1,316 research outputs found
Low-speed aerodynamic characteristics of a highly swept, untwisted uncambered arrow wing
An investigation was conducted in the Langley 4- by 7-Meter Tunnel to provide a detailed study of wing pressure distributions and forces and moments acting on a highly swept arrow-wing model at low Mach numbers (0.25). A limited investigation of the effect of spoilers at several locations was also conducted. Analysis of the pressure data shows that for the configuration with undeflected leading edges, vortex separation occurs on the outboard wing panel for angles of attack on the order of only 3 deg, whereas conventional leading-edge separation occurs at a nondimensional semispan station of 0.654 for the same incidence angle. The pressure data further show that vortex separation exists at wing stations more inboard for angles of attack on the order of 7 deg and that these vortices move inboard and forward with increasing angle of attack. The force and moment data show the expected nonlinear increments in lift and pitching moment and the increased drag associated with the vortex separation. The pressure data and corresponding force and moment data confirm that deflecting the entire wing leading edge uniformly to 30 deg is effective in forestalling the onset of flow separation to angles of attack greater than 8.6 deg; however, the inboard portion of the leading edge is overdeflected. The investigation further identifies the contribution of the trailing-edge flap deflection to the leading-edge upwash fields
Modulus Computational Entropy
The so-called {\em leakage-chain rule} is a very important tool used in many
security proofs. It gives an upper bound on the entropy loss of a random
variable in case the adversary who having already learned some random
variables correlated with , obtains some further
information about . Analogously to the information-theoretic
case, one might expect that also for the \emph{computational} variants of
entropy the loss depends only on the actual leakage, i.e. on .
Surprisingly, Krenn et al.\ have shown recently that for the most commonly used
definitions of computational entropy this holds only if the computational
quality of the entropy deteriorates exponentially in
. This means that the current standard definitions
of computational entropy do not allow to fully capture leakage that occurred
"in the past", which severely limits the applicability of this notion.
As a remedy for this problem we propose a slightly stronger definition of the
computational entropy, which we call the \emph{modulus computational entropy},
and use it as a technical tool that allows us to prove a desired chain rule
that depends only on the actual leakage and not on its history. Moreover, we
show that the modulus computational entropy unifies other,sometimes seemingly
unrelated, notions already studied in the literature in the context of
information leakage and chain rules. Our results indicate that the modulus
entropy is, up to now, the weakest restriction that guarantees that the chain
rule for the computational entropy works. As an example of application we
demonstrate a few interesting cases where our restricted definition is
fulfilled and the chain rule holds.Comment: Accepted at ICTS 201
New Outlook on the Possible Existence of Superheavy Elements in Nature
A consistent interpretation is given to some previously unexplained phenomena
seen in nature in terms of the recently discovered long-lived high spin super-
and hyper-deformed isomeric states. The Po halos seen in mica are interpreted
as due to the existence of such isomeric states in corresponding Po or nearby
nuclei which eventually decay by gamma- or beta-decay to the ground states of
210Po, 214Po and 218Po nuclei. The low-energy 4.5 MeV alpha-particle group
observed in several minerals is interpreted as due to a very enhanced alpha
transition from the third minimum of the potential-energy surface in a
superheavy nucleus with atomic number Z=108 (Hs) and atomic mass number around
271 to the corresponding minimum in the daughter.Comment: 8 pages, 8 figures, 5 tables. Paper presented at VII Int.
School-Seminar on Heavy Ion Physics, May 27 - June 1, 2002, Dubna, Russi
Sub-logarithmic Distributed Oblivious RAM with Small Block Size
Oblivious RAM (ORAM) is a cryptographic primitive that allows a client to
securely execute RAM programs over data that is stored in an untrusted server.
Distributed Oblivious RAM is a variant of ORAM, where the data is stored in
servers. Extensive research over the last few decades have succeeded to
reduce the bandwidth overhead of ORAM schemes, both in the single-server and
the multi-server setting, from to . However, all known
protocols that achieve a sub-logarithmic overhead either require heavy
server-side computation (e.g. homomorphic encryption), or a large block size of
at least .
In this paper, we present a family of distributed ORAM constructions that
follow the hierarchical approach of Goldreich and Ostrovsky [GO96]. We enhance
known techniques, and develop new ones, to take better advantage of the
existence of multiple servers. By plugging efficient known hashing schemes in
our constructions, we get the following results:
1. For any , we show an -server ORAM scheme with overhead, and block size . This scheme is
private even against an -server collusion. 2. A 3-server ORAM
construction with overhead and a block size
almost logarithmic, i.e. .
We also investigate a model where the servers are allowed to perform a linear
amount of light local computations, and show that constant overhead is
achievable in this model, through a simple four-server ORAM protocol
Mitigation Techniques for Attacks on 1-Dimensional Databases that Support Range Queries
In recent years, a number of attacks have been developed that can reconstruct encrypted one-dimensional databases that support range queries under the persistent passive adversary model. These attacks allow an (honest but curious) adversary (such as the cloud provider) to find the order of the elements in the database and, in some cases, to even reconstruct the database itself.
In this paper we present two mitigation techniques to make it harder for the adversary to reconstruct the database. The first technique makes it impossible for an adversary to reconstruct the values stored in the database with an error smaller than , for chosen by the client. By fine-tuning , the user can increase the adversary\u27s error at will.
The second technique is targeted towards adversaries who have managed to learn the distribution of the queries issued. Such adversaries may be able to reconstruct most of the database after seeing a very small (i.e. poly-logarithmic) number of queries. To neutralize such adversaries, our technique turns the database to a circular buffer. All known techniques that exploit knowledge of distribution fail, and no technique can determine which record is first (or last) based on access pattern leakage
Batched Multi-hop Multi-key FHE from ring-LWE with Compact Ciphertext Extension
Traditional fully homomorphic encryption (FHE) schemes support computation on data encrypted under a single key. In STOC 2012,
López-Alt et al. introduced the notion of multi-key FHE (MKFHE), which allows homomorphic computation on ciphertexts encrypted under different keys.
In this work, we focus on MKFHE constructions from standard assumptions and propose a new construction of ring-LWE-based multi-hop MKFHE scheme. Our work is based on Brakerski-Gentry-Vaikuntanathan (BGV) FHE scheme where, in contrast, all the previous works on multi-key FHE with standard assumptions were based on Gentry-Sahai-Waters (GSW) FHE scheme. Therefore, our construction can encrypt ring elements rather than a single bit and naturally inherits the advantages in aspects of the ciphertext/plaintext ratio and the complexity of homomorphic operations. Moveover, the proposed MKFHE scheme supports the Chinese Remainder Theorem (CRT)-based ciphertexts packing technique, achieves computation overhead for users, circuits with depth at most and an dimensional lattice, and gives the first batched MKFHE scheme based on standard assumptions to our knowledge. Furthermore, the ciphertext extension algorithms of previous schemes need to perform complex computation on each ciphertext, while our extension algorithm just needs to generate evaluation keys for the extended scheme. So the complexity of ciphertext extension is only dependent on the number of associated parities but not on the number of ciphertexts.
Besides, our scheme also admits a threshold decryption protocol from which a generalized two-round MPC protocol can be similarly obtained as prior works
Quantum homomorphic encryption for circuits of low -gate complexity
Fully homomorphic encryption is an encryption method with the property that
any computation on the plaintext can be performed by a party having access to
the ciphertext only. Here, we formally define and give schemes for quantum
homomorphic encryption, which is the encryption of quantum information such
that quantum computations can be performed given the ciphertext only. Our
schemes allows for arbitrary Clifford group gates, but become inefficient for
circuits with large complexity, measured in terms of the non-Clifford portion
of the circuit (we use the "" non-Clifford group gate, which is also
known as the -gate).
More specifically, two schemes are proposed: the first scheme has a
decryption procedure whose complexity scales with the square of the number of
-gates (compared with a trivial scheme in which the complexity scales with
the total number of gates); the second scheme uses a quantum evaluation key of
length given by a polynomial of degree exponential in the circuit's -gate
depth, yielding a homomorphic scheme for quantum circuits with constant
-depth. Both schemes build on a classical fully homomorphic encryption
scheme.
A further contribution of ours is to formally define the security of
encryption schemes for quantum messages: we define quantum indistinguishability
under chosen plaintext attacks in both the public and private-key settings. In
this context, we show the equivalence of several definitions.
Our schemes are the first of their kind that are secure under modern
cryptographic definitions, and can be seen as a quantum analogue of classical
results establishing homomorphic encryption for circuits with a limited number
of multiplication gates. Historically, such results appeared as precursors to
the breakthrough result establishing classical fully homomorphic encryption
Metabolic Profiling of Adiponectin Levels in Adults
Background - Adiponectin, a circulating adipocyte-derived protein, has insulin-sensitizing, anti-inflammatory, antiatherogenic, and cardiomyocyte-protective properties in animal models. However, the systemic effects of adiponectin in humans are unknown. Our aims were to define the metabolic profile associated with higher blood adiponectin concentration and investigate whether variation in adiponectin concentration affects the systemic metabolic profile.
Methods and Results - We applied multivariable regression in ≤5909 adults and Mendelian randomization (using cis-acting genetic variants in the vicinity of the adiponectin gene as instrumental variables) for analyzing the causal effect of adiponectin in the metabolic profile of ≤37 545 adults. Participants were largely European from 6 longitudinal studies and 1 genome-wide association consortium. In the multivariable regression analyses, higher circulating adiponectin was associated with higher high-density lipoprotein lipids and lower very-low-density lipoprotein lipids, glucose levels, branched-chain amino acids, and inflammatory markers. However, these findings were not supported by Mendelian randomization analyses for most metabolites. Findings were consistent between sexes and after excluding high-risk groups (defined by age and occurrence of previous cardiovascular event) and 1 study with admixed population.
Conclusions - Our findings indicate that blood adiponectin concentration is more likely to be an epiphenomenon in the context of metabolic disease than a key determinant
Molecular motors robustly drive active gels to a critically connected state
Living systems often exhibit internal driving: active, molecular processes
drive nonequilibrium phenomena such as metabolism or migration. Active gels
constitute a fascinating class of internally driven matter, where molecular
motors exert localized stresses inside polymer networks. There is evidence that
network crosslinking is required to allow motors to induce macroscopic
contraction. Yet a quantitative understanding of how network connectivity
enables contraction is lacking. Here we show experimentally that myosin motors
contract crosslinked actin polymer networks to clusters with a scale-free size
distribution. This critical behavior occurs over an unexpectedly broad range of
crosslink concentrations. To understand this robustness, we develop a
quantitative model of contractile networks that takes into account network
restructuring: motors reduce connectivity by forcing crosslinks to unbind.
Paradoxically, to coordinate global contractions, motor activity should be low.
Otherwise, motors drive initially well-connected networks to a critical state
where ruptures form across the entire network.Comment: Main text: 21 pages, 5 figures. Supplementary Information: 13 pages,
8 figure
- …