Explore chapters and articles related to this topic
Authenticating query results based on the bilinear-map accumulator tree
Published in Amir Hussain, Mirjana Ivanovic, Electronics, Communications and Networks IV, 2015
Definition 1 (Negligible function) if for any positive polynomial p(k), there exits N such that for all k>N,/v(k)/<1/p(k). So a real-valued function v(k) over natural numbers is negligible. We call a negligible function v(k) by saying v(k) is neg (k).
*Post-Quantum Cryptography
Published in Jonathan Katz, Yehuda Lindell, Introduction to Modern Cryptography, 2020
Because H is a one-way function, there is a negligible function negl such that negl(n)≥Pr[lnvertℐ,H(n)=1].
Optimal security parameter for encrypted control systems against eavesdropper and malicious server
Published in SICE Journal of Control, Measurement, and System Integration, 2023
Kaoru Teranishi, Kiminao Kogiso
Consider the updatable homomorphic encryption in Example 2.4. Suppose an adversary has , , and . There exists a negligible function such that and for all , for any , and for any , where , , and and are adversary's estimates of and , respectively. Note that a function is called a negligible function if for every there exists such that holds for all .
A novel appliance-based secure data aggregation scheme for bill generation and demand management in smart grids
Published in Connection Science, 2021
Yihui Dong, Jian Shen, Sai Ji, Rongxin Qi, Shuai Liu
For the security parameter κ, and ∀ input x, there exists a negligible function , then For the PPT algorithm Samp on , there exists circuits and with indistinguishable functions, that is Then there exists a PPT distinguisher algorithm and
Analysing risk to function fulfilment: applying the function integrity diagnosis and documentation method
Published in Journal of Engineering Design, 2021
Robert Lawrence Wichmann, Kilian Gericke, Boris Eisenbart
During discussions, the fever chart visualisations made further prioritisation methods (rankings, pareto charts, etc.) unnecessary. This form of visualisation emphasised the immediate need to analyse Process B (Release of Clamp Load 1) as it is essential for the functionality of the use case and poses a significant degree of risk. Through applying the documentation of the extended FIDD FMEA (Figure 4) the discussion was quickly directed to consider process and embodiment changes to reduce the functional dependency or lower the accompanying technical risks. In addition, not only did this method support prioritisation for risk mitigation, it also supported identifying potential design opportunities. Processes E and K (Dampen Shock) were determined to have a negligible function contribution and posed an insignificant degree of risk. Through this analysis, it created argumentation to entirely eliminate these processes and the involved components.