9,941 research outputs found

    Key Distillation and the Secret-Bit Fraction

    Full text link
    We consider distillation of secret bits from partially secret noisy correlations P_ABE, shared between two honest parties and an eavesdropper. The most studied distillation scenario consists of joint operations on a large number of copies of the distribution (P_ABE)^N, assisted with public communication. Here we consider distillation with only one copy of the distribution, and instead of rates, the 'quality' of the distilled secret bits is optimized, where the 'quality' is quantified by the secret-bit fraction of the result. The secret-bit fraction of a binary distribution is the proportion which constitutes a secret bit between Alice and Bob. With local operations and public communication the maximal extractable secret-bit fraction from a distribution P_ABE is found, and is denoted by Lambda[P_ABE]. This quantity is shown to be nonincreasing under local operations and public communication, and nondecreasing under eavesdropper's local operations: it is a secrecy monotone. It is shown that if Lambda[P_ABE]>1/2 then P_ABE is distillable, thus providing a sufficient condition for distillability. A simple expression for Lambda[P_ABE] is found when the eavesdropper is decoupled, and when the honest parties' information is binary and the local operations are reversible. Intriguingly, for general distributions the (optimal) operation requires local degradation of the data.Comment: 12 page

    Expressing Privacy Preferences in terms of Invasiveness

    Get PDF
    Dynamic context aware systems need highly flexible privacy protection mechanisms. We describe an extension to an existing RBAC-based mechanism that utilises a dynamic measure of invasiveness to determine whether contextual information should be released

    Hall-Littlewood polynomials and characters of affine Lie algebras

    Full text link
    The Weyl-Kac character formula gives a beautiful closed-form expression for the characters of integrable highest-weight modules of Kac-Moody algebras. It is not, however, a formula that is combinatorial in nature, obscuring positivity. In this paper we show that the theory of Hall-Littlewood polynomials may be employed to prove Littlewood-type combinatorial formulas for the characters of certain highest weight modules of the affine Lie algebras C_n^{(1)}, A_{2n}^{(2)} and D_{n+1}^{(2)}. Through specialisation this yields generalisations for B_n^{(1)}, C_n^{(1)}, A_{2n-1}^{(2)}, A_{2n}^{(2)} and D_{n+1}^{(2)} of Macdonald's identities for powers of the Dedekind eta-function. These generalised eta-function identities include the Rogers-Ramanujan, Andrews-Gordon and G\"ollnitz-Gordon q-series as special, low-rank cases.Comment: 33 pages, proofs of several conjectures from the earlier version have been include

    Re-Politicising Regulation: Politics: Regulatory Variation and Fuzzy Liberalisation in the Single European Energy Market

    Get PDF
    [From the introduction] The idea that we are living in the age of the regulatory state has dominated the study of public policy in the European Union and its member states in general, and the study of the utilities sectors in particular.1 The European Commission’s continuous drive to expand the Single Market has therefore been a free-market and rule-oriented project, driven by regulatory politics rather than policies that involve direct public expenditure. The dynamics of European integration are rooted in three central concepts: free trade, multilateral rules, and supranational cooperation. During the 1990s EU competition policy took a ‘public turn’ and set its sights on the public sector.2 EU legislation broke up national monopolies in telecommunications, electricity and gas, and set the scene for further extension of the single market into hitherto protected sectors. Both the integration theory literature (intergovernmentalist and institutionalist alike) and literature on the emergence of the EU as a ‘regulatory state’ assumed that this was primarily a matter of policy making: once agreement had been reached to liberalise the utilities markets a relatively homogeneous process would follow. The regulatory state model fit the original common market blueprint better the old industrial policy approaches. On the other hand, sector-specific studies continue to reveal a less than fully homogeneous internal market. The EU has undergone momentous changes in the last two decades, which have rendered the notion of a homogeneous single market somewhat unrealistic

    Risk assessment and relationship management: practical approach to supply chain risk management

    Get PDF
    The literature suggests the need for incorporating the risk construct into the measurement of organisational performance, although few examples are available as to how this might be undertaken in relation to supply chains. A conceptual framework for the development of performance and risk management within the supply chain is evolved from the literature and empirical evidence. The twin levels of dyadic performance/risk management and the management of a portfolio of performance/risks is addressed, employing Agency Theory to guide the analysis. The empirical evidence relates to the downstream management of dealerships by a large multinational organisation. Propositions are derived from the analysis relating to the issues and mechanisms that may be employed to effectively manage a portfolio of supply chain performance and risks
    • 

    corecore