Processing math: 100%
Skip main navigation

Cookies Notification

We use cookies on this site to enhance your user experience. By continuing to browse the site, you consent to the use of our cookies. Learn More
×

System Upgrade on Tue, May 28th, 2024 at 2am (EDT)

Existing users will be able to log into the site and access content. However, E-commerce and registration of new users may not be available for up to 12 hours.
For online purchase, please visit us again. Contact us at customercare@wspc.com for any enquiries.

SEARCH GUIDE  Download Search Tip PDF File

  • articleNo Access

    ORACLES IN formula ARE SUFFFICIENT FOR EXACT LEARNING

    We study the learnability of representation classes in Angluin's exact learning model. In particular, we consider the following three query types: equivalence queries, equivalence and membership queries, and membership queries only. We show in all three cases that polynomial query complexity implies already polynomial-time learnability, provided that the learner additionally has access to an oracle in formula. It follows that boolean circuits are polynomial-time learnable with equivalence queries and the help of an oracle in formula.a

  • articleNo Access

    On an Almost-Universal Hash Function Family with Applications to Authentication and Secrecy Codes

    Universal hashing, discovered by Carter and Wegman in 1979, has many important applications in computer science. MMH, which was shown to be Δ-universal by Halevi and Krawczyk in 1997, is a well-known universal hash function family. We introduce a variant of MMH, that we call GRDH, where we use an arbitrary integer n>1 instead of prime p and let the keys x=x1,,xkkn satisfy the conditions gcd(xi,n)=ti (1ik), where t1,,tk are given positive divisors of n. Then via connecting the universal hashing problem to the number of solutions of restricted linear congruences, we prove that the family GRDH is an 𝜀-almost-Δ-universal family of hash functions for some 𝜀<1 if and only if n is odd and gcd(xi,n)=ti=1(1ik). Furthermore, if these conditions are satisfied then GRDH is 1p1-almost-Δ-universal, where p is the smallest prime divisor of n. Finally, as an application of our results, we propose an authentication code with secrecy scheme which strongly generalizes the scheme studied by Alomair et al. [J. Math. Cryptol.4 (2010) 121–148], and [J.UCS15 (2009) 2937–2956].

  • articleNo Access

    FUZZY UNIVERSAL HASHING AND APPROXIMATE AUTHENTICATION

    Traditional data authentication systems are sensitive to single bit changes and so are unsuitable for message spaces that are naturally "fuzzy" where "similar" messages are considered "the same" or indistinguishable. In this paper, we study unconditionally secure approximate authentication. We generalize traditional universal hashing to fuzzy universal hashing and use it to construct secure approximate authentication for multiple messages.