Previous Work Sample Clauses

Previous Work. Information-theoretically secure secret-key agreement from correlated information has first been proposed by Xxxxxx in [11]. He considered a setting where Alice, Bob, and Eve hold many indepen- dent realizations of correlated random variables X, Y , and Z, respectively, with joint probability distribution PXY Z. The (two-way) secret-key rate S(X; Y Z), i.e., the rate at which Xxxxx and Xxx can generate secret-key bits per realization of (X, Y, Z), has further been studied in [1] and later in [12], where the intrinsic information I(X; Y Z) is defined and shown to be an upper bound on S(X; Y Z), which, however, is not tight [13]. | − | | For one-way communication, it is already implied by a result in [3] and has later been shown in [1] that the secret-key rate S→(X; Y Z) is given by the supremum of H(U ZV ) H(U Y V ), taken over all possible random variables U and V obtained from X.1 However, as this is a purely information-theoretic result, it does not directly imply that there exists an efficient key-agreement protocol. | − |
AutoNDA by SimpleDocs
Previous Work. Reputation mechanisms are being used to increase the reliability and perfor- xxxxx of virtual societies (or organisations) while providing mechanisms for exchanging reputation values. In centralised reputation models, a reputation system receives feedback about the interactions among the agents. Each agent evaluates the behaviour of the agents with whom it interacts and informs the reputation system. The system puts together all evaluations and stores such rep- utations. In contrast, in distributed reputation models, each agent evaluates and stores the reputations of the agents with whom it has interacted with and is able to provide such information to other agents. With the aim to cope with the problems of centralised and distributed rep- utation mechanisms3, we proposed the use of a hybrid mechanism [12]. In the distributed part of such a mechanism, agents evaluate the behaviour of other agents by exchanging opinions and storing such information. An opinion has to be justified by providing, for instance, the set of violated norms that contribute to that opinion. X A R ON (A A X {ON R }) A This work is framed in organisational environments that provide a minimum set of organisational mechanisms to regulate agents’ interactions. Formally, an organisation is defined as a tuple g, , , φ, x0, ϕ, om, om where g represents the set of agents participating within the organisation; is the set of actions agents can perform; stands for the environmental states space; φ is a function describing how the system evolves as a result of agents actions; x0 represents the initial state of the system; ϕ is the agents’ capability function describing the actions agents are able to perform in a given state of the environ- ment; om is an organisational mechanism based on organisational norms; and om is an organisational mechanism based on roles that defines the positions agents may enact in the organisation (see [5] for more details). (A R A ) (A A T ) Agents participating in the field of such organisations are involved in different situations. A situation is defined as a tuple g, , , T , that represents an agent g, playing the role , while performing the action , through a time period T . As detailed in [5], different types of situations can be defined following this definition. For instance, situations in which an agent performs an action, regardless of the role it is playing – g, , , –, or situations in which an agent is playing a role along a time period, regardless the acti...
Previous Work. Broadcast: For the standard communication model with a complete synchro- nous network of pairwise authenticated channels, Pease, Shostak, and Xxx- port [PSL80] proved that perfectly secure broadcast is achievable if and only if less than a third of the players is corrupted: t < n/3. This tight bound more generally holds with respect to a network of secure channels and unconditional security, i.e., when even allowing a negligible error probability, as proven by Xxxxxx and Yao [KY]. The first optimally resilient protocol that is efficient was proposed by Dolev et al. [DFF+82]. For the case that broadcast among ev- ery subset of three players is possible (in contrast to the standard model with only pairwise communication), Fitzi and Xxxxxx [FM00] proved that (global) broadcast is possible if and only if t < n/2. In another line of research, Xxxx- Xxxxxxx, Pfitzmann, and Xxxxxxx [BPW91,PW92] proved that broadcast during some precomputation stage allows to later achieve broadcast that tolerates any number of corrupted players (t < n), i.e., that the functionality of the prior broadcast can be preserved for any later time. Multi-party computation: The concept of general multi-party computation (MPC) was introduced by Yao [Yao82] with a first complete solution given by 3 That is, interpreting ⊥ as “invalid”, this condition expresses that no two correct players may decide on valid values that are distinct. Goldreich, Micali, and Wigderson [GMW87] — though with computational se- curity. Ben-Or, Xxxxxxxxxx, and Wigderson [BGW88], and, Xxxxx, Xx´epeau, and Damg˚ard [CCD88], proved that, in the standard model with pairwise se- cure channels, unconditionally secure MPC is achievable if and only if t < n/3 by giving efficient protocols for the achievable cases. Beaver [Bea89], and inde- pendently, Xxxxx and Xxx-Or [RB89] later proved that, when additionally given global broadcast among the players, unconditionally secure MPC is achievable if and only if t < n/2 (see also Xxxxxx et al. [CDD+99]). The result in [FM00] hence implies that broadcast among three players (i.e., 2-cast) is sufficient in order to achieve MPC for t < n/2.
Previous Work. In 2006 [1] introduced a key agreement protocol based in group theory (specifically the braid group) that with- stood several attacks over the past decade. First [18] determined that if braids are too short then it’s possible to find the conjugating factor and use that to break the system. However it was pointed out in [12] that in practice the braids are long enough that this attack can never actually succeed. It’s akin to using Fermat to factor short RSA keys, which becomes impractical at “secure” sizes. Second, [14] showed a linear algebra attack (KTT) that would allow an attacker to determine part of the private key data. However, [10] showed that this is just a class of weak keys and by choosing the private key data in a specific way this attack is defeated. More recently [6] built upon the defeated KTT attack, and using all of the public information were able to, after a large precomputation, spend several hours to reconstruct the shared secret. This attack not only required access to the public parameters but also both public keys (including their permutations). It was shown in [2] that the attack work grows as the size of the permutation order grows as well as the size of the braid group. Still, none of these attacks targeted the underlying hard problems in the braid group, or attempted to at- tack the one-way function introduced in [1] called E- Multiplication. Our Contribution This paper introduces the Ironwood meta key agree- ment and authentication protocol whose security is based on hard problems in group theory. Ironwood leverages the one-way function, E-Multiplication, but creates a different construction that removes some of the public information required to mount any of the previous attacks. In addition to being immune from previous attacks, Ironwood is also quantum resistant. Specifically, Shor’s quantum algorithm [20] which has been shown to break RSA, ECC, and sev- eral other public key crypto systems does not seem appli- cable for attacking Ironwood. Further, Xxxxxx’x quantum search algorithm [21] is not as impactful on Ironwood due to the fact that the running time of Ironwood is linear in the key length. This paper first reviews the braid group and colored Xxxxx representation. Next it reviews E-Multiplication, and then introduces the meta key agreement and authen- tication protocol. Following that it introduces Ironwood and presents a security analysis.  1  1 −  t2    −1  . .  , . 1 
Previous Work. In 2006 [1] in joint work with X. Xxxxxx and X. Xxxxxxx two of us (IA and DG) introduced a key agreement protocol based in group theory (specifically the braid group) that has withstood several attacks over the past decade. First Myasnikov–Ushakov [20] determined that if braids are too short then one can find the conjugating factor and use that to break the system. However it was pointed out by one of us (PG) [14] that in practice the braids are long enough that this attack can never succeed: the method in [20] is analogous to using Fermat’s technique to factor short RSA keys, which becomes impractical at secure sizes. Second, Kalka–Xxxxxxx–Tsaban [16] described a linear algebra attack (KTT) that would allow an attacker to determine part of the private key data. However, two of us (DG and PG) [12] showed that this attack succeeds only on a class of weak keys, and that choosing the private key data more carefully defeats this attack. Subsequent to the KTT attack, Xxx-Xxx–Xxxxxxxxx–Tsaban [7], using all of the available public information of the protocol, were able to reconstruct the shared secret, after a large precomputation and several hours of runtime. We later showed [2] that the work necessary to carry out the attack increases as the size of the permutation order grows as well as the size of the braid group. We remark that the current review of WalnutDSA [3], a group theoretic based digital signature, does not apply to the Ironwood protocol. In particular the (exponential) attack on reversing E-multiplication requires data not available to an attacker, and hence the underlying hard problems considered in these approaches do not impact the Ironwood security (see §VI).
Previous Work a cumulative impact assessment (benefits and costs) of the basin countries’ national water resources development plans
Previous Work. Sardar Jangal Block Two xxxxx have been drilled in this block area, that are SRJ-X1 & SRJ-X2 Totally 120 km2 3D seismic data has already been acquired.
AutoNDA by SimpleDocs
Previous Work. We now outline some relevant prior results, including the work of Xxxxxxx [W] and Xxxxx, Xxxxx and Xxxxx [KPW], which are important to the story of the dimension gap problem. Σ We observe that by the Kolmogorov-Sinai theorem, the measure-theoretic en- tropy h(µp) has the simple form h(µp) = − ∞n=1 pn log pn. We define the Lyapunov exponent of an ergodic measure µ (with respect to the map T ) by χ(µ) = ∫ log |T j|dµ which measures the amount of expansion (or contraction) in the system from the point of view of the measure µ. In 1966 Xxxxxx and Xxxxxxx [KP2] first proved that the dimension of any projected Bernoulli measure for the Gauss map was given by the formula dim µp = − ∫Σ∞n=1 pn log pn (3.9) − 2 log xdµp(x) Σ provided that the entropy h(µp) = − ∞n=1 pn log pn < ∞. Notice that is not clear from (3.9) whether or not dim µp is less than 1. (3.9) is now known to be a specific example of the more general result which says that for an ergodic invariant measure with finite entropy we have the following closed-form formula for the dimension, which links the dimension of the measure with the entropy and Xxxxxxxx exponent of the measure (see for instance Theorem 4.4.2 in [MU1]).
Previous Work. Figure 1: First safe gripper design, originating from the SME‐Robot project. The first prototype of a safe gripper design originates from the SME‐Robot project, in which safety tests have been performed using a modified crash test dummy and a light‐weight robot, focusing on blunt impacts and usage of sharp tools. Since the SCHUNK commercial gripper available at that time had several sharp edges and turned out to pose substantial safety risks to the users manually interacting with the robot, a rubber cover has been designed. In this way, a consistent safety level was achieved for the arm and the gripper. However, it quickly turned out that a major drawback for interaction still was the fact that the user had to release the robot during teaching tasks in order to trigger simple actions on a keyboard, such as storing individual robot configurations, starting and stopping trajectory recording or switching between control modes.
Previous Work. This is a continuing annual activity. The 1st, 2nd, and 3rd Quarterly Reimbursement Reports were completed for FY 2020 and submitted go GDOT, ALDOT, and FHWA. The MPO 4th Quarter Reimbursement Report and the Annual MPO Report for FY 2020 was completed in August 2020 and submitted to GDOT and FHWA. The 4th Quarter Reimbursement Request and the Annual MPO Report for XXXXX was completed in November 2020.
Time is Money Join Law Insider Premium to draft better contracts faster.