55 research outputs found

    A p-adic analogue of Siegel's Theorem on sums of squares

    Get PDF
    Siegel proved that every totally positive element of a number field K is the sum of four squares, so in particular the Pythagoras number is uniformly bounded across number fields. The p ‐adic Kochen operator provides a p ‐adic analogue of squaring, and a certain localisation of the ring generated by this operator consists of precisely the totally p ‐integral elements of K . We use this to formulate and prove a p ‐adic analogue of Siegel's theorem, by introducing the p ‐Pythagoras number of a general field, and showing that this number is uniformly bounded across number fields. We also generally study fields with finite p ‐Pythagoras number and show that the growth of the p ‐Pythagoras number in finite extensions is bounded

    Complex dynamics in two dimensions

    Get PDF

    On simple zeros of the Riemann zeta-function

    Get PDF
    We show that at least 19/27 of the zeros of the Riemann zeta-function are simple, assuming the Riemann Hypothesis (RH). This was previously established by Conrey, Ghosh and Gonek [Proc. London Math. Soc. 76 (1998), 497--522] under the additional assumption of the Generalised Lindel\"of Hypothesis (GLH). We are able to remove this hypothesis by careful use of the generalised Vaughan identity

    Surgery and stratified spaces

    Get PDF
    The past couple of decades has seen significant progress in the theory of stratified spaces through the application of controlled methods as well as through the applications of intersection homology. In this paper we will give a cursory introduction to this material, hopefully whetting you

    Bounded-Collusion IBE from Key Homomorphism

    Get PDF
    In this work, we show how to construct IBE schemes that are secure against a bounded number of collusions, starting with underlying PKE schemes which possess linear homomorphisms over their keys. In particular, this enables us to exhibit a new (bounded-collusion) IBE construction based on the quadratic residuosity assumption, without any need to assume the existence of random oracles. The new IBE’s public parameters are of size O(tλlogI) where I is the total number of identities which can be supported by the system, t is the number of collusions which the system is secure against, and λ is a security parameter. While the number of collusions is bounded, we note that an exponential number of total identities can be supported. More generally, we give a transformation that takes any PKE satisfying Linear Key Homomorphism, Identity Map Compatibility, and the Linear Hash Proof Property and translates it into an IBE secure against bounded collusions. We demonstrate that these properties are more general than our quadratic residuosity-based scheme by showing how a simple PKE based on the DDH assumption also satisfies these properties.National Science Foundation (U.S.) (NSF CCF-0729011)National Science Foundation (U.S.) (NSF CCF-1018064)United States. Defense Advanced Research Projects Agency (DARPA FA8750-11-2-0225

    Intersection numbers of curves on Hilbert modular surfaces and modular forms of Nebentypus

    No full text

    S-unit equations and their applications

    Get PDF
    corecore