More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries

Size: px
Start display at page:

Download "More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries"

Transcription

1 Moe Efficient Oblivious Tansfe Extensions with Secuity fo Malicious Advesaies Gilad Ashaov Yehuda Lindell Thomas Schneide Michael Zohne Hebew Univesity Ba-Ilan Univesity Damstadt Damstadt EUROCRYPT 2015

2 Fom Theoy to Pactice [Yao82,Yao86,GMW87,BGW88,CCD88,RB89, ] Secue computation becomes pactical! [MNPS04,LP07,LPS08,PSSW09,KSS12,FN13,SS13,LR14,HKK+14, FJN14,NNOB12,LOS14,DZ13,DLT14,DCW13,JKO13]

3 1-out-of-2 Oblivious Tansfe Sende Receive INPUT: Sende holds two stings (x0,x1), Receive holds OUTPUT: Sende leans nothing, Receive leans x,

4 Oblivious Tansfe and Secue Computation OT is a basic ingedient in (almost) all potocols fo secue computation Potocols based on Gabled Cicuits (Yao): 1 OT pe input [LP07,LPS08,PSSW09,KSS12,FN13,SS13,LR14,HKK+14,FJN14] Potocols based on GMW: 1+ OT pe AND-gate TinyOT [NNOB12,LOS14] MiniMac potocols [DZ13,DLT14]

5 How Many OT s? The AES cicuit: Uses 2 19 OTs (when evaluated with TinyOT) The PSI cicuit: (fo b=32,n=2 16 ) Uses 2 30 OTs (when evaluated with TinyOT) Using [PeiketVaikuntanathanWates08]: 350 OTs pe second 1M (2 20 ) OTs > 45 minutes(!) 1G (2 30 ) OTs > minutes > 1 month [ChouOlandi15] OTs pe second (?)

6 OT Extensions Small amount of base OTs (secuity paamete) + (cheap) pivate-key cypto Many OTs

7 OT Extension and Related Wok Intoduced in [Beave96] Ishai, Kilian, Nissim, Petank [IKNP03] Extending Oblivious Tansfe Efficiently Optimizations semi-honest: [KK13, ALSZ13] Optimizations malicious: [La14,NNOB12,HIKN08,Nie07]

8 This Wok Efficient potocol fo OT extension, malicious advesay, based on IKNP It outpefoms all pevious constuctions Optimizations, implementation This Talk: IKNP potocol Ou potocol, its secuity (Implementation) and pefomance

9 Extending OT Efficiently 1 [IKNP03] 1 Semi-honest

10 IKNP - Idea m Many OTs expensive

11 IKNP - Idea m k Few OTs of long stings m Many OTs

12 IKNP - Implementation k k Few Shot OTs k + long messages m Many OTs m

13 In Pactice [ALSZ,CCS13] k k Few Shot OTs + long messages m Many OTs Implementation: see SCAPI

14 IKNP {x 0, x 1 } m j j j=1 = ( 1,..., m ) s = (s 1,...,s l ) k 1 s 1,...,k l s l Base OTs {k 0,k 1 } l i i i=1 Q u 1,...,u l u i = G(k i 0 ) G(k i 1 ) T * * y j 0 = x j 0 H (q j ) y j 1 = x j 1 H (q j s) y j 0, y j 1

15 When Moving to Malicious The potocol is aleady secue with espect to malicious Sende The Receive sends many messages of the same fom u 1,...,u l u i = G(k i 0 ) G(k i 1 ) Secuity against malicious Receive: we must guaantee that it uses the same value in these messages

16 {x 0, x 1 } m j j j=1 The Potocol = ( 1,..., m ) Base OTs u 1,...,u l u i = G(k i 0 ) G(k i 1 ) Q T Consistency Check of y j 0 = x j 0 H (q j ) y j 1 = x j 1 H (q j s) y j 0, y j 1

17 The Consistency Checks

18 Consistency Check u i = G(k i 0 ) G(k i 1 ) u j = G(k j 0 ) G(k j 1 )

19 Consistency Check u i = G(k i 0 ) G(k i 1 ) u j = G(k j 0 ) G(k j 1 ) u i = t i 0 t i 1 u j = t j 0 t j 1 u i u j = t i 0 t i 1 t j 0 t j 1 u i u j t i s i t j s j? = t i 1 s i t j 1 s j H(u i u j t i s i t j s j )? = H(t i 1 s i t j 1 s j )

20 Consistency Check h 0,0 i, j = H (t 0 i t 0 j ) h 0,1 i, j = H (t 0 i t 1 j ) h 1,0 i, j = H (t 1 i t 0 j ) h 1,1 i, j = H (t 1 i t 1 j ) Fo evey pai (i,j) u 1,...,u l {h 0,0,h 0,1,h 1,0,h 1,1 } i, j i, j i, j i, j i, j Alice checks that evey pai (i,j): 1 s h i,1 s j i, j? = H (u i u j s t i s i t j j ) s h i,s j s i, j? = H (t i s i t j j )

21 Does it wok? Ou check is not sound: The advesay can still send u i, u j, with i j But, it takes a isk Effectively, in ode to pass the veification of (i,j) it has to guess eithe si o sj Ou check guaantees the following: If the advesay ties to cheat with u i, u j it gets caught with pobability 1/2!

22 Consistency Check Receive cannot cheat in many messages with each cheat - one bit of s is leaked s is the secet key of the sende Solution - incease the size of s k k ρ l 2 But wait you have amount of checks Do we eally need this huge amount of checks? l

23 How many checks do we eally need?

24 How many checks do we eally need?

25 How many checks do we eally need?

26 How many checks do we eally need?

27 The needed popety: Fo any lage enough" set of bad vetices (> p=40 ), thee exists p-matching with the good vetices

28 How many checks do we eally need?

29 How many checks do we eally need? 1 2 4

30 How many checks do we eally need? 1 2 4

31 How Many Checks? The needed popety: Fo any lage enough" set of bad vetices (> p=40 ), thee exists p-matching with the good vetices We show that andom d-egula gaph satisfies the above (fo appopiate set of paametes) Fo k=128, p= base OTs, complete gaph: base OTs, d=2, checks: base OTs, d=3, checks: 531 Covet: (168 base OTs) pobability 1/2, just andom 7 checks!

32 Instantiation of H [IKNP] assumes that H is Coelation-Robust Sometimes, in ode to gain moe efficiency, potocols need some stonge popeties of H, and so it is assumed to be a Random-Oacle Coelation-obustness is much moe plausible assumption than andom-oacle We have some leakage of s, and so H is assumed to be Min-Entopy Coelation Robustness

33 Pefomance

34 Empiical Evaluation Benchmak: 2 23 =8M OTs Local scenaio (LAN): Two seves in the same oom (netwok with low latency and high bandwidth) 12 sec (190 base OTs, 380 checks) Cloud scenaio (WAN): Two seves in diffeent continents (netwok with high latency and low bandwidth) 64 sec (174 base OTs, 696 checks)

35 Compaison - LAN Setting

36 Compaison - WAN setting

37 Conclusions Moe efficient OT extension - moe efficient potocols fo MPC Optimized OT extension potocol, malicious advesay Combination of theoy and pactice Thank You!

10/04/18. P [P(x)] 1 negl(n).

10/04/18. P [P(x)] 1 negl(n). Mastemath, Sping 208 Into to Lattice lgs & Cypto Lectue 0 0/04/8 Lectues: D. Dadush, L. Ducas Scibe: K. de Boe Intoduction In this lectue, we will teat two main pats. Duing the fist pat we continue the

More information

Oblivious Transfer (OT) and OT Extension

Oblivious Transfer (OT) and OT Extension Oblivious Transfer (OT) and OT Extension School on Secure Multiparty Computation Arpita Patra Arpita Patra Roadmap o Oblivious Transfer - Construction from `special PKE o OT Extension - IKNP OT extension

More information

More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries

More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries Gilad Asharov 1, Yehuda Lindell 2, Thomas Schneider 3, and Michael Zohner 3 1 The Hebrew University of Jerusalem, Israel

More information

Information-Theoretic

Information-Theoretic Infomation-Theoetic Key Ageement fom Close Secets Leonid Reyzin Januay 5, 2018 IISc 1 Infomation-Theoetic Key Ageement fom Close Secets: A Suvey 0 1 assume these ae close and patially secet 2 Infomation-Theoetic

More information

Lecture 18: Graph Isomorphisms

Lecture 18: Graph Isomorphisms INFR11102: Computational Complexity 22/11/2018 Lectue: Heng Guo Lectue 18: Gaph Isomophisms 1 An Athu-Melin potocol fo GNI Last time we gave a simple inteactive potocol fo GNI with pivate coins. We will

More information

Revision of Lecture Eight

Revision of Lecture Eight Revision of Lectue Eight Baseband equivalent system and equiements of optimal tansmit and eceive filteing: (1) achieve zeo ISI, and () maximise the eceive SNR Thee detection schemes: Theshold detection

More information

Cut-and-Choose Yao-Based Secure Computation in the Online/Offline and Batch Settings

Cut-and-Choose Yao-Based Secure Computation in the Online/Offline and Batch Settings Cut-and-Choose Yao-Based Secure Computation in the Online/Offline and Batch Settings Yehuda Lindell Bar-Ilan University, Israel Technion Cryptoday 2014 Yehuda Lindell Online/Offline and Batch Yao 30/12/2014

More information

Lecture 25: Pairing Based Cryptography

Lecture 25: Pairing Based Cryptography 6.897 Special Topics in Cyptogaphy Instucto: Ran Canetti May 5, 2004 Lectue 25: Paiing Based Cyptogaphy Scibe: Ben Adida 1 Intoduction The field of Paiing Based Cyptogaphy has exploded ove the past 3 yeas

More information

Secret Exponent Attacks on RSA-type Schemes with Moduli N = p r q

Secret Exponent Attacks on RSA-type Schemes with Moduli N = p r q Secet Exponent Attacks on RSA-type Schemes with Moduli N = p q Alexande May Faculty of Compute Science, Electical Engineeing and Mathematics Univesity of Padebon 33102 Padebon, Gemany alexx@uni-padebon.de

More information

Lifting Private Information Retrieval from Two to any Number of Messages

Lifting Private Information Retrieval from Two to any Number of Messages Lifting Pivate Infomation Retieval fom Two to any umbe of Messages Rafael G.L. D Oliveia, Salim El Rouayheb ECE, Rutges Univesity, Piscataway, J Emails: d746@scaletmail.utges.edu, salim.elouayheb@utges.edu

More information

Probablistically Checkable Proofs

Probablistically Checkable Proofs Lectue 12 Pobablistically Checkable Poofs May 13, 2004 Lectue: Paul Beame Notes: Chis Re 12.1 Pobablisitically Checkable Poofs Oveview We know that IP = PSPACE. This means thee is an inteactive potocol

More information

Key Establishment Protocols. Cryptography CS 507 Erkay Savas Sabanci University

Key Establishment Protocols. Cryptography CS 507 Erkay Savas Sabanci University Key Establishment Potocols Cyptogaphy CS 507 Ekay Savas Sabanci Univesity ekays@sabanciuniv.edu Key distibution poblem Secuity of the keys Even if the cyptogaphic algoithms & potocols ae cyptogaphically

More information

15.081J/6.251J Introduction to Mathematical Programming. Lecture 6: The Simplex Method II

15.081J/6.251J Introduction to Mathematical Programming. Lecture 6: The Simplex Method II 15081J/6251J Intoduction to Mathematical Pogamming ectue 6: The Simplex Method II 1 Outline Revised Simplex method Slide 1 The full tableau implementation Anticycling 2 Revised Simplex Initial data: A,

More information

Physics: Work & Energy Beyond Earth Guided Inquiry

Physics: Work & Energy Beyond Earth Guided Inquiry Physics: Wok & Enegy Beyond Eath Guided Inquiy Elliptical Obits Keple s Fist Law states that all planets move in an elliptical path aound the Sun. This concept can be extended to celestial bodies beyond

More information

A more efficient secure event signature protocol for massively multiplayer online games based on P2P Dapeng Li1, a, Liang Hu1,b, and JianFeng Chu1,c

A more efficient secure event signature protocol for massively multiplayer online games based on P2P Dapeng Li1, a, Liang Hu1,b, and JianFeng Chu1,c Intenational Foum on Mechanical, Contol and Automation (IFMCA 2016) A moe efficient secue event signatue potocol fo massively multiplaye online games based on P2P Dapeng Li1, a, Liang Hu1,b, and JianFeng

More information

4/18/2005. Statistical Learning Theory

4/18/2005. Statistical Learning Theory Statistical Leaning Theoy Statistical Leaning Theoy A model of supevised leaning consists of: a Envionment - Supplying a vecto x with a fixed but unknown pdf F x (x b Teache. It povides a desied esponse

More information

Lecture 9 and 10: Malicious Security - GMW Compiler and Cut and Choose, OT Extension

Lecture 9 and 10: Malicious Security - GMW Compiler and Cut and Choose, OT Extension CS 294 Secure Computation February 16 and 18, 2016 Lecture 9 and 10: Malicious Security - GMW Compiler and Cut and Choose, OT Extension Instructor: Sanjam Garg Scribe: Alex Irpan 1 Overview Garbled circuits

More information

Quasi-Randomness and the Distribution of Copies of a Fixed Graph

Quasi-Randomness and the Distribution of Copies of a Fixed Graph Quasi-Randomness and the Distibution of Copies of a Fixed Gaph Asaf Shapia Abstact We show that if a gaph G has the popety that all subsets of vetices of size n/4 contain the coect numbe of tiangles one

More information

The Substring Search Problem

The Substring Search Problem The Substing Seach Poblem One algoithm which is used in a vaiety of applications is the family of substing seach algoithms. These algoithms allow a use to detemine if, given two chaacte stings, one is

More information

Concurrent Blind Signatures without Random Oracles

Concurrent Blind Signatures without Random Oracles Concuent Blind Signatues without Random Oacles Aggelos Kiayias Hong-Sheng Zhou Abstact We pesent a blind signatue scheme that is efficient and povably secue without andom oacles unde concuent attacks utilizing

More information

Experiment I Voltage Variation and Control

Experiment I Voltage Variation and Control ELE303 Electicity Netwoks Expeiment I oltage aiation and ontol Objective To demonstate that the voltage diffeence between the sending end of a tansmission line and the load o eceiving end depends mainly

More information

Design and Analysis of Password-Based Key Derivation Functions

Design and Analysis of Password-Based Key Derivation Functions Design and Analysis of Passwod-Based Key Deivation Functions Fances F. Yao 1 and Yiqun Lisa Yin 2 1 Depatment of Compute Science City Univesity of Hong Kong Kowloon, Hong Kong Email: csfyao@cityu.edu.hk

More information

Web-based Supplementary Materials for. Controlling False Discoveries in Multidimensional Directional Decisions, with

Web-based Supplementary Materials for. Controlling False Discoveries in Multidimensional Directional Decisions, with Web-based Supplementay Mateials fo Contolling False Discoveies in Multidimensional Diectional Decisions, with Applications to Gene Expession Data on Odeed Categoies Wenge Guo Biostatistics Banch, National

More information

Exploration of the three-person duel

Exploration of the three-person duel Exploation of the thee-peson duel Andy Paish 15 August 2006 1 The duel Pictue a duel: two shootes facing one anothe, taking tuns fiing at one anothe, each with a fixed pobability of hitting his opponent.

More information

Notes on McCall s Model of Job Search. Timothy J. Kehoe March if job offer has been accepted. b if searching

Notes on McCall s Model of Job Search. Timothy J. Kehoe March if job offer has been accepted. b if searching Notes on McCall s Model of Job Seach Timothy J Kehoe Mach Fv ( ) pob( v), [, ] Choice: accept age offe o eceive b and seach again next peiod An unemployed oke solves hee max E t t y t y t if job offe has

More information

Design and Analysis of Password-Based Key Derivation Functions

Design and Analysis of Password-Based Key Derivation Functions Design and Analysis of Passwod-Based Key Deivation Functions 245 Fances F. Yao 1 and Yiqun Lisa Yin 2 1 Depatment of Compute Science, City Univesity of Hong Kong, Kowloon, Hong Kong csfyao@cityu.edu.hk

More information

Additive Approximation for Edge-Deletion Problems

Additive Approximation for Edge-Deletion Problems Additive Appoximation fo Edge-Deletion Poblems Noga Alon Asaf Shapia Benny Sudakov Abstact A gaph popety is monotone if it is closed unde emoval of vetices and edges. In this pape we conside the following

More information

Explosive Contagion in Networks (Supplementary Information)

Explosive Contagion in Networks (Supplementary Information) Eplosive Contagion in Netwoks (Supplementay Infomation) Jesús Gómez-Gadeñes,, Laua Loteo, Segei N. Taaskin, and Fancisco J. Péez-Reche Institute fo Biocomputation and Physics of Comple Systems (BIFI),

More information

A Deep Convolutional Neural Network Based on Nested Residue Number System

A Deep Convolutional Neural Network Based on Nested Residue Number System A Deep Convolutional Neual Netwok Based on Nested Residue Numbe System Hioki Nakahaa Ehime Univesity, Japan Tsutomu Sasao Meiji Univesity, Japan Abstact A pe-tained deep convolutional neual netwok (DCNN)

More information

Anonymous return route information for onion based mix-nets

Anonymous return route information for onion based mix-nets Anonymous etun oute infomation fo onion based mix-nets ABSTRACT Yoshifumi Manabe NTT Communication Science Laboatoies NTT Copoation Atsugi Kanagawa 239-0198 Japan manabeyoshifumi@labnttcojp This pape poposes

More information

Stanford University CS259Q: Quantum Computing Handout 8 Luca Trevisan October 18, 2012

Stanford University CS259Q: Quantum Computing Handout 8 Luca Trevisan October 18, 2012 Stanfod Univesity CS59Q: Quantum Computing Handout 8 Luca Tevisan Octobe 8, 0 Lectue 8 In which we use the quantum Fouie tansfom to solve the peiod-finding poblem. The Peiod Finding Poblem Let f : {0,...,

More information

ON THE INVERSE SIGNED TOTAL DOMINATION NUMBER IN GRAPHS. D.A. Mojdeh and B. Samadi

ON THE INVERSE SIGNED TOTAL DOMINATION NUMBER IN GRAPHS. D.A. Mojdeh and B. Samadi Opuscula Math. 37, no. 3 (017), 447 456 http://dx.doi.og/10.7494/opmath.017.37.3.447 Opuscula Mathematica ON THE INVERSE SIGNED TOTAL DOMINATION NUMBER IN GRAPHS D.A. Mojdeh and B. Samadi Communicated

More information

1. Review of Probability.

1. Review of Probability. 1. Review of Pobability. What is pobability? Pefom an expeiment. The esult is not pedictable. One of finitely many possibilities R 1, R 2,, R k can occu. Some ae pehaps moe likely than othes. We assign

More information

Related Rates - the Basics

Related Rates - the Basics Related Rates - the Basics In this section we exploe the way we can use deivatives to find the velocity at which things ae changing ove time. Up to now we have been finding the deivative to compae the

More information

Classification and Ordering of Portfolios and of New Insured Unities of Risks

Classification and Ordering of Portfolios and of New Insured Unities of Risks Classification and Odeing of Potfolios and of New Insued Unities of Risks Augusto Feddi, Giulia Sagenti Univesity of Rome La Sapienza Depatment of Actuaial and Financial Sciences 36th Intenational ASTIN

More information

Optically selected clusters from DES science verification data and their SPTSZE signature

Optically selected clusters from DES science verification data and their SPTSZE signature Optically selected clustes fom DES science veification data and thei SPTSZE signatue Collaboatos: S. Boquet, E.Rozo, B.Benson, J.Moh +SPT coll. +DES coll. Alex Sao Outline SPT-SZE and DES-SV 1) Optical

More information

Pearson s Chi-Square Test Modifications for Comparison of Unweighted and Weighted Histograms and Two Weighted Histograms

Pearson s Chi-Square Test Modifications for Comparison of Unweighted and Weighted Histograms and Two Weighted Histograms Peason s Chi-Squae Test Modifications fo Compaison of Unweighted and Weighted Histogams and Two Weighted Histogams Univesity of Akueyi, Bogi, v/noduslód, IS-6 Akueyi, Iceland E-mail: nikolai@unak.is Two

More information

Multipath routing and congestion control

Multipath routing and congestion control Multipath outing and congestion contol Fank Kelly Univesity of Cambidge (with wok of Damon Wischik, Mak Handley and Costin Raiciu, Univesity College London) Chinese Univesity of Hong Kong (Institute of

More information

Temporal-Difference Learning

Temporal-Difference Learning .997 Decision-Making in Lage-Scale Systems Mach 17 MIT, Sping 004 Handout #17 Lectue Note 13 1 Tempoal-Diffeence Leaning We now conside the poblem of computing an appopiate paamete, so that, given an appoximation

More information

Benny Pinkas Bar Ilan University

Benny Pinkas Bar Ilan University Winter School on Bar-Ilan University, Israel 30/1/2011-1/2/2011 Bar-Ilan University Benny Pinkas Bar Ilan University 1 Extending OT [IKNP] Is fully simulatable Depends on a non-standard security assumption

More information

Provable Security in Cryptography

Provable Security in Cryptography Povable Secuity in Cyptogaphy Thomas Baignèes EPFL http://lasecwww.epfl.ch May 29, 2007 (ve. 25) These lectue notes ae a compilation of some of my eadings while I was pepaing two lectues given at EPFL

More information

SUFFICIENT CONDITIONS FOR MAXIMALLY EDGE-CONNECTED AND SUPER-EDGE-CONNECTED GRAPHS DEPENDING ON THE CLIQUE NUMBER

SUFFICIENT CONDITIONS FOR MAXIMALLY EDGE-CONNECTED AND SUPER-EDGE-CONNECTED GRAPHS DEPENDING ON THE CLIQUE NUMBER Discussiones Mathematicae Gaph Theoy 39 (019) 567 573 doi:10.7151/dmgt.096 SUFFICIENT CONDITIONS FOR MAXIMALLY EDGE-CONNECTED AND SUPER-EDGE-CONNECTED GRAPHS DEPENDING ON THE CLIQUE NUMBER Lutz Volkmann

More information

1 Notes on Order Statistics

1 Notes on Order Statistics 1 Notes on Ode Statistics Fo X a andom vecto in R n with distibution F, and π S n, define X π by and F π by X π (X π(1),..., X π(n) ) F π (x 1,..., x n ) F (x π 1 (1),..., x π 1 (n)); then the distibution

More information

Deterministic vs Non-deterministic Graph Property Testing

Deterministic vs Non-deterministic Graph Property Testing Deteministic vs Non-deteministic Gaph Popety Testing Lio Gishboline Asaf Shapia Abstact A gaph popety P is said to be testable if one can check whethe a gaph is close o fa fom satisfying P using few andom

More information

MULTILAYER PERCEPTRONS

MULTILAYER PERCEPTRONS Last updated: Nov 26, 2012 MULTILAYER PERCEPTRONS Outline 2 Combining Linea Classifies Leaning Paametes Outline 3 Combining Linea Classifies Leaning Paametes Implementing Logical Relations 4 AND and OR

More information

Fixed Argument Pairing Inversion on Elliptic Curves

Fixed Argument Pairing Inversion on Elliptic Curves Fixed Agument Paiing Invesion on Elliptic Cuves Sungwook Kim and Jung Hee Cheon ISaC & Dept. of Mathematical Sciences Seoul National Univesity Seoul, Koea {avell7,jhcheon}@snu.ac.k Abstact. Let E be an

More information

Some RSA-based Encryption Schemes with Tight Security Reduction

Some RSA-based Encryption Schemes with Tight Security Reduction Some RSA-based Encyption Schemes with Tight Secuity Reduction Kaou Kuosawa 1 and Tsuyoshi Takagi 2 1 Ibaaki Univesity, 4-12-1 Nakanausawa, Hitachi, Ibaaki, 316-8511, Japan kuosawa@cis.ibaaki.ac.jp 2 Technische

More information

CALCULATING THE NUMBER OF TWIN PRIMES WITH SPECIFIED DISTANCE BETWEEN THEM BASED ON THE SIMPLEST PROBABILISTIC MODEL

CALCULATING THE NUMBER OF TWIN PRIMES WITH SPECIFIED DISTANCE BETWEEN THEM BASED ON THE SIMPLEST PROBABILISTIC MODEL U.P.B. Sci. Bull. Seies A, Vol. 80, Iss.3, 018 ISSN 13-707 CALCULATING THE NUMBER OF TWIN PRIMES WITH SPECIFIED DISTANCE BETWEEN THEM BASED ON THE SIMPLEST PROBABILISTIC MODEL Sasengali ABDYMANAPOV 1,

More information

763620SS STATISTICAL PHYSICS Solutions 2 Autumn 2012

763620SS STATISTICAL PHYSICS Solutions 2 Autumn 2012 763620SS STATISTICAL PHYSICS Solutions 2 Autumn 2012 1. Continuous Random Walk Conside a continuous one-dimensional andom walk. Let w(s i ds i be the pobability that the length of the i th displacement

More information

Rotational Motion. Lecture 6. Chapter 4. Physics I. Course website:

Rotational Motion. Lecture 6. Chapter 4. Physics I. Course website: Lectue 6 Chapte 4 Physics I Rotational Motion Couse website: http://faculty.uml.edu/andiy_danylov/teaching/physicsi Today we ae going to discuss: Chapte 4: Unifom Cicula Motion: Section 4.4 Nonunifom Cicula

More information

AQI: Advanced Quantum Information Lecture 2 (Module 4): Order finding and factoring algorithms February 20, 2013

AQI: Advanced Quantum Information Lecture 2 (Module 4): Order finding and factoring algorithms February 20, 2013 AQI: Advanced Quantum Infomation Lectue 2 (Module 4): Ode finding and factoing algoithms Febuay 20, 203 Lectue: D. Mak Tame (email: m.tame@impeial.ac.uk) Intoduction In the last lectue we looked at the

More information

Lecture 28: Convergence of Random Variables and Related Theorems

Lecture 28: Convergence of Random Variables and Related Theorems EE50: Pobability Foundations fo Electical Enginees July-Novembe 205 Lectue 28: Convegence of Random Vaiables and Related Theoems Lectue:. Kishna Jagannathan Scibe: Gopal, Sudhasan, Ajay, Swamy, Kolla An

More information

Radha Poovendran Network Security Lab University of Washington

Radha Poovendran Network Security Lab University of Washington A Gaph Theoetic Famewok fo Peventing the Womhole Attack in Wieless Senso Netwoks Radha Poovendan Netwok Secuity Lab Univesity of Washington Womholes Hope fo time tavel Womhole: A space-time distotion that

More information

ON INDEPENDENT SETS IN PURELY ATOMIC PROBABILITY SPACES WITH GEOMETRIC DISTRIBUTION. 1. Introduction. 1 r r. r k for every set E A, E \ {0},

ON INDEPENDENT SETS IN PURELY ATOMIC PROBABILITY SPACES WITH GEOMETRIC DISTRIBUTION. 1. Introduction. 1 r r. r k for every set E A, E \ {0}, ON INDEPENDENT SETS IN PURELY ATOMIC PROBABILITY SPACES WITH GEOMETRIC DISTRIBUTION E. J. IONASCU and A. A. STANCU Abstact. We ae inteested in constucting concete independent events in puely atomic pobability

More information

Estimation of the Correlation Coefficient for a Bivariate Normal Distribution with Missing Data

Estimation of the Correlation Coefficient for a Bivariate Normal Distribution with Missing Data Kasetsat J. (Nat. Sci. 45 : 736-74 ( Estimation of the Coelation Coefficient fo a Bivaiate Nomal Distibution with Missing Data Juthaphon Sinsomboonthong* ABSTRACT This study poposes an estimato of the

More information

RELIABILITY is an important concept in the design

RELIABILITY is an important concept in the design Poceedings of the Wold Congess on Engineeing 0 Vol I WCE 0, July -, 0, London, U.K. Reliability Measues in Ciculant Netwok *Inda Rajasingh, Bhaati Rajan, and R. Sundaa Rajan Abstact Reliability and efficiency

More information

A Bijective Approach to the Permutational Power of a Priority Queue

A Bijective Approach to the Permutational Power of a Priority Queue A Bijective Appoach to the Pemutational Powe of a Pioity Queue Ia M. Gessel Kuang-Yeh Wang Depatment of Mathematics Bandeis Univesity Waltham, MA 02254-9110 Abstact A pioity queue tansfoms an input pemutation

More information

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. X, NO. X,

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. X, NO. X, IEEE/ACM TRANSACTIONS ON NETWORING, VOL. X, NO. X, 016 1 Wieless senso netwoks unde the andom paiwise key pedistibution scheme: Can esiliency be achieved with small key ings? Osman Yağan, Membe, IEEE,

More information

The Iterated Random Function Problem,

The Iterated Random Function Problem, The Iteated Random Function Poblem, Ritam Bhaumik 1, ilanjan Datta 2, Avijit Dutta 1, icky Mouha 3,4, and Midul andi 1 1 Indian Statistical Institute, Kolkata, India. 2 Indian Institute of Technology,

More information

On the ratio of maximum and minimum degree in maximal intersecting families

On the ratio of maximum and minimum degree in maximal intersecting families On the atio of maximum and minimum degee in maximal intesecting families Zoltán Lóánt Nagy Lale Özkahya Balázs Patkós Máté Vize Septembe 5, 011 Abstact To study how balanced o unbalanced a maximal intesecting

More information

7.2. Coulomb s Law. The Electric Force

7.2. Coulomb s Law. The Electric Force Coulomb s aw Recall that chaged objects attact some objects and epel othes at a distance, without making any contact with those objects Electic foce,, o the foce acting between two chaged objects, is somewhat

More information

Information Retrieval Advanced IR models. Luca Bondi

Information Retrieval Advanced IR models. Luca Bondi Advanced IR models Luca Bondi Advanced IR models 2 (LSI) Pobabilistic Latent Semantic Analysis (plsa) Vecto Space Model 3 Stating point: Vecto Space Model Documents and queies epesented as vectos in the

More information

Broadcasting in Undirected Ad hoc Radio Networks

Broadcasting in Undirected Ad hoc Radio Networks Boadcasting in Undiected Ad hoc Radio Netwoks aiusz R. Kowalski Instytut Infomatyki Uniwesytet Waszawski Banacha 2, 02-097 Waszawa, Poland daek@mimuw.edu.pl Andzej Pelc épatement d Infomatique Univesité

More information

Fractional Zero Forcing via Three-color Forcing Games

Fractional Zero Forcing via Three-color Forcing Games Factional Zeo Focing via Thee-colo Focing Games Leslie Hogben Kevin F. Palmowski David E. Robeson Michael Young May 13, 2015 Abstact An -fold analogue of the positive semidefinite zeo focing pocess that

More information

Chemical Engineering 412

Chemical Engineering 412 Chemical Engineeing 41 Intoductoy Nuclea Engineeing Lectue 16 Nuclea eacto Theoy III Neuton Tanspot 1 One-goup eacto Equation Mono-enegetic neutons (Neuton Balance) DD φφ aa φφ + ss 1 vv vv is neuton speed

More information

Elementary Statistics and Inference. Elementary Statistics and Inference. 11. Regression (cont.) 22S:025 or 7P:025. Lecture 14.

Elementary Statistics and Inference. Elementary Statistics and Inference. 11. Regression (cont.) 22S:025 or 7P:025. Lecture 14. Elementay tatistics and Infeence :05 o 7P:05 Lectue 14 1 Elementay tatistics and Infeence :05 o 7P:05 Chapte 10 (cont.) D. Two Regession Lines uppose two vaiables, and ae obtained on 100 students, with

More information

Cryptography. Primitives and Protocols. Aggelos Kiayias

Cryptography. Primitives and Protocols. Aggelos Kiayias P1 P2 P3 E E E IV C1 C2 C3 Aggelos Kiayias Cyptogaphy Pimitives and Potocols Based on notes by G. Panagiotakos, S. Pehlivanoglu, J. Todd, K. Samai, T. Zachaias and H.S. Zhou CONTENTS 1 Contents 1 Intoduction

More information

Computational Methods of Solid Mechanics. Project report

Computational Methods of Solid Mechanics. Project report Computational Methods of Solid Mechanics Poject epot Due on Dec. 6, 25 Pof. Allan F. Bowe Weilin Deng Simulation of adhesive contact with molecula potential Poject desciption In the poject, we will investigate

More information

Math 301: The Erdős-Stone-Simonovitz Theorem and Extremal Numbers for Bipartite Graphs

Math 301: The Erdős-Stone-Simonovitz Theorem and Extremal Numbers for Bipartite Graphs Math 30: The Edős-Stone-Simonovitz Theoem and Extemal Numbes fo Bipatite Gaphs May Radcliffe The Edős-Stone-Simonovitz Theoem Recall, in class we poved Tuán s Gaph Theoem, namely Theoem Tuán s Theoem Let

More information

Cheetah: Fast Graph Kernel Tracking on Dynamic Graphs

Cheetah: Fast Graph Kernel Tracking on Dynamic Graphs Cheetah: Fast Gaph Kenel Tacking on Dynamic Gaphs Pesente: Liangyue Li Joint wok with Hanghang Tong (ASU), Yanghua Xiao (Fudan), Wei Fan (Baidu) 1 Aizona State Univesity Gaphs ae Eveywhee Collaboation

More information

A Converse to Low-Rank Matrix Completion

A Converse to Low-Rank Matrix Completion A Convese to Low-Rank Matix Completion Daniel L. Pimentel-Alacón, Robet D. Nowak Univesity of Wisconsin-Madison Abstact In many pactical applications, one is given a subset Ω of the enties in a d N data

More information

HW Solutions # MIT - Prof. Please study example 12.5 "from the earth to the moon". 2GmA v esc

HW Solutions # MIT - Prof. Please study example 12.5 from the earth to the moon. 2GmA v esc HW Solutions # 11-8.01 MIT - Pof. Kowalski Univesal Gavity. 1) 12.23 Escaping Fom Asteoid Please study example 12.5 "fom the eath to the moon". a) The escape velocity deived in the example (fom enegy consevation)

More information

A Simple Model of Communication APIs Application to Dynamic Partial-order Reduction

A Simple Model of Communication APIs Application to Dynamic Partial-order Reduction Simple Model of Communication PIs pplication to Dynamic Patial-ode Reduction Cistian Rosa Stephan Mez Matin Quinson VOCS 2010 22/09/2010 1 / 18 Motivation Distibuted lgoithms ae had to get ight: lack of

More information

Interaction of Feedforward and Feedback Streams in Visual Cortex in a Firing-Rate Model of Columnar Computations. ( r)

Interaction of Feedforward and Feedback Streams in Visual Cortex in a Firing-Rate Model of Columnar Computations. ( r) Supplementay mateial fo Inteaction of Feedfowad and Feedback Steams in Visual Cotex in a Fiing-Rate Model of Columna Computations Tobias Bosch and Heiko Neumann Institute fo Neual Infomation Pocessing

More information

Likelihood vs. Information in Aligning Biopolymer Sequences. UCSD Technical Report CS Timothy L. Bailey

Likelihood vs. Information in Aligning Biopolymer Sequences. UCSD Technical Report CS Timothy L. Bailey Likelihood vs. Infomation in Aligning Biopolyme Sequences UCSD Technical Repot CS93-318 Timothy L. Bailey Depatment of Compute Science and Engineeing Univesity of Califonia, San Diego 1 Febuay, 1993 ABSTRACT:

More information

TESTING THE VALIDITY OF THE EXPONENTIAL MODEL BASED ON TYPE II CENSORED DATA USING TRANSFORMED SAMPLE DATA

TESTING THE VALIDITY OF THE EXPONENTIAL MODEL BASED ON TYPE II CENSORED DATA USING TRANSFORMED SAMPLE DATA STATISTICA, anno LXXVI, n. 3, 2016 TESTING THE VALIDITY OF THE EXPONENTIAL MODEL BASED ON TYPE II CENSORED DATA USING TRANSFORMED SAMPLE DATA Hadi Alizadeh Noughabi 1 Depatment of Statistics, Univesity

More information

Section 5.3 Arrangements and Selections with repetitions

Section 5.3 Arrangements and Selections with repetitions Section 5.3 Aangements and Selections with epetitions Example 1: The numbe of aangements of BANANA? Thm 1: Given n objects, 1 of type 1, 2 of type 2,..., m of type m, with n = 1 + 2 + m, then the numbe

More information

HOW TO TEACH THE FUNDAMENTALS OF INFORMATION SCIENCE, CODING, DECODING AND NUMBER SYSTEMS?

HOW TO TEACH THE FUNDAMENTALS OF INFORMATION SCIENCE, CODING, DECODING AND NUMBER SYSTEMS? 6th INTERNATIONAL MULTIDISCIPLINARY CONFERENCE HOW TO TEACH THE FUNDAMENTALS OF INFORMATION SCIENCE, CODING, DECODING AND NUMBER SYSTEMS? Cecília Sitkuné Göömbei College of Nyíegyháza Hungay Abstact: The

More information

On the ratio of maximum and minimum degree in maximal intersecting families

On the ratio of maximum and minimum degree in maximal intersecting families On the atio of maximum and minimum degee in maximal intesecting families Zoltán Lóánt Nagy Lale Özkahya Balázs Patkós Máté Vize Mach 6, 013 Abstact To study how balanced o unbalanced a maximal intesecting

More information

ST 501 Course: Fundamentals of Statistical Inference I. Sujit K. Ghosh.

ST 501 Course: Fundamentals of Statistical Inference I. Sujit K. Ghosh. ST 501 Couse: Fundamentals of Statistical Infeence I Sujit K. Ghosh sujit.ghosh@ncsu.edu Pesented at: 2229 SAS Hall, Depatment of Statistics, NC State Univesity http://www.stat.ncsu.edu/people/ghosh/couses/st501/

More information

On decompositions of complete multipartite graphs into the union of two even cycles

On decompositions of complete multipartite graphs into the union of two even cycles On decompositions of complete multipatite gaphs into the union of two even cycles A. Su, J. Buchanan, R. C. Bunge, S. I. El-Zanati, E. Pelttai, G. Rasmuson, E. Spaks, S. Tagais Depatment of Mathematics

More information

MATH 415, WEEK 3: Parameter-Dependence and Bifurcations

MATH 415, WEEK 3: Parameter-Dependence and Bifurcations MATH 415, WEEK 3: Paamete-Dependence and Bifucations 1 A Note on Paamete Dependence We should pause to make a bief note about the ole played in the study of dynamical systems by the system s paametes.

More information

AP Physics - Coulomb's Law

AP Physics - Coulomb's Law AP Physics - oulomb's Law We ve leaned that electons have a minus one chage and potons have a positive one chage. This plus and minus one business doesn t wok vey well when we go in and ty to do the old

More information

Authenticated Garbling and Efficient Maliciously Secure Two-Party Computation

Authenticated Garbling and Efficient Maliciously Secure Two-Party Computation Authenticated Garbling and Efficient Maliciously Secure Two-Party Computation Xiao Wang University of Maryland wangxiao@cs.umd.edu Samuel Ranellucci University of Maryland George Mason University samuel@umd.edu

More information

Do dummies pay off? Limits of dummy traffic protection in anonymous communications

Do dummies pay off? Limits of dummy traffic protection in anonymous communications Do dummies pay off? Limits of dummy taffic potection in anonymous communications Simon Oya 1, Camela Toncoso 2, and Fenando Péez-González 12 1 Signal Theoy and Communications Dept, Univesity of Vigo, Spain,

More information

Wyner s Wire- Tap Channel, Forty Years Later

Wyner s Wire- Tap Channel, Forty Years Later Wyne s Wie- Tap Channel, Foty Yeas Late Leonid Reyzin These slides ae a supeset of the talks given at: - Theoy of Cyptogaphy Confeence on Mach 24, 2015 (pats I and II) - École Nomale Supéieue Cypto Semina

More information

Energy Savings Achievable in Connection Preserving Energy Saving Algorithms

Energy Savings Achievable in Connection Preserving Energy Saving Algorithms Enegy Savings Achievable in Connection Peseving Enegy Saving Algoithms Seh Chun Ng School of Electical and Infomation Engineeing Univesity of Sydney National ICT Austalia Limited Sydney, Austalia Email:

More information

Structure of glasses and melts

Structure of glasses and melts Stuctue of glasses and melts Matin Wilding Institute of Mathematical and Physical Sciences, Univesity of Wales, Abeystwyth, Ceedigion, SY3 3BZ Chis Benmoe, Intense Pulsed Neuton Souce and the Advanced

More information

LET a random variable x follows the two - parameter

LET a random variable x follows the two - parameter INTERNATIONAL JOURNAL OF MATHEMATICS AND SCIENTIFIC COMPUTING ISSN: 2231-5330, VOL. 5, NO. 1, 2015 19 Shinkage Bayesian Appoach in Item - Failue Gamma Data In Pesence of Pio Point Guess Value Gyan Pakash

More information

Conspiracy and Information Flow in the Take-Grant Protection Model

Conspiracy and Information Flow in the Take-Grant Protection Model Conspiacy and Infomation Flow in the Take-Gant Potection Model Matt Bishop Depatment of Compute Science Univesity of Califonia at Davis Davis, CA 95616-8562 ABSTRACT The Take Gant Potection Model is a

More information

Physics 211: Newton s Second Law

Physics 211: Newton s Second Law Physics 211: Newton s Second Law Reading Assignment: Chapte 5, Sections 5-9 Chapte 6, Section 2-3 Si Isaac Newton Bon: Januay 4, 1643 Died: Mach 31, 1727 Intoduction: Kinematics is the study of how objects

More information

Cryptography. Lecture 11. Arpita Patra

Cryptography. Lecture 11. Arpita Patra Cptogaph Lectue Apita Pata Geneic Results in PK Wold CPA Secuit CCA Secuit Bit Encption Man-bit Encption Bit Encption Man-Bit Encption Π CPA-secue KEM Π SKE COA-secue SKE Π Hb CPA-secue Π CCA-secue KEM

More information

arxiv:physics/ v2 [physics.soc-ph] 11 Mar 2005

arxiv:physics/ v2 [physics.soc-ph] 11 Mar 2005 Heide Balance in Human Netwoks P. Gawoński and K. Ku lakowski axiv:physics/5385v2 [physics.soc-ph] 11 Ma 25 Depatment of Applied Compute Science, Faculty of Physics and Applied Compute Science, AGH Univesity

More information

E E E. Aggelos Kiayias. Cryptography. Primitives and Protocols. Based on notes by S. Pehlivanoglu, J. Todd, K. Samari, T. Zacharias and H.S.

E E E. Aggelos Kiayias. Cryptography. Primitives and Protocols. Based on notes by S. Pehlivanoglu, J. Todd, K. Samari, T. Zacharias and H.S. P1 P2 P3 E E E IV C1 C2 C3 Aggelos Kiayias Cyptogaphy Pimitives and Potocols Based on notes by S. Pehlivanoglu, J. Todd, K. Samai, T. Zachaias and H.S. Zhou CONTENTS 1 Contents 1 Intoduction 4 1.1 Flipping

More information

CSCE 478/878 Lecture 4: Experimental Design and Analysis. Stephen Scott. 3 Building a tree on the training set Introduction. Outline.

CSCE 478/878 Lecture 4: Experimental Design and Analysis. Stephen Scott. 3 Building a tree on the training set Introduction. Outline. In Homewok, you ae (supposedly) Choosing a data set 2 Extacting a test set of size > 3 3 Building a tee on the taining set 4 Testing on the test set 5 Repoting the accuacy (Adapted fom Ethem Alpaydin and

More information

Quantum Fourier Transform

Quantum Fourier Transform Chapte 5 Quantum Fouie Tansfom Many poblems in physics and mathematics ae solved by tansfoming a poblem into some othe poblem with a known solution. Some notable examples ae Laplace tansfom, Legende tansfom,

More information

Modeling the pairwise key predistribution scheme in the presence of unreliable links

Modeling the pairwise key predistribution scheme in the presence of unreliable links 1 Modeling the paiwise key pedistibution scheme in the pesence of uneliable links Osman Yağan Am M. Makowski, Fellow, IEEE Abstact We investigate the secue connectivity of wieless senso netwoks unde the

More information

Limited Feedback Scheme for Device to Device Communications in 5G Cellular Networks with Reliability and Cellular Secrecy Outage Constraints

Limited Feedback Scheme for Device to Device Communications in 5G Cellular Networks with Reliability and Cellular Secrecy Outage Constraints Limited Feedback Scheme fo Device to Device Communications in 5G Cellula Netwoks with Reliability and Cellula Sececy Outage Constaints Faezeh Alavi, Nade Mokai, Mohammad R. Javan, and Kanapathippillai

More information

Math 124B February 02, 2012

Math 124B February 02, 2012 Math 24B Febuay 02, 202 Vikto Gigoyan 8 Laplace s equation: popeties We have aleady encounteed Laplace s equation in the context of stationay heat conduction and wave phenomena. Recall that in two spatial

More information

Chapter 10 Mechanism Design and Postcontractual Hidden Knowledge

Chapter 10 Mechanism Design and Postcontractual Hidden Knowledge Chapte 10 Mechanism Design and Postcontactual Hidden Knowledge 10.1 Mechanisms, Unavelling, Coss Checking, and the Revelation Pinciple A mechanism is a set of ules that one playe constucts and anothe feely

More information