Pairing Inversion via Non-degenerate Auxiliary Pairings

Size: px
Start display at page:

Download "Pairing Inversion via Non-degenerate Auxiliary Pairings"

Transcription

1 Paiing Invesion via Non-degeneate Auxiliay Paiings Seunghwan Chang 1, Hoon Hong 2, Eunjeong Lee 1, and Hyang-Sook Lee 3 1 Institute of Mathematical Sciences, Ewha Womans Univesity, Seoul, S. Koea schang@ewha.ac.k, ejlee127@ewha.ac.k 2 Depatment of Mathematics, Noth Caolina State Univesity, Raleigh, USA hong@ncsu.edu 3 Depatment of Mathematics, Ewha Womans Univesity, Seoul, S. Koea hsl@ewha.ac.k Abstact. The secuity of paiing-based cyptosystems is closely elated to the difficulty of the paiing invesion poblem(pi). In this pape, we discuss the difficulty of paiing invesion on the genealized ate paiings of Vecauteen. Fist, we povide a simple appoach fo PI by genealizing and simplifying Kanayama-Okamotos appoach; ou appoach involves modifications of exponentiation invesion(ei) and Mille invesion(mi), via an auxiliay paiing. Then we povide a complexity of the modified MI, showing that the complexity depends on the sum-nom of the intege vecto defining the auxiliay paiing. Next, we obseve that degeneate auxiliay paiings expect to make modified EI hade. We povide a sufficient condition on the intege vecto, in tems of its max nom, so that the coesponding auxiliay paing is non-degeneate. Finally, we define an infinite set of cuve paametes, which includes those of typical paiing fiendly cuves, and we show that, within those paametes, PI of abitaily given genealized ate paiing can be educed to modified EI in polynomial time. 1 Intoduction Paiings [1, 9, 12, 13, 18, 25, 29] play an impotant ole in cyptogaphy [2 4, 14, 27]. The secuity of paiing-based cyptosystems is closely elated to the difficulty of the paiing invesion poblem (PI): fo a given paiing,, an agument Q(o P ) and a paiing value z, compute the othe agument P (o Q) such that z = P, Q. PI on elliptic cuves was fist ecognized by Veheul [26] as a potentially had cyptogaphic computational poblem. Satoh [23, 24] consideed the polynomial intepolations to find the x-coodinate of P fo given Q and z, poviding evidences that suppot the difficulty of PI. Galbaith-Hess-Vecauteen [11] defined PI fomally and discussed two appoaches fo PI. (1) Ty to solve PI in a single step. (2) Solve PI by inveting exponentiation fist and then inveting Mille step - Since paiings on elliptic cuves ae computed in two steps, namely the Mille step and the exponentiation step, they suggested inveting them in evese ode to solve PI, i.e. exponentiation invesion(ei) and then Mille invesion (MI).

2 They discussed the possibilities on the eduction of MI to PI (pecisely FAPI-1) vice vesa fo Tate-Lichtenbaum paiing afte the obsevation that the EI fo Tate-Lichtenbaum paiing can be defined as etuning a andom value satisfying its exponentiation elation, which is vey easy. They emaked that the situation, of EI, is quite diffeent fo the ate paiing. Recently, [17] showed that, when a peimage of Tate-Lichtenbaum paiing was esticted, its PI was equivalent to the PI of the ate paiing. Kanayama-Okamoto [15] studied the PI on the ate i paiings and suggested a cleve idea fo a eduction of PI to EI. In this pape, inspied by significant pevious woks [26, 22 24, 11, 20, 28, 15, 7], we povide futhe contibutions towad undestanding the difficulty of paiing invesion. In ode to povide the context and the motivation fo the main contibutions of this pape, we fist eview infomally some of the pevious woks paticula [11, 15] on PI by ecasting them fo the genealized ate paiing of Vecauteen [25], which cuently is one of the most geneal constuctions of cyptogaphic paiings. Fo a given intege vecto ε, the genealized ate paiing a ε : G 2 G 1 G 3 takes two points P G 1, Q G 2 and poduces a value z. It is caied out in two steps: Mille step (M) [19] and Exponentiation step (E). 1. [M ε ] γ ε = Z ε (Q, P ) 2. [E ε ] z = γε L whee Z ε is a cetain ational function depending on the intege vecto ε and L is a cetain natual numbe. Depending on the choice of ε, one gets a diffeent paiing (see [25] and Section 2.2 fo details). Paiing invesion poblems ae defined in two types [11]. In this pape, we conside one of them (FAPI-1): fo given Q G 2, z G 3, find P such that z = a ε (Q, P ). Following [11, 15], we conside the two-step appoach i.e., fist inveting the exponentiation step (EI) and then inveting the Mille step (MI). Fo the genealized ate paiings, thee is a subtlety in the fomulation of EI, as obseved fo example in [17], due to the fact that, fo a fixed Q, the map a ε (Q, ) : G 1 G 3 is one-to-one, unlike fo Tate-Lichtenbaum paiing. One could think of thee possible fomulations of EI. Fo a given L and z, find F1: any γ such that z = γ L. (γ might not be γ ε ) F2: all γ s such that z = γ L. (one of them will be γ ε ) F3: the ight γ such that z = γ L. ( γ = γ ε ) In [15], it is not stated explicitly which fomulation of EI is intended. Fom the context, we conclude that it cannot be F1. If it wee F1, then we get into a stange conclusion that PI could be solvable in polynomial time since F1 is obviously solvable in polynomial time (due to fact that L is elatively pime to the ode of z) and [15] showed that PI can be educed to EI. We also conclude that it cannot be F2 eithe. If it wee F2, then one would have to cay out MI fo each of the exponentially many γ s, contadicting the claim of [15] that PI can be educed to EI in polynomial time. Hence, the only fomulation of EI which is consistent with the claim of [15] is F3. Theefoe, we will use F3 as the fomulation of EI. Summaizing, we have the following fomulation of PI :

3 1. [EI ε ] Find the ight γ ε fom the set {γ : z = γ L } 2. [MI ε ] Find P fom γ ε = Z ε (Q, P ) In [15], Kanayama-Okamoto poposed an inteesting modification of the natual appoach fo PI, which amounts to the following: 1. [Choice] Choose an intege vecto e (which might be diffeent fom ε), giving ise to anothe genealized ate paiing, which we will call an auxiliay paiing, which may o may not be non-degeneate. 2. [EI ε,e ] Find the ight γ e by caying out seveal elated exponentiation invesions (See Section 2.3). 3. [MI e ] Find P fom γ e = Z e (Q, P ) Fom now on, we will call EI ε,e and MI e as the modified exponentiation invesion and the modified Mille invesion, espectively. If e = ε, then EI ε,e and MI e ae exactly same as EI ε and MI ε. The key idea is to choose an intege vecto e which may be diffeent fom ε, but which may be bette fo PI. Specifically, Kanayama- Okamoto suggested that the intege vecto e is chosen fom eithe coefficients of cyclotomic polynomials o (1,..., 1), because such e yields Z e of low degee, making MI e easy. This concludes the infomal eview of the pevious woks on PI (ecast fo the genealized ate paiing). Finally we ae eady to descibe infomally the main contibutions of this pape. 1. In Section 3, we povide anothe appoach fo paiing invesion (Appoach 1), by simplifying the step EI ε,e of Kanayama-Okamoto s appoach. The simplicity of the poposed appoach significantly facilitates the subsequent investigation. We pove its coectness (Theoem 1), and then compae the two appoaches with espect to the seach spaces(theoem 2). 2. In Section 4, we povide a complexity analysis of MI e (Theoem 3). It essentially says that the complexity is bounded by e 2 1 whee e 1 stands fo the sum nom of the chosen intege vecto e. Hence, in ode to educe the complexity of MI e, one needs to choose e with small sum nom. 3. In Section 5, we povide an incemental esult towad the undestanding of the complexity of EI ε,e. We begin by obseving that the degeneacy of the auxiliay paiing has a potential impact on the difficulty of EI ε,e (Poposition 1 and Remak 2). Moe pecisely, if the auxiliay paing defined by the choice of e is degeneate, then the exponential elation in EI ε,e step becomes independent of the input z, that is, the exponential elation does not captue any infomation about the input. As a esult, EI ε,e is expected to be hade than EI ε, when such e is chosen. If the auxiliay paiing coesponding to e is non-degeneate, then EI ε,e is likely as had as EI ε. Hence, in ode to educe the complexity of EI ε,e, one bette choose e such that the auxiliay paing defined by e is non-degeneate. We povide a sufficient condition on e, in tems of the max nom of e, so that the paiing coesponding to e is non-degeneate (Theoem 4).

4 4. In Section 6, we discuss when paiing invesion can be educed to modified exponentiation invesion EI ε,e. This was inspied by Kanayama-Okamoto [15] whee paiing invesion was educed to seveal (unmodified) exponentiation invesions. Specifically we ae looking fo a condition on e so that MI e is easy. As explained above, we need to find small e. Thus, one might be natually tempted to choose the intege vecto e fom eithe coefficients of cyclotomic polynomials o (1,..., 1). Howeve such e makes the coesponding auxiliay paiing degeneate. Hence the modified exponentiation invesion EI ε,e is expected to be had. Theefoe, in ode to meaningfully educe paiing invesion to modified exponentiation invesion, one needs find e such that it is small and the coesponding auxiliay paiing is non-degeneate. In this section, we investigate the existence of such e in vaious cases. In paticula, we define an infinite set of cuve paametes (Definition 1), which includes those of typical paiing fiendly cuves as in Table 1 of [10] and show that, within those paametes, paiing invesion of an abitaily given paiing can be educed to modified exponentiation invesion in polynomial time (Theoem 5). We futhemoe povide tighte uppe bounds on the numbe of bit opeations needed by such eductions fo seveal concete cases (Table 1). 2 Peliminaies In this section, we biefly eview elliptic cuves, the genealized ate paiings due to Vecauteen [25] and an appoach to paiing invesion due to Kanayama- Okamoto [15]. We encouage all the eades to skim though them, as the notations and the assumptions theein will be extensively used thoughout the subsequent sections. 2.1 Elliptic cuves We fix the basic notations fo elliptic cuves. Let q be a powe of a pime and let be a pime such that gcd(q, ) = 1. Let k be the embedding degee defined as the multiplicative ode of q in F, denoted by k = od (q), and L = (q k 1)/. Let E be an elliptic cuve defined ove F q such that #E(F q ). Let G 1 = E[] ke(π q [1]) and G 2 = E[] ke(π q [q]) whee π q : E E denotes the q-powe Fobenius endomophism. 2.2 Vecauteen s genealized ate paiings We eview the genealized ate paiings [25]. Let μ = { } u F : u = 1. Let q k f n,q, l P,Q and v P be the nomalized functions with divisos n (Q) ([n] Q) (n 1) (O), (P )+(Q)+( (P + Q)) 3 (O) and (P )+( P ) 2 (O) espectively, whee O denotes the identity element of the goup E. Let ( ) g (X) = X k 1, λ ε (X) = ε j X j g (X) λε (X), W ε (X) = det g (X) λ ε(x)

5 fo ε = (ε 0,..., ε ) Z k. Vecauteen [25] defined a map a ε : G 2 G 1 μ such that, fo all P G 1, Q G 2, a ε (Q, P ) = Z ε (Q, P ) L, Z ε (Q, P ) = whee k 2 f εj,q j Q(P ) l εj q j Q, (ε j+1 q j+1 + +ε q )Q v (εj q j + +ε q )Q and showed that it is a well-defined bilinea map if λ ε (q), 2 λ ε (q) and 2 g (q). He also showed that a ε is non-degeneate if and only if 2 W ε (q). Fom now on, we will assume λ ε (q), 2 λ ε (q), 2 g (q) and 2 W ε (q), so that a ε is a non-degeneate paiing. We will also assume, without losing geneality, that gcd (ε 0,..., ε ) = 1 because the vecto ε is selected as small as possible fo faste paiing computation. In summay, Vecauteen poposed the following appoach fo paiings. In: P G 1, Q G 2 Out: z = a ε (Q, P ) 1. [M ε ] γ ε Z ɛ (P, Q) 2. [E ε ] z γɛ L (P ) 2.3 Kanayama-Okamoto s appoach to paiing invesion We eview an appoach fo paiing invesion due to Kanayama-Okamoto [15]. They poposed the following appoach and poved its coectness. In: Q G 2, z μ Out: P G 1 such that z = a ɛ (Q, P ). 1. [Choice] Choose e Z k such that λ e (q) and gcd (e 0,..., e ) = [EI ε,e ] Find γ e by caying out the following. (a) T j em ( q j, ), the emainde of q j modulo (b) a j od (T j ) (c) n j T a j j 1 (d) N j gcd(t aj j 1, q k 1) (e) d j a j 1 h=0 T aj 1 h j q jh (f) c j em(d j, N j ) (g) c j c 1 j mod. (h) U e 1 e jt j (i) U ε 1 ε jt j (j) ψ ε U ε ε jc j n j (k) ψ ε ψε 1 mod. (l) Find the ight τ such that τ L = z ψ ε (m) Find the ight α j such that αj L = τ Lc j nj

6 (n) γ e τ Ue αe j j 3. [MI e ] Find P fom γ e = Z e (P, Q).. By the ight τ and the ight α j, we mean the ones satisfying the condition τ = f,q (P ) and α j = f Tj,Q(P ) fo some P G 1. Remak 1. The above desciption is a bit diffeent fom the oiginal one by Kanayama-Okamoto [15] in thee ways. αe j j τ Ue They used the quantity fo γ e, which is the ecipocal of the quantity shown above. We changed it in the cuent fom, because it is moe consistent with the notation used in Vecauteen s genealized paiings [25]. They elaboated thei idea fo ate i paiing (coesponding to a paticula class of ε) and indicated that it could be extended to the genealized ate paiing of Vecauteen [25] (coesponding to a geneal class of ε). Indeed, such an extension is staightfowad. The above desciption allows abitay ε. They elaboated thei idea fo paticula choices of e such as coefficients of cyclotomic polynomials o (1,..., 1). The extension to abitay e is also staightfowad. The above desciption allows abitay e. 3 A Simple Appoach fo Paing Invesion In this section, we descibe an appoach fo inveting the genealized ate paiing of Vecauteen (Appoach 1). We will use the notations intoduced in Section 2.2. Compaing to Kanayama-Okamoto s appoach (See Section 2.3), one sees that the modified exponentiation invesion step EI ε,e is simplified. The simplicity of the poposed appoach facilitates the subsequent investigation. We pove its coectness (Theoem 1). Then we compae the simple appoach with Kanayama- Okamoto s appoach (Theoem 2). We let a n b abbeviate a b (mod n) fo simplicity. Appoach 1 Paiing Invesion In: Q G 2, z μ Out: P G 1 such that z = a ε (Q, P ). 1. [Choice] Choose e Z k such that λ e (q) and gcd (e 0,..., e ) } = [EI ε,e ] Find the ight γ e fom Γ ε,e,z = {γ F q : γ L = z δε,e, whee k δ ε,e w e /w ε and w η = 1 W η (q). 3. [MI e ] Find P fom γ e = Z e (P, Q). By the ight γ e, we mean the ones satisfying the condition γ e = Z e (Q, P ) fo some P G 1. Theoem 1 (Coectness). If γ e = Z e (Q, P ), then γ L e = z δε,e.

7 Poof. Recall that γe L = a e (Q, P ) and z = a ε (Q, P ). Hence we need to show that a e (Q, P ) = a ε (Q, P ) δε,e. Recall, fom the poof of Theoem 4 in [25], that and thus f q,q (P ) L λe(q) g (q)( g(q) ) 1 = f q,q (P ) Lλ e (q) a e (Q, P ). ( a e (Q, P ) = f q,q (P ) L λe(q) g (q)( g(q) ) 1 ) ( λ e (q) = f q,q (P ) L ( g(q) ) 1 w e ). Similaly, one gets Thus, a ε (Q, P ) = f q,q (P ) L ( ( g(q) ) 1 w ε ). a e (Q, P ) = f q,q (P ) L ( ( g(q) ) 1 w e ) = a ε (Q, P ) wew 1 ε = a ε (Q, P ) δε,e. One may wonde how the above appoach compaes to the appoach of Kanayama-Okamoto. Since the MI e steps ae the same, we only need to compae EI ε,e steps. Since EI ε,e is essentially a seach poblem (finding the ight elements), we need to compae the seach spaces. Recall that the seach space of Appoach 1 is Γ ε,e,z when bute-foce seach is used. Likewise, the seach space fo the appoach of Kanayama-Okamoto (see Section 2.3) amounts to Θ ε,e,z = { τ Ue αe j j : τ, α j F q k α L j = τ Lc j nj τ L = z ψ ε The following theoem states that the two bute-foce seach spaces ae the same. Theoem 2. We have Γ ε,e,z = Θ ε,e,z. Poof. We will pove the inclusion in both diections. Claim 1: Θ ε,e,z Γ ε,e,z Let τ F q k and α j F q k be such that α L j = τ Lc j nj and τ L = z ψ ε. Let θ = θ L = τ Ue αe j j ( τ U e αe j j. We need to show that θ L = z δε,e. Note ) L = τ LU e αlej j = τ LU e τ Le jc j n j } = τ L(Ue ejc j nj) = τ Lψe As z = τ Lψε, we have θ L = z ψeψ ε. Since Ze (Q, P ) Θ e,z as [15] showed, we also have Z e (Q, P ) L = z ψeψ ε. Recall Ze (Q, P ) L = a ε (Q, P ) wew ε = z wew ε. Thus, θ L = z ψ eψ ε = Ze (Q, P ) L = a ε (Q, P ) wew ε = z w ew ε = z δ ε,e.

8 Claim 2: Γ ε,e,z Θ ε,e,z Let γ F be such that γ L = z δε,e. We need to find τ and α q k j such that α L j = τ Lc j n j and τ L = z ψ ε and γ = τ Ue j=1 αe j j αe j j. Let P G 1 and Q G 2 be such that z = a ε (Q, P ). Such P, Q exist because the map G 1 μ, P a ε (Q, P ) is bijective if Q G 2 {O}. Let τ = f,q (P ) and α j = f Tj,Q(P ) τ and γ = Ue. Let h Z k be such that h je j = 1. Such h exists because gcd (e 0,..., e ) = 1. Let τ = τ, α j = α j ( γ γ ) hj Then we have τ L = τ L = z ψ ε ( ( ) ) hj L γ αj L = α j = α j L γ γ = γ γ γ = τ U e αej j ( γ γ ) Lhj = α L j ( ) hje γ j = γ ( z δ ε,e z δ ε,e τ U e ( ( α γ j γ 4 Complexity of Modified Mille Invesion ) hj = τ Lc j n j = τ Lc j n j ) hj ) ej = τ U e j=1 αej j In this section, we povide a bit-complexity of the modified Mille invesion step MI e. It essentially says that, when q and k ae fixed, the complexity is bounded by e 2 1 whee e 1 stands fo the sum nom of the intege vecto e. Hence in ode to educe the complexity of MI e, one needs to choose e with small sum nom. This esult can be viewed as an adaptation of the esults/ideas [11] to the genealized ate paiing. Theoem 3 (Complexity of MI e ). Thee exists an algoithm fo MI e equiing at most 2 8 e 2 1 k 2 (log 2 q) 3 bit opeations. In the emainde of this section, we will pove Theoem 3. We will divide the poof into seveal lemmas that ae inteesting on thei own. We begin with a slight efomulation of the expession fo the genealized ate paiing [25], because it geatly simplifies the deivation of the above uppe bound. Lemma 1. Let e (+), e ( ) Z k be e (+) i = { ei if e i > 0 0 else and e ( ) j = { ej if e j < 0 0 else

9 Then, fo all Q G 2 and all P G 1, we have Z e (Q, P ) = Z e (+) (Q, P ) Z e ( ) (Q, P ) Poof. See the Appendix. Lemma 2. Fo evey Q G 2, θ F q k polynomial h ove F q k such that and e Z l, thee exists a bivaiate (a) (x, y) G 1 θ = Z e (Q, (x, y)) = h(x, y) = 0 (b) deg X (h) e 1 (c) deg Y (h) 2 max{s, t}, whee s := #{j : e j > 0} and t := #{j : e j < 0}. Poof. See the Appendix.. Poof (Poof of Theoem 3). To solve MI e fo given Q G 2 and e Z l, we have to find P = (x, y) G 1 such that θ = Z e (Q, (x, y)), y 2 = x 3 + ax + b (1) Let h be a bivaiate polynomial ove F q k Lemma 2 and let, fo the h, satisfying the thee conditions in F (X, Y ) = Y 2 X 3 ax b u (X) = es Y (h (X, Y ), F (X, Y )). Note, fo all (x, y) G 1, if θ = Z e (Q, (x, y)), then u (x) = 0 and deg u deg Y F deg X h + deg Y h deg X F 2 e e 1 3 = 8 e 1. Fom [11], thee exists an algoithm fo solving a polynomial of degee d in F q whose complexity is O(d 2 k 2 (log q) 3 ). In fact, a moe detailed analysis shows that the algoithm equies at most 4 d 2 k 2 (log 2 q) 3 bit opeations. Since solving u(x) = 0 is enough to solve the system of equations (1), we see that MI e can be solved within 4 (8 e 1 ) 2 k 2 (log 2 q) 3 = 2 8 e 2 1 k 2 (log 2 q) 3. bit opeations. 5 Towad Complexity of Modified Exponentiation Invesion It would be nice to have a complexity estimate fo the modified exponentiation invesion EI ε,e, just as fo the modified Mille invesion MI e (Theoem 3). Unfotunately, we do not have a esult on it. We ae not awae of any esults

10 in the liteatue eithe. We expect it to be a vey non-tivial task, most likely equiing patient and long aduous effots of many eseaches, each making an incemental contibution. In this section, we epot on an incemental finding towad complexity of EI ε,e. Recall that EI ε,e asks to find the ight γ e fom the seach space Γ ε,e,z. Hence it is easonable to begin with the study of the elationship between the seach space Γ ε,e,z and the chosen vecto e. Poposition 1. We have 1. If the auxiliay paiing a e is degeneate, then Γ ε,e,z = Γ ε,ε,1 = μ L. 2. If the auxiliay paiing a e is non-degeneate, then Γ ε,e,z = Γ ε,ε,z δε,e. Poof. Note that δ ε,ε = 1. Recall that δ ε,e w e /w ε and w e = 1 W e(q) Z. Theefoe we have a e is degeneate 2 W e (q) w e 0 δ ε,e 0 If a e is degeneate, then we have { Γ ε,e,z = γ F : γ L = z 0} = q k { } γ F : γ L = 1 δ q k ε,ε = Γ ε,ε,1 = μ L If a e is non-degeneate, then we have { } Γ ε,e,z = γ F : γ L = z δ q k ε,e = {γ F q : γ L = ( z δ ) } δ k ε,e ε,ε = Γ ε,ε,z δε,e Remak 2. Fom the above poposition, we obseve the followings: If a e is degeneate then the seach space of EI ε,e is independent of the input z, that is, the exponential elation in EI ε,e does not captue any infomation about the input. Thus the modified exponentiation invesion EI ε,e will be most likely hade when a e is degeneate than when a e is non-degeneate. If a e is non-degeneate then the seach space of EI ε,e fo an input z is the same as that of EI ε fo anothe input z δε,e. Thus the modified exponentiation invesion EI ε,e is likely as had as the oiginal exponentiation invesion EI ε. Theefoe, as a fist step towad finding an efficient method fo EI ε,e, we bette ensue that a e is non-degeneate. The following theoem (Theoem 4) gives a sufficient condition on e, in tems of the max nom of e, fo the non-degeneacy of a e. We will use the following lemma in the poof of the theoem, hence we state it fist. Lemma 3. Let s be a pimitive k-th oot of unity modulo 2 and s q mod. Then 2 λ e (s) iff a e is non-degeneate. Poof. The claim follows easily fom the poof of [12, Theoem 3]. See the Appendix fo a detailed poof in tems of ou teminologies.

11 Theoem 4. Let e Z k be such that λ e (q) and Φ k (X) λ e (X). Let m e = [Q(ζ k ) : Q(λ e (ζ k ))]. If then a e is non-degeneate. e < 2me/ϕ(k) ϕ(k) Poof. We will pove the conta-positive. Assume that a e is degeneate. We claim e 2me/ϕ(k). ϕ(k) Let s Z be such that s q (mod ) and od 2(s) = k. To pove the claim, we will use the fact that a e is degeneate if and only if 2 λ e (s) (Lemma 3). Note 2 (s k 1) = d k Φ d(s). Since Φ d (s) = Φ d (q + ι) implies Φ d (q), divides only Φ k (s) and Φ d (s) fo all d < k. Theefoe, 2 Φ k (s). Let μ e (X) = em(λ e (X), Φ k (X)) and ζ k C be a pimitive k-th oot of unity. Note that μ e 0 fom the assumption. Let v(x) Q[X] be the minimal polynomial of μ e (ζ k ) ove Q. Note that v(x) Z[x] as μ e (ζ k ) Z[ζ k ], the ing of integes of Q(ζ k ). Since v(μ e (X)) is zeo at ζ k and Φ k (x) is monic, we have v(μ e (X)) = Φ k (X)h(X) fo some h(x) Z[X]. Fom 2 λ e (s) and 2 Φ k (s), we have 2 μ e (s) and v(0) 2 v(μ e (s)) 2 Φ k (s)h(s) 2 0 Theefoe, we have eithe v(0) = 0 o v(0) 2. Noting that, by [6, Poposition 4.3.2] and the fact that v is monic, v(0) = Nom(μ e (ζ k )) = NomQ(ζk )/Q(μ e (ζ k )) 1 me = gcd(j,k)=1 μ e (ζ j k ) we conclude that v(0) 0. Indeed if v(0) = 0, then Φ k λ e, a contadiction to μ e 0. Thus, we have 2 v(0) = gcd(j,k)=1 μ e (ζ j k ) 1 me gcd(j,k)=1 ϕ(k) e 1 me 1 me = (ϕ(k) e ) ϕ(k) me, Theefoe, we finally have the claim. 6 Reducing Paing Invesion to Modified Exponentiation Invesion In this section, we discuss when paiing invesion can be educed to modified exponentiation invesion EI ε,e.

12 Specifically we ae looking fo a condition on e so that MI e is easy. Accoding to Theoem 3, we need to find small e. One might be natually tempted to choose the intege vecto e fom eithe coefficients of cyclotomic polynomials o (1,..., 1). Howeve accoding to Coollay 6 of Vecauteen [25], such e makes the coesponding auxiliay paiing degeneate. Hence, fom Poposition 1, the modified exponentiation invesion EI ε,e is expected to be had because the seach space does not depend on z. Theefoe, in ode to meaningfully educe paiing invesion to modified exponentiation invesion, one needs find e such that it is small and the coesponding auxiliay paiing is non-degeneate. In this section, we investigate the existence of such e in vaious cases (Theoem 5 and the subsequent examples in Table 1). We begin by intoducing a definition that was inspied by the discussions in[11]. Definition 1. Let C α be the set of all (, k) Z 2 >0 satisfying C1: 1/ϕ(k) > ϕ (k) C2: 1/ϕ(k) (log 2 ) α Remak 3. In the following figue, the bottom cuve is fom the condition C1 in Definition 1 and the top cuve is fom the condition C2 when α = 10. Thus, the egions between the two cuves is the set C 10, The black dots epesent typical paiing fiendly cuves fom Table 1 in [10]. Note that the paametes fo the typical paiing fiendly cuves belong to C 10. log ϕ(k) Lemma 4. If α > 1, then C α is an infinite set. Poof. See the Appendix. Theoem 5. Let α > 1, (, k) C α and q. Then the invesion of evey genealized ate paiing can be educed to modified exponentiation invesion in polynomial time in log 2. Specifically, thee exists e such that the auxiliay paiing a e is non-degeneate and MI e can be caied out in at most bit opeations (log 2 ) 8α+3

13 Poof. Let (q, ) C α and q. We need to find a witness e such that a e is non-degeneate and MI e can be caied out in the claimed numbe of bit opeations. Fom Minkowski s theoem (see III.C of [25]), thee exists e Z k with λ e (q) such that the last k ϕ(k) elements of e ae zeo and e 1/ϕ(k) We will take it as the witness. Fist we show that a e is non-degeneate. Since the last k ϕ(k) elements of e ae zeo, we have λ e (X) Φ k (X). Fom the condition that 1/ϕ(k) > ϕ (k), we have and thus (2m e 1)/ϕ(k) ϕ(k) 1/ϕ(k) ϕ(k) > 1 e 1/ϕ(k) < 1/ϕ(k) (2m e 1)/ϕ(k) ϕ(k) = 2m e/ϕ(k) ϕ(k) Theefoe, by Theoem 4, a e is non-degeneate. Next we show that MI e can be caied out in the claimed numbe of bit opeations. Let N be the numbe of bit opeations fo MI e. Note that e 1 ϕ(k) e. Hence e 1 ϕ(k) 1/ϕ(k). Theefoe, fom Theoem 3, we have Fom the condition q, we have N 2 8 ( ϕ(k) 1/ϕ(k)) 2 k 2 (log 2 q) 3 N 2 8 ( ϕ(k) 1/ϕ(k)) 2 k 2 (2 log 2 ) 3 = 2 11 ϕ(k) 2 2/ϕ(k) k 2 (log 2 ) 3 Since k 2ϕ(k) and ϕ (k) < 1/ϕ(k), we have N 2 11 ϕ(k) 2 2/ϕ(k) 4 ϕ(k) 4 (log 2 ) 3 = /ϕ(k) (log 2 ) 3 Since 1/ϕ(k) (log 2 ) α, we have N < 2 13 (log 2 ) 8α (log 2 ) 3 = 2 13 (log 2 ) 8α+3 The uppe bound in Theoem 5 is not tight. In Table 1, we povide tighte uppe bounds fo seveal examples. Fo each example, the fist ow of the table shows k, ϕ(k), log 2, α with which we can estimate an uppe bound of the bit complexity fo educing PI to EI ε,e, using Theoem 5. The next ows show actual paametes q, and a vecto e Z ϕ(k). The vecto e is the one with smallest sum nom among the LLL educed vectos fo the lattice with espect to q,, k [25]. The vecto e is veified to yield non-degeneate a e. Fo the vecto e, the last ow has been calculated using Theoem 3, which estimates the bit complexity of MI e on the cuve moe pecisely. The estimated uppe bounds on the computing

14 times ae based on the assumption that one uses the cuently fastest supecompute [8], which can pefom about flops 1000 bops flops = 264 bops (bit opeations pe second). The fist example BN is the smallest value taken fom Table 1 in [21]. Since ϕ(k) fo the BN cuves [5] ae small (ϕ(k) = 4), they easily satisfy the condition C1 in Definition 1 but lage α values ae needed to satisfy C2. Theefoe, fom Theoem 5, we expect that it will be difficult to educe PI to EI ε,e fo BN cuves. The tighte uppe bound on the bit opeation on the last ow, based on Theoem 3, suppots the obsevation. Next two examples ae the KSS cuves descibed in Example 4.6 and Example 4.7 in [16]. The paametes ae obtained by evaluating the polynomials in the Examples in [16] at x 0 = 188 fo KSS1 and x 0 = 107 fo KSS2. The example CP1 is constucted by Cocks-Pinch method to have small α and typical paametes (k, log 2 ) in Table 1 in [10]. The example C6.6 is obtained fom evaluating the polynomials in Constuction 6.6 with k = 33 in [10] at x 0 = 9727, which is also a paiing-fiendly cuve (Definition 2.3 in [10]). The ϕ(k) fo these cuves ae small enough to satisfy C1, and big enough fo small α values to satisfy C2. Theefoe, fom Theoem 5, we expect that it will be elatively easy to educe PI to EI ε,e fo these cuves. The tighte uppe bound on the bit opeations on the last ow, based on Theoem 3, suppots the obsevation. Acknowledgement The authos would like to thank Steven Galbaith and anonymous efeees fo thei insightful and helpful comments. Refeences 1. Baeto, P., Galbaith, S., Ó héigeataigh, C., Scott, M. : Efficient Paiing Computation on Supesingula Abelian Vaieties. Designs, Codes and Cyptogaphy 42, no. 3, pp (2007) 2. Boneh, D., Fanklin, M. : Identity-based encyption fom the Weil paiing. SIAM J. of Computing 32, no. 3, pp (2003) 3. Boneh, D., Goh, E., Nissim, K. : Evaluating 2-DNF fomulas on ciphetexts. In Poceedings of Theoy of Cyptogaphy (TCC) 05, LNCS 3378, pp (2005) 4. Boneh, D., Lynn, B., Shacham, H. : Shot signatues fom the Weil paiing. J. of Cyptology 17, no 4, pp (2004) 5. Baeto, P., Naehig, M. : Paiing-fiendly elliptic cuves of pime ode. In Poceedings of SAC 2005, LNCS 3897, pp (2006) 6. Cohen, H. : A Couse in Computational Algebaic Numbe Theoy. Spinge, Heidelbeg (2000) 7. Duc, A., Jetchev, D. : Hadness of Computing Individual Bits fo One-way Functions on Elliptic Cuves. In Poceedings of Advances in Cyptogaphy CRYPTO 2012, LNCS 7417, pp (2012) 8. Cay Titan: olcf.onl.gov/titan/, en.wikipedia.og/wiki/titan (supecompute)

15 Table 1. Estimates on time needed fo educing paiing invesion to exponentiation invesion BN k, ϕ(k), log 2, α 12, 4, 158, 6 q e [ , 0, , 1] e bit ops < yeas KSS1 k, ϕ(k), log 2, α 40, 16, 270, 3 q e [ 89353, 1, 0, 0, 0, 0, 0, 0, 0, 0, , 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0] e bit ops < days KSS2 k, ϕ(k), log 2, α 36, 12, 169, 2 q e [644, 966, 2899, 2255, 8697, 10307, 12562, 2577, 5798, 0, 6120, 2577, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0] e bit ops < minutes CP1 k, ϕ(k), log 2, α 23, 22, 257, 2 q e [ 196, 527, 851, 89, 648, 115, 1086, 14, 547, 1053, 409, 611, 680, 1368, 891, 1808, 3226, 1664, 577, 22, 213, 15, 0] e bit ops < minutes C6.6 k, ϕ(k), log 2, α 33, 20, 265, 2 q e [0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 9727, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0] e bit ops < minutes

16 9. Duusma, I., Lee, H.-S. : Tate paiing implementation fo hypeelliptic cuves y 2 = x p x + d. In Poceedings of Advances in Cyptogaphy AsiaCypt 2003, LNCS 2894, pp (2003) 10. Feeman, D., Scott, M., Teske, E. : A taxonomy of paiing-fiendly elliptic cuves. J. of Cyptology 23, pp (2010) 11. Galbaith, S., Hess, F., Vecauteen, F. : Aspects of Paiing Invesion. IEEE Tans. Infomation Theoy 54, pp (2008) 12. Hess, F. : Paiing Lattices. In Poceedings of Paiing 2008, LNCS 5209, pp (2008) 13. Hess, F., Smat, N., Vecauteen, F. : The Eta Paiing Revisited. IEEE Tans. Infomation Theoy 52, pp (2006) 14. Joux, A. : A one ound potocol fo tipatite Diffie-Hellman. J. of Cyptology 17, no. 4, pp (2004) 15. Kanayama, N., Okamoto, E. : Appoach to Paiing Invesions Without Solving Mille Invesion. IEEE Tans. Infomation Theoy 58, pp (2012) 16. Kachisa, E., Schaefe, E., Scott, M. : Constucting Bezing-Weng paiing fiendly elliptic cuves using elements in the cyclotomic elements. In Poceedings of Paiing 2008, LNCS 5209, pp (2008) 17. Kim, S., Cheon, J. : Fixed Agument Paiing Invesion on Elliptic Cuves, pepint (2012). Available at Lee, E., Lee, H.-S., Pak, C. : Efficient and Genealized Paiing Computation on Abelian Vaieties. IEEE Tans. Infomation Theoy 55, no. 4, pp (2009) 19. Mille, V. : The Weil paiing and its efficient calculation. J. of Cyptology 17, pp (2004) 20. El Mabet, N. : What about Vulneability to a Fault Attack of the Milles Algoithm Duing an Identity Based Potocol?. In Poceedings of ISA 2009, LNCS 5576, pp (2009) 21. Peeia, G., Simplício, M., Naehig, M., Baeto, P. : A Family of Implementation- Fiendly BN Elliptic Cuves. J. of Systems and Softwae 84, Issue 8, pp (2011) 22. Page, D., Vecauteen, F. : A Fault Attack on Paiing Based Cyptogaphy. IEEE Tans. Computes 55, no. 9, pp (2006) 23. Satoh, T. : On polynomial intepolations elated to Veheul homomophisms. J. Comput. Math. 9, pp (2006) 24. Satoh, T. : On paiing invesion poblems. In Poceedings of Paiing 2007, LNCS 4575, pp (2007) 25. Vecauteen, F. : Optimal Paiings. IEEE Tans. Infomation Theoy 56, no. 1, pp (2010) 26. Veheul, E. : Evidence that XTR is moe secue than supesingula elliptic cuve cyptosystems. J. Cyptology 17, no. 4, pp (2004) 27. Wates, B. : Efficient Identity-Based Encyption Without Random Oacles. In Poceedings of Advances in Cyptology EUROCRYPT 2005, LNCS 3494, pp (2005) 28. Weng, J., Dou, Y., Ma, C. : Fault Attacks against the Mille Algoithm in Hessian Coodinates. In Poceedings of InsCypt 2011: Infomation and Cyptology, LNCS 7537, pp (2012) 29. Zhao, C., Zhang, F., Huang, J. : A Note on the Ate Paiing. Intenational J. of Infomation Secuity 7, no. 6, pp (2008)

17 Appendix In this appendix, we povide poofs of seveal technical lemmas. Poof (Poof of Lemma 1). Let e m1,..., e ms > 0 and e n1,..., e nt < 0 and all othe components of e ae zeo. Then we have e (+) m i = e mi e n ( ) j = e nj and all othe components of e (+) and e ( ) ae zeo. Note Thus U e e n1 q n1 e nt q nt = e m1 q m1 + + e ms q ms Hence f em1 q m 1 + +e ms qms,q = = s s f em i q m i,q f emi,q m i Q i=1 i=1 s i=1 s 1 i=1 f em i q m i,q (P ) Z e (+)(Q, P ) f Ue e n1 q n 1 e nt q n t,q = f Ue,Qf en1 q n 1 e nt q n t,q t = f U e,q (P ) f e n j q n j,q (P ) Z e ( )(Q, P ) j=1 l emi q m i Q,(e mi+1 q m i+1 + +e ms q ms )Q v (emi q m i + +e ms q ms )Q f U e,q (P ) t j=1 f en j q n j,q (P ) Z e ( )(Q, P ) = s i=1 f em i q m i,q Z e (+)(Q, P ) and, fom [25], we have Z e (Q, P ) = f Ue,Q (P ) i=0 f ei q i,q (P ) = Z e(+)(q, P ) Z e ( )(Q, P ) Poof (Poof of Lemma 2). Let Q G 2, θ F q and e Z l. We will constuct k a witness fo the existentially quantified h. Fom Lemma 14 of [11], we have f μ, νq (X, Y ) = { 1 μ = 1 f μ,ν,1(x)+y f μ,ν,2(x) v μνq μ > 1

18 whee f μ,ν,1, f μ,ν,2 F q k[x] such that μ + 1 μ deg(f μ,ν,1 ), deg(f μ,ν,2 ) Fom Lemma 1, we have Z e (Q, (x, y)) = Z e (+)(x, y) A(x, y) =: Z e ( )(x, y) B(x, y) fo all (x, y) G 1 whee A = B = 1 i s e mi 2 ( femi,qm i,1 + Y f emi,qm i,2) 1 j t e nj 2 s 1 l emi q m i Q,(e mi+1 q m i+1 + +e ms q ms )Q i=1 1 j t e nj 2 ( ) f enj,q n j,1 + Y f enj,q n j,2 v enj q n j Q t 1 v ( enj+1 q n j+1 e nt q n t )Q j=1 1 i s e mi 2 v emi q m i Q t 1 s 1 l enj q n j Q,( e nj+1 q n j+1 e nt q n t )Q v (emi q m i + +e ms q ms )Q j=1 i=1 Finally, we popose the following h as a witness fo the existential quantification: h = A θb. We will show that h is indeed a witness satisfying the thee conditions. (a) (x, y) G 1, Z e (Q, (x, y)) = θ = h(x, y) = 0.: Let (x, y) G 1. Assume that θ = Z e (Q, (x, y)). Then Obviously θ = A(x,y) B(x,y). Thus h(x, y) = A(x, y) θb(x, y) = 0.

19 (b) deg X (h) e 1 : Note deg X (A) ei e i 2 e i 2 e i 1 e i 1 = ei e i 2 e i 2 e i=1 e i= 1 e i + e i + e i + e i e i 2 e i 2 e i =1 e i = 1 = e 1 deg X (B) ei e i 2 e i 2 e i 1 e i 1 = ei e i 2 e i 2 e i= 1 e i=1 e i + e i + e i + e i e i 2 e i 2 e i = 1 e i =1 = e 1 Hence deg X (h) e 1. (c) deg Y (h) 2 max{s, t}: Note deg Y (A) s + s 2s, deg Y (B) t + t 2t Hence deg Y (h) 2 max{s, t}. Poof (Poof of Lemma 3). Note f s k 1,Q = f s k 1,Q = f sk,q = fs,q s fs,sq sk 2 f s,s Q Since s q (mod ) and f s,sq = f s,qq = f q s,q, we have f s k 1,Q = f s,q s f qsk 2 s,q f q s,s k 2 Q = f s +qs k 2 + +q s,q (2) Let u = s + qs k q. Then u kq mod. Raising Eq. (2) to the powe (q k 1)/, we have t(q, P ) sk 1 = f s,q (P ) (qk 1) u. Since sk 1, we have t(q, P ) sk 1 = 1 f s,q (P ) (qk 1) = 1.

20 Theefoe, f s i,q(p ) qk 1 = f (si 1 +s i 2 q+...+q i 1 ) qk 1 s,q = 1 fo 0 i k 1. Note t(q, P ) λe(s) = f,q (P ) λe(s) q k 1 = f λe(s),q(p ) qk 1 = f e0 + +e s,q (P ) q k 1 = = = f ejs j,q (P ) q k 1 k 2 l ejs j Q,(e j+1s j+1 + +e s )Q (P ) v (ejs j + +e s )Q (P ) f s j,q (P ) ej q k 1 1 e j f ej,q j Q (P ) q k 1 q k 1 k 2 l ejq j Q,(e j+1q j+1 + +e q )Q (P ) v (ejq j + +e q )Q (P ) k 2 l f qj ejq e j,q (P ) j Q,(e j+1q j+1 + +e q )Q (P ) v (ejq j + +e q )Q (P ) q k 1 q k 1 = Z e (Q, P ) q k 1 = a e (Q, P ) The claim follows immediately fom the elation t(q, P ) λe(s) = a e (Q, P ). Poof (Poof of Lemma 4). We fist obseve that = 9 and ϕ (k) = 2 satisfy the above two conditions. We will show that the two cuves defined by 1/ϕ(k) = ϕ (k), 1/ϕ(k) = (log 2 ) α do not meet when ϕ (k) > 2. The above system is equivalent to The fist equation is equivalent to 1/ϕ(k) = ϕ (k) (log 2 ) α = ϕ (k) log 2 = ϕ (k) log 2 ϕ (k) By substituting it into the second equation, we have ϕ (k) α (log 2 ϕ (k)) α = ϕ (k), which does not have a solution when ϕ (k) > 2. Thus the above two cuves do not meet when ϕ (k) > 2. Theefoe, we conclude that C α is an infinite set.

Fixed Argument Pairing Inversion on Elliptic Curves

Fixed Argument Pairing Inversion on Elliptic Curves Fixed Agument Paiing Invesion on Elliptic Cuves Sungwook Kim and Jung Hee Cheon ISaC & Dept. of Mathematical Sciences Seoul National Univesity Seoul, Koea {avell7,jhcheon}@snu.ac.k Abstact. Let E be an

More information

Lecture 25: Pairing Based Cryptography

Lecture 25: Pairing Based Cryptography 6.897 Special Topics in Cyptogaphy Instucto: Ran Canetti May 5, 2004 Lectue 25: Paiing Based Cyptogaphy Scibe: Ben Adida 1 Intoduction The field of Paiing Based Cyptogaphy has exploded ove the past 3 yeas

More information

Secret Exponent Attacks on RSA-type Schemes with Moduli N = p r q

Secret Exponent Attacks on RSA-type Schemes with Moduli N = p r q Secet Exponent Attacks on RSA-type Schemes with Moduli N = p q Alexande May Faculty of Compute Science, Electical Engineeing and Mathematics Univesity of Padebon 33102 Padebon, Gemany alexx@uni-padebon.de

More information

Chapter 3: Theory of Modular Arithmetic 38

Chapter 3: Theory of Modular Arithmetic 38 Chapte 3: Theoy of Modula Aithmetic 38 Section D Chinese Remainde Theoem By the end of this section you will be able to pove the Chinese Remainde Theoem apply this theoem to solve simultaneous linea conguences

More information

Stanford University CS259Q: Quantum Computing Handout 8 Luca Trevisan October 18, 2012

Stanford University CS259Q: Quantum Computing Handout 8 Luca Trevisan October 18, 2012 Stanfod Univesity CS59Q: Quantum Computing Handout 8 Luca Tevisan Octobe 8, 0 Lectue 8 In which we use the quantum Fouie tansfom to solve the peiod-finding poblem. The Peiod Finding Poblem Let f : {0,...,

More information

Construction and Analysis of Boolean Functions of 2t + 1 Variables with Maximum Algebraic Immunity

Construction and Analysis of Boolean Functions of 2t + 1 Variables with Maximum Algebraic Immunity Constuction and Analysis of Boolean Functions of 2t + 1 Vaiables with Maximum Algebaic Immunity Na Li and Wen-Feng Qi Depatment of Applied Mathematics, Zhengzhou Infomation Engineeing Univesity, Zhengzhou,

More information

On the Computation of the Optimal Ate Pairing at the 192-bit Security Level

On the Computation of the Optimal Ate Pairing at the 192-bit Security Level On the Computation of the Optimal Ate Paiing at the 192-bit Secuity Level Loubna Ghammam 1 and Emmanuel Fouotsa 2 (1) IRMAR, UMR CNRS 6625, Univesité Rennes 1, Campus de Beaulieu 35042 Rennes cedex, Fance.

More information

arxiv: v1 [math.co] 4 May 2017

arxiv: v1 [math.co] 4 May 2017 On The Numbe Of Unlabeled Bipatite Gaphs Abdullah Atmaca and A Yavuz Ouç axiv:7050800v [mathco] 4 May 207 Abstact This pape solves a poblem that was stated by M A Haison in 973 [] This poblem, that has

More information

Guide to Pairing-Based Cryptography. Nadia El Mrabet and Marc Joye, Eds.

Guide to Pairing-Based Cryptography. Nadia El Mrabet and Marc Joye, Eds. Guide to Paiing-Based Cyptogaphy by Nadia El Mabet and Mac Joye, Eds. 3 Paiings Soina Ionica Univesité de Picadie Jules Vene Damien Robet INRIA Bodeaux Sud-Ouest, Univesité de Bodeaux 3.1 Functions, Divisos

More information

EM Boundary Value Problems

EM Boundary Value Problems EM Bounday Value Poblems 10/ 9 11/ By Ilekta chistidi & Lee, Seung-Hyun A. Geneal Desciption : Maxwell Equations & Loentz Foce We want to find the equations of motion of chaged paticles. The way to do

More information

Enumerating permutation polynomials

Enumerating permutation polynomials Enumeating pemutation polynomials Theodoulos Gaefalakis a,1, Giogos Kapetanakis a,, a Depatment of Mathematics and Applied Mathematics, Univesity of Cete, 70013 Heaklion, Geece Abstact We conside thoblem

More information

ONE-POINT CODES USING PLACES OF HIGHER DEGREE

ONE-POINT CODES USING PLACES OF HIGHER DEGREE ONE-POINT CODES USING PLACES OF HIGHER DEGREE GRETCHEN L. MATTHEWS AND TODD W. MICHEL DEPARTMENT OF MATHEMATICAL SCIENCES CLEMSON UNIVERSITY CLEMSON, SC 29634-0975 U.S.A. E-MAIL: GMATTHE@CLEMSON.EDU, TMICHEL@CLEMSON.EDU

More information

New problems in universal algebraic geometry illustrated by boolean equations

New problems in universal algebraic geometry illustrated by boolean equations New poblems in univesal algebaic geomety illustated by boolean equations axiv:1611.00152v2 [math.ra] 25 Nov 2016 Atem N. Shevlyakov Novembe 28, 2016 Abstact We discuss new poblems in univesal algebaic

More information

10/04/18. P [P(x)] 1 negl(n).

10/04/18. P [P(x)] 1 negl(n). Mastemath, Sping 208 Into to Lattice lgs & Cypto Lectue 0 0/04/8 Lectues: D. Dadush, L. Ducas Scibe: K. de Boe Intoduction In this lectue, we will teat two main pats. Duing the fist pat we continue the

More information

ON INDEPENDENT SETS IN PURELY ATOMIC PROBABILITY SPACES WITH GEOMETRIC DISTRIBUTION. 1. Introduction. 1 r r. r k for every set E A, E \ {0},

ON INDEPENDENT SETS IN PURELY ATOMIC PROBABILITY SPACES WITH GEOMETRIC DISTRIBUTION. 1. Introduction. 1 r r. r k for every set E A, E \ {0}, ON INDEPENDENT SETS IN PURELY ATOMIC PROBABILITY SPACES WITH GEOMETRIC DISTRIBUTION E. J. IONASCU and A. A. STANCU Abstact. We ae inteested in constucting concete independent events in puely atomic pobability

More information

Solution to HW 3, Ma 1a Fall 2016

Solution to HW 3, Ma 1a Fall 2016 Solution to HW 3, Ma a Fall 206 Section 2. Execise 2: Let C be a subset of the eal numbes consisting of those eal numbes x having the popety that evey digit in the decimal expansion of x is, 3, 5, o 7.

More information

arxiv: v2 [math.ag] 4 Jul 2012

arxiv: v2 [math.ag] 4 Jul 2012 SOME EXAMPLES OF VECTOR BUNDLES IN THE BASE LOCUS OF THE GENERALIZED THETA DIVISOR axiv:0707.2326v2 [math.ag] 4 Jul 2012 SEBASTIAN CASALAINA-MARTIN, TAWANDA GWENA, AND MONTSERRAT TEIXIDOR I BIGAS Abstact.

More information

Probablistically Checkable Proofs

Probablistically Checkable Proofs Lectue 12 Pobablistically Checkable Poofs May 13, 2004 Lectue: Paul Beame Notes: Chis Re 12.1 Pobablisitically Checkable Poofs Oveview We know that IP = PSPACE. This means thee is an inteactive potocol

More information

Vanishing lines in generalized Adams spectral sequences are generic

Vanishing lines in generalized Adams spectral sequences are generic ISSN 364-0380 (on line) 465-3060 (pinted) 55 Geomety & Topology Volume 3 (999) 55 65 Published: 2 July 999 G G G G T T T G T T T G T G T GG TT G G G G GG T T T TT Vanishing lines in genealized Adams spectal

More information

Application of Parseval s Theorem on Evaluating Some Definite Integrals

Application of Parseval s Theorem on Evaluating Some Definite Integrals Tukish Jounal of Analysis and Numbe Theoy, 4, Vol., No., -5 Available online at http://pubs.sciepub.com/tjant/// Science and Education Publishing DOI:.69/tjant--- Application of Paseval s Theoem on Evaluating

More information

9.1 The multiplicative group of a finite field. Theorem 9.1. The multiplicative group F of a finite field is cyclic.

9.1 The multiplicative group of a finite field. Theorem 9.1. The multiplicative group F of a finite field is cyclic. Chapte 9 Pimitive Roots 9.1 The multiplicative goup of a finite fld Theoem 9.1. The multiplicative goup F of a finite fld is cyclic. Remak: In paticula, if p is a pime then (Z/p) is cyclic. In fact, this

More information

C/CS/Phys C191 Shor s order (period) finding algorithm and factoring 11/12/14 Fall 2014 Lecture 22

C/CS/Phys C191 Shor s order (period) finding algorithm and factoring 11/12/14 Fall 2014 Lecture 22 C/CS/Phys C9 Sho s ode (peiod) finding algoithm and factoing /2/4 Fall 204 Lectue 22 With a fast algoithm fo the uantum Fouie Tansfom in hand, it is clea that many useful applications should be possible.

More information

arxiv: v1 [math.co] 1 Apr 2011

arxiv: v1 [math.co] 1 Apr 2011 Weight enumeation of codes fom finite spaces Relinde Juius Octobe 23, 2018 axiv:1104.0172v1 [math.co] 1 Ap 2011 Abstact We study the genealized and extended weight enumeato of the - ay Simplex code and

More information

Analytical Solutions for Confined Aquifers with non constant Pumping using Computer Algebra

Analytical Solutions for Confined Aquifers with non constant Pumping using Computer Algebra Poceedings of the 006 IASME/SEAS Int. Conf. on ate Resouces, Hydaulics & Hydology, Chalkida, Geece, May -3, 006 (pp7-) Analytical Solutions fo Confined Aquifes with non constant Pumping using Compute Algeba

More information

ON THE INVERSE SIGNED TOTAL DOMINATION NUMBER IN GRAPHS. D.A. Mojdeh and B. Samadi

ON THE INVERSE SIGNED TOTAL DOMINATION NUMBER IN GRAPHS. D.A. Mojdeh and B. Samadi Opuscula Math. 37, no. 3 (017), 447 456 http://dx.doi.og/10.7494/opmath.017.37.3.447 Opuscula Mathematica ON THE INVERSE SIGNED TOTAL DOMINATION NUMBER IN GRAPHS D.A. Mojdeh and B. Samadi Communicated

More information

A Bijective Approach to the Permutational Power of a Priority Queue

A Bijective Approach to the Permutational Power of a Priority Queue A Bijective Appoach to the Pemutational Powe of a Pioity Queue Ia M. Gessel Kuang-Yeh Wang Depatment of Mathematics Bandeis Univesity Waltham, MA 02254-9110 Abstact A pioity queue tansfoms an input pemutation

More information

Surveillance Points in High Dimensional Spaces

Surveillance Points in High Dimensional Spaces Société de Calcul Mathématique SA Tools fo decision help since 995 Suveillance Points in High Dimensional Spaces by Benad Beauzamy Januay 06 Abstact Let us conside any compute softwae, elying upon a lage

More information

KOEBE DOMAINS FOR THE CLASSES OF FUNCTIONS WITH RANGES INCLUDED IN GIVEN SETS

KOEBE DOMAINS FOR THE CLASSES OF FUNCTIONS WITH RANGES INCLUDED IN GIVEN SETS Jounal of Applied Analysis Vol. 14, No. 1 2008), pp. 43 52 KOEBE DOMAINS FOR THE CLASSES OF FUNCTIONS WITH RANGES INCLUDED IN GIVEN SETS L. KOCZAN and P. ZAPRAWA Received Mach 12, 2007 and, in evised fom,

More information

ON SPARSELY SCHEMMEL TOTIENT NUMBERS. Colin Defant 1 Department of Mathematics, University of Florida, Gainesville, Florida

ON SPARSELY SCHEMMEL TOTIENT NUMBERS. Colin Defant 1 Department of Mathematics, University of Florida, Gainesville, Florida #A8 INTEGERS 5 (205) ON SPARSEL SCHEMMEL TOTIENT NUMBERS Colin Defant Depatment of Mathematics, Univesity of Floida, Gainesville, Floida cdefant@ufl.edu Received: 7/30/4, Revised: 2/23/4, Accepted: 4/26/5,

More information

Method for Approximating Irrational Numbers

Method for Approximating Irrational Numbers Method fo Appoximating Iational Numbes Eic Reichwein Depatment of Physics Univesity of Califonia, Santa Cuz June 6, 0 Abstact I will put foth an algoithm fo poducing inceasingly accuate ational appoximations

More information

q i i=1 p i ln p i Another measure, which proves a useful benchmark in our analysis, is the chi squared divergence of p, q, which is defined by

q i i=1 p i ln p i Another measure, which proves a useful benchmark in our analysis, is the chi squared divergence of p, q, which is defined by CSISZÁR f DIVERGENCE, OSTROWSKI S INEQUALITY AND MUTUAL INFORMATION S. S. DRAGOMIR, V. GLUŠČEVIĆ, AND C. E. M. PEARCE Abstact. The Ostowski integal inequality fo an absolutely continuous function is used

More information

COLLAPSING WALLS THEOREM

COLLAPSING WALLS THEOREM COLLAPSING WALLS THEOREM IGOR PAK AND ROM PINCHASI Abstact. Let P R 3 be a pyamid with the base a convex polygon Q. We show that when othe faces ae collapsed (otated aound the edges onto the plane spanned

More information

New Finding on Factoring Prime Power RSA Modulus N = p r q

New Finding on Factoring Prime Power RSA Modulus N = p r q Jounal of Mathematical Reseach with Applications Jul., 207, Vol. 37, o. 4, pp. 404 48 DOI:0.3770/j.issn:2095-265.207.04.003 Http://jme.dlut.edu.cn ew Finding on Factoing Pime Powe RSA Modulus = p q Sadiq

More information

Solving Some Definite Integrals Using Parseval s Theorem

Solving Some Definite Integrals Using Parseval s Theorem Ameican Jounal of Numeical Analysis 4 Vol. No. 6-64 Available online at http://pubs.sciepub.com/ajna///5 Science and Education Publishing DOI:.69/ajna---5 Solving Some Definite Integals Using Paseval s

More information

MATH 415, WEEK 3: Parameter-Dependence and Bifurcations

MATH 415, WEEK 3: Parameter-Dependence and Bifurcations MATH 415, WEEK 3: Paamete-Dependence and Bifucations 1 A Note on Paamete Dependence We should pause to make a bief note about the ole played in the study of dynamical systems by the system s paametes.

More information

Lecture 8 - Gauss s Law

Lecture 8 - Gauss s Law Lectue 8 - Gauss s Law A Puzzle... Example Calculate the potential enegy, pe ion, fo an infinite 1D ionic cystal with sepaation a; that is, a ow of equally spaced chages of magnitude e and altenating sign.

More information

Using Laplace Transform to Evaluate Improper Integrals Chii-Huei Yu

Using Laplace Transform to Evaluate Improper Integrals Chii-Huei Yu Available at https://edupediapublicationsog/jounals Volume 3 Issue 4 Febuay 216 Using Laplace Tansfom to Evaluate Impope Integals Chii-Huei Yu Depatment of Infomation Technology, Nan Jeon Univesity of

More information

THE MAXIMUM SIZE OF A PARTIAL SPREAD II: UPPER BOUNDS

THE MAXIMUM SIZE OF A PARTIAL SPREAD II: UPPER BOUNDS THE MAXIMUM SIZE OF A PARTIAL SPREAD II: UPPER BOUNDS ESMERALDA NĂSTASE MATHEMATICS DEPARTMENT XAVIER UNIVERSITY CINCINNATI, OHIO 4507, USA PAPA SISSOKHO MATHEMATICS DEPARTMENT ILLINOIS STATE UNIVERSITY

More information

On the ratio of maximum and minimum degree in maximal intersecting families

On the ratio of maximum and minimum degree in maximal intersecting families On the atio of maximum and minimum degee in maximal intesecting families Zoltán Lóánt Nagy Lale Özkahya Balázs Patkós Máté Vize Septembe 5, 011 Abstact To study how balanced o unbalanced a maximal intesecting

More information

Functions Defined on Fuzzy Real Numbers According to Zadeh s Extension

Functions Defined on Fuzzy Real Numbers According to Zadeh s Extension Intenational Mathematical Foum, 3, 2008, no. 16, 763-776 Functions Defined on Fuzzy Real Numbes Accoding to Zadeh s Extension Oma A. AbuAaqob, Nabil T. Shawagfeh and Oma A. AbuGhneim 1 Mathematics Depatment,

More information

A NEW VARIABLE STIFFNESS SPRING USING A PRESTRESSED MECHANISM

A NEW VARIABLE STIFFNESS SPRING USING A PRESTRESSED MECHANISM Poceedings of the ASME 2010 Intenational Design Engineeing Technical Confeences & Computes and Infomation in Engineeing Confeence IDETC/CIE 2010 August 15-18, 2010, Monteal, Quebec, Canada DETC2010-28496

More information

Syntactical content of nite approximations of partial algebras 1 Wiktor Bartol Inst. Matematyki, Uniw. Warszawski, Warszawa (Poland)

Syntactical content of nite approximations of partial algebras 1 Wiktor Bartol Inst. Matematyki, Uniw. Warszawski, Warszawa (Poland) Syntactical content of nite appoximations of patial algebas 1 Wikto Batol Inst. Matematyki, Uniw. Waszawski, 02-097 Waszawa (Poland) batol@mimuw.edu.pl Xavie Caicedo Dep. Matematicas, Univ. de los Andes,

More information

Relating Branching Program Size and. Formula Size over the Full Binary Basis. FB Informatik, LS II, Univ. Dortmund, Dortmund, Germany

Relating Branching Program Size and. Formula Size over the Full Binary Basis. FB Informatik, LS II, Univ. Dortmund, Dortmund, Germany Relating Banching Pogam Size and omula Size ove the ull Binay Basis Matin Saueho y Ingo Wegene y Ralph Wechne z y B Infomatik, LS II, Univ. Dotmund, 44 Dotmund, Gemany z ankfut, Gemany sauehof/wegene@ls.cs.uni-dotmund.de

More information

Math 301: The Erdős-Stone-Simonovitz Theorem and Extremal Numbers for Bipartite Graphs

Math 301: The Erdős-Stone-Simonovitz Theorem and Extremal Numbers for Bipartite Graphs Math 30: The Edős-Stone-Simonovitz Theoem and Extemal Numbes fo Bipatite Gaphs May Radcliffe The Edős-Stone-Simonovitz Theoem Recall, in class we poved Tuán s Gaph Theoem, namely Theoem Tuán s Theoem Let

More information

AST 121S: The origin and evolution of the Universe. Introduction to Mathematical Handout 1

AST 121S: The origin and evolution of the Universe. Introduction to Mathematical Handout 1 Please ead this fist... AST S: The oigin and evolution of the Univese Intoduction to Mathematical Handout This is an unusually long hand-out and one which uses in places mathematics that you may not be

More information

Do Managers Do Good With Other People s Money? Online Appendix

Do Managers Do Good With Other People s Money? Online Appendix Do Manages Do Good With Othe People s Money? Online Appendix Ing-Haw Cheng Haison Hong Kelly Shue Abstact This is the Online Appendix fo Cheng, Hong and Shue 2013) containing details of the model. Datmouth

More information

working pages for Paul Richards class notes; do not copy or circulate without permission from PGR 2004/11/3 10:50

working pages for Paul Richards class notes; do not copy or circulate without permission from PGR 2004/11/3 10:50 woking pages fo Paul Richads class notes; do not copy o ciculate without pemission fom PGR 2004/11/3 10:50 CHAPTER7 Solid angle, 3D integals, Gauss s Theoem, and a Delta Function We define the solid angle,

More information

On decompositions of complete multipartite graphs into the union of two even cycles

On decompositions of complete multipartite graphs into the union of two even cycles On decompositions of complete multipatite gaphs into the union of two even cycles A. Su, J. Buchanan, R. C. Bunge, S. I. El-Zanati, E. Pelttai, G. Rasmuson, E. Spaks, S. Tagais Depatment of Mathematics

More information

SPECTRAL SEQUENCES. im(er

SPECTRAL SEQUENCES. im(er SPECTRAL SEQUENCES MATTHEW GREENBERG. Intoduction Definition. Let a. An a-th stage spectal (cohomological) sequence consists of the following data: bigaded objects E = p,q Z Ep,q, a diffeentials d : E

More information

A Multivariate Normal Law for Turing s Formulae

A Multivariate Normal Law for Turing s Formulae A Multivaiate Nomal Law fo Tuing s Fomulae Zhiyi Zhang Depatment of Mathematics and Statistics Univesity of Noth Caolina at Chalotte Chalotte, NC 28223 Abstact This pape establishes a sufficient condition

More information

DonnishJournals

DonnishJournals DonnishJounals 041-1189 Donnish Jounal of Educational Reseach and Reviews. Vol 1(1) pp. 01-017 Novembe, 014. http:///dje Copyight 014 Donnish Jounals Oiginal Reseach Pape Vecto Analysis Using MAXIMA Savaş

More information

arxiv: v1 [math.nt] 12 May 2017

arxiv: v1 [math.nt] 12 May 2017 SEQUENCES OF CONSECUTIVE HAPPY NUMBERS IN NEGATIVE BASES HELEN G. GRUNDMAN AND PAMELA E. HARRIS axiv:1705.04648v1 [math.nt] 12 May 2017 ABSTRACT. Fo b 2 and e 2, let S e,b : Z Z 0 be the function taking

More information

On the ratio of maximum and minimum degree in maximal intersecting families

On the ratio of maximum and minimum degree in maximal intersecting families On the atio of maximum and minimum degee in maximal intesecting families Zoltán Lóánt Nagy Lale Özkahya Balázs Patkós Máté Vize Mach 6, 013 Abstact To study how balanced o unbalanced a maximal intesecting

More information

PROBLEM SET #1 SOLUTIONS by Robert A. DiStasio Jr.

PROBLEM SET #1 SOLUTIONS by Robert A. DiStasio Jr. POBLM S # SOLUIONS by obet A. DiStasio J. Q. he Bon-Oppenheime appoximation is the standad way of appoximating the gound state of a molecula system. Wite down the conditions that detemine the tonic and

More information

NOTE. Some New Bounds for Cover-Free Families

NOTE. Some New Bounds for Cover-Free Families Jounal of Combinatoial Theoy, Seies A 90, 224234 (2000) doi:10.1006jcta.1999.3036, available online at http:.idealibay.com on NOTE Some Ne Bounds fo Cove-Fee Families D. R. Stinson 1 and R. Wei Depatment

More information

As is natural, our Aerospace Structures will be described in a Euclidean three-dimensional space R 3.

As is natural, our Aerospace Structures will be described in a Euclidean three-dimensional space R 3. Appendix A Vecto Algeba As is natual, ou Aeospace Stuctues will be descibed in a Euclidean thee-dimensional space R 3. A.1 Vectos A vecto is used to epesent quantities that have both magnitude and diection.

More information

Duality between Statical and Kinematical Engineering Systems

Duality between Statical and Kinematical Engineering Systems Pape 00, Civil-Comp Ltd., Stiling, Scotland Poceedings of the Sixth Intenational Confeence on Computational Stuctues Technology, B.H.V. Topping and Z. Bittna (Editos), Civil-Comp Pess, Stiling, Scotland.

More information

An Application of Fuzzy Linear System of Equations in Economic Sciences

An Application of Fuzzy Linear System of Equations in Economic Sciences Austalian Jounal of Basic and Applied Sciences, 5(7): 7-14, 2011 ISSN 1991-8178 An Application of Fuzzy Linea System of Equations in Economic Sciences 1 S.H. Nassei, 2 M. Abdi and 3 B. Khabii 1 Depatment

More information

INTRODUCTION. 2. Vectors in Physics 1

INTRODUCTION. 2. Vectors in Physics 1 INTRODUCTION Vectos ae used in physics to extend the study of motion fom one dimension to two dimensions Vectos ae indispensable when a physical quantity has a diection associated with it As an example,

More information

On a quantity that is analogous to potential and a theorem that relates to it

On a quantity that is analogous to potential and a theorem that relates to it Su une quantité analogue au potential et su un théoème y elatif C R Acad Sci 7 (87) 34-39 On a quantity that is analogous to potential and a theoem that elates to it By R CLAUSIUS Tanslated by D H Delphenich

More information

arxiv: v1 [physics.pop-ph] 3 Jun 2013

arxiv: v1 [physics.pop-ph] 3 Jun 2013 A note on the electostatic enegy of two point chages axiv:1306.0401v1 [physics.pop-ph] 3 Jun 013 A C Tot Instituto de Física Univesidade Fedeal do io de Janeio Caixa Postal 68.58; CEP 1941-97 io de Janeio,

More information

We give improved upper bounds for the number of primitive solutions of the Thue inequality

We give improved upper bounds for the number of primitive solutions of the Thue inequality NUMBER OF SOLUTIONS OF CUBIC THUE INEQUALITIES WITH POSITIVE DISCRIMINANT N SARADHA AND DIVYUM SHARMA Abstact Let F(X, Y) be an ieducible binay cubic fom with intege coefficients and positive disciminant

More information

A THREE CRITICAL POINTS THEOREM AND ITS APPLICATIONS TO THE ORDINARY DIRICHLET PROBLEM

A THREE CRITICAL POINTS THEOREM AND ITS APPLICATIONS TO THE ORDINARY DIRICHLET PROBLEM A THREE CRITICAL POINTS THEOREM AND ITS APPLICATIONS TO THE ORDINARY DIRICHLET PROBLEM DIEGO AVERNA AND GABRIELE BONANNO Abstact. The aim of this pape is twofold. On one hand we establish a thee citical

More information

The Substring Search Problem

The Substring Search Problem The Substing Seach Poblem One algoithm which is used in a vaiety of applications is the family of substing seach algoithms. These algoithms allow a use to detemine if, given two chaacte stings, one is

More information

I. CONSTRUCTION OF THE GREEN S FUNCTION

I. CONSTRUCTION OF THE GREEN S FUNCTION I. CONSTRUCTION OF THE GREEN S FUNCTION The Helmohltz equation in 4 dimensions is 4 + k G 4 x, x = δ 4 x x. In this equation, G is the Geen s function and 4 efes to the dimensionality. In the vey end,

More information

2 S. Gao and M. A. Shokollahi opeations in Fq, and usually we will use the \Soft O" notation to ignoe logaithmic factos: g = O(n) ~ means that g = O(n

2 S. Gao and M. A. Shokollahi opeations in Fq, and usually we will use the \Soft O notation to ignoe logaithmic factos: g = O(n) ~ means that g = O(n Computing Roots of Polynomials ove Function Fields of Cuves Shuhong Gao 1 and M. Amin Shokollahi 2 1 Depatment of Mathematical Sciences, Clemson Univesity, Clemson, SC 29634 USA 2 Bell Labs, Rm. 2C-353,

More information

Conservative Averaging Method and its Application for One Heat Conduction Problem

Conservative Averaging Method and its Application for One Heat Conduction Problem Poceedings of the 4th WSEAS Int. Conf. on HEAT TRANSFER THERMAL ENGINEERING and ENVIRONMENT Elounda Geece August - 6 (pp6-) Consevative Aveaging Method and its Application fo One Heat Conduction Poblem

More information

On the Quasi-inverse of a Non-square Matrix: An Infinite Solution

On the Quasi-inverse of a Non-square Matrix: An Infinite Solution Applied Mathematical Sciences, Vol 11, 2017, no 27, 1337-1351 HIKARI Ltd, wwwm-hikaicom https://doiog/1012988/ams20177273 On the Quasi-invese of a Non-squae Matix: An Infinite Solution Ruben D Codeo J

More information

Exploration of the three-person duel

Exploration of the three-person duel Exploation of the thee-peson duel Andy Paish 15 August 2006 1 The duel Pictue a duel: two shootes facing one anothe, taking tuns fiing at one anothe, each with a fixed pobability of hitting his opponent.

More information

Goodness-of-fit for composite hypotheses.

Goodness-of-fit for composite hypotheses. Section 11 Goodness-of-fit fo composite hypotheses. Example. Let us conside a Matlab example. Let us geneate 50 obsevations fom N(1, 2): X=nomnd(1,2,50,1); Then, unning a chi-squaed goodness-of-fit test

More information

Fractional Zero Forcing via Three-color Forcing Games

Fractional Zero Forcing via Three-color Forcing Games Factional Zeo Focing via Thee-colo Focing Games Leslie Hogben Kevin F. Palmowski David E. Robeson Michael Young May 13, 2015 Abstact An -fold analogue of the positive semidefinite zeo focing pocess that

More information

ac p Answers to questions for The New Introduction to Geographical Economics, 2 nd edition Chapter 3 The core model of geographical economics

ac p Answers to questions for The New Introduction to Geographical Economics, 2 nd edition Chapter 3 The core model of geographical economics Answes to questions fo The New ntoduction to Geogaphical Economics, nd edition Chapte 3 The coe model of geogaphical economics Question 3. Fom intoductoy mico-economics we know that the condition fo pofit

More information

SOME GENERAL NUMERICAL RADIUS INEQUALITIES FOR THE OFF-DIAGONAL PARTS OF 2 2 OPERATOR MATRICES

SOME GENERAL NUMERICAL RADIUS INEQUALITIES FOR THE OFF-DIAGONAL PARTS OF 2 2 OPERATOR MATRICES italian jounal of pue and applied mathematics n. 35 015 (433 44) 433 SOME GENERAL NUMERICAL RADIUS INEQUALITIES FOR THE OFF-DIAGONAL PARTS OF OPERATOR MATRICES Watheq Bani-Domi Depatment of Mathematics

More information

Introduction Common Divisors. Discrete Mathematics Andrei Bulatov

Introduction Common Divisors. Discrete Mathematics Andrei Bulatov Intoduction Common Divisos Discete Mathematics Andei Bulatov Discete Mathematics Common Divisos 3- Pevious Lectue Integes Division, popeties of divisibility The division algoithm Repesentation of numbes

More information

Some RSA-based Encryption Schemes with Tight Security Reduction

Some RSA-based Encryption Schemes with Tight Security Reduction Some RSA-based Encyption Schemes with Tight Secuity Reduction Kaou Kuosawa 1 and Tsuyoshi Takagi 2 1 Ibaaki Univesity, 4-12-1 Nakanausawa, Hitachi, Ibaaki, 316-8511, Japan kuosawa@cis.ibaaki.ac.jp 2 Technische

More information

Lecture 18: Graph Isomorphisms

Lecture 18: Graph Isomorphisms INFR11102: Computational Complexity 22/11/2018 Lectue: Heng Guo Lectue 18: Gaph Isomophisms 1 An Athu-Melin potocol fo GNI Last time we gave a simple inteactive potocol fo GNI with pivate coins. We will

More information

Absorption Rate into a Small Sphere for a Diffusing Particle Confined in a Large Sphere

Absorption Rate into a Small Sphere for a Diffusing Particle Confined in a Large Sphere Applied Mathematics, 06, 7, 709-70 Published Online Apil 06 in SciRes. http://www.scip.og/jounal/am http://dx.doi.og/0.46/am.06.77065 Absoption Rate into a Small Sphee fo a Diffusing Paticle Confined in

More information

Improved Factoring Attacks on Multi-Prime RSA with Small Prime Difference

Improved Factoring Attacks on Multi-Prime RSA with Small Prime Difference Impoved Factoing Attacks on Multi-Pime RSA with Small Pime Diffeence Mengce Zheng 1,2, Nobou Kunihio 2, and Honggang Hu 1 1 Univesity of Science and Technology of China, China mengce.zheng@gmail.com 2

More information

A generalization of the Bernstein polynomials

A generalization of the Bernstein polynomials A genealization of the Benstein polynomials Halil Ouç and Geoge M Phillips Mathematical Institute, Univesity of St Andews, Noth Haugh, St Andews, Fife KY16 9SS, Scotland Dedicated to Philip J Davis This

More information

Central Coverage Bayes Prediction Intervals for the Generalized Pareto Distribution

Central Coverage Bayes Prediction Intervals for the Generalized Pareto Distribution Statistics Reseach Lettes Vol. Iss., Novembe Cental Coveage Bayes Pediction Intevals fo the Genealized Paeto Distibution Gyan Pakash Depatment of Community Medicine S. N. Medical College, Aga, U. P., India

More information

Compactly Supported Radial Basis Functions

Compactly Supported Radial Basis Functions Chapte 4 Compactly Suppoted Radial Basis Functions As we saw ealie, compactly suppoted functions Φ that ae tuly stictly conditionally positive definite of ode m > do not exist The compact suppot automatically

More information

arxiv: v1 [math.nt] 28 Oct 2017

arxiv: v1 [math.nt] 28 Oct 2017 ON th COEFFICIENT OF DIVISORS OF x n axiv:70049v [mathnt] 28 Oct 207 SAI TEJA SOMU Abstact Let,n be two natual numbes and let H(,n denote the maximal absolute value of th coefficient of divisos of x n

More information

QUANTUM ALGORITHMS IN ALGEBRAIC NUMBER THEORY

QUANTUM ALGORITHMS IN ALGEBRAIC NUMBER THEORY QUANTU ALGORITHS IN ALGEBRAIC NUBER THEORY SION RUBINSTEIN-SALZEDO Abstact. In this aticle, we discuss some quantum algoithms fo detemining the goup of units and the ideal class goup of a numbe field.

More information

Journal of Inequalities in Pure and Applied Mathematics

Journal of Inequalities in Pure and Applied Mathematics Jounal of Inequalities in Pue and Applied Mathematics COEFFICIENT INEQUALITY FOR A FUNCTION WHOSE DERIVATIVE HAS A POSITIVE REAL PART S. ABRAMOVICH, M. KLARIČIĆ BAKULA AND S. BANIĆ Depatment of Mathematics

More information

SUFFICIENT CONDITIONS FOR MAXIMALLY EDGE-CONNECTED AND SUPER-EDGE-CONNECTED GRAPHS DEPENDING ON THE CLIQUE NUMBER

SUFFICIENT CONDITIONS FOR MAXIMALLY EDGE-CONNECTED AND SUPER-EDGE-CONNECTED GRAPHS DEPENDING ON THE CLIQUE NUMBER Discussiones Mathematicae Gaph Theoy 39 (019) 567 573 doi:10.7151/dmgt.096 SUFFICIENT CONDITIONS FOR MAXIMALLY EDGE-CONNECTED AND SUPER-EDGE-CONNECTED GRAPHS DEPENDING ON THE CLIQUE NUMBER Lutz Volkmann

More information

AQI: Advanced Quantum Information Lecture 2 (Module 4): Order finding and factoring algorithms February 20, 2013

AQI: Advanced Quantum Information Lecture 2 (Module 4): Order finding and factoring algorithms February 20, 2013 AQI: Advanced Quantum Infomation Lectue 2 (Module 4): Ode finding and factoing algoithms Febuay 20, 203 Lectue: D. Mak Tame (email: m.tame@impeial.ac.uk) Intoduction In the last lectue we looked at the

More information

ANA BERRIZBEITIA, LUIS A. MEDINA, ALEXANDER C. MOLL, VICTOR H. MOLL, AND LAINE NOBLE

ANA BERRIZBEITIA, LUIS A. MEDINA, ALEXANDER C. MOLL, VICTOR H. MOLL, AND LAINE NOBLE THE p-adic VALUATION OF STIRLING NUMBERS ANA BERRIZBEITIA, LUIS A. MEDINA, ALEXANDER C. MOLL, VICTOR H. MOLL, AND LAINE NOBLE Abstact. Let p > 2 be a pime. The p-adic valuation of Stiling numbes of the

More information

Chapter 2: Introduction to Implicit Equations

Chapter 2: Introduction to Implicit Equations Habeman MTH 11 Section V: Paametic and Implicit Equations Chapte : Intoduction to Implicit Equations When we descibe cuves on the coodinate plane with algebaic equations, we can define the elationship

More information

On the integration of the equations of hydrodynamics

On the integration of the equations of hydrodynamics Uebe die Integation de hydodynamischen Gleichungen J f eine u angew Math 56 (859) -0 On the integation of the equations of hydodynamics (By A Clebsch at Calsuhe) Tanslated by D H Delphenich In a pevious

More information

Chapter 5 Linear Equations: Basic Theory and Practice

Chapter 5 Linear Equations: Basic Theory and Practice Chapte 5 inea Equations: Basic Theoy and actice In this chapte and the next, we ae inteested in the linea algebaic equation AX = b, (5-1) whee A is an m n matix, X is an n 1 vecto to be solved fo, and

More information

Lifting Private Information Retrieval from Two to any Number of Messages

Lifting Private Information Retrieval from Two to any Number of Messages Lifting Pivate Infomation Retieval fom Two to any umbe of Messages Rafael G.L. D Oliveia, Salim El Rouayheb ECE, Rutges Univesity, Piscataway, J Emails: d746@scaletmail.utges.edu, salim.elouayheb@utges.edu

More information

THE JEU DE TAQUIN ON THE SHIFTED RIM HOOK TABLEAUX. Jaejin Lee

THE JEU DE TAQUIN ON THE SHIFTED RIM HOOK TABLEAUX. Jaejin Lee Koean J. Math. 23 (2015), No. 3, pp. 427 438 http://dx.doi.og/10.11568/kjm.2015.23.3.427 THE JEU DE TAQUIN ON THE SHIFTED RIM HOOK TABLEAUX Jaejin Lee Abstact. The Schensted algoithm fist descibed by Robinson

More information

Gradient-based Neural Network for Online Solution of Lyapunov Matrix Equation with Li Activation Function

Gradient-based Neural Network for Online Solution of Lyapunov Matrix Equation with Li Activation Function Intenational Confeence on Infomation echnology and Management Innovation (ICIMI 05) Gadient-based Neual Netwok fo Online Solution of Lyapunov Matix Equation with Li Activation unction Shiheng Wang, Shidong

More information

MATH 220: SECOND ORDER CONSTANT COEFFICIENT PDE. We consider second order constant coefficient scalar linear PDEs on R n. These have the form

MATH 220: SECOND ORDER CONSTANT COEFFICIENT PDE. We consider second order constant coefficient scalar linear PDEs on R n. These have the form MATH 220: SECOND ORDER CONSTANT COEFFICIENT PDE ANDRAS VASY We conside second ode constant coefficient scala linea PDEs on R n. These have the fom Lu = f L = a ij xi xj + b i xi + c i whee a ij b i and

More information

Perturbation to Symmetries and Adiabatic Invariants of Nonholonomic Dynamical System of Relative Motion

Perturbation to Symmetries and Adiabatic Invariants of Nonholonomic Dynamical System of Relative Motion Commun. Theo. Phys. Beijing, China) 43 25) pp. 577 581 c Intenational Academic Publishes Vol. 43, No. 4, Apil 15, 25 Petubation to Symmeties and Adiabatic Invaiants of Nonholonomic Dynamical System of

More information

Scattering in Three Dimensions

Scattering in Three Dimensions Scatteing in Thee Dimensions Scatteing expeiments ae an impotant souce of infomation about quantum systems, anging in enegy fom vey low enegy chemical eactions to the highest possible enegies at the LHC.

More information

QIP Course 10: Quantum Factorization Algorithm (Part 3)

QIP Course 10: Quantum Factorization Algorithm (Part 3) QIP Couse 10: Quantum Factoization Algoithm (Pat 3 Ryutaoh Matsumoto Nagoya Univesity, Japan Send you comments to yutaoh.matsumoto@nagoya-u.jp Septembe 2018 @ Tokyo Tech. Matsumoto (Nagoya U. QIP Couse

More information

Pearson s Chi-Square Test Modifications for Comparison of Unweighted and Weighted Histograms and Two Weighted Histograms

Pearson s Chi-Square Test Modifications for Comparison of Unweighted and Weighted Histograms and Two Weighted Histograms Peason s Chi-Squae Test Modifications fo Compaison of Unweighted and Weighted Histogams and Two Weighted Histogams Univesity of Akueyi, Bogi, v/noduslód, IS-6 Akueyi, Iceland E-mail: nikolai@unak.is Two

More information

Weighted least-squares estimators of parametric functions of the regression coefficients under a general linear model

Weighted least-squares estimators of parametric functions of the regression coefficients under a general linear model Ann Inst Stat Math (2010) 62:929 941 DOI 10.1007/s10463-008-0199-8 Weighted least-squaes estimatos of paametic functions of the egession coefficients unde a geneal linea model Yongge Tian Received: 9 Januay

More information

A New Approach to General Relativity

A New Approach to General Relativity Apeion, Vol. 14, No. 3, July 7 7 A New Appoach to Geneal Relativity Ali Rıza Şahin Gaziosmanpaşa, Istanbul Tukey E-mail: aizasahin@gmail.com Hee we pesent a new point of view fo geneal elativity and/o

More information