252 research outputs found

    Toward an Algebraic Theory of Systems

    Full text link
    We propose the concept of a system algebra with a parallel composition operation and an interface connection operation, and formalize composition-order invariance, which postulates that the order of composing and connecting systems is irrelevant, a generalized form of associativity. Composition-order invariance explicitly captures a common property that is implicit in any context where one can draw a figure (hiding the drawing order) of several connected systems, which appears in many scientific contexts. This abstract algebra captures settings where one is interested in the behavior of a composed system in an environment and wants to abstract away anything internal not relevant for the behavior. This may include physical systems, electronic circuits, or interacting distributed systems. One specific such setting, of special interest in computer science, are functional system algebras, which capture, in the most general sense, any type of system that takes inputs and produces outputs depending on the inputs, and where the output of a system can be the input to another system. The behavior of such a system is uniquely determined by the function mapping inputs to outputs. We consider several instantiations of this very general concept. In particular, we show that Kahn networks form a functional system algebra and prove their composition-order invariance. Moreover, we define a functional system algebra of causal systems, characterized by the property that inputs can only influence future outputs, where an abstract partial order relation captures the notion of "later". This system algebra is also shown to be composition-order invariant and appropriate instantiations thereof allow to model and analyze systems that depend on time

    Transfinite Cryptography

    Get PDF
    \begin{abstract} Let assume that Alice, Bob, and Charlie, the three classical people of cryptography are not limited anymore to perform a finite number of computations on real computers, but are limited to α\alpha computations and to α\alpha bits of memory, where α\alpha is a fixed infinite cardinal. For example α=0\alpha = \aleph _0 (the countable cardinal, i.e. the cardinal of N\mathbb {N} the set of integers), or α=C\alpha = \mathfrak {C} (the cardinal of the set R\mathbb {R} of real numbers). Is it possible to do secret key cryptography? Public key cryptography? Encryption? Authentication? Signatures? Is it possible to generalize the notion of one way function? The aim of this paper is to give some elements of answers to these questions. We will see for example that for secret key cryptography there are some simple solutions. However for public key cryptography the results are much less clear. \end{abstract

    Probabilistic Infinite Secret Sharing

    Full text link
    The study of probabilistic secret sharing schemes using arbitrary probability spaces and possibly infinite number of participants lets us investigate abstract properties of such schemes. It highlights important properties, explains why certain definitions work better than others, connects this topic to other branches of mathematics, and might yield new design paradigms. A probabilistic secret sharing scheme is a joint probability distribution of the shares and the secret together with a collection of secret recovery functions for qualified subsets. The scheme is measurable if the recovery functions are measurable. Depending on how much information an unqualified subset might have, we define four scheme types: perfect, almost perfect, ramp, and almost ramp. Our main results characterize the access structures which can be realized by schemes of these types. We show that every access structure can be realized by a non-measurable perfect probabilistic scheme. The construction is based on a paradoxical pair of independent random variables which determine each other. For measurable schemes we have the following complete characterization. An access structure can be realized by a (measurable) perfect, or almost perfect scheme if and only if the access structure, as a subset of the Sierpi\'nski space {0,1}P\{0,1\}^P, is open, if and only if it can be realized by a span program. The access structure can be realized by a (measurable) ramp or almost ramp scheme if and only if the access structure is a GδG_\delta set (intersection of countably many open sets) in the Sierpi\'nski topology, if and only if it can be realized by a Hilbert-space program

    Infinite Secret Sharing -- Examples

    Get PDF
    The motivation for extending secret sharing schemes to cases when either the set of players is infinite or the domain from which the secret and/or the shares are drawn is infinite or both, is similar to the case when switching to abstract probability spaces from classical combinatorial probability. It might shed new light on old problems, could connect seemingly unrelated problems, and unify diverse phenomena. Definitions equivalent in the finitary case could be very much different when switching to infinity, signifying their difference. The standard requirement that qualified subsets should be able to determine the secret has different interpretations in spite of the fact that, by assumption, all participants have infinite computing power. The requirement that unqualified subsets should have no, or limited information on the secret suggests that we also need some probability distribution. In the infinite case events with zero probability are not necessarily impossible, and we should decide whether bad events with zero probability are allowed or not. In this paper, rather than giving precise definitions, we enlist an abundance of hopefully interesting infinite secret sharing schemes. These schemes touch quite diverse areas of mathematics such as projective geometry, stochastic processes and Hilbert spaces. Nevertheless our main tools are from probability theory. The examples discussed here serve as foundation and illustration to the more theory oriented companion paper

    On (impracticality of) transfinite symmetric encryption with keys smaller than messages under GCH

    Get PDF
    In this short trivial note we argue that, assuming Generalized Continuum Hypothesis to be true, it is impractical to use encryption with Key{0,1}KKey \in \{ 0, 1 \}^K and Message{0,1}MMessage \in \{ 0, 1 \}^M such that 0cardK<cardM\aleph_0 \leqslant \mathrm{card}\,K < \mathrm{card}\,M, because complexity of the known-plaintext bruteforce attack equals complexity of a single En/Decrypt(Key,Message)En/Decrypt(Key, Message) computation then

    Main Concepts in Philosophy of Quantum Information

    Get PDF
    Quantum mechanics involves a generalized form of information, that of quantum information. It is the transfinite generalization of information and re-presentable by transfinite ordinals. The physical world being in the current of time shares the quality of “choice”. Thus quantum information can be seen as the universal substance of the world serving to describe uniformly future, past, and thus the present as the frontier of time. Future is represented as a coherent whole, present as a choice among infinitely many alternatives, and past as a well-ordering obtained as a result of a series of choices. The concept of quantum information describes the frontier of time, that “now”, which transforms future into past. Quantum information generalizes information from finite to infinite series or collections. The concept of quantum information allows of any physical entity to be interpreted as some nonzero quantity of quantum information. The fundament of quantum information is the concept of ‘quantum bit’, “qubit”. A qubit is a choice among an infinite set of alternatives. It generalizes the unit of classical information, a bit, which refer to a finite set of alternatives. The qubit is also isomorphic to a ball in Euclidean space, in which two points are chosen

    The Quantity of Quantum Information and Its Metaphysics

    Get PDF
    The quantum information introduced by quantum mechanics is equivalent to that generalization of the classical information from finite to infinite series or collections. The quantity of information is the quantity of choices measured in the units of elementary choice. The qubit can be interpreted as that generalization of bit, which is a choice among a continuum of alternatives. The axiom of choice is necessary for quantum information. The coherent state is transformed into a well-ordered series of results in time after measurement. The quantity of quantum information is the ordinal corresponding to the infinity series in question. Number and being (by the meditation of time), the natural and artificial turn out to be not more than different hypostases of a single common essence. This implies some kind of neo-Pythagorean ontology making related mathematics, physics, and technics immediately, by an explicit mathematical structure
    corecore