Lecture 15 November 19, 2001

Similar documents
PHYSICS 1210 Exam 1 University of Wyoming 14 February points

Motion. Part 2: Constant Acceleration. Acceleration. October Lab Physics. Ms. Levine 1. Acceleration. Acceleration. Units for Acceleration.

Minimum Squared Error

Minimum Squared Error

0 for t < 0 1 for t > 0

Average & instantaneous velocity and acceleration Motion with constant acceleration

Compact and Unforgeable Key Establishment over an ATM Network

e t dt e t dt = lim e t dt T (1 e T ) = 1

3 Motion with constant acceleration: Linear and projectile motion

Lecture 8. Public Key Cryptography (Diffie-Hellman and RSA)

September 20 Homework Solutions

4.8 Improper Integrals

Chapter Direct Method of Interpolation

Physics 2A HW #3 Solutions

22.615, MHD Theory of Fusion Systems Prof. Freidberg Lecture 10: The High Beta Tokamak Con d and the High Flux Conserving Tokamak.

The solution is often represented as a vector: 2xI + 4X2 + 2X3 + 4X4 + 2X5 = 4 2xI + 4X2 + 3X3 + 3X4 + 3X5 = 4. 3xI + 6X2 + 6X3 + 3X4 + 6X5 = 6.

Chapter 2. Motion along a straight line. 9/9/2015 Physics 218

Contraction Mapping Principle Approach to Differential Equations

Properties of Logarithms. Solving Exponential and Logarithmic Equations. Properties of Logarithms. Properties of Logarithms. ( x)

F This leads to an unstable mode which is not observable at the output thus cannot be controlled by feeding back.

MATH 124 AND 125 FINAL EXAM REVIEW PACKET (Revised spring 2008)

Review. CS311H: Discrete Mathematics. Number Theory. Computing GCDs. Insight Behind Euclid s Algorithm. Using this Theorem. Euclidian Algorithm

How to Prove the Riemann Hypothesis Author: Fayez Fok Al Adeh.

On asymptotic behavior of composite integers n = pq Yasufumi Hashimoto

Lecture 20: Riccati Equations and Least Squares Feedback Control

On a problem of Graham By E. ERDŐS and E. SZEMERÉDI (Budapest) GRAHAM stated the following conjecture : Let p be a prime and a 1,..., ap p non-zero re

Differential Geometry: Numerical Integration and Surface Flow

S Radio transmission and network access Exercise 1-2

USA Mathematical Talent Search Round 1 Solutions Year 25 Academic Year

2D Motion WS. A horizontally launched projectile s initial vertical velocity is zero. Solve the following problems with this information.

Physic 231 Lecture 4. Mi it ftd l t. Main points of today s lecture: Example: addition of velocities Trajectories of objects in 2 = =

Waveform Transmission Method, A New Waveform-relaxation Based Algorithm. to Solve Ordinary Differential Equations in Parallel

The fundamental mass balance equation is ( 1 ) where: I = inputs P = production O = outputs L = losses A = accumulation

Unit Root Time Series. Univariate random walk

(b) 10 yr. (b) 13 m. 1.6 m s, m s m s (c) 13.1 s. 32. (a) 20.0 s (b) No, the minimum distance to stop = 1.00 km. 1.

t is a basis for the solution space to this system, then the matrix having these solutions as columns, t x 1 t, x 2 t,... x n t x 2 t...

Families of Solutions to Bernoulli ODEs

rank Additionally system of equation only independent atfect Gawp (A) possible ( Alb ) easily process form rang A. Proposition with Definition

Some Inequalities variations on a common theme Lecture I, UL 2007

Physics 101 Lecture 4 Motion in 2D and 3D

Two Dimensional Dynamics

Primitive. that ak=1 with K < 4cm ). mod 7. working. then, smaller than 6 will do. m ) =/ odm ) is called. modulo m ( 4) =3. ordz.

Homework 5 for BST 631: Statistical Theory I Solutions, 09/21/2006

MATH 118 HW 7 KELLY DOUGAN, ANDREW KOMAR, MARIA SIMBIRSKY, BRANDEN LASKE

Two Dimensional Dynamics

can be viewed as a generalized product, and one for which the product of f and g. That is, does

942 JOURNAL OF SOFTWARE, VOL. 5, NO. 9, SEPTEMBER 2010

A Public-Key Cryptosystem Based on Lucas Sequences

V L. DT s D T s t. Figure 1: Buck-boost converter: inductor current i(t) in the continuous conduction mode.

V The Fourier Transform

A Kalman filtering simulation

The stable manifold approach for optimal swing up and stabilization of an inverted pendulum with input saturation

. In particular if a b then N(

t + t sin t t cos t sin t. t cos t sin t dt t 2 = exp 2 log t log(t cos t sin t) = Multiplying by this factor and then integrating, we conclude that

RESPONSE UNDER A GENERAL PERIODIC FORCE. When the external force F(t) is periodic with periodτ = 2π

System of Linear Differential Equations

1. Introduction. 2. Background of elliptic curve group. Identity-based Digital Signature Scheme Without Bilinear Pairings

a 10.0 (m/s 2 ) 5.0 Name: Date: 1. The graph below describes the motion of a fly that starts out going right V(m/s)

dt = C exp (3 ln t 4 ). t 4 W = C exp ( ln(4 t) 3) = C(4 t) 3.

Laplace transfom: t-translation rule , Haynes Miller and Jeremy Orloff

NUMBER THEORY AND CODES. Álvaro Pelayo WUSTL

5.1-The Initial-Value Problems For Ordinary Differential Equations

Quadratic Residues. Chapter Quadratic residues

EXISTENCE AND UNIQUENESS OF SOLUTIONS FOR A SECOND-ORDER ITERATIVE BOUNDARY-VALUE PROBLEM

18734: Foundations of Privacy. Anonymous Cash. Anupam Datta. CMU Fall 2018

Optimality of Myopic Policy for a Class of Monotone Affine Restless Multi-Armed Bandit

1 Structural induction

Notes 04 largely plagiarized by %khc

Practice Assignment 2 Discussion 24/02/ /02/2018

Supporting information How to concatenate the local attractors of subnetworks in the HPFP

..,..,.,

Math 315: Linear Algebra Solutions to Assignment 6

Math Week 14 April 16-20: sections first order systems of linear differential equations; 7.4 mass-spring systems.

1. Consider a PSA initially at rest in the beginning of the left-hand end of a long ISS corridor. Assume xo = 0 on the left end of the ISS corridor.

Theory of! Partial Differential Equations-I!

How to prove the Riemann Hypothesis

More on Magnetically C Coupled Coils and Ideal Transformers

Exponential Decay for Nonlinear Damped Equation of Suspended String

CSCBNO. Asymmetric Encryption

Theory of! Partial Differential Equations!

Math 2142 Exam 1 Review Problems. x 2 + f (0) 3! for the 3rd Taylor polynomial at x = 0. To calculate the various quantities:

Communication Complexity. The dialogues of Alice and Bob...

Fishing limits and the Logistic Equation. 1

Bernoulli numbers. Francesco Chiatti, Matteo Pintonello. December 5, 2016

Security enhancement on efficient verifier-based key agreement protocol for three parties without server s public key

SOME USEFUL MATHEMATICS

Digital Signature Scheme Based on a New Hard Problem

Two Coupled Oscillators / Normal Modes

Solutions Problem Set 3 Macro II (14.452)

Solutions to Homework 8 - Math 3410

Demodulation of Digitally Modulated Signals

Predator - Prey Model Trajectories and the nonlinear conservation law

Public Key Cryptosystems RSA

CS2800 Questions selected for fall 2017

Review: Transformations. Transformations - Viewing. Transformations - Modeling. world CAMERA OBJECT WORLD CSE 681 CSE 681 CSE 681 CSE 681

Solutions for Nonlinear Partial Differential Equations By Tan-Cot Method

P441 Analytical Mechanics - I. Coupled Oscillators. c Alex R. Dzierba

Matrix Eigenvalues and Eigenvectors September 13, 2017

10/10/2011. Signals and Systems EE235. Today s menu. Chicken

A LOG IS AN EXPONENT.

Transcription:

Lecure 5 November 9, 00 HW Auhenicion & Idenificion Secre Shring Blind signures e-cshe /0/0 Gene Tsudi, ICS 68 Fll 00 Fi-Shmir ID Scheme, q lrge rimes n q securiy rmeer Publics : n,, ID x mod n Secres :, q globl, x Alice Noe : gcd( x, n). Alice : [, n[, w mod n. Bob : r [0,] r 3. Alice : y x mod n r 4. Bob : y? wid mod n Ree imes! /0/0 Gene Tsudi, ICS 68 Fll 00

q g Schnorr ID Scheme lrge rime lrge(rime)divisor of generor g ( )/ q securiy rmeer (40?) Publics :, q, g,,, ID Secres : x (Alice) x Alice : Bob : r Alice : y Bob : w [0, q[, w [, ]? xr mod q y r ID /0/0 Gene Tsudi, ICS 68 Fll 00 3 Omoo ID Scheme q g lrge rime lrge (rime) divisor of generor ( )/ q c g securiy rmeer Publics :, q, g,,,, ID Secres : x, x Alice, c globl x x Alice:, [0, q[, w Bob : r [, ] Alice: y xr mod q y xr mod q y y r Bob : w? ID /0/0 Gene Tsudi, ICS 68 Fll 00 4

Omoo ID Scheme (cond) If Eve cn imersone Alice hen Eve nd Alice cn comue c! y,y r Cer,w /0/0 Gene Tsudi, ICS 68 Fll 00 5 Guillou-Quisquer (GQ) ID Scheme q, n e q lrge rimes globl 'encryion' ey Publics neid x n e :,, ( ) mod Secres :, q globl, x Alice Cer{ Alice,ID} CA e Alice: [0, n [, w modn Bob : r [0,e[ r Alice: y x modn r e Bob : w? ID y modn Error(s) in boo! /0/0 Gene Tsudi, ICS 68 Fll 00 6 3

GQ Ideniy-bsed Scheme, q lrge rimes n q, ( e, d ) RSA ey-ir x h Alice d ( (" ") ) i.e., TTP signs h( " Alice " ) Publics : n, e, ID h(" Alice ")mod n Secres:, q, d globl, x Alice e Alice : [0, n [, w mod n Bob : r [0,e[ r Alice : y x mod n B : r e ob w? ID y mod n /0/0 Gene Tsudi, ICS 68 Fll 00 7 Convering ID o Signure Scheme (Schnorr) q g lrge rime lrge(rime)divisor of generor g ( )/ q securiy rmeer (40?) q g lrge rime lrge(rime) divisor of generor / q h(), h() " good" hsh fn Publics :, q, g,,, ID Secres : x Alice : Bob : r Alice : y Bob : w [0, q[, w [, ]? (Alice) xr mod q y r ID x Publics :, q, g,,, ID Secres : x Alice: Alice: y Bob : w [0, q[, w? xh( msg, w,...) modq y ID h( msg, w,...) x /0/0 Gene Tsudi, ICS 68 Fll 00 8 4

Secre Shring Why shre secres? Criicl services: ccess by consen Relice/bcu vluble d In generl, shred conrol... E.g., ou of 3 /0/0 Gene Tsudi, ICS 68 Fll 00 9 Unnimous consen (-ou ou-of-) TTP is needed o genere nd disribue he secre. SETUP : - - - - - - - - m lrge number TTP generes : i [, nd S K S is given o P i ] ( S S i i... R S Z m ) RECONSTRUCTION : -- -- --- -- -- --- -- -- -- - Alice, Bob,Eve ool ogeher: K' S S S3 S S K ( S S ) K Noe: why no jus sli he secre in smller chuns? /0/0 Gene Tsudi, ICS 68 Fll 00 0 5

Threshold Scheme (Shmir 79) (-ou ou-of-n) Need TTP o se u he sysem! SETUP: lrge rime, > mx( K, n ), < n TTP generes: i [, n ] x Z i [, [ Z i [, n ] y f ( x ) is given o P where: f ( x) x x... x 0 K i R i R 0 0 ublics: {x,..., x } secres: {,,..., i i i n 0 } RECONSTRUCTION: ricins ool ogeher: y x x... x... 0 y x x... x... i 0 i i i y x x... x 0 equions, unnowns yield unique soluion vecor: < 0,..., > /0/0 Gene Tsudi, ICS 68 Fll 00 Shmir Threshold Schemes (exmle) SETUP: n 7 5, 3 TTP generes: x i 0 i for ll i Z i [,] i R K y f ( x ) is given o P i i i where : f ( x) x x x mod7 0 0 y 8, y 3, y 9 y 3 5, y 4 5 RECONSTRUCTION: Suose 3 5 ool heir shres y 8, y 0, y 3 5 0 3 9 0 0 5 8 0 0 3 0 P,P,P 8 /0/0 Gene Tsudi, ICS 68 Fll 00 6

Elecronic Csh /0/0 Gene Tsudi, ICS 68 Fll 00 3 Ouline Wh is elecronic csh? Why elecronic csh? Issues: Off-line oversending Anonymiy How does e-csh e wor? Adding rusee rce-biliy biliy The nonymous chnge roblem /0/0 Gene Tsudi, ICS 68 Fll 00 4 7

Moivion Convenionl Csh is: Counerfeible Slow Cosly Vulnerble Bd for Remoe Trnscions /0/0 Gene Tsudi, ICS 68 Fll 00 5 Credi Crds, Bn Crds, Checs, nd Phone/subwy crds: Esy Frud Lile Privcy /0/0 Gene Tsudi, ICS 68 Fll 00 6 8

Off-line Elecronic Csh refers o wo-ry ymen Wihdrwl Pymen Deosi Low Communicion Requiremens /0/0 Gene Tsudi, ICS 68 Fll 00 7 By Conrs, On-line Pymens Loo Lie This OK /0/0 Gene Tsudi, ICS 68 Fll 00 8 9

Oversending: A roblem wih off-line e-csh Se : The bd user coies his money /0/0 Gene Tsudi, ICS 68 Fll 00 9 Se : The bd user gives coied csh o mulile eole /0/0 Gene Tsudi, ICS 68 Fll 00 0 0

!!! The Bn is wre of rouble only ler /0/0 Gene Tsudi, ICS 68 Fll 00 Techniques o Conin Over-Sending Use mer-resisn resisn hrdwre o reven over-sending (e.g., MONDEX in Euroe) Trce over-senders Blclis over-senders Pu bound on dollr-vlue of off-line rnscions /0/0 Gene Tsudi, ICS 68 Fll 00

Tmer-resisnce resisnce is gre -- so fr s i wors Resources Trdeoff /0/0 Gene Tsudi, ICS 68 Fll 00 3