More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries
|
|
- Erika Sims
- 5 years ago
- Views:
Transcription
1 Moe Efficient Oblivious Tansfe Extensions with Secuity fo Malicious Advesaies Gilad Ashaov Yehuda Lindell Thomas Schneide Michael Zohne Hebew Univesity Ba-Ilan Univesity Damstadt Damstadt EUROCRYPT 2015
2 Fom Theoy to Pactice [Yao82,Yao86,GMW87,BGW88,CCD88,RB89, ] Secue computation becomes pactical! [MNPS04,LP07,LPS08,PSSW09,KSS12,FN13,SS13,LR14,HKK+14, FJN14,NNOB12,LOS14,DZ13,DLT14,DCW13,JKO13]
3 1-out-of-2 Oblivious Tansfe Sende Receive INPUT: Sende holds two stings (x0,x1), Receive holds OUTPUT: Sende leans nothing, Receive leans x,
4 Oblivious Tansfe and Secue Computation OT is a basic ingedient in (almost) all potocols fo secue computation Potocols based on Gabled Cicuits (Yao): 1 OT pe input [LP07,LPS08,PSSW09,KSS12,FN13,SS13,LR14,HKK+14,FJN14] Potocols based on GMW: 1+ OT pe AND-gate TinyOT [NNOB12,LOS14] MiniMac potocols [DZ13,DLT14]
5 How Many OT s? The AES cicuit: Uses 2 19 OTs (when evaluated with TinyOT) The PSI cicuit: (fo b=32,n=2 16 ) Uses 2 30 OTs (when evaluated with TinyOT) Using [PeiketVaikuntanathanWates08]: 350 OTs pe second 1M (2 20 ) OTs > 45 minutes(!) 1G (2 30 ) OTs > minutes > 1 month [ChouOlandi15] OTs pe second (?)
6 OT Extensions Small amount of base OTs (secuity paamete) + (cheap) pivate-key cypto Many OTs
7 OT Extension and Related Wok Intoduced in [Beave96] Ishai, Kilian, Nissim, Petank [IKNP03] Extending Oblivious Tansfe Efficiently Optimizations semi-honest: [KK13, ALSZ13] Optimizations malicious: [La14,NNOB12,HIKN08,Nie07]
8 This Wok Efficient potocol fo OT extension, malicious advesay, based on IKNP It outpefoms all pevious constuctions Optimizations, implementation This Talk: IKNP potocol Ou potocol, its secuity (Implementation) and pefomance
9 Extending OT Efficiently 1 [IKNP03] 1 Semi-honest
10 IKNP - Idea m Many OTs expensive
11 IKNP - Idea m k Few OTs of long stings m Many OTs
12 IKNP - Implementation k k Few Shot OTs k + long messages m Many OTs m
13 In Pactice [ALSZ,CCS13] k k Few Shot OTs + long messages m Many OTs Implementation: see SCAPI
14 IKNP {x 0, x 1 } m j j j=1 = ( 1,..., m ) s = (s 1,...,s l ) k 1 s 1,...,k l s l Base OTs {k 0,k 1 } l i i i=1 Q u 1,...,u l u i = G(k i 0 ) G(k i 1 ) T * * y j 0 = x j 0 H (q j ) y j 1 = x j 1 H (q j s) y j 0, y j 1
15 When Moving to Malicious The potocol is aleady secue with espect to malicious Sende The Receive sends many messages of the same fom u 1,...,u l u i = G(k i 0 ) G(k i 1 ) Secuity against malicious Receive: we must guaantee that it uses the same value in these messages
16 {x 0, x 1 } m j j j=1 The Potocol = ( 1,..., m ) Base OTs u 1,...,u l u i = G(k i 0 ) G(k i 1 ) Q T Consistency Check of y j 0 = x j 0 H (q j ) y j 1 = x j 1 H (q j s) y j 0, y j 1
17 The Consistency Checks
18 Consistency Check u i = G(k i 0 ) G(k i 1 ) u j = G(k j 0 ) G(k j 1 )
19 Consistency Check u i = G(k i 0 ) G(k i 1 ) u j = G(k j 0 ) G(k j 1 ) u i = t i 0 t i 1 u j = t j 0 t j 1 u i u j = t i 0 t i 1 t j 0 t j 1 u i u j t i s i t j s j? = t i 1 s i t j 1 s j H(u i u j t i s i t j s j )? = H(t i 1 s i t j 1 s j )
20 Consistency Check h 0,0 i, j = H (t 0 i t 0 j ) h 0,1 i, j = H (t 0 i t 1 j ) h 1,0 i, j = H (t 1 i t 0 j ) h 1,1 i, j = H (t 1 i t 1 j ) Fo evey pai (i,j) u 1,...,u l {h 0,0,h 0,1,h 1,0,h 1,1 } i, j i, j i, j i, j i, j Alice checks that evey pai (i,j): 1 s h i,1 s j i, j? = H (u i u j s t i s i t j j ) s h i,s j s i, j? = H (t i s i t j j )
21 Does it wok? Ou check is not sound: The advesay can still send u i, u j, with i j But, it takes a isk Effectively, in ode to pass the veification of (i,j) it has to guess eithe si o sj Ou check guaantees the following: If the advesay ties to cheat with u i, u j it gets caught with pobability 1/2!
22 Consistency Check Receive cannot cheat in many messages with each cheat - one bit of s is leaked s is the secet key of the sende Solution - incease the size of s k k ρ l 2 But wait you have amount of checks Do we eally need this huge amount of checks? l
23 How many checks do we eally need?
24 How many checks do we eally need?
25 How many checks do we eally need?
26 How many checks do we eally need?
27 The needed popety: Fo any lage enough" set of bad vetices (> p=40 ), thee exists p-matching with the good vetices
28 How many checks do we eally need?
29 How many checks do we eally need? 1 2 4
30 How many checks do we eally need? 1 2 4
31 How Many Checks? The needed popety: Fo any lage enough" set of bad vetices (> p=40 ), thee exists p-matching with the good vetices We show that andom d-egula gaph satisfies the above (fo appopiate set of paametes) Fo k=128, p= base OTs, complete gaph: base OTs, d=2, checks: base OTs, d=3, checks: 531 Covet: (168 base OTs) pobability 1/2, just andom 7 checks!
32 Instantiation of H [IKNP] assumes that H is Coelation-Robust Sometimes, in ode to gain moe efficiency, potocols need some stonge popeties of H, and so it is assumed to be a Random-Oacle Coelation-obustness is much moe plausible assumption than andom-oacle We have some leakage of s, and so H is assumed to be Min-Entopy Coelation Robustness
33 Pefomance
34 Empiical Evaluation Benchmak: 2 23 =8M OTs Local scenaio (LAN): Two seves in the same oom (netwok with low latency and high bandwidth) 12 sec (190 base OTs, 380 checks) Cloud scenaio (WAN): Two seves in diffeent continents (netwok with high latency and low bandwidth) 64 sec (174 base OTs, 696 checks)
35 Compaison - LAN Setting
36 Compaison - WAN setting
37 Conclusions Moe efficient OT extension - moe efficient potocols fo MPC Optimized OT extension potocol, malicious advesay Combination of theoy and pactice Thank You!
10/04/18. P [P(x)] 1 negl(n).
Mastemath, Sping 208 Into to Lattice lgs & Cypto Lectue 0 0/04/8 Lectues: D. Dadush, L. Ducas Scibe: K. de Boe Intoduction In this lectue, we will teat two main pats. Duing the fist pat we continue the
More informationOblivious Transfer (OT) and OT Extension
Oblivious Transfer (OT) and OT Extension School on Secure Multiparty Computation Arpita Patra Arpita Patra Roadmap o Oblivious Transfer - Construction from `special PKE o OT Extension - IKNP OT extension
More informationMore Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries
More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries Gilad Asharov 1, Yehuda Lindell 2, Thomas Schneider 3, and Michael Zohner 3 1 The Hebrew University of Jerusalem, Israel
More informationInformation-Theoretic
Infomation-Theoetic Key Ageement fom Close Secets Leonid Reyzin Januay 5, 2018 IISc 1 Infomation-Theoetic Key Ageement fom Close Secets: A Suvey 0 1 assume these ae close and patially secet 2 Infomation-Theoetic
More informationLecture 18: Graph Isomorphisms
INFR11102: Computational Complexity 22/11/2018 Lectue: Heng Guo Lectue 18: Gaph Isomophisms 1 An Athu-Melin potocol fo GNI Last time we gave a simple inteactive potocol fo GNI with pivate coins. We will
More informationRevision of Lecture Eight
Revision of Lectue Eight Baseband equivalent system and equiements of optimal tansmit and eceive filteing: (1) achieve zeo ISI, and () maximise the eceive SNR Thee detection schemes: Theshold detection
More informationCut-and-Choose Yao-Based Secure Computation in the Online/Offline and Batch Settings
Cut-and-Choose Yao-Based Secure Computation in the Online/Offline and Batch Settings Yehuda Lindell Bar-Ilan University, Israel Technion Cryptoday 2014 Yehuda Lindell Online/Offline and Batch Yao 30/12/2014
More informationLecture 25: Pairing Based Cryptography
6.897 Special Topics in Cyptogaphy Instucto: Ran Canetti May 5, 2004 Lectue 25: Paiing Based Cyptogaphy Scibe: Ben Adida 1 Intoduction The field of Paiing Based Cyptogaphy has exploded ove the past 3 yeas
More informationSecret Exponent Attacks on RSA-type Schemes with Moduli N = p r q
Secet Exponent Attacks on RSA-type Schemes with Moduli N = p q Alexande May Faculty of Compute Science, Electical Engineeing and Mathematics Univesity of Padebon 33102 Padebon, Gemany alexx@uni-padebon.de
More informationLifting Private Information Retrieval from Two to any Number of Messages
Lifting Pivate Infomation Retieval fom Two to any umbe of Messages Rafael G.L. D Oliveia, Salim El Rouayheb ECE, Rutges Univesity, Piscataway, J Emails: d746@scaletmail.utges.edu, salim.elouayheb@utges.edu
More informationProbablistically Checkable Proofs
Lectue 12 Pobablistically Checkable Poofs May 13, 2004 Lectue: Paul Beame Notes: Chis Re 12.1 Pobablisitically Checkable Poofs Oveview We know that IP = PSPACE. This means thee is an inteactive potocol
More informationKey Establishment Protocols. Cryptography CS 507 Erkay Savas Sabanci University
Key Establishment Potocols Cyptogaphy CS 507 Ekay Savas Sabanci Univesity ekays@sabanciuniv.edu Key distibution poblem Secuity of the keys Even if the cyptogaphic algoithms & potocols ae cyptogaphically
More information15.081J/6.251J Introduction to Mathematical Programming. Lecture 6: The Simplex Method II
15081J/6251J Intoduction to Mathematical Pogamming ectue 6: The Simplex Method II 1 Outline Revised Simplex method Slide 1 The full tableau implementation Anticycling 2 Revised Simplex Initial data: A,
More informationPhysics: Work & Energy Beyond Earth Guided Inquiry
Physics: Wok & Enegy Beyond Eath Guided Inquiy Elliptical Obits Keple s Fist Law states that all planets move in an elliptical path aound the Sun. This concept can be extended to celestial bodies beyond
More informationA more efficient secure event signature protocol for massively multiplayer online games based on P2P Dapeng Li1, a, Liang Hu1,b, and JianFeng Chu1,c
Intenational Foum on Mechanical, Contol and Automation (IFMCA 2016) A moe efficient secue event signatue potocol fo massively multiplaye online games based on P2P Dapeng Li1, a, Liang Hu1,b, and JianFeng
More information4/18/2005. Statistical Learning Theory
Statistical Leaning Theoy Statistical Leaning Theoy A model of supevised leaning consists of: a Envionment - Supplying a vecto x with a fixed but unknown pdf F x (x b Teache. It povides a desied esponse
More informationLecture 9 and 10: Malicious Security - GMW Compiler and Cut and Choose, OT Extension
CS 294 Secure Computation February 16 and 18, 2016 Lecture 9 and 10: Malicious Security - GMW Compiler and Cut and Choose, OT Extension Instructor: Sanjam Garg Scribe: Alex Irpan 1 Overview Garbled circuits
More informationQuasi-Randomness and the Distribution of Copies of a Fixed Graph
Quasi-Randomness and the Distibution of Copies of a Fixed Gaph Asaf Shapia Abstact We show that if a gaph G has the popety that all subsets of vetices of size n/4 contain the coect numbe of tiangles one
More informationThe Substring Search Problem
The Substing Seach Poblem One algoithm which is used in a vaiety of applications is the family of substing seach algoithms. These algoithms allow a use to detemine if, given two chaacte stings, one is
More informationConcurrent Blind Signatures without Random Oracles
Concuent Blind Signatues without Random Oacles Aggelos Kiayias Hong-Sheng Zhou Abstact We pesent a blind signatue scheme that is efficient and povably secue without andom oacles unde concuent attacks utilizing
More informationExperiment I Voltage Variation and Control
ELE303 Electicity Netwoks Expeiment I oltage aiation and ontol Objective To demonstate that the voltage diffeence between the sending end of a tansmission line and the load o eceiving end depends mainly
More informationDesign and Analysis of Password-Based Key Derivation Functions
Design and Analysis of Passwod-Based Key Deivation Functions Fances F. Yao 1 and Yiqun Lisa Yin 2 1 Depatment of Compute Science City Univesity of Hong Kong Kowloon, Hong Kong Email: csfyao@cityu.edu.hk
More informationWeb-based Supplementary Materials for. Controlling False Discoveries in Multidimensional Directional Decisions, with
Web-based Supplementay Mateials fo Contolling False Discoveies in Multidimensional Diectional Decisions, with Applications to Gene Expession Data on Odeed Categoies Wenge Guo Biostatistics Banch, National
More informationExploration of the three-person duel
Exploation of the thee-peson duel Andy Paish 15 August 2006 1 The duel Pictue a duel: two shootes facing one anothe, taking tuns fiing at one anothe, each with a fixed pobability of hitting his opponent.
More informationNotes on McCall s Model of Job Search. Timothy J. Kehoe March if job offer has been accepted. b if searching
Notes on McCall s Model of Job Seach Timothy J Kehoe Mach Fv ( ) pob( v), [, ] Choice: accept age offe o eceive b and seach again next peiod An unemployed oke solves hee max E t t y t y t if job offe has
More informationDesign and Analysis of Password-Based Key Derivation Functions
Design and Analysis of Passwod-Based Key Deivation Functions 245 Fances F. Yao 1 and Yiqun Lisa Yin 2 1 Depatment of Compute Science, City Univesity of Hong Kong, Kowloon, Hong Kong csfyao@cityu.edu.hk
More informationAdditive Approximation for Edge-Deletion Problems
Additive Appoximation fo Edge-Deletion Poblems Noga Alon Asaf Shapia Benny Sudakov Abstact A gaph popety is monotone if it is closed unde emoval of vetices and edges. In this pape we conside the following
More informationExplosive Contagion in Networks (Supplementary Information)
Eplosive Contagion in Netwoks (Supplementay Infomation) Jesús Gómez-Gadeñes,, Laua Loteo, Segei N. Taaskin, and Fancisco J. Péez-Reche Institute fo Biocomputation and Physics of Comple Systems (BIFI),
More informationA Deep Convolutional Neural Network Based on Nested Residue Number System
A Deep Convolutional Neual Netwok Based on Nested Residue Numbe System Hioki Nakahaa Ehime Univesity, Japan Tsutomu Sasao Meiji Univesity, Japan Abstact A pe-tained deep convolutional neual netwok (DCNN)
More informationAnonymous return route information for onion based mix-nets
Anonymous etun oute infomation fo onion based mix-nets ABSTRACT Yoshifumi Manabe NTT Communication Science Laboatoies NTT Copoation Atsugi Kanagawa 239-0198 Japan manabeyoshifumi@labnttcojp This pape poposes
More informationStanford University CS259Q: Quantum Computing Handout 8 Luca Trevisan October 18, 2012
Stanfod Univesity CS59Q: Quantum Computing Handout 8 Luca Tevisan Octobe 8, 0 Lectue 8 In which we use the quantum Fouie tansfom to solve the peiod-finding poblem. The Peiod Finding Poblem Let f : {0,...,
More informationON THE INVERSE SIGNED TOTAL DOMINATION NUMBER IN GRAPHS. D.A. Mojdeh and B. Samadi
Opuscula Math. 37, no. 3 (017), 447 456 http://dx.doi.og/10.7494/opmath.017.37.3.447 Opuscula Mathematica ON THE INVERSE SIGNED TOTAL DOMINATION NUMBER IN GRAPHS D.A. Mojdeh and B. Samadi Communicated
More information1. Review of Probability.
1. Review of Pobability. What is pobability? Pefom an expeiment. The esult is not pedictable. One of finitely many possibilities R 1, R 2,, R k can occu. Some ae pehaps moe likely than othes. We assign
More informationRelated Rates - the Basics
Related Rates - the Basics In this section we exploe the way we can use deivatives to find the velocity at which things ae changing ove time. Up to now we have been finding the deivative to compae the
More informationClassification and Ordering of Portfolios and of New Insured Unities of Risks
Classification and Odeing of Potfolios and of New Insued Unities of Risks Augusto Feddi, Giulia Sagenti Univesity of Rome La Sapienza Depatment of Actuaial and Financial Sciences 36th Intenational ASTIN
More informationOptically selected clusters from DES science verification data and their SPTSZE signature
Optically selected clustes fom DES science veification data and thei SPTSZE signatue Collaboatos: S. Boquet, E.Rozo, B.Benson, J.Moh +SPT coll. +DES coll. Alex Sao Outline SPT-SZE and DES-SV 1) Optical
More informationPearson s Chi-Square Test Modifications for Comparison of Unweighted and Weighted Histograms and Two Weighted Histograms
Peason s Chi-Squae Test Modifications fo Compaison of Unweighted and Weighted Histogams and Two Weighted Histogams Univesity of Akueyi, Bogi, v/noduslód, IS-6 Akueyi, Iceland E-mail: nikolai@unak.is Two
More informationMultipath routing and congestion control
Multipath outing and congestion contol Fank Kelly Univesity of Cambidge (with wok of Damon Wischik, Mak Handley and Costin Raiciu, Univesity College London) Chinese Univesity of Hong Kong (Institute of
More informationTemporal-Difference Learning
.997 Decision-Making in Lage-Scale Systems Mach 17 MIT, Sping 004 Handout #17 Lectue Note 13 1 Tempoal-Diffeence Leaning We now conside the poblem of computing an appopiate paamete, so that, given an appoximation
More informationBenny Pinkas Bar Ilan University
Winter School on Bar-Ilan University, Israel 30/1/2011-1/2/2011 Bar-Ilan University Benny Pinkas Bar Ilan University 1 Extending OT [IKNP] Is fully simulatable Depends on a non-standard security assumption
More informationProvable Security in Cryptography
Povable Secuity in Cyptogaphy Thomas Baignèes EPFL http://lasecwww.epfl.ch May 29, 2007 (ve. 25) These lectue notes ae a compilation of some of my eadings while I was pepaing two lectues given at EPFL
More informationSUFFICIENT CONDITIONS FOR MAXIMALLY EDGE-CONNECTED AND SUPER-EDGE-CONNECTED GRAPHS DEPENDING ON THE CLIQUE NUMBER
Discussiones Mathematicae Gaph Theoy 39 (019) 567 573 doi:10.7151/dmgt.096 SUFFICIENT CONDITIONS FOR MAXIMALLY EDGE-CONNECTED AND SUPER-EDGE-CONNECTED GRAPHS DEPENDING ON THE CLIQUE NUMBER Lutz Volkmann
More information1 Notes on Order Statistics
1 Notes on Ode Statistics Fo X a andom vecto in R n with distibution F, and π S n, define X π by and F π by X π (X π(1),..., X π(n) ) F π (x 1,..., x n ) F (x π 1 (1),..., x π 1 (n)); then the distibution
More informationDeterministic vs Non-deterministic Graph Property Testing
Deteministic vs Non-deteministic Gaph Popety Testing Lio Gishboline Asaf Shapia Abstact A gaph popety P is said to be testable if one can check whethe a gaph is close o fa fom satisfying P using few andom
More informationMULTILAYER PERCEPTRONS
Last updated: Nov 26, 2012 MULTILAYER PERCEPTRONS Outline 2 Combining Linea Classifies Leaning Paametes Outline 3 Combining Linea Classifies Leaning Paametes Implementing Logical Relations 4 AND and OR
More informationFixed Argument Pairing Inversion on Elliptic Curves
Fixed Agument Paiing Invesion on Elliptic Cuves Sungwook Kim and Jung Hee Cheon ISaC & Dept. of Mathematical Sciences Seoul National Univesity Seoul, Koea {avell7,jhcheon}@snu.ac.k Abstact. Let E be an
More informationSome RSA-based Encryption Schemes with Tight Security Reduction
Some RSA-based Encyption Schemes with Tight Secuity Reduction Kaou Kuosawa 1 and Tsuyoshi Takagi 2 1 Ibaaki Univesity, 4-12-1 Nakanausawa, Hitachi, Ibaaki, 316-8511, Japan kuosawa@cis.ibaaki.ac.jp 2 Technische
More informationCALCULATING THE NUMBER OF TWIN PRIMES WITH SPECIFIED DISTANCE BETWEEN THEM BASED ON THE SIMPLEST PROBABILISTIC MODEL
U.P.B. Sci. Bull. Seies A, Vol. 80, Iss.3, 018 ISSN 13-707 CALCULATING THE NUMBER OF TWIN PRIMES WITH SPECIFIED DISTANCE BETWEEN THEM BASED ON THE SIMPLEST PROBABILISTIC MODEL Sasengali ABDYMANAPOV 1,
More information763620SS STATISTICAL PHYSICS Solutions 2 Autumn 2012
763620SS STATISTICAL PHYSICS Solutions 2 Autumn 2012 1. Continuous Random Walk Conside a continuous one-dimensional andom walk. Let w(s i ds i be the pobability that the length of the i th displacement
More informationRotational Motion. Lecture 6. Chapter 4. Physics I. Course website:
Lectue 6 Chapte 4 Physics I Rotational Motion Couse website: http://faculty.uml.edu/andiy_danylov/teaching/physicsi Today we ae going to discuss: Chapte 4: Unifom Cicula Motion: Section 4.4 Nonunifom Cicula
More informationAQI: Advanced Quantum Information Lecture 2 (Module 4): Order finding and factoring algorithms February 20, 2013
AQI: Advanced Quantum Infomation Lectue 2 (Module 4): Ode finding and factoing algoithms Febuay 20, 203 Lectue: D. Mak Tame (email: m.tame@impeial.ac.uk) Intoduction In the last lectue we looked at the
More informationLecture 28: Convergence of Random Variables and Related Theorems
EE50: Pobability Foundations fo Electical Enginees July-Novembe 205 Lectue 28: Convegence of Random Vaiables and Related Theoems Lectue:. Kishna Jagannathan Scibe: Gopal, Sudhasan, Ajay, Swamy, Kolla An
More informationRadha Poovendran Network Security Lab University of Washington
A Gaph Theoetic Famewok fo Peventing the Womhole Attack in Wieless Senso Netwoks Radha Poovendan Netwok Secuity Lab Univesity of Washington Womholes Hope fo time tavel Womhole: A space-time distotion that
More informationON INDEPENDENT SETS IN PURELY ATOMIC PROBABILITY SPACES WITH GEOMETRIC DISTRIBUTION. 1. Introduction. 1 r r. r k for every set E A, E \ {0},
ON INDEPENDENT SETS IN PURELY ATOMIC PROBABILITY SPACES WITH GEOMETRIC DISTRIBUTION E. J. IONASCU and A. A. STANCU Abstact. We ae inteested in constucting concete independent events in puely atomic pobability
More informationEstimation of the Correlation Coefficient for a Bivariate Normal Distribution with Missing Data
Kasetsat J. (Nat. Sci. 45 : 736-74 ( Estimation of the Coelation Coefficient fo a Bivaiate Nomal Distibution with Missing Data Juthaphon Sinsomboonthong* ABSTRACT This study poposes an estimato of the
More informationRELIABILITY is an important concept in the design
Poceedings of the Wold Congess on Engineeing 0 Vol I WCE 0, July -, 0, London, U.K. Reliability Measues in Ciculant Netwok *Inda Rajasingh, Bhaati Rajan, and R. Sundaa Rajan Abstact Reliability and efficiency
More informationA Bijective Approach to the Permutational Power of a Priority Queue
A Bijective Appoach to the Pemutational Powe of a Pioity Queue Ia M. Gessel Kuang-Yeh Wang Depatment of Mathematics Bandeis Univesity Waltham, MA 02254-9110 Abstact A pioity queue tansfoms an input pemutation
More informationIEEE/ACM TRANSACTIONS ON NETWORKING, VOL. X, NO. X,
IEEE/ACM TRANSACTIONS ON NETWORING, VOL. X, NO. X, 016 1 Wieless senso netwoks unde the andom paiwise key pedistibution scheme: Can esiliency be achieved with small key ings? Osman Yağan, Membe, IEEE,
More informationThe Iterated Random Function Problem,
The Iteated Random Function Poblem, Ritam Bhaumik 1, ilanjan Datta 2, Avijit Dutta 1, icky Mouha 3,4, and Midul andi 1 1 Indian Statistical Institute, Kolkata, India. 2 Indian Institute of Technology,
More informationOn the ratio of maximum and minimum degree in maximal intersecting families
On the atio of maximum and minimum degee in maximal intesecting families Zoltán Lóánt Nagy Lale Özkahya Balázs Patkós Máté Vize Septembe 5, 011 Abstact To study how balanced o unbalanced a maximal intesecting
More information7.2. Coulomb s Law. The Electric Force
Coulomb s aw Recall that chaged objects attact some objects and epel othes at a distance, without making any contact with those objects Electic foce,, o the foce acting between two chaged objects, is somewhat
More informationInformation Retrieval Advanced IR models. Luca Bondi
Advanced IR models Luca Bondi Advanced IR models 2 (LSI) Pobabilistic Latent Semantic Analysis (plsa) Vecto Space Model 3 Stating point: Vecto Space Model Documents and queies epesented as vectos in the
More informationBroadcasting in Undirected Ad hoc Radio Networks
Boadcasting in Undiected Ad hoc Radio Netwoks aiusz R. Kowalski Instytut Infomatyki Uniwesytet Waszawski Banacha 2, 02-097 Waszawa, Poland daek@mimuw.edu.pl Andzej Pelc épatement d Infomatique Univesité
More informationFractional Zero Forcing via Three-color Forcing Games
Factional Zeo Focing via Thee-colo Focing Games Leslie Hogben Kevin F. Palmowski David E. Robeson Michael Young May 13, 2015 Abstact An -fold analogue of the positive semidefinite zeo focing pocess that
More informationChemical Engineering 412
Chemical Engineeing 41 Intoductoy Nuclea Engineeing Lectue 16 Nuclea eacto Theoy III Neuton Tanspot 1 One-goup eacto Equation Mono-enegetic neutons (Neuton Balance) DD φφ aa φφ + ss 1 vv vv is neuton speed
More informationElementary Statistics and Inference. Elementary Statistics and Inference. 11. Regression (cont.) 22S:025 or 7P:025. Lecture 14.
Elementay tatistics and Infeence :05 o 7P:05 Lectue 14 1 Elementay tatistics and Infeence :05 o 7P:05 Chapte 10 (cont.) D. Two Regession Lines uppose two vaiables, and ae obtained on 100 students, with
More informationCryptography. Primitives and Protocols. Aggelos Kiayias
P1 P2 P3 E E E IV C1 C2 C3 Aggelos Kiayias Cyptogaphy Pimitives and Potocols Based on notes by G. Panagiotakos, S. Pehlivanoglu, J. Todd, K. Samai, T. Zachaias and H.S. Zhou CONTENTS 1 Contents 1 Intoduction
More informationComputational Methods of Solid Mechanics. Project report
Computational Methods of Solid Mechanics Poject epot Due on Dec. 6, 25 Pof. Allan F. Bowe Weilin Deng Simulation of adhesive contact with molecula potential Poject desciption In the poject, we will investigate
More informationMath 301: The Erdős-Stone-Simonovitz Theorem and Extremal Numbers for Bipartite Graphs
Math 30: The Edős-Stone-Simonovitz Theoem and Extemal Numbes fo Bipatite Gaphs May Radcliffe The Edős-Stone-Simonovitz Theoem Recall, in class we poved Tuán s Gaph Theoem, namely Theoem Tuán s Theoem Let
More informationCheetah: Fast Graph Kernel Tracking on Dynamic Graphs
Cheetah: Fast Gaph Kenel Tacking on Dynamic Gaphs Pesente: Liangyue Li Joint wok with Hanghang Tong (ASU), Yanghua Xiao (Fudan), Wei Fan (Baidu) 1 Aizona State Univesity Gaphs ae Eveywhee Collaboation
More informationA Converse to Low-Rank Matrix Completion
A Convese to Low-Rank Matix Completion Daniel L. Pimentel-Alacón, Robet D. Nowak Univesity of Wisconsin-Madison Abstact In many pactical applications, one is given a subset Ω of the enties in a d N data
More informationHW Solutions # MIT - Prof. Please study example 12.5 "from the earth to the moon". 2GmA v esc
HW Solutions # 11-8.01 MIT - Pof. Kowalski Univesal Gavity. 1) 12.23 Escaping Fom Asteoid Please study example 12.5 "fom the eath to the moon". a) The escape velocity deived in the example (fom enegy consevation)
More informationA Simple Model of Communication APIs Application to Dynamic Partial-order Reduction
Simple Model of Communication PIs pplication to Dynamic Patial-ode Reduction Cistian Rosa Stephan Mez Matin Quinson VOCS 2010 22/09/2010 1 / 18 Motivation Distibuted lgoithms ae had to get ight: lack of
More informationInteraction of Feedforward and Feedback Streams in Visual Cortex in a Firing-Rate Model of Columnar Computations. ( r)
Supplementay mateial fo Inteaction of Feedfowad and Feedback Steams in Visual Cotex in a Fiing-Rate Model of Columna Computations Tobias Bosch and Heiko Neumann Institute fo Neual Infomation Pocessing
More informationLikelihood vs. Information in Aligning Biopolymer Sequences. UCSD Technical Report CS Timothy L. Bailey
Likelihood vs. Infomation in Aligning Biopolyme Sequences UCSD Technical Repot CS93-318 Timothy L. Bailey Depatment of Compute Science and Engineeing Univesity of Califonia, San Diego 1 Febuay, 1993 ABSTRACT:
More informationTESTING THE VALIDITY OF THE EXPONENTIAL MODEL BASED ON TYPE II CENSORED DATA USING TRANSFORMED SAMPLE DATA
STATISTICA, anno LXXVI, n. 3, 2016 TESTING THE VALIDITY OF THE EXPONENTIAL MODEL BASED ON TYPE II CENSORED DATA USING TRANSFORMED SAMPLE DATA Hadi Alizadeh Noughabi 1 Depatment of Statistics, Univesity
More informationSection 5.3 Arrangements and Selections with repetitions
Section 5.3 Aangements and Selections with epetitions Example 1: The numbe of aangements of BANANA? Thm 1: Given n objects, 1 of type 1, 2 of type 2,..., m of type m, with n = 1 + 2 + m, then the numbe
More informationHOW TO TEACH THE FUNDAMENTALS OF INFORMATION SCIENCE, CODING, DECODING AND NUMBER SYSTEMS?
6th INTERNATIONAL MULTIDISCIPLINARY CONFERENCE HOW TO TEACH THE FUNDAMENTALS OF INFORMATION SCIENCE, CODING, DECODING AND NUMBER SYSTEMS? Cecília Sitkuné Göömbei College of Nyíegyháza Hungay Abstact: The
More informationOn the ratio of maximum and minimum degree in maximal intersecting families
On the atio of maximum and minimum degee in maximal intesecting families Zoltán Lóánt Nagy Lale Özkahya Balázs Patkós Máté Vize Mach 6, 013 Abstact To study how balanced o unbalanced a maximal intesecting
More informationST 501 Course: Fundamentals of Statistical Inference I. Sujit K. Ghosh.
ST 501 Couse: Fundamentals of Statistical Infeence I Sujit K. Ghosh sujit.ghosh@ncsu.edu Pesented at: 2229 SAS Hall, Depatment of Statistics, NC State Univesity http://www.stat.ncsu.edu/people/ghosh/couses/st501/
More informationOn decompositions of complete multipartite graphs into the union of two even cycles
On decompositions of complete multipatite gaphs into the union of two even cycles A. Su, J. Buchanan, R. C. Bunge, S. I. El-Zanati, E. Pelttai, G. Rasmuson, E. Spaks, S. Tagais Depatment of Mathematics
More informationMATH 415, WEEK 3: Parameter-Dependence and Bifurcations
MATH 415, WEEK 3: Paamete-Dependence and Bifucations 1 A Note on Paamete Dependence We should pause to make a bief note about the ole played in the study of dynamical systems by the system s paametes.
More informationAP Physics - Coulomb's Law
AP Physics - oulomb's Law We ve leaned that electons have a minus one chage and potons have a positive one chage. This plus and minus one business doesn t wok vey well when we go in and ty to do the old
More informationAuthenticated Garbling and Efficient Maliciously Secure Two-Party Computation
Authenticated Garbling and Efficient Maliciously Secure Two-Party Computation Xiao Wang University of Maryland wangxiao@cs.umd.edu Samuel Ranellucci University of Maryland George Mason University samuel@umd.edu
More informationDo dummies pay off? Limits of dummy traffic protection in anonymous communications
Do dummies pay off? Limits of dummy taffic potection in anonymous communications Simon Oya 1, Camela Toncoso 2, and Fenando Péez-González 12 1 Signal Theoy and Communications Dept, Univesity of Vigo, Spain,
More informationWyner s Wire- Tap Channel, Forty Years Later
Wyne s Wie- Tap Channel, Foty Yeas Late Leonid Reyzin These slides ae a supeset of the talks given at: - Theoy of Cyptogaphy Confeence on Mach 24, 2015 (pats I and II) - École Nomale Supéieue Cypto Semina
More informationEnergy Savings Achievable in Connection Preserving Energy Saving Algorithms
Enegy Savings Achievable in Connection Peseving Enegy Saving Algoithms Seh Chun Ng School of Electical and Infomation Engineeing Univesity of Sydney National ICT Austalia Limited Sydney, Austalia Email:
More informationStructure of glasses and melts
Stuctue of glasses and melts Matin Wilding Institute of Mathematical and Physical Sciences, Univesity of Wales, Abeystwyth, Ceedigion, SY3 3BZ Chis Benmoe, Intense Pulsed Neuton Souce and the Advanced
More informationLET a random variable x follows the two - parameter
INTERNATIONAL JOURNAL OF MATHEMATICS AND SCIENTIFIC COMPUTING ISSN: 2231-5330, VOL. 5, NO. 1, 2015 19 Shinkage Bayesian Appoach in Item - Failue Gamma Data In Pesence of Pio Point Guess Value Gyan Pakash
More informationConspiracy and Information Flow in the Take-Grant Protection Model
Conspiacy and Infomation Flow in the Take-Gant Potection Model Matt Bishop Depatment of Compute Science Univesity of Califonia at Davis Davis, CA 95616-8562 ABSTRACT The Take Gant Potection Model is a
More informationPhysics 211: Newton s Second Law
Physics 211: Newton s Second Law Reading Assignment: Chapte 5, Sections 5-9 Chapte 6, Section 2-3 Si Isaac Newton Bon: Januay 4, 1643 Died: Mach 31, 1727 Intoduction: Kinematics is the study of how objects
More informationCryptography. Lecture 11. Arpita Patra
Cptogaph Lectue Apita Pata Geneic Results in PK Wold CPA Secuit CCA Secuit Bit Encption Man-bit Encption Bit Encption Man-Bit Encption Π CPA-secue KEM Π SKE COA-secue SKE Π Hb CPA-secue Π CCA-secue KEM
More informationarxiv:physics/ v2 [physics.soc-ph] 11 Mar 2005
Heide Balance in Human Netwoks P. Gawoński and K. Ku lakowski axiv:physics/5385v2 [physics.soc-ph] 11 Ma 25 Depatment of Applied Compute Science, Faculty of Physics and Applied Compute Science, AGH Univesity
More informationE E E. Aggelos Kiayias. Cryptography. Primitives and Protocols. Based on notes by S. Pehlivanoglu, J. Todd, K. Samari, T. Zacharias and H.S.
P1 P2 P3 E E E IV C1 C2 C3 Aggelos Kiayias Cyptogaphy Pimitives and Potocols Based on notes by S. Pehlivanoglu, J. Todd, K. Samai, T. Zachaias and H.S. Zhou CONTENTS 1 Contents 1 Intoduction 4 1.1 Flipping
More informationCSCE 478/878 Lecture 4: Experimental Design and Analysis. Stephen Scott. 3 Building a tree on the training set Introduction. Outline.
In Homewok, you ae (supposedly) Choosing a data set 2 Extacting a test set of size > 3 3 Building a tee on the taining set 4 Testing on the test set 5 Repoting the accuacy (Adapted fom Ethem Alpaydin and
More informationQuantum Fourier Transform
Chapte 5 Quantum Fouie Tansfom Many poblems in physics and mathematics ae solved by tansfoming a poblem into some othe poblem with a known solution. Some notable examples ae Laplace tansfom, Legende tansfom,
More informationModeling the pairwise key predistribution scheme in the presence of unreliable links
1 Modeling the paiwise key pedistibution scheme in the pesence of uneliable links Osman Yağan Am M. Makowski, Fellow, IEEE Abstact We investigate the secue connectivity of wieless senso netwoks unde the
More informationLimited Feedback Scheme for Device to Device Communications in 5G Cellular Networks with Reliability and Cellular Secrecy Outage Constraints
Limited Feedback Scheme fo Device to Device Communications in 5G Cellula Netwoks with Reliability and Cellula Sececy Outage Constaints Faezeh Alavi, Nade Mokai, Mohammad R. Javan, and Kanapathippillai
More informationMath 124B February 02, 2012
Math 24B Febuay 02, 202 Vikto Gigoyan 8 Laplace s equation: popeties We have aleady encounteed Laplace s equation in the context of stationay heat conduction and wave phenomena. Recall that in two spatial
More informationChapter 10 Mechanism Design and Postcontractual Hidden Knowledge
Chapte 10 Mechanism Design and Postcontactual Hidden Knowledge 10.1 Mechanisms, Unavelling, Coss Checking, and the Revelation Pinciple A mechanism is a set of ules that one playe constucts and anothe feely
More information