176,040 research outputs found
Non-malleable encryption: simpler, shorter, stronger
In a seminal paper, Dolev et al. [15] introduced the notion of non-malleable encryption (NM-CPA). This notion is very intriguing since it suffices for many applications of chosen-ciphertext secure encryption (IND-CCA), and, yet, can be generically built from semantically secure (IND-CPA) encryption, as was shown in the seminal works by Pass et al. [29] and by Choi et al. [9], the latter of which provided a black-box construction. In this paper we investigate three questions related to NM-CPA security: 1. Can the rate of the construction by Choi et al. of NM-CPA from IND-CPA be improved? 2. Is it possible to achieve multi-bit NM-CPA security more efficiently from a single-bit NM-CPA scheme than from IND-CPA? 3. Is there a notion stronger than NM-CPA that has natural applications and can be achieved from IND-CPA security? We answer all three questions in the positive. First, we improve the rate in the scheme of Choi et al. by a factor O(λ), where λ is the security parameter. Still, encrypting a message of size O(λ) would require ciphertext and keys of size O(λ2) times that of the IND-CPA scheme, even in our improved scheme. Therefore, we show a more efficient domain extension technique for building a λ-bit NM-CPA scheme from a single-bit NM-CPA scheme with keys and ciphertext of size O(λ) times that of the NM-CPA one-bit scheme. To achieve our goal, we define and construct a novel type of continuous non-malleable code (NMC), called secret-state NMC, as we show that standard continuous NMCs are not enough for the natural “encode-then-encrypt-bit-by-bit” approach to work. Finally, we introduce a new security notion for public-key encryption that we dub non-malleability under (chosen-ciphertext) self-destruct attacks (NM-SDA). After showing that NM-SDA is a strict strengthening of NM-CPA and allows for more applications, we nevertheless show that both of our results—(faster) construction from IND-CPA and domain extension from one-bit scheme—also hold for our stronger NM-SDA security. In particular, the notions of IND-CPA, NM-CPA, and NM-SDA security are all equivalent, lying (plausibly, strictly?) below IND-CCA securit
\cPA-isomorphisms of inverse semigroups
A partial automorphism of a semigroup is any isomorphism between its
subsemigroups, and the set all partial automorphisms of with respect to
composition is the inverse monoid called the partial automorphism monoid of
. Two semigroups are said to be \cPA-isomorphic if their partial
automorphism monoids are isomorphic. A class \K of semigroups is called
\cPA-closed if it contains every semigroup \cPA-isomorphic to some
semigroup from \K. Although the class of all inverse semigroups is not
\cPA-closed, we prove that the class of inverse semigroups, in which no
maximal isolated subgroup is a direct product of an involution-free periodic
group and the two-element cyclic group, is \cPA-closed. It follows that the
class of all combinatorial inverse semigroups (those with no nontrivial
subgroups) is \cPA-closed. A semigroup is called \cPA-determined if it is
isomorphic or anti-isomorphic to any semigroup that is \cPA-isomorphic to it.
We show that combinatorial inverse semigroups which are either shortly
connected [5] or quasi-archimedean [10] are \cPA-determined
Random Matrix Theory Approach to Chaotic Coherent Perfect Absorbers
We employ Random Matrix Theory in order to investigate coherent perfect
absorption (CPA) in lossy systems with complex internal dynamics. The loss
strength and energy , for which a CPA occurs
are expressed in terms of the eigenmodes of the isolated cavity -- thus
carrying over the information about the chaotic nature of the target -- and
their coupling to a finite number of scattering channels. Our results are
tested against numerical calculations using complex networks of resonators and
chaotic graphs as CPA cavities.Comment: Supplementary material is included. Updated version with minor
modification
Recommended from our members
Can we do better than co-citations? Bringing Citation Proximity Analysis from idea to practice in research articles recommendation
In this paper, we build on the idea of Citation Proximity Analysis (CPA), originally introduced in [1], by developing a step by step scalable approach for building CPA-based recommender systems. As part of this approach, we introduce three new proximity functions, extending the basic assumption of co-citation analysis (stating that the more often two articles are co-cited in a document, the more likely they are related) to take the distance between the co-cited documents into account. Ask- ing the question of whether CPA can outperform co-citation analysis in recommender systems, we have built a CPA based recommender system from a corpus of 368,385 full-texts articles and conducted a user survey to perform an initial evaluation. Two of our three proximity functions used within CPA outperform co-citations on our evaluation dataset
- …