941 resultados para Holder-type discrete functions
Resumo:
Digital signatures are often used by trusted authorities to make unique bindings between a subject and a digital object; for example, certificate authorities certify a public key belongs to a domain name, and time-stamping authorities certify that a certain piece of information existed at a certain time. Traditional digital signature schemes however impose no uniqueness conditions, so a trusted authority could make multiple certifications for the same subject but different objects, be it intentionally, by accident, or following a (legal or illegal) coercion. We propose the notion of a double-authentication-preventing signature, in which a value to be signed is split into two parts: a subject and a message. If a signer ever signs two different messages for the same subject, enough information is revealed to allow anyone to compute valid signatures on behalf of the signer. This double-signature forgeability property discourages signers from misbehaving---a form of self-enforcement---and would give binding authorities like CAs some cryptographic arguments to resist legal coercion. We give a generic construction using a new type of trapdoor functions with extractability properties, which we show can be instantiated using the group of sign-agnostic quadratic residues modulo a Blum integer.
Resumo:
The basic principles and equations are developed for elementary finance, based on the concept of compound interest. The five quantities of interest in such problems are present value, future value, amount of periodic payment, number of periods and the rate of interest per period. We consider three distinct means of computing each of these five quantities in Excel 2007: (i) use of algebraic equations, (ii) by recursive schedule and the Goal Seek facility, and (iii) use of Excel's intrinsic financial functions. The paper is intended to be used as the basis for a lesson plan and contains many examples and solved problems. Comment is made regarding the relative difficulty of each approach, and a prominent theme is the systematic use of more than one method to increase student understanding and build confidence in the answer obtained. Full instructions to build each type of model are given and a complete set of examples and solutions may be downloaded (Examples.xlsx and Solutions.xlsx).
Resumo:
This paper uses a correlated multinomial logit model and a Poisson regression model to measure the factors affecting demand for different types of transportation by elderly and disabled people in rural Virginia. The major results are: (a) A paratransit system providing door-to-door service is highly valued by transportation-handicapped people; (b) Taxis are probably a potential but inferior alternative even when subsidized; (c) Buses are a poor alternative, especially in rural areas where distances to bus stops may be long; (d) Making buses handicap-accessible would have a statistically significant but small effect on mode choice; (e) Demand is price inelastic; and (f) The total number of trips taken is insensitive to mode availability and characteristics. These results suggest that transportation-handicapped people take a limited number of trips. Those they do take are in some sense necessary (given the low elasticity with respect to mode price or availability). People will substitute away from relying upon others when appropriate transportation is available, at least to some degree. But such transportation needs to be flexible enough to meet the needs of the people involved.
Resumo:
This paper considers two problems that frequently arise in dynamic discrete choice problems but have not received much attention with regard to simulation methods. The first problem is how to simulate unbiased simulators of probabilities conditional on past history. The second is simulating a discrete transition probability model when the underlying dependent variable is really continuous. Both methods work well relative to reasonable alternatives in the application discussed. However, in both cases, for this application, simpler methods also provide reasonably good results.
Resumo:
In this paper we tackle the problem of finding an efficient signature verification scheme when the number of signatures is signi.- cantly large and the verifier is relatively weak. In particular, we tackle the problem of message authentication in many-to-one communication networks known as concast communication. The paper presents three signature screening algorithms for a variant of ElGamal-type digital signatures. The cost for these schemes is n applications of hash functions, 2n modular multiplications, and n modular additions plus the verification of one digital signature, where n is the number of signatures. The paper also presents a solution to the open problem of finding a fast screening signature for non-RSA digital signature schemes.
Resumo:
This paper demonstrates the use of a spreadsheet in exploring non-linear difference equations that describe digital control systems used in radio engineering, communication and computer architecture. These systems, being the focus of intensive studies of mathematicians and engineers over the last 40 years, may exhibit extremely complicated behaviour interpreted in contemporary terms as transition from global asymptotic stability to chaos through period-doubling bifurcations. The authors argue that embedding advanced mathematical ideas in the technological tool enables one to introduce fundamentals of discrete control systems in tertiary curricula without learners having to deal with complex machinery that rigorous mathematical methods of investigation require. In particular, in the appropriately designed spreadsheet environment, one can effectively visualize a qualitative difference in the behviour of systems with different types of non-linear characteristic.
Resumo:
The SOS screen, as originally described by Perkins et al. (1999), was setup with the aim of identifying Arabidopsis functions that might potentially be involved in the DNA metabolism. Such functions, when expressed in bacteria, are prone to disturb replication and thus trigger the SOS response. Consistently, expression of AtRAD51 and AtDMC1 induced the SOS response in bacteria, even affecting E. coli viability. 100 SOS-inducing cDNAs were isolated from a cDNA library constructed from an Arabidopsis cell suspension that was found to highly express meiotic genes. A large proportion of these SOS+ candidates are clearly related to the DNA metabolism, others could be involved in the RNA metabolism, while the remaining cDNAs encode either totally unknown proteins or proteins that were considered as irrelevant. Seven SOS+ candidate genes are induced following gamma irradiation. The in planta function of several of the SOS-inducing clones was investigated using T-DNA insertional mutants or RNA interference. Only one SOS+ candidate, among those examined, exhibited a defined phenotype: silenced plants for DUT1 were sensitive to 5-fluoro-uracil (5FU), as is the case of the leaky dut-1 mutant in E. coli that are affected in dUTPase activity. dUTPase is essential to prevent uracil incorporation in the course of DNA replication.
Resumo:
Universal One-Way Hash Functions (UOWHFs) may be used in place of collision-resistant functions in many public-key cryptographic applications. At Asiacrypt 2004, Hong, Preneel and Lee introduced the stronger security notion of higher order UOWHFs to allow construction of long-input UOWHFs using the Merkle-Damgård domain extender. However, they did not provide any provably secure constructions for higher order UOWHFs. We show that the subset sum hash function is a kth order Universal One-Way Hash Function (hashing n bits to m < n bits) under the Subset Sum assumption for k = O(log m). Therefore we strengthen a previous result of Impagliazzo and Naor, who showed that the subset sum hash function is a UOWHF under the Subset Sum assumption. We believe our result is of theoretical interest; as far as we are aware, it is the first example of a natural and computationally efficient UOWHF which is also a provably secure higher order UOWHF under the same well-known cryptographic assumption, whereas this assumption does not seem sufficient to prove its collision-resistance. A consequence of our result is that one can apply the Merkle-Damgård extender to the subset sum compression function with ‘extension factor’ k+1, while losing (at most) about k bits of UOWHF security relative to the UOWHF security of the compression function. The method also leads to a saving of up to m log(k+1) bits in key length relative to the Shoup XOR-Mask domain extender applied to the subset sum compression function.
Resumo:
Standard signature schemes are usually designed only to achieve weak unforgeability – i.e. preventing forgery of signatures on new messages not previously signed. However, most signature schemes are randomised and allow many possible signatures for a single message. In this case, it may be possible to produce a new signature on a previously signed message. Some applications require that this type of forgery also be prevented – this requirement is called strong unforgeability. At PKC2006, Boneh Shen and Waters presented an efficient transform based on any randomised trapdoor hash function which converts a weakly unforgeable signature into a strongly unforgeable signature and applied it to construct a strongly unforgeable signature based on the CDH problem. However, the transform of Boneh et al only applies to a class of so-called partitioned signatures. Although many schemes fall in this class, some do not, for example the DSA signature. Hence it is natural to ask whether one can obtain a truly generic efficient transform based on any randomised trapdoor hash function which converts any weakly unforgeable signature into a strongly unforgeable one. We answer this question in the positive by presenting a simple modification of the Boneh-Shen-Waters transform. Our modified transform uses two randomised trapdoor hash functions.
Resumo:
Asymmetrical electrical boundary conditions in (001)-oriented Pb(Zr 0.2TiO0.8)O3 (PZT) epitaxial ultrathin ferroelectric films are exploited to control surface photochemical reactivity determined by the sign of the surface polarization charge. It is shown that the preferential orientation of polarization in the as-grown PZT layer can be manipulated by choosing an appropriate type of bottom electrode material. PZT films deposited on the SrRuO3 electrodes exhibit preferential upward polarization (C) whilst the same films grown on the (La,Sr)CoO 3-electrodes are polarized downward (C-). Photochemical activity of the PZT surfaces with different surface polarization charges has been tested by studying deposition of silver nanoparticles from AgNO3 solution under UV irradiation. PZT surfaces with preferential C orientation possess a more active surface for metal reduction than their C- counterparts, evidenced by large differences in the concentration of deposited silver nanoparticles. This effect is attributed to band bending at the bottom interface which varies depending on the difference in work functions of PZT and electrode materials.
Resumo:
Spreading cell fronts are essential features of development, repair and disease processes. Many mathematical models used to describe the motion of cell fronts, such as Fisher’s equation, invoke a mean–field assumption which implies that there is no spatial structure, such as cell clustering, present. Here, we examine the presence of spatial structure using a combination of in vitro circular barrier assays, discrete random walk simulations and pair correlation functions. In particular, we analyse discrete simulation data using pair correlation functions to show that spatial structure can form in a spreading population of cells either through sufficiently strong cell–to–cell adhesion or sufficiently rapid cell proliferation. We analyse images from a circular barrier assay describing the spreading of a population of MM127 melanoma cells using the same pair correlation functions. Our results indicate that the spreading melanoma cell populations remain very close to spatially uniform, suggesting that the strength of cell–to–cell adhesion and the rate of cell proliferation are both sufficiently small so as not to induce any spatial patterning in the spreading populations.
Resumo:
A custom-designed inductively coupled plasma assisted radio-frequency magnetron sputtering deposition system has been used to fabricate N-doped p-type ZnO (ZnO:N) thin films on glass substrates from a sintered ZnO target in a reactive Ar + N2 gas mixture. X-ray diffraction and scanning electron microscopy analyses show that the ZnO:N films feature a hexagonal crystal structure with a preferential (002) crystallographic orientation and grow as vertical columnar structures. Hall effect and X-ray photoelectron spectroscopy analyses show that N-doped ZnO thin films are p-type with a hole concentration of 3.32 × 1018 cm- 3 and mobility of 1.31 cm2 V- 1 s- 1. The current-voltage measurement of the two-layer structured ZnO p-n homojunction clearly reveals the rectifying ability of the p-n junction. The achievement of p-type ZnO:N thin films is attributed to the high dissociation ability of the high-density inductively coupled plasma source and effective plasma-surface interactions during the growth process.
Resumo:
Aluminum-doped p-type polycrystalline silicon thin films have been synthesized on glass substrates using an aluminum target in a reactive SiH 4+Ar+H2 gas mixture at a low substrate temperature of 300∈°C through inductively coupled plasma-assisted RF magnetron sputtering. In this process, it is possible to simultaneously co-deposit Si-Al in one layer for crystallization of amorphous silicon, in contrast to the conventional techniques where alternating metal and amorphous Si layers are deposited. The effect of aluminum target power on the structural and electrical properties of polycrystalline Si films is analyzed by X-ray diffraction, Raman spectroscopy, scanning electron microscopy and Hall-effect analysis. It is shown that at an aluminum target power of 100 W, the polycrystalline Si film features a high crystalline fraction of 91%, a vertically aligned columnar structure, a sheet resistance of 20.2 kΩ/□ and a hole concentration of 6.3×1018 cm-3. The underlying mechanism for achieving the semiconductor-quality polycrystalline silicon thin films at a low substrate temperature of 300∈°C is proposed.
Resumo:
The influence of electron heating in the high-frequency surface polariton (SP) field on the dispersion properties of the SPs considered is investigated. High frequency SPs propagate at the interface between an n-type semiconductor with finite electron pressure, and a metal. The nonlinear dispersion relation for the SPs is derived and investigated.
Resumo:
The non-linear self-interaction of the potential surface polaritons (SP) which is due to the free carriers dispersion law where nonparabolicity is studied. The SP propagate at the interface between n-type semiconductor and a metal. The self interaction of the SP is shown to be different in semiconductors with normal and inverse zone structures. The results of the SP field envelope evolution are given. The obtained nonlinear frequency shift has been compared with shifts which are due to another self-interaction mechanisms. This comparison shows that the nonlinear self-interaction mechanism, which is due to free carriers spectrum nonparabolicity, is especially significant in narrow-gap semiconductor materials.