Oblivious Transfer using Elliptic Curves
|
|
- Meghan Sullivan
- 5 years ago
- Views:
Transcription
1 Oblivious Trasfer usig Elliptic Curves bhishek Parakh Louisiaa State Uiversity, ato Rouge, L May 4, 006 bstract: This paper proposes a algorithm for oblivious trasfer usig elliptic curves lso, we preset its applicatio to chose oe-out-of-two oblivious trasfer Itroductio oblivious trasfer scheme is a protocol i which a seder seds a message to a receiver with some fixed probability betwee 0 ad without the seder kowig whether or ot the receiver received the message The idea was itroduced i 98 by Michael Rabi [], [] Rabi developed a solutio to the problem of mutual exchage of secrets betwee two distrustful parties For example, lice ad ob have secrets S ad S, respectively, which they wish to exchage (S may be the password to a file that ob wats ad vice versa) The problem is to establish a protocol without a trusted third party ad without simultaeous exchage of messages Rabi exploited the fact that a square trasformatio c = m mod, = p q, p ad q are primes, results i two or four messages beig mapped to a sigle cipher Hece, usig Rabi s protocol, lice would covey the factors of (assumig lice is usig e a public key ecryptio method of the form c = m mod, where e is the ecryptio expoet) without kowig for sure whether ob received the factors or ot I other words, ob may or may ot receive the factors, each happeig with probability oehalf I this paper we itroduce a oblivious trasfer protocol usig elliptic curve cryptography (ECC), a fast upcomig competitor agaist RS We use exactly the same set up as described i [] We preset a algorithm that achieves oblivious trasfer betwee two parties usig elliptic curves for ecryptio of their messages Sectio discuses the basics of elliptic curve cryptography Sectio 3 itroduces the key observatio that led to the idea of oblivious trasfer ad Sectio 4 presets our algorithm together with a illustrative example Sectio 5 presets a applicatio of our oblivious trasfer algorithm to chose oe-out-of-two oblivious trasfer
2 asics of elliptic curves elliptic curve used for cryptographic purposes is defied as follows: y = x 3 + ax + b () where a ad b are iteger costats The set of poits E ( a, is a set ( x, y) of all x ad y satisfyig () For a elliptic curve over a fiite field Z p, we use the cubic equatio () i which the variables ad coefficiets all take o values i the set of itegers from 0 ad p, for some prime p, i which calculatios are performed modulo p Thus, we use y 3 mod p = ( x + ax + mod p () for cryptographic applicatios over fiite fields This set of poits is deoted as E p ( a, The order of a poit G = x, y ) o a elliptic curve is defied as the ( smallest positive iteger such that G = 0 Poit G is called the base poit i ( a, ad is picked such that its order is a very large value E p The security of ECC arises from the fact that forq = kp, where Q, P E ( a, ad k < p, it is easy to calculate Q give the values of k ad P, but it is p relatively very hard to determie k give the values of Q ad P stadard elliptic curve trasfer proceeds as follows: the first task i this system is to ecode the plai text message m to be set as a x y poit Pm It is the poit Pm that will be ecrypted as cipher-text ad subsequetly decrypted We caot simply ecode the message as the x or y coordiate at a poit, because ot all such coordiates are i ( a, Each user selects a private key ad geerates a public key E p P = G To ecrypt ad sed a message Pm to, chooses a radom positive iteger k ad produces a cipher-text C cosistig of the pair of poits m C m = { kg ; Pm + kp P has used s public key To decrypt the cipher-text, multiplies the first poit i the pair by s secret key ad subtracts the result from the secod poit: m ( kg) = Pm + k( G) ( kg) Pm P + kp =
3 Note that has masked the message P by addig kp to it Nobody but kows the m value of k, so eve though P is public, obody ca remove the mask kp Reader may refer to [3] for further backgroud o elliptic curve cryptography 3 Key Observatio If we look closely at square trasformatio i [] ad the elliptic curve equatio give by (), we ca rewrite () as y mod p = S (3) where S = ( x 3 + ax + mod p It should be clear to the reader that for every x coordiate there are two possible y coordiates However, ulike i square trasformatio, here either x or y ca be substituted for message, because ot all values of x ad y are permissible i ECC 4 The Proposed lgorithm Our aim is to allow exchage of secret S ad S betwee two parties ad without usig a trusted third party ad without simultaeous exchage Here, we do ot go ito the details of sigig the messages usig ECC ad take it for grated that all the messages are siged oth ad select a commo elliptic curve ( a, This iformatio is public They the decide upo oe x - coordiate Let the two poits correspodig to this x - coordiate be P ad P, whereupo by symmetry P = P The x - coordiate is also public kowledge Sice, ad have ot decided upo which y - coordiate to use, we will deote s choice of poit as P ad s choice as P, such that P = P or P = P E q Similarly, P = P or P = P Eve though the x - coordiate is commo, either party kows what is the fial poit chose by the other because there are two possible y - coordiates to choose from Now, let choose a secret key, which she wishes to use for ecryptio of her messages, with the aim of obliviously coveyig this secret key to lso, we assume that a procedure for mappig of to a poit o elliptic curve has bee predecided We call the poit o our elliptic curve, correspodig to, as Thus, if a perso kows P, he ca deduce from it Similar, arragemet is made o s side too P 3
4 Uder the above assumptios, the oblivious trasfer of secret key proceeds as follows: seds to : P seds to : { ; P ( P ) R R + ; where, is s secret key R is radomly chose poit by, belogig to the group ( a, E q 3 does : [ ( P ) R ( P ) + ] = Q 4 seds to : { ( P ) + Q ; ( R) P 5 does : a ( P ) Q ( P ) + = K ( ) K b R P = Z + + The sequece of steps preseted above achieves our goal of oblivious trasfer The two cases that arise i such a trasfer are P = P ad P P We discuss these two cases below ad show how the algorithm give above achieves our goal The differece betwee the two cases arises from step 3 Hece, we aalyze them step 3 owards Case I: P = P 3 does : [ ( P ) R ( P ) + ] = R 4 sed to : { ( P ) + R ; ( R) P 5 does : a ( P ) R ( P ) + + = R b ( R) P ( R) + = P Case II: P P I this case, we ote that P = P Therefore, the results are as follows: 4
5 3 does : [ ( P ) R ( P ) + ] = [ ( P ) + R ] 4 sed to : { ( P ) + [ ( P ) + R ] ; ( R) P 5 does : a ( P ) + ( P ) + R ] ( P ) b ( R) P ( K ) [ = K + P + Oce the receiver kows P, he ca deduce from it Therefore, this poit forward we refer to P as However, it is to be oted that o matter what calculatios are performed by i step 5, he caot get if P P The problem is equivalet to the discrete log problem i case of P P Sice, P = P with probability oe-half, receives the secret key with probability oe-half Returig to our algorithm, ca verify the value it has obtaied from step 5, whether it is or ot, by doig Z P ad Z P ad checkig if oe of them is equal to P set to it by i the first step I a similar maer, trasfers its secret key to with probability oe-half Oce this trasfer has bee achieved we ca follow similar step proposed i [] i order to prevet cheatig by either of the parties durig exchage of iformatio Here, we preset these steps, adaptig them to suit elliptic curve trasfers We defie the state of kowledge of the secret keys as follows: Z k Μ, = Μ, if if kows ' s secret key does ot kow ' s secret key Similarly, k Μ, = Μ, if if kows ' s secret key does ot kow ' s secret key where Μ is a costat ad Μ is the bit wise complemet of Μ fter the trasfer of keys accordig the algorithm preseted i this paper ad havig defied the state of kowledge of keys as above, 5
6 seds to : k S seds to : k S Note that the above two steps do ot provide either party ay iformatio about other s secret Now, may trasfer its secret to usig a elliptic curve cryptographic trasfer However, will ecode the secret usig its ow secret key ad ot the public key of the other party, as is usually doe i a stadard elliptic curve trasfers; G is the base poit with large order seds to : S G + does (assumig he kows ) : S + G G = S trasfers its secret to i the ext step i a similar maer However, suppose, at the last step were to cheat ad ot pass o his secret S to, the the fact that has cheated implies that has, ie k S = Μ S Thus, ca do Μ S Μ = S ad thus obtai S The probability, whe the protocol is completed, that either oe kows other s secret is oe-quarter Example: Let ad choose a elliptic curve E 3 (9, ) The equatio correspodig 3 to this curve is y mod 3 = ( x + 9x + ) mod 3 Now, both parties decide upo a commo x - coordiate, say 7 The two poits correspodig to this x - coordiate are P = (7, 6) ad P = (7, 7) From properties of elliptic curve, we have P = P Let choose a secret umber = 5 We do ot explore the details of its mappig of to the elliptic curve ad just refer to it as I tur, let chooses a secret umber P = 3 ad a radom poit R = (, ) Now we execute our algorithm by cosiderig the two cases separately: Case: P = (7, 6) ad = (7, 6) P seds to : = 5 (7, 6) = (, 8) P seds to : { P ; ( P ) + R; R = { 3 (7, 6); 3 (, 8) = { (, 0); (, 5); + (, ); (4, 9) 3 (, ) 6
7 3 does: [ ( P ) + R ( P ) ] = Q = 5 [ (, 5) 5 (, 0) ] = 5 [ (, 5) (3, 9) ] = 5[ (, ) ] = (7, 7) 4 seds to : { ( P ) + Q; ( R) = { (3, 9) + (7, 7); = { (5, 9); (, 3) 5 (4, 9) 5 does: a) ( P ) + Q ( P ) = K = ( 5, 9) 3(,8) = ( 5, 9) (3, 9) = (7, 7) ( R) P ( K) = (, 3) 3 (7, 7) + =, 3) = P ( (, 3) Case : P = (7, 6) ad = (7, 7) P seds to : = 5 (7, 6) = (, 8) P seds to : { P ; ( P 3 does: [ ( P ) + R; R = { 3 (7, 7); ) + R ( P ) ] = Q 3 (, 8) = { (, 3); (, 5); 5[ (3, ) ] = (9, 7) + (, ); (4, 9) = 5 [ (, 5) 5 (, 3) ] = 5 [ (, 5) (3, 4) ] = 3 (, ) 4 seds to : { ( P ) + Q; ( R) = { (3, 4) + (9, 7); = { (7, ); (, 3) 5 (4, 9) 7
8 5 does: a) ( P ) + Q ( P ) = K = ( 7, ) 3(,8) = ( 7, ) (3, 9) = (, ) ( R) P ( K) = (, 3) 3 (, ) + =, 3) P ( (4, 4) The above example makes the workig of our algorithm clear 5 Chose oe-out-of-two oblivious trasfer The chose oe-out-of-two oblivious trasfer, - OT for short, is a importat applicatio of the basic oblivious trasfer protocol I this trasfer, the seder seds two secrets ad s ad the receiver s iput is choice bit c ; the latter the lears s but s0 gets o iformatio about other secret s c This trasfer has bee implemeted usig expoetiatios Here we show that the oeout-of-two oblivious trasfer ca be implemeted usig the algorithm we preseted We assume that both parties are willig to take part i the protocol hoestly, ie is willig to disclose oe out of two secrets that it has to, but does ot wat to kow which oe secret it wats to kow lso, should lear oly the oe secret it wats to kow ad othig about the other is said to have two secrets ad s, associates two differet secret keys with each s0 of them These secret keys will be used to ecrypt s0 ad s whe trasferrig them to must be able to retrieve oly oe of these two secrets ad should ot come to kow, what has extracted Let associate keys with ad with s for ecryptio Now, s task is to retrieve oe of these two keys, ie retrieve if it wats to kow ad retrieve if s it wats to kow, i such a maer that should ot come to kow which key retrieved ad should ot gai ay iformatio about the other key associated with the other secret 0 s0 0 s0 c 8
9 x P = P s0 Recall, from the previous sectio that every - coordiate yields two poits ad P such that P declares that it is associatig secret with poit P ad secret s with poit P The trasfer of secret the proceeds as follows: seds to : { ; P seds to : { ; P 3 does : 0 P 0 [ ( P ) R ( P ) 0 0 ( P ) R 0 + ; ( P ) + R + ] = ; [ ( P ) R ( P ) 4 seds to : { P ; H + ] = H 0 ( ) + H 0 ( R) ; ( ) 0 P H ; R ( ) + ; R Note: ad is the mappig of secret keys ad to poits o the elliptic curve P 0 P 0 must have chose P i the secod step such that P = P if wats secret s 0 ad P = P if wats secret s Therefore after step 4, picks up oly oe of the two pairs of poits set to it by which will yield it the secret key it wats For example, if has chose P = P the the first pair of poits i step 4, ie { 0 ( P ) H ; R, will yield 0 i the followig maer : + ( ) 0 5 does : 0 a) 0 ( P ) + H ( 0P ) = H = 0R ( R) ( R) = P 0 From, ca easily calculate The secod pair of poits will ot yield ay key 0 Thus, ca get oly oe of the two secret keys ad remais oblivious to the fact that which of the two keys did retrieve P 0 Now, may sed both the secrets to i the followig maer: seds to : { Ps + 0 0G ; Ps G +, where Ps0 is the mappig of secret s0 to the elliptic curve 9
10 will be able to retrieve oly Ps0 i our example because it has oly 0 ad hece obtai It will ot be able to get ay iformatio from the secod half of the message s 0 s about secret does ot kow which of the two secrets did obtai We have achieved our goal of chose oe-out-of-two oblivious trasfers 6 Coclusios I this paper we have itroduced the idea of oblivious trasfer to elliptic curves ad preseted a algorithm for its implemetatio lso, we have show how it ca be applied to the traditioal problem of - OT The algorithm preseted here may be expressed i differet variats The key cotributio is the itroductio of oblivious trasfer to ECC The oe-out-of-two oblivious trasfer may be further modified i order to obtai -out-of- oblivious trasfer 7 Refereces MO Rabi Digitalized sigatures ad public-key fuctios as itractable as factorizatio MIT/LCS/TR-, MIT Laboratory for Computer Sciece, 979 M O Rabi How to exchage secrets by oblivious trasfer Techical Report TR-8, ike Computatio Laboratory, Harvard Uiversity, 98 3 Ege, Elliptic Curves ad their pplicatios to Cryptography Kluwer cademic, osto, 999 0
Seunghee Ye Ma 8: Week 5 Oct 28
Week 5 Summary I Sectio, we go over the Mea Value Theorem ad its applicatios. I Sectio 2, we will recap what we have covered so far this term. Topics Page Mea Value Theorem. Applicatios of the Mea Value
More informationA Block Cipher Using Linear Congruences
Joural of Computer Sciece 3 (7): 556-560, 2007 ISSN 1549-3636 2007 Sciece Publicatios A Block Cipher Usig Liear Cogrueces 1 V.U.K. Sastry ad 2 V. Jaaki 1 Academic Affairs, Sreeidhi Istitute of Sciece &
More information6.3 Testing Series With Positive Terms
6.3. TESTING SERIES WITH POSITIVE TERMS 307 6.3 Testig Series With Positive Terms 6.3. Review of what is kow up to ow I theory, testig a series a i for covergece amouts to fidig the i= sequece of partial
More informationSection 5.1 The Basics of Counting
1 Sectio 5.1 The Basics of Coutig Combiatorics, the study of arragemets of objects, is a importat part of discrete mathematics. I this chapter, we will lear basic techiques of coutig which has a lot of
More informationThe Random Walk For Dummies
The Radom Walk For Dummies Richard A Mote Abstract We look at the priciples goverig the oe-dimesioal discrete radom walk First we review five basic cocepts of probability theory The we cosider the Beroulli
More informationThe picture in figure 1.1 helps us to see that the area represents the distance traveled. Figure 1: Area represents distance travelled
1 Lecture : Area Area ad distace traveled Approximatig area by rectagles Summatio The area uder a parabola 1.1 Area ad distace Suppose we have the followig iformatio about the velocity of a particle, how
More informationConvergence of random variables. (telegram style notes) P.J.C. Spreij
Covergece of radom variables (telegram style otes).j.c. Spreij this versio: September 6, 2005 Itroductio As we kow, radom variables are by defiitio measurable fuctios o some uderlyig measurable space
More informationSEQUENCES AND SERIES
9 SEQUENCES AND SERIES INTRODUCTION Sequeces have may importat applicatios i several spheres of huma activities Whe a collectio of objects is arraged i a defiite order such that it has a idetified first
More informationThe multiplicative structure of finite field and a construction of LRC
IERG6120 Codig for Distributed Storage Systems Lecture 8-06/10/2016 The multiplicative structure of fiite field ad a costructio of LRC Lecturer: Keeth Shum Scribe: Zhouyi Hu Notatios: We use the otatio
More information6 Integers Modulo n. integer k can be written as k = qn + r, with q,r, 0 r b. So any integer.
6 Itegers Modulo I Example 2.3(e), we have defied the cogruece of two itegers a,b with respect to a modulus. Let us recall that a b (mod ) meas a b. We have proved that cogruece is a equivalece relatio
More information62. Power series Definition 16. (Power series) Given a sequence {c n }, the series. c n x n = c 0 + c 1 x + c 2 x 2 + c 3 x 3 +
62. Power series Defiitio 16. (Power series) Give a sequece {c }, the series c x = c 0 + c 1 x + c 2 x 2 + c 3 x 3 + is called a power series i the variable x. The umbers c are called the coefficiets of
More informationMAT 271 Project: Partial Fractions for certain rational functions
MAT 7 Project: Partial Fractios for certai ratioal fuctios Prerequisite kowledge: partial fractios from MAT 7, a very good commad of factorig ad complex umbers from Precalculus. To complete this project,
More informationMath 609/597: Cryptography 1
Math 609/597: Cryptography 1 The Solovay-Strasse Primality Test 12 October, 1993 Burt Roseberg Revised: 6 October, 2000 1 Itroductio We describe the Solovay-Strasse primality test. There is quite a bit
More informationThe Growth of Functions. Theoretical Supplement
The Growth of Fuctios Theoretical Supplemet The Triagle Iequality The triagle iequality is a algebraic tool that is ofte useful i maipulatig absolute values of fuctios. The triagle iequality says that
More informationMAT1026 Calculus II Basic Convergence Tests for Series
MAT026 Calculus II Basic Covergece Tests for Series Egi MERMUT 202.03.08 Dokuz Eylül Uiversity Faculty of Sciece Departmet of Mathematics İzmir/TURKEY Cotets Mootoe Covergece Theorem 2 2 Series of Real
More information1 Hash tables. 1.1 Implementation
Lecture 8 Hash Tables, Uiversal Hash Fuctios, Balls ad Bis Scribes: Luke Johsto, Moses Charikar, G. Valiat Date: Oct 18, 2017 Adapted From Virgiia Williams lecture otes 1 Hash tables A hash table is a
More information4.3 Growth Rates of Solutions to Recurrences
4.3. GROWTH RATES OF SOLUTIONS TO RECURRENCES 81 4.3 Growth Rates of Solutios to Recurreces 4.3.1 Divide ad Coquer Algorithms Oe of the most basic ad powerful algorithmic techiques is divide ad coquer.
More informationThe Choquet Integral with Respect to Fuzzy-Valued Set Functions
The Choquet Itegral with Respect to Fuzzy-Valued Set Fuctios Weiwei Zhag Abstract The Choquet itegral with respect to real-valued oadditive set fuctios, such as siged efficiecy measures, has bee used i
More informationProperties and Tests of Zeros of Polynomial Functions
Properties ad Tests of Zeros of Polyomial Fuctios The Remaider ad Factor Theorems: Sythetic divisio ca be used to fid the values of polyomials i a sometimes easier way tha substitutio. This is show by
More informationSOME TRIBONACCI IDENTITIES
Mathematics Today Vol.7(Dec-011) 1-9 ISSN 0976-38 Abstract: SOME TRIBONACCI IDENTITIES Shah Devbhadra V. Sir P.T.Sarvajaik College of Sciece, Athwalies, Surat 395001. e-mail : drdvshah@yahoo.com The sequece
More informationTHE ASYMPTOTIC COMPLEXITY OF MATRIX REDUCTION OVER FINITE FIELDS
THE ASYMPTOTIC COMPLEXITY OF MATRIX REDUCTION OVER FINITE FIELDS DEMETRES CHRISTOFIDES Abstract. Cosider a ivertible matrix over some field. The Gauss-Jorda elimiatio reduces this matrix to the idetity
More informationPrinciple Of Superposition
ecture 5: PREIMINRY CONCEP O RUCUR NYI Priciple Of uperpositio Mathematically, the priciple of superpositio is stated as ( a ) G( a ) G( ) G a a or for a liear structural system, the respose at a give
More informationSEQUENCES AND SERIES
Sequeces ad 6 Sequeces Ad SEQUENCES AND SERIES Successio of umbers of which oe umber is desigated as the first, other as the secod, aother as the third ad so o gives rise to what is called a sequece. Sequeces
More informationProduct measures, Tonelli s and Fubini s theorems For use in MAT3400/4400, autumn 2014 Nadia S. Larsen. Version of 13 October 2014.
Product measures, Toelli s ad Fubii s theorems For use i MAT3400/4400, autum 2014 Nadia S. Larse Versio of 13 October 2014. 1. Costructio of the product measure The purpose of these otes is to preset the
More informationIn number theory we will generally be working with integers, though occasionally fractions and irrationals will come into play.
Number Theory Math 5840 otes. Sectio 1: Axioms. I umber theory we will geerally be workig with itegers, though occasioally fractios ad irratioals will come ito play. Notatio: Z deotes the set of all itegers
More informationQuantum Computing Lecture 7. Quantum Factoring
Quatum Computig Lecture 7 Quatum Factorig Maris Ozols Quatum factorig A polyomial time quatum algorithm for factorig umbers was published by Peter Shor i 1994. Polyomial time meas that the umber of gates
More informationSECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES
SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES Read Sectio 1.5 (pages 5 9) Overview I Sectio 1.5 we lear to work with summatio otatio ad formulas. We will also itroduce a brief overview of sequeces,
More informationDiscrete-Time Systems, LTI Systems, and Discrete-Time Convolution
EEL5: Discrete-Time Sigals ad Systems. Itroductio I this set of otes, we begi our mathematical treatmet of discrete-time s. As show i Figure, a discrete-time operates or trasforms some iput sequece x [
More informationDiscrete Mathematics and Probability Theory Summer 2014 James Cook Note 15
CS 70 Discrete Mathematics ad Probability Theory Summer 2014 James Cook Note 15 Some Importat Distributios I this ote we will itroduce three importat probability distributios that are widely used to model
More informationMathematical Induction
Mathematical Iductio Itroductio Mathematical iductio, or just iductio, is a proof techique. Suppose that for every atural umber, P() is a statemet. We wish to show that all statemets P() are true. I a
More informationA Fixed Point Result Using a Function of 5-Variables
Joural of Physical Scieces, Vol., 2007, 57-6 Fixed Poit Result Usig a Fuctio of 5-Variables P. N. Dutta ad Biayak S. Choudhury Departmet of Mathematics Begal Egieerig ad Sciece Uiversity, Shibpur P.O.:
More information7. Modern Techniques. Data Encryption Standard (DES)
7. Moder Techiques. Data Ecryptio Stadard (DES) The objective of this chapter is to illustrate the priciples of moder covetioal ecryptio. For this purpose, we focus o the most widely used covetioal ecryptio
More informationSome Explicit Formulae of NAF and its Left-to-Right. Analogue Based on Booth Encoding
Vol.7, No.6 (01, pp.69-74 http://dx.doi.org/10.1457/ijsia.01.7.6.7 Some Explicit Formulae of NAF ad its Left-to-Right Aalogue Based o Booth Ecodig Dog-Guk Ha, Okyeo Yi, ad Tsuyoshi Takagi Kookmi Uiversity,
More informationLecture 11: Pseudorandom functions
COM S 6830 Cryptography Oct 1, 2009 Istructor: Rafael Pass 1 Recap Lecture 11: Pseudoradom fuctios Scribe: Stefao Ermo Defiitio 1 (Ge, Ec, Dec) is a sigle message secure ecryptio scheme if for all uppt
More informationProgressions. ILLUSTRATION 1 11, 7, 3, -1, i s an A.P. whose first term is 11 and the common difference 7-11=-4.
Progressios SEQUENCE A sequece is a fuctio whose domai is the set N of atural umbers. REAL SEQUENCE A Sequece whose rage is a subset of R is called a real sequece. I other words, a real sequece is a fuctio
More informationEnd-of-Year Contest. ERHS Math Club. May 5, 2009
Ed-of-Year Cotest ERHS Math Club May 5, 009 Problem 1: There are 9 cois. Oe is fake ad weighs a little less tha the others. Fid the fake coi by weighigs. Solutio: Separate the 9 cois ito 3 groups (A, B,
More informationSummary: Congruences. j=1. 1 Here we use the Mathematica syntax for the function. In Maple worksheets, the function
Summary: Cogrueces j whe divided by, ad determiig the additive order of a iteger mod. As described i the Prelab sectio, cogrueces ca be thought of i terms of coutig with rows, ad for some questios this
More informationSome Basic Diophantine Equations
Some Basic iophatie Equatios R.Maikada, epartmet of Mathematics, M.I.E.T. Egieerig College, Tiruchirappalli-7. Email: maimaths78@gmail.com bstract- - I this paper we preset a method for solvig the iophatie
More informationRandom Variables, Sampling and Estimation
Chapter 1 Radom Variables, Samplig ad Estimatio 1.1 Itroductio This chapter will cover the most importat basic statistical theory you eed i order to uderstad the ecoometric material that will be comig
More informationTopic 1 2: Sequences and Series. A sequence is an ordered list of numbers, e.g. 1, 2, 4, 8, 16, or
Topic : Sequeces ad Series A sequece is a ordered list of umbers, e.g.,,, 8, 6, or,,,.... A series is a sum of the terms of a sequece, e.g. + + + 8 + 6 + or... Sigma Notatio b The otatio f ( k) is shorthad
More informationFIR Filter Design: Part II
EEL335: Discrete-Time Sigals ad Systems. Itroductio I this set of otes, we cosider how we might go about desigig FIR filters with arbitrary frequecy resposes, through compositio of multiple sigle-peak
More informationRoberto s Notes on Series Chapter 2: Convergence tests Section 7. Alternating series
Roberto s Notes o Series Chapter 2: Covergece tests Sectio 7 Alteratig series What you eed to kow already: All basic covergece tests for evetually positive series. What you ca lear here: A test for series
More information( ) = p and P( i = b) = q.
MATH 540 Radom Walks Part 1 A radom walk X is special stochastic process that measures the height (or value) of a particle that radomly moves upward or dowward certai fixed amouts o each uit icremet of
More informationInfinite Sequences and Series
Chapter 6 Ifiite Sequeces ad Series 6.1 Ifiite Sequeces 6.1.1 Elemetary Cocepts Simply speakig, a sequece is a ordered list of umbers writte: {a 1, a 2, a 3,...a, a +1,...} where the elemets a i represet
More informationRandom Models. Tusheng Zhang. February 14, 2013
Radom Models Tusheg Zhag February 14, 013 1 Radom Walks Let me describe the model. Radom walks are used to describe the motio of a movig particle (object). Suppose that a particle (object) moves alog the
More informationFermat s Little Theorem. mod 13 = 0, = }{{} mod 13 = 0. = a a a }{{} mod 13 = a 12 mod 13 = 1, mod 13 = a 13 mod 13 = a.
Departmet of Mathematical Scieces Istructor: Daiva Puciskaite Discrete Mathematics Fermat s Little Theorem 43.. For all a Z 3, calculate a 2 ad a 3. Case a = 0. 0 0 2-times Case a 0. 0 0 3-times a a 2-times
More informationHashing and Amortization
Lecture Hashig ad Amortizatio Supplemetal readig i CLRS: Chapter ; Chapter 7 itro; Sectio 7.. Arrays ad Hashig Arrays are very useful. The items i a array are statically addressed, so that isertig, deletig,
More informationCalculus with Analytic Geometry 2
Calculus with Aalytic Geometry Fial Eam Study Guide ad Sample Problems Solutios The date for the fial eam is December, 7, 4-6:3p.m. BU Note. The fial eam will cosist of eercises, ad some theoretical questios,
More informationDiscrete Mathematics for CS Spring 2007 Luca Trevisan Lecture 22
CS 70 Discrete Mathematics for CS Sprig 2007 Luca Trevisa Lecture 22 Aother Importat Distributio The Geometric Distributio Questio: A biased coi with Heads probability p is tossed repeatedly util the first
More informationSeptember 2012 C1 Note. C1 Notes (Edexcel) Copyright - For AS, A2 notes and IGCSE / GCSE worksheets 1
September 0 s (Edecel) Copyright www.pgmaths.co.uk - For AS, A otes ad IGCSE / GCSE worksheets September 0 Copyright www.pgmaths.co.uk - For AS, A otes ad IGCSE / GCSE worksheets September 0 Copyright
More informationTR/46 OCTOBER THE ZEROS OF PARTIAL SUMS OF A MACLAURIN EXPANSION A. TALBOT
TR/46 OCTOBER 974 THE ZEROS OF PARTIAL SUMS OF A MACLAURIN EXPANSION by A. TALBOT .. Itroductio. A problem i approximatio theory o which I have recetly worked [] required for its solutio a proof that the
More informationUC Berkeley CS 170: Efficient Algorithms and Intractable Problems Handout 17 Lecturer: David Wagner April 3, Notes 17 for CS 170
UC Berkeley CS 170: Efficiet Algorithms ad Itractable Problems Hadout 17 Lecturer: David Wager April 3, 2003 Notes 17 for CS 170 1 The Lempel-Ziv algorithm There is a sese i which the Huffma codig was
More informationInjections, Surjections, and the Pigeonhole Principle
Ijectios, Surjectios, ad the Pigeohole Priciple 1 (10 poits Here we will come up with a sloppy boud o the umber of parethesisestigs (a (5 poits Describe a ijectio from the set of possible ways to est pairs
More informationMath 61CM - Solutions to homework 3
Math 6CM - Solutios to homework 3 Cédric De Groote October 2 th, 208 Problem : Let F be a field, m 0 a fixed oegative iteger ad let V = {a 0 + a x + + a m x m a 0,, a m F} be the vector space cosistig
More informationChimica Inorganica 3
himica Iorgaica Irreducible Represetatios ad haracter Tables Rather tha usig geometrical operatios, it is ofte much more coveiet to employ a ew set of group elemets which are matrices ad to make the rule
More informationMath 155 (Lecture 3)
Math 55 (Lecture 3) September 8, I this lecture, we ll cosider the aswer to oe of the most basic coutig problems i combiatorics Questio How may ways are there to choose a -elemet subset of the set {,,,
More informationWe are mainly going to be concerned with power series in x, such as. (x)} converges - that is, lims N n
Review of Power Series, Power Series Solutios A power series i x - a is a ifiite series of the form c (x a) =c +c (x a)+(x a) +... We also call this a power series cetered at a. Ex. (x+) is cetered at
More information3. Z Transform. Recall that the Fourier transform (FT) of a DT signal xn [ ] is ( ) [ ] = In order for the FT to exist in the finite magnitude sense,
3. Z Trasform Referece: Etire Chapter 3 of text. Recall that the Fourier trasform (FT) of a DT sigal x [ ] is ω ( ) [ ] X e = j jω k = xe I order for the FT to exist i the fiite magitude sese, S = x [
More informationEE / EEE SAMPLE STUDY MATERIAL. GATE, IES & PSUs Signal System. Electrical Engineering. Postal Correspondence Course
Sigal-EE Postal Correspodece Course 1 SAMPLE STUDY MATERIAL Electrical Egieerig EE / EEE Postal Correspodece Course GATE, IES & PSUs Sigal System Sigal-EE Postal Correspodece Course CONTENTS 1. SIGNAL
More information3.2 Properties of Division 3.3 Zeros of Polynomials 3.4 Complex and Rational Zeros of Polynomials
Math 60 www.timetodare.com 3. Properties of Divisio 3.3 Zeros of Polyomials 3.4 Complex ad Ratioal Zeros of Polyomials I these sectios we will study polyomials algebraically. Most of our work will be cocered
More informationMath 113 Exam 3 Practice
Math Exam Practice Exam will cover.-.9. This sheet has three sectios. The first sectio will remid you about techiques ad formulas that you should kow. The secod gives a umber of practice questios for you
More informationCommutativity in Permutation Groups
Commutativity i Permutatio Groups Richard Wito, PhD Abstract I the group Sym(S) of permutatios o a oempty set S, fixed poits ad trasiet poits are defied Prelimiary results o fixed ad trasiet poits are
More informationSequences A sequence of numbers is a function whose domain is the positive integers. We can see that the sequence
Sequeces A sequece of umbers is a fuctio whose domai is the positive itegers. We ca see that the sequece 1, 1, 2, 2, 3, 3,... is a fuctio from the positive itegers whe we write the first sequece elemet
More informationProof of Fermat s Last Theorem by Algebra Identities and Linear Algebra
Proof of Fermat s Last Theorem by Algebra Idetities ad Liear Algebra Javad Babaee Ragai Youg Researchers ad Elite Club, Qaemshahr Brach, Islamic Azad Uiversity, Qaemshahr, Ira Departmet of Civil Egieerig,
More informationMath 2784 (or 2794W) University of Connecticut
ORDERS OF GROWTH PAT SMITH Math 2784 (or 2794W) Uiversity of Coecticut Date: Mar. 2, 22. ORDERS OF GROWTH. Itroductio Gaiig a ituitive feel for the relative growth of fuctios is importat if you really
More informationUniversity of Colorado Denver Dept. Math. & Stat. Sciences Applied Analysis Preliminary Exam 13 January 2012, 10:00 am 2:00 pm. Good luck!
Uiversity of Colorado Dever Dept. Math. & Stat. Scieces Applied Aalysis Prelimiary Exam 13 Jauary 01, 10:00 am :00 pm Name: The proctor will let you read the followig coditios before the exam begis, ad
More informationA statistical method to determine sample size to estimate characteristic value of soil parameters
A statistical method to determie sample size to estimate characteristic value of soil parameters Y. Hojo, B. Setiawa 2 ad M. Suzuki 3 Abstract Sample size is a importat factor to be cosidered i determiig
More informationFirst, note that the LS residuals are orthogonal to the regressors. X Xb X y = 0 ( normal equations ; (k 1) ) So,
0 2. OLS Part II The OLS residuals are orthogoal to the regressors. If the model icludes a itercept, the orthogoality of the residuals ad regressors gives rise to three results, which have limited practical
More informationNICK DUFRESNE. 1 1 p(x). To determine some formulas for the generating function of the Schröder numbers, r(x) = a(x) =
AN INTRODUCTION TO SCHRÖDER AND UNKNOWN NUMBERS NICK DUFRESNE Abstract. I this article we will itroduce two types of lattice paths, Schröder paths ad Ukow paths. We will examie differet properties of each,
More informationSimon Blackburn. Sean Murphy. Jacques Stern. Laboratoire d'informatique, Ecole Normale Superieure, Abstract
The Cryptaalysis of a Public Key Implemetatio of Fiite Group Mappigs Simo Blackbur Sea Murphy Iformatio Security Group, Royal Holloway ad Bedford New College, Uiversity of Lodo, Egham, Surrey TW20 0EX,
More informationProblem Set 2 Solutions
CS271 Radomess & Computatio, Sprig 2018 Problem Set 2 Solutios Poit totals are i the margi; the maximum total umber of poits was 52. 1. Probabilistic method for domiatig sets 6pts Pick a radom subset S
More informationSolutions to Math 347 Practice Problems for the final
Solutios to Math 347 Practice Problems for the fial 1) True or False: a) There exist itegers x,y such that 50x + 76y = 6. True: the gcd of 50 ad 76 is, ad 6 is a multiple of. b) The ifiimum of a set is
More informationsubcaptionfont+=small,labelformat=parens,labelsep=space,skip=6pt,list=0,hypcap=0 subcaption ALGEBRAIC COMBINATORICS LECTURE 8 TUESDAY, 2/16/2016
subcaptiofot+=small,labelformat=pares,labelsep=space,skip=6pt,list=0,hypcap=0 subcaptio ALGEBRAIC COMBINATORICS LECTURE 8 TUESDAY, /6/06. Self-cojugate Partitios Recall that, give a partitio λ, we may
More informationLecture 5: April 17, 2013
TTIC/CMSC 350 Mathematical Toolkit Sprig 203 Madhur Tulsiai Lecture 5: April 7, 203 Scribe: Somaye Hashemifar Cheroff bouds recap We recall the Cheroff/Hoeffdig bouds we derived i the last lecture idepedet
More informationDecoupling Zeros of Positive Discrete-Time Linear Systems*
Circuits ad Systems,,, 4-48 doi:.436/cs..7 Published Olie October (http://www.scirp.org/oural/cs) Decouplig Zeros of Positive Discrete-Time Liear Systems* bstract Tadeusz Kaczorek Faculty of Electrical
More informationSquare-Congruence Modulo n
Square-Cogruece Modulo Abstract This paper is a ivestigatio of a equivalece relatio o the itegers that was itroduced as a exercise i our Discrete Math class. Part I - Itro Defiitio Two itegers are Square-Cogruet
More informationLecture 2: April 3, 2013
TTIC/CMSC 350 Mathematical Toolkit Sprig 203 Madhur Tulsiai Lecture 2: April 3, 203 Scribe: Shubhedu Trivedi Coi tosses cotiued We retur to the coi tossig example from the last lecture agai: Example. Give,
More informationNEW FAST CONVERGENT SEQUENCES OF EULER-MASCHERONI TYPE
UPB Sci Bull, Series A, Vol 79, Iss, 207 ISSN 22-7027 NEW FAST CONVERGENT SEQUENCES OF EULER-MASCHERONI TYPE Gabriel Bercu We itroduce two ew sequeces of Euler-Mascheroi type which have fast covergece
More informationMachine Learning for Data Science (CS 4786)
Machie Learig for Data Sciece CS 4786) Lecture & 3: Pricipal Compoet Aalysis The text i black outlies high level ideas. The text i blue provides simple mathematical details to derive or get to the algorithm
More informationCSE 1400 Applied Discrete Mathematics Number Theory and Proofs
CSE 1400 Applied Discrete Mathematics Number Theory ad Proofs Departmet of Computer Scieces College of Egieerig Florida Tech Sprig 01 Problems for Number Theory Backgroud Number theory is the brach of
More informationInduction: Solutions
Writig Proofs Misha Lavrov Iductio: Solutios Wester PA ARML Practice March 6, 206. Prove that a 2 2 chessboard with ay oe square removed ca always be covered by shaped tiles. Solutio : We iduct o. For
More information(b) What is the probability that a particle reaches the upper boundary n before the lower boundary m?
MATH 529 The Boudary Problem The drukard s walk (or boudary problem) is oe of the most famous problems i the theory of radom walks. Oe versio of the problem is described as follows: Suppose a particle
More information11. FINITE FIELDS. Example 1: The following tables define addition and multiplication for a field of order 4.
11. FINITE FIELDS 11.1. A Field With 4 Elemets Probably the oly fiite fields which you ll kow about at this stage are the fields of itegers modulo a prime p, deoted by Z p. But there are others. Now although
More informationNotes for Lecture 5. 1 Grover Search. 1.1 The Setting. 1.2 Motivation. Lecture 5 (September 26, 2018)
COS 597A: Quatum Cryptography Lecture 5 (September 6, 08) Lecturer: Mark Zhadry Priceto Uiversity Scribe: Fermi Ma Notes for Lecture 5 Today we ll move o from the slightly cotrived applicatios of quatum
More informationOptimally Sparse SVMs
A. Proof of Lemma 3. We here prove a lower boud o the umber of support vectors to achieve geeralizatio bouds of the form which we cosider. Importatly, this result holds ot oly for liear classifiers, but
More informationLecture Notes for Analysis Class
Lecture Notes for Aalysis Class Topological Spaces A topology for a set X is a collectio T of subsets of X such that: (a) X ad the empty set are i T (b) Uios of elemets of T are i T (c) Fiite itersectios
More informationExact Solutions for a Class of Nonlinear Singular Two-Point Boundary Value Problems: The Decomposition Method
Exact Solutios for a Class of Noliear Sigular Two-Poit Boudary Value Problems: The Decompositio Method Abd Elhalim Ebaid Departmet of Mathematics, Faculty of Sciece, Tabuk Uiversity, P O Box 741, Tabuki
More informationMa 530 Introduction to Power Series
Ma 530 Itroductio to Power Series Please ote that there is material o power series at Visual Calculus. Some of this material was used as part of the presetatio of the topics that follow. What is a Power
More informationSNAP Centre Workshop. Basic Algebraic Manipulation
SNAP Cetre Workshop Basic Algebraic Maipulatio 8 Simplifyig Algebraic Expressios Whe a expressio is writte i the most compact maer possible, it is cosidered to be simplified. Not Simplified: x(x + 4x)
More informationMachine Learning Theory Tübingen University, WS 2016/2017 Lecture 11
Machie Learig Theory Tübige Uiversity, WS 06/07 Lecture Tolstikhi Ilya Abstract We will itroduce the otio of reproducig kerels ad associated Reproducig Kerel Hilbert Spaces (RKHS). We will cosider couple
More informationEcon 325/327 Notes on Sample Mean, Sample Proportion, Central Limit Theorem, Chi-square Distribution, Student s t distribution 1.
Eco 325/327 Notes o Sample Mea, Sample Proportio, Cetral Limit Theorem, Chi-square Distributio, Studet s t distributio 1 Sample Mea By Hiro Kasahara We cosider a radom sample from a populatio. Defiitio
More informationMATH 304: MIDTERM EXAM SOLUTIONS
MATH 304: MIDTERM EXAM SOLUTIONS [The problems are each worth five poits, except for problem 8, which is worth 8 poits. Thus there are 43 possible poits.] 1. Use the Euclidea algorithm to fid the greatest
More informationa 2 +b 2 +c 2 ab+bc+ca.
All Problems o the Prize Exams Sprig 205 The source for each problem is listed below whe available; but eve whe the source is give, the formulatio of the problem may have bee chaged. Solutios for the problems
More informationPolynomial Functions and Their Graphs
Polyomial Fuctios ad Their Graphs I this sectio we begi the study of fuctios defied by polyomial expressios. Polyomial ad ratioal fuctios are the most commo fuctios used to model data, ad are used extesively
More informationSequences, Mathematical Induction, and Recursion. CSE 2353 Discrete Computational Structures Spring 2018
CSE 353 Discrete Computatioal Structures Sprig 08 Sequeces, Mathematical Iductio, ad Recursio (Chapter 5, Epp) Note: some course slides adopted from publisher-provided material Overview May mathematical
More informationCSE 191, Class Note 05: Counting Methods Computer Sci & Eng Dept SUNY Buffalo
Coutig Methods CSE 191, Class Note 05: Coutig Methods Computer Sci & Eg Dept SUNY Buffalo c Xi He (Uiversity at Buffalo CSE 191 Discrete Structures 1 / 48 Need for Coutig The problem of coutig the umber
More informationComparison Study of Series Approximation. and Convergence between Chebyshev. and Legendre Series
Applied Mathematical Scieces, Vol. 7, 03, o. 6, 3-337 HIKARI Ltd, www.m-hikari.com http://d.doi.org/0.988/ams.03.3430 Compariso Study of Series Approimatio ad Covergece betwee Chebyshev ad Legedre Series
More information1 Generating functions for balls in boxes
Math 566 Fall 05 Some otes o geeratig fuctios Give a sequece a 0, a, a,..., a,..., a geeratig fuctio some way of represetig the sequece as a fuctio. There are may ways to do this, with the most commo ways
More informationBertrand s Postulate
Bertrad s Postulate Lola Thompso Ross Program July 3, 2009 Lola Thompso (Ross Program Bertrad s Postulate July 3, 2009 1 / 33 Bertrad s Postulate I ve said it oce ad I ll say it agai: There s always a
More informationSEQUENCE AND SERIES NCERT
9. Overview By a sequece, we mea a arragemet of umbers i a defiite order accordig to some rule. We deote the terms of a sequece by a, a,..., etc., the subscript deotes the positio of the term. I view of
More information