627 research outputs found

    Competitive random sequential adsorption of point and fixed-sized particles: analytical results

    Full text link
    We study the kinetics of competitive random sequential adsorption (RSA) of particles of binary mixture of points and fixed-sized particles within the mean-field approach. The present work is a generalization of the random car parking problem in the sense that it considers the case when either a car of fixed size is parked with probability q or the parking space is partitioned into two smaller spaces with probability (1-q) at each time event. This allows an interesting interplay between the classical RSA problem at one extreme (q=1), and the kinetics of fragmentation processes at the other extreme (q=0). We present exact analytical results for coverage for a whole range of q values, and physical explanations are given for different aspects of the problem. In addition, a comprehensive account of the scaling theory, emphasizing on dimensional analysis, is presented, and the exact expression for the scaling function and exponents are obtained.Comment: 7 pages, latex, 3 figure

    On the efficiency of revocation in RSA-based anonymous systems

    Get PDF
    © 2016 IEEEThe problem of revocation in anonymous authentication systems is subtle and has motivated a lot of work. One of the preferable solutions consists in maintaining either a whitelist L-W of non-revoked users or a blacklist L-B of revoked users, and then requiring users to additionally prove, when authenticating themselves, that they are in L-W (membership proof) or that they are not in L-B (non-membership proof). Of course, these additional proofs must not break the anonymity properties of the system, so they must be zero-knowledge proofs, revealing nothing about the identity of the users. In this paper, we focus on the RSA-based setting, and we consider the case of non-membership proofs to blacklists L = L-B. The existing solutions for this setting rely on the use of universal dynamic accumulators; the underlying zero-knowledge proofs are bit complicated, and thus their efficiency; although being independent from the size of the blacklist L, seems to be improvable. Peng and Bao already tried to propose simpler and more efficient zero-knowledge proofs for this setting, but we prove in this paper that their protocol is not secure. We fix the problem by designing a new protocol, and formally proving its security properties. We then compare the efficiency of the new zero-knowledge non-membership protocol with that of the protocol, when they are integrated with anonymous authentication systems based on RSA (notably, the IBM product Idemix for anonymous credentials). We discuss for which values of the size k of the blacklist L, one protocol is preferable to the other one, and we propose different ways to combine and implement the two protocols.Postprint (author's final draft

    Random sequential adsorption of shrinking or spreading particles

    Full text link
    We present a model of one-dimensional irreversible adsorption in which particles once adsorbed immediately shrink to a smaller size or expand to a larger size. Exact solutions for the fill factor and the particle number variance as a function of the size change are obtained. Results are compared with approximate analytical solutions.Comment: 9 pages, 8 figure

    Breaking RSA May Be As Difficult As Factoring

    Get PDF
    If factoring is hard, this paper shows that straight line programs cannot efficiently solve the low public exponent RSA problem. More precisely, no efficient algorithm can take an RSA public key as input and then output a straight line program that efficiently solves the low public exponent RSA problem for the given public key --- unless factoring is easy

    The Polynomial Composition Problem in (Z/nZ)[X]

    Get PDF
    Abstract. Let n be an RSA modulus and let P, Q ∈ (Z/nZ)[X]. This paper explores the following problem: Given polynomials Q and Q(P), find polynomial P. We shed light on the connections between the above problem and the RSA problem and derive from it new zero-knowledge protocols suited to smart-card applications. Keywords: Polynomial composition, zero-knowledge protocols, Fiat-Shamir protocol, Guillou-Quisquater protocol, smart cards

    Dynamic survivable multipath provisioning in OFDM-based flexible optical networks

    Get PDF
    Compared with traditional WDM network, OFDM-based flexible optical networks are able to provide better spectral efficiency due to its flexible allocation of requests on fine granularity subcarrirers. Survivability is a crucial issue in OFDM-based flexible optical networks. In [19], Ruan and Xiao propose a new survivable multipath provisioning scheme (MPP) that provides flexible protection levels in OFDM-based flexible optical networks. They also studies the static Survivable Multipath Routing and Spectrum Allocation (SM-RSA) problem which aims to accommodate a given set of demands with minimum utilized spectrum. It is shown that the MPP scheme achieves higher spectral efficiency than the traditional single-path provisioning (SPP) scheme. In this thesis, we study the dynamic SM-RSA problem, which allocates multiple routes and spectrum for a given demand as it arrives at the network. We develop an ILP model for the problem as well as a heuristic algorithm. We conduct simulations to study the advantage of MPP over SPP for dynamic traffic scenario in terms of blocking performance and fairness. We also compare the performance of the MPP heuristic algorithm and the ILP model
    • …
    corecore