Random Block Verification: Improving the Norwegian Electoral Mix Net

Size: px
Start display at page:

Download "Random Block Verification: Improving the Norwegian Electoral Mix Net"

Transcription

1 Radom Block Verificatio: Improvig the Norwegia Electoral Mix Net Deise Demirel 1,2, Hugo Joker 3, Melaie Volkamer 1,2 1 CASED, Darmstadt 2 SeCuSo group, TU Darmstadt 3 SaToSS group, Uiversity of Luxembourg Abstract. The VALG project is itroducig evotig for muicipal ad couty electios to Norway. Part of the evotig system is a mix et alog the lies of Puiggalí et al. a mix et which ca be efficietly verified by combiig the beefits of optimistic mixig ad radomized partial checkig. This paper ivestigates their mix et ad proposes a verificatio method which improves both efficiecy ad privacy compared to Puiggalí et al.. 1 Itroductio To esure aoymity, evotig systems eed to icorporate a mechaism to break the lik betwee voter ad cast vote. Oe popular method is the use of mix ets [2], which shuffle the list of ecrypted votes while chagig the appearace of the ciphertexts ad keepig the used permutatio secret. To reduce the trust assumptio, uiversally verifiable mix ets have bee developed [15, 4, 19, 13, 10]. I votig, efficiecy is a prime cocer. To be usable i practice, a mix et should be able to mix all votes ad prove correctess withi a few hours after the pollig statios closed. Attempts at efficiecy improvemet did ot raise the bar sufficietly for such a demadig task. Two separate directios i verificatio sought to address this: Optimistic Mixig (OM, [9]) ad Radomized Partial Checkig (RPC, [12]). Ituitively, OM achieves its speed-up of verificatio by provig correct mixig for the whole group of iputs: the mix proves that the product of the iput ciphertexts is equal to the product of the output ciphertexts (see Figure 1a). While more efficiet (oly oe proof is eeded, istead of oe per iput), some fraud is ot detected (ituitively, 4 6 = 3 8). The proposal by Golle et al. [9] uses double ecryptio ad a cryptographic checksum to prevet this attack, however, Wikström idetified [18] multiple fatal flaws i their particular desig. Aother optimistic approach by Boeh ad Golle, Proof of Subproduct (PoS, [1]), is slightly faster as it does ot use a cryptographic checksum or double ecryptio. A drawback of this approach is that the verificatio oly guaratees almost etirely correct mixig. Boeh et al. recommed the use of a slower verificatio protocol i parallel to guaratee correctess. RPC lets each mix ode first produce a itermediate shuffle, ad the shuffle agai to produce the fial result. For each elemet of the itermediate result,

2 2 a) Optimistic mixig b) Radomized partial checkig Fig. 1. Two approaches to tradig verificatio for efficiecy i mix ets a coi is flipped to reveal the lik to either its correspodig iput (heads) or output (tails) elemet (see Figure 1b). This approach does t require ay proof (just revealig half the reradomizatio values used), but there s a 50% chace per elemet for the mix to cheat udetected. Puiggalí et al. combied the advatages of OM ad RPC to arrive at a mix et desig that improves upo privacy ad verifiability while retaiig efficiecy. Their work was icorporated ito the Norwegia Evote Project 4 ad used for a limited umber of muicipality electios i Norway. I the recet past, advaces have bee made i efficiet provably secure mixig (e.g., [19, 10, 17]). However, these approaches do ot alig with the curret Norwegia implemetatio. Our goal is to propose a improved verificatio approach that remais close to that desig, such that the curret implemetatio may be easily updated. Cotributio. The cotributio of this paper is twofold. Firstly, this paper idetifies several areas for improvemet (icludig a privacy weakess) i the scheme proposed by Puiggalí et al.. These improvemets are icorporated ito Radom Block Verificatio (RBV), a scheme which is more efficiet, more secure, ad more precisely detailed. The architecture of RBV remais sufficietly close to the scheme by Puiggalí et al. to allow for easy adoptatio ito the Norwegia system. Secodly, we aalyze verifiability, privacy ad efficiecy of RBV, ad compare these properties to properties of other mix ets that offer a trade off betwee verifiability ad efficiecy. Structure of the paper. The rest of this paper is structured as follows: we first discuss some ElGamal mix ets (Sectio 2). As this work improves the cotributios of Puiggalí et al, their research is discussed i more detail (Sectios 3). 4 about-the-e-vote-project.html

3 3 Possible improvemets to the verificatio process are discussed i Sectio 3.1, all of which are implemeted by the ew verificatio process detailed i Sectio 4. Correctess, privacy, ad efficiecy of the ewly proposed verificatio process are determied i Sectio 5 ad compared to other mix ets that trade off privacy for efficiecy. This is followed by coclusios ad future work i Sectio 6. 2 Re-ecryptio mix ets with expoetial elgamal I this sectio we briefly describe the uderlyig cryptographic system (elgamal) ad the mixig processes i the cotext of a electroic votig scheme. We assume that votes are ecrypted usig expoetial elgamal ad stored o a Web Bulleti Board (BB) where some coectio betwee each ecrypted vote ad the correspodig voter exist. ElGamal is a radomized public key ecryptio scheme with homomorphic properties itroduced i [5]. Cosider two large primes p ad q, where q p 1. Z q is a q-order subgroup of Z p ad g is a geerator of G q. The secret key x Z q is geerated ad the correspodig public key is (g, y) with y = g x. A plai text s (or here a vote) is ecrypted i the followig way: Ec y (s, r 1 ) = (g r1, g s y r1 ) = (α, β) with radom value r 1 Z q. To esure aoymity, the votes are processed by a re-ecryptio mix et. The output of this mix et is a set of aoymized re-ecrypted votes that ca the be decrypted ad couted. A re-ecryptio mix et with m mix odes works as follows: The first mix ode loads all ecrypted votes (while removig ay possible lik to the voter - like sigatures) published o the BB as iput. Every iput ciphertext is re-ecrypted by expoetiatig (α, β) with a geerated radom value r 2 Z q : ReEc y = ((α, β), r 2 ) = (αg r2, βy r2 ) = (g r1 g r2, g s y r1 y r2 ) = (g r1+r2, g s y r1+r2 ) = (α, β ). (Note that while the plaitext remais uchaged, the ciphertext is completely altered.) Next, the re-ecrypted ciphertexts are shuffled with a radom permutatio π ad the resultig output ciphertexts are published o the BB. Afterwards, the secod mix ode loads the output ciphertexts from the first oe published o the BB ad re-ecrypts ad shuffles them, as well. This process is repeated util the last oe publishes its output ciphertexts o the BB. These are the ciphertexts which are decrypted ad couted. Privacy is esured if at least oe mix ode is hoest ad keeps the permutatio secret. I order to also esure that mix odes caot cheat by replacig ecrypted votes with ew oes, verifiability eeds to be implemeted, ideally without decreasig the level of privacy. 3 Norwegia mix et by Puiggalí et al. I [14], Puiggalí et al. describe a approach to verify a re-ecryptio mix et (with expoetial elgamal) which combies the idea of optimistic mixig ad RPC. This verificatio is executed after the last mix ode has published its output o the Bulleti Board. The aalysis of the Norwegia Electio system [8] treated this mix et as a solid buildig block. Nevertheless, there is room for improvemet i particular, verificatio efficiecy of the mix et ca be improved.

4 4 Below their verificatio process is described ad several poits for improvemet are highlighted. The Puiggalí et al. verificatio process operates as follows: 1. A idepedet verifier provides a radom permutatio (the challege) of all iput votes of the first mix ode. 2. To verify, the list of votes is divided ito l = m equally-sized blocks, for m mix odes ad iput ciphertexts (i.e., votes). Sice l is well defied, this ca be executed by either the idepedet verifier, the BB, or the mix ode. 3. For every iput block, the first mix ode idetifies the correspodig output block. Moreover, for every block, the mix ode publishes the product of the ciphertexts i that block. Fially, the mix ode publishes a zero kowledge proof (e.g. usig the Chaum-Pederse protocol [3] or Schorr s sigature scheme [16]) to prove that the ciphertext product of the iput block is equal to that of the correspodig output block. 4. The verifier checks the proofs of the first mix ode. 5. This process cotiues for each mix ode, where the assigmet of odes to blocks depeds o the previous ode s assigmet thus esurig a equal distributio of iput ciphertexts over all blocks. Regardig privacy, Puiggalí et al. state that every output block of the last mix ode is composed of at least oe ciphertext of every iput block of the first mix ode. Regardig correctess, the authors determie that the probability of detectig two modified votes is p = 1 l 1 1 for block size l ad a total umber of ciphertexts. Note that such a maipulatio will remai udetected if a malicious mix ode chages two votes without chagig the product of the two (1 1 = 1 2 2), ad these two votes are assiged to the same block. 3.1 Remarks There are some remarks to this approach, discussed below. Correspodig improvemets are sketched i this sectio ad worked out i Sectio 4. Iefficiet zero-kowledge proofs. I [14], the correct processig of each block is prove with computatioally costly zero kowledge proofs. A more efficiet solutio is to publish the sum of the radom values used for the re-ecryptio per block. As this does ot reveal aythig but radom oise, this value ca serve as a zero kowledge proof. This is very efficiet (as it does ot require ay zero kowledge proof). However, provig that this does ideed ot reveal ay usable iformatio whatsoever i a mathematically rigid fashio is a ope questio. Therefore, as a alterative while work o this proof cotiues, is to use efficiet zero kowledge proofs as those from [11]. With this improvemet, proof geeratio ad verificatio requires either 2 expoetiatios per block (reecryptig the ciphertext of the block s sum with the claimed radomess), or 3 expoetiatios (1 for proof geeratio, 2 to verify the zero kowledge proof).

5 Therefore, to verify all blocks of oe mix ode, this would require either expoetiatios or 3 m expoetiatios for all blocks of a mix ode (where m is the total umber of mix odes). Both improve upo the 6 m expoetiatios eeded by Puiggalí et al. to geerate the proofs (2 expoetiatios) ad verify (4 expoetiatios) each of these for ciphertexts ad m mix odes. Itroducig parallelisatio. Durig the mixig process every mix ode of the mix et re-ecrypts ad shuffles the iput ciphertexts. The origi idea of Puiggalí et al. was to process the ecrypted votes by oe mix ode after the other. It is possible to speed up this process by parallelizig i the followig way: the set of iput ciphertexts is divided ito m subsets (where m is the umber of mix odes). The all mix odes start with oe of the subsets ad forward that to their eighbor after shufflig. This improvemet 5 icreases the efficiecy by factor m. Reducig trust assumptios. Optimal privacy i [14] is oly esured if all mix odes are hoest. However, this is ot the idea of a mix et where privacy should be esured if oe sigle mix ode is hoest. Therefore, we propose to build sigle mix odes similar to RPC where each mix ode shuffles twice. Furthermore, correctess i [14] depeds o the assumptio that the verifier ad the first mix ode do ot maliciously collaborate. (Otherwise, the first mix kows what the block selectio will be ad therefore kows how to cheat udetectably). As such, it is essetial for correctess that the challege is upredictable ad geerated after the mixig process. We sketch a method for esurig this. Clarifyig block sizes. The approach by Puiggalí et al. assumes that the total umber of ciphertexts ca be grouped i equally sized blocks with block size l = m, for m mix odes ad votes. I geeral, there will be a remaider whe computig l. We make this explicit 6 ad icorporate its hadlig ito our desig. 5 m 4 RBV: Verifyig Itegrity of Radom Blocks I this sectio we describe Radom Block Verificatio, a mix et with a detailed verificatio process, based o the proposal of Puiggalí et al., which icludes all improvemets proposed above. Notatio. I the remaider of this sectio, we cosider ciphertexts posted o the bulleti board (BB) ad a mix et cosistig of m mix odes. We use the followig otatio: the set of iput ciphertexts of mix ode j is C j, the set of output ciphertexts after the first re-ecryptio/shufflig step is C j, ad the 5 This improvemet was implemeted for the Norwegia votig trials. 6 The Norwegia implemetatio of [14] addresses this as well.

6 6 Fig. 2. Verificatio of oe Mixode for 5 ciphertexts, 2 blocks set of ciphertexts after the secod re-ecryptio/shufflig step is C j. Durig verificatio, C j will be divided ito l blocks a j 1, aj 2, aj l. The correspodig output blocks (cotaiig the same plaitexts) i C j are a j 1, a j 2, a j l, the iput blocks for the secod verificatio step are b j 1, bj 2, bj l, ad the correspodig output blocks i C j are b j 1, b j 2, b j l. Mixig. For m mix odes the set of iput ciphertexts is divided ito m subsets. To esure the privacy of the ciphertexts, eve though they are grouped, the subsets should be selected for example by district or muicipality. The j th subset becomes the iput of the j th mix ode, which re-ecrypts ad shuffles the ciphertexts two times ad publishes itermediate result C j ad fial result C j o the BB. After mix ode j 1 publishes its results, this becomes the iput of mix ode j ad the fial result of the last mix ode m becomes the iput of mix ode oe. This is repeated util every subset has bee mixed by all m mix odes. Verificatio setup. The verificatio parameters are set as follows: the umber of blocks l is determied by l = ; there are r = l l blocks with l + 1 elemets, ad l r blocks with l elemets. Verificatio begis by geeratig a radom distributio of ciphertexts over verificatio blocks. Distributig ciphertexts over blocks. Each mix ode is verified i a optimistic fashio: both iput ad output ciphertexts are grouped ito blocks, ad equivalece of the blocks is prove. As remarked above, if the assigmet of ciphertexts to blocks is kow to the mix ode prior to mixig, the mix kows how to cheat without beig detected. Hece, this iitial distributio must be geerated radomly. Puiggalí et al. rely o a idepedet party to provide a itial radom distributio. I cotrast, we leverage the Fiat-Shamir techique [6] to determie

7 7 how ciphertexts are grouped ito blocks. Simply put, the first verifier computes the hash of its ow output, ad uses that as the seed for a publicly kow radom umber geerator. The resultig radom stream is the used to assig ciphertexts radomly to blocks for the first mix (see Appedix A for details). As Fiat ad Shamir poit out [7], there is o way to tweak the iput to the hash fuctio to get a predictable output. Therefore, the resultig output is sufficietly upredictable for the first mix ad may be used as described. For all other mix odes j, the iput blocks are determied by the output blocks of the previous mix ode j 1, meaig a j 1 = b j 1 1, a j 2 = b j 1 2,.... After dividig the iput ciphertexts ito blocks, the mix ode proves the correspodece betwee iput block a j 1 ad output block a j 1, betwee iput block a j 2 ad output block a j 2, etc. I the ext step, the verifier distributes the ciphertexts of the output blocks a j 1, a j 2,..., a j l over iput blocks b j 1, bj 2,..., bj l. As each block cotais roughly as may ciphertexts as there are blocks, this is doe to maximize privacy: the blocks of the iput are chose such that each iput block b j y cotais oe ciphertext from every output block a j x. Of course, there are two block sizes: l ad l + 1. So, to be specific: the first r iput blocks cotai l + 1 ciphertexts, oe ciphertext of every block ad oe additioal ciphertext of block r (iput block oe cotais two votes of output block oe, iput block two cotais two votes of output block two,... ). All other l r blocks cotai l ciphertexts, oe from each block. The mix ode j proves the correspodece betwee output blocks b j 1, b j 2,..., b j l ad iput blocks b j 1, bj 2,..., bj l. Verifyig blocks. To verify that a block of iput ciphertexts was correctly processed by a mix ode, there are two optios. Either the ode reveals the sum of the used re-ecryptio radom umbers (believed to be secure, but ot prove so), or the ode uses the zero kowledge proofs of [11]. I either case, the ode proves that the sum of the plaitexts of the block was ot chaged by the mixig step (Figure 2). 5 Aalysis I this sectio we aalyse Radom Block Verificatio regardig fraud detectio, privacy, ad efficiecy. I additio, the results are compared with those of of Radomized Partial Checkig, the Proof of Subproduct mix by Golle et al., ad the Norwegia mix by Puiggalí et al Detectig malicious mixes The optimistic verificatio approach is ot perfect a error (e.g., chagig a 1 to a 3) ca be couterbalaced (e.g., = 3 + 2) ad pass udetected. To achieve udetected corruptio of the mix result, a malicious mix has to chage (drops, alters, iserts) at least two ciphertexts to esure balacig the itroduced error. This will remai udetected if ad oly if the itroduced errors are

8 8 properly balaced withi the same block. Sice the divisio of ciphertexts ito blocks is ot kow to the mix durig mixig, the malicious mix caot esure this. Below, we ivestigate the probability of this happeig by chace. As a aside, ote that i ay optimistic approach, a chage must be couterbalaced. Therefore, to affect a chage of k votes, at least oe ciphertext extra has to be tweaked, leadig to at least k + 1 chaged ciphertexts. This is i cotrast to RPC, where chages to ciphertexts caot be balaced by other chages. Hece, below we compare the chace of chagig k ciphertexts i RPC to k + 1 ciphertexts i optimistic approaches. Radomized Partial Checkig. To cheat, a mix would drop/alter a ciphertext either i the first or i the secod mixig stage. Sice the mix has to reveal either the first or the secod mixig stage, the chace of gettig away with this is 1 2. Sice this is idepedet, the chace of remaiig udetected for k chages is P rpc (k udetected chages) = 2 k. Proof of Subproduct. Durig the verificatio α radom blocks (for α 5) are geerated with a average size of 2 ad compared with the correspodig output blocks. I case a malicious mix ode adapted k ciphertexts, the prover has to a fid aother set of output ciphertexts which has the desired properties. The chace of doig this i polyomial time is at most ( 5 8 )α [1]. Thus a high umber of used radom blocks icreases the probability that the modified ciphertext is checked. For α = 5, for istace, the chace of gettig away is ( 5 8 )5. The maximum probability of chagig k ciphertexts without detectio is reached at α = 1. Thus, i geeral, ( ) α 5 P PoS (k + 1 udetected chages) =. 8 Norwegia mix. Puiggalí et al. claim i [14] that the chace of ot detectig that two ciphertexts have bee altered by oe mix is P (udetected) = l 1 1 the first ciphertext ca be i ay block, as log as the secod is i the same. Give that i their proposal, l = m (with m beig the umber of mixes), this gives the followig chace of chagig k + 1 ciphertexts without beig detected: P Norway (k + 1 udetected chages) = ( m ) k 1. 1 Radom Block Verificatio. The chace of affectig a chage of size k requires chagig k + 1 ciphertexts. I the case of two chaged ciphertexts, the RVB mix et performs as good as Puiggalí et al.. I case of more tha two, the Norwegia mix et performs slightly better, as their block size is iversely proportioal to the umber of mix odes, whereas ours is costat i this regard. Ituitively, our approach has blocks of (almost) equal size, ad therefore the chace of a ciphertext occurrig i oe block is roughly ( ) 1. The chace of k + 1

9 9 ciphertexts occurrig i the same block is therefore roughly ( ) k. I reality, it is slightly better as some blocks are smaller tha others. To be precise, P rbv (k + 1 udetected chages) = ( ) k 1. 1 I RBV, the values for m ad l are fixed at m = l =. As a result the correctess is idepedet of the umber of mix odes m. I cotrast the values for the approach proposed by Puiggalí et al. depeds o the umber of mix odes ad are give by l = m ad m = l. 5.2 Privacy I mix ets, privacy is the questio of how traceable a give ciphertext is through the mix et. I geeral, there remais some imprecisio some output ciphertexts ca be ruled out, but others may or may ot be a re-ecryptio of the sought ciphertext. The size of the group that caot be ruled out (which we will call Aoymity group or AG) gives a measure for how much privacy is achieved by the mix et. I the followig we cosider the case that oly oe mix et is hoest ad keeps the iput-output ciphertext relatio secret. Radomized Partial Checkig. Depedig o a coi flip, the verificatio procedure reveals either the lik betwee a itermediate ciphertext ad the iput, or its lik with a output ciphertext. I the worst case, the coi is completely fair, ad hece 50% of the liks with iput ciphertexts are liked, ad similarly 50% of the liks with output ciphertexts. Hece, 2 output ciphertexts are ot liked yet ad must belog to the iput ciphertexts whose lik was revealed. Thus, for each ciphertext whose iput lik is revealed, the aoymity group has a size of 2. A similar reasoig holds for ciphertexts whose output lik is revealed. Thus, the aoymity group of a RPC mix et with oe hoest mix is AG rpc = 2. Proof of Subproduct. Usig PoS the ciphertexts are grouped i up to α radom blocks (with α beig the security parameter, 0 < α 5). The authors show that the average aoymity group size is AG PoS = 2 α. Thus, icreasig the security (i.e., the assuredess afforded by the verifiability) has a egative effect o privacy: the larger α, the smaller the aoymity group. Cosequetly, PoS achieves the best privacy result for α = 1, ad the smallest amout of privacy is achieved for α = 5 i this case, AG PoS = 32.

10 10 Norwegia mix. The approach proposed by Puiggalí et al. reduce the blocksize depedet o the umber of used mix odes. For m mix odes a blocksize of m is used. Thus, assumig that just oe mixode is hoest the aoymity group has a size of AG Norway = m. Radom Block Verificatio. I RBV, each mix ode shuffles twice. For verificatio, the ciphertexts are grouped ito blocks of size. So, after the first shuffle, the size of the aoymity group is. However, for the secod process, the blocks for the secod shuffle are chose such, that they iclude at least 7 oe ciphertext of each of the output blocks of the first shuffle. Therefore, to trace the ciphertext through the secod shuffle, all iput blocks eed to be cosidered, which meas i tur that all output blocks eed to be cosidered. Hece, for oe mix, AG rbv =. 5.3 Efficiecy I this sectio the efficiecy of our approach is determied. Note, we oly cosider the umber of eeded expoetiatios because performig ay other arithmetic operatio requires less computatioal effort. The total umber of eeded expoetiatios is determied by two compoets: proof geeratio by the mix et ad verificatio by the verifier. We compute the computatioal costs oly for oe mix ode. For re-ecryptio our approach, like RPC, eeds twice as may expoetiatio per mix ode as the approach by Puiggalí et al. ad PoS. That is because re-ecryptio ad shufflig are performed twice. But the impact of this is reduced as the mix odes all process a subset of ciphertexts i parallel. Radomized Partial Checkig. Durig the verificatio of RPC two times the associatio betwee 2 ciphertexts is show. This ca be doe by revealig the radom value ad be verified by recalculatig the re-ecryptio. Therefore two times 2 expoetiatios for α of the ciphertext ad two times 2 for β of the ciphertext are eeded. I total the computatioal costs per mix ode are E rpc = = 2. Proof of Subproduct. The umber of expoetiatios durig the PoS verificatio is 2α(2m 1)[1] per mix ode (for a total umber of m mix odes) ad depeds o the security parameter α (for α 5). Therefore the maximum umber of expoetiatios per mix ode is 10(2m 1) which is achieved for α = 5. Thus, efficiecy also depeds o the security parameter, ad is give by E PoS = 2α (2m 1). 7 Sice, i geeral, N, exactly oe per block is ot possible. However, our approach remais as close to that ideal as possible.

11 11 Norwegia mix. The verificatio process by Puiggalí et al. uses a zero kowledge proof to show the correctess of every block. The computatioal cost to verify the plaitext equivalece depeds o the umber of blocks. For ciphertexts m blocks are used. The calculatio of the proof for each blocks requires 2 expoetiatios ad the verificatio of the correct mixig takes 4. Therefore the total umber of expoetiatios doe by the mix et ad the verifier are E Norway = 6 m. Radom Block Verificatio. Also the efficiecy of our approach depeds o the umber of blocks. For ciphertexts m = blocks are used. Durig proof geeratio it takes oe expoetiatio per block to calculate the witess. From this follows that for m blocks 2m expoetiatios are eeded (m for each mixig step). Afterwards it takes the verifier two expoetiatios per block to check the itegrity of all blocks ad thus 4m expoetiatios for both verificatio steps. This leads to a total umber of E rbc = Coclusio I Table 1, we summarise our fidigs. The Fraud row gives the chace of gettig away with affectig the result with k votes (i.e., k chages for RPC, k +1 chages for the others). Privacy is expressed i terms of the aoymity group of oe mix, ad efficiecy is expressed i terms of the umber of expoetiatios. The bold umbers are the top scores i each row. RPC PoS Puiggalí et al. RBV ( Fraud (P (udetected)) 2 k 5 ) α ( m )k ( 1 1 )k Privacy ( AG ) 2 2 α m Efficiecy (# exp.) 2 2α (2m 1) 6 m 6 Table 1. Compariso (for ciphertexts ad m mix-odes) of fraud detectio (for oe modified ciphertext), privacy ad efficiecy (for verificatio of oe mix-ode). The table illustrates that RBV sigificatly improves privacy ad efficiecy over Puiggalí et al., at the cost of a slightly reduced ability to detect fraud. To get a feelig for how serious this reductio i fraud detectio is, cosider the followig example. Suppose 3 ciphertexts are chaged i a set of 1000 votes. The chace of ot detectig this is less tha ( 1000 ) 2 0.1%.

12 12 6 Coclusio ad Future Work We discussed the mix et verificatio scheme by Puiggalí et al., a mix of Radomized Partial Checkig (RPC) ad Optimistic Mixig (OM). We highlighted several possibilities to improve efficiecy, idetified a privacy risk i case just oe mix et is hoest (keepig the re-ecryptio ad shufflig secret), ad oted several uclarities cocerig verificatio block size ad allocatio of elemets to verificatio blocks. We proposed a improved verificatio scheme, based o radomized partial checkig of blocks, to address these issues. We provided a detailed aalysis of the effectiveess (i terms of privacy, efficiecy ad correctess) of our scheme ad compared this with other schemes that eable a trade off betwee privacy, correctess ad efficiecy. We showed that the privacy ad correctess of our scheme improve upo that offered by RPC ad OM, as well as other approaches that offer a trade off betwee efficiecy, privacy ad correctess. I additio, our scheme is less computatioally expesive tha RPC. Specifically, our scheme provides a high probability of correctess for all elemets for low computatioal cost. This cotrasts starkly with RPC, which validates some elemets at a elevated computatioal cost. There are several directios i which this work ca be exteded further. I this paper we did ot address malicious iputs. These could occur e.g. i the case of a coerced voter. Fially, we re iterested i applyig this verificatio approach to improve the efficiecy of a actual mix et, such as Verificatum 8. We also pla to discuss which probabilities satisfy legal requiremets with legal scietists. Ackowledgemets. This paper has bee developed withi the project VerKoWa Verfassugskoforme Umsetzug vo elektroische Wahle which is fuded by the Deutsche Forschugsgemeischaft (DFG, Germa Sciece Foudatio) ad coducted i cooperatio of provet (Project Group Costitutioally Compatible Techology Desig at the Uiversity of Kassel) ad CASED (Ceter for Advaced Security Research Darmstadt). Refereces 1. Boeh, D., Golle, P.: Almost etirely correct mixig with applicatios to votig. I: Proc. CCS 02. pp ACM (2002) 2. Chaum, D.: Utraceable electroic mail, retur addresses, ad digital pseudoyms. Commuicatios of the ACM 24(2), (1981) 3. Chaum, D., Pederse, T.: Wallet databases with observers. I: Brickell, E. (ed.) CRYPTO 92, LNCS, vol. 740, pp Spriger Verlag (1993) 4. Desmedt, Kurosawa: How to break a practical mix ad desig a ew oe. I: Proceedigs of the 19th iteratioal coferece o Theory ad applicatio of cryptographic techiques. LNCS, vol. 1807, pp Spriger-Verlag, Berli, Heidelberg (2000), 8

13 13 5. El Gamal, T.: A public key cryptosystem ad a sigature scheme based o discrete logarithms. I: Proceedigs CRYPTO 84. pp Spriger-Verlag New York, Ic., New York, NY, USA (1985) 6. Fiat, A., Shamir, A.: How to prove yourself: Practical solutios to idetificatio ad sigature problems. I: Advaces i Cryptology CRYPTO 86. LNCS, vol. 263, pp Spriger (1986) 7. Fiat, A., Shamir, A.: How to prove yourself: practical solutios to idetificatio ad sigature problems. I: Proc. CRYPTO 86. pp Spriger-Verlag, Lodo, UK (1987), 8. Gjøstee, K.: Aalysis of a iteret votig protocol. Cryptology eprit Archive, Report 2010/380 (2010), 9. Golle, P., Zhog, S., Boeh, D., Jakobsso, M., Juels, A.: Optimistic mixig for exit-polls. I: Asiacrypt 2002, LNCS pp Spriger-Verlag (2002) 10. Groth, J.: A verifiable secret shuffle of homomorphic ecryptios. vol. 23, pp (2010) 11. Jakobsso, M., Juels, A.: Millimix: Mixig i small batches. Tech. rep., Ceter for Discrete Mathematics & Theoretical Computer Sciece (1999) 12. Jakobsso, M., Juels, A., Rivest, R.L.: Makig mix ets robust for electroic votig by radomized partial checkig. I: Proceedigs of USENIX 02 (2002) 13. Neff, C.A.: A verifiable secret shuffle ad its applicatio to e-votig. I: CCS 01. pp ACM, New York, NY, USA (2001) 14. Puiggalí Allepuz, J., Guasch Castelló, S.: Uiversally verifiable efficiet reecryptio mixet. I: Proc. EVOTE LNI, vol. P-167, pp GI (2010) 15. Sako, K., Kilia, J.: Receipt-free mix-type votig scheme. I: Guillou, L., Quisquater, J.J. (eds.) Proc. EUROCRYPT 95. LNCS, vol. 921, pp (1995) 16. Schorr, C.P.: Efficiet sigature geeratio by smart cards. Joural of Cryptology 4, (1991), Terelius, B., Wikström, D.: Proofs of restricted shuffles. I: AFRICACRYPT. LNCS, vol. 6055, pp (2010) 18. Wikström, D.: Five practical attacks for optimistic mixig for exit-polls. I: Selected Areas i Cryptography. pp (2003) 19. Wikström, D.: A commitmet-cosistet proof of a shuffle. I: Proceedigs of the 14th Australasia Coferece o Iformatio Security ad Privacy, LNCS, vol. 5594, pp Spriger-Verlag, Berli, Heidelberg (2009) A Radom distributio of ciphertexts over blocks usig Fiat-Shamir This sectio details how to arrive at a radom distributio of ciphertexts over blocks. Cosider a settig with m mixes ad iput ciphertexts, ad thus with l = blocks, idetified as i {0,..., l 1}. Of these, r = l l should have l +1 elemets, ad the others are to ed up with l elemets. To esure the iitial assigmet of ciphertexts to blocks is radom, the first mix takes a hash of its iput (by cocateatig all ciphertexts), ad uses the resultig umber as seed of a radom umber geerator. The stream of radom bits from the geerator is chopped ito parts of size s = log 2 l. The, the first ciphertext is assiged to the block with the umber give by the first part. Should this be a umber

14 14 > l, this part is dropped. The secod ciphertext is assiged the block idetified by the secod part, ad so o. I case a part idetifies a umber for which there is o correspodig block, the part is dropped. Whe a block is full, its idex umber is dropped. Iitially, blocks are cosidered full whe they have l + 1 elemets. As soo as r blocks have bee filled, blocks are cosidered full (ad their idexes dropped) whe they have l elemets. To speed up the assigmet, the available blocks ca be reidexed ad s ca be updated to limit the umber of parts for which there is o correspodig block.

Application of Improved Genetic Algorithm to Two-side Assembly Line Balancing

Application of Improved Genetic Algorithm to Two-side Assembly Line Balancing 206 3 rd Iteratioal Coferece o Mechaical, Idustrial, ad Maufacturig Egieerig (MIME 206) ISBN: 978--60595-33-7 Applicatio of Improved Geetic Algorithm to Two-side Assembly Lie Balacig Ximi Zhag, Qia Wag,

More information

Permutation Enumeration

Permutation Enumeration RMT 2012 Power Roud Rubric February 18, 2012 Permutatio Eumeratio 1 (a List all permutatios of {1, 2, 3} (b Give a expressio for the umber of permutatios of {1, 2, 3,, } i terms of Compute the umber for

More information

Intermediate Information Structures

Intermediate Information Structures Modified from Maria s lectures CPSC 335 Itermediate Iformatio Structures LECTURE 11 Compressio ad Huffma Codig Jo Roke Computer Sciece Uiversity of Calgary Caada Lecture Overview Codes ad Optimal Codes

More information

Logarithms APPENDIX IV. 265 Appendix

Logarithms APPENDIX IV. 265 Appendix APPENDIX IV Logarithms Sometimes, a umerical expressio may ivolve multiplicatio, divisio or ratioal powers of large umbers. For such calculatios, logarithms are very useful. They help us i makig difficult

More information

Novel pseudo random number generation using variant logic framework

Novel pseudo random number generation using variant logic framework Edith Cowa Uiversity Research Olie Iteratioal Cyber Resiliece coferece Cofereces, Symposia ad Campus Evets 011 Novel pseudo radom umber geeratio usig variat logic framework Jeffrey Zheg Yua Uiversity,

More information

APPLICATION NOTE UNDERSTANDING EFFECTIVE BITS

APPLICATION NOTE UNDERSTANDING EFFECTIVE BITS APPLICATION NOTE AN95091 INTRODUCTION UNDERSTANDING EFFECTIVE BITS Toy Girard, Sigatec, Desig ad Applicatios Egieer Oe criteria ofte used to evaluate a Aalog to Digital Coverter (ADC) or data acquisitio

More information

CHAPTER 5 A NEAR-LOSSLESS RUN-LENGTH CODER

CHAPTER 5 A NEAR-LOSSLESS RUN-LENGTH CODER 95 CHAPTER 5 A NEAR-LOSSLESS RUN-LENGTH CODER 5.1 GENERAL Ru-legth codig is a lossless image compressio techique, which produces modest compressio ratios. Oe way of icreasig the compressio ratio of a ru-legth

More information

Roberto s Notes on Infinite Series Chapter 1: Series Section 2. Infinite series

Roberto s Notes on Infinite Series Chapter 1: Series Section 2. Infinite series Roberto s Notes o Ifiite Series Chapter : Series Sectio Ifiite series What you eed to ow already: What sequeces are. Basic termiology ad otatio for sequeces. What you ca lear here: What a ifiite series

More information

On Parity based Divide and Conquer Recursive Functions

On Parity based Divide and Conquer Recursive Functions O Parity based Divide ad Coquer Recursive Fuctios Sug-Hyu Cha Abstract The parity based divide ad coquer recursio trees are itroduced where the sizes of the tree do ot grow mootoically as grows. These

More information

13 Legislative Bargaining

13 Legislative Bargaining 1 Legislative Bargaiig Oe of the most popular legislative models is a model due to Baro & Ferejoh (1989). The model has bee used i applicatios where the role of committees have bee studies, how the legislative

More information

A study on the efficient compression algorithm of the voice/data integrated multiplexer

A study on the efficient compression algorithm of the voice/data integrated multiplexer A study o the efficiet compressio algorithm of the voice/data itegrated multiplexer Gyou-Yo CHO' ad Dog-Ho CHO' * Dept. of Computer Egieerig. KyiigHee Uiv. Kiheugup Yogiku Kyuggido, KOREA 449-71 PHONE

More information

A SELECTIVE POINTER FORWARDING STRATEGY FOR LOCATION TRACKING IN PERSONAL COMMUNICATION SYSTEMS

A SELECTIVE POINTER FORWARDING STRATEGY FOR LOCATION TRACKING IN PERSONAL COMMUNICATION SYSTEMS A SELETIVE POINTE FOWADING STATEGY FO LOATION TAKING IN PESONAL OUNIATION SYSTES Seo G. hag ad hae Y. Lee Departmet of Idustrial Egieerig, KAIST 373-, Kusug-Dog, Taejo, Korea, 305-70 cylee@heuristic.kaist.ac.kr

More information

A New Space-Repetition Code Based on One Bit Feedback Compared to Alamouti Space-Time Code

A New Space-Repetition Code Based on One Bit Feedback Compared to Alamouti Space-Time Code Proceedigs of the 4th WSEAS It. Coferece o Electromagetics, Wireless ad Optical Commuicatios, Veice, Italy, November 0-, 006 107 A New Space-Repetitio Code Based o Oe Bit Feedback Compared to Alamouti

More information

lecture notes September 2, Sequential Choice

lecture notes September 2, Sequential Choice 18.310 lecture otes September 2, 2013 Sequetial Choice Lecturer: Michel Goemas 1 A game Cosider the followig game. I have 100 blak cards. I write dow 100 differet umbers o the cards; I ca choose ay umbers

More information

X-Bar and S-Squared Charts

X-Bar and S-Squared Charts STATGRAPHICS Rev. 7/4/009 X-Bar ad S-Squared Charts Summary The X-Bar ad S-Squared Charts procedure creates cotrol charts for a sigle umeric variable where the data have bee collected i subgroups. It creates

More information

Single Bit DACs in a Nutshell. Part I DAC Basics

Single Bit DACs in a Nutshell. Part I DAC Basics Sigle Bit DACs i a Nutshell Part I DAC Basics By Dave Va Ess, Pricipal Applicatio Egieer, Cypress Semicoductor May embedded applicatios require geeratig aalog outputs uder digital cotrol. It may be a DC

More information

Radar emitter recognition method based on AdaBoost and decision tree Tang Xiaojing1, a, Chen Weigao1 and Zhu Weigang1 1

Radar emitter recognition method based on AdaBoost and decision tree Tang Xiaojing1, a, Chen Weigao1 and Zhu Weigang1 1 Advaces i Egieerig Research, volume 8 d Iteratioal Coferece o Automatio, Mechaical Cotrol ad Computatioal Egieerig (AMCCE 7) Radar emitter recogitio method based o AdaBoost ad decisio tree Tag Xiaojig,

More information

SIDELOBE SUPPRESSION IN OFDM SYSTEMS

SIDELOBE SUPPRESSION IN OFDM SYSTEMS SIDELOBE SUPPRESSION IN OFDM SYSTEMS Iva Cosovic Germa Aerospace Ceter (DLR), Ist. of Commuicatios ad Navigatio Oberpfaffehofe, 82234 Wesslig, Germay iva.cosovic@dlr.de Vijayasarathi Jaardhaam Muich Uiversity

More information

Discrete Mathematics and Probability Theory Spring 2014 Anant Sahai Note 12

Discrete Mathematics and Probability Theory Spring 2014 Anant Sahai Note 12 EECS 70 Discrete Mathematics ad Probability Theory Sprig 204 Aat Sahai Note 2 Probability Examples Based o Coutig We will ow look at examples of radom experimets ad their correspodig sample spaces, alog

More information

High Speed Area Efficient Modulo 2 1

High Speed Area Efficient Modulo 2 1 High Speed Area Efficiet Modulo 2 1 1-Soali Sigh (PG Scholar VLSI, RKDF Ist Bhopal M.P) 2- Mr. Maish Trivedi (HOD EC Departmet, RKDF Ist Bhopal M.P) Adder Abstract Modular adder is oe of the key compoets

More information

OPTIMIZATION OF RNS FIR FILTERS FOR 6-INPUTS LUT BASED FPGAS

OPTIMIZATION OF RNS FIR FILTERS FOR 6-INPUTS LUT BASED FPGAS OPTIMIZATION OF RNS FIR FILTERS FOR 6-INPUTS LUT BASED FPGAS G.C. Cardarilli, M. Re, A. Salsao Uiversity of Rome Tor Vergata Departmet of Electroic Egieerig Via del Politecico 1 / 00133 / Rome / ITAL {marco.re,

More information

INCREASE OF STRAIN GAGE OUTPUT VOLTAGE SIGNALS ACCURACY USING VIRTUAL INSTRUMENT WITH HARMONIC EXCITATION

INCREASE OF STRAIN GAGE OUTPUT VOLTAGE SIGNALS ACCURACY USING VIRTUAL INSTRUMENT WITH HARMONIC EXCITATION XIX IMEKO World Cogress Fudametal ad Applied Metrology September 6, 9, Lisbo, Portugal INCREASE OF STRAIN GAGE OUTPUT VOLTAGE SIGNALS ACCURACY USING VIRTUAL INSTRUMENT WITH HARMONIC EXCITATION Dalibor

More information

x y z HD(x, y) + HD(y, z) HD(x, z)

x y z HD(x, y) + HD(y, z) HD(x, z) Massachusetts Istitute of Techology Departmet of Electrical Egieerig ad Computer Sciece 6.02 Solutios to Chapter 5 Updated: February 16, 2012 Please sed iformatio about errors or omissios to hari; questios

More information

Joint Power Allocation and Beamforming for Cooperative Networks

Joint Power Allocation and Beamforming for Cooperative Networks It. J. Commuicatios, etwork ad System Scieces,, 4, 447-45 doi:.436/ijcs..4753 Published Olie July (http://www.scirp.org/joural/ijcs) Joit Power Allocatio ad Beamformig for Cooperative etworks Sodes Maadi,,

More information

7. Counting Measure. Definitions and Basic Properties

7. Counting Measure. Definitions and Basic Properties Virtual Laboratories > 0. Foudatios > 1 2 3 4 5 6 7 8 9 7. Coutig Measure Defiitios ad Basic Properties Suppose that S is a fiite set. If A S the the cardiality of A is the umber of elemets i A, ad is

More information

Unit 5: Estimating with Confidence

Unit 5: Estimating with Confidence Uit 5: Estimatig with Cofidece Sectio 8.2 The Practice of Statistics, 4 th editio For AP* STARNES, YATES, MOORE Uit 5 Estimatig with Cofidece 8.1 8.2 8.3 Cofidece Itervals: The Basics Estimatig a Populatio

More information

Secret Searching in Wireless Sensor Networks with RFIDs

Secret Searching in Wireless Sensor Networks with RFIDs Secret Searchig i Wireless Sesor Networks with RFIDs Shih-I Huag Shiuhpyg Shieh Dept. of Comp. Sci. & Ifo. Eg. Natioal Chiao Tug Uiversity, Hsichu, Taiwa 300 {sihuag,ssp}@csie.ctu.edu.tw Abstract I this

More information

PHY-MAC dialogue with Multi-Packet Reception

PHY-MAC dialogue with Multi-Packet Reception PHY-AC dialogue with ulti-packet Receptio arc Realp 1 ad Aa I. Pérez-Neira 1 CTTC-Cetre Tecològic de Telecomuicacios de Cataluya Edifici Nexus C/Gra Capità, - 0803-Barceloa (Cataluya-Spai) marc.realp@cttc.es

More information

Combinatorics. Chapter Permutations. Reading questions. Counting Problems. Counting Technique: The Product Rule

Combinatorics. Chapter Permutations. Reading questions. Counting Problems. Counting Technique: The Product Rule Chapter 3 Combiatorics 3.1 Permutatios Readig questios 1. Defie what a permutatio is i your ow words. 2. What is a fixed poit i a permutatio? 3. What do we assume about mutual disjoitedess whe creatig

More information

Ch 9 Sequences, Series, and Probability

Ch 9 Sequences, Series, and Probability Ch 9 Sequeces, Series, ad Probability Have you ever bee to a casio ad played blackjack? It is the oly game i the casio that you ca wi based o the Law of large umbers. I the early 1990s a group of math

More information

HELIARC. THE FIRST NAME IN TIG.

HELIARC. THE FIRST NAME IN TIG. HELIARC. THE FIRST NAME IN TIG. YOU AND HELIARC. NOT EVERYONE APPRECIATES THE BEAUTY OF A TRULY GREAT WELD. BUT YOU DO. YOU VE PUT IN THE YEARS AND MASTERED THE ART AND CRAFT OF GTAW (TIG). AND EVER SINCE

More information

Density Slicing Reference Manual

Density Slicing Reference Manual Desity Slicig Referece Maual Improvisio, Viscout Cetre II, Uiversity of Warwick Sciece Park, Millbur Hill Road, Covetry. CV4 7HS Tel: 0044 (0) 24 7669 2229 Fax: 0044 (0) 24 7669 0091 e-mail: admi@improvisio.com

More information

Run-Time Error Detection in Polynomial Basis Multiplication Using Linear Codes

Run-Time Error Detection in Polynomial Basis Multiplication Using Linear Codes Ru-Time Error Detectio i Polyomial Basis Multiplicatio Usig Liear Codes Siavash Bayat-Saramdi ad M.A. Hasa Departmet of Electrical ad Computer Egieerig, Uiversity of Waterloo Waterloo, Otario, Caada N2L

More information

Faulty Clock Detection for Crypto Circuits Against Differential Faulty Analysis Attack

Faulty Clock Detection for Crypto Circuits Against Differential Faulty Analysis Attack Faulty Clock Detectio for Crypto Circuits Agaist Differetial Faulty Aalysis Attack Pei uo ad Yusi Fei Departmet of Electrical ad Computer Egieerig Northeaster Uiversity, Bosto, MA 02115 Abstract. Differetial

More information

Test Time Minimization for Hybrid BIST with Test Pattern Broadcasting

Test Time Minimization for Hybrid BIST with Test Pattern Broadcasting Test Time Miimizatio for Hybrid BIST with Test Patter Broadcastig Raimud Ubar, Maksim Jeihhi Departmet of Computer Egieerig Talli Techical Uiversity EE-126 18 Talli, Estoia {raiub, maksim}@pld.ttu.ee Gert

More information

A Novel Small Signal Power Line Quality Measurement System

A Novel Small Signal Power Line Quality Measurement System IMTC 3 - Istrumetatio ad Measuremet Techology Coferece Vail, CO, USA, - May 3 A ovel Small Sigal Power Lie Quality Measuremet System Paul B. Crilly, Erik Leadro Boaldi, Levy Ely de Lacarda de Oliveira,

More information

History and Advancement of the Family of Log Periodic Toothed Planer Microstrip Antenna

History and Advancement of the Family of Log Periodic Toothed Planer Microstrip Antenna Joural of Electromagetic Aalysis ad Applicatios, 2011, 3, 242-247 doi:10.4236/jemaa.2011.36039 Published Olie Jue 2011 (http://www.scirp.org/joural/jemaa) History ad Advacemet of the Family of Log Periodic

More information

8. Combinatorial Structures

8. Combinatorial Structures Virtual Laboratories > 0. Foudatios > 1 2 3 4 5 6 7 8 9 8. Combiatorial Structures The purpose of this sectio is to study several combiatorial structures that are of basic importace i probability. Permutatios

More information

AC : USING ELLIPTIC INTEGRALS AND FUNCTIONS TO STUDY LARGE-AMPLITUDE OSCILLATIONS OF A PENDULUM

AC : USING ELLIPTIC INTEGRALS AND FUNCTIONS TO STUDY LARGE-AMPLITUDE OSCILLATIONS OF A PENDULUM AC 007-7: USING ELLIPTIC INTEGRALS AND FUNCTIONS TO STUDY LARGE-AMPLITUDE OSCILLATIONS OF A PENDULUM Josue Njock-Libii, Idiaa Uiversity-Purdue Uiversity-Fort Waye Josué Njock Libii is Associate Professor

More information

The Potential of Dynamic Power and Sub-carrier Assignments in Multi-User OFDM-FDMA Cells

The Potential of Dynamic Power and Sub-carrier Assignments in Multi-User OFDM-FDMA Cells The Potetial of Dyamic Power ad Sub-carrier Assigmets i Multi-User OFDM-FDMA Cells Mathias Bohge, James Gross, Adam Wolisz TU Berli Eisteiufer 5, 1587 Berli, Germay {bohge gross wolisz}@tk.tu-berli.de

More information

Fingerprint Classification Based on Directional Image Constructed Using Wavelet Transform Domains

Fingerprint Classification Based on Directional Image Constructed Using Wavelet Transform Domains 7 Figerprit Classificatio Based o Directioal Image Costructed Usig Wavelet Trasform Domais Musa Mohd Mokji, Syed Abd. Rahma Syed Abu Bakar, Zuwairie Ibrahim 3 Departmet of Microelectroic ad Computer Egieerig

More information

1. How many possible ways are there to form five-letter words using only the letters A H? How many such words consist of five distinct letters?

1. How many possible ways are there to form five-letter words using only the letters A H? How many such words consist of five distinct letters? COMBINATORICS EXERCISES Stepha Wager 1. How may possible ways are there to form five-letter words usig oly the letters A H? How may such words cosist of five distict letters? 2. How may differet umber

More information

Design of FPGA- Based SPWM Single Phase Full-Bridge Inverter

Design of FPGA- Based SPWM Single Phase Full-Bridge Inverter Desig of FPGA- Based SPWM Sigle Phase Full-Bridge Iverter Afarulrazi Abu Bakar 1, *,Md Zarafi Ahmad 1 ad Farrah Salwai Abdullah 1 1 Faculty of Electrical ad Electroic Egieerig, UTHM *Email:afarul@uthm.edu.my

More information

CS 201: Adversary arguments. This handout presents two lower bounds for selection problems using adversary arguments ëknu73,

CS 201: Adversary arguments. This handout presents two lower bounds for selection problems using adversary arguments ëknu73, CS 01 Schlag Jauary 6, 1999 Witer `99 CS 01: Adversary argumets This hadout presets two lower bouds for selectio problems usig adversary argumets ëku73, HS78, FG76ë. I these proofs a imagiary adversary

More information

Problem of calculating time delay between pulse arrivals

Problem of calculating time delay between pulse arrivals America Joural of Egieerig Research (AJER) 5 America Joural of Egieerig Research (AJER) e-issn: 3-847 p-issn : 3-936 Volume-4, Issue-4, pp-3-4 www.ajer.org Research Paper Problem of calculatig time delay

More information

THE LUCAS TRIANGLE RECOUNTED. Arthur T. Benjamin Dept. of Mathematics, Harvey Mudd College, Claremont, CA Introduction

THE LUCAS TRIANGLE RECOUNTED. Arthur T. Benjamin Dept. of Mathematics, Harvey Mudd College, Claremont, CA Introduction THE LUCAS TRIANLE RECOUNTED Arthur T Bejami Dept of Mathematics, Harvey Mudd College, Claremot, CA 91711 bejami@hmcedu 1 Itroductio I 2], Neville Robbis explores may properties of the Lucas triagle, a

More information

ELEC 204 Digital Systems Design

ELEC 204 Digital Systems Design Fall 2013, Koç Uiversity ELEC 204 Digital Systems Desig Egi Erzi College of Egieerig Koç Uiversity,Istabul,Turkey eerzi@ku.edu.tr KU College of Egieerig Elec 204: Digital Systems Desig 1 Today: Datapaths

More information

arxiv: v2 [math.co] 15 Oct 2018

arxiv: v2 [math.co] 15 Oct 2018 THE 21 CARD TRICK AND IT GENERALIZATION DIBYAJYOTI DEB arxiv:1809.04072v2 [math.co] 15 Oct 2018 Abstract. The 21 card trick is well kow. It was recetly show i a episode of the popular YouTube chael Numberphile.

More information

COS 126 Atomic Theory of Matter

COS 126 Atomic Theory of Matter COS 126 Atomic Theory of Matter 1 Goal of the Assigmet Video Calculate Avogadro s umber Usig Eistei s equatios Usig fluorescet imagig Iput data Output Frames Blobs/Beads Estimate of Avogadro s umber 7.1833

More information

A New Design of Log-Periodic Dipole Array (LPDA) Antenna

A New Design of Log-Periodic Dipole Array (LPDA) Antenna Joural of Commuicatio Egieerig, Vol., No., Ja.-Jue 0 67 A New Desig of Log-Periodic Dipole Array (LPDA) Atea Javad Ghalibafa, Seyed Mohammad Hashemi, ad Seyed Hassa Sedighy Departmet of Electrical Egieerig,

More information

Combined Scheme for Fast PN Code Acquisition

Combined Scheme for Fast PN Code Acquisition 13 th Iteratioal Coferece o AEROSPACE SCIENCES & AVIATION TECHNOLOGY, ASAT- 13, May 6 8, 009, E-Mail: asat@mtc.edu.eg Military Techical College, Kobry Elkobbah, Cairo, Egypt Tel : +(0) 4059 4036138, Fax:

More information

Concurrent Fault Detection in Random Combinational Logic

Concurrent Fault Detection in Random Combinational Logic Cocurret Fault Detectio i Radom Combiatioal Logic Petros Drieas ad Yiorgos Makris Departmets of Computer Sciece ad Electrical Egieerig Yale Uiversity Abstract We discuss a o-itrusive methodology for cocurret

More information

Laboratory Exercise 3: Dynamic System Response Laboratory Handout AME 250: Fundamentals of Measurements and Data Analysis

Laboratory Exercise 3: Dynamic System Response Laboratory Handout AME 250: Fundamentals of Measurements and Data Analysis Laboratory Exercise 3: Dyamic System Respose Laboratory Hadout AME 50: Fudametals of Measuremets ad Data Aalysis Prepared by: Matthew Beigto Date exercises to be performed: Deliverables: Part I 1) Usig

More information

LETTER A Novel Adaptive Channel Estimation Scheme for DS-CDMA

LETTER A Novel Adaptive Channel Estimation Scheme for DS-CDMA 1274 LETTER A Novel Adaptive Chael Estimatio Scheme for DS-CDMA Che HE a), Member ad Xiao-xiag LI, Nomember SUMMARY This paper proposes a adaptive chael estimatio scheme, which uses differet movig average

More information

The Potential of Dynamic Power and Sub-carrier Assignments in Multi-User OFDM-FDMA Cells

The Potential of Dynamic Power and Sub-carrier Assignments in Multi-User OFDM-FDMA Cells The Potetial of Dyamic Power ad Sub-carrier Assigmets i Multi-User OFDM-FDMA Cells Mathias Bohge, James Gross, Adam Wolisz Telecommuicatio Networks Group, TU Berli Eisteiufer 5, 1587 Berli, Germay {bohge

More information

PROJECT #2 GENERIC ROBOT SIMULATOR

PROJECT #2 GENERIC ROBOT SIMULATOR Uiversity of Missouri-Columbia Departmet of Electrical ad Computer Egieerig ECE 7330 Itroductio to Mechatroics ad Robotic Visio Fall, 2010 PROJECT #2 GENERIC ROBOT SIMULATOR Luis Alberto Rivera Estrada

More information

The Detection of Abrupt Changes in Fatigue Data by Using Cumulative Sum (CUSUM) Method

The Detection of Abrupt Changes in Fatigue Data by Using Cumulative Sum (CUSUM) Method Proceedigs of the th WSEAS Iteratioal Coferece o APPLIED ad THEORETICAL MECHANICS (MECHANICS '8) The Detectio of Abrupt Chages i Fatigue Data by Usig Cumulative Sum (CUSUM) Method Z. M. NOPIAH, M.N.BAHARIN,

More information

ASample of an XML stream is:

ASample of an XML stream is: 1 Efficiet Multichael i XML Wireless Broadcast Stream Arezoo Khatibi* 1 ad Omid Khatibi 2 1 Faculty of Computer Sciece, Uiversity of Kasha, Kasha, Ira 2 Faculty of Mathematics, Uiversity of Viea,Viea,

More information

Introduction to Wireless Communication Systems ECE 476/ECE 501C/CS 513 Winter 2003

Introduction to Wireless Communication Systems ECE 476/ECE 501C/CS 513 Winter 2003 troductio to Wireless Commuicatio ystems ECE 476/ECE 501C/C 513 Witer 2003 eview for Exam #1 March 4, 2003 Exam Details Must follow seatig chart - Posted 30 miutes before exam. Cheatig will be treated

More information

COMPRESSION OF TRANSMULTIPLEXED ACOUSTIC SIGNALS

COMPRESSION OF TRANSMULTIPLEXED ACOUSTIC SIGNALS COMPRESSION OF TRANSMULTIPLEXED ACOUSTIC SIGNALS Mariusz Ziółko, Przemysław Sypka ad Bartosz Ziółko Departmet of Electroics, AGH Uiversity of Sciece ad Techology, al. Mickiewicza 3, 3-59 Kraków, Polad,

More information

A Novel Three Value Logic for Computing Purposes

A Novel Three Value Logic for Computing Purposes Iteratioal Joural o Iormatio ad Electroics Egieerig, Vol. 3, No. 4, July 23 A Novel Three Value Logic or Computig Purposes Ali Soltai ad Saeed Mohammadi Abstract The aim o this article is to suggest a

More information

Hybrid BIST Optimization for Core-based Systems with Test Pattern Broadcasting

Hybrid BIST Optimization for Core-based Systems with Test Pattern Broadcasting Hybrid BIST Optimizatio for Core-based Systems with Test Patter Broadcastig Raimud Ubar, Masim Jeihhi Departmet of Computer Egieerig Talli Techical Uiversity, Estoia {raiub, masim}@pld.ttu.ee Gert Jerva,

More information

Procedia - Social and Behavioral Sciences 128 ( 2014 ) EPC-TKS 2013

Procedia - Social and Behavioral Sciences 128 ( 2014 ) EPC-TKS 2013 Available olie at www.sciecedirect.com ScieceDirect Procedia - Social ad Behavioral Scieces 18 ( 014 ) 399 405 EPC-TKS 013 Iductive derivatio of formulae by a computer Sava Grozdev a *, Veseli Nekov b

More information

Analysis of SDR GNSS Using MATLAB

Analysis of SDR GNSS Using MATLAB Iteratioal Joural of Computer Techology ad Electroics Egieerig (IJCTEE) Volume 5, Issue 3, Jue 2015 Aalysis of SDR GNSS Usig MATLAB Abstract This paper explais a software defied radio global avigatio satellite

More information

WAVE-BASED TRANSIENT ANALYSIS USING BLOCK NEWTON-JACOBI

WAVE-BASED TRANSIENT ANALYSIS USING BLOCK NEWTON-JACOBI WAVE-BASED TRANSIENT ANALYSIS USING BLOCK NEWTON-JACOBI Muhammad Kabir McGill Uiversity Departmet of Electrical ad Computer Egieerig Motreal, QC H3A 2A7 Email: muhammad.kabir@mail.mcgill.ca Carlos Christofferse

More information

General Model :Algorithms in the Real World. Applications. Block Codes

General Model :Algorithms in the Real World. Applications. Block Codes Geeral Model 5-853:Algorithms i the Real World Error Correctig Codes I Overview Hammig Codes Liear Codes 5-853 Page message (m) coder codeword (c) oisy chael decoder codeword (c ) message or error Errors

More information

Making sure metrics are meaningful

Making sure metrics are meaningful Makig sure metrics are meaigful Some thigs are quatifiable, but ot very useful CPU performace: MHz is ot the same as performace Cameras: Mega-Pixels is ot the same as quality Cosistet ad quatifiable metrics

More information

DIGITALLY TUNED SINUSOIDAL OSCILLATOR USING MULTIPLE- OUTPUT CURRENT OPERATIONAL AMPLIFIER FOR APPLICATIONS IN HIGH STABLE ACOUSTICAL GENERATORS

DIGITALLY TUNED SINUSOIDAL OSCILLATOR USING MULTIPLE- OUTPUT CURRENT OPERATIONAL AMPLIFIER FOR APPLICATIONS IN HIGH STABLE ACOUSTICAL GENERATORS Molecular ad Quatum Acoustics vol. 7, (6) 95 DGTALL TUNED SNUSODAL OSCLLATOR USNG MULTPLE- OUTPUT CURRENT OPERATONAL AMPLFER FOR APPLCATONS N HGH STABLE ACOUSTCAL GENERATORS Lesław TOPÓR-KAMŃSK Faculty

More information

Cross-Layer Performance of a Distributed Real-Time MAC Protocol Supporting Variable Bit Rate Multiclass Services in WPANs

Cross-Layer Performance of a Distributed Real-Time MAC Protocol Supporting Variable Bit Rate Multiclass Services in WPANs Cross-Layer Performace of a Distributed Real-Time MAC Protocol Supportig Variable Bit Rate Multiclass Services i WPANs David Tug Chog Wog, Jo W. Ma, ad ee Chaig Chua 3 Istitute for Ifocomm Research, Heg

More information

A Class of Interconnection Networks for Multicasting

A Class of Interconnection Networks for Multicasting A Class of Itercoectio Networks for Multicastig Yuayua Yag Departmet of Computer Sciece ad Electrical Egieerig Uiversity of Vermot, Burligto, VT 05405 yag@cs.uvm.edu Abstract Multicast or oe-to-may commuicatios

More information

Compound Controller for DC Motor Servo System Based on Inner-Loop Extended State Observer

Compound Controller for DC Motor Servo System Based on Inner-Loop Extended State Observer BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 6, No 5 Special Issue o Applicatio of Advaced Computig ad Simulatio i Iformatio Systems Sofia 06 Prit ISSN: 3-970; Olie ISSN:

More information

The Institute of Chartered Accountants of Sri Lanka

The Institute of Chartered Accountants of Sri Lanka The Istitute of Chartered Accoutats of Sri Laka Postgraduate Diploma i Busiess ad Fiace Quatitative Techiques for Busiess Hadout 02:Presetatio ad Aalysis of data Presetatio of Data The Stem ad Leaf Display

More information

}, how many different strings of length n 1 exist? }, how many different strings of length n 2 exist that contain at least one a 1

}, how many different strings of length n 1 exist? }, how many different strings of length n 2 exist that contain at least one a 1 1. [5] Give sets A ad B, each of cardiality 1, how may fuctios map A i a oe-tooe fashio oto B? 2. [5] a. Give the set of r symbols { a 1, a 2,..., a r }, how may differet strigs of legth 1 exist? [5]b.

More information

Modeling and solution for the ship stowage planning problem of coils in the steel industry

Modeling and solution for the ship stowage planning problem of coils in the steel industry Loughborough Uiversity Istitutioal Repository Modelig ad solutio for the ship stowage plaig problem of coils i the steel idustry This item was submitted to Loughborough Uiversity's Istitutioal Repository

More information

High-Order CCII-Based Mixed-Mode Universal Filter

High-Order CCII-Based Mixed-Mode Universal Filter High-Order CCII-Based Mixed-Mode Uiversal Filter Che-Nog Lee Departmet of Computer ad Commuicatio Egieerig, Taipei Chegshih Uiversity of Sciece ad Techology, Taipei, Taiwa, R. O. C. Abstract This paper

More information

BOTTLENECK BRANCH MARKING FOR NOISE CONSOLIDATION

BOTTLENECK BRANCH MARKING FOR NOISE CONSOLIDATION BOTTLENECK BRANCH MARKING FOR NOISE CONSOLIDATION IN MULTICAST NETWORKS Jordi Ros, Wei K. Tsai ad Mahadeve Iyer Departmet of Electrical ad Computer Egieerig Uiversity of Califoria, Irvie, CA 92697 {jros,

More information

As an Exceptional Student in Intellectual Disabilities. You Are Cordially Invited to be Seen and Recognized as a Future Leader in the Field

As an Exceptional Student in Intellectual Disabilities. You Are Cordially Invited to be Seen and Recognized as a Future Leader in the Field As a Exceptioal Studet i Itellectual Disabilities You Are Cordially Ivited to be See ad Recogized as a Future Leader i the Field You Caot Start Too Early To Begi Your Rise To Leadership i Our Field You

More information

Methods to Reduce Arc-Flash Hazards

Methods to Reduce Arc-Flash Hazards Methods to Reduce Arc-Flash Hazards Exercise: Implemetig Istataeous Settigs for a Maiteace Mode Scheme Below is a oe-lie diagram of a substatio with a mai ad two feeders. Because there is virtually o differece

More information

An Adaptive Image Denoising Method based on Thresholding

An Adaptive Image Denoising Method based on Thresholding A Adaptive Image Deoisig Method based o Thresholdig HARI OM AND MANTOSH BISWAS Departmet of Computer Sciece & Egieerig Idia School of Mies, Dhabad Jharkad-86004 INDIA {hariom4idia, matoshb}@gmail.com Abstract

More information

Using Color Histograms to Recognize People in Real Time Visual Surveillance

Using Color Histograms to Recognize People in Real Time Visual Surveillance Usig Color Histograms to Recogize People i Real Time Visual Surveillace DANIEL WOJTASZEK, ROBERT LAGANIERE S.I.T.E. Uiversity of Ottawa, Ottawa, Otario CANADA daielw@site.uottawa.ca, lagaier@site.uottawa.ca

More information

Shuffling Cards. D.J.W. Telkamp. Utrecht University Mathematics Bachelor s Thesis. Supervised by Dr. K. Dajani

Shuffling Cards. D.J.W. Telkamp. Utrecht University Mathematics Bachelor s Thesis. Supervised by Dr. K. Dajani Shufflig Cards Utrecht Uiversity Mathematics Bachelor s Thesis D.J.W. Telkamp Supervised by Dr. K. Dajai Jue 3, 207 Cotets Itroductio 2 2 Prerequisites 2 2. Problems with the variatio distace................

More information

SHORT-TERM TRAVEL TIME PREDICTION USING A NEURAL NETWORK

SHORT-TERM TRAVEL TIME PREDICTION USING A NEURAL NETWORK SHORT-TERM TRAVEL TIME PREDICTION USING A NEURAL NETWORK Giovai Huiske ad Eric va Berkum Dept. of Civil Egieerig - Uiversity of Twete - 7500 AE Eschede - The Netherlads E-mail: g.huiske@ctw.utwete.l ad

More information

CAEN Tools for Discovery

CAEN Tools for Discovery Applicatio Note AN2506 Digital Gamma Neutro discrimiatio with Liquid Scitillators Viareggio 19 November 2012 Itroductio I recet years CAEN has developed a complete family of digitizers that cosists of

More information

A Comparison on FPGA of Modular Multipliers Suitable for Elliptic Curve Cryptography over GF(p) for Specific p Values

A Comparison on FPGA of Modular Multipliers Suitable for Elliptic Curve Cryptography over GF(p) for Specific p Values A Compariso o FPGA of Modular Multipliers Suitable for Elliptic Curve Cryptography over GF(p) for Specific p Values Mark Hamilto, William Marae, Araud Tisserad To cite this versio: Mark Hamilto, William

More information

Data Acquisition System for Electric Vehicle s Driving Motor Test Bench Based on VC++ *

Data Acquisition System for Electric Vehicle s Driving Motor Test Bench Based on VC++ * Available olie at www.sciecedirect.com Physics Procedia 33 (0 ) 75 73 0 Iteratioal Coferece o Medical Physics ad Biomedical Egieerig Data Acquisitio System for Electric Vehicle s Drivig Motor Test Bech

More information

sible number of wavelengths. The wave~~ngt~ ~ ~ ~ c ~ n b~dwidth is set low eno~gh to interfax One of the most im

sible number of wavelengths. The wave~~ngt~ ~ ~ ~ c ~ n b~dwidth is set low eno~gh to interfax One of the most im sible umber of wavelegths. The wave~~gt~ ~ ~ ~ c ~ b~dwidth is set low eo~gh to iterfax vices. Oe of the most im ed trasmitters ad ysis much more CO "The author is also f Cumputer sciece Departmet, Uiversity

More information

Throughput/Delay Analysis of Spectrally Phase- Encoded Optical CDMA over WDM Networks

Throughput/Delay Analysis of Spectrally Phase- Encoded Optical CDMA over WDM Networks Throughput/Delay Aalysis of pectrally Phase- Ecoded Optical over etwors K. Putsri *,. ittichivapa * ad H.M.H.halaby ** * Kig Mogut s Istitute of Techology Ladrabag Departmet of Telecommuicatios Egieerig,

More information

ON THE FUNDAMENTAL RELATIONSHIP BETWEEN THE ACHIEVABLE CAPACITY AND DELAY IN MOBILE WIRELESS NETWORKS

ON THE FUNDAMENTAL RELATIONSHIP BETWEEN THE ACHIEVABLE CAPACITY AND DELAY IN MOBILE WIRELESS NETWORKS Chapter ON THE FUNDAMENTAL RELATIONSHIP BETWEEN THE ACHIEVABLE CAPACITY AND DELAY IN MOBILE WIRELESS NETWORKS Xiaoju Li ad Ness B. Shroff School of Electrical ad Computer Egieerig, Purdue Uiversity West

More information

Lecture 29: MOSFET Small-Signal Amplifier Examples.

Lecture 29: MOSFET Small-Signal Amplifier Examples. Whites, EE 30 Lecture 9 Page 1 of 8 Lecture 9: MOSFET Small-Sigal Amplifier Examples. We will illustrate the aalysis of small-sigal MOSFET amplifiers through two examples i this lecture. Example N9.1 (text

More information

Counting on r-fibonacci Numbers

Counting on r-fibonacci Numbers Claremot Colleges Scholarship @ Claremot All HMC Faculty Publicatios ad Research HMC Faculty Scholarship 5-1-2015 Coutig o r-fiboacci Numbers Arthur Bejami Harvey Mudd College Curtis Heberle Harvey Mudd

More information

On the Delay Performance of In-network Aggregation in Lossy Wireless Sensor Networks

On the Delay Performance of In-network Aggregation in Lossy Wireless Sensor Networks O the Delay Performace of I-etwork Aggregatio i Lossy Wireless Sesor Networks Chaghee Joo, Member, IEEE, ad Ness B. Shroff, Fellow, IEEE Abstract I this paper, we study the implicatio of wireless broadcast

More information

Fast Sensor Deployment for Fusion-based Target Detection

Fast Sensor Deployment for Fusion-based Target Detection Fast Sesor Deploymet for Fusio-based Target Detectio Zhaohui Yua*, Rui Ta*, Guoliag Xig*, Cheyag Lu, Yixi Che *Departmet of Computer Sciece, City Uiversity of Hog Kog Departmet of Computer Sciece ad Egieerig,

More information

Optimal Arrangement of Buoys Observable by Means of Radar

Optimal Arrangement of Buoys Observable by Means of Radar Optimal Arragemet of Buoys Observable by Meas of Radar TOMASZ PRACZYK Istitute of Naval Weapo ad Computer Sciece Polish Naval Academy Śmidowicza 69, 8-03 Gdyia POLAND t.praczy@amw.gdyia.pl Abstract: -

More information

PRACTICAL FILTER DESIGN & IMPLEMENTATION LAB

PRACTICAL FILTER DESIGN & IMPLEMENTATION LAB 1 of 7 PRACTICAL FILTER DESIGN & IMPLEMENTATION LAB BEFORE YOU BEGIN PREREQUISITE LABS Itroductio to Oscilloscope Itroductio to Arbitrary/Fuctio Geerator EXPECTED KNOWLEDGE Uderstadig of LTI systems. Laplace

More information

On Balancing Exploration vs. Exploitation in a Cognitive Engine for Multi-Antenna Systems

On Balancing Exploration vs. Exploitation in a Cognitive Engine for Multi-Antenna Systems O Balacig Exploratio vs. Exploitatio i a Cogitive Egie for Multi-Atea Systems Haris I. Volos ad R. Michael Buehrer Mobile ad Portable Radio Research Group (MPRG), Wireless@Virgiia Tech Bradley Departmet

More information

Chapter (6) Discrete Probability Distributions Examples

Chapter (6) Discrete Probability Distributions Examples hapter () Discrete robability Distributios Eamples Eample () Two balaced dice are rolled. Let X be the sum of the two dice. Obtai the probability distributio of X. Solutio Whe the two balaced dice are

More information

Efficient Feedback-Based Scheduling Policies for Chunked Network Codes over Networks with Loss and Delay

Efficient Feedback-Based Scheduling Policies for Chunked Network Codes over Networks with Loss and Delay Efficiet Feedback-Based Schedulig Policies for Chuked Network Codes over Networks with Loss ad Delay Aoosheh Heidarzadeh ad Amir H. Baihashemi Departmet of Systems ad Computer Egieerig, Carleto Uiversity,

More information

A study on traffic accident measures in municipal roads by using GIS

A study on traffic accident measures in municipal roads by using GIS icccbe 010 Nottigham Uiversity Press Proceedigs of the Iteratioal Coferece o Computig i Civil ad Buildig Egieerig W Tizai (Editor) A study o traffic accidet measures i muicipal roads by usig GIS Satoshi

More information

Localized Image Segmentation and Enhancement for Meteorite Images

Localized Image Segmentation and Enhancement for Meteorite Images Localized Image Segmetatio ad Ehacemet for Meteorite Images Yufag Bao, PhD Math ad Computer Sciece Departmet Fayetteville State Uiversity, Fayetteville, NC 28301 ybao@ucfsu.edu ABSTRACT This paper proposed

More information

Optimal Geolocation Updating for Location Aware Service Provisioning in Wireless Networks

Optimal Geolocation Updating for Location Aware Service Provisioning in Wireless Networks Optimal Geolocatio Updatig for Locatio Aware Service Provisioig i Wireless Networks Siri Tekiay Amer Catovic tekiay@adm.jit.edu axc4466@jit.edu New Jersey Istitute of Techology Uiversity Heights, Newark,

More information