2,999 research outputs found
Recommended from our members
Smart, secure and seamless access control scheme for mobile devices
Smart devices capture users' activity such as unlock failures, application usage, location and proximity of devices in and around their surrounding environment. This activity information varies between users and can be used as digital fingerprints of the users' behaviour. Traditionally, users are authenticated to access restricted data using long term static attributes such as password and roles. In this paper, in order to allow secure and seamless data access in mobile environment, we combine both the user behaviour captured by the smart device and the static attributes to develop a novel access control technique. Security and performance analyses show that the proposed scheme substantially reduces the computational complexity while enhances the security compared to the conventional schemes
Higher order differentiation over finite fields with applications to generalising the cube attack
Higher order differentiation was introduced in a cryptographic context by Lai. Several attacks can be viewed in the context of higher order differentiations, amongst them the cube attack of Dinur and Shamir and the AIDA attack of Vielhaber. All of the above have been developed for the binary case. We examine differentiation in larger fields, starting with the field GF(p) of integers modulo a prime p, and apply these techniques to generalising the cube attack to GF(p). The crucial difference is that now the degree in each variable can be higher than one, and our proposed attack will differentiate several times with respect to each variable (unlike the classical cube attack and its larger field version described by Dinur and Shamir, both of which differentiate at most once with respect to each variable). Connections to the Moebius/Reed Muller Transform over GF(p) are also examined. Finally we describe differentiation over finite fields GF(ps) with ps elements and show that it can be reduced to differentiation over GF(p), so a cube attack over GF(ps) would be equivalent to cube attacks over GF(p)
Recommended from our members
Privacy-Preserving Multi-Class Support Vector Machine for Outsourcing the Data Classification in Cloud
Emerging cloud computing infrastructure replaces traditional outsourcing techniques and provides flexible services to clients at different locations via Internet. This leads to the requirement for data classification to be performed by potentially untrusted servers in the cloud. Within this context, classifier built by the server can be utilized by clients in order to classify their own data samples over the cloud. In this paper, we study a privacy-preserving (PP) data classification technique where the server is unable to learn any knowledge about clients’ input data samples while the server side classifier is also kept secret from the clients during the classification process. More specifically, to the best of our knowledge, we propose the first known client-server data classification protocol using support vector machine. The proposed protocol performs PP classification for both two-class and multi-class problems. The protocol exploits properties of Pailler homomorphic encryption and secure two-party computation. At the core of our protocol lies an efficient, novel protocol for securely obtaining the sign of Pailler encrypted numbers
Privacy analysis of forward and backward untraceable RFID authentication schemes
In this paper, we analyze the rst known provably secure RFID authentication schemes that are
designed to provide forward untraceability and backward untraceability: the L-K and S-M schemes. We show how
to trace tags in the L-K scheme without needing to corrupt tags. We also show that if a standard cryptographic
pseudorandom bit generator (PRBG) is used in the S-M scheme, then the scheme may fail to provide forward
untraceability and backward untraceability. To achieve the desired untraceability features, we show that the S-M
scheme can use a robust PRBG which provides forward security and backward security. We also note that the
backward security is stronger than necessary for the backward untraceability of the S-M scheme
Simultaneous Multi-Wavelength Observations of Magnetic Activity in Ultracool Dwarfs. I. The Complex Behavior of the M8.5 Dwarf TVLM513-46546
[Abridged] We present the first simultaneous radio, X-ray, ultraviolet, and
optical spectroscopic observations of the M8.5 dwarf TVLM513-46546, with a
duration of 9 hours. These observations are part of a program to study the
origin of magnetic activity in ultracool dwarfs, and its impact on
chromospheric and coronal emission. Here we detect steady quiescent radio
emission superposed with multiple short-duration, highly polarized flares;
there is no evidence for periodic bursts previously reported for this object,
indicating their transient nature. We also detect soft X-ray emission, with
L_X/L_bol~10^-4.9, the faintest to date for any object later than M5, and a
possible weak X-ray flare. TVLM513-46546 continues the trend of severe
violation of the radio/X-ray correlation in ultracool dwarfs, by nearly 4
orders of magnitude. From the optical spectroscopy we find that the Balmer line
luminosity exceeds the X-ray luminosity by a factor of a few, suggesting that,
unlike in early M dwarfs, chromospheric heating may not be due to coronal X-ray
emission. More importantly, we detect a sinusoidal H-alpha light curve with a
period of 2 hr, matching the rotation period of TVLM513-46546. This is the
first known example of such Balmer line behavior, which points to a co-rotating
chromospheric hot spot or an extended magnetic structure, with a covering
fraction of about 50%. This feature may be transitory based on the apparent
decline in light curve peak during the four observed maxima. From the radio
data we infer a large scale steady magnetic field of ~100 G, in good agreement
with the value required for confinement of the X-ray emitting plasma. The radio
flares, on the other hand, are produced in a component of the field with a
strength of ~3 kG and a likely multi-polar configuration.Comment: 13 pages, 4 figure
Transition from ion-coupled to electron-only reconnection: Basic physics and implications for plasma turbulence
Using kinetic particle-in-cell (PIC) simulations, we simulate reconnection
conditions appropriate for the magnetosheath and solar wind, i.e., plasma beta
(ratio of gas pressure to magnetic pressure) greater than 1 and low magnetic
shear (strong guide field). Changing the simulation domain size, we find that
the ion response varies greatly. For reconnecting regions with scales
comparable to the ion Larmor radius, the ions do not respond to the
reconnection dynamics leading to ''electron-only'' reconnection with very large
quasi-steady reconnection rates. The transition to more traditional
''ion-coupled'' reconnection is gradual as the reconnection domain size
increases, with the ions becoming frozen-in in the exhaust when the magnetic
island width in the normal direction reaches many ion inertial lengths. During
this transition, the quasi-steady reconnection rate decreases until the ions
are fully coupled, ultimately reaching an asymptotic value. The scaling of the
ion outflow velocity with exhaust width during this electron-only to
ion-coupled transition is found to be consistent with a theoretical model of a
newly reconnected field line. In order to have a fully frozen-in ion exhaust
with ion flows comparable to the reconnection Alfv\'en speed, an exhaust width
of at least several ion inertial lengths is needed. In turbulent systems with
reconnection occurring between magnetic bubbles associated with fluctuations,
using geometric arguments we estimate that fully ion-coupled reconnection
requires magnetic bubble length scales of at least several tens of ion inertial
lengths
Roots of the derivative of the Riemann zeta function and of characteristic polynomials
We investigate the horizontal distribution of zeros of the derivative of the
Riemann zeta function and compare this to the radial distribution of zeros of
the derivative of the characteristic polynomial of a random unitary matrix.
Both cases show a surprising bimodal distribution which has yet to be
explained. We show by example that the bimodality is a general phenomenon. For
the unitary matrix case we prove a conjecture of Mezzadri concerning the
leading order behavior, and we show that the same follows from the random
matrix conjectures for the zeros of the zeta function.Comment: 24 pages, 6 figure
Inverse lift: a signature of the elasticity of complex fluids?
To understand the mechanics of a complex fluid such as a foam we propose a
model experiment (a bidimensional flow around an obstacle) for which an
external sollicitation is applied, and a local response is measured,
simultaneously. We observe that an asymmetric obstacle (cambered airfoil
profile) experiences a downards lift, opposite to the lift usually known (in a
different context) in aerodynamics. Correlations of velocity, deformations and
pressure fields yield a clear explanation of this inverse lift, involving the
elasticity of the foam. We argue that such an inverse lift is likely common to
complex fluids with elasticity.Comment: 4 pages, 4 figures, revised version, submitted to PR
Simultaneous Multi-Wavelength Observations of Magnetic Activity in Ultracool Dwarfs. II. Mixed Trends in VB10 and LSR1835+32 and the Possible Role of Rotation
[Abridged] As part of our on-going investigation of magnetic activity in
ultracool dwarfs we present simultaneous radio, X-ray, UV, and optical
observations of LSR1835+32 (M8.5), and simultaneous X-ray and UV observations
of VB10 (M8), both with a duration of about 9 hours. LSR1835+32 exhibits
persistent radio emission and H-alpha variability on timescales of ~0.5-2 hr.
The detected UV flux is consistent with photospheric emission, and no X-ray
emission is detected to a deep limit of L_X/L_bol<10^-5.7. The H-alpha and
radio emission are temporally uncorrelated, and the ratio of radio to X-ray
luminosity exceeds the correlation seen in F-M6 stars by >2x10^4. Similarly,
L_Halpha/L_X>10 is at least 30 times larger than in early M dwarfs, and
eliminates coronal emission as the source of chromospheric heating. The lack of
radio variability during four rotations of LSR1835+32 requires a uniform
stellar-scale field of ~10 G, and indicates that the H-alpha variability is
dominated by much smaller scales, <10% of the chromospheric volume. VB10, on
the other hand, shows correlated flaring and quiescent X-ray and UV emission,
similar to the behavior of early M dwarfs. Delayed and densely-sampled optical
spectra exhibit a similar range of variability amplitudes and timescales to
those seen in the X-rays and UV, with L_Halpha/L_X~1. Along with our previous
observations of the M8.5 dwarf TVLM513-46546 we conclude that late M dwarfs
exhibit a mix of activity patterns, which points to a transition in the
structure and heating of the outer atmosphere by large-scale magnetic fields.
We find that rotation may play a role in generating the fields as evidenced by
a tentative correlation between radio activity and rotation velocity. The X-ray
emission, however, shows evidence for super-saturation at vsini>25 km/s.Comment: Submitted to Ap
- …