2,017 research outputs found

    Bioecologia do parasitoide de ovos Fopius arisanus (Sonan, 1932) (Hymenoptera: Braconidae) em moscas-das-frutas.

    Get PDF
    Dissertação (Mestrado). Programa de Pós-Graduação em Fitossanidade. Universidade Federal de Pelotas, Pelotas. Orientador: Alci Enimar Loeck, Co-orientador: Sandro Daniel Nornberg, Dori Edson Nava, CPACT

    Malleable Proof Systems and Applications

    Get PDF
    Malleability for cryptography is not necessarily an opportunity for attack, but in many cases a potentially useful feature that can be exploited. In this work, we examine notions of malleability for non-interactive zero-knowledge (NIZK) proofs. We start by defining a malleable proof system, and then consider ways to meaningfully control the malleability of the proof system, as in many settings we would like to guarantee that only certain types of transformations can be performed. We also define notions for the cases in which we do not necessarily want a user to know that a proof has been obtained by applying a particular transformation; these are analogous to function/circuit privacy for encryption. As our motivating application, we consider a shorter proof for verifiable shuffles. Our controlled-malleable proofs allow us for the first time to use one compact proof to prove the correctness of an entire multi-step shuffle. Each authority takes as input a set of encrypted votes and a controlled-malleable NIZK proof that these are a shuffle of the original encrypted votes submitted by the voters; it then permutes and re-randomizes these votes and updates the proof by exploiting its controlled malleability. As another application, we generically use controlled-malleable proofs to realize a strong notion of encryption security. Finally, we examine malleability in existing proof systems and observe that Groth-Sahai proofs are malleable. We then go beyond this observation by characterizing all the ways in which they are malleable, and use them to efficiently instantiate our generic constructions from above; this means we can instantiate our proofs and all their applications using only the Decision Linear (DLIN) assumption. Work done as an intern at Microsoft Research Redmon

    Disorder-Induced Multiple Transition involving Z2 Topological Insulator

    Full text link
    Effects of disorder on two-dimensional Z2 topological insulator are studied numerically by the transfer matrix method. Based on the scaling analysis, the phase diagram is derived for a model of HgTe quantum well as a function of disorder strength and magnitude of the energy gap. In the presence of sz non-conserving spin-orbit coupling, a finite metallic region is found that partitions the two topologically distinct insulating phases. As disorder increases, a narrow-gap topologically trivial insulator undergoes a series of transitions; first to metal, second to topological insulator, third to metal, and finally back to trivial insulator. We show that this multiple transition is a consequence of two disorder effects; renormalization of the band gap, and Anderson localization. The metallic region found in the scaling analysis corresponds roughly to the region of finite density of states at the Fermi level evaluated in the self-consistent Born approximation.Comment: 5 pages, 5 figure

    Order-Revealing Encryption and the Hardness of Private Learning

    Get PDF
    An order-revealing encryption scheme gives a public procedure by which two ciphertexts can be compared to reveal the ordering of their underlying plaintexts. We show how to use order-revealing encryption to separate computationally efficient PAC learning from efficient (ϵ,δ)(\epsilon, \delta)-differentially private PAC learning. That is, we construct a concept class that is efficiently PAC learnable, but for which every efficient learner fails to be differentially private. This answers a question of Kasiviswanathan et al. (FOCS '08, SIAM J. Comput. '11). To prove our result, we give a generic transformation from an order-revealing encryption scheme into one with strongly correct comparison, which enables the consistent comparison of ciphertexts that are not obtained as the valid encryption of any message. We believe this construction may be of independent interest.Comment: 28 page

    Power Spectra for Cold Dark Matter and its Variants

    Get PDF
    The bulk of recent cosmological research has focused on the adiabatic cold dark matter model and its simple extensions. Here we present an accurate fitting formula that describes the matter transfer functions of all common variants, including mixed dark matter models. The result is a function of wavenumber, time, and six cosmological parameters: the massive neutrino density, number of neutrino species degenerate in mass, baryon density, Hubble constant, cosmological constant, and spatial curvature. We show how observational constraints---e.g. the shape of the power spectrum, the abundance of clusters and damped Lyman-alpha systems, and the properties of the Lyman-alpha forest--- can be extended to a wide range of cosmologies, including variations in the neutrino and baryon fractions in both high-density and low-density universes.Comment: 20 pages, LaTeX, 4 figures. Submitted to ApJ. Electronic versions of the fitting formula, as well as simple codes to output cosmological quantities (e.g. sigma_8) as a function of parameters and illustrative animations of parameter dependence, are available at http://www.sns.ias.edu/~whu/transfer/transfer.htm

    Preferência de hospedeiros por Fopius arisanus.

    Get PDF
    O objetivo deste estudo foi selecionar a melhor linhagem/espécie envolvendo Trichogramma pretiosum e Trichogrammatoidea annulata para controle de H. armigera

    Efficient public-key cryptography with bounded leakage and tamper resilience

    Get PDF
    We revisit the question of constructing public-key encryption and signature schemes with security in the presence of bounded leakage and tampering memory attacks. For signatures we obtain the first construction in the standard model; for public-key encryption we obtain the first construction free of pairing (avoiding non-interactive zero-knowledge proofs). Our constructions are based on generic building blocks, and, as we show, also admit efficient instantiations under fairly standard number-theoretic assumptions. The model of bounded tamper resistance was recently put forward by Damgård et al. (Asiacrypt 2013) as an attractive path to achieve security against arbitrary memory tampering attacks without making hardware assumptions (such as the existence of a protected self-destruct or key-update mechanism), the only restriction being on the number of allowed tampering attempts (which is a parameter of the scheme). This allows to circumvent known impossibility results for unrestricted tampering (Gennaro et al., TCC 2010), while still being able to capture realistic tampering attack

    Preferência de hospedeiros por Fopius arisanus.

    Get PDF
    O objetivo deste estudo foi selecionar a melhor linhagem/espécie envolvendo Trichogramma pretiosum e Trichogrammatoidea annulata para controle de H. armigera

    Rapid sympathetic cooling to Fermi degeneracy on a chip

    Full text link
    Neutral fermions present new opportunities for testing many-body condensed matter systems, realizing precision atom interferometry, producing ultra-cold molecules, and investigating fundamental forces. However, since their first observation, quantum degenerate Fermi gases (DFGs) have continued to be challenging to produce, and have been realized in only a handful of laboratories. In this Letter, we report the production of a DFG using a simple apparatus based on a microfabricated magnetic trap. Similar approaches applied to Bose-Einstein Condensation (BEC) of 87Rb have accelerated evaporative cooling and eliminated the need for multiple vacuum chambers. We demonstrate sympathetic cooling for the first time in a microtrap, and cool 40K to Fermi degeneracy in just six seconds -- faster than has been possible in conventional magnetic traps. To understand our sympathetic cooling trajectory, we measure the temperature dependence of the 40K-87Rb cross-section and observe its Ramsauer-Townsend reduction.Comment: 5 pages, 4 figures (v3: new collision data, improved atom number calibration, revised text, improved figures.
    corecore