2,017 research outputs found
Bioecologia do parasitoide de ovos Fopius arisanus (Sonan, 1932) (Hymenoptera: Braconidae) em moscas-das-frutas.
Dissertação (Mestrado). Programa de Pós-Graduação em Fitossanidade. Universidade Federal de Pelotas, Pelotas. Orientador: Alci Enimar Loeck, Co-orientador: Sandro Daniel Nornberg, Dori Edson Nava, CPACT
Malleable Proof Systems and Applications
Malleability for cryptography is not necessarily an opportunity for attack, but in many cases a potentially useful feature that can be exploited. In this work, we examine notions of malleability for non-interactive zero-knowledge (NIZK) proofs. We start by defining a malleable proof system, and then consider ways to meaningfully control the malleability of the proof system, as in many settings we would like to guarantee that only certain types of transformations can be performed. We also define notions for the cases in which we do not necessarily want a user to know that a proof has been obtained by applying a particular transformation; these are analogous to function/circuit privacy for encryption. As our motivating application, we consider a shorter proof for verifiable shuffles. Our controlled-malleable proofs allow us for the first time to use one compact proof to prove the correctness of an entire multi-step shuffle. Each authority takes as input a set of encrypted votes and a controlled-malleable NIZK proof that these are a shuffle of the original encrypted votes submitted by the voters; it then permutes and re-randomizes these votes and updates the proof by exploiting its controlled malleability. As another application, we generically use controlled-malleable proofs to realize a strong notion of encryption security. Finally, we examine malleability in existing proof systems and observe that Groth-Sahai proofs are malleable. We then go beyond this observation by characterizing all the ways in which they are malleable, and use them to efficiently instantiate our generic constructions from above; this means we can instantiate our proofs and all their applications using only the Decision Linear (DLIN) assumption. Work done as an intern at Microsoft Research Redmon
Disorder-Induced Multiple Transition involving Z2 Topological Insulator
Effects of disorder on two-dimensional Z2 topological insulator are studied
numerically by the transfer matrix method. Based on the scaling analysis, the
phase diagram is derived for a model of HgTe quantum well as a function of
disorder strength and magnitude of the energy gap. In the presence of sz
non-conserving spin-orbit coupling, a finite metallic region is found that
partitions the two topologically distinct insulating phases. As disorder
increases, a narrow-gap topologically trivial insulator undergoes a series of
transitions; first to metal, second to topological insulator, third to metal,
and finally back to trivial insulator. We show that this multiple transition is
a consequence of two disorder effects; renormalization of the band gap, and
Anderson localization. The metallic region found in the scaling analysis
corresponds roughly to the region of finite density of states at the Fermi
level evaluated in the self-consistent Born approximation.Comment: 5 pages, 5 figure
Order-Revealing Encryption and the Hardness of Private Learning
An order-revealing encryption scheme gives a public procedure by which two
ciphertexts can be compared to reveal the ordering of their underlying
plaintexts. We show how to use order-revealing encryption to separate
computationally efficient PAC learning from efficient -differentially private PAC learning. That is, we construct a concept
class that is efficiently PAC learnable, but for which every efficient learner
fails to be differentially private. This answers a question of Kasiviswanathan
et al. (FOCS '08, SIAM J. Comput. '11).
To prove our result, we give a generic transformation from an order-revealing
encryption scheme into one with strongly correct comparison, which enables the
consistent comparison of ciphertexts that are not obtained as the valid
encryption of any message. We believe this construction may be of independent
interest.Comment: 28 page
Power Spectra for Cold Dark Matter and its Variants
The bulk of recent cosmological research has focused on the adiabatic cold
dark matter model and its simple extensions. Here we present an accurate
fitting formula that describes the matter transfer functions of all common
variants, including mixed dark matter models. The result is a function of
wavenumber, time, and six cosmological parameters: the massive neutrino
density, number of neutrino species degenerate in mass, baryon density, Hubble
constant, cosmological constant, and spatial curvature. We show how
observational constraints---e.g. the shape of the power spectrum, the abundance
of clusters and damped Lyman-alpha systems, and the properties of the
Lyman-alpha forest--- can be extended to a wide range of cosmologies, including
variations in the neutrino and baryon fractions in both high-density and
low-density universes.Comment: 20 pages, LaTeX, 4 figures. Submitted to ApJ. Electronic versions of
the fitting formula, as well as simple codes to output cosmological
quantities (e.g. sigma_8) as a function of parameters and illustrative
animations of parameter dependence, are available at
http://www.sns.ias.edu/~whu/transfer/transfer.htm
Preferência de hospedeiros por Fopius arisanus.
O objetivo deste estudo foi selecionar a melhor linhagem/espécie envolvendo Trichogramma pretiosum e Trichogrammatoidea annulata para controle de H. armigera
Efficient public-key cryptography with bounded leakage and tamper resilience
We revisit the question of constructing public-key encryption and signature schemes with security in the presence of bounded leakage and tampering memory attacks. For signatures we obtain the first construction in the standard model; for public-key encryption we obtain the first construction free of pairing (avoiding non-interactive zero-knowledge proofs). Our constructions are based on generic building blocks, and, as we show, also admit efficient instantiations under fairly standard number-theoretic assumptions.
The model of bounded tamper resistance was recently put forward by Damgård et al. (Asiacrypt 2013) as an attractive path to achieve security against arbitrary memory tampering attacks without making hardware assumptions (such as the existence of a protected self-destruct or key-update mechanism), the only restriction being on the number of allowed tampering attempts (which is a parameter of the scheme). This allows to circumvent known impossibility results for unrestricted tampering (Gennaro et al., TCC 2010), while still being able to capture realistic tampering attack
Preferência de hospedeiros por Fopius arisanus.
O objetivo deste estudo foi selecionar a melhor linhagem/espécie envolvendo Trichogramma pretiosum e Trichogrammatoidea annulata para controle de H. armigera
Rapid sympathetic cooling to Fermi degeneracy on a chip
Neutral fermions present new opportunities for testing many-body condensed
matter systems, realizing precision atom interferometry, producing ultra-cold
molecules, and investigating fundamental forces. However, since their first
observation, quantum degenerate Fermi gases (DFGs) have continued to be
challenging to produce, and have been realized in only a handful of
laboratories. In this Letter, we report the production of a DFG using a simple
apparatus based on a microfabricated magnetic trap. Similar approaches applied
to Bose-Einstein Condensation (BEC) of 87Rb have accelerated evaporative
cooling and eliminated the need for multiple vacuum chambers. We demonstrate
sympathetic cooling for the first time in a microtrap, and cool 40K to Fermi
degeneracy in just six seconds -- faster than has been possible in conventional
magnetic traps. To understand our sympathetic cooling trajectory, we measure
the temperature dependence of the 40K-87Rb cross-section and observe its
Ramsauer-Townsend reduction.Comment: 5 pages, 4 figures (v3: new collision data, improved atom number
calibration, revised text, improved figures.
- …