Some RSA-based Encryption Schemes with Tight Security Reduction

Size: px
Start display at page:

Download "Some RSA-based Encryption Schemes with Tight Security Reduction"

Transcription

1 Some RSA-based Encyption Schemes with Tight Secuity Reduction Kaou Kuosawa 1 and Tsuyoshi Takagi 2 1 Ibaaki Univesity, Nakanausawa, Hitachi, Ibaaki, , Japan kuosawa@cis.ibaaki.ac.jp 2 Technische Univesität Damstadt, Fachbeeich Infomatik, Alexandest.10, D Damstadt, Gemany ttakagi@cdc.infomatik.tu-damstadt.de Abstact. In this pape, we study some RSA-based semantically secue encyption schemes IND-CPA) in the standad model. We fist deive the exactly tight one-wayness of Rabin-Paillie encyption scheme which assumes that factoing Blum integes is had. We next popose the fist IND-CPA scheme whose one-wayness is equivalent to factoing geneal n = pq not factoing Blum integes). Ou eductions of one-wayness ae vey tight because they equie only one decyption-oacle quey. Keywods: Factoing, semantic secuity, tight eduction, RSA-Paillie, Rabin-Paillie. 1 Intoduction 1.1 Backgound An encyption scheme should have stong one-wayness as well as high semantic secuity. Theefoe, it is desiable to constuct a semantically secue encyption scheme whose one-wayness is equivalent to factoing n = pq in the standad model. Thee ae seveal povably secue constuctions in the andom oacle model. Fo example, see [Sho01,FOPS01,Bon01].) RSA-Paillie encyption scheme is semantically secue against chosen plaintext attacks IND-CPA) in the standad model unde the RSA-Paillie assumption [CGHN01]. The assumption claims that SMALL RSAP = { e mod n 2 Z n } and LARGE RSAP = { e mod n 2 Z n 2} ae indistinguishable, whee n, e) is the public-key of RSA. Futhe, it is oneway if beaking RSA is had. The latte poblem was fist aised by [ST02] and finally poved by [CNS02] using LLL algoithm of lattice theoy. On the othe hand, n= pq) is called a Blum intege if p = q = 3 mod 4. Galindo et al. ecently consideed Rabin-Paillie encyption scheme and showed that it is one-way if factoing Blum integes is had [GMMV03]. Howeve, thee is a lage gap between the one-wayness which they poved and the difficulty of factoing. That is, suppose that the one-wayness is boken

2 with pobability ε. Then what Galindo et al. poved is that Blum integes can be factoed with pobability ε 2. Futhe the factoing poblem is esticted to Blum integes, but not geneal p, q. The one-wayness of Okamoto-Uchiyama scheme [OU98] is equivalent to factoing n = p 2 q, but not n = pq.) 1.2 Ou Contibution In this pape, we study the tight one-wayness of some RSA-based semantically secue encyption schemes IND-CPA) in the standad model, whee the onewayness must be equivalent to factoing n = pq. We fist show that Rabin-Paillie encyption scheme has no gap between the eal one-wayness and the difficulty of factoing Blum integes. In othe wods, we give a factoing algoithm with success pobability ε.) Ou poof technique is quite diffeent fom pevious poofs. In paticula: Ou poof technique equies only one decyption-oacle quey while the pevious poofs fo RSA/Rabin-Paillie encyption schemes equie two oacle queies [CNS02,GMMV03]. No LLL algoithm is equied, which was essentially used in the pevious poofs fo RSA/Rabin-Paillie schemes [CNS02,GMMV03]. We next popose the fist IND-CPA scheme such that the one-wayness is equivalent to factoing geneal n = pq not factoing Blum integes). The onewayness is poved by applying ou poof technique as mentioned above. Theefoe, ou secuity eduction of one-wayness is vey tight. That is, thee is almost no gap between the one-wayness and the hadness of the geneal factoing poblem. The poposed scheme is obtained fom an encyption scheme pesented by Kuosawa et al. [KIT88,KOMM01]. The semantic secuity holds unde a natual extension of RSA-Paillie assumption. That is, it is semantically secue IND-CPA) if two distibutions SMALL RSAK and LARGE RSAK ae indistinguishable, whee we define SMALL RSAK and LARGE RSAK as appopiate subsets of SMALL RSAP and LARGE RSAP, espectively. We also show a close elationship between ou assumption and RSA-Paillie assumption. This pape is oganized as follows: In Section 2, we descibe notions equied fo the secuity desciption in this pape. In Section 3, the exact secuity eduction algoithm fo Rabin-Paillie encyption scheme is pesented. In Section 4, the poposed scheme is pesented. In Section 5, we pove that the one-wayness of the poposed scheme is as had as geneal factoing poblem. In Section 6, we discuss the semantic secuity of the poposed scheme. Sec.7 includes some final comments. Related woks: Came and Shoup showed an semantically secue encyption scheme against chosen ciphetext attacks IND-CCA) unde the decision Diffie-Hellamn assumption [CS98]. They ecently showed a geneal famewok to constuct IND-CCA schemes [CS02].

3 It will be a futhe wok to develop an IND-CCA scheme whose one-wayness is equivalent to the factoing poblem in the standad model. We hope that ou esults povide us a good stating point to this challenging poblem. 2 Secuity of Encyption Schemes PPT will denote a pobabilistic polynomial time. 2.1 Encyption Scheme A public-key encyption scheme PE = K, E, D) consists of thee algoithms. The key geneation algoithm K outputs pk, sk) on input 1 l, whee pk is a public key, sk is the secet key and l is a secuity paamete. We wite pk, sk) R K. The encyption algoithm E outputs a ciphetext c on input the public key pk and a plaintext message) m; we wite c R E pk m). The decyption algoithm D outputs m o eject on input the secet key sk and a ciphetext c; we wite x D sk c), whee x = m o eject. We equie that D sk E pk m)) = m fo each plaintext m. K and E ae PPT algoithms, and D is a polynomial time algoithm. 2.2 One-Wayness The one-wayness poblem is as follows: given a public key pk and a ciphetext c, find the plaintext m such that c R E pk m). Fomally, fo an advesay A, conside an expeiment as follows. pk, sk) R K, c R E pk m), m R Apk, c). whee m is andomly chosen fom the domain of pk. Let Fo any t > 0, define Adv ow PEA) = P m = m). AdvPEt) ow = max Advow PEA), whee the maximum is ove all A who un in time t. A Definition 1. We say that PE is t, ε)-one-way if AdvPE ow t) < ε. We also say that PE is one-way if AdvPE ow A) is negligible fo any PPT advesay A. 2.3 Semantic Secuity We say that a public-key encyption scheme PE = K, E, D) is semantically secue against chosen plaintext attacks SS-CPA) if it is had to find any patial) infomation on m fom c. This notion is equivalent to indistinguishability IND- CPA), which is descibed as follows [BDPR98,Gol01].

4 We conside an advesay B = B 1, B 2 ) as follows. In the find stage, B 1 takes a public key pk and outputs m 0, m 1, state), whee m 0 and m 1 ae two equal length plaintexts and state is some state infomation. In the guess stage, B 2 gets a challenge ciphetext c R E pk m b ) fom an oacle, whee b is a andomly chosen bit. B 2 finally outputs a bit b. We say that an encyption scheme PE is secue in the sense of IND-CPA if P b = b) 1/2 is negligible. Fomally, fo each secuity paamete l, let pk, sk) R K, m 0, m 1, state) R B 1 pk), c R E pk m b ), b R B 2 c, state). Definition 2. We say that PE is secue in the sense of indistinguishability against chosen-plaintext attack IND-CPA) if is negligible fo any PPT advesay B. Adv ind PE B) = P b = b) 1/2 If an advesay B = B 1, B 2 ) is allowed to access the decyption oacle D sk ), we denote it by B D = B1 D, B2 D ). If Adv ind PE BD ) is negligible fo any P P T advesay B D, we say that PE is secue in the sense of indistinguishability against adaptive chosen-ciphetext attack IND-CCA). 2.4 Factoing Assumptions The geneal factoing poblem is to facto n = pq, whee p and q ae two pimes such that p = q. Fomally, fo an factoing algoithm B, conside the following expeiment. Geneate two pimes p and q such that p = q andomly. Give n = pq to B. We say that B succeeds if B can output p o q. Definition 3. We say that the geneal factoing poblem is t, ε)-had if PB succeeds) < ε fo any B who uns in time t. We also say that it is had if PB succeeds) is negligible fo any PPT algoithm B. The geneal factoing assumption claims that the geneal factoing poblem is had. We say that n= pq) is a Blum intege if p and q ae pime numbes such that p = q = 3 mod 4 and p = q. The Blum-factoing poblem is defined similaly. Blum-factoing assumption claims that the Blum-factoing poblem is had. 3 Exact One-Wayness of Rabin-Paillie Scheme Galindo et al. ecently constucted Rabin-Paillie encyption scheme [GMMV03] and showed that its one-wayness is as had as factoing Blum integes, whee n = pq is called a Blum intege if p = q = 3 mod 4. Howeve, thee is a polynomially bounded gap between the difficulty of factoing and the claimed one-wayness. This is because they used the same poof technique as that of [CNS02].

5 In this section, we show that thee exists no gap between the difficulty of factoing Blum integes and the eal one-wayness of Rabin-Paillie encyption scheme. In othe wods, we pesent the exactly tight one-wayness of Rabin- Paillie encyption scheme. Ou poof is vey simple and totally elemental. In paticula, no LLL algoithm is equied which was essentially used in the pevious poofs fo RSA/Rabin- Paillie [CNS02,GMMV03]. 3.1 Rabin-Paillie Encyption Scheme Rabin-Paillie encyption scheme is descibed as follows. Let Q n = { 2 mod n 2 Z n}. We say that Z n is conjugate if /n) = 1, whee m/n) denotes Jacobi s symbol. Secet key) Two pime numbes p and q such that p = q and p = q = 3 mod 4. Public key) n= pq), e, whee e is a pime such that n /2 < e < n. Plaintext) m Z n. Ciphetext) c = 2e + mn mod n 2, 1) whee Q n is andomly chosen. Decyption) Since e is a pime such that n /2 < e < n, it satisfies that gcde, p 1) = gcde, q 1) = 1. 2) Theefoe, thee exists d such that ed = 1 mod lcmp 1, q 1). Now let E = c d mod n. Then it is easy to see that E = 2 mod n. We can find such that Q n uniquely because p = q = 3 mod 4. Finally, by substituting into eq.1), we can obtain m. In [GMMV03], the authos showed that Rabin-Paillie encyption scheme is secue in the sense of IND-CPA if n, e, En, e; 0)) and n, e, Q n 2) ae indistinguishable, whee Remaks: En, e; 0) = { 2e mod n 2 Q n }. 1. In [GMMV03], the condition on e is esticted to gcde, λn)) = 1, whee λ is Camichael s function. Howeve, fo this paamete choice, we cannot pove that the one-wayness is as had as the factoing poblem, because we cannot geneally choose such e fo a given n. In Appendix B, we also point out a flaw on thei claim fo the semantic secuity of Rabin-Paillie cyptosystem.

6 2. RSA-Paillie encyption scheme is obtained by letting fo m Z n and Z n [CGHN01]. c = e 1 + mn) mod n Exactly Tight One-Wayness Suppose that thee exists a PPT algoithm that beaks the one-wayness with pobability ε. Then Galindo et al. poved that thee exists a PPT algoithm that can facto Blum integes n with pobability ε 2 see the poof of [GMMV03, Poposition 6]). In this subsection, we show that thee exists a PPT algoithm that can facto Blum integes n with pobability ε. Since the convese is clea, ou eduction is exactly tight. Scheme Factoing Pobability Galindo et al. [GMMV03] ε 2 Ou Poposed Poof ε Table 1. Factoing pobability using OW-oacle with pobability ε Lemma 1. Let n be a Blum intege. Fo any conjugate, thee exists a unique Q n such that 2 = 2 mod n. 3) Futhe, gcd, n) = p o q. Poof. Note that 1/p) = 1 and 1/q) = 1 fo a Blum intege n = pq. A conjugate Z n satisfies /n) = 1, namely I) : /p) = 1 /q) = 1 o II) : /p) = 1 /q) = 1. In the case of I), define = mod p and = mod q, then the statement of the lemma is obtained. Similaly in the case of II) we assign = mod p and = mod q. Theoem 1. Rabin-Paillie encyption scheme is t, ε)-one-way if Blum factoing poblem is t, ε)-had, whee t = t + Olog n) 3 ). Poof. Suppose that thee exists an oacle O which beaks the one-wayness of Rabin-Paillie encyption scheme with pobability ε in time t. We will show a factoing algoithm A. We show how to find and satisfying eq.3). On input n, A fist chooses a pime e such that n /2 < e < n andomly. A next chooses a conjugate Z n and a fake) plaintext m Z n andomly, and computes a fake) ciphetext c = 2e + mn mod n 2. It is clea that c is uniquely witten as c = B 0 + B 1 n mod n 2 B 0 Q n, B 1 Z n. Note that fo some

7 1. B 1 is unifomly distibuted ove Z n because m is andomly chosen fom Z n, and 2. B 0 is unifomly distibuted ove { 2e mod n Q n } fom Lemma 1. Theefoe, c is distibuted in the same way as valid ciphetexts. Now A queies c to the oacle O. O then answes a valid) plaintext m such that c = 2e + mn mod n 2 with pobability ε in time t, whee Q n. Then we have c = 2e = 2e mod n. Hence we see that 2 = 2 mod n. Theefoe, 2 is witten as 2 = 2 + yn 4) fo some y Z n with no modulus). By letting x = 2 mod n 2, we obtain that w = c mn = 2e = x + yn) e = x e + eynx e 1 mod n 2. 5) It is easy to see that Theefoe y is obtained as eyx e 1 = w xe n mod n. y = ex e 1 1 w xe ) mod n. n Substitute y into eq.4). Then we can compute a squae oot > 0 because eq.4) has no modulus. Finally we can facto n by using, ) fom Lemma 1. Ou algoithm A fo Rabin-Paillie scheme is summaized as follows. Exact OW Rabin Paillie Input: n, e), public key of Rabin-Paillie scheme Output: p, q, factoing of n 1. choose a andom Z n such that /n) = compute x = 2 mod n choose a andom fake) plaintext m Z n. 4. compute a ciphetext c = x e + mn mod n obtain a valid plaintext m = Oc) 6. compute w = c mn = 2e mod n compute u = w x e mod n 2 )/n. 8. compute y = uex e 1) ) 1 mod n. 9. compute v = 2 + ny. 10. find > 0 such that 2 = v in Z. 11. etun gcd, n).

8 4 New Encyption Scheme In this section, we popose an encyption scheme such that its one-wayness is as had as the geneal factoing poblem of n = pq not factoing Blum integes). The poposed scheme is obtained fom an encyption scheme poposed by Kuosawa et al. [KIT88,KOMM01]. 4.1 Kuosawa et al. s Encyption Scheme Kuosawa et al. s showed an encyption scheme as follows [KIT88]. Secet key) Two pime numbes p and q such that p = q. Public key) n= pq) and α such that whee α/p) denotes Legende s symbol. Plaintext) m Z n. Ciphetext) c = E, s, t) such that α/p) = α/q) = 1, 6) E = m + α mod n 7) m s = { 0 if m/n) = 1; 1 if m/n) = 1, t = { 0 if α/m mod n) > m; 1 if α/m mod n) < m. Decyption) Fom eq.7), it holds that m 2 Em + α = 0 mod n. 8) The above equation has fou oots. Howeve, we can decypt m uniquely fom s, t) due to eq.6) [KIT88,KOMM01]. Also see [KT03, Appendix E]. In [KIT88,KOMM01], it is poved that this encyption scheme is one-way unde the geneal factoing assumption. 4.2 Poposed Encyption Scheme Secet key) Two pime numbes p and q such that p = q. Public key) n= pq), e, α, whee e is a pime such that n /2 < e < n and α Z n satisfies α/p) = α/q) = 1. 9) Plaintext) m Z n. Ciphetext) c = + α ) e + mn mod n 2, 10) whee Zn is a andom element such that /n) = 1 and α/ mod n) >. We can compute 1/ mod N 2 faste than the diect method [KT03, Sec.4.3].)

9 Decyption) Let E = c d mod n, whee ed = 1 mod lcmp 1, q 1). Then it is easy to see that E = + α mod n. Note that E, 0, 0) is the ciphetext of by Kuosawa et al. s encyption scheme. Theefoe we can find by decypting E, 0, 0) with the decyption algoithm. Finally, by substituting into eq.10), we can obtain m. 5 One-Wayness of the Poposed Scheme In this section, we show the one-wayness of the poposed scheme by applying ou poof technique developed in Sec.3. Ou secuity eduction is vey tight. That is, thee is almost no gap between the one-wayness and the hadness of the geneal factoing poblem. Indeed, ou poof equies only one decyption-oacle quey while the pevious poof fo RSA/Rabin-Paillie encyption scheme equies two oacle queies [CNS02,GMMV03]. 5.1 Poof of One-Wayness We say that 1. Z n is pincipal if /n) = 1 and α/ mod n) >. 2. Z n is conjugate if /n) = 1. Note that in tems of the paametes of Kuosawa et al s encyption scheme, Z n is pincipal if s, t) = 0, 0) and Z n is conjugate if s = 1. Lemma 2. Fo any conjugate, thee exists a unique pincipal such that E = + ᾱ = + α mod n. 11) Futhe, gcd, n) = p o q. Poof. Thee ae fou diffeent solutions of Kuosawa et al s encyption E coesponding to s, t) = 0, 0), 0, 1), 1, 0), 1, 1) as shown in [KIT88,KOMM01]. Also see [KT03, Appendix E].) A conjugate satisfies /p) = 1 /q) = 1 o /p) = 1 /q) = 1 fo s = 1. Define 1 = mod p 1 = α/ mod q and 2 = α/ mod p 2 = mod q. Then eithe 1 o 2 is the equied pinciple. Hence, the fome pat of this Lemma holds. Futhe, mod p = mod q o = mod p mod q holds due to α/p) = α/q) = 1. Theefoe, we can see that gcd, n) = p o q. Fom eq.11), it holds that fo some unique y Z n. + α/ = + α/ ) + yn mod n 2 12)

10 Lemma 3. Suppose that we have, y) satisfying eq.12) fo some pincipal, whee is conjugate. Then we can facto n. Poof. We show that can be computed fom y, ). Let Then we have v = + α/ ) + yn mod n 2. 2 v + α = 0 mod n 2 fom eq.12). We can solve this quadatic equation by using the Coppesmith s algoithm [Cop96] because of 0 < < n. Then we can facto n fom Lemma 2. Lemma 4. Suppose that thee exists an oacle O that beaks the one-wayness of the poposed scheme with pobability ε and in time t. Then thee exists an algoithm A which factos n fom n, e, α) with pobability ε in time t + polylog n), whee O is invoked once. Poof. We show how to find and y satisfying eq.12). On input n, e, α), A fist chooses a conjugate Z n andomly and computes x = + ᾱ mod n2. 13) It next chooses a fake) plaintext m Z n andomly and computes c = x e + mn mod n 2. It is clea that c is uniquely witten as c = B 0 +B 1 n mod n 2 fo some B 0, B 1 Z n. Note that 1) B 1 is unifomly distibuted ove Z n because m is andomly chosen fom Z n. 2) B 0 is unifomly distibuted ove { + α/) e mod n Zn is pincipal} fom Lemma 2. Theefoe, c is distibuted in the same way as valid ciphetexts. Now A queies c to the oacle O. O then answes a valid) plaintext m such that c = + α ) e + mn mod n 2 with pobability ε and in time t, whee Zn is pincipal. Then we have c = + α ) e = x e mod n. Hence we see that + α = x mod n. Theefoe, thee exists y Z n such that We then obtain that + α = x + yn mod n2. w = c mn = + α/) e = x + yn) e = x e + eynx e 1 mod n 2.

11 It is easy to see that Theefoe y is obtained as eyx e 1 = w xe n mod n. y = w xe ex e 1 ) 1 mod n. n Finally we can facto n by using, y) fom Lemma 3. Ou algoithm A fo the poposed scheme is summaized as follows: OW Recipocal Paillie Input: n, e, α), public-key of the poposed scheme Output: p, q, factoing of n 1. choose a andom Z n such that /n) = compute x = + α/ mod n choose a andom fake) plaintext m Z n. 4. compute a ciphetext c = x e + mn mod n obtain a valid plaintext m = Oc) 6. compute w = c mn = + α/) e mod n compute u = w x e )/n. 8. compute y = uex e 1) ) 1 mod n. 9. compute v = + α/ ) + ny mod n. 10. solve 2 v + α = 0 mod n 2 using Coppesmith s algoithm [Cop96]. 11. etun gcd, n). Theoem 2. The poposed encyption scheme is t, ε) one-way if the geneal factoing poblem is t, ε/2)-had, whee t = t + polylog n). Poof. Suppose that thee exists a PPT algoithm that beaks the one-wayness of the poposed scheme with pobability ε in time t. Then we show a PPT algoithm which can facto n. Fo a given n, we choose a pime e such that n /2 < e < n andomly. We also choose α Zn such that α/n) = 1 andomly. It is easy to see that α satisfies eq.9) with pobability 1/2. Next apply Lemma 4 to n, e, α). Then we can facto n with pobability ε/2 in time t = t + polylog n). The poposed scheme is a combination of the scheme of Kuosawa et al. and the RSA-Paillie scheme. Anothe constuction is to encypt a message m Z/nZ as follows: c = e + α ) e + mn mod n 2, 14) whee Z n is a andom element such that e mod n/n) = 1 and α/ e mod n) >. Afte computing e mod n 2 the ecipocal encyption is applied. Howeve, the secuity analysis of this constuction is moe difficult we cannot apply the above poof technique to this scheme, because e mod n 2 is lage than n.

12 5.2 Hensel Lifting and Lage Message Space Catalano et al. poved that Hensel-RSA poblem is as had as beaking RSA fo any lifting index l [CNS02]. In this section, we define Hensel-Recipocal poblem and show that it is as had as geneal factoization fo any lifting index l. This esult implies that we can enlage the message space of the poposed encyption scheme fo m Z n 2 in such a way that c = e + mn mod n l. Suppose that we ae given a public key n, e, α) of the poposed encyption scheme and y = + α ) e mod n, whee Zn is pincipal. The Hensel-Recipocal poblem is to compute Y = + α ) e mod n l fom n, e, α, y) and l, whee Z n is pincipal and l is a positive intege. Then we can pove the following theoem See [KT03]). Theoem 3. The Hensel-Recipocal poblem is as had as geneal factoization fo any lifting index l 2. Poof. It is easy to see that we can solve the Hensel-Recipocal poblem if we can facto n. We will pove the convese. Suppose that thee exists a PPT algoithm which can solve the Hensel- Recipocal poblem with pobability ε fo some l 2. That is, the PPT algoithm can compute Y = ) + α e mod n l fom n, e, α, y) and l 2, whee Zn is pincipal. Then we can compute Y = ) + α e mod n 2. Now similaly to the poof of Lemma 4 and Theoem 2, we can facto n with pobability ε/2 in polynomial time. 6 Semantic Secuity of the Poposed Scheme In this section, we discuss the semantic secuity of the poposed scheme. Let n, e, α) be a public key of the poposed encyption scheme. 6.1 Semantic secuity Let SMALL RSAP n, e) = {n, e, x) x = e mod n 2, Z n } LARGE RSAP n, e) = {n, e, x) x = e mod n 2, Z n 2} Note that SMALL RSAP n, e) = n, and LARGE RSAP n, e) = n 2.

13 It is known that RSA-Paillie encyption scheme is IND-CPA if SMALL RSAP n, e) and LARGE RSAP n, e) ae indistinguishable [CGHN01]. We call it RSA-Paillie assumption. We now define SMALL RSAK n, e, α) and LARGE RSAK n, e, α) as follows. SMALL RSAK n, e, α) = {n, e, α, x) x = + α ) e mod n 2, Zn is pincipal} LARGE RSAK n, e, α) = {n, e, α, x) x = + α ) e mod n 2, Zn 2}. Note that SMALL RSAK n, e, α) = φn)/4, and LARGE RSAK n, e, α) = φn)n/4, because + α mod n2 is a 4 : 1 mapping. Theoem 4. The poposed encyption scheme is secue in the sense of IND- CPA if two distibutions SMALL RSAK n, e, α) and LARGE RSAK n, e, α) ae indistinguishable. We call the above indistinguishability Recipocal-Paillie assumption. A poof will be given in Appendix A. 6.2 Relationship with RSA-Paillie Assumption We investigate the elationship between RSA-Paillie assumption and Recipocal- Paillie assumption. We fist genealize SMALL RSAP and LARGE RSAP so that they include α. That is, let SMALL RSAP n, e, α) = {n, e, α, x) x = e mod n 2, Z n} LARGE RSAP n, e, α) = {n, e, α, x) x = e mod n 2, Z n 2} We then define modified RSA-Paillie assumption as follows: SMALL RSAP n, e, α) and LARGE RSAP n, e, α) ae indistinguishable. We next define ecipocal assumption as follows: SMALL RSAK n, e, α) and SMALL RSAP n, e, α) ae indistinguishable. Then we have the following coollay of Theoem 4. Coollay 1. The poposed encyption scheme is secue in the sense of IND- CPA if both modified RSA-Paillie assumption and the ecipocal assumption hold. Poof. We pove that LARGE RSAK n, e, α) and LARGE RSAP n, e, α) ae indistinguishable unde the ecipocal assumption. Let O be an oacle that distinguishes two distibutions LARGE RSAK n, e, α) and LARGE RSAP n, e, α). We constuct a distinguishe D which can distinguish between SMALL RSAK n, e, α) and SMALL RSAP n, e, α). Fo n, e, α, c), D chooses a andom s Z n, and computes c = c + ns mod n 2. Then it asks n, e, α, c ) to the oacle O. Because s

14 is andomly chosen in Z n, we can show that n, e, α, c ) is unifomly distibuted in eithe LARGE RSAK n, e, α) o LARGE RSAP n, e, α). Thus the oacle O can coectly distinguish between SMALL RSAK n, e, α) and SMALL RSAP n, e, α). Theefoe SMALL RSAK SMALL RSAP LARGE RSAP LARGE RSAK, whee means indistinguishable. This implies that Recipocal-Paillie assumption holds. 7 On Chosen Ciphetext Secuity Fo chosen ciphetext secuity, we can obtain a vaiant of ou encyption scheme as follows by applying the technique of [Poi99]. c = + α ) e + mn mod n 2 ) H, m) whee H is a andom hash function and denotes concatenation. In the andom oacle model, 1) this scheme is one-way against chosen ciphetext attacks unde the geneal factoing assumption. 2) It is also IND-CCA unde the assumption given in Sec.6. In the standad model, it still emains one-way and IND-CPA against chosen plaintext attacks. In geneal, we can pove the following theoem. Theoem 5. Let PE be an encyption scheme with ciphetexts c = E pk m, ). Suppose that 1) the set of belongs to BPP and 2) thee exists a decyption algoithm which outputs not only m but also. Fo PE, conside an encyption scheme PE such that c = E pk m, ) Hm, ). If PE is one-way against chosen plaintext attacks IND-CPA, esp.), then PE is one-way against chosen ciphetext attacks IND-CCA, esp.) in the andom oacle model. PE still emains one-way against chosen plaintext attacks IND- CPA, esp.) in the standad model. The details will be given in the final pape. Refeences [BDPR98] M. Bellae, A. Desai, D. Pointcheval, and P. Rogaway, Relations among Notions of Secuity fo Public-Key Encyption Schemes, CRYPTO 98, LNCS 1462, pp.26-45, [Bon01] D. Boneh, Simplified OAEP fo RSA and Rabin Functions, CRYPTO 2001, LNCS 2139, pp , [CGHN01] D. Catalano, R. Gennao, N. Howgave-Gaham, and P. Nguyen; Paillie s cyptosystem evisited, The 8th ACM confeence on Compute and Communication Secuity, pp , 2001.

15 [CNS02] D. Catalano, P. Nguyen, and J. Sten, The Hadness of Hensel Lifting: The Case of RSA and Discete Logaithm, ASIACRYPT 2002, LNCS 2501, pp , [Cop96] D. Coppesmith, Finding a Small Root of a Univaiate Modula Equation, EUROCRYPT 96, LNCS 1070, pp , [CS98] R. Came and V. Shoup, A Pactical Public-Key Cyptosystem Povably Secue against Adaptive Chosen Ciphetext Attacks, CRYPTO 98, LNCS 1462, pp.13-25, [CS02] R. Came and V. Shoup, Univesal Hash Poofs and a Paadigm fo Adaptive Chosen Ciphetext Secue Public-Key Encyption, EUROCRYPT 2002, LNCS 2332, pp.45-64, [FOPS01] E. Fujisaki, T. Okamoto, D. Pointcheval, and J. Sten, RSA-OAEP is Secue unde the RSA Assumption, CRYPTO 2001, LNCS 2139, pp , [GMMV03] D. Galindo, S. Molleví, P. Moillo, J. Villa, A Pactical Public Key Cyptosystem fom Paillie and Rabin Schemes, PKC 2003, LNCS 2567, pp , [Gol01] O. Goldeich, Foundations of Cyptogaphy: Basic Tools, Cambidge Univesity Pess, [KIT88] K. Kuosawa, T. Itoh, M. Takeuchi, Public Key Cyptosystem using a Recipocal Numbe with the Same Intactability as Factoing a Lage Numbe, CRYP- TOLOGIA, XII, pp , [KT03] K. Kuosawa and T. Takagi, Some RSA-based Encyption Schemes with Tight Secuity Reduction, A long vesion of this pape, IACR epint achive, 2003/157, available fom [KOMM01] K. Kuosawa, W. Ogata, T. Matsuo, S. Makishima, IND-CCA Public Key Schemes Equivalent to Factoing n=pq, PKC 2001, LNCS 1992, pp36-47, [OU98] T.Okamoto and S.Uchiyama, A New Public Key Cyptosystem as Secue as Factoing, Euocypt 98, LNCS 1403, pp , 1998/ [Poi99] D.Pointcheval, New Public Key Cyptosystems based on the Dependent-RSA Poblems, Euocypt 99, LNCS 1592, pp , [ST02] K. Sakuai, T. Takagi, New Semantically Secue Public-Key Cyptosystems fom the RSA-Pimitive, PKC 2002, LNCS 2274, pp.1-16, [Sho01] V. Shoup, OAEP Reconsideed, CRYPTO 2001, LNCS 2139, pp , [Tak97] T. Takagi, Fast RSA-Type Cyptosystems using N-adic Expansion, CRYPTO 97, LNCS 1294, pp , A Semantic Secuity of the Poposed Scheme A.1 Basic Result Let ZEROn, e, α) be the set of ciphetexts fo m = 0 and ALLn, e, α) be the set of ciphetexts fo all m Z n. That is, ZEROn, e, α) = { + α ) e mod n 2 Zn is pincipal} ALLn, e, α) = { + α ) e + mn mod n 2 m Z n and Zn is pincipal}.

16 Define Recipocal 0 n, e, α) = {n, e, α, x) x ZEROn, e, α)} Recipocal ALL n, e, α) = {n, e, α, x) x ALLn, e, α)} Note that we have Recipocal 0 n, e, α) = SMALL RSAK n, e, α) fom thei definition. Theoem 6. The poposed encyption scheme is secue in the sense of IND- CPA if and only if Recipocal 0 n, e, α) and Recipocal ALL n, e, α) ae indistinguishable. Poof. Suppose that thee exists an advesay B = B 1, B 2 ) which beaks ou encyption scheme in the sense of IND-CPA, whee B 1 woks in the find stage and B 2 woks in the guess stage. We will show a distinguishe D which can distinguish between two distibutions Recipocal 0 n, e, α) and Recipocal ALL n, e, α). Let n, e, α, x) be the input to D, whee x ZEROn, e, α) o x ALLn, e, α). 1. D gives pk = n, e, α) to B Then B 1 outputs m 0, m 1, state). 3. D chooses a bit b andomly and computes c b = x + m b n mod n 2. D gives c b, state) to B B 2 outputs a bit b. 5. D outputs 0 if b = b. Othewise, D outputs 1. Let P 0 denote the pobability that D = 0 fo x ZEROn, e, α) and P ALL denote the pobability that D = 0 fo x ALLn, e, α). Now if x ALLn, e, α), then c b is unifomly distibuted ove ALLn, e, α) fo both b = 0 and 1. Theefoe, it is clea that P ALL = 1/2. On the othe hand, if x ZEROn, e, α), then c b is a valid ciphetext of m b. Theefoe, fom ou assumption and fom Def.2, we obtain that is non-negligible. Hence P 0 1/2 = P b = b) 1/2 P 0 P ALL is non-negligible because P ALL = 1/2. This means that D can distinguish between Recipocal 0 n, e, α) and Recipocal ALL n, e, α). Next suppose that thee exists a distinguishe D which is able to distinguish between Recipocal 0 n, e, α) and Recipocal ALL n, e, α). We will show an advesay B = B 1, B 2 ) which beaks ou encyption scheme in the sense of

17 IND-CPA, whee B 1 woks in the find stage and B 2 woks in the guess stage. On input pk = n, e, α), B 1 outputs m 0 = 0 and m 1 Z n, whee m 1 is andomly chosen fom Z n. Fo a given ciphetext c b, B 2 gives n, e, α, c b ) to D, whee c b is a ciphetext of m b. Note that c 0 is andomly chosen fom ZEROn, e, α) and c 1 is andomly chosen fom ALLn, e, α). Theefoe, D can distinguish them fom ou assumption. Hence B 2 can distinguish them. A.2 Extended Result Lemma 5. Recipocal ALL n, e, α) = LARGE RSAK n, e, α). Poof. Fist suppose that n, e, α, c) LARGE RSAK n, e, α). Then c = + α ) e mod n 2 fo some Zn. Decypt c by ou decyption algoithm. Then we can find 2 m Z n and a pincipal Zn such that c = + α ) e + mn mod n 2. Theefoe n, e, α, c) Recipocal ALL n, e, α). This means that LARGE RSAK n, e, α) Recipocal ALL n, e, α). Next suppose that n, e, α, c) Recipocal ALL n, e, α). Then c = + α ) e + mn mod n 2 fo some m Z n and a pincipal Zn. We will show that thee exists u Zn 2 such that c = u + α ) e mod n 2 15) u and u mod n is pincipal. The above equation holds if and only if whee ed = 1 mod φn)n. Fo y p such that u 2 c d u + α = 0 mod n 2, 16) 2 c d + α) + py p 2 c d ) = 0 mod p 2, let u p = + py p mod p 2. Then it is easy to see that Similaly fo y q such that u 2 p c d u p + α = 0 mod p 2. 2 c d + α) + qy q 2 c d ) = 0 mod q 2,

18 let u q = + qy q mod q 2. Then Now conside u such that u 2 q c d u q + α = 0 mod p 2. u = u p mod p 2, u = u q mod q 2. Then u satisfies eq.16). Theefoe u satisfies eq.15). This means that c LARGE RSAK n, e, α). Hence Consequaently A.3 Poof of Theoem 4 Recipocal ALL n, e, α) LARGE RSAK n, e, α). LARGE RSAK n, e, α) = Recipocal ALL n, e, α). Fom Theoem 6 and Lemma 5, the poposed encyption scheme is IND-CPA if if Recipocal 0 n, e, α) and LARGE RSAK n, e, α) ae indistinguishable. Fom the definition we have Recipocal 0 n, e, α) = SMALL RSAK n, e, α). B Flaw on the Semantic Secuity of Rabin-Paillie Let SMALL QR n, e) = {n, e, x) x = 2e mod n 2, Q n } LARGE QR n, e) = {n, e, x) x = 2e mod n 2, Q n 2} Rabin-Paillie encyption scheme is IND-CPA if and only if SMALL QR n, e) and LARGE QR n, e) ae indistinguishable [GMMV03, Poposition 9]. Galindo et al. futhe claimed that SMALL QR n, e) and LARGE QR n, e) ae indistinguishable if SMALL RSAP n, e) and LARGE RSAP n, e) ae indistinguishable RSA-Paillie is IND-CPA unde this condition) and QRn) and QN Rn, +) ae indistinguishable, whee QRn) = {n, x) x Q n } { QNRn, +) = x n, x) x Zn, n) } = 1 in [GMMV03, Poposition 11]. Howeve, this claim is wong. In the poof, they say that D 1 and D 2 ae indistinguishable, whee D 1 = {x x = e mod n 2, Q n } D 2 = {x x = e mod n 2, Z n}. Howeve, we can distinguish them easily by computing x n).

Secret Exponent Attacks on RSA-type Schemes with Moduli N = p r q

Secret Exponent Attacks on RSA-type Schemes with Moduli N = p r q Secet Exponent Attacks on RSA-type Schemes with Moduli N = p q Alexande May Faculty of Compute Science, Electical Engineeing and Mathematics Univesity of Padebon 33102 Padebon, Gemany alexx@uni-padebon.de

More information

9.1 The multiplicative group of a finite field. Theorem 9.1. The multiplicative group F of a finite field is cyclic.

9.1 The multiplicative group of a finite field. Theorem 9.1. The multiplicative group F of a finite field is cyclic. Chapte 9 Pimitive Roots 9.1 The multiplicative goup of a finite fld Theoem 9.1. The multiplicative goup F of a finite fld is cyclic. Remak: In paticula, if p is a pime then (Z/p) is cyclic. In fact, this

More information

Provable Security in Cryptography

Provable Security in Cryptography Povable Secuity in Cyptogaphy Thomas Baignèes EPFL http://lasecwww.epfl.ch May 29, 2007 (ve. 25) These lectue notes ae a compilation of some of my eadings while I was pepaing two lectues given at EPFL

More information

New Finding on Factoring Prime Power RSA Modulus N = p r q

New Finding on Factoring Prime Power RSA Modulus N = p r q Jounal of Mathematical Reseach with Applications Jul., 207, Vol. 37, o. 4, pp. 404 48 DOI:0.3770/j.issn:2095-265.207.04.003 Http://jme.dlut.edu.cn ew Finding on Factoing Pime Powe RSA Modulus = p q Sadiq

More information

10/04/18. P [P(x)] 1 negl(n).

10/04/18. P [P(x)] 1 negl(n). Mastemath, Sping 208 Into to Lattice lgs & Cypto Lectue 0 0/04/8 Lectues: D. Dadush, L. Ducas Scibe: K. de Boe Intoduction In this lectue, we will teat two main pats. Duing the fist pat we continue the

More information

Lecture 25: Pairing Based Cryptography

Lecture 25: Pairing Based Cryptography 6.897 Special Topics in Cyptogaphy Instucto: Ran Canetti May 5, 2004 Lectue 25: Paiing Based Cyptogaphy Scibe: Ben Adida 1 Intoduction The field of Paiing Based Cyptogaphy has exploded ove the past 3 yeas

More information

Stanford University CS259Q: Quantum Computing Handout 8 Luca Trevisan October 18, 2012

Stanford University CS259Q: Quantum Computing Handout 8 Luca Trevisan October 18, 2012 Stanfod Univesity CS59Q: Quantum Computing Handout 8 Luca Tevisan Octobe 8, 0 Lectue 8 In which we use the quantum Fouie tansfom to solve the peiod-finding poblem. The Peiod Finding Poblem Let f : {0,...,

More information

AQI: Advanced Quantum Information Lecture 2 (Module 4): Order finding and factoring algorithms February 20, 2013

AQI: Advanced Quantum Information Lecture 2 (Module 4): Order finding and factoring algorithms February 20, 2013 AQI: Advanced Quantum Infomation Lectue 2 (Module 4): Ode finding and factoing algoithms Febuay 20, 203 Lectue: D. Mak Tame (email: m.tame@impeial.ac.uk) Intoduction In the last lectue we looked at the

More information

Cryptography. Lecture 11. Arpita Patra

Cryptography. Lecture 11. Arpita Patra Cptogaph Lectue Apita Pata Geneic Results in PK Wold CPA Secuit CCA Secuit Bit Encption Man-bit Encption Bit Encption Man-Bit Encption Π CPA-secue KEM Π SKE COA-secue SKE Π Hb CPA-secue Π CCA-secue KEM

More information

Multiple Criteria Secretary Problem: A New Approach

Multiple Criteria Secretary Problem: A New Approach J. Stat. Appl. Po. 3, o., 9-38 (04 9 Jounal of Statistics Applications & Pobability An Intenational Jounal http://dx.doi.og/0.785/jsap/0303 Multiple Citeia Secetay Poblem: A ew Appoach Alaka Padhye, and

More information

Probablistically Checkable Proofs

Probablistically Checkable Proofs Lectue 12 Pobablistically Checkable Poofs May 13, 2004 Lectue: Paul Beame Notes: Chis Re 12.1 Pobablisitically Checkable Poofs Oveview We know that IP = PSPACE. This means thee is an inteactive potocol

More information

Chapter 3: Theory of Modular Arithmetic 38

Chapter 3: Theory of Modular Arithmetic 38 Chapte 3: Theoy of Modula Aithmetic 38 Section D Chinese Remainde Theoem By the end of this section you will be able to pove the Chinese Remainde Theoem apply this theoem to solve simultaneous linea conguences

More information

C/CS/Phys C191 Shor s order (period) finding algorithm and factoring 11/12/14 Fall 2014 Lecture 22

C/CS/Phys C191 Shor s order (period) finding algorithm and factoring 11/12/14 Fall 2014 Lecture 22 C/CS/Phys C9 Sho s ode (peiod) finding algoithm and factoing /2/4 Fall 204 Lectue 22 With a fast algoithm fo the uantum Fouie Tansfom in hand, it is clea that many useful applications should be possible.

More information

Concurrent Blind Signatures without Random Oracles

Concurrent Blind Signatures without Random Oracles Concuent Blind Signatues without Random Oacles Aggelos Kiayias Hong-Sheng Zhou Abstact We pesent a blind signatue scheme that is efficient and povably secue without andom oacles unde concuent attacks utilizing

More information

ANA BERRIZBEITIA, LUIS A. MEDINA, ALEXANDER C. MOLL, VICTOR H. MOLL, AND LAINE NOBLE

ANA BERRIZBEITIA, LUIS A. MEDINA, ALEXANDER C. MOLL, VICTOR H. MOLL, AND LAINE NOBLE THE p-adic VALUATION OF STIRLING NUMBERS ANA BERRIZBEITIA, LUIS A. MEDINA, ALEXANDER C. MOLL, VICTOR H. MOLL, AND LAINE NOBLE Abstact. Let p > 2 be a pime. The p-adic valuation of Stiling numbes of the

More information

Improved Factoring Attacks on Multi-Prime RSA with Small Prime Difference

Improved Factoring Attacks on Multi-Prime RSA with Small Prime Difference Impoved Factoing Attacks on Multi-Pime RSA with Small Pime Diffeence Mengce Zheng 1,2, Nobou Kunihio 2, and Honggang Hu 1 1 Univesity of Science and Technology of China, China mengce.zheng@gmail.com 2

More information

Fixed Argument Pairing Inversion on Elliptic Curves

Fixed Argument Pairing Inversion on Elliptic Curves Fixed Agument Paiing Invesion on Elliptic Cuves Sungwook Kim and Jung Hee Cheon ISaC & Dept. of Mathematical Sciences Seoul National Univesity Seoul, Koea {avell7,jhcheon}@snu.ac.k Abstact. Let E be an

More information

Overcoming Weak Expectations

Overcoming Weak Expectations Ovecoming Weak Expectations Yevgeniy Dodis Depatment of Compute Science New Yok Univesity Email: dodis@cs.nyu.edu (Invited Pape) Yu Yu Institute fo Intedisciplinay Infomation Sciences Tsinghua Univesity,

More information

Pearson s Chi-Square Test Modifications for Comparison of Unweighted and Weighted Histograms and Two Weighted Histograms

Pearson s Chi-Square Test Modifications for Comparison of Unweighted and Weighted Histograms and Two Weighted Histograms Peason s Chi-Squae Test Modifications fo Compaison of Unweighted and Weighted Histogams and Two Weighted Histogams Univesity of Akueyi, Bogi, v/noduslód, IS-6 Akueyi, Iceland E-mail: nikolai@unak.is Two

More information

arxiv: v1 [math.co] 1 Apr 2011

arxiv: v1 [math.co] 1 Apr 2011 Weight enumeation of codes fom finite spaces Relinde Juius Octobe 23, 2018 axiv:1104.0172v1 [math.co] 1 Ap 2011 Abstact We study the genealized and extended weight enumeato of the - ay Simplex code and

More information

Surveillance Points in High Dimensional Spaces

Surveillance Points in High Dimensional Spaces Société de Calcul Mathématique SA Tools fo decision help since 995 Suveillance Points in High Dimensional Spaces by Benad Beauzamy Januay 06 Abstact Let us conside any compute softwae, elying upon a lage

More information

Method for Approximating Irrational Numbers

Method for Approximating Irrational Numbers Method fo Appoximating Iational Numbes Eic Reichwein Depatment of Physics Univesity of Califonia, Santa Cuz June 6, 0 Abstact I will put foth an algoithm fo poducing inceasingly accuate ational appoximations

More information

Construction and Analysis of Boolean Functions of 2t + 1 Variables with Maximum Algebraic Immunity

Construction and Analysis of Boolean Functions of 2t + 1 Variables with Maximum Algebraic Immunity Constuction and Analysis of Boolean Functions of 2t + 1 Vaiables with Maximum Algebaic Immunity Na Li and Wen-Feng Qi Depatment of Applied Mathematics, Zhengzhou Infomation Engineeing Univesity, Zhengzhou,

More information

ON INDEPENDENT SETS IN PURELY ATOMIC PROBABILITY SPACES WITH GEOMETRIC DISTRIBUTION. 1. Introduction. 1 r r. r k for every set E A, E \ {0},

ON INDEPENDENT SETS IN PURELY ATOMIC PROBABILITY SPACES WITH GEOMETRIC DISTRIBUTION. 1. Introduction. 1 r r. r k for every set E A, E \ {0}, ON INDEPENDENT SETS IN PURELY ATOMIC PROBABILITY SPACES WITH GEOMETRIC DISTRIBUTION E. J. IONASCU and A. A. STANCU Abstact. We ae inteested in constucting concete independent events in puely atomic pobability

More information

QIP Course 10: Quantum Factorization Algorithm (Part 3)

QIP Course 10: Quantum Factorization Algorithm (Part 3) QIP Couse 10: Quantum Factoization Algoithm (Pat 3 Ryutaoh Matsumoto Nagoya Univesity, Japan Send you comments to yutaoh.matsumoto@nagoya-u.jp Septembe 2018 @ Tokyo Tech. Matsumoto (Nagoya U. QIP Couse

More information

Lecture 18: Graph Isomorphisms

Lecture 18: Graph Isomorphisms INFR11102: Computational Complexity 22/11/2018 Lectue: Heng Guo Lectue 18: Gaph Isomophisms 1 An Athu-Melin potocol fo GNI Last time we gave a simple inteactive potocol fo GNI with pivate coins. We will

More information

Vanishing lines in generalized Adams spectral sequences are generic

Vanishing lines in generalized Adams spectral sequences are generic ISSN 364-0380 (on line) 465-3060 (pinted) 55 Geomety & Topology Volume 3 (999) 55 65 Published: 2 July 999 G G G G T T T G T T T G T G T GG TT G G G G GG T T T TT Vanishing lines in genealized Adams spectal

More information

New problems in universal algebraic geometry illustrated by boolean equations

New problems in universal algebraic geometry illustrated by boolean equations New poblems in univesal algebaic geomety illustated by boolean equations axiv:1611.00152v2 [math.ra] 25 Nov 2016 Atem N. Shevlyakov Novembe 28, 2016 Abstact We discuss new poblems in univesal algebaic

More information

Functions Defined on Fuzzy Real Numbers According to Zadeh s Extension

Functions Defined on Fuzzy Real Numbers According to Zadeh s Extension Intenational Mathematical Foum, 3, 2008, no. 16, 763-776 Functions Defined on Fuzzy Real Numbes Accoding to Zadeh s Extension Oma A. AbuAaqob, Nabil T. Shawagfeh and Oma A. AbuGhneim 1 Mathematics Depatment,

More information

The Substring Search Problem

The Substring Search Problem The Substing Seach Poblem One algoithm which is used in a vaiety of applications is the family of substing seach algoithms. These algoithms allow a use to detemine if, given two chaacte stings, one is

More information

Cryptography. Primitives and Protocols. Aggelos Kiayias

Cryptography. Primitives and Protocols. Aggelos Kiayias P1 P2 P3 E E E IV C1 C2 C3 Aggelos Kiayias Cyptogaphy Pimitives and Potocols Based on notes by G. Panagiotakos, S. Pehlivanoglu, J. Todd, K. Samai, T. Zachaias and H.S. Zhou CONTENTS 1 Contents 1 Intoduction

More information

A Bijective Approach to the Permutational Power of a Priority Queue

A Bijective Approach to the Permutational Power of a Priority Queue A Bijective Appoach to the Pemutational Powe of a Pioity Queue Ia M. Gessel Kuang-Yeh Wang Depatment of Mathematics Bandeis Univesity Waltham, MA 02254-9110 Abstact A pioity queue tansfoms an input pemutation

More information

Lecture 28: Convergence of Random Variables and Related Theorems

Lecture 28: Convergence of Random Variables and Related Theorems EE50: Pobability Foundations fo Electical Enginees July-Novembe 205 Lectue 28: Convegence of Random Vaiables and Related Theoems Lectue:. Kishna Jagannathan Scibe: Gopal, Sudhasan, Ajay, Swamy, Kolla An

More information

Design and Analysis of Password-Based Key Derivation Functions

Design and Analysis of Password-Based Key Derivation Functions Design and Analysis of Passwod-Based Key Deivation Functions 245 Fances F. Yao 1 and Yiqun Lisa Yin 2 1 Depatment of Compute Science, City Univesity of Hong Kong, Kowloon, Hong Kong csfyao@cityu.edu.hk

More information

ON THE INVERSE SIGNED TOTAL DOMINATION NUMBER IN GRAPHS. D.A. Mojdeh and B. Samadi

ON THE INVERSE SIGNED TOTAL DOMINATION NUMBER IN GRAPHS. D.A. Mojdeh and B. Samadi Opuscula Math. 37, no. 3 (017), 447 456 http://dx.doi.og/10.7494/opmath.017.37.3.447 Opuscula Mathematica ON THE INVERSE SIGNED TOTAL DOMINATION NUMBER IN GRAPHS D.A. Mojdeh and B. Samadi Communicated

More information

Using Laplace Transform to Evaluate Improper Integrals Chii-Huei Yu

Using Laplace Transform to Evaluate Improper Integrals Chii-Huei Yu Available at https://edupediapublicationsog/jounals Volume 3 Issue 4 Febuay 216 Using Laplace Tansfom to Evaluate Impope Integals Chii-Huei Yu Depatment of Infomation Technology, Nan Jeon Univesity of

More information

E E E. Aggelos Kiayias. Cryptography. Primitives and Protocols. Based on notes by S. Pehlivanoglu, J. Todd, K. Samari, T. Zacharias and H.S.

E E E. Aggelos Kiayias. Cryptography. Primitives and Protocols. Based on notes by S. Pehlivanoglu, J. Todd, K. Samari, T. Zacharias and H.S. P1 P2 P3 E E E IV C1 C2 C3 Aggelos Kiayias Cyptogaphy Pimitives and Potocols Based on notes by S. Pehlivanoglu, J. Todd, K. Samai, T. Zachaias and H.S. Zhou CONTENTS 1 Contents 1 Intoduction 4 1.1 Flipping

More information

Design and Analysis of Password-Based Key Derivation Functions

Design and Analysis of Password-Based Key Derivation Functions Design and Analysis of Passwod-Based Key Deivation Functions Fances F. Yao 1 and Yiqun Lisa Yin 2 1 Depatment of Compute Science City Univesity of Hong Kong Kowloon, Hong Kong Email: csfyao@cityu.edu.hk

More information

CALCULATING THE NUMBER OF TWIN PRIMES WITH SPECIFIED DISTANCE BETWEEN THEM BASED ON THE SIMPLEST PROBABILISTIC MODEL

CALCULATING THE NUMBER OF TWIN PRIMES WITH SPECIFIED DISTANCE BETWEEN THEM BASED ON THE SIMPLEST PROBABILISTIC MODEL U.P.B. Sci. Bull. Seies A, Vol. 80, Iss.3, 018 ISSN 13-707 CALCULATING THE NUMBER OF TWIN PRIMES WITH SPECIFIED DISTANCE BETWEEN THEM BASED ON THE SIMPLEST PROBABILISTIC MODEL Sasengali ABDYMANAPOV 1,

More information

The Iterated Random Function Problem,

The Iterated Random Function Problem, The Iteated Random Function Poblem, Ritam Bhaumik 1, ilanjan Datta 2, Avijit Dutta 1, icky Mouha 3,4, and Midul andi 1 1 Indian Statistical Institute, Kolkata, India. 2 Indian Institute of Technology,

More information

On the ratio of maximum and minimum degree in maximal intersecting families

On the ratio of maximum and minimum degree in maximal intersecting families On the atio of maximum and minimum degee in maximal intesecting families Zoltán Lóánt Nagy Lale Özkahya Balázs Patkós Máté Vize Septembe 5, 011 Abstact To study how balanced o unbalanced a maximal intesecting

More information

Lifting Private Information Retrieval from Two to any Number of Messages

Lifting Private Information Retrieval from Two to any Number of Messages Lifting Pivate Infomation Retieval fom Two to any umbe of Messages Rafael G.L. D Oliveia, Salim El Rouayheb ECE, Rutges Univesity, Piscataway, J Emails: d746@scaletmail.utges.edu, salim.elouayheb@utges.edu

More information

On the Poisson Approximation to the Negative Hypergeometric Distribution

On the Poisson Approximation to the Negative Hypergeometric Distribution BULLETIN of the Malaysian Mathematical Sciences Society http://mathusmmy/bulletin Bull Malays Math Sci Soc (2) 34(2) (2011), 331 336 On the Poisson Appoximation to the Negative Hypegeometic Distibution

More information

E E E. Aggelos Kiayias. Cryptography. Primitives and Protocols. Notes by S. Pehlivanoglu, J. Todd, and H.S. Zhou

E E E. Aggelos Kiayias. Cryptography. Primitives and Protocols. Notes by S. Pehlivanoglu, J. Todd, and H.S. Zhou P1 P2 P3 E E E IV C1 C2 C3 Aggelos Kiayias Cyptogaphy Pimitives and Potocols Notes by S. Pehlivanoglu, J. Todd, and H.S. Zhou CONTENTS 1 Contents 2 1 Intoduction To begin discussing the basic popeties

More information

arxiv: v1 [math.co] 4 May 2017

arxiv: v1 [math.co] 4 May 2017 On The Numbe Of Unlabeled Bipatite Gaphs Abdullah Atmaca and A Yavuz Ouç axiv:7050800v [mathco] 4 May 207 Abstact This pape solves a poblem that was stated by M A Haison in 973 [] This poblem, that has

More information

Syntactical content of nite approximations of partial algebras 1 Wiktor Bartol Inst. Matematyki, Uniw. Warszawski, Warszawa (Poland)

Syntactical content of nite approximations of partial algebras 1 Wiktor Bartol Inst. Matematyki, Uniw. Warszawski, Warszawa (Poland) Syntactical content of nite appoximations of patial algebas 1 Wikto Batol Inst. Matematyki, Uniw. Waszawski, 02-097 Waszawa (Poland) batol@mimuw.edu.pl Xavie Caicedo Dep. Matematicas, Univ. de los Andes,

More information

ONE-POINT CODES USING PLACES OF HIGHER DEGREE

ONE-POINT CODES USING PLACES OF HIGHER DEGREE ONE-POINT CODES USING PLACES OF HIGHER DEGREE GRETCHEN L. MATTHEWS AND TODD W. MICHEL DEPARTMENT OF MATHEMATICAL SCIENCES CLEMSON UNIVERSITY CLEMSON, SC 29634-0975 U.S.A. E-MAIL: GMATTHE@CLEMSON.EDU, TMICHEL@CLEMSON.EDU

More information

16 Modeling a Language by a Markov Process

16 Modeling a Language by a Markov Process K. Pommeening, Language Statistics 80 16 Modeling a Language by a Makov Pocess Fo deiving theoetical esults a common model of language is the intepetation of texts as esults of Makov pocesses. This model

More information

On the ratio of maximum and minimum degree in maximal intersecting families

On the ratio of maximum and minimum degree in maximal intersecting families On the atio of maximum and minimum degee in maximal intesecting families Zoltán Lóánt Nagy Lale Özkahya Balázs Patkós Máté Vize Mach 6, 013 Abstact To study how balanced o unbalanced a maximal intesecting

More information

Relating Branching Program Size and. Formula Size over the Full Binary Basis. FB Informatik, LS II, Univ. Dortmund, Dortmund, Germany

Relating Branching Program Size and. Formula Size over the Full Binary Basis. FB Informatik, LS II, Univ. Dortmund, Dortmund, Germany Relating Banching Pogam Size and omula Size ove the ull Binay Basis Matin Saueho y Ingo Wegene y Ralph Wechne z y B Infomatik, LS II, Univ. Dotmund, 44 Dotmund, Gemany z ankfut, Gemany sauehof/wegene@ls.cs.uni-dotmund.de

More information

3.1 Random variables

3.1 Random variables 3 Chapte III Random Vaiables 3 Random vaiables A sample space S may be difficult to descibe if the elements of S ae not numbes discuss how we can use a ule by which an element s of S may be associated

More information

( ) [ ] [ ] [ ] δf φ = F φ+δφ F. xdx.

( ) [ ] [ ] [ ] δf φ = F φ+δφ F. xdx. 9. LAGRANGIAN OF THE ELECTROMAGNETIC FIELD In the pevious section the Lagangian and Hamiltonian of an ensemble of point paticles was developed. This appoach is based on a qt. This discete fomulation can

More information

Goodness-of-fit for composite hypotheses.

Goodness-of-fit for composite hypotheses. Section 11 Goodness-of-fit fo composite hypotheses. Example. Let us conside a Matlab example. Let us geneate 50 obsevations fom N(1, 2): X=nomnd(1,2,50,1); Then, unning a chi-squaed goodness-of-fit test

More information

Solution to HW 3, Ma 1a Fall 2016

Solution to HW 3, Ma 1a Fall 2016 Solution to HW 3, Ma a Fall 206 Section 2. Execise 2: Let C be a subset of the eal numbes consisting of those eal numbes x having the popety that evey digit in the decimal expansion of x is, 3, 5, o 7.

More information

NOTE. Some New Bounds for Cover-Free Families

NOTE. Some New Bounds for Cover-Free Families Jounal of Combinatoial Theoy, Seies A 90, 224234 (2000) doi:10.1006jcta.1999.3036, available online at http:.idealibay.com on NOTE Some Ne Bounds fo Cove-Fee Families D. R. Stinson 1 and R. Wei Depatment

More information

Localization of Eigenvalues in Small Specified Regions of Complex Plane by State Feedback Matrix

Localization of Eigenvalues in Small Specified Regions of Complex Plane by State Feedback Matrix Jounal of Sciences, Islamic Republic of Ian (): - () Univesity of Tehan, ISSN - http://sciencesutaci Localization of Eigenvalues in Small Specified Regions of Complex Plane by State Feedback Matix H Ahsani

More information

THE NUMBER OF TWO CONSECUTIVE SUCCESSES IN A HOPPE-PÓLYA URN

THE NUMBER OF TWO CONSECUTIVE SUCCESSES IN A HOPPE-PÓLYA URN TH NUMBR OF TWO CONSCUTIV SUCCSSS IN A HOPP-PÓLYA URN LARS HOLST Depatment of Mathematics, Royal Institute of Technology S 100 44 Stocholm, Sweden -mail: lholst@math.th.se Novembe 27, 2007 Abstact In a

More information

Markscheme May 2017 Calculus Higher level Paper 3

Markscheme May 2017 Calculus Higher level Paper 3 M7/5/MATHL/HP3/ENG/TZ0/SE/M Makscheme May 07 Calculus Highe level Pape 3 pages M7/5/MATHL/HP3/ENG/TZ0/SE/M This makscheme is the popety of the Intenational Baccalaueate and must not be epoduced o distibuted

More information

On the Quasi-inverse of a Non-square Matrix: An Infinite Solution

On the Quasi-inverse of a Non-square Matrix: An Infinite Solution Applied Mathematical Sciences, Vol 11, 2017, no 27, 1337-1351 HIKARI Ltd, wwwm-hikaicom https://doiog/1012988/ams20177273 On the Quasi-invese of a Non-squae Matix: An Infinite Solution Ruben D Codeo J

More information

Information Retrieval Advanced IR models. Luca Bondi

Information Retrieval Advanced IR models. Luca Bondi Advanced IR models Luca Bondi Advanced IR models 2 (LSI) Pobabilistic Latent Semantic Analysis (plsa) Vecto Space Model 3 Stating point: Vecto Space Model Documents and queies epesented as vectos in the

More information

A Multivariate Normal Law for Turing s Formulae

A Multivariate Normal Law for Turing s Formulae A Multivaiate Nomal Law fo Tuing s Fomulae Zhiyi Zhang Depatment of Mathematics and Statistics Univesity of Noth Caolina at Chalotte Chalotte, NC 28223 Abstact This pape establishes a sufficient condition

More information

6 PROBABILITY GENERATING FUNCTIONS

6 PROBABILITY GENERATING FUNCTIONS 6 PROBABILITY GENERATING FUNCTIONS Cetain deivations pesented in this couse have been somewhat heavy on algeba. Fo example, detemining the expectation of the Binomial distibution (page 5.1 tuned out to

More information

Failure Probability of 2-within-Consecutive-(2, 2)-out-of-(n, m): F System for Special Values of m

Failure Probability of 2-within-Consecutive-(2, 2)-out-of-(n, m): F System for Special Values of m Jounal of Mathematics and Statistics 5 (): 0-4, 009 ISSN 549-3644 009 Science Publications Failue Pobability of -within-consecutive-(, )-out-of-(n, m): F System fo Special Values of m E.M.E.. Sayed Depatment

More information

Encapsulation theory: the transformation equations of absolute information hiding.

Encapsulation theory: the transformation equations of absolute information hiding. 1 Encapsulation theoy: the tansfomation equations of absolute infomation hiding. Edmund Kiwan * www.edmundkiwan.com Abstact This pape descibes how the potential coupling of a set vaies as the set is tansfomed,

More information

Enumerating permutation polynomials

Enumerating permutation polynomials Enumeating pemutation polynomials Theodoulos Gaefalakis a,1, Giogos Kapetanakis a,, a Depatment of Mathematics and Applied Mathematics, Univesity of Cete, 70013 Heaklion, Geece Abstact We conside thoblem

More information

Encapsulation theory: radial encapsulation. Edmund Kirwan *

Encapsulation theory: radial encapsulation. Edmund Kirwan * Encapsulation theoy: adial encapsulation. Edmund Kiwan * www.edmundkiwan.com Abstact This pape intoduces the concept of adial encapsulation, wheeby dependencies ae constained to act fom subsets towads

More information

When two numbers are written as the product of their prime factors, they are in factored form.

When two numbers are written as the product of their prime factors, they are in factored form. 10 1 Study Guide Pages 420 425 Factos Because 3 4 12, we say that 3 and 4 ae factos of 12. In othe wods, factos ae the numbes you multiply to get a poduct. Since 2 6 12, 2 and 6 ae also factos of 12. The

More information

Journal of Inequalities in Pure and Applied Mathematics

Journal of Inequalities in Pure and Applied Mathematics Jounal of Inequalities in Pue and Applied Mathematics COEFFICIENT INEQUALITY FOR A FUNCTION WHOSE DERIVATIVE HAS A POSITIVE REAL PART S. ABRAMOVICH, M. KLARIČIĆ BAKULA AND S. BANIĆ Depatment of Mathematics

More information

1. INTRODUCTION FAST ELLIPTIC CURVE CRYPTOGRAPHY USING OPTIMAL DOUBLE-BASE CHAINS

1. INTRODUCTION FAST ELLIPTIC CURVE CRYPTOGRAPHY USING OPTIMAL DOUBLE-BASE CHAINS FAST ELLIPTIC CURVE CRYPTOGRAPHY USING OPTIMAL DOUBLE-BASE CHAINS Voapong Suppakitpaisan, Hioshi Imai Gaduate School of Infomation Science and Technology, The Univesity of Tokyo Tokyo, Japan 11-00 m t

More information

6 Matrix Concentration Bounds

6 Matrix Concentration Bounds 6 Matix Concentation Bounds Concentation bounds ae inequalities that bound pobabilities of deviations by a andom vaiable fom some value, often its mean. Infomally, they show the pobability that a andom

More information

On Polynomials Construction

On Polynomials Construction Intenational Jounal of Mathematical Analysis Vol., 08, no. 6, 5-57 HIKARI Ltd, www.m-hikai.com https://doi.og/0.988/ima.08.843 On Polynomials Constuction E. O. Adeyefa Depatment of Mathematics, Fedeal

More information

Quasi-Randomness and the Distribution of Copies of a Fixed Graph

Quasi-Randomness and the Distribution of Copies of a Fixed Graph Quasi-Randomness and the Distibution of Copies of a Fixed Gaph Asaf Shapia Abstact We show that if a gaph G has the popety that all subsets of vetices of size n/4 contain the coect numbe of tiangles one

More information

Fall 2014 Randomized Algorithms Oct 8, Lecture 3

Fall 2014 Randomized Algorithms Oct 8, Lecture 3 Fall 204 Randomized Algoithms Oct 8, 204 Lectue 3 Pof. Fiedich Eisenband Scibes: Floian Tamè In this lectue we will be concened with linea pogamming, in paticula Clakson s Las Vegas algoithm []. The main

More information

Auchmuty High School Mathematics Department Advanced Higher Notes Teacher Version

Auchmuty High School Mathematics Department Advanced Higher Notes Teacher Version The Binomial Theoem Factoials Auchmuty High School Mathematics Depatment The calculations,, 6 etc. often appea in mathematics. They ae called factoials and have been given the notation n!. e.g. 6! 6!!!!!

More information

ON SPARSELY SCHEMMEL TOTIENT NUMBERS. Colin Defant 1 Department of Mathematics, University of Florida, Gainesville, Florida

ON SPARSELY SCHEMMEL TOTIENT NUMBERS. Colin Defant 1 Department of Mathematics, University of Florida, Gainesville, Florida #A8 INTEGERS 5 (205) ON SPARSEL SCHEMMEL TOTIENT NUMBERS Colin Defant Depatment of Mathematics, Univesity of Floida, Gainesville, Floida cdefant@ufl.edu Received: 7/30/4, Revised: 2/23/4, Accepted: 4/26/5,

More information

Quantum Fourier Transform

Quantum Fourier Transform Chapte 5 Quantum Fouie Tansfom Many poblems in physics and mathematics ae solved by tansfoming a poblem into some othe poblem with a known solution. Some notable examples ae Laplace tansfom, Legende tansfom,

More information

q i i=1 p i ln p i Another measure, which proves a useful benchmark in our analysis, is the chi squared divergence of p, q, which is defined by

q i i=1 p i ln p i Another measure, which proves a useful benchmark in our analysis, is the chi squared divergence of p, q, which is defined by CSISZÁR f DIVERGENCE, OSTROWSKI S INEQUALITY AND MUTUAL INFORMATION S. S. DRAGOMIR, V. GLUŠČEVIĆ, AND C. E. M. PEARCE Abstact. The Ostowski integal inequality fo an absolutely continuous function is used

More information

arxiv: v1 [math.na] 8 Feb 2013

arxiv: v1 [math.na] 8 Feb 2013 A mixed method fo Diichlet poblems with adial basis functions axiv:1302.2079v1 [math.na] 8 Feb 2013 Nobet Heue Thanh Tan Abstact We pesent a simple discetization by adial basis functions fo the Poisson

More information

Math 301: The Erdős-Stone-Simonovitz Theorem and Extremal Numbers for Bipartite Graphs

Math 301: The Erdős-Stone-Simonovitz Theorem and Extremal Numbers for Bipartite Graphs Math 30: The Edős-Stone-Simonovitz Theoem and Extemal Numbes fo Bipatite Gaphs May Radcliffe The Edős-Stone-Simonovitz Theoem Recall, in class we poved Tuán s Gaph Theoem, namely Theoem Tuán s Theoem Let

More information

THE JEU DE TAQUIN ON THE SHIFTED RIM HOOK TABLEAUX. Jaejin Lee

THE JEU DE TAQUIN ON THE SHIFTED RIM HOOK TABLEAUX. Jaejin Lee Koean J. Math. 23 (2015), No. 3, pp. 427 438 http://dx.doi.og/10.11568/kjm.2015.23.3.427 THE JEU DE TAQUIN ON THE SHIFTED RIM HOOK TABLEAUX Jaejin Lee Abstact. The Schensted algoithm fist descibed by Robinson

More information

ST 501 Course: Fundamentals of Statistical Inference I. Sujit K. Ghosh.

ST 501 Course: Fundamentals of Statistical Inference I. Sujit K. Ghosh. ST 501 Couse: Fundamentals of Statistical Infeence I Sujit K. Ghosh sujit.ghosh@ncsu.edu Pesented at: 2229 SAS Hall, Depatment of Statistics, NC State Univesity http://www.stat.ncsu.edu/people/ghosh/couses/st501/

More information

Key Establishment Protocols. Cryptography CS 507 Erkay Savas Sabanci University

Key Establishment Protocols. Cryptography CS 507 Erkay Savas Sabanci University Key Establishment Potocols Cyptogaphy CS 507 Ekay Savas Sabanci Univesity ekays@sabanciuniv.edu Key distibution poblem Secuity of the keys Even if the cyptogaphic algoithms & potocols ae cyptogaphically

More information

Introduction Common Divisors. Discrete Mathematics Andrei Bulatov

Introduction Common Divisors. Discrete Mathematics Andrei Bulatov Intoduction Common Divisos Discete Mathematics Andei Bulatov Discete Mathematics Common Divisos 3- Pevious Lectue Integes Division, popeties of divisibility The division algoithm Repesentation of numbes

More information

Research Article On Alzer and Qiu s Conjecture for Complete Elliptic Integral and Inverse Hyperbolic Tangent Function

Research Article On Alzer and Qiu s Conjecture for Complete Elliptic Integral and Inverse Hyperbolic Tangent Function Abstact and Applied Analysis Volume 011, Aticle ID 697547, 7 pages doi:10.1155/011/697547 Reseach Aticle On Alze and Qiu s Conjectue fo Complete Elliptic Integal and Invese Hypebolic Tangent Function Yu-Ming

More information

A Converse to Low-Rank Matrix Completion

A Converse to Low-Rank Matrix Completion A Convese to Low-Rank Matix Completion Daniel L. Pimentel-Alacón, Robet D. Nowak Univesity of Wisconsin-Madison Abstact In many pactical applications, one is given a subset Ω of the enties in a d N data

More information

MATH 220: SECOND ORDER CONSTANT COEFFICIENT PDE. We consider second order constant coefficient scalar linear PDEs on R n. These have the form

MATH 220: SECOND ORDER CONSTANT COEFFICIENT PDE. We consider second order constant coefficient scalar linear PDEs on R n. These have the form MATH 220: SECOND ORDER CONSTANT COEFFICIENT PDE ANDRAS VASY We conside second ode constant coefficient scala linea PDEs on R n. These have the fom Lu = f L = a ij xi xj + b i xi + c i whee a ij b i and

More information

JENSEN S INEQUALITY FOR DISTRIBUTIONS POSSESSING HIGHER MOMENTS, WITH APPLICATION TO SHARP BOUNDS FOR LAPLACE-STIELTJES TRANSFORMS

JENSEN S INEQUALITY FOR DISTRIBUTIONS POSSESSING HIGHER MOMENTS, WITH APPLICATION TO SHARP BOUNDS FOR LAPLACE-STIELTJES TRANSFORMS J. Austal. Math. Soc. Se. B 40(1998), 80 85 JENSEN S INEQUALITY FO DISTIBUTIONS POSSESSING HIGHE MOMENTS, WITH APPLICATION TO SHAP BOUNDS FO LAPLACE-STIELTJES TANSFOMS B. GULJAŠ 1,C.E.M.PEACE 2 and J.

More information

CENTRAL INDEX BASED SOME COMPARATIVE GROWTH ANALYSIS OF COMPOSITE ENTIRE FUNCTIONS FROM THE VIEW POINT OF L -ORDER. Tanmay Biswas

CENTRAL INDEX BASED SOME COMPARATIVE GROWTH ANALYSIS OF COMPOSITE ENTIRE FUNCTIONS FROM THE VIEW POINT OF L -ORDER. Tanmay Biswas J Koean Soc Math Educ Se B: Pue Appl Math ISSNPint 16-0657 https://doiog/107468/jksmeb01853193 ISSNOnline 87-6081 Volume 5, Numbe 3 August 018, Pages 193 01 CENTRAL INDEX BASED SOME COMPARATIVE GROWTH

More information

Anonymous return route information for onion based mix-nets

Anonymous return route information for onion based mix-nets Anonymous etun oute infomation fo onion based mix-nets ABSTRACT Yoshifumi Manabe NTT Communication Science Laboatoies NTT Copoation Atsugi Kanagawa 239-0198 Japan manabeyoshifumi@labnttcojp This pape poposes

More information

2 S. Gao and M. A. Shokollahi opeations in Fq, and usually we will use the \Soft O" notation to ignoe logaithmic factos: g = O(n) ~ means that g = O(n

2 S. Gao and M. A. Shokollahi opeations in Fq, and usually we will use the \Soft O notation to ignoe logaithmic factos: g = O(n) ~ means that g = O(n Computing Roots of Polynomials ove Function Fields of Cuves Shuhong Gao 1 and M. Amin Shokollahi 2 1 Depatment of Mathematical Sciences, Clemson Univesity, Clemson, SC 29634 USA 2 Bell Labs, Rm. 2C-353,

More information

Lecture 8 - Gauss s Law

Lecture 8 - Gauss s Law Lectue 8 - Gauss s Law A Puzzle... Example Calculate the potential enegy, pe ion, fo an infinite 1D ionic cystal with sepaation a; that is, a ow of equally spaced chages of magnitude e and altenating sign.

More information

Random Variables and Probability Distribution Random Variable

Random Variables and Probability Distribution Random Variable Random Vaiables and Pobability Distibution Random Vaiable Random vaiable: If S is the sample space P(S) is the powe set of the sample space, P is the pobability of the function then (S, P(S), P) is called

More information

The VC-dimension of Unions: Learning, Geometry and Combinatorics

The VC-dimension of Unions: Learning, Geometry and Combinatorics The VC-dimension of Unions: Leaning, Geomety and Combinatoics Mónika Csikós Andey Kupavskii Nabil H. Mustafa Abstact The VC-dimension of a set system is a way to captue its complexity, and has been a key

More information

arxiv: v1 [math.nt] 12 May 2017

arxiv: v1 [math.nt] 12 May 2017 SEQUENCES OF CONSECUTIVE HAPPY NUMBERS IN NEGATIVE BASES HELEN G. GRUNDMAN AND PAMELA E. HARRIS axiv:1705.04648v1 [math.nt] 12 May 2017 ABSTRACT. Fo b 2 and e 2, let S e,b : Z Z 0 be the function taking

More information

Fractional Zero Forcing via Three-color Forcing Games

Fractional Zero Forcing via Three-color Forcing Games Factional Zeo Focing via Thee-colo Focing Games Leslie Hogben Kevin F. Palmowski David E. Robeson Michael Young May 13, 2015 Abstact An -fold analogue of the positive semidefinite zeo focing pocess that

More information

Additive Approximation for Edge-Deletion Problems

Additive Approximation for Edge-Deletion Problems Additive Appoximation fo Edge-Deletion Poblems Noga Alon Asaf Shapia Benny Sudakov Abstact A gaph popety is monotone if it is closed unde emoval of vetices and edges. In this pape we conside the following

More information

Rate Splitting is Approximately Optimal for Fading Gaussian Interference Channels

Rate Splitting is Approximately Optimal for Fading Gaussian Interference Channels Rate Splitting is Appoximately Optimal fo Fading Gaussian Intefeence Channels Joyson Sebastian, Can Kaakus, Suhas Diggavi, I-Hsiang Wang Abstact In this pape, we study the -use Gaussian intefeence-channel

More information

Identification of the degradation of railway ballast under a concrete sleeper

Identification of the degradation of railway ballast under a concrete sleeper Identification of the degadation of ailway ballast unde a concete sleepe Qin Hu 1) and Heung Fai Lam ) 1), ) Depatment of Civil and Achitectual Engineeing, City Univesity of Hong Kong, Hong Kong SAR, China.

More information

Reliability analysis examples

Reliability analysis examples Reliability analysis examples Engineeing Risk Analysis Goup, Technische Univesität München. Acisst., 80 Munich, Gemany. May 8, 08 Intoduction In the context of eliability analysis and ae event estimation,

More information

Query Complexity Lower Bounds for Reconstruction of Codes

Query Complexity Lower Bounds for Reconstruction of Codes Quey Complexity Lowe Bounds fo Reconstuction of Codes Souav Chakaboty Elda Fische Aie Matsliah Abstact We investigate the poblem of local econstuction, as defined by Saks and Seshadhi (2008), in the context

More information