129 research outputs found

    A Classification of Unimodular Lattice Wiretap Codes in Small Dimensions

    Full text link
    Lattice coding over a Gaussian wiretap channel, where an eavesdropper listens to transmissions between a transmitter and a legitimate receiver, is considered. A new lattice invariant called the secrecy gain is used as a code design criterion for wiretap lattice codes since it was shown to characterize the confusion that a chosen lattice can cause at the eavesdropper: the higher the secrecy gain of the lattice, the more confusion. In this paper, a formula for the secrecy gain of unimodular lattices is derived. Secrecy gains of extremal odd unimodular lattices as well as unimodular lattices in dimension n, 16 \leq n \leq 23 are computed, covering the 4 extremal odd unimodular lattices and all the 111 nonextremal unimodular lattices (both odd and even) providing thus a classification of the best wiretap lattice codes coming from unimodular lattices in dimension n, 8 < n \leq 23. Finally, to permit lattice encoding via Construction A, the corresponding error correction codes are determined.Comment: 10 page

    Conflict Management and Communication Styles of Educational Leaders in Guangdong Business and Technology University: Towards a Leadership Development Training Program

    Get PDF
    Aim: This study determined the relationship between the assessed conflict management and communication styles of the university leaders of Guangdong Business and Technology University in China towards a leadership development training program. Methodology: This study adopted a descriptive quantitative- comparative- correlational research design. It was conducted during the second semester of school year 2021-2022. The data gathered were collated and treated using the Statistical Package for Social Sciences or SPSS software. Results: Based on the results, the most evident conflict management styles of the university leaders are the compromising, and collaborating styles which ranked first and second respectively among the five identified management styles. It can also be noticed that avoiding and accommodating styles were evident among the university leaders as assessed by the teachers, while competing style was given the lowest assessment by the respondents. An over-all mean values of 3.50 shows that the conflict management style of the university leaders is evident as perceived by the teacher respondents. Conclusion: Compromising and collaborating styles of conflict management are the most evident styles among the university leaders. Older teachers have seen avoiding style of conflict management more evident in their university leaders, while least evident in the eyes of the younger ones. Aggressive communication style was most evident among the university leaders while passive style was the least as observed by the teachers. Older teachers have seen their leaders to be more assertive than how the younger ones have seen them. The way the educational leaders handle conflict management is affected by the way how they communicate with their subordinates. It can also be said that effective communication style is a factor in managing and solving conflicts in the workplace

    Non-Malleable Multi-Party Computation

    Get PDF
    We study a tamper-tolerant implementation security notion for general purpose Multi-Party Computation (MPC) protocols, as an analogue of the leakage-tolerant notion in the MPC literature. An MPC protocol is tamper-tolerant, or more specifically, non-malleable (with respect to a certain type of tampering) if the processing of the protocol under corruption of parties (and tampering of some ideal resource assumed by the protocol) can be simulated by an ideal world adversary who, after the trusted party spit out the output, further decides how the output for honest parties should be tampered with. Intuitively, we relax the correctness of secure computation in a privacy-preserving way, decoupling the two entangled properties that define secure computation. The rationale behind this relaxation is that even the strongest notion of correctness in MPC allows corrupt parties to substitute wrong inputs to the trusted party and the output is incorrect anyway, maybe the importance of insisting on that the adversary does not further tamper with the incorrect output is overrated, at least for some applications. Various weak privacy notions against malicious adversary play an important role in the study of two-party computation, where full security is hard to achieve efficiently. We begin with the honest majority setting, where efficient constructions for general purpose MPC protocols with full security are well understood assuming secure point-to-point channels. We then focus on non-malleability with respect to tampered secure point-to-point channels. (1) We show achievability of non-malleable MPC against the bounded state tampering adversary in the joint tampering model through a naive compiler approach, exploiting a known construction of interactive non-malleable codes. The construction is currently not efficient and should be understood as showing feasibility in a rather strong tampering model. (2) We show efficient constructions of non-malleable MPC protocols against weaker variants of bounded state tampering adversary in the independent tampering model, where the protocol obtained have the same asymptotic communication complexity as best MPC protocols against honest-but-curious adversary. These are all information-theoretic results and are to be contrasted against impossibility of secure MPC when secure point-to-point channels are compromised. Though general non-malleable MPC in no honest majority setting is beyond the scope of this work, we discuss interesting applications of honest majority non-malleable MPC in the celebrated MPC-in-the-head paradigm. Other than an abstract result concerning non-malleability, we also derive, in standard model where there is no tampering, that strong (ideal/real world) privacy against malicious adversary can be achieved in a conceptually very simple way

    Leakage-Resilient Secret Sharing in Non-Compartmentalized Models

    Get PDF

    Aberrant corticostriatal functional circuits in adolescents with Internet addiction disorder

    Get PDF
    Abnormal structure and function in the striatum and prefrontal cortex have been revealed in Internet addiction disorder (IAD). However, little is known about alterations of corticostriatal functional circuits in IAD. The aim of this study was to investigate the integrity of corticostriatal functional circuits and their relations to neuropsychological measures in IAD by resting-state functional connectivity. Fourteen IAD adolescents and 15 healthy controls underwent resting-state fMRI scans. Using 6 predefined bilateral striatal regions-of-interest, voxelwise correlation maps were computed and compared between groups. Relationships between alterations of corticostriatal connectivity and clinical measurements were examined in the IAD group. Compared to controls, IAD subjects exhibited reduced connectivity between the inferior ventral striatum and bilateral caudate head, subgenual anterior cingulate cortex (ACC), and posterior cingulate cortex, and between the superior ventral striatum and bilateral dorsal/rostral ACC, ventral anterior thalamus, and putamen/pallidum/insula/inferior frontal gyrus (IFG), and between the dorsal caudate and dorsal/rostral ACC, thalamus, and IFG, and between the left ventral rostral putamen and right IFG. IAD subjects also showed increased connectivity between the left dorsal caudal putamen and bilateral caudal cigulate motor area. Moreover, altered cotricostriatal functional circuits were significantly correlated with neuropsychological measures. This study directly provides evidence that IAD is associated with alterations of corticostriatal functional circuits involved in the affective and motivation processing, and cognitive control. These findings emphasize that functional connections in the corticostriatal circuits are modulated by affective/motivational/cognitive states and further suggest that IAD may have abnormalities of such modulation in this network

    Impact Analysis of Energy Storage Participating in Peak Shaving and Valley Filling for Distribution Network on Network Loss and Voltage Deviation

    Get PDF
    [Introduction] The application scenarios of peak shaving and valley filling by energy storage connected to the distribution network are studied to clarify the influence of energy storage access on network losses and voltage quality on the distribution network side. [Method] The paper analyzed the change trend of network loss power with the energy storage injection current and access position during peak hours of energy storage discharge, and then analyzed the change trend of network loss power with the energy storage injection current and access position when the energy storage system was connected and charged during valley hours. For the influence of energy storage connected to the distribution network for peak shaving and valley filling on the voltage of the distribution network, the influence of different energy storage injection currents and access positions on the voltage distribution along the distribution network was studied from the perspective of energy storage discharge during peak hours and energy storage charging during valley hours. Finally, considering the total voltage deviation index of the distribution network, the influence on the total voltage deviation index after the distribution network which was connected to energy storage was studied. [Result] Through simulation calculations, the influence trend of energy storage participating in peak shaving and valley filling for the distribution network on network loss power and voltage loss is analyzed when different fixed or continuous values of energy storage current and access position are taken, and it is compared with theoretical analysis. [Conclusion] The study will provide useful references for the coordinated planning and optimized operation of various energy storage facilities in the distribution network, and it has good engineering reference value
    • …
    corecore