187 research outputs found
Constant-Size Unbounded Multi-Hop Fully Homomorphic Proxy Re-Encryption from Lattices
Proxy re-encryption is a cryptosystem that achieves efficient encrypted data sharing by allowing a proxy to transform a ciphertext encrypted under one key into another ciphertext under a different key. Homomorphic proxy re-encryption (HPRE) extends this concept by integrating homomorphic encryption, allowing not only the sharing of encrypted data but also the homomorphic computations on such data. The existing HPRE schemes, however, are limited to a single or bounded number of hops of ciphertext re-encryptions. To address this limitation, this paper introduces a novel lattice-based, unbounded multi-hop fully homomorphic proxy re-encryption (FHPRE) scheme, with constant-size ciphertexts. Our FHPRE scheme supports an unbounded number of reencryption operations and enables arbitrary homomorphic computations over original, re-encrypted, and evaluated ciphertexts. Additionally, we propose a potential application of our FHPRE scheme in the form of a non-interactive, constant-size multi-user computation system for cloud computing environments
Scanning tunneling microscopy study of the possible topological surface states in BiTeCl
Recently, the non-centrosymmetric bismuth tellurohalides such as BiTeCl are
being studied as possible candidates of topological insulators. While some
photoemission studies showed that BiTeCl is an inversion asymmetric topological
insulator, others showed that it is a normal semiconductor with Rashba
splitting. Meanwhile, first-principle calculationsfailed to confirm the
existence of topological surface states in BiTeCl so far. Therefore, the
topological nature of BiTeCl requires further investigation. Here we report low
temperature scanning tunneling microscopy study on the surface states of BiTeCl
single crystals. On the tellurium-terminated surfaces with low defect density,
strong evidences for topological surface states are found in the quasi-particle
interference patterns generated by the scattering of these states, both in the
anisotropy of the scattering vectors and the fast decay of the interference
near step edges. Meanwhile, on samples with much higher defect densities, we
observed surface states that behave differently. Our results help to resolve
the current controversy on the topological nature of BiTeCl.Comment: 13pages,4figure
Understanding the Robustness of Skeleton-based Action Recognition under Adversarial Attack
Action recognition has been heavily employed in many applications such as
autonomous vehicles, surveillance, etc, where its robustness is a primary
concern. In this paper, we examine the robustness of state-of-the-art action
recognizers against adversarial attack, which has been rarely investigated so
far. To this end, we propose a new method to attack action recognizers that
rely on 3D skeletal motion. Our method involves an innovative perceptual loss
that ensures the imperceptibility of the attack. Empirical studies demonstrate
that our method is effective in both white-box and black-box scenarios. Its
generalizability is evidenced on a variety of action recognizers and datasets.
Its versatility is shown in different attacking strategies. Its deceitfulness
is proven in extensive perceptual studies. Our method shows that adversarial
attack on 3D skeletal motions, one type of time-series data, is significantly
different from traditional adversarial attack problems. Its success raises
serious concern on the robustness of action recognizers and provides insights
on potential improvements.Comment: Accepted in CVPR 2021. arXiv admin note: substantial text overlap
with arXiv:1911.0710
- …