5,644 research outputs found
Hard isogeny problems over RSA moduli and groups with infeasible inversion
We initiate the study of computational problems on elliptic curve isogeny
graphs defined over RSA moduli. We conjecture that several variants of the
neighbor-search problem over these graphs are hard, and provide a comprehensive
list of cryptanalytic attempts on these problems. Moreover, based on the
hardness of these problems, we provide a construction of groups with infeasible
inversion, where the underlying groups are the ideal class groups of imaginary
quadratic orders.
Recall that in a group with infeasible inversion, computing the inverse of a
group element is required to be hard, while performing the group operation is
easy. Motivated by the potential cryptographic application of building a
directed transitive signature scheme, the search for a group with infeasible
inversion was initiated in the theses of Hohenberger and Molnar (2003). Later
it was also shown to provide a broadcast encryption scheme by Irrer et al.
(2004). However, to date the only case of a group with infeasible inversion is
implied by the much stronger primitive of self-bilinear map constructed by
Yamakawa et al. (2014) based on the hardness of factoring and
indistinguishability obfuscation (iO). Our construction gives a candidate
without using iO.Comment: Significant revision of the article previously titled "A Candidate
Group with Infeasible Inversion" (arXiv:1810.00022v1). Cleared up the
constructions by giving toy examples, added "The Parallelogram Attack" (Sec
5.3.2). 54 pages, 8 figure
Brick polytopes, lattice quotients, and Hopf algebras
This paper is motivated by the interplay between the Tamari lattice, J.-L.
Loday's realization of the associahedron, and J.-L. Loday and M. Ronco's Hopf
algebra on binary trees. We show that these constructions extend in the world
of acyclic -triangulations, which were already considered as the vertices of
V. Pilaud and F. Santos' brick polytopes. We describe combinatorially a natural
surjection from the permutations to the acyclic -triangulations. We show
that the fibers of this surjection are the classes of the congruence
on defined as the transitive closure of the rewriting rule for letters
and words on . We then
show that the increasing flip order on -triangulations is the lattice
quotient of the weak order by this congruence. Moreover, we use this surjection
to define a Hopf subalgebra of C. Malvenuto and C. Reutenauer's Hopf algebra on
permutations, indexed by acyclic -triangulations, and to describe the
product and coproduct in this algebra and its dual in term of combinatorial
operations on acyclic -triangulations. Finally, we extend our results in
three directions, describing a Cambrian, a tuple, and a Schr\"oder version of
these constructions.Comment: 59 pages, 32 figure
The modal logic of set-theoretic potentialism and the potentialist maximality principles
We analyze the precise modal commitments of several natural varieties of
set-theoretic potentialism, using tools we develop for a general
model-theoretic account of potentialism, building on those of Hamkins, Leibman
and L\"owe, including the use of buttons, switches, dials and ratchets. Among
the potentialist conceptions we consider are: rank potentialism (true in all
larger ); Grothendieck-Zermelo potentialism (true in all larger
for inaccessible cardinals ); transitive-set potentialism
(true in all larger transitive sets); forcing potentialism (true in all forcing
extensions); countable-transitive-model potentialism (true in all larger
countable transitive models of ZFC); countable-model potentialism (true in all
larger countable models of ZFC); and others. In each case, we identify lower
bounds for the modal validities, which are generally either S4.2 or S4.3, and
an upper bound of S5, proving in each case that these bounds are optimal. The
validity of S5 in a world is a potentialist maximality principle, an
interesting set-theoretic principle of its own. The results can be viewed as
providing an analysis of the modal commitments of the various set-theoretic
multiverse conceptions corresponding to each potentialist account.Comment: 36 pages. Commentary can be made about this article at
http://jdh.hamkins.org/set-theoretic-potentialism. Minor revisions in v2;
further minor revisions in v
First-order limits, an analytical perspective
In this paper we present a novel approach to graph (and structural) limits
based on model theory and analysis. The role of Stone and Gelfand dualities is
displayed prominently and leads to a general theory, which we believe is
naturally emerging. This approach covers all the particular examples of
structural convergence and it put the whole in new context. As an application,
it leads to new intermediate examples of structural convergence and to a "grand
conjecture" dealing with sparse graphs. We survey the recent developments
- …