205 research outputs found
Key Privacy for Identity Based Encryption
We define key privacy for IBE systems in terms of two
properties, indistinguishability under chosen identity attack, and
indistinguishability under chosen key generator attack. Further, we
show that the BasicIdent system in the Boneh/Franklin IBE has these
properties under chosen plaintext attack
Selective disclosure credential sets
We describe a credential system similar to the electronic cash system
described by Chaum, Fiat and Naor. Our system uses bit commitments to
create selective disclosure credentials which limit what portions of a
credential the holder must reveal. We show how credentials from
separate issuers can be linked to the same person in order to prevent
users from pooling credentials to obtain services no one user could
obtain alone. We also describe how to use a blinding technique
described by Laurie which may not violate the patents on blind
signatures
Family of Hermitian Low-Momentum Nucleon Interactions with Phase Shift Equivalence
Using a Schmidt orthogonalization transformation, a family of Hermitian
low-momentum NN interactions is derived from the non-Hermitian Lee-Suzuki (LS)
low-momentum NN interaction. As special cases, our transformation reproduces
the Hermitian interactions for Okubo and Andreozzi. Aside from their common
preservation of the deuteron binding energy, these Hermitian interactions are
shown to be phase shift equivalent, all preserving the empirical phase shifts
up to decimation scale Lambda. Employing a solvable matrix model, the Hermitian
interactions given by different orthogonalization transformations are studied;
the interactions can be very different from each other particularly when there
is a strong intruder state influence. However, because the parent LS
low-momentum NN interaction is only slightly non-Hermitian, the Hermitian
low-momentum nucleon interactions given by our transformations, including the
Okubo and Andreozzi ones, are all rather similar to each other. Shell model
matrix elements given by the LS and several Hermitian low-momentum interactions
are compared.Comment: 10 pages, 7 figure
Self-aware Computing in the Angstrom Processor
Addressing the challenges of extreme scale computing requires holistic design of new programming models and systems that support those models. This paper discusses the Angstrom processor, which is designed to support a new Self-aware Computing (SEEC) model. In SEEC, applications explicitly state goals, while other systems components provide actions that the SEEC runtime system can use to meet those goals. Angstrom supports this model by exposing sensors and adaptations that traditionally would be managed independently by hardware. This exposure allows SEEC to coordinate hardware actions with actions specified by other parts of the system, and allows the SEEC runtime system to meet application goals while reducing costs (e.g., power consumption).United States. Defense Advanced Research Projects Agency. The Ubiquitous High Performance Computing Progra
Challenging vertical turbulence mixing schemes in a tidally energetic environment: 1. 3‐D shelf‐sea model assessment
Mixing in the ocean and shelf seas is critical for the vertical distribution of dynamically active properties, such as density and biogeochemical tracers. Eight different decadal simulations are used to assess the skill of vertical turbulent mixing schemes (TMS) in a 3‐D regional model of tidally active shelf seas. The TMS differ in the type of stability functions used and in the Ozmidov/Deardorff/Galperin limiter of the turbulence length scales. We review the dependence of the critical Richardson and Prandtl numbers to define the “diffusiveness” of the TMS. The skill in representing bias and variability of stratification profiles is assessed with five different metrics: surface and bottom temperatures and pycnocline depth, thickness, and strength. The assessment is made against hydrography from three data sets (28,000 profiles in total). Bottom and surface temperatures are found to be as sensitive to TMS choice as to horizontal resolution or heat flux formulation, as reported in other studies. All TMS underrepresent the pycnocline depth and benthic temperatures. This suggests physical processes are missing from the model, and these are discussed. Different TMSs show the best results for different metrics, and there is no outright winner. Simulations coupled with an ecosystem model show the choice of TMS strongly affects the ecosystem behavior: shifting the timing of peak chlorophyll by 1 month, showing regional chlorophyll differences of order 100%, and redistributing the production of chorophyll between the pycnocline and mixed layer
Sacred Cows and Sympathetic Squirrels: The Importance of Biological Diversity to Human Health
Dobson and colleagues describe how some host species act to reduce the risk of transmission of virulent zoonotic pathogens to humans
BioTorrents: A File Sharing Service for Scientific Data
The transfer of scientific data has emerged as a significant challenge, as datasets continue to grow in size and demand for open access sharing increases. Current methods for file transfer do not scale well for large files and can cause long transfer times. In this study we present BioTorrents, a website that allows open access sharing of scientific data and uses the popular BitTorrent peer-to-peer file sharing technology. BioTorrents allows files to be transferred rapidly due to the sharing of bandwidth across multiple institutions and provides more reliable file transfers due to the built-in error checking of the file sharing technology. BioTorrents contains multiple features, including keyword searching, category browsing, RSS feeds, torrent comments, and a discussion forum. BioTorrents is available at http://www.biotorrents.net
- …