1,093 research outputs found
Hidden Pair of Bijection Signature Scheme
A new signature system of multivariate public key cryptosys-
tem is proposed. The new system, Hidden Pair of Bijection (HPB), is the
advanced version of the Complementary STS system. This system real-
ized both high security and quick signing. Experiments showed that the
cryptanalysis of HPB by Gröbner bases has no less complexity than the
random polynomial systems. It is secure against other way of cryptanalysis
effective for Complementary STS.
On the other hand, since it is based on bijections, signatures exist for
any message, unlike other cryptosystems based on non-bijections such as
HFE or Unbalanced Oil and Vinegar
Global analysis by hidden symmetry
Hidden symmetry of a G'-space X is defined by an extension of the G'-action
on X to that of a group G containing G' as a subgroup. In this setting, we
study the relationship between the three objects:
(A) global analysis on X by using representations of G (hidden symmetry);
(B) global analysis on X by using representations of G';
(C) branching laws of representations of G when restricted to the subgroup
G'.
We explain a trick which transfers results for finite-dimensional
representations in the compact setting to those for infinite-dimensional
representations in the noncompact setting when is -spherical.
Applications to branching problems of unitary representations, and to spectral
analysis on pseudo-Riemannian locally symmetric spaces are also discussed.Comment: Special volume in honor of Roger Howe on the occasion of his 70th
birthda
A New Cryptosystem Based On Hidden Order Groups
Let be a cyclic multiplicative group of order . It is known that the
Diffie-Hellman problem is random self-reducible in with respect to a
fixed generator if is known. That is, given and
having oracle access to a `Diffie-Hellman Problem' solver with fixed generator
, it is possible to compute in polynomial time (see
theorem 3.2). On the other hand, it is not known if such a reduction exists
when is unknown (see conjuncture 3.1). We exploit this ``gap'' to
construct a cryptosystem based on hidden order groups and present a practical
implementation of a novel cryptographic primitive called an \emph{Oracle Strong
Associative One-Way Function} (O-SAOWF). O-SAOWFs have applications in
multiparty protocols. We demonstrate this by presenting a key agreement
protocol for dynamic ad-hoc groups.Comment: removed examples for multiparty key agreement and join protocols,
since they are redundan
Isogeny-based post-quantum key exchange protocols
The goal of this project is to understand and analyze the supersingular isogeny Diffie Hellman (SIDH), a post-quantum key exchange protocol which security lies on the isogeny-finding problem between supersingular elliptic curves. In order to do so, we first introduce the reader to cryptography focusing on key agreement protocols and motivate the rise of post-quantum cryptography as a necessity with the existence of the model of quantum computation. We review some of the known attacks on the SIDH and finally study some algorithmic aspects to understand how the protocol can be implemented
Labeling Workflow Views with Fine-Grained Dependencies
This paper considers the problem of efficiently answering reachability
queries over views of provenance graphs, derived from executions of workflows
that may include recursion. Such views include composite modules and model
fine-grained dependencies between module inputs and outputs. A novel
view-adaptive dynamic labeling scheme is developed for efficient query
evaluation, in which view specifications are labeled statically (i.e. as they
are created) and data items are labeled dynamically as they are produced during
a workflow execution. Although the combination of fine-grained dependencies and
recursive workflows entail, in general, long (linear-size) data labels, we show
that for a large natural class of workflows and views, labels are compact
(logarithmic-size) and reachability queries can be evaluated in constant time.
Experimental results demonstrate the benefit of this approach over the
state-of-the-art technique when applied for labeling multiple views.Comment: VLDB201
Bethe Ansatz, Inverse Scattering Transform and Tropical Riemann Theta Function in a Periodic Soliton Cellular Automaton for A^{(1)}_n
We study an integrable vertex model with a periodic boundary condition
associated with U_q(A_n^{(1)}) at the crystallizing point q=0. It is an
(n+1)-state cellular automaton describing the factorized scattering of
solitons. The dynamics originates in the commuting family of fusion transfer
matrices and generalizes the ultradiscrete Toda/KP flow corresponding to the
periodic box-ball system. Combining Bethe ansatz and crystal theory in quantum
group, we develop an inverse scattering/spectral formalism and solve the
initial value problem based on several conjectures. The action-angle variables
are constructed representing the amplitudes and phases of solitons. By the
direct and inverse scattering maps, separation of variables into solitons is
achieved and nonlinear dynamics is transformed into a straight motion on a
tropical analogue of the Jacobi variety. We decompose the level set into
connected components under the commuting family of time evolutions and identify
each of them with the set of integer points on a torus. The weight multiplicity
formula derived from the q=0 Bethe equation acquires an elegant interpretation
as the volume of the phase space expressed by the size and multiplicity of
these tori. The dynamical period is determined as an explicit arithmetical
function of the n-tuple of Young diagrams specifying the level set. The inverse
map, i.e., tropical Jacobi inversion is expressed in terms of a tropical
Riemann theta function associated with the Bethe ansatz data. As an
application, time average of some local variable is calculated
- …