Zero-Knowledge Protocols
|
|
- Vivien Walsh
- 5 years ago
- Views:
Transcription
1 he People Zero-Knowlege Protools 2 he wars Prover (Peggy) Claim I Verifier (Vi) S Seret Deision 2 {true, false} zero-knowlege protool allows Peggy to Convine Vi that her laim is true an that she knows S Without revealing anything beyon that Peggy 3 Vi Claim I Seret S Stuent nother stuent I know how to solve the homework problem Peggy s solution n Internet user server I have a vali passwor the passwor Mathematiian he Clay Institute I have a proof that P is not equal to NP he proof 4
2 Claim I Prover (Peggy) li-aba s Zero-Knowlege Protool Verifier (Vi) S Seret Deision 2 {true, false} zero-knowlege protool allows Peggy to Convine Vi that her laim is true Without revealing anything beyon that Peggy Vi Claim I Seret S Stuent nother stuent I know how to solve the homework problem Peggy s solution n Internet user server I have a vali passwor the passwor Mathematiian he Clay Institute I have a proof that P is not equal to NP he proof 5 MW[, ] = Magi Wors opening the! portal MW[, ] = Magi Wors opening the! portal his story is use to eplain zero-knowlege in many plaes. Inluing Wikipeia. ut it oesn t make a lot of sense. We will use Joseph Jaeger s variant. 6 li aba s ZK Protool Peggy has seret S 2 {MW[, ], MW[, ]} li aba s ZK Protool Peggy oes not want Vi to know whih of the two magi wors she has. If Peggy knows MW[,] : If Peggy knows MW[,] : Peggy goes to Peggy goes to E E Final step, in either ase: Vi goes to E C {, } Peggy, please appear at C If C = Why Peggy an appear at whatever sie Vi requests. Vi goes to E C {, } Peggy, please appear at C : If Peggy s laim is true, meaning she knows either MW[,] or MW[,], an both parties follow the protool, then Vi will aept. If C = 7 8
3 li aba s ZK Protool li aba s ZK Protool : If Peggy s laim is true, meaning she knows either MW[,] or MW[,], an both parties follow the protool, then Vi will aept. Sounness: If Peggy s laim is false, meaning she knows neither MW[,] nor MW[,], then Vi will rejet with probability at least /2, even if Peggy heats, meaning oes not follow the presribe protool. Why eating Peggy an start at any X 2 {, } of her hoie, but Vi piks C at ranom an heating Peggy annot appear at C 6= X. : If Peggy s laim is true, meaning she knows either MW[,] or MW[,], an both parties follow the protool, then Vi will aept. Sounness: If Peggy s laim is false, meaning she knows neither MW[,] nor MW[,], then Vi will rejet with probability at least /2, even if Peggy heats, meaning oes not follow the presribe protool. Zero-knowlege: If Peggy s laim is true, an Peggy follows the protool, then Vi will not learn whih of the two serets MW[,], MW[,] Peggy knows. Why Regarless of the seret, Vi sees Peggy appearing at whatever sie he requests. 9 0 li aba s ZK Protool li aba s ZK Protool Pegg s laim is Vi will RUE always aept Sounness FLSE heating aept with probability at most /2 Zero-knowlege RUE not learn whih of the two serets Peggy knows Pegg s laim is Vi will RUE always aept Sounness FLSE heating aept with probability at most /2 Zero-knowlege RUE not learn whih of the two serets Peggy knows his story may not make omplete sense. o make zero-knowlege sensible, we nee DEFINIIONS. he efinitions are intriguing: how an one mathematially apture the ``knowlege learne by interating with another party 2
4 Some math efinitions Zero-knowlege protool for Quarati Resiuosity Let N be an integer. We say that 2 is a square-root of X 2 moulo N if 2 mo N = X. We say that X 2 is a square, or quarati resiue, moulo N, if it has a square root moulo N. SR(N, X) = { 2 : X = 2 mo N } he set of square roots of X moulo N QR(N ) = {X 2 : SR(N, X) 6= ;} QR = {(N, X) : N he set of quarati resiues moulo N an X 2 QR(N )}. he language of quarati resiues Eample: Let N = mo SR(, 5) = {4, 7} SR(, 6) = ; QR() = {, 3, 4, 5, 9} Fat: Let X 2. hen X 2 QR(N ) if an only if X Fat: Let, X 2 3. hen 2 SR(N, X) if an only if QR(N ) = {X 2 : SR(N, X) 6= ;} QR = {(N, X) : N an X 2 QR(N )}. he language of quarati resiues Input: Question: Is Input: N Fin: Some X (N) Input: Fin: square root of X moulo N his is easy: Pik an return X 2 mo N. mo N 2 SR(N, X mo N ). Verifier Vi oth parties have, the ommon input Peggy laims that is. Peggy has suh that 2 mo N = X Definition: Vi aepts if = true Return 2 {true, false} he protool is the presribe, shown steps for the parties. party an follow the protool (it is ) or not (it is heating). Vi is always, but not so Peggy. hese problems are har: here are no (known) effiient (polynomial-time) algorithms for them. ut easy in some ases: here are polynomial-time algorithms when N is prime. 5 Proving quarati resiuosity he set of square roots of X moulo N he set of quarati resiues moulo N mo N 2 QR(N ). 4 Compleity of QR SR(N, X) = { 2 : X = 2 mo N } is Vi will always aept Sounness not heating aept with probability at most /2 Zero-knowlege not learn 6
5 non-zk protool Verifier Vi Peggy has suh that 2 mo N = X non-zk protool Verifier Vi (2 mo N = X) ; Return (2 mo N = X) ; Return Sounness: heating (2 mo N = X) ; Return is Vi will always aept 7 Vi will always aept not heating Verifier Vi Peggy has suh that 2 mo N = X 8 Splitting Suppose we split up X as: X = Y mo N (2 mo N = X) ; Return Fat: p p Y = = Zero-knowlege for some, Y 2 If ( 2 QR(N ) an Y 2 QR(N )) then X 2 QR(N ) If X 62 QR(N ) then ( 62 QR(N ) or Y 62 QR(N )) Proof Intuition: Sounness hen we have: never aept non-zk protool is Sounness ut X 62 QR(N ) means there oes not eist suh that 2 mo N = X, so Vi will return = false. Verifier Vi is Vi will always aept not heating Proof, formally: never aept learn, so ZK fails 9 p p Y X We are given that 2 QR(N ), so = 2 mo N for some 2 We are given that Y 2 QR(N ), so Y = y 2 mo N for some y 2 Let w = y mo N hen w2 mo N = 2 y 2 mo N = Y mo N ut we are given that Y mo N = X So w2 mo N = X So X 2 QR(N ) 20
6 Splitting for zero knowlege oth parties have Peggy laims that is. Peggy has suh that 2 mo N = X Verifier Vi Peggy splits up X as: ; X (mo N )) ; Return Let Y = X mo N, so that X = Y mo N y assumption X 62 QR(N ) So by Fat either 62 QR(N ) or Y 62 QR(N ) So = false with probability at least /2 Sounness 2 ; Vi will always aept aept with probability at most /2 Sounness Zero-knowlege 23 (2 ) mo N X mo N Vi will always aept he ZK protool for QR mo N Verifier Vi mo N {0, } (2 X (mo N )) ; Return = mo N is a ranom square root of the ranom square X mo N is not heating X (mo N )) ; Return )2 mo N {0, } (2 (2 {0, } is Verifier Vi 22 Sounness mo N = ZK: oes not reveal a square root of X 2 = (2 ) p If = 0 then Peggy sens = p If = then Peggy sens = Y Sounness: If X is not (N) then one of the two Claims is false, so Vi rejets with probability at least /2 Vi piks a bit at ranom an asks: Peggy, please prove Claim mo N 2 mo N = ( hen she makes two laims: Claim 0: 2 QR(N ) Y 2 QR(N ) Claim : Verifier Vi X = Y mo N for some, Y 2 2 Peggy oes not want to reveal Return 2 {true, false} he ZK protool for QR is Vi will always aept not heating aept with probability most /2 learn nothing more about than he knew before 24
7 Defining an proving ZK for Quarati Resiuosity is Sounness not heating Zero-knowlege Vi will always aept aept with probability most /2 learn nothing more about than he knew before Note for eperts: What we efine here is -verifier, perfet zero knowlege for the QR protool. ut what eatly oes it mean that this protool is zero knowlege Net we give a DEFINIION an show that it is met r(p,v ) ((N, X), ) ransripts 2 ; mo N Verifier Vi mo N {0, } (2 his algorithm generates transripts Simulation ; 2 mo N We all these transripts real {0, } he algorithm takes the seret as input mo N (,, ) ZK Intuition: he information onveye by the protool is the Return transript. X (mo N )) ; Return ZK efinition iea: (P,V) is zero knowlege if a transript, that looks just like a real one, an be (effiiently) generate, given but not given. he protool is apture by the pair (P, V ) of algorithms esribing the behavior of the prover an verifier epite above. We want to efine what it means for this pair to be zero-knowlege for the language QR. protool transript is a possible sequene (,, ) of messages ehange. r(p,v ) ((N, X), ) his algorithm generates transripts ; 2 mo N {0, } mo N (,, ) Return Note: he algorithm takes the seret as input to o this! wo new members of the ast of haraters Simulator S akes input an generates a transript that is suppose to look like a real one. S oes NO get input! o show that our protool is ZK, we nee to ehibit a goo simulator S. It fools D D S 27 Distinguisher D akes input an tests whether was generate by r or by S 28 b0
8 Let (P,V) be the prover-verifier pair efining the protool. Let S be a aniate simulator. Simulation he aversary playing this game is the istinguisher D. Game ZK(P,V ),S Initialize b {0, } ransript((n, X), ) If (2 mo N 6= X) then return If (b = ) then r(p,v ) ((N, X), ) Else S((N, X)) Return Finalize(b0 ) Return (b0 = b) Probability that the game returns true when run with aversary D z } { D vzk (P,V ),S (D) = 2 Pr[ZK(P,V ),S ] goo! z } { Def: S is a zk simulator for (P, V ) over QR if vzk (P,V ),S (D) = 0 for all istinguishers D. ; 2 mo N mo N Verifier Vi {0, } (2 mo N X (mo N )) ; Return {0, } (2 X (mo N )) ; Return zk simulator Effiient No X (mo N ). his operation annot be effiiently performe. 30 ; simulator for the QR protool Simulator S 2 ((N, X)) SR(N, X) r(p,v ) ((N, X), ) Return simulator for the QR protool mo N Verifier Vi S((N, X)) must return = (,, ) suh that 2 Polynomial time, in length of input to S Here, O(k 3 ), where k is the length of N 29 ; 2 ask: Ehibit an effiient simulator S suh that vzk (P,V ),S (D) = 0 for all istinguishers D. Def: (P, V ) is a zero-knowlege protool for language QR if there eists an effiient zk simulator S for (P, V ) over QR. o show that our protool is ZK, we nee to ehibit an effiient zk simulator S. simulator for the QR protool 2 mo N mo N Verifier Vi {0, } (2 X (mo N )) ; Return ask: Ehibit an effiient simulator S suh that vzk (P,V ),S (D) = 0 for all istinguishers D. ask: Ehibit an effiient simulator S suh that vzk (P,V ),S (D) = 0 for all istinguishers D. S((N, X)) must return = (,, ) suh that 2 S((N, X)) must return = (,, ) suh that 2 Simulator S 0 ((N, X)) ; 2 mo N 0 ; mo N (,, ) Return X (mo N ). ek: X mo N = (2 ) = ( 2 Simulator S 0 ((N, X)) ; 2 mo N 0 ; mo N (,, ) Return X 0 mo N ) mo N = 2 mo N ttak: Looking goo ut we always have = 0! zk simulator Effiient 3 zk simulator Effiient No X (mo N ). Distinguisher D ransript((, 9)) (,, ) If ( = 0) then return 0 else return vzk (P,V ),S 0 (D) = /2 32
9 ; simulator for the QR protool! 2 mo N mo N Verifier Vi {0, } (2 X (mo N )) ; Return ask: Ehibit an effiient simulator S suh that vzk (P,V ),S (D) = 0 for all istinguishers D. S((N, X)) must return = (,, ) suh that 2 Simulator S((N, X)) {0, } ; 2 X mo N (,, ) Return X X mo N = ( 2 Verifier Vi mo N mo N {0, } (2 X (mo N )) ; Return (mo N ). X ) = 2 X ; 2 he trik is for the simulator to pik the omponents of the transript out of orer: first it piks, an then it omputes to math. ek: simulator for the QR protool! = 2 mo N X mo N X mo N Simulator S((N, X)) {0, } ; 2 X mo N (,, ) Return Looking goo n it is goo zk simulator Effiient 33 zk simulator Effiient 34 Zero-knowlege beyon Quarati Resiuosity Simulator S((N, X)) {0, } ; 2 X mo N (,, ) Return We gave a efinition of what it means for the above protool to be ZK. o show that this efinition was met, we ehibite the above simulator
10 Researh Utility In theory, zero-knowlege has lots of appliations. Muh reent work on effiient implementations. In systems for anonymous reentials an smart ontrats. People who work on it like to laim it is pratial. ut in pratie, usage is limite. Researh on zero-knowlege protools Consiers ifferent forms: perfet, statistial, omputational, onurrent, malleable, non-malleable, reset-seure, non-interative, suint, Gives lots of protools: For NP languages, for graph non-isomorphism, for PSPCE, with onstant rouns, Not everything ool is atually useful. We have other, more pratial ways to solve real problems
Lecture 18: Identification Schemes, Schnorr Signatures
CS 7880 Graduate Cryptography November 8, 2017 Leture 18: Identifiation Shemes, Shnorr Signatures Leturer: Daniel Wihs Sribe: Vikrant Singhal 1 Topi Covered Identifiation Shemes Shnorr Identifiation Sheme
More informationG /G Advanced Cryptography 10/21/2009. Lecture 7
G22.3220-001/G63.2180 Advaned Cryptography 10/21/2009 Leturer: Yevgeniy Dodis Leture 7 Sribe: Aris Tentes In this leture we will over the following topis: Witness Hiding Σ-protools Alternative Constrution
More information2. Properties of Functions
2. PROPERTIES OF FUNCTIONS 111 2. Properties of Funtions 2.1. Injetions, Surjetions, an Bijetions. Definition 2.1.1. Given f : A B 1. f is one-to-one (short han is 1 1) or injetive if preimages are unique.
More informationAnnouncements. Office Hours Swap: OH schedule has been updated to reflect this.
SA Solving Announements Offie Hours Swap: Zavain has offie hours from 4-6PM toay in builing 460, room 040A. Rose has offie hours tonight from 7-9PM in Gates B26B. Keith has offie hours hursay from 2-4PM
More informationMAC Calculus II Summer All you need to know on partial fractions and more
MC -75-Calulus II Summer 00 ll you need to know on partial frations and more What are partial frations? following forms:.... where, α are onstants. Partial frations are frations of one of the + α, ( +
More information5.4 Fundamental Theorem of Calculus Calculus. Do you remember the Fundamental Theorem of Algebra? Just thought I'd ask
5.4 FUNDAMENTAL THEOREM OF CALCULUS Do you remember the Funamental Theorem of Algebra? Just thought I' ask The Funamental Theorem of Calculus has two parts. These two parts tie together the concept of
More informationSection 2.1 The Derivative and the Tangent Line Problem
Chapter 2 Differentiation Course Number Section 2.1 The Derivative an the Tangent Line Problem Objective: In this lesson you learne how to fin the erivative of a function using the limit efinition an unerstan
More informationEE 595 (PMP) Introduction to Security and Privacy Homework 4
EE 595 (PMP) Introuction to Security an Privacy Homework 4 Assigne: Monay, February 12, 2017, Due: Sunay, March 5, 2017 Instructor: Tamara Bonaci Department of Electrical Engineering University of Washington,
More informationVectors in two dimensions
Vectors in two imensions Until now, we have been working in one imension only The main reason for this is to become familiar with the main physical ieas like Newton s secon law, without the aitional complication
More informationSAMPLE. Chapter 8 LOGIC EXERCISE 8A.1 EXERCISE 8A.2
Chapter 8 LOGIC EXERCISE 8A.1 1 A proposition is a statement whih may e true or false. A proposition is ineterminate if it oes not have the same answer for all people. a proposition, false proposition,
More informationIntegration Review. May 11, 2013
Integration Review May 11, 2013 Goals: Review the funamental theorem of calculus. Review u-substitution. Review integration by parts. Do lots of integration eamples. 1 Funamental Theorem of Calculus In
More informationWeek 1: Number Theory - Euler Phi Function, Order and Primitive Roots. 1 Greatest Common Divisor and the Euler Phi Function
2010 IMO Summer Training: Number Theory 1 Week 1: Number Theory - Euler Phi Function, Orer an Primitive Roots 1 Greatest Common Divisor an the Euler Phi Function Consier the following problem. Exercise
More informationCryptography, winter term 16/17: Sample solution to assignment 2
U N S A R I V E R S A V I E I T A S N I S S Cryptography, winter term 6/7: Sample solution to assignment Cornelius Brand, Mar Roth Exerise. (Messing up the one-time pad) Consider the following modifiation
More informationCPSC 467: Cryptography and Computer Security
CPSC 467: Cryptography and Computer Security Michael J. Fischer Lecture 18 November 3, 2014 CPSC 467, Lecture 18 1/43 Zero Knowledge Interactive Proofs (ZKIP) Secret cave protocol ZKIP for graph isomorphism
More informationLecture 10: Zero-Knowledge Proofs
Lecture 10: Zero-Knowledge Proofs Introduction to Modern Cryptography Benny Applebaum Tel-Aviv University Fall Semester, 2011 12 Some of these slides are based on note by Boaz Barak. Quo vadis? Eo Romam
More information3.7 Implicit Differentiation -- A Brief Introduction -- Student Notes
Fin these erivatives of these functions: y.7 Implicit Differentiation -- A Brief Introuction -- Stuent Notes tan y sin tan = sin y e = e = Write the inverses of these functions: y tan y sin How woul we
More informationHomework 1 2/7/2018 SOLUTIONS Exercise 1. (a) Graph the following sets (i) C = {x R x in Z} Answer:
Homework 1 2/7/2018 SOLTIONS Eercise 1. (a) Graph the following sets (i) C = { R in Z} nswer: 0 R (ii) D = {(, y), y in R,, y 2}. nswer: = 2 y y = 2 (iii) C C nswer: y 1 2 (iv) (C C) D nswer: = 2 y y =
More information1 The Derivative of ln(x)
Monay, December 3, 2007 The Derivative of ln() 1 The Derivative of ln() The first term or semester of most calculus courses will inclue the it efinition of the erivative an will work out, long han, a number
More informationSolutions to Practice Problems Tuesday, October 28, 2008
Solutions to Practice Problems Tuesay, October 28, 2008 1. The graph of the function f is shown below. Figure 1: The graph of f(x) What is x 1 + f(x)? What is x 1 f(x)? An oes x 1 f(x) exist? If so, what
More information3.2 Differentiability
Section 3 Differentiability 09 3 Differentiability What you will learn about How f (a) Might Fail to Eist Differentiability Implies Local Linearity Numerical Derivatives on a Calculator Differentiability
More informationEfficient Construction of Semilinear Representations of Languages Accepted by Unary NFA
Efficient Construction of Semilinear Representations of Languages Accepte by Unary NFA Zeněk Sawa Center for Applie Cybernetics, Department of Computer Science Technical University of Ostrava 17. listopau
More informationLecture Note 2. 1 Bonferroni Principle. 1.1 Idea. 1.2 Want. Material covered today is from Chapter 1 and chapter 4
Lecture Note 2 Material covere toay is from Chapter an chapter 4 Bonferroni Principle. Iea Get an iea the frequency of events when things are ranom billion = 0 9 Each person has a % chance to stay in a
More informationCOS433/Math 473: Cryptography. Mark Zhandry Princeton University Spring 2018
COS433/Math 473: Cryptography Mark Zhandry Princeton University Spring 2018 Identification Identification Non- Repudiation Consider signature- based C- R sk ch=r res = Sig(vk,ch) Bob can prove to police
More informationTwo formulas for the Euler ϕ-function
Two formulas for the Euler ϕ-function Robert Frieman A multiplication formula for ϕ(n) The first formula we want to prove is the following: Theorem 1. If n 1 an n 2 are relatively prime positive integers,
More informationZero-Knowledge Proofs and Protocols
Seminar: Algorithms of IT Security and Cryptography Zero-Knowledge Proofs and Protocols Nikolay Vyahhi June 8, 2005 Abstract A proof is whatever convinces me. Shimon Even, 1978. Zero-knowledge proof is
More informationMA 2232 Lecture 08 - Review of Log and Exponential Functions and Exponential Growth
MA 2232 Lecture 08 - Review of Log an Exponential Functions an Exponential Growth Friay, February 2, 2018. Objectives: Review log an exponential functions, their erivative an integration formulas. Exponential
More informationCPSC 467: Cryptography and Computer Security
CPSC 467: Cryptography and Computer Security Michael J. Fischer Lecture 19 November 8, 2017 CPSC 467, Lecture 19 1/37 Zero Knowledge Interactive Proofs (ZKIP) ZKIP for graph isomorphism Feige-Fiat-Shamir
More informationAn Integer Solution of Fractional Programming Problem
Gen. Math. Notes, Vol. 4, No., June 0, pp. -9 ISSN 9-784; Copyright ICSRS Publiation, 0 www.i-srs.org Available free online at http://www.geman.in An Integer Solution of Frational Programming Problem S.C.
More informationLecture Notes 20: Zero-Knowledge Proofs
CS 127/CSCI E-127: Introduction to Cryptography Prof. Salil Vadhan Fall 2013 Lecture Notes 20: Zero-Knowledge Proofs Reading. Katz-Lindell Ÿ14.6.0-14.6.4,14.7 1 Interactive Proofs Motivation: how can parties
More informationCSE 5311 Notes 18: NP-Completeness
SE 53 Notes 8: NP-ompleteness (Last upate 7//3 8:3 PM) ELEMENTRY ONEPTS Satisfiability: ( p q) ( p q ) ( p q) ( p q ) Is there an assignment? (Deision Problem) Similar to ebugging a logi iruit - Is there
More informationMath 1271 Solutions for Fall 2005 Final Exam
Math 7 Solutions for Fall 5 Final Eam ) Since the equation + y = e y cannot be rearrange algebraically in orer to write y as an eplicit function of, we must instea ifferentiate this relation implicitly
More informationDerivatives and the Product Rule
Derivatives an the Prouct Rule James K. Peterson Department of Biological Sciences an Department of Mathematical Sciences Clemson University January 28, 2014 Outline Differentiability Simple Derivatives
More informationτ = 10 seconds . In a non-relativistic N 1 = N The muon survival is given by the law of radioactive decay N(t)=N exp /.
Muons on the moon Time ilation using ot prouts Time ilation using Lorentz boosts Cheking the etor formula Relatiisti aition of eloities Why you an t eee the spee of light by suessie boosts Doppler shifts
More informationLecture 6: Calculus. In Song Kim. September 7, 2011
Lecture 6: Calculus In Song Kim September 7, 20 Introuction to Differential Calculus In our previous lecture we came up with several ways to analyze functions. We saw previously that the slope of a linear
More informationExamining Applied Rational Functions
HiMAP Pull-Out Setion: Summer 1990 Eamining Applied Rational Funtions Flod Vest Referenes Environmental Protetion Agen. Gas Mileage Guide. (Copies an usuall e otained from a loal new ar dealer.) Information
More informationChapter 9. There are 7 out of 50 measurements that are greater than or equal to 5.1; therefore, the fraction of the
Pratie questions 6 1 a y i = 6 µ = = 1 i = 1 y i µ i = 1 ( ) = 95 = s n 95 555. x i f i 1 1+ + 5+ n + 5 5 + n µ = = = f 11+ n 11+ n i 7 + n = 5 + n = 6n n = a Time (minutes) 1.6.1.6.1.6.1.6 5.1 5.6 6.1
More informationLecture 15 - Zero Knowledge Proofs
Lecture 15 - Zero Knowledge Proofs Boaz Barak November 21, 2007 Zero knowledge for 3-coloring. We gave a ZK proof for the language QR of (x, n) such that x QR n. We ll now give a ZK proof (due to Goldreich,
More informationCMSC 313 Preview Slides
CMSC 33 Preview Slies These are raft slies. The actual slies presente in lecture may be ifferent ue to last minute changes, scheule slippage,... UMBC, CMSC33, Richar Chang CMSC 33 Lecture
More informationSection 7.1: Integration by Parts
Section 7.1: Integration by Parts 1. Introuction to Integration Techniques Unlike ifferentiation where there are a large number of rules which allow you (in principle) to ifferentiate any function, the
More informationx = c of N if the limit of f (x) = L and the right-handed limit lim f ( x)
Limit We say the limit of f () as approaches c equals L an write, lim L. One-Sie Limits (Left an Right-Hane Limits) Suppose a function f is efine near but not necessarily at We say that f has a left-hane
More informationSYNCHRONOUS SEQUENTIAL CIRCUITS
CHAPTER SYNCHRONOUS SEUENTIAL CIRCUITS Registers an counters, two very common synchronous sequential circuits, are introuce in this chapter. Register is a igital circuit for storing information. Contents
More informationCPSC 467b: Cryptography and Computer Security
CPSC 467b: Cryptography and Computer Security Michael J. Fischer Lecture 16 March 19, 2012 CPSC 467b, Lecture 16 1/58 Authentication While Preventing Impersonation Challenge-response authentication protocols
More informationSampler-B. Secondary Mathematics Assessment. Sampler 521-B
Sampler-B Seonary Mathematis Assessment Sampler 51-B Instrutions for Stuents Desription This sample test inlues 15 Selete Response an 5 Construte Response questions. Eah Selete Response has a value of
More informationIntroduction to Modern Cryptography. Benny Chor
Introduction to Modern Cryptography Benny Chor Hard Core Bits Coin Flipping Over the Phone Zero Knowledge Lecture 10 (version 1.1) Tel-Aviv University 18 March 2008. Slightly revised March 19. Hard Core
More informationWinter 2011 Josh Benaloh Brian LaMacchia
Winter 2011 Josh Benaloh Brian LaMacchia Fun with Public-Key Tonight we ll Introduce some basic tools of public-key crypto Combine the tools to create more powerful tools Lay the ground work for substantial
More informationSECTION 3.2 THE PRODUCT AND QUOTIENT RULES 1 8 3
SECTION 3.2 THE PRODUCT AND QUOTIENT RULES 8 3 L P f Q L segments L an L 2 to be tangent to the parabola at the transition points P an Q. (See the figure.) To simplify the equations you ecie to place the
More informationLower Bounds for the Smoothed Number of Pareto optimal Solutions
Lower Bouns for the Smoothe Number of Pareto optimal Solutions Tobias Brunsch an Heiko Röglin Department of Computer Science, University of Bonn, Germany brunsch@cs.uni-bonn.e, heiko@roeglin.org Abstract.
More informationZachary Scherr Math 503 HW 3 Due Friday, Feb 12
Zachary Scherr Math 503 HW 3 Due Friay, Feb 1 1 Reaing 1. Rea sections 7.5, 7.6, 8.1 of Dummit an Foote Problems 1. DF 7.5. Solution: This problem is trivial knowing how to work with universal properties.
More informationChapter 8 Hypothesis Testing
Leture 5 for BST 63: Statistial Theory II Kui Zhang, Spring Chapter 8 Hypothesis Testing Setion 8 Introdution Definition 8 A hypothesis is a statement about a population parameter Definition 8 The two
More informationJournal of Mathematical Analysis and Applications
J. Math. Anal. Appl. 371 (010) 759 763 Contents lists available at SieneDiret Journal of Mathematial Analysis an Appliations www.elsevier.om/loate/jmaa Singular Sturm omparison theorems Dov Aharonov, Uri
More information2.6 Absolute Value Equations
96 CHAPTER 2 Equations, Inequalities, and Problem Solving 89. 5-8 6 212 + 2 6-211 + 22 90. 1 + 2 6 312 + 2 6 1 + 4 The formula for onverting Fahrenheit temperatures to Celsius temperatures is C = 5 1F
More informationFinal Exam Study Guide and Practice Problems Solutions
Final Exam Stuy Guie an Practice Problems Solutions Note: These problems are just some of the types of problems that might appear on the exam. However, to fully prepare for the exam, in aition to making
More information1. A dependent variable is also known as a(n). a. explanatory variable b. control variable c. predictor variable d. response variable ANSWER:
1. A epenent variale is also known as a(n). a. explanatory variale. ontrol variale. preitor variale. response variale FEEDBACK: A epenent variale is known as a response variale. Definition of the Simple
More informationOblivious Transfer Is Symmetric
Oblivious Transfer Is Symmetri Stefan Wolf and Jürg Wullshleger Computer Siene Department, ETH Zürih, Switzerland {wolf, wjuerg}@inf.ethz.h bstrat. We show that oblivious transfer of bits from to an be
More informationc-perfect Hashing Schemes for Binary Trees, with Applications to Parallel Memories
-Perfet Hashing Shemes for Binary Trees, with Appliations to Parallel Memories (Extended Abstrat Gennaro Cordaso 1, Alberto Negro 1, Vittorio Sarano 1, and Arnold L.Rosenberg 2 1 Dipartimento di Informatia
More informationMath 225B: Differential Geometry, Homework 6
ath 225B: Differential Geometry, Homework 6 Ian Coley February 13, 214 Problem 8.7. Let ω be a 1-form on a manifol. Suppose that ω = for every lose urve in. Show that ω is exat. We laim that this onition
More information( ) ( ) ( ) ( u) ( u) = are shown in Figure =, it is reasonable to speculate that. = cos u ) and the inside function ( ( t) du
Porlan Communiy College MTH 51 Lab Manual The Chain Rule Aciviy 38 The funcions f ( = sin ( an k( sin( 3 38.1. Since f ( cos( k ( = cos( 3. Bu his woul imply ha k ( f ( = are shown in Figure =, i is reasonable
More informationEE 418: Network Security and Cryptography
Problem 1 EE 418: Network Security an Cryptography Homework 5 Assigne: Wenesay, November 23, 2016, Due: Tuesay, December 6, 2016 Instructor: Tamara Bonaci Department of Electrical Engineering University
More informationSAMPLE FINAL EXAM MATH 16A WINTER 2017
SAMPLE FINAL EXAM MATH 16A WINTER 2017 The final eam consists of 5 parts, worth a total of 40 points. You are not allowe to use books, calculators, mobile phones or anything else besies your writing utensils.
More informationCS154. Non-Regular Languages, Minimizing DFAs
CS54 Non-Regular Languages, Minimizing FAs CS54 Homework is due! Homework 2 will appear this afternoon 2 The Pumping Lemma: Structure in Regular Languages Let L be a regular language Then there is a positive
More informationLinear First-Order Equations
5 Linear First-Orer Equations Linear first-orer ifferential equations make up another important class of ifferential equations that commonly arise in applications an are relatively easy to solve (in theory)
More informationElectromagnetic Theory Prof. Ruiz, UNC Asheville, doctorphys on YouTube Chapter B Notes. Special Relativity. B1. The Rotation Matrix
Eletromagneti Theory Prof. Ruiz, UNC Asheille, dotorphys on YouTube Chapter B Notes. Speial Relatiity B1. The Rotation Matrix There are two pairs of axes below. The prime axes are rotated with respet to
More informationA. Incorrect! The letter t does not appear in the expression of the given integral
AP Physics C - Problem Drill 1: The Funamental Theorem of Calculus Question No. 1 of 1 Instruction: (1) Rea the problem statement an answer choices carefully () Work the problems on paper as neee (3) Question
More informationComputer Science 786S - Statistical Methods in Natural Language Processing and Data Analysis Page 1
Computer Siene 786S - Statistial Methods in Natural Language Proessing and Data Analysis Page 1 Hypothesis Testing A statistial hypothesis is a statement about the nature of the distribution of a random
More informationMcCreight s Suffix Tree Construction Algorithm. Milko Izamski B.Sc. Informatics Instructor: Barbara König
1. Introution MCreight s Suffix Tree Constrution Algorithm Milko Izamski B.S. Informatis Instrutor: Barbara König The main goal of MCreight s algorithm is to buil a suffix tree in linear time. This is
More informationLecture 23: Cryptography. 2 Symmetric-Key Cryptography
A Theorist's Toolkit (CMU 18-859T, Fall 2013) Leturer: Ryan O'Donnell Leture 23: Cryptography November 25, 2013 Sribe: Linus Hamilton 1 Introdution Alie wants to send a seret message m to Bob, but doesn't
More informationDeterminant and Trace
Determinant an Trace Area an mappings from the plane to itself: Recall that in the last set of notes we foun a linear mapping to take the unit square S = {, y } to any parallelogram P with one corner at
More informationChapter 1 Overview: Review of Derivatives
Chapter Overview: Review of Derivatives The purpose of this chapter is to review the how of ifferentiation. We will review all the erivative rules learne last year in PreCalculus. In the net several chapters,
More informationCommon Mistakes & How to avoid them Class X - Math. Unit: Algebra. Types of Question Common Mistakes Points to be emphasised. points.
Common Mistakes & How to avoid them Class X - Math Unit: Algera Chapter: Pair of Linear Equations in Two Variales Types of Question Common Mistakes Points to e emphasised Solving the system of (i) Error
More informationSolutions for HW9. Bipartite: put the red vertices in V 1 and the black in V 2. Not bipartite!
Solutions for HW9 Exerise 28. () Drw C 6, W 6 K 6, n K 5,3. C 6 : W 6 : K 6 : K 5,3 : () Whih of the following re iprtite? Justify your nswer. Biprtite: put the re verties in V 1 n the lk in V 2. Biprtite:
More information2-7. Fitting a Model to Data I. A Model of Direct Variation. Lesson. Mental Math
Lesson 2-7 Fitting a Moel to Data I BIG IDEA If you etermine from a particular set of ata that y varies irectly or inversely as, you can graph the ata to see what relationship is reasonable. Using that
More informationHOW TO FACTOR. Next you reason that if it factors, then the factorization will look something like,
HOW TO FACTOR ax bx I now want to talk a bit about how to fator ax bx where all the oeffiients a, b, and are integers. The method that most people are taught these days in high shool (assuming you go to
More informationx f(x) x f(x) approaching 1 approaching 0.5 approaching 1 approaching 0.
Engineering Mathematics 2 26 February 2014 Limits of functions Consier the function 1 f() = 1. The omain of this function is R + \ {1}. The function is not efine at 1. What happens when is close to 1?
More informationEuler and Hamilton Paths
Euler an Hamilton Paths The town of Königserg, Prussia (now know as Kaliningra an part of the Russian repuli), was ivie into four setion y ranhes of the Pregel River. These four setions C A D B Figure:
More informationQuantum secret sharing without entanglement
Quantum seret sharing without entanglement Guo-Ping Guo, Guang-Can Guo Key Laboratory of Quantum Information, University of Siene and Tehnology of China, Chinese Aademy of Sienes, Hefei, Anhui, P.R.China,
More informationCalculus in the AP Physics C Course The Derivative
Limits an Derivatives Calculus in the AP Physics C Course The Derivative In physics, the ieas of the rate change of a quantity (along with the slope of a tangent line) an the area uner a curve are essential.
More informationPseudonym and Anonymous Credential Systems. Kyle Soska 4/13/2016
Pseudonym and Anonymous Credential Systems Kyle Soska 4/13/2016 Moving Past Encryption Encryption Does: Hide the contents of messages that are being communicated Provide tools for authenticating messages
More informationZero-Knowledge Proofs 1
Zero-Knowledge Proofs 1 CS 702 SEMINAR Theme : Cryptography Instructor : Prof. C. Pandu Rangan ZERO-KNOWLEDGE PROOFS G. Venkatesan CS 93133 Dept. of C.S & E I.I.T Madras Zero-Knowledge Proofs 2 Outline
More informationx f(x) x f(x) approaching 1 approaching 0.5 approaching 1 approaching 0.
Engineering Mathematics 2 26 February 2014 Limits of functions Consier the function 1 f() = 1. The omain of this function is R + \ {1}. The function is not efine at 1. What happens when is close to 1?
More informationmax min z i i=1 x j k s.t. j=1 x j j:i T j
AM 221: Advaned Optimization Spring 2016 Prof. Yaron Singer Leture 22 April 18th 1 Overview In this leture, we will study the pipage rounding tehnique whih is a deterministi rounding proedure that an be
More informationMaximum Entropy and Exponential Families
Maximum Entropy and Exponential Families April 9, 209 Abstrat The goal of this note is to derive the exponential form of probability distribution from more basi onsiderations, in partiular Entropy. It
More informationCS 154, Lecture 4: Limitations on DFAs (I), Pumping Lemma, Minimizing DFAs
CS 154, Lecture 4: Limitations on FAs (I), Pumping Lemma, Minimizing FAs Regular or Not? Non-Regular Languages = { w w has equal number of occurrences of 01 and 10 } REGULAR! C = { w w has equal number
More informationSession 4: Efficient Zero Knowledge. Yehuda Lindell Bar-Ilan University
Session 4: Efficient Zero Knowledge Yehuda Lindell Bar-Ilan University 1 Proof Systems Completeness: can convince of a true statement Soundness: cannot convince for a false statement Classic proofs: Written
More informationMethods of evaluating tests
Methods of evaluating tests Let X,, 1 Xn be i.i.d. Bernoulli( p ). Then 5 j= 1 j ( 5, ) T = X Binomial p. We test 1 H : p vs. 1 1 H : p>. We saw that a LRT is 1 if t k* φ ( x ) =. otherwise (t is the observed
More informationTAYLOR S POLYNOMIAL APPROXIMATION FOR FUNCTIONS
MISN-0-4 TAYLOR S POLYNOMIAL APPROXIMATION FOR FUNCTIONS f(x ± ) = f(x) ± f ' (x) + f '' (x) 2 ±... 1! 2! = 1.000 ± 0.100 + 0.005 ±... TAYLOR S POLYNOMIAL APPROXIMATION FOR FUNCTIONS by Peter Signell 1.
More informationMath 115 Section 018 Course Note
Course Note 1 General Functions Definition 1.1. A function is a rule that takes certain numbers as inputs an assigns to each a efinite output number. The set of all input numbers is calle the omain of
More informationHow to write maths (well)
How to write maths (well) Dr Euan Spence 29 September 2017 These are the slides from a talk I gave to the new first-year students at Bath, annotated with some of the things I said (which appear in boxes
More informationCS 282A/MATH 209A: Foundations of Cryptography Prof. Rafail Ostrovsky. Lecture 9
CS 282A/MATH 209A: Foundations of Cryptography Prof. Rafail Ostrovsky Lecture 9 Lecture date: March 7-9, 2005 Scribe: S. Bhattacharyya, R. Deak, P. Mirzadeh 1 Interactive Proof Systems/Protocols 1.1 Introduction
More informationSequence Analysis, WS 14/15, D. Huson & R. Neher (this part by D. Huson & J. Fischer) January 21,
Sequene Analysis, WS 14/15, D. Huson & R. Neher (this part by D. Huson & J. Fisher) January 21, 201511 9 Suffix Trees and Suffix Arrays This leture is based on the following soures, whih are all reommended
More informationLet R denote the event of a rainy day, W denote the event of a windy day and G denote a good shooting day.
Hunter Wallae 50 points) Geoffrey s Mom likes to shoot duks. It is easier to shoot duks when the weather is wet and windy, sine the duks tend to fly from plae to plae. Duk hunting season lasts from September
More informationAP Calculus Summer Homework Worksheet Instructions
Honors AP Calculus BC Thrill-a-Minute Summer Opportunity 018 Name Favorite Pre-Calculus Topic Your summer assignment is to have the review packet (a review of Algebra / Trig. and Pre-Calculus), Chapter
More informationThe Natural Logarithm
The Natural Logarithm -28-208 In earlier courses, you may have seen logarithms efine in terms of raising bases to powers. For eample, log 2 8 = 3 because 2 3 = 8. In those terms, the natural logarithm
More informationUnit #6 - Families of Functions, Taylor Polynomials, l Hopital s Rule
Unit # - Families of Functions, Taylor Polynomials, l Hopital s Rule Some problems an solutions selecte or aapte from Hughes-Hallett Calculus. Critical Points. Consier the function f) = 54 +. b) a) Fin
More informationLinear and quadratic approximation
Linear an quaratic approximation November 11, 2013 Definition: Suppose f is a function that is ifferentiable on an interval I containing the point a. The linear approximation to f at a is the linear function
More informationThe Computational Complexity of the Unrooted Subtree Prune and Regraft Distance. Technical Report CS
The Computational Complexit of the Unroote ubtree rune an egraft Distane Glenn Hike Frank Dehne Anrew au-chaplin Christian Blouin Tehnial eport C-006-06 Jul, 006 Fault of Computer iene 6050 Universit Ave.,
More information( ) Energy storage in CAPACITORs. q C
Energy storage in CAPACITORs Charge capacitor by transferring bits of charge q at a time from bottom to top plate. Can use a battery to o this. Battery oes work which increase potential energy of capacitor.
More informationON TAUBERIAN CONDITIONS FOR (C, 1) SUMMABILITY OF INTEGRALS
REVISTA DE LA UNIÓN MATEMÁTICA ARGENTINA Vol. 54, No. 2, 213, Pages 59 65 Publishe online: December 8, 213 ON TAUBERIAN CONDITIONS FOR C, 1 SUMMABILITY OF INTEGRALS Abstract. We investigate some Tauberian
More informationComputing 2-Walks in Cubic Time
Computing 2-Walks in Cubi Time Anreas Shmi Max Plank Institute for Informatis Jens M. Shmit Tehnishe Universität Ilmenau Abstrat A 2-walk of a graph is a walk visiting every vertex at least one an at most
More informationThe numbers inside a matrix are called the elements or entries of the matrix.
Chapter Review of Matries. Definitions A matrix is a retangular array of numers of the form a a a 3 a n a a a 3 a n a 3 a 3 a 33 a 3n..... a m a m a m3 a mn We usually use apital letters (for example,
More informationIntegration by Parts
Integration by Parts 6-3-207 If u an v are functions of, the Prouct Rule says that (uv) = uv +vu Integrate both sies: (uv) = uv = uv + u v + uv = uv vu, vu v u, I ve written u an v as shorthan for u an
More information