Some RSA-based Encryption Schemes with Tight Security Reduction
|
|
- Susan Richards
- 6 years ago
- Views:
Transcription
1 Some RSA-based Encyption Schemes with Tight Secuity Reduction Kaou Kuosawa 1 and Tsuyoshi Takagi 2 1 Ibaaki Univesity, Nakanausawa, Hitachi, Ibaaki, , Japan kuosawa@cis.ibaaki.ac.jp 2 Technische Univesität Damstadt, Fachbeeich Infomatik, Alexandest.10, D Damstadt, Gemany ttakagi@cdc.infomatik.tu-damstadt.de Abstact. In this pape, we study some RSA-based semantically secue encyption schemes IND-CPA) in the standad model. We fist deive the exactly tight one-wayness of Rabin-Paillie encyption scheme which assumes that factoing Blum integes is had. We next popose the fist IND-CPA scheme whose one-wayness is equivalent to factoing geneal n = pq not factoing Blum integes). Ou eductions of one-wayness ae vey tight because they equie only one decyption-oacle quey. Keywods: Factoing, semantic secuity, tight eduction, RSA-Paillie, Rabin-Paillie. 1 Intoduction 1.1 Backgound An encyption scheme should have stong one-wayness as well as high semantic secuity. Theefoe, it is desiable to constuct a semantically secue encyption scheme whose one-wayness is equivalent to factoing n = pq in the standad model. Thee ae seveal povably secue constuctions in the andom oacle model. Fo example, see [Sho01,FOPS01,Bon01].) RSA-Paillie encyption scheme is semantically secue against chosen plaintext attacks IND-CPA) in the standad model unde the RSA-Paillie assumption [CGHN01]. The assumption claims that SMALL RSAP = { e mod n 2 Z n } and LARGE RSAP = { e mod n 2 Z n 2} ae indistinguishable, whee n, e) is the public-key of RSA. Futhe, it is oneway if beaking RSA is had. The latte poblem was fist aised by [ST02] and finally poved by [CNS02] using LLL algoithm of lattice theoy. On the othe hand, n= pq) is called a Blum intege if p = q = 3 mod 4. Galindo et al. ecently consideed Rabin-Paillie encyption scheme and showed that it is one-way if factoing Blum integes is had [GMMV03]. Howeve, thee is a lage gap between the one-wayness which they poved and the difficulty of factoing. That is, suppose that the one-wayness is boken
2 with pobability ε. Then what Galindo et al. poved is that Blum integes can be factoed with pobability ε 2. Futhe the factoing poblem is esticted to Blum integes, but not geneal p, q. The one-wayness of Okamoto-Uchiyama scheme [OU98] is equivalent to factoing n = p 2 q, but not n = pq.) 1.2 Ou Contibution In this pape, we study the tight one-wayness of some RSA-based semantically secue encyption schemes IND-CPA) in the standad model, whee the onewayness must be equivalent to factoing n = pq. We fist show that Rabin-Paillie encyption scheme has no gap between the eal one-wayness and the difficulty of factoing Blum integes. In othe wods, we give a factoing algoithm with success pobability ε.) Ou poof technique is quite diffeent fom pevious poofs. In paticula: Ou poof technique equies only one decyption-oacle quey while the pevious poofs fo RSA/Rabin-Paillie encyption schemes equie two oacle queies [CNS02,GMMV03]. No LLL algoithm is equied, which was essentially used in the pevious poofs fo RSA/Rabin-Paillie schemes [CNS02,GMMV03]. We next popose the fist IND-CPA scheme such that the one-wayness is equivalent to factoing geneal n = pq not factoing Blum integes). The onewayness is poved by applying ou poof technique as mentioned above. Theefoe, ou secuity eduction of one-wayness is vey tight. That is, thee is almost no gap between the one-wayness and the hadness of the geneal factoing poblem. The poposed scheme is obtained fom an encyption scheme pesented by Kuosawa et al. [KIT88,KOMM01]. The semantic secuity holds unde a natual extension of RSA-Paillie assumption. That is, it is semantically secue IND-CPA) if two distibutions SMALL RSAK and LARGE RSAK ae indistinguishable, whee we define SMALL RSAK and LARGE RSAK as appopiate subsets of SMALL RSAP and LARGE RSAP, espectively. We also show a close elationship between ou assumption and RSA-Paillie assumption. This pape is oganized as follows: In Section 2, we descibe notions equied fo the secuity desciption in this pape. In Section 3, the exact secuity eduction algoithm fo Rabin-Paillie encyption scheme is pesented. In Section 4, the poposed scheme is pesented. In Section 5, we pove that the one-wayness of the poposed scheme is as had as geneal factoing poblem. In Section 6, we discuss the semantic secuity of the poposed scheme. Sec.7 includes some final comments. Related woks: Came and Shoup showed an semantically secue encyption scheme against chosen ciphetext attacks IND-CCA) unde the decision Diffie-Hellamn assumption [CS98]. They ecently showed a geneal famewok to constuct IND-CCA schemes [CS02].
3 It will be a futhe wok to develop an IND-CCA scheme whose one-wayness is equivalent to the factoing poblem in the standad model. We hope that ou esults povide us a good stating point to this challenging poblem. 2 Secuity of Encyption Schemes PPT will denote a pobabilistic polynomial time. 2.1 Encyption Scheme A public-key encyption scheme PE = K, E, D) consists of thee algoithms. The key geneation algoithm K outputs pk, sk) on input 1 l, whee pk is a public key, sk is the secet key and l is a secuity paamete. We wite pk, sk) R K. The encyption algoithm E outputs a ciphetext c on input the public key pk and a plaintext message) m; we wite c R E pk m). The decyption algoithm D outputs m o eject on input the secet key sk and a ciphetext c; we wite x D sk c), whee x = m o eject. We equie that D sk E pk m)) = m fo each plaintext m. K and E ae PPT algoithms, and D is a polynomial time algoithm. 2.2 One-Wayness The one-wayness poblem is as follows: given a public key pk and a ciphetext c, find the plaintext m such that c R E pk m). Fomally, fo an advesay A, conside an expeiment as follows. pk, sk) R K, c R E pk m), m R Apk, c). whee m is andomly chosen fom the domain of pk. Let Fo any t > 0, define Adv ow PEA) = P m = m). AdvPEt) ow = max Advow PEA), whee the maximum is ove all A who un in time t. A Definition 1. We say that PE is t, ε)-one-way if AdvPE ow t) < ε. We also say that PE is one-way if AdvPE ow A) is negligible fo any PPT advesay A. 2.3 Semantic Secuity We say that a public-key encyption scheme PE = K, E, D) is semantically secue against chosen plaintext attacks SS-CPA) if it is had to find any patial) infomation on m fom c. This notion is equivalent to indistinguishability IND- CPA), which is descibed as follows [BDPR98,Gol01].
4 We conside an advesay B = B 1, B 2 ) as follows. In the find stage, B 1 takes a public key pk and outputs m 0, m 1, state), whee m 0 and m 1 ae two equal length plaintexts and state is some state infomation. In the guess stage, B 2 gets a challenge ciphetext c R E pk m b ) fom an oacle, whee b is a andomly chosen bit. B 2 finally outputs a bit b. We say that an encyption scheme PE is secue in the sense of IND-CPA if P b = b) 1/2 is negligible. Fomally, fo each secuity paamete l, let pk, sk) R K, m 0, m 1, state) R B 1 pk), c R E pk m b ), b R B 2 c, state). Definition 2. We say that PE is secue in the sense of indistinguishability against chosen-plaintext attack IND-CPA) if is negligible fo any PPT advesay B. Adv ind PE B) = P b = b) 1/2 If an advesay B = B 1, B 2 ) is allowed to access the decyption oacle D sk ), we denote it by B D = B1 D, B2 D ). If Adv ind PE BD ) is negligible fo any P P T advesay B D, we say that PE is secue in the sense of indistinguishability against adaptive chosen-ciphetext attack IND-CCA). 2.4 Factoing Assumptions The geneal factoing poblem is to facto n = pq, whee p and q ae two pimes such that p = q. Fomally, fo an factoing algoithm B, conside the following expeiment. Geneate two pimes p and q such that p = q andomly. Give n = pq to B. We say that B succeeds if B can output p o q. Definition 3. We say that the geneal factoing poblem is t, ε)-had if PB succeeds) < ε fo any B who uns in time t. We also say that it is had if PB succeeds) is negligible fo any PPT algoithm B. The geneal factoing assumption claims that the geneal factoing poblem is had. We say that n= pq) is a Blum intege if p and q ae pime numbes such that p = q = 3 mod 4 and p = q. The Blum-factoing poblem is defined similaly. Blum-factoing assumption claims that the Blum-factoing poblem is had. 3 Exact One-Wayness of Rabin-Paillie Scheme Galindo et al. ecently constucted Rabin-Paillie encyption scheme [GMMV03] and showed that its one-wayness is as had as factoing Blum integes, whee n = pq is called a Blum intege if p = q = 3 mod 4. Howeve, thee is a polynomially bounded gap between the difficulty of factoing and the claimed one-wayness. This is because they used the same poof technique as that of [CNS02].
5 In this section, we show that thee exists no gap between the difficulty of factoing Blum integes and the eal one-wayness of Rabin-Paillie encyption scheme. In othe wods, we pesent the exactly tight one-wayness of Rabin- Paillie encyption scheme. Ou poof is vey simple and totally elemental. In paticula, no LLL algoithm is equied which was essentially used in the pevious poofs fo RSA/Rabin- Paillie [CNS02,GMMV03]. 3.1 Rabin-Paillie Encyption Scheme Rabin-Paillie encyption scheme is descibed as follows. Let Q n = { 2 mod n 2 Z n}. We say that Z n is conjugate if /n) = 1, whee m/n) denotes Jacobi s symbol. Secet key) Two pime numbes p and q such that p = q and p = q = 3 mod 4. Public key) n= pq), e, whee e is a pime such that n /2 < e < n. Plaintext) m Z n. Ciphetext) c = 2e + mn mod n 2, 1) whee Q n is andomly chosen. Decyption) Since e is a pime such that n /2 < e < n, it satisfies that gcde, p 1) = gcde, q 1) = 1. 2) Theefoe, thee exists d such that ed = 1 mod lcmp 1, q 1). Now let E = c d mod n. Then it is easy to see that E = 2 mod n. We can find such that Q n uniquely because p = q = 3 mod 4. Finally, by substituting into eq.1), we can obtain m. In [GMMV03], the authos showed that Rabin-Paillie encyption scheme is secue in the sense of IND-CPA if n, e, En, e; 0)) and n, e, Q n 2) ae indistinguishable, whee Remaks: En, e; 0) = { 2e mod n 2 Q n }. 1. In [GMMV03], the condition on e is esticted to gcde, λn)) = 1, whee λ is Camichael s function. Howeve, fo this paamete choice, we cannot pove that the one-wayness is as had as the factoing poblem, because we cannot geneally choose such e fo a given n. In Appendix B, we also point out a flaw on thei claim fo the semantic secuity of Rabin-Paillie cyptosystem.
6 2. RSA-Paillie encyption scheme is obtained by letting fo m Z n and Z n [CGHN01]. c = e 1 + mn) mod n Exactly Tight One-Wayness Suppose that thee exists a PPT algoithm that beaks the one-wayness with pobability ε. Then Galindo et al. poved that thee exists a PPT algoithm that can facto Blum integes n with pobability ε 2 see the poof of [GMMV03, Poposition 6]). In this subsection, we show that thee exists a PPT algoithm that can facto Blum integes n with pobability ε. Since the convese is clea, ou eduction is exactly tight. Scheme Factoing Pobability Galindo et al. [GMMV03] ε 2 Ou Poposed Poof ε Table 1. Factoing pobability using OW-oacle with pobability ε Lemma 1. Let n be a Blum intege. Fo any conjugate, thee exists a unique Q n such that 2 = 2 mod n. 3) Futhe, gcd, n) = p o q. Poof. Note that 1/p) = 1 and 1/q) = 1 fo a Blum intege n = pq. A conjugate Z n satisfies /n) = 1, namely I) : /p) = 1 /q) = 1 o II) : /p) = 1 /q) = 1. In the case of I), define = mod p and = mod q, then the statement of the lemma is obtained. Similaly in the case of II) we assign = mod p and = mod q. Theoem 1. Rabin-Paillie encyption scheme is t, ε)-one-way if Blum factoing poblem is t, ε)-had, whee t = t + Olog n) 3 ). Poof. Suppose that thee exists an oacle O which beaks the one-wayness of Rabin-Paillie encyption scheme with pobability ε in time t. We will show a factoing algoithm A. We show how to find and satisfying eq.3). On input n, A fist chooses a pime e such that n /2 < e < n andomly. A next chooses a conjugate Z n and a fake) plaintext m Z n andomly, and computes a fake) ciphetext c = 2e + mn mod n 2. It is clea that c is uniquely witten as c = B 0 + B 1 n mod n 2 B 0 Q n, B 1 Z n. Note that fo some
7 1. B 1 is unifomly distibuted ove Z n because m is andomly chosen fom Z n, and 2. B 0 is unifomly distibuted ove { 2e mod n Q n } fom Lemma 1. Theefoe, c is distibuted in the same way as valid ciphetexts. Now A queies c to the oacle O. O then answes a valid) plaintext m such that c = 2e + mn mod n 2 with pobability ε in time t, whee Q n. Then we have c = 2e = 2e mod n. Hence we see that 2 = 2 mod n. Theefoe, 2 is witten as 2 = 2 + yn 4) fo some y Z n with no modulus). By letting x = 2 mod n 2, we obtain that w = c mn = 2e = x + yn) e = x e + eynx e 1 mod n 2. 5) It is easy to see that Theefoe y is obtained as eyx e 1 = w xe n mod n. y = ex e 1 1 w xe ) mod n. n Substitute y into eq.4). Then we can compute a squae oot > 0 because eq.4) has no modulus. Finally we can facto n by using, ) fom Lemma 1. Ou algoithm A fo Rabin-Paillie scheme is summaized as follows. Exact OW Rabin Paillie Input: n, e), public key of Rabin-Paillie scheme Output: p, q, factoing of n 1. choose a andom Z n such that /n) = compute x = 2 mod n choose a andom fake) plaintext m Z n. 4. compute a ciphetext c = x e + mn mod n obtain a valid plaintext m = Oc) 6. compute w = c mn = 2e mod n compute u = w x e mod n 2 )/n. 8. compute y = uex e 1) ) 1 mod n. 9. compute v = 2 + ny. 10. find > 0 such that 2 = v in Z. 11. etun gcd, n).
8 4 New Encyption Scheme In this section, we popose an encyption scheme such that its one-wayness is as had as the geneal factoing poblem of n = pq not factoing Blum integes). The poposed scheme is obtained fom an encyption scheme poposed by Kuosawa et al. [KIT88,KOMM01]. 4.1 Kuosawa et al. s Encyption Scheme Kuosawa et al. s showed an encyption scheme as follows [KIT88]. Secet key) Two pime numbes p and q such that p = q. Public key) n= pq) and α such that whee α/p) denotes Legende s symbol. Plaintext) m Z n. Ciphetext) c = E, s, t) such that α/p) = α/q) = 1, 6) E = m + α mod n 7) m s = { 0 if m/n) = 1; 1 if m/n) = 1, t = { 0 if α/m mod n) > m; 1 if α/m mod n) < m. Decyption) Fom eq.7), it holds that m 2 Em + α = 0 mod n. 8) The above equation has fou oots. Howeve, we can decypt m uniquely fom s, t) due to eq.6) [KIT88,KOMM01]. Also see [KT03, Appendix E]. In [KIT88,KOMM01], it is poved that this encyption scheme is one-way unde the geneal factoing assumption. 4.2 Poposed Encyption Scheme Secet key) Two pime numbes p and q such that p = q. Public key) n= pq), e, α, whee e is a pime such that n /2 < e < n and α Z n satisfies α/p) = α/q) = 1. 9) Plaintext) m Z n. Ciphetext) c = + α ) e + mn mod n 2, 10) whee Zn is a andom element such that /n) = 1 and α/ mod n) >. We can compute 1/ mod N 2 faste than the diect method [KT03, Sec.4.3].)
9 Decyption) Let E = c d mod n, whee ed = 1 mod lcmp 1, q 1). Then it is easy to see that E = + α mod n. Note that E, 0, 0) is the ciphetext of by Kuosawa et al. s encyption scheme. Theefoe we can find by decypting E, 0, 0) with the decyption algoithm. Finally, by substituting into eq.10), we can obtain m. 5 One-Wayness of the Poposed Scheme In this section, we show the one-wayness of the poposed scheme by applying ou poof technique developed in Sec.3. Ou secuity eduction is vey tight. That is, thee is almost no gap between the one-wayness and the hadness of the geneal factoing poblem. Indeed, ou poof equies only one decyption-oacle quey while the pevious poof fo RSA/Rabin-Paillie encyption scheme equies two oacle queies [CNS02,GMMV03]. 5.1 Poof of One-Wayness We say that 1. Z n is pincipal if /n) = 1 and α/ mod n) >. 2. Z n is conjugate if /n) = 1. Note that in tems of the paametes of Kuosawa et al s encyption scheme, Z n is pincipal if s, t) = 0, 0) and Z n is conjugate if s = 1. Lemma 2. Fo any conjugate, thee exists a unique pincipal such that E = + ᾱ = + α mod n. 11) Futhe, gcd, n) = p o q. Poof. Thee ae fou diffeent solutions of Kuosawa et al s encyption E coesponding to s, t) = 0, 0), 0, 1), 1, 0), 1, 1) as shown in [KIT88,KOMM01]. Also see [KT03, Appendix E].) A conjugate satisfies /p) = 1 /q) = 1 o /p) = 1 /q) = 1 fo s = 1. Define 1 = mod p 1 = α/ mod q and 2 = α/ mod p 2 = mod q. Then eithe 1 o 2 is the equied pinciple. Hence, the fome pat of this Lemma holds. Futhe, mod p = mod q o = mod p mod q holds due to α/p) = α/q) = 1. Theefoe, we can see that gcd, n) = p o q. Fom eq.11), it holds that fo some unique y Z n. + α/ = + α/ ) + yn mod n 2 12)
10 Lemma 3. Suppose that we have, y) satisfying eq.12) fo some pincipal, whee is conjugate. Then we can facto n. Poof. We show that can be computed fom y, ). Let Then we have v = + α/ ) + yn mod n 2. 2 v + α = 0 mod n 2 fom eq.12). We can solve this quadatic equation by using the Coppesmith s algoithm [Cop96] because of 0 < < n. Then we can facto n fom Lemma 2. Lemma 4. Suppose that thee exists an oacle O that beaks the one-wayness of the poposed scheme with pobability ε and in time t. Then thee exists an algoithm A which factos n fom n, e, α) with pobability ε in time t + polylog n), whee O is invoked once. Poof. We show how to find and y satisfying eq.12). On input n, e, α), A fist chooses a conjugate Z n andomly and computes x = + ᾱ mod n2. 13) It next chooses a fake) plaintext m Z n andomly and computes c = x e + mn mod n 2. It is clea that c is uniquely witten as c = B 0 +B 1 n mod n 2 fo some B 0, B 1 Z n. Note that 1) B 1 is unifomly distibuted ove Z n because m is andomly chosen fom Z n. 2) B 0 is unifomly distibuted ove { + α/) e mod n Zn is pincipal} fom Lemma 2. Theefoe, c is distibuted in the same way as valid ciphetexts. Now A queies c to the oacle O. O then answes a valid) plaintext m such that c = + α ) e + mn mod n 2 with pobability ε and in time t, whee Zn is pincipal. Then we have c = + α ) e = x e mod n. Hence we see that + α = x mod n. Theefoe, thee exists y Z n such that We then obtain that + α = x + yn mod n2. w = c mn = + α/) e = x + yn) e = x e + eynx e 1 mod n 2.
11 It is easy to see that Theefoe y is obtained as eyx e 1 = w xe n mod n. y = w xe ex e 1 ) 1 mod n. n Finally we can facto n by using, y) fom Lemma 3. Ou algoithm A fo the poposed scheme is summaized as follows: OW Recipocal Paillie Input: n, e, α), public-key of the poposed scheme Output: p, q, factoing of n 1. choose a andom Z n such that /n) = compute x = + α/ mod n choose a andom fake) plaintext m Z n. 4. compute a ciphetext c = x e + mn mod n obtain a valid plaintext m = Oc) 6. compute w = c mn = + α/) e mod n compute u = w x e )/n. 8. compute y = uex e 1) ) 1 mod n. 9. compute v = + α/ ) + ny mod n. 10. solve 2 v + α = 0 mod n 2 using Coppesmith s algoithm [Cop96]. 11. etun gcd, n). Theoem 2. The poposed encyption scheme is t, ε) one-way if the geneal factoing poblem is t, ε/2)-had, whee t = t + polylog n). Poof. Suppose that thee exists a PPT algoithm that beaks the one-wayness of the poposed scheme with pobability ε in time t. Then we show a PPT algoithm which can facto n. Fo a given n, we choose a pime e such that n /2 < e < n andomly. We also choose α Zn such that α/n) = 1 andomly. It is easy to see that α satisfies eq.9) with pobability 1/2. Next apply Lemma 4 to n, e, α). Then we can facto n with pobability ε/2 in time t = t + polylog n). The poposed scheme is a combination of the scheme of Kuosawa et al. and the RSA-Paillie scheme. Anothe constuction is to encypt a message m Z/nZ as follows: c = e + α ) e + mn mod n 2, 14) whee Z n is a andom element such that e mod n/n) = 1 and α/ e mod n) >. Afte computing e mod n 2 the ecipocal encyption is applied. Howeve, the secuity analysis of this constuction is moe difficult we cannot apply the above poof technique to this scheme, because e mod n 2 is lage than n.
12 5.2 Hensel Lifting and Lage Message Space Catalano et al. poved that Hensel-RSA poblem is as had as beaking RSA fo any lifting index l [CNS02]. In this section, we define Hensel-Recipocal poblem and show that it is as had as geneal factoization fo any lifting index l. This esult implies that we can enlage the message space of the poposed encyption scheme fo m Z n 2 in such a way that c = e + mn mod n l. Suppose that we ae given a public key n, e, α) of the poposed encyption scheme and y = + α ) e mod n, whee Zn is pincipal. The Hensel-Recipocal poblem is to compute Y = + α ) e mod n l fom n, e, α, y) and l, whee Z n is pincipal and l is a positive intege. Then we can pove the following theoem See [KT03]). Theoem 3. The Hensel-Recipocal poblem is as had as geneal factoization fo any lifting index l 2. Poof. It is easy to see that we can solve the Hensel-Recipocal poblem if we can facto n. We will pove the convese. Suppose that thee exists a PPT algoithm which can solve the Hensel- Recipocal poblem with pobability ε fo some l 2. That is, the PPT algoithm can compute Y = ) + α e mod n l fom n, e, α, y) and l 2, whee Zn is pincipal. Then we can compute Y = ) + α e mod n 2. Now similaly to the poof of Lemma 4 and Theoem 2, we can facto n with pobability ε/2 in polynomial time. 6 Semantic Secuity of the Poposed Scheme In this section, we discuss the semantic secuity of the poposed scheme. Let n, e, α) be a public key of the poposed encyption scheme. 6.1 Semantic secuity Let SMALL RSAP n, e) = {n, e, x) x = e mod n 2, Z n } LARGE RSAP n, e) = {n, e, x) x = e mod n 2, Z n 2} Note that SMALL RSAP n, e) = n, and LARGE RSAP n, e) = n 2.
13 It is known that RSA-Paillie encyption scheme is IND-CPA if SMALL RSAP n, e) and LARGE RSAP n, e) ae indistinguishable [CGHN01]. We call it RSA-Paillie assumption. We now define SMALL RSAK n, e, α) and LARGE RSAK n, e, α) as follows. SMALL RSAK n, e, α) = {n, e, α, x) x = + α ) e mod n 2, Zn is pincipal} LARGE RSAK n, e, α) = {n, e, α, x) x = + α ) e mod n 2, Zn 2}. Note that SMALL RSAK n, e, α) = φn)/4, and LARGE RSAK n, e, α) = φn)n/4, because + α mod n2 is a 4 : 1 mapping. Theoem 4. The poposed encyption scheme is secue in the sense of IND- CPA if two distibutions SMALL RSAK n, e, α) and LARGE RSAK n, e, α) ae indistinguishable. We call the above indistinguishability Recipocal-Paillie assumption. A poof will be given in Appendix A. 6.2 Relationship with RSA-Paillie Assumption We investigate the elationship between RSA-Paillie assumption and Recipocal- Paillie assumption. We fist genealize SMALL RSAP and LARGE RSAP so that they include α. That is, let SMALL RSAP n, e, α) = {n, e, α, x) x = e mod n 2, Z n} LARGE RSAP n, e, α) = {n, e, α, x) x = e mod n 2, Z n 2} We then define modified RSA-Paillie assumption as follows: SMALL RSAP n, e, α) and LARGE RSAP n, e, α) ae indistinguishable. We next define ecipocal assumption as follows: SMALL RSAK n, e, α) and SMALL RSAP n, e, α) ae indistinguishable. Then we have the following coollay of Theoem 4. Coollay 1. The poposed encyption scheme is secue in the sense of IND- CPA if both modified RSA-Paillie assumption and the ecipocal assumption hold. Poof. We pove that LARGE RSAK n, e, α) and LARGE RSAP n, e, α) ae indistinguishable unde the ecipocal assumption. Let O be an oacle that distinguishes two distibutions LARGE RSAK n, e, α) and LARGE RSAP n, e, α). We constuct a distinguishe D which can distinguish between SMALL RSAK n, e, α) and SMALL RSAP n, e, α). Fo n, e, α, c), D chooses a andom s Z n, and computes c = c + ns mod n 2. Then it asks n, e, α, c ) to the oacle O. Because s
14 is andomly chosen in Z n, we can show that n, e, α, c ) is unifomly distibuted in eithe LARGE RSAK n, e, α) o LARGE RSAP n, e, α). Thus the oacle O can coectly distinguish between SMALL RSAK n, e, α) and SMALL RSAP n, e, α). Theefoe SMALL RSAK SMALL RSAP LARGE RSAP LARGE RSAK, whee means indistinguishable. This implies that Recipocal-Paillie assumption holds. 7 On Chosen Ciphetext Secuity Fo chosen ciphetext secuity, we can obtain a vaiant of ou encyption scheme as follows by applying the technique of [Poi99]. c = + α ) e + mn mod n 2 ) H, m) whee H is a andom hash function and denotes concatenation. In the andom oacle model, 1) this scheme is one-way against chosen ciphetext attacks unde the geneal factoing assumption. 2) It is also IND-CCA unde the assumption given in Sec.6. In the standad model, it still emains one-way and IND-CPA against chosen plaintext attacks. In geneal, we can pove the following theoem. Theoem 5. Let PE be an encyption scheme with ciphetexts c = E pk m, ). Suppose that 1) the set of belongs to BPP and 2) thee exists a decyption algoithm which outputs not only m but also. Fo PE, conside an encyption scheme PE such that c = E pk m, ) Hm, ). If PE is one-way against chosen plaintext attacks IND-CPA, esp.), then PE is one-way against chosen ciphetext attacks IND-CCA, esp.) in the andom oacle model. PE still emains one-way against chosen plaintext attacks IND- CPA, esp.) in the standad model. The details will be given in the final pape. Refeences [BDPR98] M. Bellae, A. Desai, D. Pointcheval, and P. Rogaway, Relations among Notions of Secuity fo Public-Key Encyption Schemes, CRYPTO 98, LNCS 1462, pp.26-45, [Bon01] D. Boneh, Simplified OAEP fo RSA and Rabin Functions, CRYPTO 2001, LNCS 2139, pp , [CGHN01] D. Catalano, R. Gennao, N. Howgave-Gaham, and P. Nguyen; Paillie s cyptosystem evisited, The 8th ACM confeence on Compute and Communication Secuity, pp , 2001.
15 [CNS02] D. Catalano, P. Nguyen, and J. Sten, The Hadness of Hensel Lifting: The Case of RSA and Discete Logaithm, ASIACRYPT 2002, LNCS 2501, pp , [Cop96] D. Coppesmith, Finding a Small Root of a Univaiate Modula Equation, EUROCRYPT 96, LNCS 1070, pp , [CS98] R. Came and V. Shoup, A Pactical Public-Key Cyptosystem Povably Secue against Adaptive Chosen Ciphetext Attacks, CRYPTO 98, LNCS 1462, pp.13-25, [CS02] R. Came and V. Shoup, Univesal Hash Poofs and a Paadigm fo Adaptive Chosen Ciphetext Secue Public-Key Encyption, EUROCRYPT 2002, LNCS 2332, pp.45-64, [FOPS01] E. Fujisaki, T. Okamoto, D. Pointcheval, and J. Sten, RSA-OAEP is Secue unde the RSA Assumption, CRYPTO 2001, LNCS 2139, pp , [GMMV03] D. Galindo, S. Molleví, P. Moillo, J. Villa, A Pactical Public Key Cyptosystem fom Paillie and Rabin Schemes, PKC 2003, LNCS 2567, pp , [Gol01] O. Goldeich, Foundations of Cyptogaphy: Basic Tools, Cambidge Univesity Pess, [KIT88] K. Kuosawa, T. Itoh, M. Takeuchi, Public Key Cyptosystem using a Recipocal Numbe with the Same Intactability as Factoing a Lage Numbe, CRYP- TOLOGIA, XII, pp , [KT03] K. Kuosawa and T. Takagi, Some RSA-based Encyption Schemes with Tight Secuity Reduction, A long vesion of this pape, IACR epint achive, 2003/157, available fom [KOMM01] K. Kuosawa, W. Ogata, T. Matsuo, S. Makishima, IND-CCA Public Key Schemes Equivalent to Factoing n=pq, PKC 2001, LNCS 1992, pp36-47, [OU98] T.Okamoto and S.Uchiyama, A New Public Key Cyptosystem as Secue as Factoing, Euocypt 98, LNCS 1403, pp , 1998/ [Poi99] D.Pointcheval, New Public Key Cyptosystems based on the Dependent-RSA Poblems, Euocypt 99, LNCS 1592, pp , [ST02] K. Sakuai, T. Takagi, New Semantically Secue Public-Key Cyptosystems fom the RSA-Pimitive, PKC 2002, LNCS 2274, pp.1-16, [Sho01] V. Shoup, OAEP Reconsideed, CRYPTO 2001, LNCS 2139, pp , [Tak97] T. Takagi, Fast RSA-Type Cyptosystems using N-adic Expansion, CRYPTO 97, LNCS 1294, pp , A Semantic Secuity of the Poposed Scheme A.1 Basic Result Let ZEROn, e, α) be the set of ciphetexts fo m = 0 and ALLn, e, α) be the set of ciphetexts fo all m Z n. That is, ZEROn, e, α) = { + α ) e mod n 2 Zn is pincipal} ALLn, e, α) = { + α ) e + mn mod n 2 m Z n and Zn is pincipal}.
16 Define Recipocal 0 n, e, α) = {n, e, α, x) x ZEROn, e, α)} Recipocal ALL n, e, α) = {n, e, α, x) x ALLn, e, α)} Note that we have Recipocal 0 n, e, α) = SMALL RSAK n, e, α) fom thei definition. Theoem 6. The poposed encyption scheme is secue in the sense of IND- CPA if and only if Recipocal 0 n, e, α) and Recipocal ALL n, e, α) ae indistinguishable. Poof. Suppose that thee exists an advesay B = B 1, B 2 ) which beaks ou encyption scheme in the sense of IND-CPA, whee B 1 woks in the find stage and B 2 woks in the guess stage. We will show a distinguishe D which can distinguish between two distibutions Recipocal 0 n, e, α) and Recipocal ALL n, e, α). Let n, e, α, x) be the input to D, whee x ZEROn, e, α) o x ALLn, e, α). 1. D gives pk = n, e, α) to B Then B 1 outputs m 0, m 1, state). 3. D chooses a bit b andomly and computes c b = x + m b n mod n 2. D gives c b, state) to B B 2 outputs a bit b. 5. D outputs 0 if b = b. Othewise, D outputs 1. Let P 0 denote the pobability that D = 0 fo x ZEROn, e, α) and P ALL denote the pobability that D = 0 fo x ALLn, e, α). Now if x ALLn, e, α), then c b is unifomly distibuted ove ALLn, e, α) fo both b = 0 and 1. Theefoe, it is clea that P ALL = 1/2. On the othe hand, if x ZEROn, e, α), then c b is a valid ciphetext of m b. Theefoe, fom ou assumption and fom Def.2, we obtain that is non-negligible. Hence P 0 1/2 = P b = b) 1/2 P 0 P ALL is non-negligible because P ALL = 1/2. This means that D can distinguish between Recipocal 0 n, e, α) and Recipocal ALL n, e, α). Next suppose that thee exists a distinguishe D which is able to distinguish between Recipocal 0 n, e, α) and Recipocal ALL n, e, α). We will show an advesay B = B 1, B 2 ) which beaks ou encyption scheme in the sense of
17 IND-CPA, whee B 1 woks in the find stage and B 2 woks in the guess stage. On input pk = n, e, α), B 1 outputs m 0 = 0 and m 1 Z n, whee m 1 is andomly chosen fom Z n. Fo a given ciphetext c b, B 2 gives n, e, α, c b ) to D, whee c b is a ciphetext of m b. Note that c 0 is andomly chosen fom ZEROn, e, α) and c 1 is andomly chosen fom ALLn, e, α). Theefoe, D can distinguish them fom ou assumption. Hence B 2 can distinguish them. A.2 Extended Result Lemma 5. Recipocal ALL n, e, α) = LARGE RSAK n, e, α). Poof. Fist suppose that n, e, α, c) LARGE RSAK n, e, α). Then c = + α ) e mod n 2 fo some Zn. Decypt c by ou decyption algoithm. Then we can find 2 m Z n and a pincipal Zn such that c = + α ) e + mn mod n 2. Theefoe n, e, α, c) Recipocal ALL n, e, α). This means that LARGE RSAK n, e, α) Recipocal ALL n, e, α). Next suppose that n, e, α, c) Recipocal ALL n, e, α). Then c = + α ) e + mn mod n 2 fo some m Z n and a pincipal Zn. We will show that thee exists u Zn 2 such that c = u + α ) e mod n 2 15) u and u mod n is pincipal. The above equation holds if and only if whee ed = 1 mod φn)n. Fo y p such that u 2 c d u + α = 0 mod n 2, 16) 2 c d + α) + py p 2 c d ) = 0 mod p 2, let u p = + py p mod p 2. Then it is easy to see that Similaly fo y q such that u 2 p c d u p + α = 0 mod p 2. 2 c d + α) + qy q 2 c d ) = 0 mod q 2,
18 let u q = + qy q mod q 2. Then Now conside u such that u 2 q c d u q + α = 0 mod p 2. u = u p mod p 2, u = u q mod q 2. Then u satisfies eq.16). Theefoe u satisfies eq.15). This means that c LARGE RSAK n, e, α). Hence Consequaently A.3 Poof of Theoem 4 Recipocal ALL n, e, α) LARGE RSAK n, e, α). LARGE RSAK n, e, α) = Recipocal ALL n, e, α). Fom Theoem 6 and Lemma 5, the poposed encyption scheme is IND-CPA if if Recipocal 0 n, e, α) and LARGE RSAK n, e, α) ae indistinguishable. Fom the definition we have Recipocal 0 n, e, α) = SMALL RSAK n, e, α). B Flaw on the Semantic Secuity of Rabin-Paillie Let SMALL QR n, e) = {n, e, x) x = 2e mod n 2, Q n } LARGE QR n, e) = {n, e, x) x = 2e mod n 2, Q n 2} Rabin-Paillie encyption scheme is IND-CPA if and only if SMALL QR n, e) and LARGE QR n, e) ae indistinguishable [GMMV03, Poposition 9]. Galindo et al. futhe claimed that SMALL QR n, e) and LARGE QR n, e) ae indistinguishable if SMALL RSAP n, e) and LARGE RSAP n, e) ae indistinguishable RSA-Paillie is IND-CPA unde this condition) and QRn) and QN Rn, +) ae indistinguishable, whee QRn) = {n, x) x Q n } { QNRn, +) = x n, x) x Zn, n) } = 1 in [GMMV03, Poposition 11]. Howeve, this claim is wong. In the poof, they say that D 1 and D 2 ae indistinguishable, whee D 1 = {x x = e mod n 2, Q n } D 2 = {x x = e mod n 2, Z n}. Howeve, we can distinguish them easily by computing x n).
Secret Exponent Attacks on RSA-type Schemes with Moduli N = p r q
Secet Exponent Attacks on RSA-type Schemes with Moduli N = p q Alexande May Faculty of Compute Science, Electical Engineeing and Mathematics Univesity of Padebon 33102 Padebon, Gemany alexx@uni-padebon.de
More information9.1 The multiplicative group of a finite field. Theorem 9.1. The multiplicative group F of a finite field is cyclic.
Chapte 9 Pimitive Roots 9.1 The multiplicative goup of a finite fld Theoem 9.1. The multiplicative goup F of a finite fld is cyclic. Remak: In paticula, if p is a pime then (Z/p) is cyclic. In fact, this
More informationProvable Security in Cryptography
Povable Secuity in Cyptogaphy Thomas Baignèes EPFL http://lasecwww.epfl.ch May 29, 2007 (ve. 25) These lectue notes ae a compilation of some of my eadings while I was pepaing two lectues given at EPFL
More informationNew Finding on Factoring Prime Power RSA Modulus N = p r q
Jounal of Mathematical Reseach with Applications Jul., 207, Vol. 37, o. 4, pp. 404 48 DOI:0.3770/j.issn:2095-265.207.04.003 Http://jme.dlut.edu.cn ew Finding on Factoing Pime Powe RSA Modulus = p q Sadiq
More information10/04/18. P [P(x)] 1 negl(n).
Mastemath, Sping 208 Into to Lattice lgs & Cypto Lectue 0 0/04/8 Lectues: D. Dadush, L. Ducas Scibe: K. de Boe Intoduction In this lectue, we will teat two main pats. Duing the fist pat we continue the
More informationLecture 25: Pairing Based Cryptography
6.897 Special Topics in Cyptogaphy Instucto: Ran Canetti May 5, 2004 Lectue 25: Paiing Based Cyptogaphy Scibe: Ben Adida 1 Intoduction The field of Paiing Based Cyptogaphy has exploded ove the past 3 yeas
More informationStanford University CS259Q: Quantum Computing Handout 8 Luca Trevisan October 18, 2012
Stanfod Univesity CS59Q: Quantum Computing Handout 8 Luca Tevisan Octobe 8, 0 Lectue 8 In which we use the quantum Fouie tansfom to solve the peiod-finding poblem. The Peiod Finding Poblem Let f : {0,...,
More informationAQI: Advanced Quantum Information Lecture 2 (Module 4): Order finding and factoring algorithms February 20, 2013
AQI: Advanced Quantum Infomation Lectue 2 (Module 4): Ode finding and factoing algoithms Febuay 20, 203 Lectue: D. Mak Tame (email: m.tame@impeial.ac.uk) Intoduction In the last lectue we looked at the
More informationCryptography. Lecture 11. Arpita Patra
Cptogaph Lectue Apita Pata Geneic Results in PK Wold CPA Secuit CCA Secuit Bit Encption Man-bit Encption Bit Encption Man-Bit Encption Π CPA-secue KEM Π SKE COA-secue SKE Π Hb CPA-secue Π CCA-secue KEM
More informationMultiple Criteria Secretary Problem: A New Approach
J. Stat. Appl. Po. 3, o., 9-38 (04 9 Jounal of Statistics Applications & Pobability An Intenational Jounal http://dx.doi.og/0.785/jsap/0303 Multiple Citeia Secetay Poblem: A ew Appoach Alaka Padhye, and
More informationProbablistically Checkable Proofs
Lectue 12 Pobablistically Checkable Poofs May 13, 2004 Lectue: Paul Beame Notes: Chis Re 12.1 Pobablisitically Checkable Poofs Oveview We know that IP = PSPACE. This means thee is an inteactive potocol
More informationChapter 3: Theory of Modular Arithmetic 38
Chapte 3: Theoy of Modula Aithmetic 38 Section D Chinese Remainde Theoem By the end of this section you will be able to pove the Chinese Remainde Theoem apply this theoem to solve simultaneous linea conguences
More informationC/CS/Phys C191 Shor s order (period) finding algorithm and factoring 11/12/14 Fall 2014 Lecture 22
C/CS/Phys C9 Sho s ode (peiod) finding algoithm and factoing /2/4 Fall 204 Lectue 22 With a fast algoithm fo the uantum Fouie Tansfom in hand, it is clea that many useful applications should be possible.
More informationConcurrent Blind Signatures without Random Oracles
Concuent Blind Signatues without Random Oacles Aggelos Kiayias Hong-Sheng Zhou Abstact We pesent a blind signatue scheme that is efficient and povably secue without andom oacles unde concuent attacks utilizing
More informationANA BERRIZBEITIA, LUIS A. MEDINA, ALEXANDER C. MOLL, VICTOR H. MOLL, AND LAINE NOBLE
THE p-adic VALUATION OF STIRLING NUMBERS ANA BERRIZBEITIA, LUIS A. MEDINA, ALEXANDER C. MOLL, VICTOR H. MOLL, AND LAINE NOBLE Abstact. Let p > 2 be a pime. The p-adic valuation of Stiling numbes of the
More informationImproved Factoring Attacks on Multi-Prime RSA with Small Prime Difference
Impoved Factoing Attacks on Multi-Pime RSA with Small Pime Diffeence Mengce Zheng 1,2, Nobou Kunihio 2, and Honggang Hu 1 1 Univesity of Science and Technology of China, China mengce.zheng@gmail.com 2
More informationFixed Argument Pairing Inversion on Elliptic Curves
Fixed Agument Paiing Invesion on Elliptic Cuves Sungwook Kim and Jung Hee Cheon ISaC & Dept. of Mathematical Sciences Seoul National Univesity Seoul, Koea {avell7,jhcheon}@snu.ac.k Abstact. Let E be an
More informationOvercoming Weak Expectations
Ovecoming Weak Expectations Yevgeniy Dodis Depatment of Compute Science New Yok Univesity Email: dodis@cs.nyu.edu (Invited Pape) Yu Yu Institute fo Intedisciplinay Infomation Sciences Tsinghua Univesity,
More informationPearson s Chi-Square Test Modifications for Comparison of Unweighted and Weighted Histograms and Two Weighted Histograms
Peason s Chi-Squae Test Modifications fo Compaison of Unweighted and Weighted Histogams and Two Weighted Histogams Univesity of Akueyi, Bogi, v/noduslód, IS-6 Akueyi, Iceland E-mail: nikolai@unak.is Two
More informationarxiv: v1 [math.co] 1 Apr 2011
Weight enumeation of codes fom finite spaces Relinde Juius Octobe 23, 2018 axiv:1104.0172v1 [math.co] 1 Ap 2011 Abstact We study the genealized and extended weight enumeato of the - ay Simplex code and
More informationSurveillance Points in High Dimensional Spaces
Société de Calcul Mathématique SA Tools fo decision help since 995 Suveillance Points in High Dimensional Spaces by Benad Beauzamy Januay 06 Abstact Let us conside any compute softwae, elying upon a lage
More informationMethod for Approximating Irrational Numbers
Method fo Appoximating Iational Numbes Eic Reichwein Depatment of Physics Univesity of Califonia, Santa Cuz June 6, 0 Abstact I will put foth an algoithm fo poducing inceasingly accuate ational appoximations
More informationConstruction and Analysis of Boolean Functions of 2t + 1 Variables with Maximum Algebraic Immunity
Constuction and Analysis of Boolean Functions of 2t + 1 Vaiables with Maximum Algebaic Immunity Na Li and Wen-Feng Qi Depatment of Applied Mathematics, Zhengzhou Infomation Engineeing Univesity, Zhengzhou,
More informationON INDEPENDENT SETS IN PURELY ATOMIC PROBABILITY SPACES WITH GEOMETRIC DISTRIBUTION. 1. Introduction. 1 r r. r k for every set E A, E \ {0},
ON INDEPENDENT SETS IN PURELY ATOMIC PROBABILITY SPACES WITH GEOMETRIC DISTRIBUTION E. J. IONASCU and A. A. STANCU Abstact. We ae inteested in constucting concete independent events in puely atomic pobability
More informationQIP Course 10: Quantum Factorization Algorithm (Part 3)
QIP Couse 10: Quantum Factoization Algoithm (Pat 3 Ryutaoh Matsumoto Nagoya Univesity, Japan Send you comments to yutaoh.matsumoto@nagoya-u.jp Septembe 2018 @ Tokyo Tech. Matsumoto (Nagoya U. QIP Couse
More informationLecture 18: Graph Isomorphisms
INFR11102: Computational Complexity 22/11/2018 Lectue: Heng Guo Lectue 18: Gaph Isomophisms 1 An Athu-Melin potocol fo GNI Last time we gave a simple inteactive potocol fo GNI with pivate coins. We will
More informationVanishing lines in generalized Adams spectral sequences are generic
ISSN 364-0380 (on line) 465-3060 (pinted) 55 Geomety & Topology Volume 3 (999) 55 65 Published: 2 July 999 G G G G T T T G T T T G T G T GG TT G G G G GG T T T TT Vanishing lines in genealized Adams spectal
More informationNew problems in universal algebraic geometry illustrated by boolean equations
New poblems in univesal algebaic geomety illustated by boolean equations axiv:1611.00152v2 [math.ra] 25 Nov 2016 Atem N. Shevlyakov Novembe 28, 2016 Abstact We discuss new poblems in univesal algebaic
More informationFunctions Defined on Fuzzy Real Numbers According to Zadeh s Extension
Intenational Mathematical Foum, 3, 2008, no. 16, 763-776 Functions Defined on Fuzzy Real Numbes Accoding to Zadeh s Extension Oma A. AbuAaqob, Nabil T. Shawagfeh and Oma A. AbuGhneim 1 Mathematics Depatment,
More informationThe Substring Search Problem
The Substing Seach Poblem One algoithm which is used in a vaiety of applications is the family of substing seach algoithms. These algoithms allow a use to detemine if, given two chaacte stings, one is
More informationCryptography. Primitives and Protocols. Aggelos Kiayias
P1 P2 P3 E E E IV C1 C2 C3 Aggelos Kiayias Cyptogaphy Pimitives and Potocols Based on notes by G. Panagiotakos, S. Pehlivanoglu, J. Todd, K. Samai, T. Zachaias and H.S. Zhou CONTENTS 1 Contents 1 Intoduction
More informationA Bijective Approach to the Permutational Power of a Priority Queue
A Bijective Appoach to the Pemutational Powe of a Pioity Queue Ia M. Gessel Kuang-Yeh Wang Depatment of Mathematics Bandeis Univesity Waltham, MA 02254-9110 Abstact A pioity queue tansfoms an input pemutation
More informationLecture 28: Convergence of Random Variables and Related Theorems
EE50: Pobability Foundations fo Electical Enginees July-Novembe 205 Lectue 28: Convegence of Random Vaiables and Related Theoems Lectue:. Kishna Jagannathan Scibe: Gopal, Sudhasan, Ajay, Swamy, Kolla An
More informationDesign and Analysis of Password-Based Key Derivation Functions
Design and Analysis of Passwod-Based Key Deivation Functions 245 Fances F. Yao 1 and Yiqun Lisa Yin 2 1 Depatment of Compute Science, City Univesity of Hong Kong, Kowloon, Hong Kong csfyao@cityu.edu.hk
More informationON THE INVERSE SIGNED TOTAL DOMINATION NUMBER IN GRAPHS. D.A. Mojdeh and B. Samadi
Opuscula Math. 37, no. 3 (017), 447 456 http://dx.doi.og/10.7494/opmath.017.37.3.447 Opuscula Mathematica ON THE INVERSE SIGNED TOTAL DOMINATION NUMBER IN GRAPHS D.A. Mojdeh and B. Samadi Communicated
More informationUsing Laplace Transform to Evaluate Improper Integrals Chii-Huei Yu
Available at https://edupediapublicationsog/jounals Volume 3 Issue 4 Febuay 216 Using Laplace Tansfom to Evaluate Impope Integals Chii-Huei Yu Depatment of Infomation Technology, Nan Jeon Univesity of
More informationE E E. Aggelos Kiayias. Cryptography. Primitives and Protocols. Based on notes by S. Pehlivanoglu, J. Todd, K. Samari, T. Zacharias and H.S.
P1 P2 P3 E E E IV C1 C2 C3 Aggelos Kiayias Cyptogaphy Pimitives and Potocols Based on notes by S. Pehlivanoglu, J. Todd, K. Samai, T. Zachaias and H.S. Zhou CONTENTS 1 Contents 1 Intoduction 4 1.1 Flipping
More informationDesign and Analysis of Password-Based Key Derivation Functions
Design and Analysis of Passwod-Based Key Deivation Functions Fances F. Yao 1 and Yiqun Lisa Yin 2 1 Depatment of Compute Science City Univesity of Hong Kong Kowloon, Hong Kong Email: csfyao@cityu.edu.hk
More informationCALCULATING THE NUMBER OF TWIN PRIMES WITH SPECIFIED DISTANCE BETWEEN THEM BASED ON THE SIMPLEST PROBABILISTIC MODEL
U.P.B. Sci. Bull. Seies A, Vol. 80, Iss.3, 018 ISSN 13-707 CALCULATING THE NUMBER OF TWIN PRIMES WITH SPECIFIED DISTANCE BETWEEN THEM BASED ON THE SIMPLEST PROBABILISTIC MODEL Sasengali ABDYMANAPOV 1,
More informationThe Iterated Random Function Problem,
The Iteated Random Function Poblem, Ritam Bhaumik 1, ilanjan Datta 2, Avijit Dutta 1, icky Mouha 3,4, and Midul andi 1 1 Indian Statistical Institute, Kolkata, India. 2 Indian Institute of Technology,
More informationOn the ratio of maximum and minimum degree in maximal intersecting families
On the atio of maximum and minimum degee in maximal intesecting families Zoltán Lóánt Nagy Lale Özkahya Balázs Patkós Máté Vize Septembe 5, 011 Abstact To study how balanced o unbalanced a maximal intesecting
More informationLifting Private Information Retrieval from Two to any Number of Messages
Lifting Pivate Infomation Retieval fom Two to any umbe of Messages Rafael G.L. D Oliveia, Salim El Rouayheb ECE, Rutges Univesity, Piscataway, J Emails: d746@scaletmail.utges.edu, salim.elouayheb@utges.edu
More informationOn the Poisson Approximation to the Negative Hypergeometric Distribution
BULLETIN of the Malaysian Mathematical Sciences Society http://mathusmmy/bulletin Bull Malays Math Sci Soc (2) 34(2) (2011), 331 336 On the Poisson Appoximation to the Negative Hypegeometic Distibution
More informationE E E. Aggelos Kiayias. Cryptography. Primitives and Protocols. Notes by S. Pehlivanoglu, J. Todd, and H.S. Zhou
P1 P2 P3 E E E IV C1 C2 C3 Aggelos Kiayias Cyptogaphy Pimitives and Potocols Notes by S. Pehlivanoglu, J. Todd, and H.S. Zhou CONTENTS 1 Contents 2 1 Intoduction To begin discussing the basic popeties
More informationarxiv: v1 [math.co] 4 May 2017
On The Numbe Of Unlabeled Bipatite Gaphs Abdullah Atmaca and A Yavuz Ouç axiv:7050800v [mathco] 4 May 207 Abstact This pape solves a poblem that was stated by M A Haison in 973 [] This poblem, that has
More informationSyntactical content of nite approximations of partial algebras 1 Wiktor Bartol Inst. Matematyki, Uniw. Warszawski, Warszawa (Poland)
Syntactical content of nite appoximations of patial algebas 1 Wikto Batol Inst. Matematyki, Uniw. Waszawski, 02-097 Waszawa (Poland) batol@mimuw.edu.pl Xavie Caicedo Dep. Matematicas, Univ. de los Andes,
More informationONE-POINT CODES USING PLACES OF HIGHER DEGREE
ONE-POINT CODES USING PLACES OF HIGHER DEGREE GRETCHEN L. MATTHEWS AND TODD W. MICHEL DEPARTMENT OF MATHEMATICAL SCIENCES CLEMSON UNIVERSITY CLEMSON, SC 29634-0975 U.S.A. E-MAIL: GMATTHE@CLEMSON.EDU, TMICHEL@CLEMSON.EDU
More information16 Modeling a Language by a Markov Process
K. Pommeening, Language Statistics 80 16 Modeling a Language by a Makov Pocess Fo deiving theoetical esults a common model of language is the intepetation of texts as esults of Makov pocesses. This model
More informationOn the ratio of maximum and minimum degree in maximal intersecting families
On the atio of maximum and minimum degee in maximal intesecting families Zoltán Lóánt Nagy Lale Özkahya Balázs Patkós Máté Vize Mach 6, 013 Abstact To study how balanced o unbalanced a maximal intesecting
More informationRelating Branching Program Size and. Formula Size over the Full Binary Basis. FB Informatik, LS II, Univ. Dortmund, Dortmund, Germany
Relating Banching Pogam Size and omula Size ove the ull Binay Basis Matin Saueho y Ingo Wegene y Ralph Wechne z y B Infomatik, LS II, Univ. Dotmund, 44 Dotmund, Gemany z ankfut, Gemany sauehof/wegene@ls.cs.uni-dotmund.de
More information3.1 Random variables
3 Chapte III Random Vaiables 3 Random vaiables A sample space S may be difficult to descibe if the elements of S ae not numbes discuss how we can use a ule by which an element s of S may be associated
More information( ) [ ] [ ] [ ] δf φ = F φ+δφ F. xdx.
9. LAGRANGIAN OF THE ELECTROMAGNETIC FIELD In the pevious section the Lagangian and Hamiltonian of an ensemble of point paticles was developed. This appoach is based on a qt. This discete fomulation can
More informationGoodness-of-fit for composite hypotheses.
Section 11 Goodness-of-fit fo composite hypotheses. Example. Let us conside a Matlab example. Let us geneate 50 obsevations fom N(1, 2): X=nomnd(1,2,50,1); Then, unning a chi-squaed goodness-of-fit test
More informationSolution to HW 3, Ma 1a Fall 2016
Solution to HW 3, Ma a Fall 206 Section 2. Execise 2: Let C be a subset of the eal numbes consisting of those eal numbes x having the popety that evey digit in the decimal expansion of x is, 3, 5, o 7.
More informationNOTE. Some New Bounds for Cover-Free Families
Jounal of Combinatoial Theoy, Seies A 90, 224234 (2000) doi:10.1006jcta.1999.3036, available online at http:.idealibay.com on NOTE Some Ne Bounds fo Cove-Fee Families D. R. Stinson 1 and R. Wei Depatment
More informationLocalization of Eigenvalues in Small Specified Regions of Complex Plane by State Feedback Matrix
Jounal of Sciences, Islamic Republic of Ian (): - () Univesity of Tehan, ISSN - http://sciencesutaci Localization of Eigenvalues in Small Specified Regions of Complex Plane by State Feedback Matix H Ahsani
More informationTHE NUMBER OF TWO CONSECUTIVE SUCCESSES IN A HOPPE-PÓLYA URN
TH NUMBR OF TWO CONSCUTIV SUCCSSS IN A HOPP-PÓLYA URN LARS HOLST Depatment of Mathematics, Royal Institute of Technology S 100 44 Stocholm, Sweden -mail: lholst@math.th.se Novembe 27, 2007 Abstact In a
More informationMarkscheme May 2017 Calculus Higher level Paper 3
M7/5/MATHL/HP3/ENG/TZ0/SE/M Makscheme May 07 Calculus Highe level Pape 3 pages M7/5/MATHL/HP3/ENG/TZ0/SE/M This makscheme is the popety of the Intenational Baccalaueate and must not be epoduced o distibuted
More informationOn the Quasi-inverse of a Non-square Matrix: An Infinite Solution
Applied Mathematical Sciences, Vol 11, 2017, no 27, 1337-1351 HIKARI Ltd, wwwm-hikaicom https://doiog/1012988/ams20177273 On the Quasi-invese of a Non-squae Matix: An Infinite Solution Ruben D Codeo J
More informationInformation Retrieval Advanced IR models. Luca Bondi
Advanced IR models Luca Bondi Advanced IR models 2 (LSI) Pobabilistic Latent Semantic Analysis (plsa) Vecto Space Model 3 Stating point: Vecto Space Model Documents and queies epesented as vectos in the
More informationA Multivariate Normal Law for Turing s Formulae
A Multivaiate Nomal Law fo Tuing s Fomulae Zhiyi Zhang Depatment of Mathematics and Statistics Univesity of Noth Caolina at Chalotte Chalotte, NC 28223 Abstact This pape establishes a sufficient condition
More information6 PROBABILITY GENERATING FUNCTIONS
6 PROBABILITY GENERATING FUNCTIONS Cetain deivations pesented in this couse have been somewhat heavy on algeba. Fo example, detemining the expectation of the Binomial distibution (page 5.1 tuned out to
More informationFailure Probability of 2-within-Consecutive-(2, 2)-out-of-(n, m): F System for Special Values of m
Jounal of Mathematics and Statistics 5 (): 0-4, 009 ISSN 549-3644 009 Science Publications Failue Pobability of -within-consecutive-(, )-out-of-(n, m): F System fo Special Values of m E.M.E.. Sayed Depatment
More informationEncapsulation theory: the transformation equations of absolute information hiding.
1 Encapsulation theoy: the tansfomation equations of absolute infomation hiding. Edmund Kiwan * www.edmundkiwan.com Abstact This pape descibes how the potential coupling of a set vaies as the set is tansfomed,
More informationEnumerating permutation polynomials
Enumeating pemutation polynomials Theodoulos Gaefalakis a,1, Giogos Kapetanakis a,, a Depatment of Mathematics and Applied Mathematics, Univesity of Cete, 70013 Heaklion, Geece Abstact We conside thoblem
More informationEncapsulation theory: radial encapsulation. Edmund Kirwan *
Encapsulation theoy: adial encapsulation. Edmund Kiwan * www.edmundkiwan.com Abstact This pape intoduces the concept of adial encapsulation, wheeby dependencies ae constained to act fom subsets towads
More informationWhen two numbers are written as the product of their prime factors, they are in factored form.
10 1 Study Guide Pages 420 425 Factos Because 3 4 12, we say that 3 and 4 ae factos of 12. In othe wods, factos ae the numbes you multiply to get a poduct. Since 2 6 12, 2 and 6 ae also factos of 12. The
More informationJournal of Inequalities in Pure and Applied Mathematics
Jounal of Inequalities in Pue and Applied Mathematics COEFFICIENT INEQUALITY FOR A FUNCTION WHOSE DERIVATIVE HAS A POSITIVE REAL PART S. ABRAMOVICH, M. KLARIČIĆ BAKULA AND S. BANIĆ Depatment of Mathematics
More information1. INTRODUCTION FAST ELLIPTIC CURVE CRYPTOGRAPHY USING OPTIMAL DOUBLE-BASE CHAINS
FAST ELLIPTIC CURVE CRYPTOGRAPHY USING OPTIMAL DOUBLE-BASE CHAINS Voapong Suppakitpaisan, Hioshi Imai Gaduate School of Infomation Science and Technology, The Univesity of Tokyo Tokyo, Japan 11-00 m t
More information6 Matrix Concentration Bounds
6 Matix Concentation Bounds Concentation bounds ae inequalities that bound pobabilities of deviations by a andom vaiable fom some value, often its mean. Infomally, they show the pobability that a andom
More informationOn Polynomials Construction
Intenational Jounal of Mathematical Analysis Vol., 08, no. 6, 5-57 HIKARI Ltd, www.m-hikai.com https://doi.og/0.988/ima.08.843 On Polynomials Constuction E. O. Adeyefa Depatment of Mathematics, Fedeal
More informationQuasi-Randomness and the Distribution of Copies of a Fixed Graph
Quasi-Randomness and the Distibution of Copies of a Fixed Gaph Asaf Shapia Abstact We show that if a gaph G has the popety that all subsets of vetices of size n/4 contain the coect numbe of tiangles one
More informationFall 2014 Randomized Algorithms Oct 8, Lecture 3
Fall 204 Randomized Algoithms Oct 8, 204 Lectue 3 Pof. Fiedich Eisenband Scibes: Floian Tamè In this lectue we will be concened with linea pogamming, in paticula Clakson s Las Vegas algoithm []. The main
More informationAuchmuty High School Mathematics Department Advanced Higher Notes Teacher Version
The Binomial Theoem Factoials Auchmuty High School Mathematics Depatment The calculations,, 6 etc. often appea in mathematics. They ae called factoials and have been given the notation n!. e.g. 6! 6!!!!!
More informationON SPARSELY SCHEMMEL TOTIENT NUMBERS. Colin Defant 1 Department of Mathematics, University of Florida, Gainesville, Florida
#A8 INTEGERS 5 (205) ON SPARSEL SCHEMMEL TOTIENT NUMBERS Colin Defant Depatment of Mathematics, Univesity of Floida, Gainesville, Floida cdefant@ufl.edu Received: 7/30/4, Revised: 2/23/4, Accepted: 4/26/5,
More informationQuantum Fourier Transform
Chapte 5 Quantum Fouie Tansfom Many poblems in physics and mathematics ae solved by tansfoming a poblem into some othe poblem with a known solution. Some notable examples ae Laplace tansfom, Legende tansfom,
More informationq i i=1 p i ln p i Another measure, which proves a useful benchmark in our analysis, is the chi squared divergence of p, q, which is defined by
CSISZÁR f DIVERGENCE, OSTROWSKI S INEQUALITY AND MUTUAL INFORMATION S. S. DRAGOMIR, V. GLUŠČEVIĆ, AND C. E. M. PEARCE Abstact. The Ostowski integal inequality fo an absolutely continuous function is used
More informationarxiv: v1 [math.na] 8 Feb 2013
A mixed method fo Diichlet poblems with adial basis functions axiv:1302.2079v1 [math.na] 8 Feb 2013 Nobet Heue Thanh Tan Abstact We pesent a simple discetization by adial basis functions fo the Poisson
More informationMath 301: The Erdős-Stone-Simonovitz Theorem and Extremal Numbers for Bipartite Graphs
Math 30: The Edős-Stone-Simonovitz Theoem and Extemal Numbes fo Bipatite Gaphs May Radcliffe The Edős-Stone-Simonovitz Theoem Recall, in class we poved Tuán s Gaph Theoem, namely Theoem Tuán s Theoem Let
More informationTHE JEU DE TAQUIN ON THE SHIFTED RIM HOOK TABLEAUX. Jaejin Lee
Koean J. Math. 23 (2015), No. 3, pp. 427 438 http://dx.doi.og/10.11568/kjm.2015.23.3.427 THE JEU DE TAQUIN ON THE SHIFTED RIM HOOK TABLEAUX Jaejin Lee Abstact. The Schensted algoithm fist descibed by Robinson
More informationST 501 Course: Fundamentals of Statistical Inference I. Sujit K. Ghosh.
ST 501 Couse: Fundamentals of Statistical Infeence I Sujit K. Ghosh sujit.ghosh@ncsu.edu Pesented at: 2229 SAS Hall, Depatment of Statistics, NC State Univesity http://www.stat.ncsu.edu/people/ghosh/couses/st501/
More informationKey Establishment Protocols. Cryptography CS 507 Erkay Savas Sabanci University
Key Establishment Potocols Cyptogaphy CS 507 Ekay Savas Sabanci Univesity ekays@sabanciuniv.edu Key distibution poblem Secuity of the keys Even if the cyptogaphic algoithms & potocols ae cyptogaphically
More informationIntroduction Common Divisors. Discrete Mathematics Andrei Bulatov
Intoduction Common Divisos Discete Mathematics Andei Bulatov Discete Mathematics Common Divisos 3- Pevious Lectue Integes Division, popeties of divisibility The division algoithm Repesentation of numbes
More informationResearch Article On Alzer and Qiu s Conjecture for Complete Elliptic Integral and Inverse Hyperbolic Tangent Function
Abstact and Applied Analysis Volume 011, Aticle ID 697547, 7 pages doi:10.1155/011/697547 Reseach Aticle On Alze and Qiu s Conjectue fo Complete Elliptic Integal and Invese Hypebolic Tangent Function Yu-Ming
More informationA Converse to Low-Rank Matrix Completion
A Convese to Low-Rank Matix Completion Daniel L. Pimentel-Alacón, Robet D. Nowak Univesity of Wisconsin-Madison Abstact In many pactical applications, one is given a subset Ω of the enties in a d N data
More informationMATH 220: SECOND ORDER CONSTANT COEFFICIENT PDE. We consider second order constant coefficient scalar linear PDEs on R n. These have the form
MATH 220: SECOND ORDER CONSTANT COEFFICIENT PDE ANDRAS VASY We conside second ode constant coefficient scala linea PDEs on R n. These have the fom Lu = f L = a ij xi xj + b i xi + c i whee a ij b i and
More informationJENSEN S INEQUALITY FOR DISTRIBUTIONS POSSESSING HIGHER MOMENTS, WITH APPLICATION TO SHARP BOUNDS FOR LAPLACE-STIELTJES TRANSFORMS
J. Austal. Math. Soc. Se. B 40(1998), 80 85 JENSEN S INEQUALITY FO DISTIBUTIONS POSSESSING HIGHE MOMENTS, WITH APPLICATION TO SHAP BOUNDS FO LAPLACE-STIELTJES TANSFOMS B. GULJAŠ 1,C.E.M.PEACE 2 and J.
More informationCENTRAL INDEX BASED SOME COMPARATIVE GROWTH ANALYSIS OF COMPOSITE ENTIRE FUNCTIONS FROM THE VIEW POINT OF L -ORDER. Tanmay Biswas
J Koean Soc Math Educ Se B: Pue Appl Math ISSNPint 16-0657 https://doiog/107468/jksmeb01853193 ISSNOnline 87-6081 Volume 5, Numbe 3 August 018, Pages 193 01 CENTRAL INDEX BASED SOME COMPARATIVE GROWTH
More informationAnonymous return route information for onion based mix-nets
Anonymous etun oute infomation fo onion based mix-nets ABSTRACT Yoshifumi Manabe NTT Communication Science Laboatoies NTT Copoation Atsugi Kanagawa 239-0198 Japan manabeyoshifumi@labnttcojp This pape poposes
More information2 S. Gao and M. A. Shokollahi opeations in Fq, and usually we will use the \Soft O" notation to ignoe logaithmic factos: g = O(n) ~ means that g = O(n
Computing Roots of Polynomials ove Function Fields of Cuves Shuhong Gao 1 and M. Amin Shokollahi 2 1 Depatment of Mathematical Sciences, Clemson Univesity, Clemson, SC 29634 USA 2 Bell Labs, Rm. 2C-353,
More informationLecture 8 - Gauss s Law
Lectue 8 - Gauss s Law A Puzzle... Example Calculate the potential enegy, pe ion, fo an infinite 1D ionic cystal with sepaation a; that is, a ow of equally spaced chages of magnitude e and altenating sign.
More informationRandom Variables and Probability Distribution Random Variable
Random Vaiables and Pobability Distibution Random Vaiable Random vaiable: If S is the sample space P(S) is the powe set of the sample space, P is the pobability of the function then (S, P(S), P) is called
More informationThe VC-dimension of Unions: Learning, Geometry and Combinatorics
The VC-dimension of Unions: Leaning, Geomety and Combinatoics Mónika Csikós Andey Kupavskii Nabil H. Mustafa Abstact The VC-dimension of a set system is a way to captue its complexity, and has been a key
More informationarxiv: v1 [math.nt] 12 May 2017
SEQUENCES OF CONSECUTIVE HAPPY NUMBERS IN NEGATIVE BASES HELEN G. GRUNDMAN AND PAMELA E. HARRIS axiv:1705.04648v1 [math.nt] 12 May 2017 ABSTRACT. Fo b 2 and e 2, let S e,b : Z Z 0 be the function taking
More informationFractional Zero Forcing via Three-color Forcing Games
Factional Zeo Focing via Thee-colo Focing Games Leslie Hogben Kevin F. Palmowski David E. Robeson Michael Young May 13, 2015 Abstact An -fold analogue of the positive semidefinite zeo focing pocess that
More informationAdditive Approximation for Edge-Deletion Problems
Additive Appoximation fo Edge-Deletion Poblems Noga Alon Asaf Shapia Benny Sudakov Abstact A gaph popety is monotone if it is closed unde emoval of vetices and edges. In this pape we conside the following
More informationRate Splitting is Approximately Optimal for Fading Gaussian Interference Channels
Rate Splitting is Appoximately Optimal fo Fading Gaussian Intefeence Channels Joyson Sebastian, Can Kaakus, Suhas Diggavi, I-Hsiang Wang Abstact In this pape, we study the -use Gaussian intefeence-channel
More informationIdentification of the degradation of railway ballast under a concrete sleeper
Identification of the degadation of ailway ballast unde a concete sleepe Qin Hu 1) and Heung Fai Lam ) 1), ) Depatment of Civil and Achitectual Engineeing, City Univesity of Hong Kong, Hong Kong SAR, China.
More informationReliability analysis examples
Reliability analysis examples Engineeing Risk Analysis Goup, Technische Univesität München. Acisst., 80 Munich, Gemany. May 8, 08 Intoduction In the context of eliability analysis and ae event estimation,
More informationQuery Complexity Lower Bounds for Reconstruction of Codes
Quey Complexity Lowe Bounds fo Reconstuction of Codes Souav Chakaboty Elda Fische Aie Matsliah Abstact We investigate the poblem of local econstuction, as defined by Saks and Seshadhi (2008), in the context
More information