2,151 research outputs found
Formal Computational Unlinkability Proofs of RFID Protocols
We set up a framework for the formal proofs of RFID protocols in the
computational model. We rely on the so-called computationally complete symbolic
attacker model. Our contributions are: i) To design (and prove sound) axioms
reflecting the properties of hash functions (Collision-Resistance, PRF); ii) To
formalize computational unlinkability in the model; iii) To illustrate the
method, providing the first formal proofs of unlinkability of RFID protocols,
in the computational model
Nonnegative approximations of nonnegative tensors
We study the decomposition of a nonnegative tensor into a minimal sum of
outer product of nonnegative vectors and the associated parsimonious naive
Bayes probabilistic model. We show that the corresponding approximation
problem, which is central to nonnegative PARAFAC, will always have optimal
solutions. The result holds for any choice of norms and, under a mild
assumption, even Bregman divergences.Comment: 14 page
On the typical rank of real binary forms
We determine the rank of a general real binary form of degree d=4 and d=5. In
the case d=5, the possible values of the rank of such general forms are 3,4,5.
The existence of three typical ranks was unexpected. We prove that a real
binary form of degree d with d real roots has rank d.Comment: 12 pages, 2 figure
Trace Equivalence Decision: Negative Tests and Non-determinism
We consider security properties of cryptographic protocols that can be modeled using the notion of trace equivalence. The notion of equivalence is crucial when specifying privacy-type properties, like anonymity, vote-privacy, and unlinkability.
In this paper, we give a calculus that is close to the applied pi calculus and that allows one to capture most existing protocols that rely on classical cryptographic primitives. First, we propose a symbolic semantics for our calculus relying on constraint systems to represent infinite sets of possible traces, and we reduce the decidability of trace equivalence to deciding a notion of symbolic equivalence between sets of constraint systems. Second, we develop an algorithm allowing us to decide whether two sets of constraint systems are in symbolic equivalence or not. Altogether, this yields the first decidability result of trace equivalence for a general class of processes that may involve else branches and/or private channels (for a bounded number of sessions)
On the X-rank with respect to linear projections of projective varieties
In this paper we improve the known bound for the -rank of an
element in the case in which is
a projective variety obtained as a linear projection from a general
-dimensional subspace . Then, if is a curve obtained from a projection of a rational normal curve
from a point , we are
able to describe the precise value of the -rank for those points such that and to improve the general
result. Moreover we give a stratification, via the -rank, of the osculating
spaces to projective cuspidal projective curves . Finally we give a
description and a new bound of the -rank of subspaces both in the general
case and with respect to integral non-degenerate projective curves.Comment: 10 page
Exploring multimodal data fusion through joint decompositions with flexible couplings
A Bayesian framework is proposed to define flexible coupling models for joint
tensor decompositions of multiple data sets. Under this framework, a natural
formulation of the data fusion problem is to cast it in terms of a joint
maximum a posteriori (MAP) estimator. Data driven scenarios of joint posterior
distributions are provided, including general Gaussian priors and non Gaussian
coupling priors. We present and discuss implementation issues of algorithms
used to obtain the joint MAP estimator. We also show how this framework can be
adapted to tackle the problem of joint decompositions of large datasets. In the
case of a conditional Gaussian coupling with a linear transformation, we give
theoretical bounds on the data fusion performance using the Bayesian Cramer-Rao
bound. Simulations are reported for hybrid coupling models ranging from simple
additive Gaussian models, to Gamma-type models with positive variables and to
the coupling of data sets which are inherently of different size due to
different resolution of the measurement devices.Comment: 15 pages, 7 figures, revised versio
Approximate matrix and tensor diagonalization by unitary transformations: convergence of Jacobi-type algorithms
We propose a gradient-based Jacobi algorithm for a class of maximization
problems on the unitary group, with a focus on approximate diagonalization of
complex matrices and tensors by unitary transformations. We provide weak
convergence results, and prove local linear convergence of this algorithm.The
convergence results also apply to the case of real-valued tensors
Multiarray Signal Processing: Tensor decomposition meets compressed sensing
We discuss how recently discovered techniques and tools from compressed
sensing can be used in tensor decompositions, with a view towards modeling
signals from multiple arrays of multiple sensors. We show that with appropriate
bounds on a measure of separation between radiating sources called coherence,
one could always guarantee the existence and uniqueness of a best rank-r
approximation of the tensor representing the signal. We also deduce a
computationally feasible variant of Kruskal's uniqueness condition, where the
coherence appears as a proxy for k-rank. Problems of sparsest recovery with an
infinite continuous dictionary, lowest-rank tensor representation, and blind
source separation are treated in a uniform fashion. The decomposition of the
measurement tensor leads to simultaneous localization and extraction of
radiating sources, in an entirely deterministic manner.Comment: 10 pages, 1 figur
- …
