64 research outputs found

    Fractional LWE: a nonlinear variant of LWE

    Get PDF
    Many cryptographic constructions are based on the famous problem LWE \cite{LWERegev05}. In particular, this cryptographic problem is currently the most relevant to build FHE. In some LWE-based schemes, encrypting xx consists of randomly choosing a vector cc satisfying s,c=x+noise(modq)\langle s,c\rangle=x+\textsf{noise}\pmod q where ss is a secret size-nn vector. While the vector sum is a homomorphic operator, such a scheme is intrinsically vulnerable to lattice-based attacks. To overcome this, we propose to define cc as a pair of vectors (u,v)(u,v) satisfying s,u/s,v=x+noise(modq)\langle s,u\rangle/\langle s,v\rangle=x+\textsf{noise}\pmod q. This simple scheme is based on a new cryptographic problem intuitively not easier than LWE, called Fractional LWE (FLWE). While some homomorphic properties are lost, the secret vector ss could be hopefully chosen shorter leading to more efficient constructions. We extensively study the hardness of FLWE. We first prove that the decision and search versions are equivalent provided qq is a \textit{small} prime. We then propose lattice-based cryptanalysis showing that nn could be chosen logarithmic in logq\log q

    Cherenkov Telescope Array Data Management

    Get PDF
    Very High Energy gamma-ray astronomy with the Cherenkov Telescope Array (CTA) is evolving towards the model of a public observatory. Handling, processing and archiving the large amount of data generated by the CTA instruments and delivering scientific products are some of the challenges in designing the CTA Data Management. The participation of scientists from within CTA Consortium and from the greater worldwide scientific community necessitates a sophisticated scientific analysis system capable of providing unified and efficient user access to data, software and computing resources. Data Management is designed to respond to three main issues: (i) the treatment and flow of data from remote telescopes; (ii) "big-data" archiving and processing; (iii) and open data access. In this communication the overall technical design of the CTA Data Management, current major developments and prototypes are presented.Comment: 8 pages, 2 figures, In Proceedings of the 34th International Cosmic Ray Conference (ICRC2015), The Hague, The Netherlands. All CTA contributions at arXiv:1508.0589

    Combinatorial Rank Attacks Against the Rectangular Simple Matrix Encryption Scheme

    Get PDF
    In 2013, Tao et al. introduced the ABC Simple Matrix Encryption Scheme, a multivariate public key encryption scheme. The scheme boasts great efficiency in encryption and decryption, though it suffers from very large public keys. It was quickly noted that the original proposal, utilizing square matrices, suffered from a very bad decryption failure rate. As a consequence, the designers later published updated parameters, replacing the square matrices with rectangular matrices and altering other parameters to avoid the cryptanalysis of the original scheme presented in 2014 by Moody et al. In this work, we show that making the matrices rectangular, while decreasing the decryption failure rate, actually, and ironically, diminishes security. We show that the combinatorial rank methods employed in the original attack of Moody et al. can be enhanced by the same added degrees of freedom that reduce the decryption failure rate. Moreover, and quite interestingly, if the decryption failure rate is still reasonably high, as exhibited by the proposed parameters, we are able to mount a reaction attack to further enhance the combinatorial rank methods. To our knowledge this is the first instance of a reaction attack creating a significant advantage in this context

    Public Key Compression for Constrained Linear Signature Schemes

    Get PDF
    We formalize the notion of a constrained linear trapdoor as an abstract strategy for the generation of signature schemes, concrete instantiations of which can be found in MQ-based, code-based, and lattice-based cryptography. Moreover, we revisit and expand on a transformation by Szepieniec et al. to shrink the public key at the cost of a larger signature while reducing their combined size. This transformation can be used in a way that is provably secure in the random oracle model, and in a more aggressive variant whose security remained unproven. In this paper we show that this transformation applies to any constrained linear trapdoor signature scheme, and prove the security of the first mode in the quantum random oracle model. Moreover, we identify a property of constrained linear trapdoors that is sufficient (and necessary) for the more aggressive variant to be secure in the quantum random oracle model. We apply the transformation to an MQ-based scheme, a code-based scheme and a lattice-based scheme targeting 128-bits of post quantum security, and we show that in some cases the combined size of a signature and a public key can be reduced by more than a factor 300

    Design concepts for the Cherenkov Telescope Array CTA: an advanced facility for ground-based high-energy gamma-ray astronomy

    Get PDF
    Ground-based gamma-ray astronomy has had a major breakthrough with the impressive results obtained using systems of imaging atmospheric Cherenkov telescopes. Ground-based gamma-ray astronomy has a huge potential in astrophysics, particle physics and cosmology. CTA is an international initiative to build the next generation instrument, with a factor of 5-10 improvement in sensitivity in the 100 GeV-10 TeV range and the extension to energies well below 100 GeV and above 100 TeV. CTA will consist of two arrays (one in the north, one in the south) for full sky coverage and will be operated as open observatory. The design of CTA is based on currently available technology. This document reports on the status and presents the major design concepts of CTA

    Southern African Large Telescope Spectroscopy of BL Lacs for the CTA project

    Get PDF
    In the last two decades, very-high-energy gamma-ray astronomy has reached maturity: over 200 sources have been detected, both Galactic and extragalactic, by ground-based experiments. At present, Active Galactic Nuclei (AGN) make up about 40% of the more than 200 sources detected at very high energies with ground-based telescopes, the majority of which are blazars, i.e. their jets are closely aligned with the line of sight to Earth and three quarters of which are classified as high-frequency peaked BL Lac objects. One challenge to studies of the cosmological evolution of BL Lacs is the difficulty of obtaining redshifts from their nearly featureless, continuum-dominated spectra. It is expected that a significant fraction of the AGN to be detected with the future Cherenkov Telescope Array (CTA) observatory will have no spectroscopic redshifts, compromising the reliability of BL Lac population studies, particularly of their cosmic evolution. We started an effort in 2019 to measure the redshifts of a large fraction of the AGN that are likely to be detected with CTA, using the Southern African Large Telescope (SALT). In this contribution, we present two results from an on-going SALT program focused on the determination of BL Lac object redshifts that will be relevant for the CTA observatory

    Investigation of the DAG eligible jobs maximization algorithm in a grid

    Full text link
    A significant influence of heterogeneity and uncertainty of grid environment on quality of DAG schedules results in a search for new approaches. One of them is Internet-based computing scheduling approach and PRIO algorithm for DAG scheduling. In this paper, we present results of a detailed evaluation of the PRIO algorithms in a heterogeneous environment in which schedulers may recognize performance of resources
    corecore