• Title/Summary/Keyword: logarithm

Search Result 473, Processing Time 0.027 seconds

SECURE IDENTIFICATION AND SIGNATURE USING ZERO-KNOWLEDGE PROOFS AND BILINEAR PAIRINGS

  • Choi, Byung Mun;Lee, Young Whan
    • Journal of the Chungcheong Mathematical Society
    • /
    • v.21 no.3
    • /
    • pp.403-411
    • /
    • 2008
  • In 2005, A. Saxena, B. Soh and S. Priymak [10] proposed a two-flow blind identification protocol. But it has a weakness of the active-intruder attack and uses the pairing operation that causes slow implementation in smart cards. In 2008, Y. W. Lee [9] made a method of the active-intruder attack on their identification scheme and proposed a new zero-knowledge blind identification protocol for smart cards. In this paper, we give more simple and fast protocols than above protocols such that the prover using computationally limited devices such as smart cards has no need of computing the bilinear pairings. Computing the bilinear pairings is needed only for the verifier and is secure assuming the hardness of the Discrete-Logarithm Problem (DLP).

  • PDF

ZERO-KNOWLEDGE GROUP IDENTIFICATION AND HIDDEN GROUP SIGNATURE FOR SMART CARDS USING BILINEAR PAIRINGS

  • Lee, Young Whan;Choi, Byung Mun
    • Journal of the Chungcheong Mathematical Society
    • /
    • v.20 no.4
    • /
    • pp.355-366
    • /
    • 2007
  • In this paper, we propose a new blind group identification protocol and a hidden group signature protocol as its application. These protocols involve many provers and one verifier such that (1) the statement of all the provers are proved simultaneously, (2) and also all the provers using computationally limited devices (e.g. smart cards) have no need of computing the bilinear pairings, (3) but only the verifier uses the bilinear pairings. A. Saxena et al. proposed a two-round blind (group) identification protocol in 2005 using the bilinear pairings. But it reveals weakness in the active-intruder attack, and all the provers as well as the verifier must have devices computing bilinear pairings. Comparing their results, our protocol is secure from the active-intruder attack and has more fit for smart cards. In particular, it is secure under only the assumption of the hardness of the Discrete-Logarithm Problem in bilinear groups.

  • PDF

Transform Methods for PAM Signals as Asymmetric Distribution and Performance Comparison of Bicepstrum Blind Equalizer using Asymmetric Distribution (PAM 신호의 비대칭 분포를 형성하기 위한 방법과 이를 이용한 3차 통계 자력 등화기의 성능 비교)

  • 정교일;임제택
    • Journal of the Korean Institute of Telematics and Electronics B
    • /
    • v.33B no.6
    • /
    • pp.54-63
    • /
    • 1996
  • We propose a 3rd order blind equalizer that incorporates a new transform method using either square root operation ($\sqrt{x]$) or reciprocal operation (1/x) in order to transform symmetric distribution of PAM signals at the transmitter, to asymmetric one. At the receiver, either the square operation or the reciprocal operation is needed to recover the asymmetrically transformed signals to the original ones after eualization. The reslts of the computer simulation, using the new method are better than the existing transform method using natural logarithm operation by the maximum of 8 dB in MSE. In addition, as the skewness of the asymmetrically transformed distribution has small values, the performances are improved.

  • PDF

A design of transcendental function arithmetic unit for lighting operation of mobile 3D graphic processor (모바일 3차원 그래픽 프로세서의 조명처리 연산을 위한 초월함수 연산기 구현)

  • Lee, Sang-Hun;Lee, Chan-Ho
    • Proceedings of the IEEK Conference
    • /
    • 2005.11a
    • /
    • pp.715-718
    • /
    • 2005
  • Mobile devices is getting to include more functions according to the demand of digital convergence. Applications based on 3D graphic calculation such as 3D games and navigation are one of the functions. 3D graphic calculation requires heavy calculation. Therefore, we need dedicated 3D graphic hardware unit with high performance. 3D graphic calculation needs a lot of complicated floating-point arithmetic operation. However, most of current mobile 3D graphics processors do not have efficient architecture for mobile devices because they are based on those for conventional computer systems. In this paper, we propose arithmetic units for special functions of lighting operation of 3D graphics. Transcendental arithmetic units are designed using approximation of logarithm function. Special function units for lighting operation such as reciprocal, square root, reciprocal of square root, and power can be obtained. The proposed arithmetic unit has lower error rate and smaller silicon area than conventional arithmetic architecture.

  • PDF

An Analysis on Open-ended Problem Solving of Gifted Students (수학 영재학생의 개방형 문제 해결 사례 분석)

  • Choi, Su A;Kang, Hong Jae
    • East Asian mathematical journal
    • /
    • v.32 no.4
    • /
    • pp.545-563
    • /
    • 2016
  • The aim of this study was to observe processes and implication to a given program for the 20 gifted children grade 5 by making the number from 1 to 100 with natural numbers 4,4,9 and 9. Revelation of creativity, mathematical tendency of students and meaningful responses were observed by the qualitative records of this game activity and the analysis of result. The major result of a study is as follows: The mathematical creativities of students were revealed and developed by this activity. And the mathematical attitude were changed and developed, so student could actively participate. And students could experience collaborative and social composition learning by presentations and discussion, competition with a permissive atmosphere and open-game rule. It was meaningful that mathematical ideas (negative number, square root, factorial, [x]: the largest integer not greater than x, absolute value, percent, exponent, logarithm etc.) were suggested and motivated by students themselves.

Estimation of Initial Concentrations of Phenanthrene and Atrazine from Soil Properties and Bioavailability During Aging

  • Chung, Namhyun
    • Journal of Applied Biological Chemistry
    • /
    • v.44 no.4
    • /
    • pp.194-198
    • /
    • 2001
  • Contaminated sites are often abandoned for an extended period of time, thus organopollutants becoming sequestered. The information on the initial concentrations of the contaminants would be helpful for the economic bioremediation of the chemicals. The present study estimated the initial concentrations of atrazine and phenanthrene through multiple regression analyses using soil properties and the amount of chemicals available in situ. Percentage mineralized or extracted was best correlated with organic C or logarithm of organic C, and the $R^2$ values were 0.548 and 0.894 for atrazine and phenanthrene, respectively. Estimation of the initial concentration of the chemicals was then calculated from both the percentage mineralized or extracted and the amount of chemicals extracted or mineralized. Results showed that the estimation of the initial concentration of the chemical at the time of contamination is feasible.

  • PDF

Reflection of a gaussian beam from a planar dielectric interface

  • Lee, Yeon H.
    • Korean Journal of Optics and Photonics
    • /
    • v.7 no.3
    • /
    • pp.200-206
    • /
    • 1996
  • When a Gaussian beam is incident to a planar dielectric interface at an angle other than Brewster angle or the critical angle of total reflection, we derive the six nonspecular effects of rotation, lateral shift, focal shift, Rayleigh length change, magnitude and phase changes in the complex amplitude of the reflected beam simultaneously by taking account of the boundary condition. In the derivation we assume a Gaussian beam of fundamental mode to emerge from the interface and then match at the interface the constant, linear, and quadratic variations of the amplitude and phase of the reflected beam with those of the incident beam multiplied by the reflection coefficient. Our calculation shows that the six nonspecular effects can result from a linear variation of the natural logarithm of the reflection coefficient at the interface.

  • PDF

Clothing Expenditure Analysis of Urban Households (도시가계의 피복비지출에 관한 연구)

  • 배미경
    • Journal of the Korean Home Economics Association
    • /
    • v.35 no.1
    • /
    • pp.415-428
    • /
    • 1997
  • In the present study we examined clothing expenditure patterns and related variables in Korea. In addition we analyzed the differences of clothing expenditure patterns between overall overspenders and non-overspenders. We use the Family Income and Expenditure Study published by the National Statistical Office of Korea. Double logarithm functional forms were used to adjust the normality of sample distribution and multiple regression analyses and t-test were utilized as a statistical tools. The present study was divided into four folders. First the income elasticity of clothing expenditures was examined by different groups such as age job and education levels of households as percentage change of clothing expenditures to a percentage change of income. Second to analyze the effects of demogtraphic and socio-economic variables on clothing expenditure we utlized the standardized coefficients in the separate regression equation by demographic and socio-economic variables. Third using spending to income ratio we investigated the differnces of the clothing expenditure patterns between overall overspenders and non-overspenders. Fourth the effects of independent variables by ovespenders and non-overspenders werediscussed.

  • PDF

A Novel Key Sharing Fuzzy Vault Scheme

  • You, Lin;Wang, Yuna;Chen, Yulei;Deng, Qi;Zhang, Huanhuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.9
    • /
    • pp.4585-4602
    • /
    • 2016
  • A novel key sharing fuzzy vault scheme is proposed based on the classic fuzzy vault and the Diffie-Hellman key exchange protocol. In this proposed scheme, two users cooperatively build their fuzzy vault for their shared key using their own biometrics. Either of the users can use their own biometrics to unlock the fuzzy vault with the help of the other to get their shared key without risk of disclosure of their biometrics. Thus, they can unlock the fuzzy vault cooperatively. The security of our scheme is based on the security of the classic fuzzy vault scheme, one-way hash function and the discrete logarithm problem in a given finite group.

An Analytical Study of the Flexural Deformation for High Strength Concrete Structures using Reliability Theory (신뢰성 이론을 이용한 500kgf/$\textrm{cm}^2$의 고강도콘크리트 구조물에 대한 휨변형의 해석적 연구)

  • 송재호;최광진;김민웅;홍원기
    • Proceedings of the Korea Concrete Institute Conference
    • /
    • 1995.04a
    • /
    • pp.231-236
    • /
    • 1995
  • The object of this thesis is an analytical study on flexural deformation of high strength concrete structures using reliability theory. Using the established experimental data that have been presented in various documents the stress-strain relationship curves of high strength(500kgf/$\textrm{cm}^2$)models are proposed. Based on both methods of logarithm regression analysis and multiple regression analysis adopted in order to establish the relationships between design parameters, response random variables and flexural deformation analyzed using Monte Carlo simulation and Simpson composite formula. Additional random variables are introduced to incorporate both the confidence in the analytical accuracy of engineering mechanics associated with structural response quantities and the uncertainty in the construction quality control. The result is expected to accomodate other important design parameter of high strength concrete design in treating reliability theory that practicing engineers, structural engineering often face.

  • PDF