1,093 research outputs found

    Hidden Pair of Bijection Signature Scheme

    Get PDF
    A new signature system of multivariate public key cryptosys- tem is proposed. The new system, Hidden Pair of Bijection (HPB), is the advanced version of the Complementary STS system. This system real- ized both high security and quick signing. Experiments showed that the cryptanalysis of HPB by Gröbner bases has no less complexity than the random polynomial systems. It is secure against other way of cryptanalysis effective for Complementary STS. On the other hand, since it is based on bijections, signatures exist for any message, unlike other cryptosystems based on non-bijections such as HFE or Unbalanced Oil and Vinegar

    Global analysis by hidden symmetry

    Full text link
    Hidden symmetry of a G'-space X is defined by an extension of the G'-action on X to that of a group G containing G' as a subgroup. In this setting, we study the relationship between the three objects: (A) global analysis on X by using representations of G (hidden symmetry); (B) global analysis on X by using representations of G'; (C) branching laws of representations of G when restricted to the subgroup G'. We explain a trick which transfers results for finite-dimensional representations in the compact setting to those for infinite-dimensional representations in the noncompact setting when XCX_C is GCG_C-spherical. Applications to branching problems of unitary representations, and to spectral analysis on pseudo-Riemannian locally symmetric spaces are also discussed.Comment: Special volume in honor of Roger Howe on the occasion of his 70th birthda

    A New Cryptosystem Based On Hidden Order Groups

    Get PDF
    Let G1G_1 be a cyclic multiplicative group of order nn. It is known that the Diffie-Hellman problem is random self-reducible in G1G_1 with respect to a fixed generator gg if ϕ(n)\phi(n) is known. That is, given g,gxG1g, g^x\in G_1 and having oracle access to a `Diffie-Hellman Problem' solver with fixed generator gg, it is possible to compute g1/xG1g^{1/x} \in G_1 in polynomial time (see theorem 3.2). On the other hand, it is not known if such a reduction exists when ϕ(n)\phi(n) is unknown (see conjuncture 3.1). We exploit this ``gap'' to construct a cryptosystem based on hidden order groups and present a practical implementation of a novel cryptographic primitive called an \emph{Oracle Strong Associative One-Way Function} (O-SAOWF). O-SAOWFs have applications in multiparty protocols. We demonstrate this by presenting a key agreement protocol for dynamic ad-hoc groups.Comment: removed examples for multiparty key agreement and join protocols, since they are redundan

    Isogeny-based post-quantum key exchange protocols

    Get PDF
    The goal of this project is to understand and analyze the supersingular isogeny Diffie Hellman (SIDH), a post-quantum key exchange protocol which security lies on the isogeny-finding problem between supersingular elliptic curves. In order to do so, we first introduce the reader to cryptography focusing on key agreement protocols and motivate the rise of post-quantum cryptography as a necessity with the existence of the model of quantum computation. We review some of the known attacks on the SIDH and finally study some algorithmic aspects to understand how the protocol can be implemented

    Labeling Workflow Views with Fine-Grained Dependencies

    Get PDF
    This paper considers the problem of efficiently answering reachability queries over views of provenance graphs, derived from executions of workflows that may include recursion. Such views include composite modules and model fine-grained dependencies between module inputs and outputs. A novel view-adaptive dynamic labeling scheme is developed for efficient query evaluation, in which view specifications are labeled statically (i.e. as they are created) and data items are labeled dynamically as they are produced during a workflow execution. Although the combination of fine-grained dependencies and recursive workflows entail, in general, long (linear-size) data labels, we show that for a large natural class of workflows and views, labels are compact (logarithmic-size) and reachability queries can be evaluated in constant time. Experimental results demonstrate the benefit of this approach over the state-of-the-art technique when applied for labeling multiple views.Comment: VLDB201

    Bethe Ansatz, Inverse Scattering Transform and Tropical Riemann Theta Function in a Periodic Soliton Cellular Automaton for A^{(1)}_n

    Get PDF
    We study an integrable vertex model with a periodic boundary condition associated with U_q(A_n^{(1)}) at the crystallizing point q=0. It is an (n+1)-state cellular automaton describing the factorized scattering of solitons. The dynamics originates in the commuting family of fusion transfer matrices and generalizes the ultradiscrete Toda/KP flow corresponding to the periodic box-ball system. Combining Bethe ansatz and crystal theory in quantum group, we develop an inverse scattering/spectral formalism and solve the initial value problem based on several conjectures. The action-angle variables are constructed representing the amplitudes and phases of solitons. By the direct and inverse scattering maps, separation of variables into solitons is achieved and nonlinear dynamics is transformed into a straight motion on a tropical analogue of the Jacobi variety. We decompose the level set into connected components under the commuting family of time evolutions and identify each of them with the set of integer points on a torus. The weight multiplicity formula derived from the q=0 Bethe equation acquires an elegant interpretation as the volume of the phase space expressed by the size and multiplicity of these tori. The dynamical period is determined as an explicit arithmetical function of the n-tuple of Young diagrams specifying the level set. The inverse map, i.e., tropical Jacobi inversion is expressed in terms of a tropical Riemann theta function associated with the Bethe ansatz data. As an application, time average of some local variable is calculated
    corecore