Loading [MathJax]/jax/output/CommonHTML/jax.js
Skip main navigation

Cookies Notification

We use cookies on this site to enhance your user experience. By continuing to browse the site, you consent to the use of our cookies. Learn More
×

System Upgrade on Tue, May 28th, 2024 at 2am (EDT)

Existing users will be able to log into the site and access content. However, E-commerce and registration of new users may not be available for up to 12 hours.
For online purchase, please visit us again. Contact us at customercare@wspc.com for any enquiries.

SEARCH GUIDE  Download Search Tip PDF File

  • articleNo Access

    Construction of lattices over the real sub-field of (ς8) for block fading (wiretap) coding

    In this paper, we consider the challenge of ensuring secure communication in block-fading wiretap channels using encoding techniques. We investigate the coding for block-fading wiretap channels using stacked lattice codes constructed over completely real number fields, which is a well-established technique. In this paper, we consider degree-four complex multiplication field 𝒦=(ς8) over . We employ binary codes to generate a lattice over (ς8), which is subsequently used to form an integral lattice. The resulting integral lattice can be effectively applied to enhance the security of communication within block-fading wiretap channels.

  • articleNo Access

    Multi-use Deterministic Public Key Proxy Re-Encryption from Lattices in the Auxiliary-Input Setting

    Proxy Re-Encryption (PRE) is a cryptographic primitive that allows a proxy to turn an Alice’s ciphertext into a Bob’s ciphertext on the same plaintext. All of the PRE schemes are public key encryption and semantic security. Deterministic Public Key Encryption (D-PKE) provides an alternative to randomized public key encryption in various scenarios where the latter exhibits inherent drawbacks. In this paper, we construct the first multi-use unidirectional D-PRE scheme from Lattices in the auxiliary-input setting. We also prove that it is PRIV1-INDr secure in the standard model based on the LWR. Finally, an identity-based D-PRE is obtained from the basic construction.

  • articleNo Access

    Locally definable subgroups of semialgebraic groups

    We prove the following instance of a conjecture stated in [P. E. Eleftheriou and Y. Peterzil, Definable quotients of locally definable groups, Selecta Math. (N.S.) 18(4) (2012) 885–903]. Let G be an abelian semialgebraic group over a real closed field R and let X be a semialgebraic subset of G. Then the group generated by X contains a generic set and, if connected, it is divisible. More generally, the same result holds when X is definable in any o-minimal expansion of R which is elementarily equivalent to an,exp. We observe that the above statement is equivalent to saying: there exists an m such that Σmi=1(XX) is an approximate subgroup of G.

  • articleNo Access

    CIRCUIT INTEGRATION THROUGH LATTICE HYPERTERMS

    Reducing the size of a logic circuit through lattice identities is an important and well-studied discrete optimization problem. In this paper, we consider a related problem of integrating several circuits into a single hypercircuit using the recently developed concept of lattice hyperterms. We give a combinatorial algorithm for integrating k-out-of-n symmetrical diagrams which play an important role in reliability theory. Our results show that the integration can reduce the number of circuit gates by more than twice.

  • articleNo Access

    Sieve algorithms for some orthogonal integer lattices

    We propose in this work a Sieve algorithm that we called OrthogonalInteger sieve algorithm for some orthogonal integer lattices and particularly the case of integer lattices Λn, root lattices of type An (n1) and of type Dn (n2). In these cases, we use the famous LLL algorithm to find the shortest vector of these lattices. Indeed, in general, a sieve algorithm builds a list of short random vectors which are not necessarily in the lattice, and try to produce short lattice vectors by taking linear combinations of the vectors in the list. But in our case, we built a list of short vectors in the lattice. From the first column of the LLL-reduced basis of the considered basis, we have the list of at least n and at most 2n short vectors for the general case (where n is the dimension of the lattice) of orthogonal integer lattices Λn. For the lattices n, An (n1) and Dn (n2), we have, respectively, 2n, n(n+1) and 2n(n1) short vectors. The proposed sieve algorithm for integer lattice n runs in space O(2n) and the OrthogonalInteger sieve algorithm performs O(n2n) arithmetic operations and is polynomial in space.

  • chapterNo Access

    Codes over Fp2 and Fp × Fp, lattices, and theta functions

    Let ℓ > 0 be a square free integer and formula the ring of integers of the imaginary quadratic field formula. Codes C over K determine lattices Λ(C) over rings formula. The theta functions θΛ(C) of such lattices are known to determine the symmetrized weight enumerator swe(C) for small primes p = 2, 3; see [1, 10].

    In this paper we explore such constructions for any p. If p ∤ ℓ then the ring formula is isomorphic to 𝔽p2 or 𝔽p × 𝔽p. Given a code C over formula we define new theta functions on the corresponding lattices. We prove that the theta series θΛ(C) can be written in terms of the complete weight enumerator of C and that θΛ(C) is the same for almost all ℓ. Furthermore, for large enough ℓ, there is a unique complete weight enumerator polynomial which corresponds to θΛ(C).