Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

2017

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 2611 - 2640 of 12521

Full-Text Articles in Physical Sciences and Mathematics

Upper Limits On Gravitational Waves From Scorpius X-1 From A Model-Based Cross-Correlation Search In Advanced Ligo Data, Benjamin P. Abbott, Marco Cavaglia, For Full List Of Authors, See Publisher's Website. Sep 2017

Upper Limits On Gravitational Waves From Scorpius X-1 From A Model-Based Cross-Correlation Search In Advanced Ligo Data, Benjamin P. Abbott, Marco Cavaglia, For Full List Of Authors, See Publisher's Website.

Physics Faculty Research & Creative Works

We present the results of a semicoherent search for continuous gravitational waves from the low-mass X-ray binary Scorpius X-1, using data from the first Advanced LIGO observing run. The search method uses details of the modeled, parametrized continuous signal to combine coherently data separated by less than a specified coherence time, which can be adjusted to trade off sensitivity against computational cost. A search was conducted over the frequency range 25-2000 Hz, spanning the current observationally constrained range of binary orbital parameters. No significant detection candidates were found, and frequency-dependent upper limits were set using a combination of sensitivity estimates …


Long-Range Interactions Of Hydrogen Atoms In Excited States. Iii. Ns−1s Interactions For N ≥ 3, Chandra M. Adhikari, V. Debierre, Ulrich D. Jentschura Sep 2017

Long-Range Interactions Of Hydrogen Atoms In Excited States. Iii. Ns−1s Interactions For N ≥ 3, Chandra M. Adhikari, V. Debierre, Ulrich D. Jentschura

Physics Faculty Research & Creative Works

The long-range interaction of excited neutral atoms has a number of interesting and surprising properties such as the prevalence of long-range oscillatory tails and the emergence of numerically large van der Waals C6 coefficients. Furthermore, the energetically quasidegenerate nP states require special attention and lead to mathematical subtleties. Here we analyze the interaction of excited hydrogen atoms in nS states (3 ≤ n ≤ 12) with ground-state hydrogen atoms and find that the C6 coefficients roughly grow with the fourth power of the principal quantum number and can reach values in excess of 240000 (in atomic units) for states …


Recent Advances In Understanding The Structure And Properties Of Amorphous Oxide Semiconductors, Julia E. Medvedeva, D. B. Buchholz, Robert P. H. Chang Sep 2017

Recent Advances In Understanding The Structure And Properties Of Amorphous Oxide Semiconductors, Julia E. Medvedeva, D. B. Buchholz, Robert P. H. Chang

Physics Faculty Research & Creative Works

Amorphous oxide semiconductors (AOSs)--ternary or quaternary oxides of post-transition metals such as In-Sn-O, Zn-Sn-O, or In-Ga-Zn-O–have been known for a decade and have attracted a great deal of attention as they possess several technological advantages, including low-temperature large-area deposition, mechanical flexibility, smooth surfaces, and high carrier mobility that is an order of magnitude larger than that of amorphous silicon (a-Si:H). Compared to their crystalline counterparts, the structure of AOSs is extremely sensitive to deposition conditions, stoichiometry, and composition, giving rise to a wide range of tunable optical and electrical properties. The large parameter space and the resulting complex deposition--structure--property relationships …


Luminescence In Lithium Borates, Brant E. Kananen Sep 2017

Luminescence In Lithium Borates, Brant E. Kananen

Theses and Dissertations

Spectrometry methods are used to identify and characterize point defects in single crystals of lithium tetraborate (Li2B4O7) and lithium triborate (LiB3O5) doped with silver or copper, and explore the role of these point defects in luminescence. New defects are identified in Ag-doped including: lithium vacancy substitutional-silver-ion defect-pairs (hole trap); isolated lithium vacancies (hole trap); isolated oxygen vacancies (electron trap); interstitial-silver-ion substitutional-silver-ion defect pairs (electron trap); isolated interstitial silver ions (electron trap); and interstitial-silver-ion lithium-vacancy defect pairs (electron trap). Defect models are proposed, and adjustments made to defect models known defects. …


Jacobsville Sandstone: A Candidate For Nomination For “Global Heritage Stone Resource” From Michigan, Usa, William I. Rose, Erika C. Vye, Carol A. Stein, David H. Malone, John P. Craddock, Seth A. Stein Sep 2017

Jacobsville Sandstone: A Candidate For Nomination For “Global Heritage Stone Resource” From Michigan, Usa, William I. Rose, Erika C. Vye, Carol A. Stein, David H. Malone, John P. Craddock, Seth A. Stein

Faculty Publications-- Geography, Geology, and the Environment

Information mainly collected decades ago, during and following its quarrying years, is here reviewed for the Jacobsville Sandstone, a well-known red bed sandstone of Neoproterozoic age from Upper Michigan, USA. This formation is here proposed as a suitable “Global Heritage Stone Resource”. The Jacobsville is an excellent example of a heritage stone as it was used extensively all over Eastern North America from 1880 to 1920 in hundreds of prominent buildings in major cities and many small towns, including the famous Waldorf Astoria Hotel in New York City. It was extensively mined from several quarry sites near Jacobsville, Michigan in …


Umphlett Qci Sept 2017, Natalie Umphlett Sep 2017

Umphlett Qci Sept 2017, Natalie Umphlett

High Plains Regional Climate Center: Personnel Publications

Highlights for the Basin

Temperature and Precipitation Anomalies

Drought

Wildfires Impact Montana and Beyond

Kansas City, MO Area Flooding

Numerous Impacts to Agriculture

3-Month Precipitation and Temperature Outlooks

U.S. Seasonal Drought Outlook


A Combinatorial Framework For Multiple Rna Interaction Prediction, Syed Ali Ahmed Sep 2017

A Combinatorial Framework For Multiple Rna Interaction Prediction, Syed Ali Ahmed

Dissertations, Theses, and Capstone Projects

The interaction of two RNA molecules involves a complex interplay between folding and binding that warranted recent developments in RNA-RNA interaction algorithms. However, biological mechanisms in which more than two RNAs take part in an interaction also exist.

A typical algorithmic approach to such problems is to find the minimum energy structure. Often the computationally optimal solution does not represent the biologically correct structure of the interaction. In addition, different biological structures may be observed, depending on several factors. Furthermore, scoring techniques often miss critical details about dependencies within different parts of the structure, which typically leads to lower scores …


Enhancing The Teaching And Learning Of Biometeorology In Higher Education, David R. Perkins Iv, Jennifer Vanos, Christopher Fuhrmann, Michael Allen, David Knight, Cameron C. Lee, Angela Lees, Andrew Leung, Rebekah Lucas, Hamed Mehdipor Sep 2017

Enhancing The Teaching And Learning Of Biometeorology In Higher Education, David R. Perkins Iv, Jennifer Vanos, Christopher Fuhrmann, Michael Allen, David Knight, Cameron C. Lee, Angela Lees, Andrew Leung, Rebekah Lucas, Hamed Mehdipor

Political Science & Geography Faculty Publications

Information about the annual meeting organized by the organizations the International Society of Biometeorology (ISB) and the Students and New Professionals (SNP) held in Norfolk, Virginia from July 28 to August 1, 2016 is presented. The event was organized to improve the teaching methods of teachers and learning of students on high education biometeorology and the presentations, practical sessions and group discussions participated by attendees.


Personal Data Protection Act 2012: Understanding The Consent Obligation, Man Yip Sep 2017

Personal Data Protection Act 2012: Understanding The Consent Obligation, Man Yip

Research Collection Yong Pung How School Of Law

The Personal Data Protection Act 20121 (“PDPA”) provides the baseline standards of protection of personal data and works in tandem with existing law to provide comprehensive protection. The birth of the legislation clearly signals Singapore’s commitment to protect the collection, use and disclosure of personal data in the age of big data and its awareness of the importance of such protection in strengthening Singapore’s position as a leading commercial hub. Significantly, the PDPA protection model balances “both the rights of individuals to protect their personal data” against “the needs of organisations to collect, use or disclose personal data for legitimate …


All-Sky Search For Periodic Gravitational Waves In The O1 Ligo Data, Benjamin P. Abbott, Marco Cavaglia, For Full List Of Authors, See Publisher's Website. Sep 2017

All-Sky Search For Periodic Gravitational Waves In The O1 Ligo Data, Benjamin P. Abbott, Marco Cavaglia, For Full List Of Authors, See Publisher's Website.

Physics Faculty Research & Creative Works

We report on an all-sky search for periodic gravitational waves in the frequency band 20-475 Hz and with a frequency time derivative in the range of [-1.0,+0.1] x 10-8 Hz/s. Such a signal could be produced by a nearby spinning and slightly nonaxisymmetric isolated neutron star in our galaxy. This search uses the data from Advanced LIGO's first observational run, O1. No periodic gravitational wave signals were observed, and upper limits were placed on their strengths. The lowest upper limits on worst-case (linearly polarized) strain amplitude h0 are ∼4 x 10-25 near 170 Hz. For a circularly …


A Big Data Analytics Method For Tourist Behaviour Analysis, Shah Jahan Miah, Huy Quan Vu, John Gammack, Michael Mcgrath Sep 2017

A Big Data Analytics Method For Tourist Behaviour Analysis, Shah Jahan Miah, Huy Quan Vu, John Gammack, Michael Mcgrath

All Works

© 2016 Elsevier B.V. Big data generated across social media sites have created numerous opportunities for bringing more insights to decision-makers. Few studies on big data analytics, however, have demonstrated the support for strategic decision-making. Moreover, a formal method for analysing social media-generated big data for decision support is yet to be developed, particularly in the tourism sector. Using a design science research approach, this study aims to design and evaluate a ‘big data analytics’ method to support strategic decision-making in tourism destination management. Using geotagged photos uploaded by tourists to the photo-sharing social media site, Flickr, the applicability of …


Images Of Mathematics Held By Undergraduate Students, Basanta Raj Lamichhane, Shashidhar Belbase Sep 2017

Images Of Mathematics Held By Undergraduate Students, Basanta Raj Lamichhane, Shashidhar Belbase

All Works

The purpose of this study was to explore images of mathematics held by undergraduate students and possible influencing factors. The image of mathematics in this study was conceptualized as the mental representations or views of mathematics as undergraduate students experienced during their academic journey through the interaction largely at school. Pierre Bourdieu’s construct of symbolic violence served as the theoretical lens to evaluate the students' images of mathematics. The design of this study was explorative qualitative and interpretive. Semi-structured interview was used to generate data texts from three participants who were senior undergraduate students studying mathematics at an affiliated college …


Global Capacity, Potentials And Trends Of Solid Waste Research And Management, Michael A. Nwachukwu, Mersky Ronald, Huan Feng Sep 2017

Global Capacity, Potentials And Trends Of Solid Waste Research And Management, Michael A. Nwachukwu, Mersky Ronald, Huan Feng

Department of Earth and Environmental Studies Faculty Scholarship and Creative Works

In this study, United States, China, India, United Kingdom, Nigeria, Egypt, Brazil, Italy, Germany, Taiwan, Australia, Canada and Mexico were selected to represent the global community. This enabled an overview of solid waste management worldwide and between developed and developing countries. These are countries that feature most in the International Conference on Solid Waste Technology and Management (ICSW) over the past 20 years. A total of 1452 articles directly on solid waste management and technology were reviewed and credited to their original country of research. Results show significant solid waste research potentials globally, with the United States leading by 373 …


A Regression Model To Predict Stock Market Mega Movements And/Or Volatility Using Both Macroeconomic Indicators & Fed Bank Variables, Timothy A. Smith, Alcuin Rajan Sep 2017

A Regression Model To Predict Stock Market Mega Movements And/Or Volatility Using Both Macroeconomic Indicators & Fed Bank Variables, Timothy A. Smith, Alcuin Rajan

Publications

In finance, regression models or time series moving averages can be used to determine the value of an asset based on its underlying traits. In prior work we built a regression model to predict the value of the S&P 500 based on macroeconomic indicators such as gross domestic product, money supply, produce price and consumer price indices. In this present work this model is updated both with more data and an adjustment in the input variables to improve the coefficient of determination. A scheme is also laid out to alternately define volatility rather than using common tools such as the …


2017 September - Tennessee Monthly Climate Report, Tennessee Climate Office, East Tennessee State University Sep 2017

2017 September - Tennessee Monthly Climate Report, Tennessee Climate Office, East Tennessee State University

Tennessee Climate Office Monthly Report

No abstract provided.


Search For Neutrinos From Dark Matter Self-Annihilations In The Center Of The Milky Way With 3 Years Of Icecube/Deepcore, Karen Andeen, Icecube Collaboration Sep 2017

Search For Neutrinos From Dark Matter Self-Annihilations In The Center Of The Milky Way With 3 Years Of Icecube/Deepcore, Karen Andeen, Icecube Collaboration

Physics Faculty Research and Publications

We present a search for a neutrino signal from dark matter self-annihilations in the Milky Way using the IceCube Neutrino Observatory (IceCube). In 1005 days of data we found no significant excess of neutrinos over the background of neutrinos produced in atmospheric air showers from cosmic ray interactions. We derive upper limits on the velocity averaged product of the dark matter self-annihilation cross section and the relative velocity of the dark matter particles ⟨ σ A v ⟩

. Upper limits are set for dark matter particle candidate masses ranging from 10 GeV up to 1 TeV while considering annihilation …


Lyapunov Exponents And The Belousov-Zhabotinsky Oscillator: An Interactive Computational Approach, Matthew W. Eskew, Reuben H. Simoyi Sep 2017

Lyapunov Exponents And The Belousov-Zhabotinsky Oscillator: An Interactive Computational Approach, Matthew W. Eskew, Reuben H. Simoyi

Chemistry Faculty Publications and Presentations

The Belousov-Zhabotinsky (BZ) chemical oscillator is the most studied oscillator. It has been modelled on the basis of single-step mechanisms which have been continuously refined since the seminal manuscript by Field, Koros and Noyes in 1972. This manuscript reports on a unique way of modelling the global dynamics of the oscillator by assuming that the BZ oscillator has shown chaotic behaviour. The unique mathematical definition of chaos is very stringent, and, in this manuscript, we attempt to trace this unique exotic behaviour by the use of ‘onto’ maps of the interval onto itself which are known to exhaustively show a …


Formaldehyde Hemiacetal Sampling, Recovery, And Quantification From Electronic Cigarette Aerosols, James C. Salamanca, Ian Munhenzva, Jorge O. Escodedo, R. Paul Jensen, Angela Shaw, Robert Campbell, Wentai Luo, David H. Peyton, Robert Strongin Sep 2017

Formaldehyde Hemiacetal Sampling, Recovery, And Quantification From Electronic Cigarette Aerosols, James C. Salamanca, Ian Munhenzva, Jorge O. Escodedo, R. Paul Jensen, Angela Shaw, Robert Campbell, Wentai Luo, David H. Peyton, Robert Strongin

Chemistry Faculty Publications and Presentations

The electronic cigarette solvents propylene glycol and glycerol are known to produce toxic byproducts such as formaldehyde, acetaldehyde and acrolein. However, the aerosol toxin yield depends upon a variety of chemical and physical variables. The formaldehyde hemiacetals derived from these solvents were reported as major electronic cigarette aerosol components by us in 2015. In the study described herein, the formaldehyde hemiacetals were found at higher levels than those of free formaldehyde via an orthogonal sample collection protocol. In addition, the common aldehyde collection methods for electronic cigarettes, such as impingers and sorbent tubes containing DNPH, significantly underestimate the levels of …


Stylizing Face Images Via Multiple Exemplars, Yibing Song, Linchao Bao, Shengfeng He, Qingxiong Yang, Ming-Hsuan Yang Sep 2017

Stylizing Face Images Via Multiple Exemplars, Yibing Song, Linchao Bao, Shengfeng He, Qingxiong Yang, Ming-Hsuan Yang

Research Collection School Of Computing and Information Systems

We address the problem of transferring the style of a headshot photo to face images. Existing methods using a single exemplar lead to inaccurate results when the exemplar does not contain sufficient stylized facial components for a given photo. In this work, we propose an algorithm to stylize face images using multiple exemplars containing different subjects in the same style. Patch correspondences between an input photo and multiple exemplars are established using a Markov Random Field (MRF), which enables accurate local energy transfer via Laplacian stacks. As image patches from multiple exemplars are used, the boundaries of facial components on …


Loopster: Static Loop Termination Analysis, Xiaofei Xie, Bihuan Chen, Liang Zou, Shang-Wei Lin, Yang Liu, Xiaohong Li Sep 2017

Loopster: Static Loop Termination Analysis, Xiaofei Xie, Bihuan Chen, Liang Zou, Shang-Wei Lin, Yang Liu, Xiaohong Li

Research Collection School Of Computing and Information Systems

Loop termination is an important problem for proving the correctness of a system and ensuring that the system always reacts. Existing loop termination analysis techniques mainly depend on the synthesis of ranking functions, which is often expensive. In this paper, we present a novel approach, named Loopster, which performs an efficient static analysis to decide the termination for loops based on path termination analysis and path dependency reasoning. Loopster adopts a divide-and-conquer approach: (1) we extract individual paths from a target multi-path loop and analyze the termination of each path, (2) analyze the dependencies between each two paths, and then …


Vcksm: Verifiable Conjunctive Keyword Search Over Mobile E-Health Cloud In Shared Multi-Owner Settings, Yinbin Miao, Jianfeng Ma, Ximeng Liu, Qi Jiang, Junwei Zhang, Limin Shen, Zhiquan Liu Sep 2017

Vcksm: Verifiable Conjunctive Keyword Search Over Mobile E-Health Cloud In Shared Multi-Owner Settings, Yinbin Miao, Jianfeng Ma, Ximeng Liu, Qi Jiang, Junwei Zhang, Limin Shen, Zhiquan Liu

Research Collection School Of Computing and Information Systems

Searchable encryption (SE) is a promising technique which enables cloud users to conduct search over encrypted cloud data in a privacy-preserving way, especially for the electronic health record (EHR) system that contains plenty of medical history, diagnosis, radiology images, etc. In this paper, we focus on a more practical scenario, also named as the shared multi-owner settings, where each e-health record is co-owned by a fixed number of parties. Although the existing SE schemes under the unshared multi-owner settings can be adapted to this shared scenario, these schemes have to build multiple indexes,which definitely incur higher computational overhead. To save …


Evopass: Evolvable Graphical Password Against Shoulder-Surfing Attacks, Xingjie Yu, Zhan Wang, Yingjiu Li, Liang Li, Wen Tao Zhu, Li Song Sep 2017

Evopass: Evolvable Graphical Password Against Shoulder-Surfing Attacks, Xingjie Yu, Zhan Wang, Yingjiu Li, Liang Li, Wen Tao Zhu, Li Song

Research Collection School Of Computing and Information Systems

The passwords for authenticating users are susceptible to shoulder-surfing attacks in which attackers learn users' passwords through direct observations without any technical support. A straightforward solution to defend against such attacks is to change passwords periodically or even constantly, making the previously observed passwords useless. However, this may lead to a situation in which users run out of strong passwords they can remember, or they are forced to choose passwords that are weak, correlated, or difficult to memorize. To achieve both security and usability in user authentication, we propose EvoPass, the first evolvable graphical password authentication system. EvoPass transforms a …


Unobtrusive Monitoring To Detect Depression For Elderly With Chronic Illnesses, Jung-Yoon Kim, Na Liu, Hwee Xian Tan, Chao-Hsien Chu Sep 2017

Unobtrusive Monitoring To Detect Depression For Elderly With Chronic Illnesses, Jung-Yoon Kim, Na Liu, Hwee Xian Tan, Chao-Hsien Chu

Research Collection School Of Computing and Information Systems

Mental health related disorders are common diseases, especially among the elder. Among the various mental health diseases, one potential threat to ageing-in-place is the risk of depression. In this paper, we propose a simple unobtrusive sensing system using passive infra-red motion sensors to monitor the activities of daily living of elderly, who are living alone. A feature extraction module comprising of three layers-states, events, and activities, and the corresponding algorithms are proposed to extract features. Four popular classification models-neural network, C4.5 decision tree, Bayesian network, and support vector machine are then applied to detect the severity of depression. We implement …


Code Coverage And Postrelease Defects: A Large-Scale Study On Open Source Projects, Pavneet Singh Kochhar, David Lo, Julia Lawall, Nachiappan Nagappan Sep 2017

Code Coverage And Postrelease Defects: A Large-Scale Study On Open Source Projects, Pavneet Singh Kochhar, David Lo, Julia Lawall, Nachiappan Nagappan

Research Collection School Of Computing and Information Systems

Testing is a pivotal activity in ensuring the quality of software. Code coverage is a common metric used as a yardstick to measure the efficacy and adequacy of testing. However, does higher coverage actually lead to a decline in postrelease bugs? Do files that have higher test coverage actually have fewer bug reports? The direct relationship between code coverage and actual bug reports has not yet been analyzed via a comprehensive empirical study on real bugs. Past studies only involve a few software systems or artificially injected bugs (mutants). In this empirical study, we examine these questions in the context …


Genomic Security (Lest We Forget), Tatiana Bradley, Xuhua Ding, Gene Tsudik Sep 2017

Genomic Security (Lest We Forget), Tatiana Bradley, Xuhua Ding, Gene Tsudik

Research Collection School Of Computing and Information Systems

Genomic privacy has attracted much attention from the research community, because its risks are unique and breaches can lead to terrifying leakage of sensitive information. The less-explored topic of genomic security must address threats of digitized genomes being altered, which can have dire consequences in medical or legal settings.


Xsearch: A Domain-Specific Cross-Language Relevant Question Retrieval Tool, Bowen Xu, Zhenchang Xing, Xin Xia, David Lo, Xuan-Bach D. Le Sep 2017

Xsearch: A Domain-Specific Cross-Language Relevant Question Retrieval Tool, Bowen Xu, Zhenchang Xing, Xin Xia, David Lo, Xuan-Bach D. Le

Research Collection School Of Computing and Information Systems

During software development process, Chinese developers often seek solutions to the technical problems they encounter by searching relevant questions on Q&A sites. When developers fail to find solutions on Q&A sites in Chinese, they could translate their query and search on the English Q&A sites. However, Chinese developers who are non-native English speakers often are not comfortable to ask or search questions in English, as they do not know the proper translation of the Chinese technical words into the English technical words. Furthermore, the process of manually formulating cross-language queries and determining the importance of query words is a tedious …


Github And Stack Overflow: Analyzing Developer Interests Across Multiple Social Collaborative Platforms, Ka Wei Roy Lee, David Lo Sep 2017

Github And Stack Overflow: Analyzing Developer Interests Across Multiple Social Collaborative Platforms, Ka Wei Roy Lee, David Lo

Research Collection School Of Computing and Information Systems

Increasingly, software developers are using a wide array of social collaborative platforms for software development and learning. In this work, we examined the similarities in developer’s interests within and across GitHub and Stack Overflow. Our study finds that developers share common interests in GitHub and Stack Overflow; on average, 39% of the GitHub repositories and Stack Overflow questions that a developer had participated fall in the common interests. Also, developers do share similar interests with other developers who co-participated activities in the two platforms. In particular, developers who co-commit and co-pull-request same GitHub repositories and co-answer same Stack Overflow questions, …


Inferring Spread Of Readers’ Emotion Affected By Online News, Agus Sulistya, Ferdian Thung, David Lo Sep 2017

Inferring Spread Of Readers’ Emotion Affected By Online News, Agus Sulistya, Ferdian Thung, David Lo

Research Collection School Of Computing and Information Systems

Depending on the reader, A news article may be viewed from many different perspectives, thus triggering different (and possibly contradicting) emotions. In this paper, we formulate a problem of predicting readers’ emotion distribution affected by a news article. Our approach analyzes affective annotations provided by readers of news articles taken from a non-English online news site. We create a new corpus from the annotated articles, and build a domain-specific emotion lexicon and word embedding features. We finally construct a multi-target regression model from a set of features extracted from online news articles. Our experiments show that by combining lexicon and …


Understanding Stack Overflow Code Fragments, Christoph Treude, Martin P. Robillard Sep 2017

Understanding Stack Overflow Code Fragments, Christoph Treude, Martin P. Robillard

Research Collection School Of Computing and Information Systems

Code fragments posted in answers on Q&A forums can form an important source of developer knowledge. However, effective reuse of code fragments found online often requires information other than the code fragment alone. We report on the results of a survey-based study to investigate to what extent developers perceive Stack Overflow code fragments to be self-explanatory. As part of the study, we also investigated the types of information missing from fragments that were not self-explanatory. We find that less than half of the Stack Overflow code fragments in our sample are considered to be self-explanatory by the 321 participants who …


Ind-Pca Secure Kem Is Enough For Password-Based Authenticated Key Exchange (Short Paper), Haiyang Xue, Bao Li, Xianhui Lu Sep 2017

Ind-Pca Secure Kem Is Enough For Password-Based Authenticated Key Exchange (Short Paper), Haiyang Xue, Bao Li, Xianhui Lu

Research Collection School Of Computing and Information Systems

There are several frameworks for password-based authenticated key exchange (PAKE) protocols with common reference string following the work of Katz, Ostrovsky and Yung (Eurocrypt’01), and it seems that the IND-CCA secure encryption is inevitable when constructing PAKE in standard model.In this paper, we show that IND-PCA secure key encapsulation mechanism (KEM) is enough for PAKE, which is weaker and easier to be constructed than IND-CCA secure encryption. Our refined PAKE consists of a smooth projective hash function on IND-CPA secure encryption and an IND-PCA secure KEM. Based on DDH assumption, the total communication of PAKE consists of 6 group elements …