Secure Multiparty Computations

Size: px
Start display at page:

Download "Secure Multiparty Computations"

Transcription

1 Secure Multiparty Computations CS 6750 Lecture 11 December 3, 2009 Riccardo Pucella

2 The Last Few Lectures... Secret sharing: How to get two or more parties to share a secret in such a way that each individual cannot recover the secret from their share Zero-knowledge protocols: How to get a party to prove to another that she knows a secret without revealing that secret Today: How to compute with secrets

3 Oblivious Transfer Suppose lice has two messages m 0 and m 1 Suppose ob has a bit b (= 0 or 1) ob wants to have m b Constraints: ob does not want lice to know b (Or, equivalently, which m b he wants) lice does not want ob to know both m 0 and m 1

4 1-2 Oblivious Transfer (RS-based version) lice generates an RS key mod N (public e, private d) msgs m 0, m 1 bit b

5 1-2 Oblivious Transfer (RS-based version) lice generates an RS key mod N (public e, private d) msgs m 0, m 1 random x 0, x 1 N, e, x 0, x 1 bit b

6 1-2 Oblivious Transfer (RS-based version) lice generates an RS key mod N (public e, private d) msgs m 0, m 1 random x 0, x 1 N, e, x 0, x 1 q bit b random k q = k e +x b (mod N)

7 1-2 Oblivious Transfer (RS-based version) lice generates an RS key mod N (public e, private d) msgs m 0, m 1 random x 0, x 1 t 0 = m 0 +(q-x 0 ) d t 1 = m 1 +(q-x 1 ) d N, e, x 0, x 1 q t 0, t 1 bit b random k q = k e +x b (mod N)

8 1-2 Oblivious Transfer (RS-based version) lice generates an RS key mod N (public e, private d) msgs m 0, m 1 random x 0, x 1 t 0 = m 0 +(q-x 0 ) d t 1 = m 1 +(q-x 1 ) d N, e, x 0, x 1 q t 0, t 1 bit b random k q = k e +x b (mod N) ob computes t b -k (= m b )

9 1-N Oblivious Transfer lice has N values ob has an index i ob wants to get i-th value without lice learning i lice wants ob to get only one value out of N Related to private information retrieval Part of some databases privacy requirement

10 K-N Oblivious Transfer lice has N values ob wants to get K of those values without lice learning which lice wants ob to get only those K values Two possibilities: messages requested simultaneously (non-adaptive) messages requested sequentially (adaptively) can depend on previous requests

11 The Millionaires Problem (ndrew Yao, 1982) lice and ob are both millionaires lice has I million dollars ob has J million dollars lice and ob both want to know who is richer ut they don t want the other to know how much money they have For simplicity, assume 1 I,J 4

12 The Protocol (RS-based version) lice generates an RS key mod N (public e, private d) I J

13 The Protocol (RS-based version) lice generates an RS key mod N (public e, private d) I N, e J

14 The Protocol (RS-based version) lice generates an RS key mod N (public e, private d) I N, e C-J+1 (mod N) J M-bits random x C = x e (mod N)

15 The Protocol (RS-based version) lice generates an RS key mod N (public e, private d) I M/2-bits random prime P N, e C-J+1 (mod N) P, Z 1,... Z I, Z I+1 +1,..., Z 4 +1 J M-bits random x C = x e (mod N)

16 The Protocol (The RS-based version) lice generates an RS key: N, public e, private d I M/2-bits random prime P N, e C-J+1 (mod N) P, Z 1,... Z I, Z I+1 +1,..., Z 4 +1 Z 1 = (C-J+1) d (mod P) Z 2 = (C-J+2) d (mod P) Z 3 = (C-J+3) d (mod P) Z 4 = (C-J+4) d (mod P) J M-bits random x C = x e (mod N)

17 The Protocol (RS-based version) lice generates an RS key mod N (public e, private d) I M/2-bits random prime P N, e C-J+1 (mod N) P, Z 1,... Z I, Z I+1 +1,..., Z 4 +1 J M-bits random x C = x e (mod N) ob receives P, R 1,...,R 4 : If R J = x mod P then I>=J (o/w I<J)

18 Secure Multiparty Computation Given a publicly known function F of N inputs and producing N outputs F(x 1,...,x n ) = (y 1,...,y n ) Suppose N parties, each party i with a private value a i Goal: compute F(a 1,...,a n ) = (r 1,...,r n ) Each party i wants to know r i No party want others to learn their private value

19 Secure Multiparty Computation Oblivious Transfer as a secure multiparty computation: Function F(<m 0,m 1 >,b) = (nil,m b ) lice has <m 0,m 1 >, ob has b ob wants m b (don t care about what lice wants) Millionaires Problem as a secure multiparty computation: Function F(I,J) = (lice,lice) if I>=J = (ob,ob) if I<J lice has I, ob has J lice and ob want to know who s richer

20 Other Examples Statistical analyses with data stored across multiple databases Each database may be proprietary I.e., models of organic compounds across various biocompanies Elections without a trusted third party Each elector gives his vote as input The function computed is vote tabulation (whatever it is)

Solution: Alice tosses a coin and conveys the result to Bob. Problem: Alice can choose any result.

Solution: Alice tosses a coin and conveys the result to Bob. Problem: Alice can choose any result. Example - Coin Toss Coin Toss: Alice and Bob want to toss a coin. Easy to do when they are in the same room. How can they toss a coin over the phone? Mutual Commitments Solution: Alice tosses a coin and

More information

Cryptography CS 555. Topic 20: Other Public Key Encryption Schemes. CS555 Topic 20 1

Cryptography CS 555. Topic 20: Other Public Key Encryption Schemes. CS555 Topic 20 1 Cryptography CS 555 Topic 20: Other Public Key Encryption Schemes Topic 20 1 Outline and Readings Outline Quadratic Residue Rabin encryption Goldwasser-Micali Commutative encryption Homomorphic encryption

More information

Secure Distributed Computation on Private Inputs

Secure Distributed Computation on Private Inputs Secure Distributed Computation on Private Inputs David Pointcheval ENS - CNRS - INRIA Foundations & Practice of Security Clermont-Ferrand, France - October 27th, 2015 The Cloud David Pointcheval Introduction

More information

Classical Cryptography

Classical Cryptography Classical Cryptography CS 6750 Lecture 1 September 10, 2009 Riccardo Pucella Goals of Classical Cryptography Alice wants to send message X to Bob Oscar is on the wire, listening to all communications Alice

More information

Juan Garay (Yahoo Labs) Clint Givens (Maine School of Science and Mathematics) Rafail Ostrovsky (UCLA) Pavel Raykov (ETH)

Juan Garay (Yahoo Labs) Clint Givens (Maine School of Science and Mathematics) Rafail Ostrovsky (UCLA) Pavel Raykov (ETH) Broadcast (and Round) Efficient Secure Multiparty Computation Juan Garay (Yahoo Labs) Clint Givens (Maine School of Science and Mathematics) Rafail Ostrovsky (UCLA) Pavel Raykov (ETH) Secure Multiparty

More information

Lecture 28: Applications of Crypto Protocols

Lecture 28: Applications of Crypto Protocols U.C. Berkeley Lecture 28 CS276: Cryptography April 27, 2006 Professor David Wagner Scribe: Scott Monasch Lecture 28: Applications of Crypto Protocols 1 Electronic Payment Protocols For this section we

More information

The number theory behind cryptography

The number theory behind cryptography The University of Vermont May 16, 2017 What is cryptography? Cryptography is the practice and study of techniques for secure communication in the presence of adverse third parties. What is cryptography?

More information

Chapter 3 LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS

Chapter 3 LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS 44 Chapter 3 LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS 45 CHAPTER 3 Chapter 3: LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING

More information

Lecture 5: Subgame Perfect Equilibrium. November 1, 2006

Lecture 5: Subgame Perfect Equilibrium. November 1, 2006 Lecture 5: Subgame Perfect Equilibrium November 1, 2006 Osborne: ch 7 How do we analyze extensive form games where there are simultaneous moves? Example: Stage 1. Player 1 chooses between fin,outg If OUT,

More information

Note Computations with a deck of cards

Note Computations with a deck of cards Theoretical Computer Science 259 (2001) 671 678 www.elsevier.com/locate/tcs Note Computations with a deck of cards Anton Stiglic Zero-Knowledge Systems Inc, 888 de Maisonneuve East, 6th Floor, Montreal,

More information

Secure multiparty computation without one-way functions

Secure multiparty computation without one-way functions Secure multiparty computation without one-way functions Dima Grigoriev CNRS, Mathématiques, Université de Lille 59655, Villeneuve d Ascq, France dmitry.grigoryev@math.univ-lille1.fr Vladimir Shpilrain

More information

Ad Hoc Networks - Routing and Security Issues

Ad Hoc Networks - Routing and Security Issues Ad Hoc Networks - Routing and Security Issues Mahalingam Ramkumar Mississippi State University, MS January 25, 2005 1 2 Some Basic Terms Basic Terms Ad Hoc vs Infrastructured AHN MANET (Mobile Ad hoc NETwork)

More information

Public Key Cryptography Great Ideas in Theoretical Computer Science Saarland University, Summer 2014

Public Key Cryptography Great Ideas in Theoretical Computer Science Saarland University, Summer 2014 7 Public Key Cryptography Great Ideas in Theoretical Computer Science Saarland University, Summer 2014 Cryptography studies techniques for secure communication in the presence of third parties. A typical

More information

TMA4155 Cryptography, Intro

TMA4155 Cryptography, Intro Trondheim, December 12, 2006. TMA4155 Cryptography, Intro 2006-12-02 Problem 1 a. We need to find an inverse of 403 modulo (19 1)(31 1) = 540: 540 = 1 403 + 137 = 17 403 50 540 + 50 403 = 67 403 50 540

More information

Lecture 6: Basics of Game Theory

Lecture 6: Basics of Game Theory 0368.4170: Cryptography and Game Theory Ran Canetti and Alon Rosen Lecture 6: Basics of Game Theory 25 November 2009 Fall 2009 Scribes: D. Teshler Lecture Overview 1. What is a Game? 2. Solution Concepts:

More information

Cryptography Math 1580 Silverman First Hour Exam Mon Oct 2, 2017

Cryptography Math 1580 Silverman First Hour Exam Mon Oct 2, 2017 Name: Cryptography Math 1580 Silverman First Hour Exam Mon Oct 2, 2017 INSTRUCTIONS Read Carefully Time: 50 minutes There are 5 problems. Write your name legibly at the top of this page. No calculators

More information

Fair tracing based on VSS and blind signature without Trustees

Fair tracing based on VSS and blind signature without Trustees Fair tracing based on VSS and blind signature without Trustees ByeongGon Kim SungJun Min Kwangjo Kim International Research center for Information Security (IRIS) Information and Communications Univ.(ICU),

More information

Application: Public Key Cryptography. Public Key Cryptography

Application: Public Key Cryptography. Public Key Cryptography Application: Public Key Cryptography Suppose I wanted people to send me secret messages by snail mail Method 0. I send a padlock, that only I have the key to, to everyone who might want to send me a message.

More information

Alternative Mining Puzzles. Puzzles (recap)

Alternative Mining Puzzles. Puzzles (recap) Essential Puzzle Requirements ASIC-Resistant Puzzles Proof-of-Useful-Work Non-outsourceable Puzzles Proof-of-Stake Virtual Mining Puzzles (recap) Incentive system steers participants Basic features of

More information

The Chinese Remainder Theorem

The Chinese Remainder Theorem The Chinese Remainder Theorem Theorem. Let n 1,..., n r be r positive integers relatively prime in pairs. (That is, gcd(n i, n j ) = 1 whenever 1 i < j r.) Let a 1,..., a r be any r integers. Then the

More information

Discrete Mathematics & Mathematical Reasoning Multiplicative Inverses and Some Cryptography

Discrete Mathematics & Mathematical Reasoning Multiplicative Inverses and Some Cryptography Discrete Mathematics & Mathematical Reasoning Multiplicative Inverses and Some Cryptography Colin Stirling Informatics Some slides based on ones by Myrto Arapinis Colin Stirling (Informatics) Discrete

More information

Linear Congruences. The solutions to a linear congruence ax b (mod m) are all integers x that satisfy the congruence.

Linear Congruences. The solutions to a linear congruence ax b (mod m) are all integers x that satisfy the congruence. Section 4.4 Linear Congruences Definition: A congruence of the form ax b (mod m), where m is a positive integer, a and b are integers, and x is a variable, is called a linear congruence. The solutions

More information

Five-Card Secure Computations Using Unequal Division Shuffle

Five-Card Secure Computations Using Unequal Division Shuffle Five-Card Secure Computations Using Unequal Division Shuffle Akihiro Nishimura, Takuya Nishida, Yu-ichi Hayashi, Takaaki Mizuki, and Hideaki Sone Sone-Mizuki Lab., Graduate School of Information Sciences,

More information

Lecture 39: GMW Protocol GMW

Lecture 39: GMW Protocol GMW Lecture 39: Protocol Recall Last lecture we saw that we can securely compute any function using oblivious transfer (which can be constructed from the RSA assumption) However, the protocol is efficient

More information

Diffie-Hellman key-exchange protocol

Diffie-Hellman key-exchange protocol Diffie-Hellman key-exchange protocol This protocol allows two users to choose a common secret key, for DES or AES, say, while communicating over an insecure channel (with eavesdroppers). The two users

More information

CS 261 Notes: Zerocash

CS 261 Notes: Zerocash CS 261 Notes: Zerocash Scribe: Lynn Chua September 19, 2018 1 Introduction Zerocash is a cryptocurrency which allows users to pay each other directly, without revealing any information about the parties

More information

Game Theory and Algorithms Lecture 3: Weak Dominance and Truthfulness

Game Theory and Algorithms Lecture 3: Weak Dominance and Truthfulness Game Theory and Algorithms Lecture 3: Weak Dominance and Truthfulness March 1, 2011 Summary: We introduce the notion of a (weakly) dominant strategy: one which is always a best response, no matter what

More information

ECON 282 Final Practice Problems

ECON 282 Final Practice Problems ECON 282 Final Practice Problems S. Lu Multiple Choice Questions Note: The presence of these practice questions does not imply that there will be any multiple choice questions on the final exam. 1. How

More information

Efficient Privacy-Preserving Biometric Identification

Efficient Privacy-Preserving Biometric Identification Efficient Privacy-Preserving Biometric Identification Yan Huang Lior Malka David Evans Jonathan Katz http://www.mightbeevil.org/secure-biometrics/ Feb 9, 2011 Motivating Scenario: Private No-Fly Checking

More information

Rich Dad's Retire Young, Retire Rich By Kiyosaki READ ONLINE

Rich Dad's Retire Young, Retire Rich By Kiyosaki READ ONLINE Rich Dad's Retire Young, Retire Rich By Kiyosaki READ ONLINE Alibris has new & used books by Robert T. Kiyosaki, including hardcovers, Add $39+ into your cart and your items ship for free! Rich Dad's Retire

More information

arxiv:cs/ v1 [cs.gt] 7 Sep 2006

arxiv:cs/ v1 [cs.gt] 7 Sep 2006 Rational Secret Sharing and Multiparty Computation: Extended Abstract Joseph Halpern Department of Computer Science Cornell University Ithaca, NY 14853 halpern@cs.cornell.edu Vanessa Teague Department

More information

Mobile & Wireless Networking. Lecture 4: Cellular Concepts & Dealing with Mobility. [Reader, Part 3 & 4]

Mobile & Wireless Networking. Lecture 4: Cellular Concepts & Dealing with Mobility. [Reader, Part 3 & 4] 192620010 Mobile & Wireless Networking Lecture 4: Cellular Concepts & Dealing with Mobility [Reader, Part 3 & 4] Geert Heijenk Outline of Lecture 4 Cellular Concepts q Introduction q Cell layout q Interference

More information

Algorithmic Number Theory and Cryptography (CS 303)

Algorithmic Number Theory and Cryptography (CS 303) Algorithmic Number Theory and Cryptography (CS 303) Modular Arithmetic and the RSA Public Key Cryptosystem Jeremy R. Johnson 1 Introduction Objective: To understand what a public key cryptosystem is and

More information

Privacy-Preserving Collaborative Recommendation Systems Based on the Scalar Product

Privacy-Preserving Collaborative Recommendation Systems Based on the Scalar Product Privacy-Preserving Collaborative Recommendation Systems Based on the Scalar Product Justin Zhan I-Cheng Wang Abstract In the e-commerce era, recommendation systems were introduced to share customer experience

More information

Math 152: Applicable Mathematics and Computing

Math 152: Applicable Mathematics and Computing Math 152: Applicable Mathematics and Computing April 16, 2017 April 16, 2017 1 / 17 Announcements Please bring a blue book for the midterm on Friday. Some students will be taking the exam in Center 201,

More information

Pseudorandom Number Generation and Stream Ciphers

Pseudorandom Number Generation and Stream Ciphers Pseudorandom Number Generation and Stream Ciphers Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/

More information

Public Key Cryptography

Public Key Cryptography Public Key Cryptography How mathematics allows us to send our most secret messages quite openly without revealing their contents - except only to those who are supposed to read them The mathematical ideas

More information

Mathematics Explorers Club Fall 2012 Number Theory and Cryptography

Mathematics Explorers Club Fall 2012 Number Theory and Cryptography Mathematics Explorers Club Fall 2012 Number Theory and Cryptography Chapter 0: Introduction Number Theory enjoys a very long history in short, number theory is a study of integers. Mathematicians over

More information

LECTURE 7: POLYNOMIAL CONGRUENCES TO PRIME POWER MODULI

LECTURE 7: POLYNOMIAL CONGRUENCES TO PRIME POWER MODULI LECTURE 7: POLYNOMIAL CONGRUENCES TO PRIME POWER MODULI 1. Hensel Lemma for nonsingular solutions Although there is no analogue of Lagrange s Theorem for prime power moduli, there is an algorithm for determining

More information

Topic 1: defining games and strategies. SF2972: Game theory. Not allowed: Extensive form game: formal definition

Topic 1: defining games and strategies. SF2972: Game theory. Not allowed: Extensive form game: formal definition SF2972: Game theory Mark Voorneveld, mark.voorneveld@hhs.se Topic 1: defining games and strategies Drawing a game tree is usually the most informative way to represent an extensive form game. Here is one

More information

Assignment 2. Due: Monday Oct. 15, :59pm

Assignment 2. Due: Monday Oct. 15, :59pm Introduction To Discrete Math Due: Monday Oct. 15, 2012. 11:59pm Assignment 2 Instructor: Mohamed Omar Math 6a For all problems on assignments, you are allowed to use the textbook, class notes, and other

More information

How to Use Bitcoin to Play Decentralized Poker

How to Use Bitcoin to Play Decentralized Poker How to Use Bitcoin to Play Decentralized Poker Iddo Bentov Ranjit Kumaresan Tal Moran Technion MIT IDC GTACS January 8, 2015 Secure multiparty computation (MPC) / secure function evaluation (SFE) Parties

More information

The Chinese Remainder Theorem

The Chinese Remainder Theorem The Chinese Remainder Theorem Theorem. Let m and n be two relatively prime positive integers. Let a and b be any two integers. Then the two congruences x a (mod m) x b (mod n) have common solutions. Any

More information

Random Bit Generation and Stream Ciphers

Random Bit Generation and Stream Ciphers Random Bit Generation and Stream Ciphers Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: 8-1 Overview 1.

More information

CS 621 Mobile Computing

CS 621 Mobile Computing Lecture 11 CS 621 Mobile Computing Location Management for Mobile Cellular Systems Zubin Bhuyan, Department of CSE, Tezpur University http://www.tezu.ernet.in/~zubin Several slides and images in this presentation

More information

Selective Families, Superimposed Codes and Broadcasting on Unknown Radio Networks. Andrea E.F. Clementi Angelo Monti Riccardo Silvestri

Selective Families, Superimposed Codes and Broadcasting on Unknown Radio Networks. Andrea E.F. Clementi Angelo Monti Riccardo Silvestri Selective Families, Superimposed Codes and Broadcasting on Unknown Radio Networks Andrea E.F. Clementi Angelo Monti Riccardo Silvestri Introduction A radio network is a set of radio stations that are able

More information

The Use of Commercial Databases for National Security: Privacy, Evaluation, and Accuracy

The Use of Commercial Databases for National Security: Privacy, Evaluation, and Accuracy The Use of Commercial Databases for National Security: Privacy, Evaluation, and Accuracy Rebecca Wright Computer Science Department Stevens Institute of Technology www.cs.stevens.edu/~rwright National

More information

Introduction to Cryptography CS 355

Introduction to Cryptography CS 355 Introduction to Cryptography CS 355 Lecture 25 Mental Poker And Semantic Security CS 355 Fall 2005 / Lecture 25 1 Lecture Outline Review of number theory The Mental Poker Protocol Semantic security Semantic

More information

MA/CSSE 473 Day 9. The algorithm (modified) N 1

MA/CSSE 473 Day 9. The algorithm (modified) N 1 MA/CSSE 473 Day 9 Primality Testing Encryption Intro The algorithm (modified) To test N for primality Pick positive integers a 1, a 2,, a k < N at random For each a i, check for a N 1 i 1 (mod N) Use the

More information

B. Substitution Ciphers, continued. 3. Polyalphabetic: Use multiple maps from the plaintext alphabet to the ciphertext alphabet.

B. Substitution Ciphers, continued. 3. Polyalphabetic: Use multiple maps from the plaintext alphabet to the ciphertext alphabet. B. Substitution Ciphers, continued 3. Polyalphabetic: Use multiple maps from the plaintext alphabet to the ciphertext alphabet. Non-periodic case: Running key substitution ciphers use a known text (in

More information

census 2016: count yourself in

census 2016: count yourself in On May 10, all Canadians will be asked to count themselves in. That includes YOU, so expect your family to get a letter from Statistics Canada. It will be all about the 2016 Census of Population. What

More information

Design and Analysis of Information Systems Topics in Advanced Theoretical Computer Science. Autumn-Winter 2011

Design and Analysis of Information Systems Topics in Advanced Theoretical Computer Science. Autumn-Winter 2011 Design and Analysis of Information Systems Topics in Advanced Theoretical Computer Science Autumn-Winter 2011 Purpose of the lecture Design of information systems Statistics Database management and query

More information

Math 232. Calculus III Limits and Continuity. Updated: January 13, 2016 Calculus III Section 14.2

Math 232. Calculus III Limits and Continuity. Updated: January 13, 2016 Calculus III Section 14.2 Math 232 Calculus III Brian Veitch Fall 2015 Northern Illinois University 14.2 Limits and Continuity In this section our goal is to evaluate its of the form f(x, y) = L Let s take a look back at its in

More information

p 1 MAX(a,b) + MIN(a,b) = a+b n m means that m is a an integer multiple of n. Greatest Common Divisor: We say that n divides m.

p 1 MAX(a,b) + MIN(a,b) = a+b n m means that m is a an integer multiple of n. Greatest Common Divisor: We say that n divides m. Great Theoretical Ideas In Computer Science Steven Rudich CS - Spring Lecture Feb, Carnegie Mellon University Modular Arithmetic and the RSA Cryptosystem p- p MAX(a,b) + MIN(a,b) = a+b n m means that m

More information

MOBILE COMPUTING NIT Agartala, Dept of CSE Jan-May,2012

MOBILE COMPUTING NIT Agartala, Dept of CSE Jan-May,2012 Location Management for Mobile Cellular Systems MOBILE COMPUTING NIT Agartala, Dept of CSE Jan-May,2012 ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala Email-alakroy.nerist@gmail.com Cellular System

More information

SOLUTIONS FOR PROBLEM SET 4

SOLUTIONS FOR PROBLEM SET 4 SOLUTIONS FOR PROBLEM SET 4 A. A certain integer a gives a remainder of 1 when divided by 2. What can you say about the remainder that a gives when divided by 8? SOLUTION. Let r be the remainder that a

More information

Public Key Encryption

Public Key Encryption Math 210 Jerry L. Kazdan Public Key Encryption The essence of this procedure is that as far as we currently know, it is difficult to factor a number that is the product of two primes each having many,

More information

Simple And Efficient Shuffling With Provable Correctness and ZK Privacy

Simple And Efficient Shuffling With Provable Correctness and ZK Privacy Simple And Efficient Shuffling With Provable Correctness and ZK Privacy Kun Peng, Colin Boyd and Ed Dawson Information Security Institute Queensland University of Technology {k.peng, c.boyd, e.dawson}@qut.edu.au

More information

The computer can outperform human beings in speed, memory, repetition and accuracy.

The computer can outperform human beings in speed, memory, repetition and accuracy. Lecture 10 Limitations of Computing & Ethical Issues The computer can outperform human beings in speed, memory, repetition and accuracy. A computer can process data faster than any other machine designed

More information

Secure Function Evaluation

Secure Function Evaluation Secure Function Evaluation 1) Use cryptography to securely compute a function/program. 2) Secure means a) Participant s inputs stay secret even though they are used in the computation. b) No participant

More information

Public-key Cryptography: Theory and Practice

Public-key Cryptography: Theory and Practice Public-key Cryptography Theory and Practice Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Chapter 5: Cryptographic Algorithms Common Encryption Algorithms RSA

More information

Final exam. Question Points Score. Total: 150

Final exam. Question Points Score. Total: 150 MATH 11200/20 Final exam DECEMBER 9, 2016 ALAN CHANG Please present your solutions clearly and in an organized way Answer the questions in the space provided on the question sheets If you run out of room

More information

Game Theory and Randomized Algorithms

Game Theory and Randomized Algorithms Game Theory and Randomized Algorithms Guy Aridor Game theory is a set of tools that allow us to understand how decisionmakers interact with each other. It has practical applications in economics, international

More information

LECTURE NOTES ON SUBLIMINAL CHANNEL & COMMUNICATION SYSTEM

LECTURE NOTES ON SUBLIMINAL CHANNEL & COMMUNICATION SYSTEM Department of Software The University of Babylon LECTURE NOTES ON SUBLIMINAL CHANNEL & COMMUNICATION SYSTEM By Dr. Samaher Hussein Ali College of Information Technology, University of Babylon, Iraq Samaher_hussein@yahoo.com

More information

Cryptography. 2. decoding is extremely difficult (for protection against eavesdroppers);

Cryptography. 2. decoding is extremely difficult (for protection against eavesdroppers); 18.310 lecture notes September 2, 2013 Cryptography Lecturer: Michel Goemans 1 Public Key Cryptosystems In these notes, we will be concerned with constructing secret codes. A sender would like to encrypt

More information

MATH Probability Study Guide Exam not valid for Paper Pencil Test Sessions

MATH Probability Study Guide Exam not valid for Paper Pencil Test Sessions MATH-.1 Probability Study Guide Exam not valid for Paper Pencil Test Sessions [Exam ID:14919T 1 Johnny is doing a science experiment. During his experiment, Johnny flips a coin and records the temperature

More information

Enhanced Efficient Halftoning Technique used in Embedded Extended Visual Cryptography Strategy for Effective Processing

Enhanced Efficient Halftoning Technique used in Embedded Extended Visual Cryptography Strategy for Effective Processing Enhanced Efficient Halftoning Technique used in Embedded Extended Visual Cryptography Strategy for Effective Processing M.Desiha Department of Computer Science and Engineering, Jansons Institute of Technology

More information

Computer Science: A new way to think. COS 116, Spring 2012 Adam Finkelstein

Computer Science: A new way to think. COS 116, Spring 2012 Adam Finkelstein Computer Science: A new way to think COS 116, Spring 2012 Adam Finkelstein Computer science is no more about computers than astronomy is about telescopes. Edsger Dijkstra. Today: Computer science ideas

More information

Fundamentals of telecommunications. Ermanno Pietrosemoli Marco Zennaro

Fundamentals of telecommunications. Ermanno Pietrosemoli Marco Zennaro Fundamentals of telecommunications Ermanno Pietrosemoli Marco Zennaro Goals To present the basics concepts of telecommunication systems with focus on digital and wireless 2 Basic Concepts Signal Analog,

More information

SMT 2013 Advanced Topics Test Solutions February 2, 2013

SMT 2013 Advanced Topics Test Solutions February 2, 2013 1. How many positive three-digit integers a c can represent a valid date in 2013, where either a corresponds to a month and c corresponds to the day in that month, or a corresponds to a month and c corresponds

More information

Multi-level Arc Fault Circuit Interrupter with Collaborative Communications for Smart Grid

Multi-level Arc Fault Circuit Interrupter with Collaborative Communications for Smart Grid Multi-level Arc Fault Circuit Interrupter with Collaborative Communications for Smart Grid HyungSeok Kim, SeongWoo Kim, GiPoong Gwon, DongRyul Lee, and SeungWoo Seo Department of Electrical Engineering

More information

Cryptanalysis on short messages encrypted with M-138 cipher machine

Cryptanalysis on short messages encrypted with M-138 cipher machine Cryptanalysis on short messages encrypted with M-138 cipher machine Tsonka Baicheva Miroslav Dimitrov Institute of Mathematics and Informatics Bulgarian Academy of Sciences 10-14 July, 2017 Sofia Introduction

More information

Dollar Board $1.00. Copyright 2011 by KP Mathematics

Dollar Board $1.00. Copyright 2011 by KP Mathematics Dollar Board $1.00 Cut out quarters on the dotted lines. $.25 $.25 $.25 $.25 Cut out dimes on the dotted lines. $.10 $.10 $.10 $.10 $.10 $.10 $.10 $.10 $.10 $.10 Cut out nickels on the dotted lines. $.05

More information

Math 319 Problem Set #7 Solution 18 April 2002

Math 319 Problem Set #7 Solution 18 April 2002 Math 319 Problem Set #7 Solution 18 April 2002 1. ( 2.4, problem 9) Show that if x 2 1 (mod m) and x / ±1 (mod m) then 1 < (x 1, m) < m and 1 < (x + 1, m) < m. Proof: From x 2 1 (mod m) we get m (x 2 1).

More information

(a) Left Right (b) Left Right. Up Up 5-4. Row Down 0-5 Row Down 1 2. (c) B1 B2 (d) B1 B2 A1 4, 2-5, 6 A1 3, 2 0, 1

(a) Left Right (b) Left Right. Up Up 5-4. Row Down 0-5 Row Down 1 2. (c) B1 B2 (d) B1 B2 A1 4, 2-5, 6 A1 3, 2 0, 1 Economics 109 Practice Problems 2, Vincent Crawford, Spring 2002 In addition to these problems and those in Practice Problems 1 and the midterm, you may find the problems in Dixit and Skeath, Games of

More information

University of Nevada Reno. A Computer Analysis of Hit Frequency For a Complex Video Gaming Machine

University of Nevada Reno. A Computer Analysis of Hit Frequency For a Complex Video Gaming Machine University of Nevada Reno A Computer Analysis of Hit Frequency For a Complex Video Gaming Machine A professional paper submitted in partial fulfillment of the requirements for the degree of Master of Science

More information

Implementation and Performance Testing of the SQUASH RFID Authentication Protocol

Implementation and Performance Testing of the SQUASH RFID Authentication Protocol Implementation and Performance Testing of the SQUASH RFID Authentication Protocol Philip Koshy, Justin Valentin and Xiaowen Zhang * Department of Computer Science College of n Island n Island, New York,

More information

Merkle s Puzzles. c Eli Biham - May 3, Merkle s Puzzles (8)

Merkle s Puzzles. c Eli Biham - May 3, Merkle s Puzzles (8) Merkle s Puzzles See: Merkle, Secrecy, Authentication, and Public Key Systems, UMI Research press, 1982 Merkle, Secure Communications Over Insecure Channels, CACM, Vol. 21, No. 4, pp. 294-299, April 1978

More information

MAT 302: ALGEBRAIC CRYPTOGRAPHY. Department of Mathematical and Computational Sciences University of Toronto, Mississauga.

MAT 302: ALGEBRAIC CRYPTOGRAPHY. Department of Mathematical and Computational Sciences University of Toronto, Mississauga. MAT 302: ALGEBRAIC CRYPTOGRAPHY Department of Mathematical and Computational Sciences University of Toronto, Mississauga February 27, 2013 Mid-term Exam INSTRUCTIONS: The duration of the exam is 100 minutes.

More information

PIVX Zerocoin (zpiv) Technical Paper

PIVX Zerocoin (zpiv) Technical Paper PIVX Zerocoin (zpiv) Technical Paper Revision 0.9 Last updated October 16 2017 PIVX OVERVIEW PIVX is a Bitcoin-based community-centric cryptocurrency with a focus on decentralization, privacy, and real-world

More information

Determining Radio Frequency (RF) Coverage for Criminal and Civil Legal Cases

Determining Radio Frequency (RF) Coverage for Criminal and Civil Legal Cases Determining Radio Frequency (RF) Coverage for Criminal and Civil Legal Cases Introduction Both criminal and civil cases use certain techniques to determine whether a mobile phone was either in or not in

More information

Multiple Integrals. Advanced Calculus. Lecture 1 Dr. Lahcen Laayouni. Department of Mathematics and Statistics McGill University.

Multiple Integrals. Advanced Calculus. Lecture 1 Dr. Lahcen Laayouni. Department of Mathematics and Statistics McGill University. Lecture epartment of Mathematics and Statistics McGill University January 4, 27 ouble integrals Iteration of double integrals ouble integrals Consider a function f(x, y), defined over a rectangle = [a,

More information

Reversible Data Hiding in Encrypted color images by Reserving Room before Encryption with LSB Method

Reversible Data Hiding in Encrypted color images by Reserving Room before Encryption with LSB Method ISSN (e): 2250 3005 Vol, 04 Issue, 10 October 2014 International Journal of Computational Engineering Research (IJCER) Reversible Data Hiding in Encrypted color images by Reserving Room before Encryption

More information

Abstracts. Cryptography, Cyber Security and Information Warfare. (3rd CryCybIW) 3 rd International Conference on. Hellenic Military Academy

Abstracts. Cryptography, Cyber Security and Information Warfare. (3rd CryCybIW) 3 rd International Conference on. Hellenic Military Academy 3 rd International Conference on Cryptography, Cyber Security and Information Warfare (3rd CryCybIW) 26 th -27 th May 2016 Abstracts Editor: Nicholas J. Daras 2 Cryptographic Techniques for Secure Linear

More information

Modular arithmetic Math 2320

Modular arithmetic Math 2320 Modular arithmetic Math 220 Fix an integer m 2, called the modulus. For any other integer a, we can use the division algorithm to write a = qm + r. The reduction of a modulo m is the remainder r resulting

More information

Wireless Network Security Spring 2014

Wireless Network Security Spring 2014 Wireless Network Security 14-814 Spring 2014 Patrick Tague Class #5 Jamming 2014 Patrick Tague 1 Travel to Pgh: Announcements I'll be on the other side of the camera on Feb 4 Let me know if you'd like

More information

Sheet 1: Introduction to prime numbers.

Sheet 1: Introduction to prime numbers. Option A Hand in at least one question from at least three sheets Sheet 1: Introduction to prime numbers. [provisional date for handing in: class 2.] 1. Use Sieve of Eratosthenes to find all prime numbers

More information

But Wait, There s More! By Jay Cormier and Sen-Foong Lim

But Wait, There s More! By Jay Cormier and Sen-Foong Lim But Wait, There s Rules! A game for 3 or more players where the perfect pitch will win the prize! Components 90 x Item Cards (pages 1-5. Tip: print on different coloured paper than the Benefit Cards) 108

More information

Lecture 4: Wireless Physical Layer: Channel Coding. Mythili Vutukuru CS 653 Spring 2014 Jan 16, Thursday

Lecture 4: Wireless Physical Layer: Channel Coding. Mythili Vutukuru CS 653 Spring 2014 Jan 16, Thursday Lecture 4: Wireless Physical Layer: Channel Coding Mythili Vutukuru CS 653 Spring 2014 Jan 16, Thursday Channel Coding Modulated waveforms disrupted by signal propagation through wireless channel leads

More information

Zero- Knowledge Proofs in Anonymous Creden6al Systems. Gergely Alpár October 21, 2011

Zero- Knowledge Proofs in Anonymous Creden6al Systems. Gergely Alpár October 21, 2011 Zero- Knowledge Proofs in Anonymous Creden6al Systems Gergely Alpár October 21, 2011 Waldo Source: findwaldo.com // Department Store Idea: Moni Naor et al. How to Convince your children you are not chea6ng,

More information

SMT 2014 Advanced Topics Test Solutions February 15, 2014

SMT 2014 Advanced Topics Test Solutions February 15, 2014 1. David flips a fair coin five times. Compute the probability that the fourth coin flip is the first coin flip that lands heads. 1 Answer: 16 ( ) 1 4 Solution: David must flip three tails, then heads.

More information

Social Studies 201 Notes for November 8, 2006 Sampling distributions Rest of semester For the remainder of the semester, we will be studying and

Social Studies 201 Notes for November 8, 2006 Sampling distributions Rest of semester For the remainder of the semester, we will be studying and 1 Social Studies 201 Notes for November 8, 2006 Sampling distributions Rest of semester For the remainder of the semester, we will be studying and working with inferential statistics estimation and hypothesis

More information

4.12 Practice problems

4.12 Practice problems 4. Practice problems In this section we will try to apply the concepts from the previous few sections to solve some problems. Example 4.7. When flipped a coin comes up heads with probability p and tails

More information

Mauritius. Area: 2,040 km² Population: 1.3 million Capital: Port Louis

Mauritius. Area: 2,040 km² Population: 1.3 million Capital: Port Louis INNOVATIONS IN LINKING CIVIL REGISTRATION AND VITAL STATISTICS TO IDENTITY MANAGEMENT SYSTEMS & 10 MILESTONES ALLOWING MAUTITIUS TO REPORT MORTALITY STATISTICS TO W.H.O SINCE 1957 William M. Ayelou, Registrar

More information

How to carbon date digital information! Jeremy Clark

How to carbon date digital information! Jeremy Clark How to carbon date digital information! Jeremy Clark Time Mar 2012 2 Notify Vendors Time Mar 2012 3 Notify Vendors Time Mar 2012 Mar 2013 4 Time Mar 2012 Mar 2013 5 Time Mar 2012 Feb 2013 Mar 2013 6 Time

More information

Asymptotically Optimal Two-Round Perfectly Secure Message Transmission

Asymptotically Optimal Two-Round Perfectly Secure Message Transmission Asymptotically Optimal Two-Round Perfectly Secure Message Transmission Saurabh Agarwal 1, Ronald Cramer 2 and Robbert de Haan 3 1 Basic Research in Computer Science (http://www.brics.dk), funded by Danish

More information

Digital Television Lecture 5

Digital Television Lecture 5 Digital Television Lecture 5 Forward Error Correction (FEC) Åbo Akademi University Domkyrkotorget 5 Åbo 8.4. Error Correction in Transmissions Need for error correction in transmissions Loss of data during

More information

Fermat s little theorem. RSA.

Fermat s little theorem. RSA. .. Computing large numbers modulo n (a) In modulo arithmetic, you can always reduce a large number to its remainder a a rem n (mod n). (b) Addition, subtraction, and multiplication preserve congruence:

More information

G53CLP Constraint Logic Programming

G53CLP Constraint Logic Programming G53CLP Constraint Logic Programming Dr Rong Qu Modeling CSPs Case Study I Constraint Programming... represents one of the closest approaches computer science has yet made to the Holy Grail of programming:

More information

R&D Meets Production: The Dark Side

R&D Meets Production: The Dark Side R&D Meets Production: The Dark Side J.P.Lewis zilla@computer.org Disney The Secret Lab Disney/Lewis: R&D Production The Dark Side p.1/46 R&D Production Issues R&D Production interaction is not always easy.

More information