9,622 research outputs found
How to Compute Modulo Prime-Power Sums
The problem of computing modulo prime-power sums is investigated in
distributed source coding as well as computation over Multiple-Access Channel
(MAC). We build upon group codes and present a new class of codes called Quasi
Group Codes (QGC). A QGC is a subset of a group code. These codes are not
closed under the group addition. We investigate some properties of QGC's, and
provide a packing and a covering bound. Next, we use these bounds to derived
achievable rates for distributed source coding as well as computation over MAC.
We show that strict improvements over the previously known schemes can be
obtained using QGC's
The Rabin cryptosystem revisited
The Rabin public-key cryptosystem is revisited with a focus on the problem of
identifying the encrypted message unambiguously for any pair of primes. In
particular, a deterministic scheme using quartic reciprocity is described that
works for primes congruent 5 modulo 8, a case that was still open. Both
theoretical and practical solutions are presented. The Rabin signature is also
reconsidered and a deterministic padding mechanism is proposed.Comment: minor review + introduction of a deterministic scheme using quartic
reciprocity that works for primes congruent 5 modulo
Congruences for central binomial sums and finite polylogarithms
We prove congruences, modulo a power of a prime p, for certain finite sums
involving central binomial coefficients
Four primality testing algorithms
In this expository paper we describe four primality tests. The first test is
very efficient, but is only capable of proving that a given number is either
composite or 'very probably' prime. The second test is a deterministic
polynomial time algorithm to prove that a given numer is either prime or
composite. The third and fourth primality tests are at present most widely used
in practice. Both tests are capable of proving that a given number is prime or
composite, but neither algorithm is deterministic. The third algorithm exploits
the arithmetic of cyclotomic fields. Its running time is almost, but not quite
polynomial time. The fourth algorithm exploits elliptic curves. Its running
time is difficult to estimate, but it behaves well in practice.Comment: 21 page
Computation Over Gaussian Networks With Orthogonal Components
Function computation of arbitrarily correlated discrete sources over Gaussian
networks with orthogonal components is studied. Two classes of functions are
considered: the arithmetic sum function and the type function. The arithmetic
sum function in this paper is defined as a set of multiple weighted arithmetic
sums, which includes averaging of the sources and estimating each of the
sources as special cases. The type or frequency histogram function counts the
number of occurrences of each argument, which yields many important statistics
such as mean, variance, maximum, minimum, median, and so on. The proposed
computation coding first abstracts Gaussian networks into the corresponding
modulo sum multiple-access channels via nested lattice codes and linear network
coding and then computes the desired function by using linear Slepian-Wolf
source coding. For orthogonal Gaussian networks (with no broadcast and
multiple-access components), the computation capacity is characterized for a
class of networks. For Gaussian networks with multiple-access components (but
no broadcast), an approximate computation capacity is characterized for a class
of networks.Comment: 30 pages, 12 figures, submitted to IEEE Transactions on Information
Theor
- …