987 resultados para Algorithme de Wang-Landau
Resumo:
We present two unconditional secure protocols for private set disjointness tests. In order to provide intuition of our protocols, we give a naive example that applies Sylvester matrices. Unfortunately, this simple construction is insecure as it reveals information about the intersection cardinality. More specifically, it discloses its lower bound. By using the Lagrange interpolation, we provide a protocol for the honest-but-curious case without revealing any additional information. Finally, we describe a protocol that is secure against malicious adversaries. In this protocol, a verification test is applied to detect misbehaving participants. Both protocols require O(1) rounds of communication. Our protocols are more efficient than the previous protocols in terms of communication and computation overhead. Unlike previous protocols whose security relies on computational assumptions, our protocols provide information theoretic security. To our knowledge, our protocols are the first ones that have been designed without a generic secure function evaluation. More important, they are the most efficient protocols for private disjointness tests in the malicious adversary case.
Resumo:
We consider the problem of increasing the threshold parameter of a secret-sharing scheme after the setup (share distribution) phase, without further communication between the dealer and the shareholders. Previous solutions to this problem require one to start off with a nonstandard scheme designed specifically for this purpose, or to have communication between shareholders. In contrast, we show how to increase the threshold parameter of the standard Shamir secret-sharing scheme without communication between the shareholders. Our technique can thus be applied to existing Shamir schemes even if they were set up without consideration to future threshold increases. Our method is a new positive cryptographic application for lattice reduction algorithms, inspired by recent work on lattice-based list decoding of Reed-Solomon codes with noise bounded in the Lee norm. We use fundamental results from the theory of lattices (geometry of numbers) to prove quantitative statements about the information-theoretic security of our construction. These lattice-based security proof techniques may be of independent interest.
Resumo:
We show that the LASH-x hash function is vulnerable to attacks that trade time for memory, including collision attacks as fast as 2(4x/11) and preimage attacks as fast as 2(4x/7). Moreover, we briefly mention heuristic lattice based collision attacks that use small memory but require very long messages that are expected to find collisions much faster than 2 x/2. All of these attacks exploit the designers’ choice of an all zero IV. We then consider whether LASH can be patched simply by changing the IV. In this case, we show that LASH is vulnerable to a 2(7x/8) preimage attack. We also show that LASH is trivially not a PRF when any subset of input bytes is used as a secret key. None of our attacks depend upon the particular contents of the LASH matrix – we only assume that the distribution of elements is more or less uniform.
Resumo:
Spatially-explicit modelling of grassland classes is important to site-specific planning for improving grassland and environmental management over large areas. In this study, a climate-based grassland classification model, the Comprehensive and Sequential Classification System (CSCS) was integrated with spatially interpolated climate data to classify grassland in Gansu province, China. The study area is characterized by complex topographic features imposed by plateaus, high mountains, basins and deserts. To improve the quality of the interpolated climate data and the quality of the spatial classification over this complex topography, three linear regression methods, namely an analytic method based on multiple regression and residues (AMMRR), a modification of the AMMRR method through adding the effect of slope and aspect to the interpolation analysis (M-AMMRR) and a method which replaces the IDW approach for residue interpolation in M-AMMRR with an ordinary kriging approach (I-AMMRR), for interpolating climate variables were evaluated. The interpolation outcomes from the best interpolation method were then used in the CSCS model to classify the grassland in the study area. Climate variables interpolated included the annual cumulative temperature and annual total precipitation. The results indicated that the AMMRR and M-AMMRR methods generated acceptable climate surfaces but the best model fit and cross validation result were achieved by the I-AMMRR method. Twenty-six grassland classes were classified for the study area. The four grassland vegetation classes that covered more than half of the total study area were "cool temperate-arid temperate zonal semi-desert", "cool temperate-humid forest steppe and deciduous broad-leaved forest", "temperate-extra-arid temperate zonal desert", and "frigid per-humid rain tundra and alpine meadow". The vegetation classification map generated in this study provides spatial information on the locations and extents of the different grassland classes. This information can be used to facilitate government agencies' decision-making in land-use planning and environmental management, and for vegetation and biodiversity conservation. The information can also be used to assist land managers in the estimation of safe carrying capacities which will help to prevent overgrazing and land degradation.
Resumo:
NTRUEncrypt is a fast and practical lattice-based public-key encryption scheme, which has been standardized by IEEE, but until recently, its security analysis relied only on heuristic arguments. Recently, Stehlé and Steinfeld showed that a slight variant (that we call pNE) could be proven to be secure under chosen-plaintext attack (IND-CPA), assuming the hardness of worst-case problems in ideal lattices. We present a variant of pNE called NTRUCCA, that is IND-CCA2 secure in the standard model assuming the hardness of worst-case problems in ideal lattices, and only incurs a constant factor overhead in ciphertext and key length over the pNE scheme. To our knowledge, our result gives the first IND-CCA2 secure variant of NTRUEncrypt in the standard model, based on standard cryptographic assumptions. As an intermediate step, we present a construction for an All-But-One (ABO) lossy trapdoor function from pNE, which may be of independent interest. Our scheme uses the lossy trapdoor function framework of Peikert and Waters, which we generalize to the case of (k − 1)-of-k-correlated input distributions.
Resumo:
Na-dodecylbenzenesulfate (SDBS), a natural anionic surfactant, has been successfully intercalated into a Ca based LDH host structure during tricalcium aluminate hydration in the presence of SDBS aqueous solution (CaAl-SDBS-LDH). The resulting product was characterized by powder X-ray diffraction (XRD), mid-infrared (MIR) spectroscopy combined with near-infrared (NIR) spectroscopy technique, thermal analysis (TG–DTA) and scan electron microscopy (SEM). The XRD results revealed that the interlayer distance of resultant product was expanded to 30.46 Å. MIR combined with NIR spectra offered an effective method to illustrate this intercalation. The NIR spectra (6000–5500 cm−1) displayed prominent bands to expound SDBS intercalated into hydration product of C3A. And the bands around 8300 cm−1 were assigned to the second overtone of the first fundamental of CH stretching vibrations of SDBS. In addition, thermal analysis showed that the dehydration and dehydroxylation took place at ca. 220 °C and 348 °C, respectively. The SEM results appeared approximately hexagonal platy crystallites morphology for CaAl-SDBS-LDH, with particle size smaller and thinner.
Resumo:
At Eurocrypt’04, Freedman, Nissim and Pinkas introduced a fuzzy private matching problem. The problem is defined as follows. Given two parties, each of them having a set of vectors where each vector has T integer components, the fuzzy private matching is to securely test if each vector of one set matches any vector of another set for at least t components where t < T. In the conclusion of their paper, they asked whether it was possible to design a fuzzy private matching protocol without incurring a communication complexity with the factor (T t ) . We answer their question in the affirmative by presenting a protocol based on homomorphic encryption, combined with the novel notion of a share-hiding error-correcting secret sharing scheme, which we show how to implement with efficient decoding using interleaved Reed-Solomon codes. This scheme may be of independent interest. Our protocol is provably secure against passive adversaries, and has better efficiency than previous protocols for certain parameter values.
Resumo:
Polymer biomaterials have been widely used for bone replacement/regeneration because of their unique mechanical properties and workability. Their inherent low bioactivity makes them lack osseointegration with host bone tissue. For this reason, bioactive inorganic particles have been always incorporated into the matrix of polymers to improve their bioactivity. However, mixing inorganic particles with polymers always results in inhomogeneity of particle distribution in polymer matrix with limited bioactivity. This study sets out to apply the pulsed laser deposition (PLD) technique to prepare uniform akermanite (Ca2MgSi2O7, AKT) glass nanocoatings on the surface of two polymers (non-degradable polysulfone (PSU) and degradable polylactic acid (PDLLA)) in order to improve their surface osteogenic and angiogenic activity. The results show that a uniform nanolayer composed of amorphous AKT particles (∼30nm) of thickness 130nm forms on the surface of both PSU and PDLLA films with the PLD technique. The prepared AKT-PSU and AKT-PDLLA films significantly improved the surface roughness, hydrophilicity, hardness and apatite mineralization, compared with pure PSU and PDLLA, respectively. The prepared AKT nanocoatings distinctively enhance the alkaline phosphate (ALP) activity and bone-related gene expression (ALP, OCN, OPN and Col I) of bone-forming cells on both PSU and PDLLA films. Furthermore, AKT nanocoatings on two polymers improve the attachment, proliferation, VEGF secretion and expression of proangiogenic factors and their receptors of human umbilical vein endothelial cells (HUVEC). The results suggest that PLD-prepared bioceramic nanocoatings are very useful for enhancing the physicochemical, osteogenic and angiogenic properties of both degradable and non-degradable polymers for application in bone replacement/regeneration.
Resumo:
Disjoint top-view networked cameras are among the most commonly utilized networks in many applications. One of the open questions for these cameras' study is the computation of extrinsic parameters (positions and orientations), named extrinsic calibration or localization of cameras. Current approaches either rely on strict assumptions of the object motion for accurate results or fail to provide results of high accuracy without the requirement of the object motion. To address these shortcomings, we present a location-constrained maximum a posteriori (LMAP) approach by applying known locations in the surveillance area, some of which would be passed by the object opportunistically. The LMAP approach formulates the problem as a joint inference of the extrinsic parameters and object trajectory based on the cameras' observations and the known locations. In addition, a new task-oriented evaluation metric, named MABR (the Maximum value of All image points' Back-projected localization errors' L2 norms Relative to the area of field of view), is presented to assess the quality of the calibration results in an indoor object tracking context. Finally, results herein demonstrate the superior performance of the proposed method over the state-of-the-art algorithm based on the presented MABR and classical evaluation metric in simulations and real experiments.
Resumo:
In this survey, we review a number of the many “expressive” encryption systems that have recently appeared from lattices, and explore the innovative techniques that underpin them.
Resumo:
Bats account for one-fifth of mammalian species, are the only mammals with powered flight, and are among the few animals that echolocate. The insect-eating Brandt’s bat (Myotis brandtii) is the longest-lived bat species known to date (lifespan exceeds 40 years) and, at 4–8 g adult body weight, is the most extreme mammal with regard to disparity between body mass and longevity. Here we report sequencing and analysis of the Brandt’s bat genome and transcriptome, which suggest adaptations consistent with echolocation and hibernation, as well as altered metabolism, reproduction and visual function. Unique sequence changes in growth hormone and insulin-like growth factor 1 receptors are also observed. The data suggest that an altered growth hormone/insulin-like growth factor 1 axis, which may be common to other long-lived bat species, together with adaptations such as hibernation and low reproductive rate, contribute to the exceptional lifespan of the Brandt’s bat.
Resumo:
Ghrelin is a peptide hormone produced in the stomach and a range of other tissues, where it has endocrine, paracrine and autocrine roles in both normal and disease states. Ghrelin has been shown to be an important growth factor for a number of tumours, including prostate and breast cancers. In this study, we examined the expression of the ghrelin axis (ghrelin and its receptor, the growth hormone secretagogue receptor, GHSR) in endometrial cancer. Ghrelin is expressed in a range of endometrial cancer tissues, while its cognate receptor, GHSR1a, is expressed in a small subset of normal and cancer tissues. Low to moderately invasive endometrial cancer cell lines were examined by RT-PCR and immunoblotting, demonstrating that ghrelin axis mRNA and protein expression correlate with differentiation status of Ishikawa, HEC1B and KLE endometrial cancer cell lines. Moreover, treatment with ghrelin potently stimulated cell proliferation and inhibited cell death. Taken together, these data indicate that ghrelin promotes the progression of endometrial cancer cells in vitro, and may contribute to endometrial cancer pathogenesis and represent a novel treatment target.
Resumo:
Bone is characterized with an optimized combination of high stiffness and toughness. The understanding of bone nanomechanics is critical to the development of new artificial biological materials with unique properties. In this work, the mechanical characteristics of the interfaces between osteopontin (OPN, a noncollagenous protein in extrafibrillar protein matrix) and hydroxyapatite (HA, a mineral nanoplatelet in mineralized collagen fibrils) were investigated using molecular dynamics method. We found that the interfacial mechanical behaviour is governed by the electrostatic attraction between acidic amino acid residues in OPN and calcium in HA. Higher energy dissipation is associated with the OPN peptides with a higher number of acidic amino acid residues. When loading in the interface direction, new bonds between some acidic residues and HA surface are formed, resulting in a stick-slip type motion of OPN peptide on the HA surface and high interfacial energy dissipation. The formation of new bonds during loading is considered to be a key mechanism responsible for high fracture resistance observed in bone and other biological materials.
Resumo:
Organizations invest in ways to stimulate new ideas for new products and services for the benefit of the organization, engaging in tournaments and competitions to generate new ideas or to combine existing ideas in new ways for new products and services (Terweisch and Uhlrich, 2009). Specifically, some large companies have developed platforms for posting intractable problems to tap into the ideas and problem solving abilities of a broader range of people (Huston and Sakkab, 2006; Morgan and Wang, 2010), and to develop new and elegant solutions often in an open innovation approach (Chesbrough, 2003). The notion of ingenuity is often applied to individuals who create innovative solutions in situations of constraint, where ingenuity in the form of elegant solutions can be understood as one form of resourcefulness (Young, 2011). However, the notion of organizational ingenuity locates ingenuity more centrally to an organization's strategic decision making and implementation, embedding ingenuity into the company's culture. Studies of organizations displaying ingenuity indicate a range of possibilities from extreme ingenuity (Baker and Nelson, 2005) to less dramatic but substantial changes (Thomke, 2003), sometimes in an experimental phase or as part of a move towards a new and distinct identity for ongoing innovation.
Resumo:
Some initial EUVL patterning results for polycarbonate based non-chemically amplified resists are presented. Without full optimization the developer a resolution of 60 nm line spaces could be obtained. With slight overexposure (1.4 × E0) 43.5 nm lines at a half pitch of 50 nm could be printed. At 2x E0 a 28.6 nm lines at a half pitch of 50 nm could be obtained with a LER that was just above expected for mask roughness. Upon being irradiated with EUV photons, these polymers undergo chain scission with the loss of carbon dioxide and carbon monoxide. The remaining photoproducts appear to be non-volatile under standard EUV irradiation conditions, but do exhibit increased solubility in developer compared to the unirradiated polymer. The sensitivity of the polymers to EUV light is related to their oxygen content and ways to increase the sensitivity of the polymers to 10 mJ cm-2 is discussed.