22,914 research outputs found

    The Real and Complex Techniques in Harmonic Analysis from the Point of View of Covariant Transform

    Full text link
    This note reviews complex and real techniques in harmonic analysis. We describe a common source of both approaches rooted in the covariant transform generated by the affine group. Keywords: wavelet, coherent state, covariant transform, reconstruction formula, the affine group, ax+b-group, square integrable representations, admissible vectors, Hardy space, fiducial operator, approximation of the identity, maximal functions, atom, nucleus, atomic decomposition, Cauchy integral, Poisson integral, Hardy--Littlewood maximal functions, grand maximal function, vertical maximal functions, non-tangential maximal functions, intertwining operator, Cauchy-Riemann operator, Laplace operator, singular integral operator, SIO, boundary behaviour, Carleson measure.Comment: 31 pages, AMS-LaTeX, no figures; v2: a major revision, sections on representations of the ax+b group and transported norms are added; v3: major revision: an outline section on complex and real variables techniques are added, numerous smaller improvements; v4: minor correction

    Anonymous and Adaptively Secure Revocable IBE with Constant Size Public Parameters

    Full text link
    In Identity-Based Encryption (IBE) systems, key revocation is non-trivial. This is because a user's identity is itself a public key. Moreover, the private key corresponding to the identity needs to be obtained from a trusted key authority through an authenticated and secrecy protected channel. So far, there exist only a very small number of revocable IBE (RIBE) schemes that support non-interactive key revocation, in the sense that the user is not required to interact with the key authority or some kind of trusted hardware to renew her private key without changing her public key (or identity). These schemes are either proven to be only selectively secure or have public parameters which grow linearly in a given security parameter. In this paper, we present two constructions of non-interactive RIBE that satisfy all the following three attractive properties: (i) proven to be adaptively secure under the Symmetric External Diffie-Hellman (SXDH) and the Decisional Linear (DLIN) assumptions; (ii) have constant-size public parameters; and (iii) preserve the anonymity of ciphertexts---a property that has not yet been achieved in all the current schemes

    Maximal admissible faces and asymptotic bounds for the normal surface solution space

    Get PDF
    The enumeration of normal surfaces is a key bottleneck in computational three-dimensional topology. The underlying procedure is the enumeration of admissible vertices of a high-dimensional polytope, where admissibility is a powerful but non-linear and non-convex constraint. The main results of this paper are significant improvements upon the best known asymptotic bounds on the number of admissible vertices, using polytopes in both the standard normal surface coordinate system and the streamlined quadrilateral coordinate system. To achieve these results we examine the layout of admissible points within these polytopes. We show that these points correspond to well-behaved substructures of the face lattice, and we study properties of the corresponding "admissible faces". Key lemmata include upper bounds on the number of maximal admissible faces of each dimension, and a bijection between the maximal admissible faces in the two coordinate systems mentioned above.Comment: 31 pages, 10 figures, 2 tables; v2: minor revisions (to appear in Journal of Combinatorial Theory A

    Heegaard Floer homology as morphism spaces

    Full text link
    In this paper we prove another pairing theorem for bordered Floer homology. Unlike the original pairing theorem, this one is stated in terms of homomorphisms, not tensor products. The present formulation is closer in spirit to the usual TQFT framework, and allows a more direct comparison with Fukaya-categorical constructions. The result also leads to various dualities in bordered Floer homology.Comment: 57 pages, 14 figures; v2: many updates, including changing orientation conventions, which changed the signs in many theorem
    corecore