17 research outputs found

    Some aspects of the Liouville equation in mathematical physics and statistical mechanics

    Full text link
    This paper presents some mathematical aspects of Classical Liouville theorem and we have noted some mathematical theorems about its initial value problem. Furthermore, we have implied on the formal frame work of Stochastic Liouville equation (SLE)

    Observation of a new boson at a mass of 125 GeV with the CMS experiment at the LHC

    Get PDF

    D.: Learning-based compositional verification for synchronous probabilistic systems

    No full text
    Abstract. We present novel techniques for automated compositional verification of synchronous probabilistic systems. First, we give an assume-guarantee framework for verifying probabilistic safety properties of systems modelled as discretetime Markov chains. Assumptions about system components are represented as probabilistic finite automata (PFAs) and the relationship between components and assumptions is captured by weak language inclusion. In order to implement this framework, we develop a semi-algorithm to check language inclusion for PFAs and a new active learning method for PFAs. The latter is then used to automatically generate assumptions for compositional verification.

    a new anonymous password-based authenticated key exchange protocol

    No full text
    Indian Inst Technol Kharagpur, Dept Comp Sci & Engn, Cryptol Res Soc IndiaIn Indocrypt 2005 Viet et al. first proposed an anonymous password-based key exchange protocol: APAKE and its extension: k-out-of-n APAKE. Then Shin et al. presented an improved protocol TAP. In this paper, we first show that the TAP protoco

    Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack

    Get PDF
    A (public key) Trace and Revoke Scheme combines the functionality of broadcast encryption with the capability of traitor tracing. Specifically, (1) a trusted center publishes a single public key and distributes individual secret keys to the users of the system; (2) anybody can encrypt a message so that all but a specified subset of “revoked ” users can decrypt the resulting ciphertext; and (3) if a (small) group of users combine their secret keys to produce a “pirate decoder”, the center can trace at least one of the “traitors ” given access to this decoder. We construct the first chosen ciphertext (CCA2) secure Trace and Revoke Scheme based on the DDH assumption. Our scheme is also the first adaptively secure scheme, allowing the adversary to corrupt players at any point during execution, while prior works (e.g., [19, 21]) only achieves a very weak form of non-adaptive security even against chosen plaintext attacks. In fact, no CCA2 scheme was known even in the symmetric setting. Of independent interest, we present a slightly simpler construction that shows a “natural separation ” between the classical notion of CCA2 security and the recently proposed [20, 1] relaxed notion of gCCA2 security.

    An efficient public key trace and revoke scheme secure against adaptive chosen ciphertext attack

    No full text
    Abstract. We propose a new public key trace and revoke scheme secure against adaptive chosen ciphertext attack. Our scheme is more efficient than the DF scheme suggested by Y. Dodis and N. Fazio[9]. Our scheme reduces the length of enabling block of the DF scheme by (about) half. Additionally, the computational overhead of the user is lower than that of the DF scheme; instead, the computational overhead of the server is increased. The total computational overhead of the user and the server is the same as that of the DF scheme, and therefore, our scheme is more practical, since the computing power of the user is weaker than that of the server in many applications. In addition, our scheme is secure against adaptive chosen ciphertext attack under only the decision Diffie-Hellman (DDH) assumption and the collision-resistant hash function H assumption, whereas the DF scheme also needs the one-time MAC (message authentication code) assumption.
    corecore