REESSE1+ . Reward . Proof by Experiment

نویسندگان

  • Shenghui Su
  • Shuwang Lü
چکیده

The authors discuss what is provable security in cryptography. Think that provable security is asymptotic, relative, and dynamic, and only a supplement to but not a replacement of exact security analysis. Because the conjecture P ≠ NP has not been proven yet, and it is possible in terms of the two incompleteness theorems of Kurt Gödel that there is some cryptosystem of which the security cannot or only ideally be proven in the random oracle model, the security of a cryptosystem is between provability and unprovability, and any academic conclusion must be checked and verified with practices or experiments as much as possible. Extra, a new approach to proof of P ≠ NP is pointed out. Lastly, a reward is offered for the subexponential time solutions to the three REESSE1+ problems: MPP, ASPP, and TLP with n ≥ 80 and lg M ≥ 80, which may be regarded as a type of security proof by experiment.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cryptanalysis of REESSE1+ Public Key Cryptosystem

A new public key cryptosystem, called REESSE1+, was proposed. REESSE1 consists of two primitive algorithms, a public key encryptio/decryption algorithm and a digital signature algorithm. We give some analysis to REESSE1+, and show that the system is totally unsecure. We show how to derive the private key from the public key. As the same time, we also show how to forge signatures for any message...

متن کامل

Refuting the Pseudo Attack on the REESSE1+ Cryptosystem

We illustrate through example 1 and 2 that the condition at theorem 1 in [8] dissatisfies necessity, and the converse proposition of fact 1.1 in [8] does not hold, namely the condition Z / M – L / Ak < 1 / (2 Ak ) is not sufficient for f (i) + f (j) = f (k). Illuminate through an analysis and ex.3 that there is a logic error during deduction of fact 1.2, which causes each of fact 1.2, 1.3, 4 to...

متن کامل

Embedded Persuasive Strategies to Obtain Visitors' Data: Comparing Reward and Reciprocity in an Amateur, Knowledge-Based Website

This study compares the relative effectiveness of two different persuasive strategies embedded in the rationale of a website. The visitor is asked for his/her contact information either prior to or after having access to the guidelines for managing multimedia files offered by the site. Asking for personal data prior to access represents a reward strategy for obtaining such data. In contrast, as...

متن کامل

Control of variation by reward probability.

Two bar-press experiments with rats tested the rule that reducing expectation of reward increases the variation from which reward selects. Experiment 1 used a discrete-trial random-interval schedule, with trials signaled by light or sound. One signal always ended with reward; the other signal ended with reward less often. The 2 signals were randomly mixed. Bar-press duration (how long the bar w...

متن کامل

Effects of Material and Non-Material Rewards on Remembering to Do Things for Others

Recent research has shown that pro-social prospective memory, i.e., remembering to do something for others, is negatively affected by the presence of small material rewards. While this competition between pro-social and self-gain motives leads to poor memory for the intention, people do not seem to be aware of the possible collision effects of competing motives (Brandimonte et al., 2010). Exten...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • CoRR

دوره abs/0908.0482  شماره 

صفحات  -

تاریخ انتشار 2009