertions with Polynomils Wht you should lern: How to identify the leding coefficients nd degrees of polynomils How to dd nd subtrct polynomils How to multiply polynomils

More information

7.2 The Definite Integral

7.2 The Definite Integral 7.2 The Definite Integrl the definite integrl In the previous section, it ws found tht if function f is continuous nd nonnegtive, then the re under the grph of f on [, b] is given by F (b) F (), where

More information

Matrix Solution to Linear Equations and Markov Chains

Matrix Solution to Linear Equations and Markov Chains Trding Systems nd Methods, Fifth Edition By Perry J. Kufmn Copyright 2005, 2013 by Perry J. Kufmn APPENDIX 2 Mtrix Solution to Liner Equtions nd Mrkov Chins DIRECT SOLUTION AND CONVERGENCE METHOD Before

More information

Math 1B, lecture 4: Error bounds for numerical methods

Math 1B, lecture 4: Error bounds for numerical methods Mth B, lecture 4: Error bounds for numericl methods Nthn Pflueger 4 September 0 Introduction The five numericl methods descried in the previous lecture ll operte by the sme principle: they pproximte the

More information

APPROXIMATE INTEGRATION

APPROXIMATE INTEGRATION APPROXIMATE INTEGRATION. Introduction We hve seen tht there re functions whose nti-derivtives cnnot be expressed in closed form. For these resons ny definite integrl involving these integrnds cnnot be

More information

Lecture Note 9: Orthogonal Reduction

Lecture Note 9: Orthogonal Reduction MATH : Computtionl Methods of Liner Algebr 1 The Row Echelon Form Lecture Note 9: Orthogonl Reduction Our trget is to solve the norml eution: Xinyi Zeng Deprtment of Mthemticl Sciences, UTEP A t Ax = A

More information

Coalgebra, Lecture 15: Equations for Deterministic Automata

Coalgebra, Lecture 15: Equations for Deterministic Automata Colger, Lecture 15: Equtions for Deterministic Automt Julin Slmnc (nd Jurrin Rot) Decemer 19, 2016 In this lecture, we will study the concept of equtions for deterministic utomt. The notes re self contined

More information

Math Lecture 23

Math Lecture 23 Mth 8 - Lecture 3 Dyln Zwick Fll 3 In our lst lecture we delt with solutions to the system: x = Ax where A is n n n mtrix with n distinct eigenvlues. As promised, tody we will del with the question of

More information

8 Laplace s Method and Local Limit Theorems

8 Laplace s Method and Local Limit Theorems 8 Lplce s Method nd Locl Limit Theorems 8. Fourier Anlysis in Higher DImensions Most of the theorems of Fourier nlysis tht we hve proved hve nturl generliztions to higher dimensions, nd these cn be proved

More information

Chapter 0. What is the Lebesgue integral about?

Chapter 0. What is the Lebesgue integral about? Chpter 0. Wht is the Lebesgue integrl bout? The pln is to hve tutoril sheet ech week, most often on Fridy, (to be done during the clss) where you will try to get used to the ides introduced in the previous

More information

Chapter 4 Contravariance, Covariance, and Spacetime Diagrams

Chapter 4 Contravariance, Covariance, and Spacetime Diagrams Chpter 4 Contrvrince, Covrince, nd Spcetime Digrms 4. The Components of Vector in Skewed Coordintes We hve seen in Chpter 3; figure 3.9, tht in order to show inertil motion tht is consistent with the Lorentz

More information

The Regulated and Riemann Integrals

The Regulated and Riemann Integrals Chpter 1 The Regulted nd Riemnn Integrls 1.1 Introduction We will consider severl different pproches to defining the definite integrl f(x) dx of function f(x). These definitions will ll ssign the sme vlue

More information

SUMMER KNOWHOW STUDY AND LEARNING CENTRE

SUMMER KNOWHOW STUDY AND LEARNING CENTRE SUMMER KNOWHOW STUDY AND LEARNING CENTRE Indices & Logrithms 2 Contents Indices.2 Frctionl Indices.4 Logrithms 6 Exponentil equtions. Simplifying Surds 13 Opertions on Surds..16 Scientific Nottion..18

More information

Duality # Second iteration for HW problem. Recall our LP example problem we have been working on, in equality form, is given below.

Duality # Second iteration for HW problem. Recall our LP example problem we have been working on, in equality form, is given below. Dulity #. Second itertion for HW problem Recll our LP emple problem we hve been working on, in equlity form, is given below.,,,, 8 m F which, when written in slightly different form, is 8 F Recll tht we

More information

Numerical integration

Numerical integration 2 Numericl integrtion This is pge i Printer: Opque this 2. Introduction Numericl integrtion is problem tht is prt of mny problems in the economics nd econometrics literture. The orgniztion of this chpter

More information

Bernoulli Numbers Jeff Morton

Bernoulli Numbers Jeff Morton Bernoulli Numbers Jeff Morton. We re interested in the opertor e t k d k t k, which is to sy k tk. Applying this to some function f E to get e t f d k k tk d k f f + d k k tk dk f, we note tht since f

More information

Lecture 1. Functional series. Pointwise and uniform convergence.

Lecture 1. Functional series. Pointwise and uniform convergence. 1 Introduction. Lecture 1. Functionl series. Pointwise nd uniform convergence. In this course we study mongst other things Fourier series. The Fourier series for periodic function f(x) with period 2π is

More information

Theoretical foundations of Gaussian quadrature

Theoretical foundations of Gaussian quadrature Theoreticl foundtions of Gussin qudrture 1 Inner product vector spce Definition 1. A vector spce (or liner spce) is set V = {u, v, w,...} in which the following two opertions re defined: (A) Addition of

More information

Continuous Random Variables

Continuous Random Variables STAT/MATH 395 A - PROBABILITY II UW Winter Qurter 217 Néhémy Lim Continuous Rndom Vribles Nottion. The indictor function of set S is rel-vlued function defined by : { 1 if x S 1 S (x) if x S Suppose tht

More information

Lecture 3. In this lecture, we will discuss algorithms for solving systems of linear equations.

Lecture 3. In this lecture, we will discuss algorithms for solving systems of linear equations. Lecture 3 3 Solving liner equtions In this lecture we will discuss lgorithms for solving systems of liner equtions Multiplictive identity Let us restrict ourselves to considering squre mtrices since one

More information

W. We shall do so one by one, starting with I 1, and we shall do it greedily, trying

W. We shall do so one by one, starting with I 1, and we shall do it greedily, trying Vitli covers 1 Definition. A Vitli cover of set E R is set V of closed intervls with positive length so tht, for every δ > 0 nd every x E, there is some I V with λ(i ) < δ nd x I. 2 Lemm (Vitli covering)

More information

Monte Carlo method in solving numerical integration and differential equation

Monte Carlo method in solving numerical integration and differential equation Monte Crlo method in solving numericl integrtion nd differentil eqution Ye Jin Chemistry Deprtment Duke University yj66@duke.edu Abstrct: Monte Crlo method is commonly used in rel physics problem. The

More information

Recitation 3: More Applications of the Derivative

Recitation 3: More Applications of the Derivative Mth 1c TA: Pdric Brtlett Recittion 3: More Applictions of the Derivtive Week 3 Cltech 2012 1 Rndom Question Question 1 A grph consists of the following: A set V of vertices. A set E of edges where ech

More information

Construction and Selection of Single Sampling Quick Switching Variables System for given Control Limits Involving Minimum Sum of Risks

Construction and Selection of Single Sampling Quick Switching Variables System for given Control Limits Involving Minimum Sum of Risks Construction nd Selection of Single Smpling Quick Switching Vribles System for given Control Limits Involving Minimum Sum of Risks Dr. D. SENHILKUMAR *1 R. GANESAN B. ESHA RAFFIE 1 Associte Professor,

More information

Chapter 5 : Continuous Random Variables

Chapter 5 : Continuous Random Variables STAT/MATH 395 A - PROBABILITY II UW Winter Qurter 216 Néhémy Lim Chpter 5 : Continuous Rndom Vribles Nottions. N {, 1, 2,...}, set of nturl numbers (i.e. ll nonnegtive integers); N {1, 2,...}, set of ll

More information

5.7 Improper Integrals

5.7 Improper Integrals 458 pplictions of definite integrls 5.7 Improper Integrls In Section 5.4, we computed the work required to lift pylod of mss m from the surfce of moon of mss nd rdius R to height H bove the surfce of the

More information

State space systems analysis (continued) Stability. A. Definitions A system is said to be Asymptotically Stable (AS) when it satisfies

State space systems analysis (continued) Stability. A. Definitions A system is said to be Asymptotically Stable (AS) when it satisfies Stte spce systems nlysis (continued) Stbility A. Definitions A system is sid to be Asymptoticlly Stble (AS) when it stisfies ut () = 0, t > 0 lim xt () 0. t A system is AS if nd only if the impulse response

More information

Compact and Unforgeable Key Establishment over an ATM Network

Compact and Unforgeable Key Establishment over an ATM Network Compct nd Unforgeble Key Estblishment over n ATM Networ Yuling Zheng (Monsh University, Austrli) Hidei Imi (University of Toyo, Jpn) 1 Outline of the tl Motivtion of this reserch Introduction to signcryption

More information

f(x) dx, If one of these two conditions is not met, we call the integral improper. Our usual definition for the value for the definite integral

f(x) dx, If one of these two conditions is not met, we call the integral improper. Our usual definition for the value for the definite integral Improper Integrls Every time tht we hve evluted definite integrl such s f(x) dx, we hve mde two implicit ssumptions bout the integrl:. The intervl [, b] is finite, nd. f(x) is continuous on [, b]. If one

More information

Module 6: LINEAR TRANSFORMATIONS

Module 6: LINEAR TRANSFORMATIONS Module 6: LINEAR TRANSFORMATIONS. Trnsformtions nd mtrices Trnsformtions re generliztions of functions. A vector x in some set S n is mpped into m nother vector y T( x). A trnsformtion is liner if, for

More information

KNOWLEDGE-BASED AGENTS INFERENCE

KNOWLEDGE-BASED AGENTS INFERENCE AGENTS THAT REASON LOGICALLY KNOWLEDGE-BASED AGENTS Two components: knowledge bse, nd n inference engine. Declrtive pproch to building n gent. We tell it wht it needs to know, nd It cn sk itself wht to

More information

Reversals of Signal-Posterior Monotonicity for Any Bounded Prior

Reversals of Signal-Posterior Monotonicity for Any Bounded Prior Reversls of Signl-Posterior Monotonicity for Any Bounded Prior Christopher P. Chmbers Pul J. Hely Abstrct Pul Milgrom (The Bell Journl of Economics, 12(2): 380 391) showed tht if the strict monotone likelihood

More information

19 Optimal behavior: Game theory

19 Optimal behavior: Game theory Intro. to Artificil Intelligence: Dle Schuurmns, Relu Ptrscu 1 19 Optiml behvior: Gme theory Adversril stte dynmics hve to ccount for worst cse Compute policy π : S A tht mximizes minimum rewrd Let S (,

More information

Improper Integrals. Type I Improper Integrals How do we evaluate an integral such as

Improper Integrals. Type I Improper Integrals How do we evaluate an integral such as Improper Integrls Two different types of integrls cn qulify s improper. The first type of improper integrl (which we will refer to s Type I) involves evluting n integrl over n infinite region. In the grph

More information

p-adic Egyptian Fractions

p-adic Egyptian Fractions p-adic Egyptin Frctions Contents 1 Introduction 1 2 Trditionl Egyptin Frctions nd Greedy Algorithm 2 3 Set-up 3 4 p-greedy Algorithm 5 5 p-egyptin Trditionl 10 6 Conclusion 1 Introduction An Egyptin frction

More information

Lesson 25: Adding and Subtracting Rational Expressions

Lesson 25: Adding and Subtracting Rational Expressions Lesson 2: Adding nd Subtrcting Rtionl Expressions Student Outcomes Students perform ddition nd subtrction of rtionl expressions. Lesson Notes This lesson reviews ddition nd subtrction of frctions using

More information

CS5371 Theory of Computation. Lecture 20: Complexity V (Polynomial-Time Reducibility)

CS5371 Theory of Computation. Lecture 20: Complexity V (Polynomial-Time Reducibility) CS5371 Theory of Computtion Lecture 20: Complexity V (Polynomil-Time Reducibility) Objectives Polynomil Time Reducibility Prove Cook-Levin Theorem Polynomil Time Reducibility Previously, we lernt tht if

More information

Student Activity 3: Single Factor ANOVA

Student Activity 3: Single Factor ANOVA MATH 40 Student Activity 3: Single Fctor ANOVA Some Bsic Concepts In designed experiment, two or more tretments, or combintions of tretments, is pplied to experimentl units The number of tretments, whether

More information

ARITHMETIC OPERATIONS. The real numbers have the following properties: a b c ab ac

ARITHMETIC OPERATIONS. The real numbers have the following properties: a b c ab ac REVIEW OF ALGEBRA Here we review the bsic rules nd procedures of lgebr tht you need to know in order to be successful in clculus. ARITHMETIC OPERATIONS The rel numbers hve the following properties: b b

More information

Improper Integrals, and Differential Equations

Improper Integrals, and Differential Equations Improper Integrls, nd Differentil Equtions October 22, 204 5.3 Improper Integrls Previously, we discussed how integrls correspond to res. More specificlly, we sid tht for function f(x), the region creted

More information

1.9 C 2 inner variations

1.9 C 2 inner variations 46 CHAPTER 1. INDIRECT METHODS 1.9 C 2 inner vritions So fr, we hve restricted ttention to liner vritions. These re vritions of the form vx; ǫ = ux + ǫφx where φ is in some liner perturbtion clss P, for

More information

USA Mathematical Talent Search Round 1 Solutions Year 21 Academic Year

USA Mathematical Talent Search Round 1 Solutions Year 21 Academic Year 1/1/21. Fill in the circles in the picture t right with the digits 1-8, one digit in ech circle with no digit repeted, so tht no two circles tht re connected by line segment contin consecutive digits.

More information

A recursive construction of efficiently decodable list-disjunct matrices

A recursive construction of efficiently decodable list-disjunct matrices CSE 709: Compressed Sensing nd Group Testing. Prt I Lecturers: Hung Q. Ngo nd Atri Rudr SUNY t Bufflo, Fll 2011 Lst updte: October 13, 2011 A recursive construction of efficiently decodble list-disjunct

More information

The First Fundamental Theorem of Calculus. If f(x) is continuous on [a, b] and F (x) is any antiderivative. f(x) dx = F (b) F (a).

The First Fundamental Theorem of Calculus. If f(x) is continuous on [a, b] and F (x) is any antiderivative. f(x) dx = F (b) F (a). The Fundmentl Theorems of Clculus Mth 4, Section 0, Spring 009 We now know enough bout definite integrls to give precise formultions of the Fundmentl Theorems of Clculus. We will lso look t some bsic emples

More information

Fourier Series and Their Applications

Fourier Series and Their Applications Fourier Series nd Their Applictions Rui iu My, 006 Abstrct Fourier series re of gret importnce in both theoreticl nd pplied mthemtics. For orthonorml fmilies of complex vlued functions {φ n}, Fourier Series

More information

CS667 Lecture 6: Monte Carlo Integration 02/10/05

CS667 Lecture 6: Monte Carlo Integration 02/10/05 CS667 Lecture 6: Monte Crlo Integrtion 02/10/05 Venkt Krishnrj Lecturer: Steve Mrschner 1 Ide The min ide of Monte Crlo Integrtion is tht we cn estimte the vlue of n integrl by looking t lrge number of

More information

Quantum Physics II (8.05) Fall 2013 Assignment 2

Quantum Physics II (8.05) Fall 2013 Assignment 2 Quntum Physics II (8.05) Fll 2013 Assignment 2 Msschusetts Institute of Technology Physics Deprtment Due Fridy September 20, 2013 September 13, 2013 3:00 pm Suggested Reding Continued from lst week: 1.

More information

HW3, Math 307. CSUF. Spring 2007.

HW3, Math 307. CSUF. Spring 2007. HW, Mth 7. CSUF. Spring 7. Nsser M. Abbsi Spring 7 Compiled on November 5, 8 t 8:8m public Contents Section.6, problem Section.6, problem Section.6, problem 5 Section.6, problem 7 6 5 Section.6, problem

More information

Sample pages. 9:04 Equations with grouping symbols

Sample pages. 9:04 Equations with grouping symbols Equtions 9 Contents I know the nswer is here somewhere! 9:01 Inverse opertions 9:0 Solving equtions Fun spot 9:0 Why did the tooth get dressed up? 9:0 Equtions with pronumerls on both sides GeoGebr ctivity

More information

Research Article Moment Inequalities and Complete Moment Convergence

Research Article Moment Inequalities and Complete Moment Convergence Hindwi Publishing Corportion Journl of Inequlities nd Applictions Volume 2009, Article ID 271265, 14 pges doi:10.1155/2009/271265 Reserch Article Moment Inequlities nd Complete Moment Convergence Soo Hk

More information

Integral points on the rational curve

Integral points on the rational curve Integrl points on the rtionl curve y x bx c x ;, b, c integers. Konstntine Zeltor Mthemtics University of Wisconsin - Mrinette 750 W. Byshore Street Mrinette, WI 5443-453 Also: Konstntine Zeltor P.O. Box

More information

Intermediate Math Circles Wednesday, November 14, 2018 Finite Automata II. Nickolas Rollick a b b. a b 4

Intermediate Math Circles Wednesday, November 14, 2018 Finite Automata II. Nickolas Rollick a b b. a b 4 Intermedite Mth Circles Wednesdy, Novemer 14, 2018 Finite Automt II Nickols Rollick nrollick@uwterloo.c Regulr Lnguges Lst time, we were introduced to the ide of DFA (deterministic finite utomton), one

More information

CS 188 Introduction to Artificial Intelligence Fall 2018 Note 7

CS 188 Introduction to Artificial Intelligence Fall 2018 Note 7 CS 188 Introduction to Artificil Intelligence Fll 2018 Note 7 These lecture notes re hevily bsed on notes originlly written by Nikhil Shrm. Decision Networks In the third note, we lerned bout gme trees

More information

Vyacheslav Telnin. Search for New Numbers.

Vyacheslav Telnin. Search for New Numbers. Vycheslv Telnin Serch for New Numbers. 1 CHAPTER I 2 I.1 Introduction. In 1984, in the first issue for tht yer of the Science nd Life mgzine, I red the rticle "Non-Stndrd Anlysis" by V. Uspensky, in which

More information

Math 426: Probability Final Exam Practice

Math 426: Probability Final Exam Practice Mth 46: Probbility Finl Exm Prctice. Computtionl problems 4. Let T k (n) denote the number of prtitions of the set {,..., n} into k nonempty subsets, where k n. Argue tht T k (n) kt k (n ) + T k (n ) by

More information

Week 10: Line Integrals

Week 10: Line Integrals Week 10: Line Integrls Introduction In this finl week we return to prmetrised curves nd consider integrtion long such curves. We lredy sw this in Week 2 when we integrted long curve to find its length.

More information

Bases for Vector Spaces

Bases for Vector Spaces Bses for Vector Spces 2-26-25 A set is independent if, roughly speking, there is no redundncy in the set: You cn t uild ny vector in the set s liner comintion of the others A set spns if you cn uild everything

More information

Lecture 08: Feb. 08, 2019

Lecture 08: Feb. 08, 2019 4CS4-6:Theory of Computtion(Closure on Reg. Lngs., regex to NDFA, DFA to regex) Prof. K.R. Chowdhry Lecture 08: Fe. 08, 2019 : Professor of CS Disclimer: These notes hve not een sujected to the usul scrutiny

More information

For convenience, we rewrite m2 s m2 = m m m ; where m is repeted m times. Since xyz = m m m nd jxyj»m, we hve tht the string y is substring of the fir

For convenience, we rewrite m2 s m2 = m m m ; where m is repeted m times. Since xyz = m m m nd jxyj»m, we hve tht the string y is substring of the fir CSCI 2400 Models of Computtion, Section 3 Solutions to Homework 4 Problem 1. ll the solutions below refer to the Pumping Lemm of Theorem 4.8, pge 119. () L = f n b l k : k n + lg Let's ssume for contrdiction

More information

N 0 completions on partial matrices

N 0 completions on partial matrices N 0 completions on prtil mtrices C. Jordán C. Mendes Arújo Jun R. Torregros Instituto de Mtemátic Multidisciplinr / Centro de Mtemátic Universidd Politécnic de Vlenci / Universidde do Minho Cmino de Ver

More information

Advanced Calculus: MATH 410 Notes on Integrals and Integrability Professor David Levermore 17 October 2004

Advanced Calculus: MATH 410 Notes on Integrals and Integrability Professor David Levermore 17 October 2004 Advnced Clculus: MATH 410 Notes on Integrls nd Integrbility Professor Dvid Levermore 17 October 2004 1. Definite Integrls In this section we revisit the definite integrl tht you were introduced to when

More information

The practical version

The practical version Roerto s Notes on Integrl Clculus Chpter 4: Definite integrls nd the FTC Section 7 The Fundmentl Theorem of Clculus: The prcticl version Wht you need to know lredy: The theoreticl version of the FTC. Wht

More information

The Algebra (al-jabr) of Matrices

The Algebra (al-jabr) of Matrices Section : Mtri lgebr nd Clculus Wshkewicz College of Engineering he lgebr (l-jbr) of Mtrices lgebr s brnch of mthemtics is much broder thn elementry lgebr ll of us studied in our high school dys. In sense

More information

CS 373, Spring Solutions to Mock midterm 1 (Based on first midterm in CS 273, Fall 2008.)

CS 373, Spring Solutions to Mock midterm 1 (Based on first midterm in CS 273, Fall 2008.) CS 373, Spring 29. Solutions to Mock midterm (sed on first midterm in CS 273, Fll 28.) Prolem : Short nswer (8 points) The nswers to these prolems should e short nd not complicted. () If n NF M ccepts

More information

Handout: Natural deduction for first order logic

Handout: Natural deduction for first order logic MATH 457 Introduction to Mthemticl Logic Spring 2016 Dr Json Rute Hndout: Nturl deduction for first order logic We will extend our nturl deduction rules for sententil logic to first order logic These notes

More information

1 Probability Density Functions

1 Probability Density Functions Lis Yn CS 9 Continuous Distributions Lecture Notes #9 July 6, 28 Bsed on chpter by Chris Piech So fr, ll rndom vribles we hve seen hve been discrete. In ll the cses we hve seen in CS 9, this ment tht our

More information

Section 6.1 INTRO to LAPLACE TRANSFORMS

Section 6.1 INTRO to LAPLACE TRANSFORMS Section 6. INTRO to LAPLACE TRANSFORMS Key terms: Improper Integrl; diverge, converge A A f(t)dt lim f(t)dt Piecewise Continuous Function; jump discontinuity Function of Exponentil Order Lplce Trnsform

More information

Math& 152 Section Integration by Parts

Math& 152 Section Integration by Parts Mth& 5 Section 7. - Integrtion by Prts Integrtion by prts is rule tht trnsforms the integrl of the product of two functions into other (idelly simpler) integrls. Recll from Clculus I tht given two differentible

More information

Pressure Wave Analysis of a Cylindrical Drum

Pressure Wave Analysis of a Cylindrical Drum Pressure Wve Anlysis of Cylindricl Drum Chris Clrk, Brin Anderson, Brin Thoms, nd Josh Symonds Deprtment of Mthemtics The University of Rochester, Rochester, NY 4627 (Dted: December, 24 In this pper, hypotheticl

More information

Matching with Multiple Applications: The Limiting Case

Matching with Multiple Applications: The Limiting Case Mtching with Multiple Applictions: The Limiting Cse Jmes W. Albrecht y Georgetown Uniersity Susn B. Vromn Georgetown Uniersity August 003 Pieter A. Gutier Ersmus Uniersity Tinbergen Institute Abstrct We

More information

UNIT 1 FUNCTIONS AND THEIR INVERSES Lesson 1.4: Logarithmic Functions as Inverses Instruction

UNIT 1 FUNCTIONS AND THEIR INVERSES Lesson 1.4: Logarithmic Functions as Inverses Instruction Lesson : Logrithmic Functions s Inverses Prerequisite Skills This lesson requires the use of the following skills: determining the dependent nd independent vribles in n exponentil function bsed on dt from

More information

Jim Lambers MAT 169 Fall Semester Lecture 4 Notes

Jim Lambers MAT 169 Fall Semester Lecture 4 Notes Jim Lmbers MAT 169 Fll Semester 2009-10 Lecture 4 Notes These notes correspond to Section 8.2 in the text. Series Wht is Series? An infinte series, usully referred to simply s series, is n sum of ll of

More information

Matrices and Determinants

Matrices and Determinants Nme Chpter 8 Mtrices nd Determinnts Section 8.1 Mtrices nd Systems of Equtions Objective: In this lesson you lerned how to use mtrices, Gussin elimintion, nd Guss-Jordn elimintion to solve systems of liner

More information

Numerical Linear Algebra Assignment 008

Numerical Linear Algebra Assignment 008 Numericl Liner Algebr Assignment 008 Nguyen Qun B Hong Students t Fculty of Mth nd Computer Science, Ho Chi Minh University of Science, Vietnm emil. nguyenqunbhong@gmil.com blog. http://hongnguyenqunb.wordpress.com

More information

Lecture 3: Equivalence Relations

Lecture 3: Equivalence Relations Mthcmp Crsh Course Instructor: Pdric Brtlett Lecture 3: Equivlence Reltions Week 1 Mthcmp 2014 In our lst three tlks of this clss, we shift the focus of our tlks from proof techniques to proof concepts

More information

Section 14.3 Arc Length and Curvature

Section 14.3 Arc Length and Curvature Section 4.3 Arc Length nd Curvture Clculus on Curves in Spce In this section, we ly the foundtions for describing the movement of n object in spce.. Vector Function Bsics In Clc, formul for rc length in

More information

Research on the Quality Competence in Manufacturing Industry

Research on the Quality Competence in Manufacturing Industry Reserch on the Qulity Competence in Mnufcturing Industry Xioping M, Zhijun Hn Economics nd Mngement School Nnjing University of Science nd Technology Nnjing 210094, Chin Tel: 86-25-8431-5400 E-mil: hnzhij4531@sin.com

More information

Goals: Determine how to calculate the area described by a function. Define the definite integral. Explore the relationship between the definite

Goals: Determine how to calculate the area described by a function. Define the definite integral. Explore the relationship between the definite Unit #8 : The Integrl Gols: Determine how to clculte the re described by function. Define the definite integrl. Eplore the reltionship between the definite integrl nd re. Eplore wys to estimte the definite

More information

A Criterion on Existence and Uniqueness of Behavior in Electric Circuit

A Criterion on Existence and Uniqueness of Behavior in Electric Circuit Institute Institute of of Advnced Advnced Engineering Engineering nd nd Science Science Interntionl Journl of Electricl nd Computer Engineering (IJECE) Vol 6, No 4, August 2016, pp 1529 1533 ISSN: 2088-8708,

More information

A New Grey-rough Set Model Based on Interval-Valued Grey Sets

A New Grey-rough Set Model Based on Interval-Valued Grey Sets Proceedings of the 009 IEEE Interntionl Conference on Systems Mn nd Cybernetics Sn ntonio TX US - October 009 New Grey-rough Set Model sed on Intervl-Vlued Grey Sets Wu Shunxing Deprtment of utomtion Ximen

More information

expression simply by forming an OR of the ANDs of all input variables for which the output is

expression simply by forming an OR of the ANDs of all input variables for which the output is 2.4 Logic Minimiztion nd Krnugh Mps As we found ove, given truth tle, it is lwys possile to write down correct logic expression simply y forming n OR of the ANDs of ll input vriles for which the output

More information

Applicable Analysis and Discrete Mathematics available online at

Applicable Analysis and Discrete Mathematics available online at Applicble Anlysis nd Discrete Mthemtics vilble online t http://pefmth.etf.rs Appl. Anl. Discrete Mth. 4 (2010), 23 31. doi:10.2298/aadm100201012k NUMERICAL ANALYSIS MEETS NUMBER THEORY: USING ROOTFINDING

More information