187 research outputs found

    Constant-Size Unbounded Multi-Hop Fully Homomorphic Proxy Re-Encryption from Lattices

    Get PDF
    Proxy re-encryption is a cryptosystem that achieves efficient encrypted data sharing by allowing a proxy to transform a ciphertext encrypted under one key into another ciphertext under a different key. Homomorphic proxy re-encryption (HPRE) extends this concept by integrating homomorphic encryption, allowing not only the sharing of encrypted data but also the homomorphic computations on such data. The existing HPRE schemes, however, are limited to a single or bounded number of hops of ciphertext re-encryptions. To address this limitation, this paper introduces a novel lattice-based, unbounded multi-hop fully homomorphic proxy re-encryption (FHPRE) scheme, with constant-size ciphertexts. Our FHPRE scheme supports an unbounded number of reencryption operations and enables arbitrary homomorphic computations over original, re-encrypted, and evaluated ciphertexts. Additionally, we propose a potential application of our FHPRE scheme in the form of a non-interactive, constant-size multi-user computation system for cloud computing environments

    Scanning tunneling microscopy study of the possible topological surface states in BiTeCl

    Full text link
    Recently, the non-centrosymmetric bismuth tellurohalides such as BiTeCl are being studied as possible candidates of topological insulators. While some photoemission studies showed that BiTeCl is an inversion asymmetric topological insulator, others showed that it is a normal semiconductor with Rashba splitting. Meanwhile, first-principle calculationsfailed to confirm the existence of topological surface states in BiTeCl so far. Therefore, the topological nature of BiTeCl requires further investigation. Here we report low temperature scanning tunneling microscopy study on the surface states of BiTeCl single crystals. On the tellurium-terminated surfaces with low defect density, strong evidences for topological surface states are found in the quasi-particle interference patterns generated by the scattering of these states, both in the anisotropy of the scattering vectors and the fast decay of the interference near step edges. Meanwhile, on samples with much higher defect densities, we observed surface states that behave differently. Our results help to resolve the current controversy on the topological nature of BiTeCl.Comment: 13pages,4figure

    Understanding the Robustness of Skeleton-based Action Recognition under Adversarial Attack

    Get PDF
    Action recognition has been heavily employed in many applications such as autonomous vehicles, surveillance, etc, where its robustness is a primary concern. In this paper, we examine the robustness of state-of-the-art action recognizers against adversarial attack, which has been rarely investigated so far. To this end, we propose a new method to attack action recognizers that rely on 3D skeletal motion. Our method involves an innovative perceptual loss that ensures the imperceptibility of the attack. Empirical studies demonstrate that our method is effective in both white-box and black-box scenarios. Its generalizability is evidenced on a variety of action recognizers and datasets. Its versatility is shown in different attacking strategies. Its deceitfulness is proven in extensive perceptual studies. Our method shows that adversarial attack on 3D skeletal motions, one type of time-series data, is significantly different from traditional adversarial attack problems. Its success raises serious concern on the robustness of action recognizers and provides insights on potential improvements.Comment: Accepted in CVPR 2021. arXiv admin note: substantial text overlap with arXiv:1911.0710

    Quick Recognition of Rock Images for Mobile Applications

    Get PDF
    • …
    corecore