split state
Recently Published Documents


TOTAL DOCUMENTS

27
(FIVE YEARS 10)

H-INDEX

7
(FIVE YEARS 1)

2020 ◽  
Vol 33 (4) ◽  
pp. 2034-2077
Author(s):  
Sebastian Faust ◽  
Pratyay Mukherjee ◽  
Jesper Buus Nielsen ◽  
Daniele Venturi

Abstract Non-malleable codes (Dziembowski et al., ICS’10 and J. ACM’18) are a natural relaxation of error correcting/detecting codes with useful applications in cryptography. Informally, a code is non-malleable if an adversary trying to tamper with an encoding of a message can only leave it unchanged or modify it to the encoding of an unrelated value. This paper introduces continuous non-malleability, a generalization of standard non-malleability where the adversary is allowed to tamper continuously with the same encoding. This is in contrast to the standard definition of non-malleable codes, where the adversary can only tamper a single time. The only restriction is that after the first invalid codeword is ever generated, a special self-destruct mechanism is triggered and no further tampering is allowed; this restriction can easily be shown to be necessary. We focus on the split-state model, where an encoding consists of two parts and the tampering functions can be arbitrary as long as they act independently on each part. Our main contributions are outlined below. We show that continuous non-malleability in the split-state model is impossible without relying on computational assumptions. We construct a computationally secure split-state code satisfying continuous non-malleability in the common reference string (CRS) model. Our scheme can be instantiated assuming the existence of collision-resistant hash functions and (doubly enhanced) trapdoor permutations, but we also give concrete instantiations based on standard number-theoretic assumptions. We revisit the application of non-malleable codes to protecting arbitrary cryptographic primitives against related-key attacks. Previous applications of non-malleable codes in this setting required perfect erasures and the adversary to be restricted in memory. We show that continuously non-malleable codes allow to avoid these restrictions.


2020 ◽  
Vol 35 (2) ◽  
pp. 158-166
Author(s):  
Jos H. T. Rohling ◽  
Janusz M. Meylahn

Recent mathematical results for the noisy Kuramoto model on a 2-community network may explain some phenomena observed in the functioning of the suprachiasmatic nucleus (SCN). Specifically, these findings might explain the types of transitions to a state of the SCN in which 2 components are dissociated in phase, for example, in phase splitting. In contrast to previous studies, which required additional time-delayed coupling or large variation in the coupling strengths and other variations in the 2-community model to exhibit the phase-split state, this model requires only the 2-community structure of the SCN to be present. Our model shows that a change in the communication strengths within and between the communities due to external conditions, which changes the excitation-inhibition (E/I) balance of the SCN, may result in the SCN entering an unstable state. With this altered E/I balance, the SCN would try to find a new stable state, which might in some circumstances be the split state. This shows that the 2-community noisy Kuramoto model can help understand the mechanisms of the SCN and explain differences in behavior based on actual E/I balance.


Science ◽  
2019 ◽  
Vol 366 (6467) ◽  
pp. 894-897 ◽  
Author(s):  
Christian Kurtscheid ◽  
David Dung ◽  
Erik Busley ◽  
Frank Vewinger ◽  
Achim Rosch ◽  
...  

The quantum state of light plays a crucial role in a wide range of fields, from quantum information science to precision measurements. Whereas complex quantum states can be created for electrons in solid-state materials through mere cooling, optical manipulation and control builds on nonthermodynamic methods. Using an optical dye microcavity, we show that photon wave packets can be split through thermalization within a potential with two minima subject to tunnel coupling. At room temperature, photons condense into a quantum-coherent bifurcated ground state. Fringe signals upon recombination show the relative coherence between the two wells, demonstrating a working interferometer with the nonunitary thermodynamic beam splitter. Our energetically driven optical-state preparation method provides a route for exploring correlated and entangled optical many-body states.


2019 ◽  
Vol 2019 ◽  
pp. 1-8
Author(s):  
Yi Zhao ◽  
Kaitai Liang ◽  
Bo Yang ◽  
Liqun Chen

In leakage resilient cryptography, there is a seemingly inherent restraint on the ability of the adversary that it cannot get access to the leakage oracle after the challenge. Recently, a series of works made a breakthrough to consider a postchallenge leakage. They presented achievable public key encryption (PKE) schemes which are semantically secure against after-the-fact leakage in the split-state model. This model puts a more acceptable constraint on adversary’s ability that the adversary cannot query the leakage of secret states as a whole but the functions of several parts separately instead of prechallenge query only. To obtain security against chosen ciphertext attack (CCA) for PKE schemes against after-the-fact leakage attack (AFL), existing works followed the paradigm of “double encryption” which needs noninteractive zero knowledge (NIZK) proofs in the encryption algorithm. We present an alternative way to achieve AFL-CCA security via lossy trapdoor functions (LTFs) without NIZK proofs. First, we formalize the definition of LTFs secure against AFL (AFLR-LTFs) and all-but-one variants (ABO). Then, we show how to realize this primitive in the split-state model. This primitive can be used to construct AFLR-CCA secure PKE scheme in the same way as the method of “CCA from LTFs” in traditional sense.


2019 ◽  
Vol 759 ◽  
pp. 98-132
Author(s):  
Antonio Faonio ◽  
Jesper Buus Nielsen ◽  
Mark Simkin ◽  
Daniele Venturi
Keyword(s):  

Author(s):  
Divesh Aggarwal ◽  
Nico Döttling ◽  
Jesper Buus Nielsen ◽  
Maciej Obremski ◽  
Erick Purwanto
Keyword(s):  

2019 ◽  
pp. 74-81
Author(s):  
Nataliya Ryabtseva

Purpose. In order to analyze the confessional section of the religious community of Zhytomyr region, the state and development dynamics of registered church and religious institutions totality have been investigated. Methods. The solution of these tasks was carried out using a wide range of general scientific and special methods: dialectical and logical, analysis and synthesis, analytical groups, systems approach, etc. The theoretical basis of the study was the materials of reports about the community of churches and religious organizations in Ukraine. Results. Based on the analyzed data, the confessional structure of religious communities registered in the Zhytomyr region was obtained. The dominant confessions were singled out and the diversity of religious movements, independent of the canonical Church, on the basis of which religious organizations are created in the region, were considered. The digital display shows the problem of Orthodoxy, which today is in a split state. The scientific novelty of the research lies in the analysis of the causes and consequences of Zhytomyr region religious community’s diversity. It is shown that the consequence of religious pluralism in Ukraine is a spiritual crisis in which modern Ukrainian society is located. The practical significance of the study is to obtain a regional section of the problem of complex political and religious relations that occur in our state.


Sign in / Sign up

Export Citation Format

Share Document