40 research outputs found
NASA's Solar Dynamics Observatory (SDO): A Systems Approach to a Complex Mission
The Solar Dynamics Observatory (SDO) includes three advanced instruments, massive science data volume, stringent science data completeness requirements, and a custom ground station to meet mission demands. The strict instrument science requirements imposed a number of challenging drivers on the overall mission system design, leading the SDO team to adopt an integrated systems engineering presence across all aspects of the mission to ensure that mission science requirements would be met. Key strategies were devised to address these system level drivers and mitigate identified threats to mission success. The global systems engineering team approach ensured that key drivers and risk areas were rigorously addressed through all phases of the mission, leading to the successful SDO launch and on-orbit operation. Since launch, SDO's on-orbit performance has met all mission science requirements and enabled groundbreaking science observations, expanding our understanding of the Sun and its dynamic processes
Wide-Field Infrared Survey Telescope (WFIRST) - Optical Telescope Assembly (OTA) Status
The WFIRST Mission is the next large astrophysical observatory for NASA after the James Webb Space Telescope and is the top priority mission from the 2010 National Academy of Sciences' decadal survey. The WFIRST OTA includes the inherited primary and secondary mirrors with precision metering structures that are to be integrated to new mirror assemblies to provide optical feeds to the two WFIRST science instruments. We present here: (1) the results for the review of the inherited hardware for WFIRST through a thorough technical pedigree process, (2) the status of the effort to establish the capability of the telescope to perform at a cooler operational temperature of 265K, and (3) the status of the work in requirement development for OTA to incorporate the inherited hardware, and (4) the path forward
Wide Field Infrared Survey Telescope (WFIRST) Observatory Overview
NASA's Wide Field Infrared Survey Telescope (WFIRST) is being designed to deliver unprecedented capability in dark energy and exoplanet science, and to host a technology demonstration coronagraph for exoplanet imaging and spectroscopy. The observatory design has matured since 2013; we present a comprehensive description of the observatory configuration as refined during the WFIRST Phase-A study. The observatory is based on an existing, repurposed 2.4 meter space telescope coupled with a 288 megapixel near-infrared (0.6 to 2 microns) HgCdTe focal plane array with multiple imaging and spectrographic modes. Together they deliver a 0.28 square degree field of view, which is approximately 100 times larger than the Hubble Space Telescope, and a sensitivity that enables rapid science surveys. In addition, the coronagraph technology demonstration will prove the feasibility of new techniques for exoplanet discovery, imaging, and spectral analysis. A composite truss structure meters both instruments to the telescope assembly, and the instruments and the spacecraft are flight serviceable. We present configuration changes since 2013 that improved interfaces, improved testability, and reduced technical risk. We provide an overview of our Integrated Modeling results, performed at an unprecedented level for a phase-A study, to illustrate performance margins with respect to static wavefront error, jitter, and thermal drift
Wide-Field InfrarRed Survey Telescope-Astrophysics Focused Telescope Assets WFIRST-AFTA 2015 Report
This report describes the 2014 study by the Science Definition Team (SDT) of
the Wide-Field Infrared Survey Telescope (WFIRST) mission. It is a space
observatory that will address the most compelling scientific problems in dark
energy, exoplanets and general astrophysics using a 2.4-m telescope with a
wide-field infrared instrument and an optical coronagraph. The Astro2010
Decadal Survey recommended a Wide Field Infrared Survey Telescope as its top
priority for a new large space mission. As conceived by the decadal survey,
WFIRST would carry out a dark energy science program, a microlensing program to
determine the demographics of exoplanets, and a general observing program
utilizing its ultra wide field. In October 2012, NASA chartered a Science
Definition Team (SDT) to produce, in collaboration with the WFIRST Study Office
at GSFC and the Program Office at JPL, a Design Reference Mission (DRM) for an
implementation of WFIRST using one of the 2.4-m, Hubble-quality telescope
assemblies recently made available to NASA. This DRM builds on the work of the
earlier WFIRST SDT, reported by Green et al. (2012) and the previous WFIRST-2.4
DRM, reported by Spergel et. (2013). The 2.4-m primary mirror enables a mission
with greater sensitivity and higher angular resolution than the 1.3-m and 1.1-m
designs considered previously, increasing both the science return of the
primary surveys and the capabilities of WFIRST as a Guest Observer facility.
The addition of an on-axis coronagraphic instrument to the baseline design
enables imaging and spectroscopic studies of planets around nearby stars.Comment: This report describes the 2014 study by the Science Definition Team
of the Wide-Field Infrared Survey Telescope mission. 319 pages; corrected a
misspelled name in the authors list and a typo in the abstrac
Une classification des hypothèses calculatoire dans le modèle du groupe algébrique
International audiencea We give a taxonomy of computational assumptions in the algebraic group model (AGM). We first analyze Boyen's Uber assumption family for bilinear groups and then extend it in several ways to cover assumptions as diverse as Gap Diffie-Hellman and LRSW. We show that in the AGM every member of these families is implied by the q-discrete logarithm (DL) assumption, for some q that depends on the degrees of the polynomials defining the Uber assumption. Using the meta-reduction technique, we then separate (q + 1)-DL from q-DL, which yields a classification of all members of the extended Uber-assumption families. We finally show that there are strong assumptions, such as one-more DL, that provably fall outside our classification, by proving that they cannot be reduced from q-DL even in the AGM
A Non-Interactive Shuffle Argument With Low Trust Assumptions
A shuffle argument is a cryptographic primitive for proving correct behaviour of mix-networks without leaking any private information. Several recent constructions of non-interactive shuffle arguments avoid the random oracle model but require the public key to be trusted.
We augment the most efficient argument by Fauzi et al. [Asiacrypt 2017] with a distributed key generation protocol that assures soundness of the argument if at least one party in the protocol is honest and additionally provide a key verification algorithm which guarantees zero-knowledge even if all the parties are malicious. Furthermore, we simplify their construction and improve security by using weaker assumptions while retaining roughly the same level of efficiency. We also provide an implementation to the distributed key generation protocol and the shuffle argument
Matrix PRFs: Constructions, Attacks, and Applications to Obfuscation
We initiate a systematic study of pseudorandom functions (PRFs) that are
computable by simple matrix branching programs; we refer to these objects as
“matrix PRFs”. Matrix PRFs are attractive due to their simplicity, strong
connections to complexity theory and group theory, and recent applications in
program obfuscation.
Our main results are:
* We present constructions of matrix PRFs based on the conjectured hardness of
some simple computational problems pertaining to matrix products.
* We show that any matrix PRF that is computable by a read-c, width w
branching program can be broken in time poly(w^c); this means that any matrix
PRF based on constant-width matrices must read each input bit omega(log
lambda) times. Along the way, we simplify the “tensor switching lemmas”
introduced in previous IO attacks.
* We show that a subclass of the candidate local-PRG proposed by Barak et al.
[Eurocrypt 2018] can be broken using simple matrix algebra.
* We show that augmenting the CVW18 IO candidate with a matrix PRF provably
immunizes the candidate against all known algebraic and statistical zeroizing
attacks, as captured by a new and simple adversarial model
Recommended from our members
New Techniques for Obfuscating Conjunctions
A conjunction is a function where and each is or . Bishop et al. (CRYPTO 2018) recently proposed obfuscating conjunctions by embedding them in the error positions of a noisy Reed-Solomon codeword and encoding the codeword in a group exponent. They prove distributional virtual black box (VBB) security in the generic group model for random conjunctions where . While conjunction obfuscation was known from LWE due to Wichs and Zirdelis (FOCS 2017) and Goyal et al. (FOCS 2017), these constructions rely on substantial technical machinery.
In this work, we conduct an extensive study of simple conjunction obfuscation techniques.
- We abstract the Bishop et al. scheme to obtain an equivalent yet more efficient dual\u27\u27 scheme that can handle conjunctions over exponential size alphabets. This scheme admits a straightforward proof of generic group security, which we combine with a novel combinatorial argument to obtain distributional VBB security for of any size.
- If we replace the Reed-Solomon code with a random binary linear code, we can prove security from standard LPN and avoid encoding in a group. This addresses an open problem posed by Bishop et al. to prove security of this simple approach in the standard model.
- We give a new construction that achieves information theoretic distributional VBB security and weak functionality preservation for and . Assuming discrete log and , we satisfy a stronger notion of functionality preservation for computationally bounded adversaries while still achieving information theoretic security
Obfuscated Fuzzy Hamming Distance and Conjunctions from Subset Product Problems
We consider the problem of obfuscating programs for fuzzy matching (in other words, testing whether the Hamming distance between an -bit input and a fixed -bit target vector is smaller than some predetermined threshold). This problem arises in biometric matching and other contexts. We present a virtual-black-box (VBB) secure and input-hiding obfuscator for fuzzy matching for Hamming distance, based on certain natural number-theoretic computational assumptions. In contrast to schemes based on coding theory, our obfuscator is based on computational hardness rather than information-theoretic hardness, and can be implemented for a much wider range of parameters. The Hamming distance obfuscator can also be applied to obfuscation of matching under the norm on .
We also consider obfuscating conjunctions. Conjunctions are equivalent to pattern matching with wildcards, which can be reduced in some cases to fuzzy matching. Our approach does not cover as general a range of parameters as other solutions, but it is much more compact. We study the relation between our obfuscation schemes and other obfuscators and give some advantages of our solution