Zero-Knowledge Protocols

Size: px
Start display at page:

Download "Zero-Knowledge Protocols"

Transcription

1 he People Zero-Knowlege Protools 2 he wars Prover (Peggy) Claim I Verifier (Vi) S Seret Deision 2 {true, false} zero-knowlege protool allows Peggy to Convine Vi that her laim is true an that she knows S Without revealing anything beyon that Peggy 3 Vi Claim I Seret S Stuent nother stuent I know how to solve the homework problem Peggy s solution n Internet user server I have a vali passwor the passwor Mathematiian he Clay Institute I have a proof that P is not equal to NP he proof 4

2 Claim I Prover (Peggy) li-aba s Zero-Knowlege Protool Verifier (Vi) S Seret Deision 2 {true, false} zero-knowlege protool allows Peggy to Convine Vi that her laim is true Without revealing anything beyon that Peggy Vi Claim I Seret S Stuent nother stuent I know how to solve the homework problem Peggy s solution n Internet user server I have a vali passwor the passwor Mathematiian he Clay Institute I have a proof that P is not equal to NP he proof 5 MW[, ] = Magi Wors opening the! portal MW[, ] = Magi Wors opening the! portal his story is use to eplain zero-knowlege in many plaes. Inluing Wikipeia. ut it oesn t make a lot of sense. We will use Joseph Jaeger s variant. 6 li aba s ZK Protool Peggy has seret S 2 {MW[, ], MW[, ]} li aba s ZK Protool Peggy oes not want Vi to know whih of the two magi wors she has. If Peggy knows MW[,] : If Peggy knows MW[,] : Peggy goes to Peggy goes to E E Final step, in either ase: Vi goes to E C {, } Peggy, please appear at C If C = Why Peggy an appear at whatever sie Vi requests. Vi goes to E C {, } Peggy, please appear at C : If Peggy s laim is true, meaning she knows either MW[,] or MW[,], an both parties follow the protool, then Vi will aept. If C = 7 8

3 li aba s ZK Protool li aba s ZK Protool : If Peggy s laim is true, meaning she knows either MW[,] or MW[,], an both parties follow the protool, then Vi will aept. Sounness: If Peggy s laim is false, meaning she knows neither MW[,] nor MW[,], then Vi will rejet with probability at least /2, even if Peggy heats, meaning oes not follow the presribe protool. Why eating Peggy an start at any X 2 {, } of her hoie, but Vi piks C at ranom an heating Peggy annot appear at C 6= X. : If Peggy s laim is true, meaning she knows either MW[,] or MW[,], an both parties follow the protool, then Vi will aept. Sounness: If Peggy s laim is false, meaning she knows neither MW[,] nor MW[,], then Vi will rejet with probability at least /2, even if Peggy heats, meaning oes not follow the presribe protool. Zero-knowlege: If Peggy s laim is true, an Peggy follows the protool, then Vi will not learn whih of the two serets MW[,], MW[,] Peggy knows. Why Regarless of the seret, Vi sees Peggy appearing at whatever sie he requests. 9 0 li aba s ZK Protool li aba s ZK Protool Pegg s laim is Vi will RUE always aept Sounness FLSE heating aept with probability at most /2 Zero-knowlege RUE not learn whih of the two serets Peggy knows Pegg s laim is Vi will RUE always aept Sounness FLSE heating aept with probability at most /2 Zero-knowlege RUE not learn whih of the two serets Peggy knows his story may not make omplete sense. o make zero-knowlege sensible, we nee DEFINIIONS. he efinitions are intriguing: how an one mathematially apture the ``knowlege learne by interating with another party 2

4 Some math efinitions Zero-knowlege protool for Quarati Resiuosity Let N be an integer. We say that 2 is a square-root of X 2 moulo N if 2 mo N = X. We say that X 2 is a square, or quarati resiue, moulo N, if it has a square root moulo N. SR(N, X) = { 2 : X = 2 mo N } he set of square roots of X moulo N QR(N ) = {X 2 : SR(N, X) 6= ;} QR = {(N, X) : N he set of quarati resiues moulo N an X 2 QR(N )}. he language of quarati resiues Eample: Let N = mo SR(, 5) = {4, 7} SR(, 6) = ; QR() = {, 3, 4, 5, 9} Fat: Let X 2. hen X 2 QR(N ) if an only if X Fat: Let, X 2 3. hen 2 SR(N, X) if an only if QR(N ) = {X 2 : SR(N, X) 6= ;} QR = {(N, X) : N an X 2 QR(N )}. he language of quarati resiues Input: Question: Is Input: N Fin: Some X (N) Input: Fin: square root of X moulo N his is easy: Pik an return X 2 mo N. mo N 2 SR(N, X mo N ). Verifier Vi oth parties have, the ommon input Peggy laims that is. Peggy has suh that 2 mo N = X Definition: Vi aepts if = true Return 2 {true, false} he protool is the presribe, shown steps for the parties. party an follow the protool (it is ) or not (it is heating). Vi is always, but not so Peggy. hese problems are har: here are no (known) effiient (polynomial-time) algorithms for them. ut easy in some ases: here are polynomial-time algorithms when N is prime. 5 Proving quarati resiuosity he set of square roots of X moulo N he set of quarati resiues moulo N mo N 2 QR(N ). 4 Compleity of QR SR(N, X) = { 2 : X = 2 mo N } is Vi will always aept Sounness not heating aept with probability at most /2 Zero-knowlege not learn 6

5 non-zk protool Verifier Vi Peggy has suh that 2 mo N = X non-zk protool Verifier Vi (2 mo N = X) ; Return (2 mo N = X) ; Return Sounness: heating (2 mo N = X) ; Return is Vi will always aept 7 Vi will always aept not heating Verifier Vi Peggy has suh that 2 mo N = X 8 Splitting Suppose we split up X as: X = Y mo N (2 mo N = X) ; Return Fat: p p Y = = Zero-knowlege for some, Y 2 If ( 2 QR(N ) an Y 2 QR(N )) then X 2 QR(N ) If X 62 QR(N ) then ( 62 QR(N ) or Y 62 QR(N )) Proof Intuition: Sounness hen we have: never aept non-zk protool is Sounness ut X 62 QR(N ) means there oes not eist suh that 2 mo N = X, so Vi will return = false. Verifier Vi is Vi will always aept not heating Proof, formally: never aept learn, so ZK fails 9 p p Y X We are given that 2 QR(N ), so = 2 mo N for some 2 We are given that Y 2 QR(N ), so Y = y 2 mo N for some y 2 Let w = y mo N hen w2 mo N = 2 y 2 mo N = Y mo N ut we are given that Y mo N = X So w2 mo N = X So X 2 QR(N ) 20

6 Splitting for zero knowlege oth parties have Peggy laims that is. Peggy has suh that 2 mo N = X Verifier Vi Peggy splits up X as: ; X (mo N )) ; Return Let Y = X mo N, so that X = Y mo N y assumption X 62 QR(N ) So by Fat either 62 QR(N ) or Y 62 QR(N ) So = false with probability at least /2 Sounness 2 ; Vi will always aept aept with probability at most /2 Sounness Zero-knowlege 23 (2 ) mo N X mo N Vi will always aept he ZK protool for QR mo N Verifier Vi mo N {0, } (2 X (mo N )) ; Return = mo N is a ranom square root of the ranom square X mo N is not heating X (mo N )) ; Return )2 mo N {0, } (2 (2 {0, } is Verifier Vi 22 Sounness mo N = ZK: oes not reveal a square root of X 2 = (2 ) p If = 0 then Peggy sens = p If = then Peggy sens = Y Sounness: If X is not (N) then one of the two Claims is false, so Vi rejets with probability at least /2 Vi piks a bit at ranom an asks: Peggy, please prove Claim mo N 2 mo N = ( hen she makes two laims: Claim 0: 2 QR(N ) Y 2 QR(N ) Claim : Verifier Vi X = Y mo N for some, Y 2 2 Peggy oes not want to reveal Return 2 {true, false} he ZK protool for QR is Vi will always aept not heating aept with probability most /2 learn nothing more about than he knew before 24

7 Defining an proving ZK for Quarati Resiuosity is Sounness not heating Zero-knowlege Vi will always aept aept with probability most /2 learn nothing more about than he knew before Note for eperts: What we efine here is -verifier, perfet zero knowlege for the QR protool. ut what eatly oes it mean that this protool is zero knowlege Net we give a DEFINIION an show that it is met r(p,v ) ((N, X), ) ransripts 2 ; mo N Verifier Vi mo N {0, } (2 his algorithm generates transripts Simulation ; 2 mo N We all these transripts real {0, } he algorithm takes the seret as input mo N (,, ) ZK Intuition: he information onveye by the protool is the Return transript. X (mo N )) ; Return ZK efinition iea: (P,V) is zero knowlege if a transript, that looks just like a real one, an be (effiiently) generate, given but not given. he protool is apture by the pair (P, V ) of algorithms esribing the behavior of the prover an verifier epite above. We want to efine what it means for this pair to be zero-knowlege for the language QR. protool transript is a possible sequene (,, ) of messages ehange. r(p,v ) ((N, X), ) his algorithm generates transripts ; 2 mo N {0, } mo N (,, ) Return Note: he algorithm takes the seret as input to o this! wo new members of the ast of haraters Simulator S akes input an generates a transript that is suppose to look like a real one. S oes NO get input! o show that our protool is ZK, we nee to ehibit a goo simulator S. It fools D D S 27 Distinguisher D akes input an tests whether was generate by r or by S 28 b0

8 Let (P,V) be the prover-verifier pair efining the protool. Let S be a aniate simulator. Simulation he aversary playing this game is the istinguisher D. Game ZK(P,V ),S Initialize b {0, } ransript((n, X), ) If (2 mo N 6= X) then return If (b = ) then r(p,v ) ((N, X), ) Else S((N, X)) Return Finalize(b0 ) Return (b0 = b) Probability that the game returns true when run with aversary D z } { D vzk (P,V ),S (D) = 2 Pr[ZK(P,V ),S ] goo! z } { Def: S is a zk simulator for (P, V ) over QR if vzk (P,V ),S (D) = 0 for all istinguishers D. ; 2 mo N mo N Verifier Vi {0, } (2 mo N X (mo N )) ; Return {0, } (2 X (mo N )) ; Return zk simulator Effiient No X (mo N ). his operation annot be effiiently performe. 30 ; simulator for the QR protool Simulator S 2 ((N, X)) SR(N, X) r(p,v ) ((N, X), ) Return simulator for the QR protool mo N Verifier Vi S((N, X)) must return = (,, ) suh that 2 Polynomial time, in length of input to S Here, O(k 3 ), where k is the length of N 29 ; 2 ask: Ehibit an effiient simulator S suh that vzk (P,V ),S (D) = 0 for all istinguishers D. Def: (P, V ) is a zero-knowlege protool for language QR if there eists an effiient zk simulator S for (P, V ) over QR. o show that our protool is ZK, we nee to ehibit an effiient zk simulator S. simulator for the QR protool 2 mo N mo N Verifier Vi {0, } (2 X (mo N )) ; Return ask: Ehibit an effiient simulator S suh that vzk (P,V ),S (D) = 0 for all istinguishers D. ask: Ehibit an effiient simulator S suh that vzk (P,V ),S (D) = 0 for all istinguishers D. S((N, X)) must return = (,, ) suh that 2 S((N, X)) must return = (,, ) suh that 2 Simulator S 0 ((N, X)) ; 2 mo N 0 ; mo N (,, ) Return X (mo N ). ek: X mo N = (2 ) = ( 2 Simulator S 0 ((N, X)) ; 2 mo N 0 ; mo N (,, ) Return X 0 mo N ) mo N = 2 mo N ttak: Looking goo ut we always have = 0! zk simulator Effiient 3 zk simulator Effiient No X (mo N ). Distinguisher D ransript((, 9)) (,, ) If ( = 0) then return 0 else return vzk (P,V ),S 0 (D) = /2 32

9 ; simulator for the QR protool! 2 mo N mo N Verifier Vi {0, } (2 X (mo N )) ; Return ask: Ehibit an effiient simulator S suh that vzk (P,V ),S (D) = 0 for all istinguishers D. S((N, X)) must return = (,, ) suh that 2 Simulator S((N, X)) {0, } ; 2 X mo N (,, ) Return X X mo N = ( 2 Verifier Vi mo N mo N {0, } (2 X (mo N )) ; Return (mo N ). X ) = 2 X ; 2 he trik is for the simulator to pik the omponents of the transript out of orer: first it piks, an then it omputes to math. ek: simulator for the QR protool! = 2 mo N X mo N X mo N Simulator S((N, X)) {0, } ; 2 X mo N (,, ) Return Looking goo n it is goo zk simulator Effiient 33 zk simulator Effiient 34 Zero-knowlege beyon Quarati Resiuosity Simulator S((N, X)) {0, } ; 2 X mo N (,, ) Return We gave a efinition of what it means for the above protool to be ZK. o show that this efinition was met, we ehibite the above simulator

10 Researh Utility In theory, zero-knowlege has lots of appliations. Muh reent work on effiient implementations. In systems for anonymous reentials an smart ontrats. People who work on it like to laim it is pratial. ut in pratie, usage is limite. Researh on zero-knowlege protools Consiers ifferent forms: perfet, statistial, omputational, onurrent, malleable, non-malleable, reset-seure, non-interative, suint, Gives lots of protools: For NP languages, for graph non-isomorphism, for PSPCE, with onstant rouns, Not everything ool is atually useful. We have other, more pratial ways to solve real problems

Lecture 18: Identification Schemes, Schnorr Signatures

Lecture 18: Identification Schemes, Schnorr Signatures CS 7880 Graduate Cryptography November 8, 2017 Leture 18: Identifiation Shemes, Shnorr Signatures Leturer: Daniel Wihs Sribe: Vikrant Singhal 1 Topi Covered Identifiation Shemes Shnorr Identifiation Sheme

More information

G /G Advanced Cryptography 10/21/2009. Lecture 7

G /G Advanced Cryptography 10/21/2009. Lecture 7 G22.3220-001/G63.2180 Advaned Cryptography 10/21/2009 Leturer: Yevgeniy Dodis Leture 7 Sribe: Aris Tentes In this leture we will over the following topis: Witness Hiding Σ-protools Alternative Constrution

More information

2. Properties of Functions

2. Properties of Functions 2. PROPERTIES OF FUNCTIONS 111 2. Properties of Funtions 2.1. Injetions, Surjetions, an Bijetions. Definition 2.1.1. Given f : A B 1. f is one-to-one (short han is 1 1) or injetive if preimages are unique.

More information

Announcements. Office Hours Swap: OH schedule has been updated to reflect this.

Announcements. Office Hours Swap: OH schedule has been updated to reflect this. SA Solving Announements Offie Hours Swap: Zavain has offie hours from 4-6PM toay in builing 460, room 040A. Rose has offie hours tonight from 7-9PM in Gates B26B. Keith has offie hours hursay from 2-4PM

More information

MAC Calculus II Summer All you need to know on partial fractions and more

MAC Calculus II Summer All you need to know on partial fractions and more MC -75-Calulus II Summer 00 ll you need to know on partial frations and more What are partial frations? following forms:.... where, α are onstants. Partial frations are frations of one of the + α, ( +

More information

5.4 Fundamental Theorem of Calculus Calculus. Do you remember the Fundamental Theorem of Algebra? Just thought I'd ask

5.4 Fundamental Theorem of Calculus Calculus. Do you remember the Fundamental Theorem of Algebra? Just thought I'd ask 5.4 FUNDAMENTAL THEOREM OF CALCULUS Do you remember the Funamental Theorem of Algebra? Just thought I' ask The Funamental Theorem of Calculus has two parts. These two parts tie together the concept of

More information

Section 2.1 The Derivative and the Tangent Line Problem

Section 2.1 The Derivative and the Tangent Line Problem Chapter 2 Differentiation Course Number Section 2.1 The Derivative an the Tangent Line Problem Objective: In this lesson you learne how to fin the erivative of a function using the limit efinition an unerstan

More information

EE 595 (PMP) Introduction to Security and Privacy Homework 4

EE 595 (PMP) Introduction to Security and Privacy Homework 4 EE 595 (PMP) Introuction to Security an Privacy Homework 4 Assigne: Monay, February 12, 2017, Due: Sunay, March 5, 2017 Instructor: Tamara Bonaci Department of Electrical Engineering University of Washington,

More information

Vectors in two dimensions

Vectors in two dimensions Vectors in two imensions Until now, we have been working in one imension only The main reason for this is to become familiar with the main physical ieas like Newton s secon law, without the aitional complication

More information

SAMPLE. Chapter 8 LOGIC EXERCISE 8A.1 EXERCISE 8A.2

SAMPLE. Chapter 8 LOGIC EXERCISE 8A.1 EXERCISE 8A.2 Chapter 8 LOGIC EXERCISE 8A.1 1 A proposition is a statement whih may e true or false. A proposition is ineterminate if it oes not have the same answer for all people. a proposition, false proposition,

More information

Integration Review. May 11, 2013

Integration Review. May 11, 2013 Integration Review May 11, 2013 Goals: Review the funamental theorem of calculus. Review u-substitution. Review integration by parts. Do lots of integration eamples. 1 Funamental Theorem of Calculus In

More information

Week 1: Number Theory - Euler Phi Function, Order and Primitive Roots. 1 Greatest Common Divisor and the Euler Phi Function

Week 1: Number Theory - Euler Phi Function, Order and Primitive Roots. 1 Greatest Common Divisor and the Euler Phi Function 2010 IMO Summer Training: Number Theory 1 Week 1: Number Theory - Euler Phi Function, Orer an Primitive Roots 1 Greatest Common Divisor an the Euler Phi Function Consier the following problem. Exercise

More information

Cryptography, winter term 16/17: Sample solution to assignment 2

Cryptography, winter term 16/17: Sample solution to assignment 2 U N S A R I V E R S A V I E I T A S N I S S Cryptography, winter term 6/7: Sample solution to assignment Cornelius Brand, Mar Roth Exerise. (Messing up the one-time pad) Consider the following modifiation

More information

CPSC 467: Cryptography and Computer Security

CPSC 467: Cryptography and Computer Security CPSC 467: Cryptography and Computer Security Michael J. Fischer Lecture 18 November 3, 2014 CPSC 467, Lecture 18 1/43 Zero Knowledge Interactive Proofs (ZKIP) Secret cave protocol ZKIP for graph isomorphism

More information

Lecture 10: Zero-Knowledge Proofs

Lecture 10: Zero-Knowledge Proofs Lecture 10: Zero-Knowledge Proofs Introduction to Modern Cryptography Benny Applebaum Tel-Aviv University Fall Semester, 2011 12 Some of these slides are based on note by Boaz Barak. Quo vadis? Eo Romam

More information

3.7 Implicit Differentiation -- A Brief Introduction -- Student Notes

3.7 Implicit Differentiation -- A Brief Introduction -- Student Notes Fin these erivatives of these functions: y.7 Implicit Differentiation -- A Brief Introuction -- Stuent Notes tan y sin tan = sin y e = e = Write the inverses of these functions: y tan y sin How woul we

More information

Homework 1 2/7/2018 SOLUTIONS Exercise 1. (a) Graph the following sets (i) C = {x R x in Z} Answer:

Homework 1 2/7/2018 SOLUTIONS Exercise 1. (a) Graph the following sets (i) C = {x R x in Z} Answer: Homework 1 2/7/2018 SOLTIONS Eercise 1. (a) Graph the following sets (i) C = { R in Z} nswer: 0 R (ii) D = {(, y), y in R,, y 2}. nswer: = 2 y y = 2 (iii) C C nswer: y 1 2 (iv) (C C) D nswer: = 2 y y =

More information

1 The Derivative of ln(x)

1 The Derivative of ln(x) Monay, December 3, 2007 The Derivative of ln() 1 The Derivative of ln() The first term or semester of most calculus courses will inclue the it efinition of the erivative an will work out, long han, a number

More information

Solutions to Practice Problems Tuesday, October 28, 2008

Solutions to Practice Problems Tuesday, October 28, 2008 Solutions to Practice Problems Tuesay, October 28, 2008 1. The graph of the function f is shown below. Figure 1: The graph of f(x) What is x 1 + f(x)? What is x 1 f(x)? An oes x 1 f(x) exist? If so, what

More information

3.2 Differentiability

3.2 Differentiability Section 3 Differentiability 09 3 Differentiability What you will learn about How f (a) Might Fail to Eist Differentiability Implies Local Linearity Numerical Derivatives on a Calculator Differentiability

More information

Efficient Construction of Semilinear Representations of Languages Accepted by Unary NFA

Efficient Construction of Semilinear Representations of Languages Accepted by Unary NFA Efficient Construction of Semilinear Representations of Languages Accepte by Unary NFA Zeněk Sawa Center for Applie Cybernetics, Department of Computer Science Technical University of Ostrava 17. listopau

More information

Lecture Note 2. 1 Bonferroni Principle. 1.1 Idea. 1.2 Want. Material covered today is from Chapter 1 and chapter 4

Lecture Note 2. 1 Bonferroni Principle. 1.1 Idea. 1.2 Want. Material covered today is from Chapter 1 and chapter 4 Lecture Note 2 Material covere toay is from Chapter an chapter 4 Bonferroni Principle. Iea Get an iea the frequency of events when things are ranom billion = 0 9 Each person has a % chance to stay in a

More information

COS433/Math 473: Cryptography. Mark Zhandry Princeton University Spring 2018

COS433/Math 473: Cryptography. Mark Zhandry Princeton University Spring 2018 COS433/Math 473: Cryptography Mark Zhandry Princeton University Spring 2018 Identification Identification Non- Repudiation Consider signature- based C- R sk ch=r res = Sig(vk,ch) Bob can prove to police

More information

Two formulas for the Euler ϕ-function

Two formulas for the Euler ϕ-function Two formulas for the Euler ϕ-function Robert Frieman A multiplication formula for ϕ(n) The first formula we want to prove is the following: Theorem 1. If n 1 an n 2 are relatively prime positive integers,

More information

Zero-Knowledge Proofs and Protocols

Zero-Knowledge Proofs and Protocols Seminar: Algorithms of IT Security and Cryptography Zero-Knowledge Proofs and Protocols Nikolay Vyahhi June 8, 2005 Abstract A proof is whatever convinces me. Shimon Even, 1978. Zero-knowledge proof is

More information

MA 2232 Lecture 08 - Review of Log and Exponential Functions and Exponential Growth

MA 2232 Lecture 08 - Review of Log and Exponential Functions and Exponential Growth MA 2232 Lecture 08 - Review of Log an Exponential Functions an Exponential Growth Friay, February 2, 2018. Objectives: Review log an exponential functions, their erivative an integration formulas. Exponential

More information

CPSC 467: Cryptography and Computer Security

CPSC 467: Cryptography and Computer Security CPSC 467: Cryptography and Computer Security Michael J. Fischer Lecture 19 November 8, 2017 CPSC 467, Lecture 19 1/37 Zero Knowledge Interactive Proofs (ZKIP) ZKIP for graph isomorphism Feige-Fiat-Shamir

More information

An Integer Solution of Fractional Programming Problem

An Integer Solution of Fractional Programming Problem Gen. Math. Notes, Vol. 4, No., June 0, pp. -9 ISSN 9-784; Copyright ICSRS Publiation, 0 www.i-srs.org Available free online at http://www.geman.in An Integer Solution of Frational Programming Problem S.C.

More information

Lecture Notes 20: Zero-Knowledge Proofs

Lecture Notes 20: Zero-Knowledge Proofs CS 127/CSCI E-127: Introduction to Cryptography Prof. Salil Vadhan Fall 2013 Lecture Notes 20: Zero-Knowledge Proofs Reading. Katz-Lindell Ÿ14.6.0-14.6.4,14.7 1 Interactive Proofs Motivation: how can parties

More information

CSE 5311 Notes 18: NP-Completeness

CSE 5311 Notes 18: NP-Completeness SE 53 Notes 8: NP-ompleteness (Last upate 7//3 8:3 PM) ELEMENTRY ONEPTS Satisfiability: ( p q) ( p q ) ( p q) ( p q ) Is there an assignment? (Deision Problem) Similar to ebugging a logi iruit - Is there

More information

Math 1271 Solutions for Fall 2005 Final Exam

Math 1271 Solutions for Fall 2005 Final Exam Math 7 Solutions for Fall 5 Final Eam ) Since the equation + y = e y cannot be rearrange algebraically in orer to write y as an eplicit function of, we must instea ifferentiate this relation implicitly

More information

Derivatives and the Product Rule

Derivatives and the Product Rule Derivatives an the Prouct Rule James K. Peterson Department of Biological Sciences an Department of Mathematical Sciences Clemson University January 28, 2014 Outline Differentiability Simple Derivatives

More information

τ = 10 seconds . In a non-relativistic N 1 = N The muon survival is given by the law of radioactive decay N(t)=N exp /.

τ = 10 seconds . In a non-relativistic N 1 = N The muon survival is given by the law of radioactive decay N(t)=N exp /. Muons on the moon Time ilation using ot prouts Time ilation using Lorentz boosts Cheking the etor formula Relatiisti aition of eloities Why you an t eee the spee of light by suessie boosts Doppler shifts

More information

Lecture 6: Calculus. In Song Kim. September 7, 2011

Lecture 6: Calculus. In Song Kim. September 7, 2011 Lecture 6: Calculus In Song Kim September 7, 20 Introuction to Differential Calculus In our previous lecture we came up with several ways to analyze functions. We saw previously that the slope of a linear

More information

Examining Applied Rational Functions

Examining Applied Rational Functions HiMAP Pull-Out Setion: Summer 1990 Eamining Applied Rational Funtions Flod Vest Referenes Environmental Protetion Agen. Gas Mileage Guide. (Copies an usuall e otained from a loal new ar dealer.) Information

More information

Chapter 9. There are 7 out of 50 measurements that are greater than or equal to 5.1; therefore, the fraction of the

Chapter 9. There are 7 out of 50 measurements that are greater than or equal to 5.1; therefore, the fraction of the Pratie questions 6 1 a y i = 6 µ = = 1 i = 1 y i µ i = 1 ( ) = 95 = s n 95 555. x i f i 1 1+ + 5+ n + 5 5 + n µ = = = f 11+ n 11+ n i 7 + n = 5 + n = 6n n = a Time (minutes) 1.6.1.6.1.6.1.6 5.1 5.6 6.1

More information

Lecture 15 - Zero Knowledge Proofs

Lecture 15 - Zero Knowledge Proofs Lecture 15 - Zero Knowledge Proofs Boaz Barak November 21, 2007 Zero knowledge for 3-coloring. We gave a ZK proof for the language QR of (x, n) such that x QR n. We ll now give a ZK proof (due to Goldreich,

More information

CMSC 313 Preview Slides

CMSC 313 Preview Slides CMSC 33 Preview Slies These are raft slies. The actual slies presente in lecture may be ifferent ue to last minute changes, scheule slippage,... UMBC, CMSC33, Richar Chang CMSC 33 Lecture

More information

Section 7.1: Integration by Parts

Section 7.1: Integration by Parts Section 7.1: Integration by Parts 1. Introuction to Integration Techniques Unlike ifferentiation where there are a large number of rules which allow you (in principle) to ifferentiate any function, the

More information

x = c of N if the limit of f (x) = L and the right-handed limit lim f ( x)

x = c of N if the limit of f (x) = L and the right-handed limit lim f ( x) Limit We say the limit of f () as approaches c equals L an write, lim L. One-Sie Limits (Left an Right-Hane Limits) Suppose a function f is efine near but not necessarily at We say that f has a left-hane

More information

SYNCHRONOUS SEQUENTIAL CIRCUITS

SYNCHRONOUS SEQUENTIAL CIRCUITS CHAPTER SYNCHRONOUS SEUENTIAL CIRCUITS Registers an counters, two very common synchronous sequential circuits, are introuce in this chapter. Register is a igital circuit for storing information. Contents

More information

CPSC 467b: Cryptography and Computer Security

CPSC 467b: Cryptography and Computer Security CPSC 467b: Cryptography and Computer Security Michael J. Fischer Lecture 16 March 19, 2012 CPSC 467b, Lecture 16 1/58 Authentication While Preventing Impersonation Challenge-response authentication protocols

More information

Sampler-B. Secondary Mathematics Assessment. Sampler 521-B

Sampler-B. Secondary Mathematics Assessment. Sampler 521-B Sampler-B Seonary Mathematis Assessment Sampler 51-B Instrutions for Stuents Desription This sample test inlues 15 Selete Response an 5 Construte Response questions. Eah Selete Response has a value of

More information

Introduction to Modern Cryptography. Benny Chor

Introduction to Modern Cryptography. Benny Chor Introduction to Modern Cryptography Benny Chor Hard Core Bits Coin Flipping Over the Phone Zero Knowledge Lecture 10 (version 1.1) Tel-Aviv University 18 March 2008. Slightly revised March 19. Hard Core

More information

Winter 2011 Josh Benaloh Brian LaMacchia

Winter 2011 Josh Benaloh Brian LaMacchia Winter 2011 Josh Benaloh Brian LaMacchia Fun with Public-Key Tonight we ll Introduce some basic tools of public-key crypto Combine the tools to create more powerful tools Lay the ground work for substantial

More information

SECTION 3.2 THE PRODUCT AND QUOTIENT RULES 1 8 3

SECTION 3.2 THE PRODUCT AND QUOTIENT RULES 1 8 3 SECTION 3.2 THE PRODUCT AND QUOTIENT RULES 8 3 L P f Q L segments L an L 2 to be tangent to the parabola at the transition points P an Q. (See the figure.) To simplify the equations you ecie to place the

More information

Lower Bounds for the Smoothed Number of Pareto optimal Solutions

Lower Bounds for the Smoothed Number of Pareto optimal Solutions Lower Bouns for the Smoothe Number of Pareto optimal Solutions Tobias Brunsch an Heiko Röglin Department of Computer Science, University of Bonn, Germany brunsch@cs.uni-bonn.e, heiko@roeglin.org Abstract.

More information

Zachary Scherr Math 503 HW 3 Due Friday, Feb 12

Zachary Scherr Math 503 HW 3 Due Friday, Feb 12 Zachary Scherr Math 503 HW 3 Due Friay, Feb 1 1 Reaing 1. Rea sections 7.5, 7.6, 8.1 of Dummit an Foote Problems 1. DF 7.5. Solution: This problem is trivial knowing how to work with universal properties.

More information

Chapter 8 Hypothesis Testing

Chapter 8 Hypothesis Testing Leture 5 for BST 63: Statistial Theory II Kui Zhang, Spring Chapter 8 Hypothesis Testing Setion 8 Introdution Definition 8 A hypothesis is a statement about a population parameter Definition 8 The two

More information

Journal of Mathematical Analysis and Applications

Journal of Mathematical Analysis and Applications J. Math. Anal. Appl. 371 (010) 759 763 Contents lists available at SieneDiret Journal of Mathematial Analysis an Appliations www.elsevier.om/loate/jmaa Singular Sturm omparison theorems Dov Aharonov, Uri

More information

2.6 Absolute Value Equations

2.6 Absolute Value Equations 96 CHAPTER 2 Equations, Inequalities, and Problem Solving 89. 5-8 6 212 + 2 6-211 + 22 90. 1 + 2 6 312 + 2 6 1 + 4 The formula for onverting Fahrenheit temperatures to Celsius temperatures is C = 5 1F

More information

Final Exam Study Guide and Practice Problems Solutions

Final Exam Study Guide and Practice Problems Solutions Final Exam Stuy Guie an Practice Problems Solutions Note: These problems are just some of the types of problems that might appear on the exam. However, to fully prepare for the exam, in aition to making

More information

1. A dependent variable is also known as a(n). a. explanatory variable b. control variable c. predictor variable d. response variable ANSWER:

1. A dependent variable is also known as a(n). a. explanatory variable b. control variable c. predictor variable d. response variable ANSWER: 1. A epenent variale is also known as a(n). a. explanatory variale. ontrol variale. preitor variale. response variale FEEDBACK: A epenent variale is known as a response variale. Definition of the Simple

More information

Oblivious Transfer Is Symmetric

Oblivious Transfer Is Symmetric Oblivious Transfer Is Symmetri Stefan Wolf and Jürg Wullshleger Computer Siene Department, ETH Zürih, Switzerland {wolf, wjuerg}@inf.ethz.h bstrat. We show that oblivious transfer of bits from to an be

More information

c-perfect Hashing Schemes for Binary Trees, with Applications to Parallel Memories

c-perfect Hashing Schemes for Binary Trees, with Applications to Parallel Memories -Perfet Hashing Shemes for Binary Trees, with Appliations to Parallel Memories (Extended Abstrat Gennaro Cordaso 1, Alberto Negro 1, Vittorio Sarano 1, and Arnold L.Rosenberg 2 1 Dipartimento di Informatia

More information

Math 225B: Differential Geometry, Homework 6

Math 225B: Differential Geometry, Homework 6 ath 225B: Differential Geometry, Homework 6 Ian Coley February 13, 214 Problem 8.7. Let ω be a 1-form on a manifol. Suppose that ω = for every lose urve in. Show that ω is exat. We laim that this onition

More information

( ) ( ) ( ) ( u) ( u) = are shown in Figure =, it is reasonable to speculate that. = cos u ) and the inside function ( ( t) du

( ) ( ) ( ) ( u) ( u) = are shown in Figure =, it is reasonable to speculate that. = cos u ) and the inside function ( ( t) du Porlan Communiy College MTH 51 Lab Manual The Chain Rule Aciviy 38 The funcions f ( = sin ( an k( sin( 3 38.1. Since f ( cos( k ( = cos( 3. Bu his woul imply ha k ( f ( = are shown in Figure =, i is reasonable

More information

EE 418: Network Security and Cryptography

EE 418: Network Security and Cryptography Problem 1 EE 418: Network Security an Cryptography Homework 5 Assigne: Wenesay, November 23, 2016, Due: Tuesay, December 6, 2016 Instructor: Tamara Bonaci Department of Electrical Engineering University

More information

SAMPLE FINAL EXAM MATH 16A WINTER 2017

SAMPLE FINAL EXAM MATH 16A WINTER 2017 SAMPLE FINAL EXAM MATH 16A WINTER 2017 The final eam consists of 5 parts, worth a total of 40 points. You are not allowe to use books, calculators, mobile phones or anything else besies your writing utensils.

More information

CS154. Non-Regular Languages, Minimizing DFAs

CS154. Non-Regular Languages, Minimizing DFAs CS54 Non-Regular Languages, Minimizing FAs CS54 Homework is due! Homework 2 will appear this afternoon 2 The Pumping Lemma: Structure in Regular Languages Let L be a regular language Then there is a positive

More information

Linear First-Order Equations

Linear First-Order Equations 5 Linear First-Orer Equations Linear first-orer ifferential equations make up another important class of ifferential equations that commonly arise in applications an are relatively easy to solve (in theory)

More information

Electromagnetic Theory Prof. Ruiz, UNC Asheville, doctorphys on YouTube Chapter B Notes. Special Relativity. B1. The Rotation Matrix

Electromagnetic Theory Prof. Ruiz, UNC Asheville, doctorphys on YouTube Chapter B Notes. Special Relativity. B1. The Rotation Matrix Eletromagneti Theory Prof. Ruiz, UNC Asheille, dotorphys on YouTube Chapter B Notes. Speial Relatiity B1. The Rotation Matrix There are two pairs of axes below. The prime axes are rotated with respet to

More information

A. Incorrect! The letter t does not appear in the expression of the given integral

A. Incorrect! The letter t does not appear in the expression of the given integral AP Physics C - Problem Drill 1: The Funamental Theorem of Calculus Question No. 1 of 1 Instruction: (1) Rea the problem statement an answer choices carefully () Work the problems on paper as neee (3) Question

More information

Computer Science 786S - Statistical Methods in Natural Language Processing and Data Analysis Page 1

Computer Science 786S - Statistical Methods in Natural Language Processing and Data Analysis Page 1 Computer Siene 786S - Statistial Methods in Natural Language Proessing and Data Analysis Page 1 Hypothesis Testing A statistial hypothesis is a statement about the nature of the distribution of a random

More information

McCreight s Suffix Tree Construction Algorithm. Milko Izamski B.Sc. Informatics Instructor: Barbara König

McCreight s Suffix Tree Construction Algorithm. Milko Izamski B.Sc. Informatics Instructor: Barbara König 1. Introution MCreight s Suffix Tree Constrution Algorithm Milko Izamski B.S. Informatis Instrutor: Barbara König The main goal of MCreight s algorithm is to buil a suffix tree in linear time. This is

More information

Lecture 23: Cryptography. 2 Symmetric-Key Cryptography

Lecture 23: Cryptography. 2 Symmetric-Key Cryptography A Theorist's Toolkit (CMU 18-859T, Fall 2013) Leturer: Ryan O'Donnell Leture 23: Cryptography November 25, 2013 Sribe: Linus Hamilton 1 Introdution Alie wants to send a seret message m to Bob, but doesn't

More information

Determinant and Trace

Determinant and Trace Determinant an Trace Area an mappings from the plane to itself: Recall that in the last set of notes we foun a linear mapping to take the unit square S = {, y } to any parallelogram P with one corner at

More information

Chapter 1 Overview: Review of Derivatives

Chapter 1 Overview: Review of Derivatives Chapter Overview: Review of Derivatives The purpose of this chapter is to review the how of ifferentiation. We will review all the erivative rules learne last year in PreCalculus. In the net several chapters,

More information

Common Mistakes & How to avoid them Class X - Math. Unit: Algebra. Types of Question Common Mistakes Points to be emphasised. points.

Common Mistakes & How to avoid them Class X - Math. Unit: Algebra. Types of Question Common Mistakes Points to be emphasised. points. Common Mistakes & How to avoid them Class X - Math Unit: Algera Chapter: Pair of Linear Equations in Two Variales Types of Question Common Mistakes Points to e emphasised Solving the system of (i) Error

More information

Solutions for HW9. Bipartite: put the red vertices in V 1 and the black in V 2. Not bipartite!

Solutions for HW9. Bipartite: put the red vertices in V 1 and the black in V 2. Not bipartite! Solutions for HW9 Exerise 28. () Drw C 6, W 6 K 6, n K 5,3. C 6 : W 6 : K 6 : K 5,3 : () Whih of the following re iprtite? Justify your nswer. Biprtite: put the re verties in V 1 n the lk in V 2. Biprtite:

More information

2-7. Fitting a Model to Data I. A Model of Direct Variation. Lesson. Mental Math

2-7. Fitting a Model to Data I. A Model of Direct Variation. Lesson. Mental Math Lesson 2-7 Fitting a Moel to Data I BIG IDEA If you etermine from a particular set of ata that y varies irectly or inversely as, you can graph the ata to see what relationship is reasonable. Using that

More information

HOW TO FACTOR. Next you reason that if it factors, then the factorization will look something like,

HOW TO FACTOR. Next you reason that if it factors, then the factorization will look something like, HOW TO FACTOR ax bx I now want to talk a bit about how to fator ax bx where all the oeffiients a, b, and are integers. The method that most people are taught these days in high shool (assuming you go to

More information

x f(x) x f(x) approaching 1 approaching 0.5 approaching 1 approaching 0.

x f(x) x f(x) approaching 1 approaching 0.5 approaching 1 approaching 0. Engineering Mathematics 2 26 February 2014 Limits of functions Consier the function 1 f() = 1. The omain of this function is R + \ {1}. The function is not efine at 1. What happens when is close to 1?

More information

Euler and Hamilton Paths

Euler and Hamilton Paths Euler an Hamilton Paths The town of Königserg, Prussia (now know as Kaliningra an part of the Russian repuli), was ivie into four setion y ranhes of the Pregel River. These four setions C A D B Figure:

More information

Quantum secret sharing without entanglement

Quantum secret sharing without entanglement Quantum seret sharing without entanglement Guo-Ping Guo, Guang-Can Guo Key Laboratory of Quantum Information, University of Siene and Tehnology of China, Chinese Aademy of Sienes, Hefei, Anhui, P.R.China,

More information

Calculus in the AP Physics C Course The Derivative

Calculus in the AP Physics C Course The Derivative Limits an Derivatives Calculus in the AP Physics C Course The Derivative In physics, the ieas of the rate change of a quantity (along with the slope of a tangent line) an the area uner a curve are essential.

More information

Pseudonym and Anonymous Credential Systems. Kyle Soska 4/13/2016

Pseudonym and Anonymous Credential Systems. Kyle Soska 4/13/2016 Pseudonym and Anonymous Credential Systems Kyle Soska 4/13/2016 Moving Past Encryption Encryption Does: Hide the contents of messages that are being communicated Provide tools for authenticating messages

More information

Zero-Knowledge Proofs 1

Zero-Knowledge Proofs 1 Zero-Knowledge Proofs 1 CS 702 SEMINAR Theme : Cryptography Instructor : Prof. C. Pandu Rangan ZERO-KNOWLEDGE PROOFS G. Venkatesan CS 93133 Dept. of C.S & E I.I.T Madras Zero-Knowledge Proofs 2 Outline

More information

x f(x) x f(x) approaching 1 approaching 0.5 approaching 1 approaching 0.

x f(x) x f(x) approaching 1 approaching 0.5 approaching 1 approaching 0. Engineering Mathematics 2 26 February 2014 Limits of functions Consier the function 1 f() = 1. The omain of this function is R + \ {1}. The function is not efine at 1. What happens when is close to 1?

More information

max min z i i=1 x j k s.t. j=1 x j j:i T j

max min z i i=1 x j k s.t. j=1 x j j:i T j AM 221: Advaned Optimization Spring 2016 Prof. Yaron Singer Leture 22 April 18th 1 Overview In this leture, we will study the pipage rounding tehnique whih is a deterministi rounding proedure that an be

More information

Maximum Entropy and Exponential Families

Maximum Entropy and Exponential Families Maximum Entropy and Exponential Families April 9, 209 Abstrat The goal of this note is to derive the exponential form of probability distribution from more basi onsiderations, in partiular Entropy. It

More information

CS 154, Lecture 4: Limitations on DFAs (I), Pumping Lemma, Minimizing DFAs

CS 154, Lecture 4: Limitations on DFAs (I), Pumping Lemma, Minimizing DFAs CS 154, Lecture 4: Limitations on FAs (I), Pumping Lemma, Minimizing FAs Regular or Not? Non-Regular Languages = { w w has equal number of occurrences of 01 and 10 } REGULAR! C = { w w has equal number

More information

Session 4: Efficient Zero Knowledge. Yehuda Lindell Bar-Ilan University

Session 4: Efficient Zero Knowledge. Yehuda Lindell Bar-Ilan University Session 4: Efficient Zero Knowledge Yehuda Lindell Bar-Ilan University 1 Proof Systems Completeness: can convince of a true statement Soundness: cannot convince for a false statement Classic proofs: Written

More information

Methods of evaluating tests

Methods of evaluating tests Methods of evaluating tests Let X,, 1 Xn be i.i.d. Bernoulli( p ). Then 5 j= 1 j ( 5, ) T = X Binomial p. We test 1 H : p vs. 1 1 H : p>. We saw that a LRT is 1 if t k* φ ( x ) =. otherwise (t is the observed

More information

TAYLOR S POLYNOMIAL APPROXIMATION FOR FUNCTIONS

TAYLOR S POLYNOMIAL APPROXIMATION FOR FUNCTIONS MISN-0-4 TAYLOR S POLYNOMIAL APPROXIMATION FOR FUNCTIONS f(x ± ) = f(x) ± f ' (x) + f '' (x) 2 ±... 1! 2! = 1.000 ± 0.100 + 0.005 ±... TAYLOR S POLYNOMIAL APPROXIMATION FOR FUNCTIONS by Peter Signell 1.

More information

Math 115 Section 018 Course Note

Math 115 Section 018 Course Note Course Note 1 General Functions Definition 1.1. A function is a rule that takes certain numbers as inputs an assigns to each a efinite output number. The set of all input numbers is calle the omain of

More information

How to write maths (well)

How to write maths (well) How to write maths (well) Dr Euan Spence 29 September 2017 These are the slides from a talk I gave to the new first-year students at Bath, annotated with some of the things I said (which appear in boxes

More information

CS 282A/MATH 209A: Foundations of Cryptography Prof. Rafail Ostrovsky. Lecture 9

CS 282A/MATH 209A: Foundations of Cryptography Prof. Rafail Ostrovsky. Lecture 9 CS 282A/MATH 209A: Foundations of Cryptography Prof. Rafail Ostrovsky Lecture 9 Lecture date: March 7-9, 2005 Scribe: S. Bhattacharyya, R. Deak, P. Mirzadeh 1 Interactive Proof Systems/Protocols 1.1 Introduction

More information

Sequence Analysis, WS 14/15, D. Huson & R. Neher (this part by D. Huson & J. Fischer) January 21,

Sequence Analysis, WS 14/15, D. Huson & R. Neher (this part by D. Huson & J. Fischer) January 21, Sequene Analysis, WS 14/15, D. Huson & R. Neher (this part by D. Huson & J. Fisher) January 21, 201511 9 Suffix Trees and Suffix Arrays This leture is based on the following soures, whih are all reommended

More information

Let R denote the event of a rainy day, W denote the event of a windy day and G denote a good shooting day.

Let R denote the event of a rainy day, W denote the event of a windy day and G denote a good shooting day. Hunter Wallae 50 points) Geoffrey s Mom likes to shoot duks. It is easier to shoot duks when the weather is wet and windy, sine the duks tend to fly from plae to plae. Duk hunting season lasts from September

More information

AP Calculus Summer Homework Worksheet Instructions

AP Calculus Summer Homework Worksheet Instructions Honors AP Calculus BC Thrill-a-Minute Summer Opportunity 018 Name Favorite Pre-Calculus Topic Your summer assignment is to have the review packet (a review of Algebra / Trig. and Pre-Calculus), Chapter

More information

The Natural Logarithm

The Natural Logarithm The Natural Logarithm -28-208 In earlier courses, you may have seen logarithms efine in terms of raising bases to powers. For eample, log 2 8 = 3 because 2 3 = 8. In those terms, the natural logarithm

More information

Unit #6 - Families of Functions, Taylor Polynomials, l Hopital s Rule

Unit #6 - Families of Functions, Taylor Polynomials, l Hopital s Rule Unit # - Families of Functions, Taylor Polynomials, l Hopital s Rule Some problems an solutions selecte or aapte from Hughes-Hallett Calculus. Critical Points. Consier the function f) = 54 +. b) a) Fin

More information

Linear and quadratic approximation

Linear and quadratic approximation Linear an quaratic approximation November 11, 2013 Definition: Suppose f is a function that is ifferentiable on an interval I containing the point a. The linear approximation to f at a is the linear function

More information

The Computational Complexity of the Unrooted Subtree Prune and Regraft Distance. Technical Report CS

The Computational Complexity of the Unrooted Subtree Prune and Regraft Distance. Technical Report CS The Computational Complexit of the Unroote ubtree rune an egraft Distane Glenn Hike Frank Dehne Anrew au-chaplin Christian Blouin Tehnial eport C-006-06 Jul, 006 Fault of Computer iene 6050 Universit Ave.,

More information

( ) Energy storage in CAPACITORs. q C

( ) Energy storage in CAPACITORs. q C Energy storage in CAPACITORs Charge capacitor by transferring bits of charge q at a time from bottom to top plate. Can use a battery to o this. Battery oes work which increase potential energy of capacitor.

More information

ON TAUBERIAN CONDITIONS FOR (C, 1) SUMMABILITY OF INTEGRALS

ON TAUBERIAN CONDITIONS FOR (C, 1) SUMMABILITY OF INTEGRALS REVISTA DE LA UNIÓN MATEMÁTICA ARGENTINA Vol. 54, No. 2, 213, Pages 59 65 Publishe online: December 8, 213 ON TAUBERIAN CONDITIONS FOR C, 1 SUMMABILITY OF INTEGRALS Abstract. We investigate some Tauberian

More information

Computing 2-Walks in Cubic Time

Computing 2-Walks in Cubic Time Computing 2-Walks in Cubi Time Anreas Shmi Max Plank Institute for Informatis Jens M. Shmit Tehnishe Universität Ilmenau Abstrat A 2-walk of a graph is a walk visiting every vertex at least one an at most

More information

The numbers inside a matrix are called the elements or entries of the matrix.

The numbers inside a matrix are called the elements or entries of the matrix. Chapter Review of Matries. Definitions A matrix is a retangular array of numers of the form a a a 3 a n a a a 3 a n a 3 a 3 a 33 a 3n..... a m a m a m3 a mn We usually use apital letters (for example,

More information

Integration by Parts

Integration by Parts Integration by Parts 6-3-207 If u an v are functions of, the Prouct Rule says that (uv) = uv +vu Integrate both sies: (uv) = uv = uv + u v + uv = uv vu, vu v u, I ve written u an v as shorthan for u an

More information