トップ 最新 追記

MarriageTheoremのこと

2011|10|11|12|
2012|01|02|03|04|05|06|07|08|09|10|11|12|
2013|01|02|03|04|05|06|07|08|09|10|11|12|
2014|01|02|03|04|05|06|07|08|09|10|11|12|
2015|01|02|03|04|05|06|07|08|09|10|11|12|
2016|01|02|03|04|05|10|
2017|01|02|04|
2018|02|10|
2020|04|09|
2021|04|

2012-12-01

_ (12/2記:百貨店の香水売り場のアウェー感が半端なかった件。)


2012-12-02

_ arXiv:math 11月1日分まで、IACR ePrint 2012/678まで確認済み

_ 気になった論文1:A Necessary Solution Condition for Sudoku, Thomas Fischer, http://jp.arxiv.org/abs/1210.6343

We develop a new discrete mathematical model which includes the classical Sudoku puzzle, Latin Squares and gerechte designs. This problem is described by integer equations and a special type of inequality constraint. We consider solutions of this generalized problem and derive a necessary condition on these solutions. The results are illustrated with examples.

_ 気になった論文2:An Inequality for the Sum of Independent Bounded Random Variables, Christopher R. Dance, http://jp.arxiv.org/abs/1210.6484

We give a simple inequality for the sum of independent bounded random variables. This inequality improves on the celebrated result of Hoeffding in a special case. It is optimal in the limit where the sum tends to a Poisson random variable.

_ 気になった論文3:Coxeter Cochain Complexes, Michael Larsen, Ayelet Lindenstrauss, http://jp.arxiv.org/abs/1210.7254

We define the Coxeter cochain complex of a Coxeter group (G,S) with coefficients in a Z[G]-module A. This is closely related to the complex of simplicial cochains on the abstract simplicial complex I(S) of the commuting subsets of S. We give some representative computations of Coxeter cohomology and explain the connection between the Coxeter cohomology for groups of type A, the (singular) homology of certain configuration spaces, and the (Tor) homology of certain local Artin rings.

_ 気になった論文4:Polynomial time cryptanalysis of noncommutative-algebraic key exchange protocols, Boaz Tsaban, http://jp.arxiv.org/abs/1210.8114

We introduce the \emph{linear centralizer method} for a passive adversary to extract the shared key in group-theory based key exchange protocols (KEPs). We apply this method to obtain a polynomial time cryptanalysis of the \emph{Commutator KEP}, introduced by Anshel--Anshel--Goldfeld in 1999 and considered extensively ever since. We also apply this method to the \emph{Centralizer KEP}, introduced by Shpilrain--Ushakov in 2006.

Our method is proved to be of polynomial time using a technical lemma about sampling invertible matrices from a linear space of matrices.

_ 気になった論文5:Non-associative public-key cryptography, Arkadius Kalka, http://jp.arxiv.org/abs/1210.8270

We introduce a generalized Anshel-Anshel-Goldfeld (AAG) key establishment protocol (KEP) for magmas. This leads to the foundation of non-associative public-key cryptography (PKC), generalizing the concept of non-commutative PKC. We show that left selfdistributive systems appear in a natural special case of a generalized AAG-KEP for magmas, and we propose, among others instances, concrete realizations using $f$-conjugacy in groups and shifted conjugacy in braid groups. We discuss the advantages of our schemes compared with the classical AAG-KEP based on conjugacy in braid groups.


2012-12-03

_ arXiv:math 11月4日分まで、IACR ePrint 2012/678まで確認済み

_ 気になった論文1:The homeomorphism problem for closed 3-manifolds, Peter Scott, Hamish Short, http://jp.arxiv.org/abs/1211.0264

We give a more geometric approach to an algorithm for deciding whether two hyperbolic 3-manifolds are homeomorphic. We also give a more algebraic approach to the homeomorphism problem for geometric, but non-hyperbolic, 3-manifolds.

_ 気になった論文2:On mutually unbiased bases: Passing from d to d**2, Maurice Robert Kibler, http://jp.arxiv.org/abs/1210.8173

We show how to transform the problem of finding d+1 mutually unbiased bases in the d-dimensional Hilbert space into the one of finding d(d+1) vectors in the N-dimensional Hilbert space with N=d**2. The transformation formulas admit a solution when d is a prime number.


2012-12-04

_ すっかり冬らしくなった空気にまたしても喉がやられてしまった。

_ arXiv:math 11月5日分まで、IACR ePrint 2012/678まで確認済み


2012-12-05

_ arXiv:math 11月6日分まで、IACR ePrint 2012/678まで確認済み


2012-12-06

_ (12/7記:この日は2箇所で打ち合わせがあったこともあり、仕事らしい仕事をしている時間よりも移動時間の方が長かった。)


2012-12-07

_ (12/10記:この日はミーティング中に大きな地震があって(ミーティング室のあたりは震度4ぐらいだったらしい)さすがにミーティングが少し中断したのだが、揺れのピークは過ぎたとはいえまだかなり揺れが残っている時点で平然と「で、さっきの話ですけど」みたいなノリで議論を再開しようとした某氏は素晴らしいと思った。)


2012-12-08

_ (12/10記:最近、休日になると休んでしまう。相当体力的にこたえているのだろうなぁ。)


2012-12-09

_ (12/10記:昼食に坦々麺を作ったときに人参を大量に投入しすぎて、坦々麺というより「人参スープ(麺と野菜入り)」みたいな有様になってしまった。)


2012-12-10

_ 今日は筑波大学のリスク工学研究会という催しで、暗号と数学の関わりをテーマに1時間ほど話してきた。学生さんの反応はよくわからなかった(←追記:某氏によれば学生さんにも面白がってもらえたらしい。よかったよかった)のだけど、先生方や司会進行の某871氏にはそれなりに面白がってもらえた(色々な意味で)みたいなのでその点はよかったなぁと思っている。ただ、喉の具合を鑑みて途中で水分補給しながら喋るつもりが、熱が入りすぎてぶっ通しで喋り続けてしまったので、明日喉が無事であることを切に願う。

_ 何の話かは書かないが、書面で強い表現を使いつつ口頭で「あまり固く受け取らないように」と言うぐらいなら、書面の段階でもっと緩い表現に改めてほしいものである。検証可能な形で後に残るのは書面だけなのだから。

_ arXiv:math 11月6日分まで、IACR ePrint 2012/687まで確認済み

_ 気になった論文:The k-BDH Assumption Family: Bilinear Map Cryptography from Progressively Weaker Assumptions, Karyn Benson and Hovav Shacham and Brent Waters, http://eprint.iacr.org/2012/687

Over the past decade bilinear maps have been used to build a large variety of cryptosystems. In addition to new functionality, we have concurrently seen the emergence of many strong assumptions. In this work, we explore how to build bilinear map cryptosystems under progressively weaker assumptions. We propose $k$-BDH, a new family of progressively weaker assumptions that generalizes the decisional bilinear Diffie-Hellman (DBDH) assumption. We give evidence in the generic group model that each assumption in our family is strictly weaker than the assumptions before it. DBDH has been used for proving many schemes secure, notably identity-based and functional encryption schemes; we expect that our $k$-BDH will lead to generalizations of many such schemes. To illustrate the usefulness of our $k$-BDH family, we construct a family of selectively secure Identity-Based Encryption (IBE) systems based on it. Our system can be viewed as a generalization of the Boneh-Boyen IBE, however, the construction and proof require new ideas to fit the family. We then extend our methods to produces hierarchical IBEs and CCA security; and give a fully secure variant. In addition, we discuss the opportunities and challenges of building new systems under our weaker assumption family.


2012-12-11

_ arXiv:math 11月8日分まで、IACR ePrint 2012/692まで確認済み

_ 気になった論文1:Cryptography Using CAPTCHA Puzzles, Abishek Kumarasubramanian and Rafail Ostrovsky and Omkant Pandey and Akshay Wadia, http://eprint.iacr.org/2012/689

A \captcha is a puzzle that is easy for humans but hard to solve for computers. A formal framework, modelling \captcha puzzles (as hard AI problems), was introduced by Ahn, Blum, Hopper, and Langford (\cite{AhnBHL03}, Eurocrypt 2003). Despite their attractive features and wide adoption in practice, the use of \captcha puzzles for general cryptographic applications has been limited.

In this work, we explore various ways to formally model \captcha puzzles and their human component and explore new applications for \captcha. We show that by defining \captcha with additional (strong but realistic) properties, it is possible to broaden \captcha applicability, including using it to learning a machine's ``secret internal state.'' To facilitate this, we introduce the notion of an human-extractable \captcha, which we believe may be of independent interest. We show that this type of \captcha yields a \emph{constant round} protocol for \emph{fully} concurrent non-malleable zero-knowledge. To enable this we also define and construct a \captcha -based commitment scheme which admits ``straight line'' extraction.

We also explore \captcha definitions in the setting of Universal Composability (UC). We show that there are two (incomparable) ways to model \captcha within the UC framework that lead to different results. In particular, we show that in the so called \emph{indirect access model}, for every polynomial time functionality $\calf$ there exists a protocol that UC-realizes $\calf$ using human-extractable \captcha, while for the so-called \emph{direct access model}, UC is impossible, even with the help of human-extractable \captcha.

The security of our constructions using human-extractable \captcha is proven against the (standard) class of all polynomial time adversaries. In contrast, most previous works guarantee security only against a very limited class of adversaries, called the \emph{conservative} adversaries.

_ 気になった論文2:Integrated PKE and PEKS - Stronger Security Notions and New Constructions, Yu Chen and Jiang Zhang and Zhenfeng Zhang and Dongdai Lin, http://eprint.iacr.org/2012/692

In this paper we investigate the security for integrated public-key encryption (PKE) and public-key encryption with keyword search (PEKS) schemes. We observe that the security notions for integrated PKE and PEKS schemes considered in the existing literature are not strong enough to capture practical attacks, thus define a new notion named joint CCA-security which is shown to be stronger than the previous ones. We also propose two simple and efficient constructions of jointly CCA-secure integrated PKE and PEKS schemes from anonymous (hierarchical) identity- based encryption schemes. Besides, we review the consistency for PEKS schemes and improve previous results.


2012-12-12

_ arXiv:math 11月18日分まで、IACR ePrint 2012/692まで確認済み

_ 気になった論文1:On the subgroups of the group $\Z_m \times \Z_n$, Mario Hampejs, Nicki Holighaus, László Tóth, Christoph Wiesmeyr, http://jp.arxiv.org/abs/1211.1797

We discuss properties of the subgroups of the group $\Z_m \times \Z_n$, where $m$ and $n$ are arbitrary positive integers. Simple formulae for the total number of subgroups and the number of subgroups of a given order are deduced. The cyclic subgroups and subgroups of a given exponent are also considered.

_ 気になった論文2:Copies of classical logic in intuitionistic logic, Jaime Gaspar, http://jp.arxiv.org/abs/1211.1850

Classical logic (the logic of non-constructive mathematics) is stronger than intuitionistic logic (the logic of constructive mathematics). Despite this, there are copies of classical logic in intuitionistic logic. All copies usually found in the literature are the same. This raises the question: is the copy unique? We answer negatively by presenting three different copies.

_ 気になった論文3:C(6) groups do not contain F_2 X F_2, Hadi Bigdely, Daniel T. Wise, http://jp.arxiv.org/abs/1211.1998

We show that a group with a presentation satisfying the C(6) small cancellation condition cannot contain a subgroup isomorphic to F_2 X F_2.


2012-12-13

_ (12/14記:今回の衆議院議員選挙のために投票先を検討していたところ、小選挙区でも比例代表でも私と妻の意見が一致するという極めて珍しい現象が発生した。今回はよほどまともな選択肢が少ないらしい。)


2012-12-14

_ (12/16記:この日は某SCISの予稿提出〆切だったため、いつものミーティングが皆さんの原稿最終チェックでてんてこまいになっていた。)


2012-12-15

_ (12/16記:翌日から出張のため、選挙の不在者投票を済ませてきた。)


2012-12-16

_ (12/17記:今回の選挙は本当にろくでもない結果になったものだと落胆しているが、嘆いているだけでは仕方がないので、自分に何ができるかを考えて少しずつでも実行に移していこうと気合を入れ直した。)


2012-12-17

_ 出張でインドに滞在中。夕食会場行きの送迎バスに乗り損ねた件。まぁ、帰りのバスに乗り損ねるよりダメージは軽いと前向きに考えておこう。


2012-12-18

_ (12/19記:数学の発表を英語で60分間行うのって7年ぶりぐらいだったのか。懐かしい。そしてまたしても夕食を逃してしまった件…)


2012-12-19

_ arXiv:math 11月18日分まで、IACR ePrint 2012/708まで確認済み


2012-12-20

_ インド出張、発表の後半戦が無事終了(5分ほど時間超過したのを「無事」と言っていいかはともかく)。話の内容はさておき、扇子遣いがあまり受けなかったのが反省材料である。


2012-12-21

_ インド出張から帰国。カルチャーギャップで体調をくずすことはなかった。


2012-12-22

_ (12/23記:出張疲れでだらけていたら一日が終わってしまった。)


2012-12-23

_ (12/24記:出張疲れでのんびりしていたら一日が終わ(後略))


2012-12-24

_ arXiv:math 11月18日分まで、IACR ePrint 2012/711まで確認済み

_ 気になった論文:Non Observability in the Random Oracle Model, Prabhanjan Ananth and Raghav Bhaskar, http://eprint.iacr.org/2012/710

The Random Oracle Model, introduced by Bellare and Rogaway, provides a method to heuristically argue about the security of cryptographic primitives and protocols. The basis of this heuristic is that secure hash functions are close enough to random functions in their behavior, and so, a primitive that is secure using a random function should continue to remain secure even when the random function is replaced by a real hash function. In the security proof, this setting is realized by modeling the hash function as a random oracle. However, this approach in particular also enables any reduction, reducing a hard problem to the existence of an adversary, to \emph{observe} the queries the adversary makes to its random oracle and to \emph{program} the responses that the oracle provides to these queries. While, the issue of programmability of query responses has received a lot of attention in the literature, to the best of our knowledge, observability of the adversary's queries has not been identified as an artificial artefact of the Random Oracle Model. In this work, we study the security of several popular schemes when the security reduction cannot ``observe'' the adversary's queries to the random oracle, but can (possibly) continue to ``program'' the query responses. We first show that RSA-PFDH and Schnorr's signatures continue to remain secure when the security reduction is non observing (NO reductions), which is not surprising as their proofs in the random oracle model rely on programmability. We also provide two example schemes, namely, Fischlin's NIZK-PoK \cite{Fischlin05} and non interactive extractable commitment scheme, extractor algorithms of which seem to rely on observability in the random oracle model. While we prove that Fischlin's online extractors cannot exist when they are non observing, our extractable commitment scheme continues to be secure even when the extractors are non observing. We also introduce Non Observing Non Programming reductions which we believe are closest to standard model reductions.


2012-12-25

_ (12/29記:晩御飯に食べた鶏肉の炒め物が絶品だった。)


2012-12-26

_ (12/29記:この日は「第4回暗号及び情報セキュリティと数学の相関ワークショップ」(CRISMATH 2012)の日だった。講演3件とも非常に濃い内容で、それに伴い質疑応答の時間にも濃い議論ができて充実した会になったと思う。講演者と参加者の皆様に深く感謝。)


2012-12-27

_ (12/29記:翌日は海外出張で休日勤務した代休を取っているということで、この日が今年の出勤納め(「仕事納め」と書かないのがミソ)。)


2012-12-28

_ (12/29記:arXiv:math 11月18日分まで、IACR ePrint 2012/723まで確認済み)


2012-12-29

_ arXiv:math 11月18日分まで、IACR ePrint 2012/727まで確認済み

_ 大掃除をちょっとだけ手伝った。


2012-12-30

_ (2013年1月1日記:久々にものすごい勢い(本人比)で論文を書いていた。)


2012-12-31

_ (2013年1月1日記:大晦日ということで、夕食に蕎麦を食べた。蕎麦を茹でるのは久々だったけれども無事にできたので、終わり良ければすべて良し、ということで。)


トップ 最新 追記

最近のツッコミ↓

↑最近のツッコミ
合計: 今日: 昨日:

README 日記の書き方 footnote.rb @Twitter 中の人のページ研究関係
Cryptology ePrint Archive