We study side-channel attacks for the Shannon cipher system. To pose side channel-attacks to the Shannon cipher system, we regard them as a signal estimation via encoded data from two distributed ...sensors. This can be formulated as the one helper source coding problem posed and investigated by Ahlswede, Korner(1975), and Wyner(1975). We further investigate the posed problem to derive new secrecy bounds. Our results are derived by a coupling of the result Watanabe and Oohama(2012) obtained on bounded storage eavesdropper with the exponential strong converse theorem Oohama(2015) established for the one helper source coding problem.
There are two preference-based queries commonly used in database systems: (1) top-k query and (2) skyline query. By combining the ranking rule used in top-\(k\) query and the notion of dominance ...relationships utilized in the skyline query, a top-\(k\) dominating query emerges, providing a new perspective on data processing. This query returns the \(k\) records with the highest domination scores from the dataset. However, the processing of the top-\(k\) dominating query is complex when the dataset operates under a streaming model. With new data being continuously generated while stale data being removed from the database, a continuous top-\(k\) dominating query (cTKDQ) requires that updated results can be returned to users at any time. This work explores the cTKDQ problem and proposes a unique indexing structure, called a Close Dominance Graph (CDG), to support the processing of a cTKDQ. The CDG provides comprehensive information regarding the dominance relationship between records, which is vital in answering a cTKDQ with a limited search space. The update process for a cTKDQ is then converted to a simple update affecting a small portion of the CDG. Experimental results show that this scheme is able to offer much better performance when compared with existing solutions.
Factorization of Square-Free Integers with High Bits Known SANTOSO, Bagus; KUNIHIRO, Noboru; KANAYAMA, Naoki ...
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences,
2008/01/01, 2008-01-01, Letnik:
E91.A, Številka:
1
Journal Article
Recenzirano
In this paper we propose an algorithm of factoring any integer N which has k different prime factors with the same bit-length, when about (1/k+2+ε/k-1)log2N high-order bits of each prime factor are ...given. For a fixed ε, the running time of our algorithm is heuristic polynomial in (log2N). Our factoring algorithm is based on a lattice-based algorithm of solving any k-variate polynomial equation over Z, which might be an independent interest.
We study the universal coding under side-channel attacks posed and investigated by Oohama and Santoso (2022). They proposed a theoretical security model for Shannon cipher system under side-channel ...attacks, where the adversary is not only allowed to collect ciphertexts by eavesdropping the public communication channel, but is also allowed to collect the physical information leaked by the devices where the cipher system is implemented on such as running time, power consumption, electromagnetic radiation, etc. For any distributions of the plain text, any noisy channels through which the adversary observe the corrupted version of the key, and any measurement device used for collecting the physical information, we can derive an achievable rate region for reliability and security such that if we compress the ciphertext with rate within the achievable rate region, then: (1) anyone with secret key will be able to decrypt and decode the ciphertext correctly, but (2) any adversary who obtains the ciphertext and also the side physical information will not be able to obtain any information about the hidden source as long as the leaked physical information is encoded with a rate within the rate region.
Electric vehicles (EVs) and its technology, including the EVs storage system are getting the attention in the last decade. So far, batteries have been the most common storage type for EVs. However, ...several storage technology alternatives are being considered recently, including ultracapacitors (UCs). One prominent characteristic of UC is its high power density -can be up to hundreds times of Li-ion power density- enabling it to be charged or discharged with high power. On the other hand, UC has lower energy density, causing EVs with UCs as sole energy will not have long range. Thus, in electric cars, UCs are more common to be hybridized with batteries as complementary storage. However, as opposed to private cars, transit vehicles such as buses or trams have specific routes and stops with predefined distance. This particular characteristic of transit vehicles is potential to be fulfilled by UCs only, as the UC energy capacity is sufficient for a single route, and afterward it can be fully charged in a few minutes. This paper will present a feasibility study of a UC pure electric transit bus specific to Jakarta, Indonesia. Comparison of battery and UC system for the bus will be presented from both technical and economic aspects.
The supreme court didn’t make the gradation on the evidence law in the process of the law enforcement on the first stage/pre-trial (investigation and introgation) and the second stage/trial ...(prosecution and verdict). Meanwhile, the provisions of article 184 KUHAP is related with the provisions of the next article 185, 186, 187, 188, and 189 KUHAP. That proves that the gradation of legal evidence in article 184 is for the second stage/ trial process. The research method used in this research is normative legal research. The research approach used is the statutory approach, the conceptual approach and the cases approach to coercive measures (dwang middelen) in the alleged occurrence of criminal acts for investigators based on the Criminal Procedure Code and the Constitutional Court Decision Number: 21/ PUU-XII/2014. This study aims to analyze disharmony as a legal consequence of the Constitutional Court Decision No. 21/PUU-XII/2014.
If the verdict of supreme court aquo has the character final and binding, then after 30 days it was decided and declared in the gazette. As the law effect, all measures from the investigator were guided by KUHAP, in the frame of the force effort (dwang middelen) when the determination of the suspect, the arrest, and the detention is called as the breach of the legality principle and the rechtmatigeheid van bestur principle. That measures is null and void (neitigheid van rechtswege), therefore when tested by the pre-trial process about that measures, then the lawsuit filed by the applicant is very feasible and rasionable based on the law and appropriate to be accepted by the judge of pre-trial examiner.
We pose and investigate the distributed secure source coding based on the common key cryptosystem. This cryptosystem includes the secrecy amplification problem for distributed encrypted sources with ...correlated keys using post-encryption-compression, which was posed investigated by Santoso and Oohama. In this paper we propose another new security criterion which is generally more strict compared to the commonly used security criterion which is based on the upper-bound of mutual information between the plaintext and the ciphertext. Under this criterion, we establish the necessary and sufficient condition for the secure transmission of correlated sources.
We are interested in investigating the security of source encryption with a symmetric key under side-channel attacks. In this paper, we propose a general framework of source encryption with a ...symmetric key under the side-channel attacks, which applies to \emph{any} source encryption with a symmetric key and \emph{any} kind of side-channel attacks targeting the secret key. We also propose a new security criterion for strong secrecy under side-channel attacks, which is a natural extension of mutual information, i.e., \emph{the maximum conditional mutual information between the plaintext and the ciphertext given the adversarial key leakage, where the maximum is taken over all possible plaintext distribution}. Under this new criterion, we successfully formulate the rate region, which serves as both necessary and sufficient conditions to have secure transmission even under side-channel attacks. Furthermore, we also prove another theoretical result on our new security criterion, which might be interesting in its own right: in the case of the discrete memoryless source, no perfect secrecy under side-channel attacks in the standard security criterion, i.e., the ordinary mutual information, is achievable without achieving perfect secrecy in this new security criterion, although our new security criterion is more strict than the standard security criterion.
We pose and investigate the distributed secure source coding based on the common key cryptosystem. This cryptosystem includes the secrecy amplification problem for distributed encrypted sources with ...correlated keys using post-encryption-compression, which was previously studied by Santoso and Oohama. In this paper we propose another new security criterion which is generally more strict compared with the commonly used security criterion based on the upper-bound of mutual information between the plaintext and the ciphertext. Under this criterion, we establish the necessary and sufficient condition for the secure transmission of correlated sources.