996 resultados para LATTICE-CONSTANT


Relevância:

20.00% 20.00%

Publicador:

Resumo:

An encryption scheme is non-malleable if giving an encryption of a message to an adversary does not increase its chances of producing an encryption of a related message (under a given public key). Fischlin introduced a stronger notion, known as complete non-malleability, which requires attackers to have negligible advantage, even if they are allowed to transform the public key under which the related message is encrypted. Ventre and Visconti later proposed a comparison-based definition of this security notion, which is more in line with the well-studied definitions proposed by Bellare et al. The authors also provide additional feasibility results by proposing two constructions of completely non-malleable schemes, one in the common reference string model using non-interactive zero-knowledge proofs, and another using interactive encryption schemes. Therefore, the only previously known completely non-malleable (and non-interactive) scheme in the standard model, is quite inefficient as it relies on generic NIZK approach. They left the existence of efficient schemes in the common reference string model as an open problem. Recently, two efficient public-key encryption schemes have been proposed by Libert and Yung, and Barbosa and Farshim, both of them are based on pairing identity-based encryption. At ACISP 2011, Sepahi et al. proposed a method to achieve completely non-malleable encryption in the public-key setting using lattices but there is no security proof for the proposed scheme. In this paper we review the mentioned scheme and provide its security proof in the standard model. Our study shows that Sepahi’s scheme will remain secure even for post-quantum world since there are currently no known quantum algorithms for solving lattice problems that perform significantly better than the best known classical (i.e., non-quantum) algorithms.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We consider the problem of increasing the threshold parameter of a secret-sharing scheme after the setup (share distribution) phase, without further communication between the dealer and the shareholders. Previous solutions to this problem require one to start off with a nonstandard scheme designed specifically for this purpose, or to have communication between shareholders. In contrast, we show how to increase the threshold parameter of the standard Shamir secret-sharing scheme without communication between the shareholders. Our technique can thus be applied to existing Shamir schemes even if they were set up without consideration to future threshold increases. Our method is a new positive cryptographic application for lattice reduction algorithms, inspired by recent work on lattice-based list decoding of Reed-Solomon codes with noise bounded in the Lee norm. We use fundamental results from the theory of lattices (geometry of numbers) to prove quantitative statements about the information-theoretic security of our construction. These lattice-based security proof techniques may be of independent interest.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

NTRUEncrypt is a fast and practical lattice-based public-key encryption scheme, which has been standardized by IEEE, but until recently, its security analysis relied only on heuristic arguments. Recently, Stehlé and Steinfeld showed that a slight variant (that we call pNE) could be proven to be secure under chosen-plaintext attack (IND-CPA), assuming the hardness of worst-case problems in ideal lattices. We present a variant of pNE called NTRUCCA, that is IND-CCA2 secure in the standard model assuming the hardness of worst-case problems in ideal lattices, and only incurs a constant factor overhead in ciphertext and key length over the pNE scheme. To our knowledge, our result gives the first IND-CCA2 secure variant of NTRUEncrypt in the standard model, based on standard cryptographic assumptions. As an intermediate step, we present a construction for an All-But-One (ABO) lossy trapdoor function from pNE, which may be of independent interest. Our scheme uses the lossy trapdoor function framework of Peikert and Waters, which we generalize to the case of (k − 1)-of-k-correlated input distributions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The invention of asymmetric encryption back in the seventies was a conceptual leap that vastly increased the expressive power of encryption of the times. For the first time, it allowed the sender of a message to designate the intended recipient in an cryptographic way, expressed as a “public key” that was related to but distinct from the “private key” that, alone, embodied the ability to decrypt. This made large-scale encryption a practical and scalable endeavour, and more than anything else—save the internet itself—led to the advent of electronic commerce as we know and practice it today.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents ongoing work toward constructing efficient completely non-malleable public-key encryption scheme based on lattices in the standard (common reference string) model. An encryption scheme is completely non-malleable if it requires attackers to have negligible advantage, even if they are allowed to transform the public key under which the related message is encrypted. Ventre and Visconti proposed two inefficient constructions of completely non-malleable schemes, one in the common reference string model using non-interactive zero-knowledge proofs, and another using interactive encryption schemes. Recently, two efficient public-key encryption schemes have been proposed, both of them are based on pairing identity-based encryption.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Ground-penetrating radar (GPR) is widely used for assessment of soil moisture variability in field soils. Because GPR does not measure soil water content directly, it is common practice to use calibration functions that describe its relationship with the soil dielectric properties and textural parameters. However, the large variety of models complicates the selection of the appropriate function. In this article an overview is presented of the different functions available, including volumetric models, empirical functions, effective medium theories, and frequency-specific functions. Using detailed information presented in summary tables, the choice for which calibration function to use can be guided by the soil variables available to the user, the frequency of the GPR equipment, and the desired level of detail of the output. This article can thus serve as a guide for GPR practitioners to obtain soil moisture values and to estimate soil dielectric properties.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Electrification of vehicular systems has gained increased momentum in recent years with particular attention to constant power loads (CPLs). Since a CPL potentially threatens system stability, stability analysis of hybrid electric vehicle with CPLs becomes necessary. A new power buffer configuration with battery is introduced to mitigate the effect of instability caused by CPLs. Model predictive control (MPC) is applied to regulate the power buffer to decouple source and load dynamics. Moreover, MPC provides an optimal tradeoff between modification of load impedance, variation of dc-link voltage and battery current ripples. This is particularly important during transients or starting of system faults, since battery response is not very fast. Optimal tradeoff becomes even more significant when considering low-cost power buffer without battery. This paper analyzes system models for both voltage swell and voltage dip faults. Furthermore, a dual mode MPC algorithm is implemented in real time offering improved stability. A comprehensive set of experimental results is included to verify the efficacy of the proposed power buffer.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Using a multiple plasma deposition-annealing (MDA) technique, we have fabricated an Au nanoisland-based thin film nanoresistor with a very low temperature coefficient of electrical resistivity in a cryogenic-to-room temperature range of 10 to 300 K. The nanoislanded gold film was deposited on a SiO2/Si wafer (500 nm SiO2 thickness) between two 300 nm thick Au electrodes which were separated by 100 m. A sophisticated selection of the thickness of the nanoislanded gold film, the annealing temperature, as well as the number of deposition/annealing cycles resulted in the fabrication of a nanoresistor with a temperature coefficient of electrical resistivity of 2.1 × 10-3 K-1 and the resistivity deviation not exceeding 2% in a cryogenic-to-room temperature range. We have found that the constant resistivity regime of the nanoisland-based thin film nanoresistor corresponds to a minimized nanoisland activation energy (approximately 0.3 meV). This energy can be minimized by reducing the nearest neighbor distance and increasing the size of the Au nanoislands in the optimized nanoresistor structure. It is shown that the constant resistivity nanoresistor operates in the regime where the thermally activated electron tunneling is compensated by the negative temperature dependence of the metallic-type conductivity of nanoislands. Our results are relevant to the development of commercially viable methods of nanoresistor production for various nanoelectronics-based devices. The proposed MDA technique also provides the opportunity to fabricate large arrays of metallic nanoparticles with controllable size, shapes and inter-nanoparticle gaps.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The results of a study on the influence of the nonparabolicity of the free carriers dispersion law on the propagation of surface polaritons (SPs) located near the interface between an n-type semiconductor and a metal arc reported. The semiconductor plasma is assumed to be warm and nonisothermal. The nonparabolicity of the electron dispersion law has two effects. The first one is associated with nonlinear self-interaction of the SPs. The nonlinear dispersion equation and the nonlinear Schrodinger equation for the amplitude of the SP envelope are obtained. The nonlinear evolution of the SP is studied on the base of the above mentioned equations. The second effect results in third harmonics generation. Analysis shows that these third harmonics may appear as a pure surface polariton, a pseudosurface polariton, or a superposition of a volume wave and a SP depending on the wave frequency, electron density and lattice dielectric constant.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We consider the problem of increasing the threshold parameter of a secret-sharing scheme after the setup (share distribution) phase, without further communication between the dealer and the shareholders. Previous solutions to this problem require one to start off with a non-standard scheme designed specifically for this purpose, or to have secure channels between shareholders. In contrast, we show how to increase the threshold parameter of the standard CRT secret-sharing scheme without secure channels between the shareholders. Our method can thus be applied to existing CRT schemes even if they were set up without consideration to future threshold increases. Our method is a positive cryptographic application for lattice reduction algorithms, and we also use techniques from lattice theory (geometry of numbers) to prove statements about the correctness and information-theoretic security of our constructions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We consider the problem of increasing the threshold parameter of a secret-sharing scheme after the setup (share distribution) phase, without further communication between the dealer and the shareholders. Previous solutions to this problem require one to start off with a non-standard scheme designed specifically for this purpose, or to have communication between shareholders. In contrast, we show how to increase the threshold parameter of the standard Shamir secret-sharing scheme without communication between the shareholders. Our technique can thus be applied to existing Shamir schemes even if they were set up without consideration to future threshold increases. Our method is a new positive cryptographic application for lattice reduction algorithms, inspired by recent work on lattice-based list decoding of Reed-Solomon codes with noise bounded in the Lee norm. We use fundamental results from the theory of lattices (Geometry of Numbers) to prove quantitative statements about the information-theoretic security of our construction. These lattice-based security proof techniques may be of independent interest.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In recent years, electric propulsion systems have increasingly been used in land, sea and air vehicles. The vehicular power systems are usually loaded with tightly regulated power electronic converters which tend to draw constant power. Since the constant power loads (CPLs) impose negative incremental resistance characteristics on the feeder system, they pose a potential threat to the stability of vehicular power systems. This effect becomes more significant in the presence of distribution lines between source and load in large vehicular power systems such as electric ships and more electric aircrafts. System transients such as sudden drop of converter side loads or increase of constant power requirement can cause complete system instability. Most of the existing research work focuses on the modeling and stabilization of DC vehicular power systems with CPLs. Only a few solutions are proposed to stabilize AC vehicular power systems with non-negligible distribution lines and CPLs. Therefore, this paper proposes a novel loop cancellation technique to eliminate constant power instability in AC vehicular power systems with a theoretically unbounded system stability region. Analysis is carried out on system stability with the proposed method and simulation results are presented to validate its effectiveness.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

With ever-increasing share of power electronic loads constant power instability is becoming a significant issue in microgrids, especially when they operate in the islanding mode. Transient conditions like resistive load-shedding or sudden increase of constant power loads (CPL) might destabilize the whole system. Modeling and stability analysis of AC microgrids with CPLs have already been discussed in literature. However, no effective solutions are provided to stabilize this kind of system. Therefore, this paper proposes a virtual resistance based active damping method to eliminate constant power instability in AC microgrids. Advantages and limitations of the proposed method are also discussed in detail. Simulation results are presented to validate the proposed active damping solution.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Micrometre-sized MgB2 crystals of varying quality, synthesized at low temperature and autogeneous pressure, are compared using a combination of Raman and Infra-Red (IR) spectroscopy. These data, which include new peak positions in both spectroscopies for high quality MgB2, are interpreted using DFT calculations on phonon behaviour for symmetry-related structures. Raman and IR activity additional to that predicted by point group analyses of the P6/mmm symmetry are detected. These additional peaks, as well as the overall shapes of calculated phonon dispersion (PD) models are explained by assuming a double super-lattice, consistent with a lower symmetry structure for MgB2. A 2x super-lattice in the c-direction allows a simple correlation of the pair breaking energy and the superconducting gap by activation of corresponding acoustic frequencies. A consistent physical interpretation of these spectra is obtained when the position of a phonon anomaly defines a super-lattice modulation in the a-b plane.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis is concerned with two-dimensional free surface flows past semi-infinite surface-piercing bodies in a fluid of finite-depth. Throughout the study, it is assumed that the fluid in question is incompressible, and that the effects of viscosity and surface tension are negligible. The problems considered are physically important, since they can be used to model the flow of water near the bow or stern of a wide, blunt ship. Alternatively, the solutions can be interpreted as describing the flow into, or out of, a horizontal slot. In the past, all research conducted on this topic has been dedicated to the situation where the flow is irrotational. The results from such studies are extended here, by allowing the fluid to have constant vorticity throughout the flow domain. In addition, new results for irrotational flow are also presented. When studying the flow of a fluid past a surface-piercing body, it is important to stipulate in advance the nature of the free surface as it intersects the body. Three different possibilities are considered in this thesis. In the first of these possibilities, it is assumed that the free surface rises up and meets the body at a stagnation point. For this configuration, the nonlinear problem is solved numerically with the use of a boundary integral method in the physical plane. Here the semi-infinite body is assumed to be rectangular in shape, with a rounded corner. Supercritical solutions which satisfy the radiation condition are found for various values of the Froude number and the dimensionless vorticity. Subcritical solutions are also found; however these solutions violate the radiation condition and are characterised by a train of waves upstream. In the limit that the height of the body above the horizontal bottom vanishes, the flow approaches that due to a submerged line sink in a $90^\circ$ corner. This limiting problem is also examined as a special case. The second configuration considered in this thesis involves the free surface attaching smoothly to the front face of the rectangular shaped body. For this configuration, nonlinear solutions are computed using a similar numerical scheme to that used in the stagnant attachment case. It is found that these solution exist for all supercritical Froude numbers. The related problem of the cusp-like flow due to a submerged sink in a corner is also considered. Finally, the flow of a fluid emerging from beneath a semi-infinite flat plate is examined. Here the free surface is assumed to detach from the trailing edge of the plate horizontally. A linear problem is formulated under the assumption that the elevation of the plate is close to the undisturbed free surface level. This problem is solved exactly using the Wiener-Hopf technique, and subcritical solutions are found which are characterised by a train of sinusoidal waves in the far field. The nonlinear problem is also considered. Exact relations between certain parameters for supercritical flow are derived using conservation of mass and momentum arguments, and these are confirmed numerically. Nonlinear subcritical solutions are computed, and the results are compared to those predicted by the linear theory.