[I486S] 暗号プロトコル理論
|
|
- いとは かんざとばる
- 5 years ago
- Views:
Transcription
1 [I486S] (JAIST) / 22
2 : I486S I URL: (Tuesdays) 5 17:10 18:50 4/17, 4/24, 5/1, 5/15, 5/22, 5/29, 6/5, 6/19, 6/26, 7/3, 7/10, 7/17, 7/24, 7/31 (JAIST) / 22
3 R Cramer, I Damgaard, and J Nielsen: Secure Multiparty Computation and Secret Sharing, Cambridge University Press (ISBN ) R Cramer, I Damgaard, J Nielsen: Multiparty computation, Introduction Ben-Or, S Goldwasser and A Wigderson: Completeness Theorems for Non-Cyptographic Fault-Tolerant Distributed Computation, in STOC88, pp 1 10 R Cramer, I Damgaard and U Maurer: General Secure Multi-party Computation from any Linear Secret-Sharing Scheme, in EUROCRYPT2000, pp R Cramer, I Damgaard and Y Ishai: Share Conversion, Pseudorandom Secret-Sharing and Applications to Secure Computation, in TCC2005, pp A Yao: Protocols for secure computations, in FOCS82, pp Y Lindell and B Pinkas: A Proof of Security of Yao s Protocol for Two-Party Computation, Journal of Cryptology, volume 22(2), pp , 2009 (JAIST) / 22
4 1 Shamir 2 Reed-Solomon 3 Shamir SS 4 (JAIST) / 22
5 Shamir (Shamir SS) Shamir SS = (Share, Recon, Γ t+1,n ) Share(s): a 0 := s K t f (X ) = t i=0 a ix i f (X ) R K[X ] such that deg(f ) = t, and a 0 = s [s] = (f (α 1 ),, f (α n )) α i K Recon(S Q ) (S Q = {f (α i ) i Q st Q Γ t+1,n }): s s = λ i,q f (α i ) where λ i,q = ( αj ) α j α i i Q j Q\{i} Reconstruction vector (λ 1,Q,, λ #Q,Q ) S Q (α 1,, α n) (JAIST) / 22
6 Shamir f, g K[X ] (deg(f ), deg(g) t) [αf (0) + βg(0)] = α[f (0)] + β[g(0)] where α, β K f (X ) = a 0 + a 1 X + a t X t g(x ) = b 0 + b 1 X + b t X t h(x ) αf (X ) + βg(x ) deg(h) t [h(0)] = (h(α 1 ),, h(α n )) = (αf (α 1 ) + βg(α 1 ),, αf (α n ) + βg(α n )) = α[f (0)] + β[g(0)] (JAIST) / 22
7 1 Shamir 2 Reed-Solomon 3 Shamir SS 4 (JAIST) / 22
8 Reed-Solomon (n, t + 1)- n t + 1 K = F q q α 1,, α n K (α i α j for i j) Reed-Solomon (RS) f K[X ], deg(f ) t (f (α 1 ),, f (α n )) (n, t + 1)-Reed-Solomon ie, C RS = {(f (α 1 ),, f (α n )) f K[X ] st deg(f ) t} (n, t + 1)-RS (n, t + 1)- (JAIST) / 22
9 C c, c C, a, b K = ac + bc C c, c τ e, e c + e c + e τ (τ-error correcting) d τ < d 2 v K n : w H (v) # of {v i 0 for v = (v 1,, v n)} v w : d H (v, w) w H (v w) : d = min{d H (c, c ) c, c C st c c } (JAIST) / 22
10 RS- Theorem 1 (n, t + 1)-Reed-Solomon n t (n, t + 1)- τ < n t 2 τ Proof RS f = (f (α 1 ),, f (α n)) f C RS f (x) = 0 t deg(f ) t t + 1 f 0 f (x) = 0 t w H (f ) n t d = n t w H (e) < n t e e C RS c, c C RS, e, e (w H (e), w H (e ) < n t) = c + e c + e (JAIST) / 22
11 RS- f = (f (α 1),, f (α n)) where deg(f ) t and n 3t + 1 ˆf = (y 1,, y n) = f + e where W H (e) t Goal: ˆf f Welch/Berlekamp Algorithm Q(X, Y ) f 0 (X ) f 1 (X )Y Q(α i, y i ) = 0 for i = 1,, n deg(f 0 ) 2t and deg(f 1 ) t f 1 (0) = 1 f 0 (X ), f 1 (X ) f (X ) = f 0(X ) f 1 (X ) W H (e) t n 3t + 1 f 0, f 1 f (X ) = f 0(X ) f 1 (X ) (JAIST) / 22
12 RS- 15 f 0, f 1 y i = f (α i ) + e i e i 0 t f 0, f 1 B = {i e i 0} #B t i B k(x ) = (X α i) i B ( α i) f 0 (X ) = k(x )f (X ), f 1 (X ) = k(x ) f 1 (0) = 1, deg(f 0 ) 2t, deg(f 1 ) t i = 1,, n ) Q(α i, y i ) = f 0 (α i ) f 1 (α i )y i = k(α i ) (f (α i ) y i = 0 f 0, f 1 (JAIST) / 22
13 RS- f 0(X ) = a 0 + a 1X + + a 2tX 2t f 1(X ) = 1 + b 1X + + b tx t Q(α i, y i ) = f 0(α i ) f 1(α i )y i = 0 for i = 1,, n 3t = 1 α 1 α 2t 1 y 1 y 1 α 1 y 1 α t 1 1 α n α 2t n y 1 y n α n y n α t n a 0 a 2t 1 b 1 b t (JAIST) / 22
14 RS- ˆQ(X ) = Q(X, f (X )) deg( ˆQ) 2t W H (e) t y i = f (α i ) n t n t (α i ) ˆQ(α i ) = 0 n 3t + 1 deg( ˆQ) 2t < n t deg( ˆQ) 0 f 0 (X ) f 1 (X )f (X ) 0 f (X ) = f 0(X ) f 1 (X ) (JAIST) / 22
15 1 Shamir 2 Reed-Solomon 3 Shamir SS 4 (JAIST) / 22
16 Shamir SS [a], [b]: a, b K P 1,, P n addition [a] + [b] = [a + b] f, g a, b t f 0 = a, g 0 = b f (X ) = f 0 + f 1 X + + f t X t, and g(x ) = g 0 + g 1 X + + g t X t h(x ) = f (X ) + g(x ) h(0) = a + b deg(h) = t [a + b] = (h(α 1 ),, h(α n )) h(α i ) = f (α i ) + g(α i ) P i [a + b] (JAIST) / 22
17 Shamir SS [a] t, [b] t: a, b K P 1,, P n (t + 1, n) multiplication [a] t [b] t = [ab] 2t [a] [b] P i [a] t t + 1 a f, g a, b t f 0 = a, g 0 = b f (X ) = f 0 + f 1X + + f tx t, and g(x ) = g 0 + g 1X + + g tx t h(x ) = f (X )g(x ) h(0) = ab deg(h) = 2t [ab] 2t = (f (α 1)g(α 1),, f (α n)g(α n)) P 1,, P n ab 2t + 1 ab (JAIST) / 22
18 Shamir SS multiplication Lagrange n [ab] = [h(0)] = [ λ i,n h(α i )] = i=1 n λ i,n [h(α i )] i=1 (λ 1,n,, λ n,n) {α 1,, α n} h(x ) = f (X )g(x ) h(α i ) = f (α i )g(α i ) [a], [b] [ab] P i f (α i )g(α i ) (t + 1, n)- [f (α i )g(α i )] [ab] (JAIST) / 22
19 Shamir SS Input: [a], [b] Output: [ab] [a], [b] a, b P 1,,, P n P i c i = a i b i P i c i P 1,, P n [c 1 ],, [c n ] P i c 1,i,, c i,i,, c n,i [c 1 ],, [c n ] i = 1,, n λ i,n = j i α i α j α i P i d i = j=1 λ j,nc j,i [ab] = (d 1,, d n ) [ab] (JAIST) / 22
20 1 Shamir 2 Reed-Solomon 3 Shamir SS 4 (JAIST) / 22
21 (Secret Sharing) SS = (Share, Recon, Γ t+1,n) Share s K K n share [s] (s 1,, s n) Share : s K [s] = (s 1,, s n) K n Γ t+1,n {Q {1,, n} #Q t + 1} Recon [s] t S Q = {s i i Q} Q Γ t+1,n s SS = (Share, Recon, Γ t+1,n) (Perfect Reconstructability) s K, [s] Share(s), Q Γ t+1,n S Q Recon(S Q ) = s (Perfect Privacy) s K, [s] Share(s), T Γ t+1,n S T H(s) = H(s S T ) s S T (JAIST) / 22
22 (Linear Secret Sharing) SS = (Share, Recon, Γ t+1,n ) Linearlity SS (Linearlity) s, s, a, b K, [s] Share(s), [s ] Share(s ) [as + bs ] = a[s] + b[s ] a[s] (a s 1,, a s n ), [s] + [s ] (s 1 + s 1,, s n + s n) P 1,, P n s, s [s],[s ] P i as i + bs i a, b (as 1 + bs 1,, as n + bs n) as + bs [a s + b s ] (JAIST) / 22
ID Privacy-Preserving Data Mining Lindell 20) 1),30) 1 3 semi-honest malicious 3 n t < n/2 15) semi-honest malicious semi-honest malicious mali
Vol. 52 No. 9 2674 2685 (Sep. 2011) 3 1 1 1 1 1 3 3 semi-honest malicious CPU Intel Core2 Quad 3.0 GHz RAM 4GB 1 32 1 1.6 µ 3 Privacy-Preserving Data Mining A Lightweight Three-party Secure Function Evaluation
More information/ ( ) 1 1.1 323 206 23 ( 23 529 529 323 206 ) 23 1.2 33 1.3 323 61 61 3721 3721 323 168 168 323 23 61 61 23 1403 323 111 111 168 206 323 47 111 323 47 2 23 2 2.1 34 2 2.2 2 a, b N a b N a b (mod N) mod
More informationA11 (1993,1994) 29 A12 (1994) 29 A13 Trefethen and Bau Numerical Linear Algebra (1997) 29 A14 (1999) 30 A15 (2003) 30 A16 (2004) 30 A17 (2007) 30 A18
2013 8 29y, 2016 10 29 1 2 2 Jordan 3 21 3 3 Jordan (1) 3 31 Jordan 4 32 Jordan 4 33 Jordan 6 34 Jordan 8 35 9 4 Jordan (2) 10 41 x 11 42 x 12 43 16 44 19 441 19 442 20 443 25 45 25 5 Jordan 26 A 26 A1
More informationO1-1 O1-2 O1-3 O1-4 O1-5 O1-6
O1-1 O1-2 O1-3 O1-4 O1-5 O1-6 O1-7 O1-8 O1-9 O1-10 O1-11 O1-12 O1-13 O1-14 O1-15 O1-16 O1-17 O1-18 O1-19 O1-20 O1-21 O1-22 O1-23 O1-24 O1-25 O1-26 O1-27 O1-28 O1-29 O1-30 O1-31 O1-32 O1-33 O1-34 O1-35
More informationax 2 + bx + c = n 8 (n ) a n x n + a n 1 x n a 1 x + a 0 = 0 ( a n, a n 1,, a 1, a 0 a n 0) n n ( ) ( ) ax 3 + bx 2 + cx + d = 0 4
20 20.0 ( ) 8 y = ax 2 + bx + c 443 ax 2 + bx + c = 0 20.1 20.1.1 n 8 (n ) a n x n + a n 1 x n 1 + + a 1 x + a 0 = 0 ( a n, a n 1,, a 1, a 0 a n 0) n n ( ) ( ) ax 3 + bx 2 + cx + d = 0 444 ( a, b, c, d
More information16 B
16 B (1) 3 (2) (3) 5 ( ) 3 : 2 3 : 3 : () 3 19 ( ) 2 ax 2 + bx + c = 0 (a 0) x = b ± b 2 4ac 2a 3, 4 5 1824 5 Contents 1. 1 2. 7 3. 13 4. 18 5. 22 6. 25 7. 27 8. 31 9. 37 10. 46 11. 50 12. 56 i 1 1. 1.1..
More information1 Abstract 2 3 n a ax 2 + bx + c = 0 (a 0) (1) ( x + b ) 2 = b2 4ac 2a 4a 2 D = b 2 4ac > 0 (1) 2 D = 0 D < 0 x + b 2a = ± b2 4ac 2a b ± b 2
1 Abstract n 1 1.1 a ax + bx + c = 0 (a 0) (1) ( x + b ) = b 4ac a 4a D = b 4ac > 0 (1) D = 0 D < 0 x + b a = ± b 4ac a b ± b 4ac a b a b ± 4ac b i a D (1) ax + bx + c D 0 () () (015 8 1 ) 1. D = b 4ac
More informationone way two way (talk back) (... ) C.E.Shannon 1948 A Mathematical theory of communication. 1 ( ) 0 ( ) 1
1 1.1 1.2 one way two way (talk back) (... ) 1.3 0 C.E.Shannon 1948 A Mathematical theory of communication. 1 ( ) 0 ( ) 1 ( (coding theory)) 2 2.1 (convolution code) (block code), 3 3.1 Q q Q n Q n 1 Q
More information1 911 9001030 9:00 A B C D E F G H I J K L M 1A0900 1B0900 1C0900 1D0900 1E0900 1F0900 1G0900 1H0900 1I0900 1J0900 1K0900 1L0900 1M0900 9:15 1A0915 1B0915 1C0915 1D0915 1E0915 1F0915 1G0915 1H0915 1I0915
More information30 2018.4.25 30 1 nuida@mist.i.u-tokyo.ac.jp 2018 4 11 2018 4 25 30 2018.4.25 1 1 2 8 3 21 4 28 5 37 6 43 7 47 8 52 30 2018.4.25 1 1 Z Z 0 Z >0 Q, R, C a, b a b a = bc c 0 a b b a b a a, b, c a b b c a
More information(Visual Secret Sharing Scheme) VSSS VSSS 3 i
13 A Visual Secret Sharing Scheme for Continuous Color Images 10066 14 8 (Visual Secret Sharing Scheme) VSSS VSSS 3 i Abstract A Visual Secret Sharing Scheme for Continuous Color Images Tomoe Ogawa The
More information48 * *2
374-1- 17 2 1 1 B A C A C 48 *2 49-2- 2 176 176 *2 -3- B A A B B C A B A C 1 B C B C 2 B C 94 2 B C 3 1 6 2 8 1 177 C B C C C A D A A B A 7 B C C A 3 C A 187 187 C B 10 AC 187-4- 10 C C B B B B A B 2 BC
More information1 n 1 1 2 2 3 3 3.1............................ 3 3.2............................. 6 3.2.1.............. 6 3.2.2................. 7 3.2.3........................... 10 4 11 4.1..........................
More information140 120 100 80 60 40 20 0 115 107 102 99 95 97 95 97 98 100 64 72 37 60 50 53 50 36 32 18 H18 H19 H20 H21 H22 H23 H24 H25 H26 H27 1 100 () 80 60 40 20 0 1 19 16 10 11 6 8 9 5 10 35 76 83 73 68 46 44 H11
More information福岡大学人文論叢47-3
679 pp. 1 680 2 681 pp. 3 682 4 683 5 684 pp. 6 685 7 686 8 687 9 688 pp. b 10 689 11 690 12 691 13 692 pp. 14 693 15 694 a b 16 695 a b 17 696 a 18 697 B 19 698 A B B B A B B A A 20 699 pp. 21 700 pp.
More information2 1,384,000 2,000,000 1,296,211 1,793,925 38,000 54,500 27,804 43,187 41,000 60,000 31,776 49,017 8,781 18,663 25,000 35,300 3 4 5 6 1,296,211 1,793,925 27,804 43,187 1,275,648 1,753,306 29,387 43,025
More information10 1 1 (1) (2) (3) 3 3 1 3 1 3 (4) 2 32 2 (1) 1 1
10 10 1 1 (1) (2) (3) 3 3 1 3 1 3 (4) 2 32 2 (1) 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 (2) 1 (3) JI S JI S JI S JI S 25 175 J AS 3 (1) 3 70 (2) (3) 100 4 (1)69 (2) (3) (4) (5) (6) (7) (8)70 (9) (10)2 (11)
More information名古屋工業大の数学 2000 年 ~2015 年 大学入試数学動画解説サイト
名古屋工業大の数学 年 ~5 年 大学入試数学動画解説サイト http://mathroom.jugem.jp/ 68 i 4 3 III III 3 5 3 ii 5 6 45 99 5 4 3. () r \= S n = r + r + 3r 3 + + nr n () x > f n (x) = e x + e x + 3e 3x + + ne nx f(x) = lim f n(x) lim
More informationMacdonald, ,,, Macdonald. Macdonald,,,,,.,, Gauss,,.,, Lauricella A, B, C, D, Gelfand, A,., Heckman Opdam.,,,.,,., intersection,. Macdona
Macdonald, 2015.9.1 9.2.,,, Macdonald. Macdonald,,,,,.,, Gauss,,.,, Lauricella A, B, C, D, Gelfand, A,., Heckman Opdam.,,,.,,., intersection,. Macdonald,, q., Heckman Opdam q,, Macdonald., 1 ,,. Macdonald,
More information7 π L int = gψ(x)ψ(x)φ(x) + (7.4) [ ] p ψ N = n (7.5) π (π +,π 0,π ) ψ (σ, σ, σ )ψ ( A) σ τ ( L int = gψψφ g N τ ) N π * ) (7.6) π π = (π, π, π ) π ±
7 7. ( ) SU() SU() 9 ( MeV) p 98.8 π + π 0 n 99.57 9.57 97.4 497.70 δm m 0.4%.% 0.% 0.8% π 9.57 4.96 Σ + Σ 0 Σ 89.6 9.46 K + K 0 49.67 (7.) p p = αp + βn, n n = γp + δn (7.a) [ ] p ψ ψ = Uψ, U = n [ α
More informationv v = v 1 v 2 v 3 (1) R = (R ij ) (2) R (R 1 ) ij = R ji (3) 3 R ij R ik = δ jk (4) i=1 δ ij Kronecker δ ij = { 1 (i = j) 0 (i
1. 1 1.1 1.1.1 1.1.1.1 v v = v 1 v 2 v 3 (1) R = (R ij ) (2) R (R 1 ) ij = R ji (3) R ij R ik = δ jk (4) δ ij Kronecker δ ij = { 1 (i = j) 0 (i j) (5) 1 1.1. v1.1 2011/04/10 1. 1 2 v i = R ij v j (6) [
More informationI. (CREMONA ) : Cremona [C],., modular form f E f. 1., modular X H 1 (X, Q). modular symbol M-symbol, ( ) modular symbol., notation. H = { z = x
I. (CREMONA ) : Cremona [C],., modular form f E f. 1., modular X H 1 (X, Q). modular symbol M-symbol, ( ). 1.1. modular symbol., notation. H = z = x iy C y > 0, cusp H = H Q., Γ = PSL 2 (Z), G Γ [Γ : G]
More informationS I. dy fx x fx y fx + C 3 C dy fx 4 x, y dy v C xt y C v e kt k > xt yt gt [ v dt dt v e kt xt v e kt + C k x v + C C k xt v k 3 r r + dr e kt S dt d
S I.. http://ayapin.film.s.dendai.ac.jp/~matuda /TeX/lecture.html PDF PS.................................... 3.3.................... 9.4................5.............. 3 5. Laplace................. 5....
More informationOptical Flow t t + δt 1 Motion Field 3 3 1) 2) 3) Lucas-Kanade 4) 1 t (x, y) I(x, y, t)
http://wwwieice-hbkborg/ 2 2 4 2 -- 2 4 2010 9 3 3 4-1 Lucas-Kanade 4-2 Mean Shift 3 4-3 2 c 2013 1/(18) http://wwwieice-hbkborg/ 2 2 4 2 -- 2 -- 4 4--1 2010 9 4--1--1 Optical Flow t t + δt 1 Motion Field
More informationnewmain.dvi
数論 サンプルページ この本の定価 判型などは, 以下の URL からご覧いただけます. http://www.morikita.co.jp/books/mid/008142 このサンプルページの内容は, 第 2 版 1 刷発行当時のものです. Daniel DUVERNEY: THÉORIE DES NOMBRES c Dunod, Paris, 1998, This book is published
More informationS K(S) = T K(T ) T S K n (1.1) n {}}{ n K n (1.1) 0 K 0 0 K Q p K Z/pZ L K (1) L K L K (2) K L L K [L : K] 1.1.
() 1.1.. 1. 1.1. (1) L K (i) 0 K 1 K (ii) x, y K x + y K, x y K (iii) x, y K xy K (iv) x K \ {0} x 1 K K L L K ( 0 L 1 L ) L K L/K (2) K M L M K L 1.1. C C 1.2. R K = {a + b 3 i a, b Q} Q( 2, 3) = Q( 2
More information1 I
1 I 3 1 1.1 R x, y R x + y R x y R x, y, z, a, b R (1.1) (x + y) + z = x + (y + z) (1.2) x + y = y + x (1.3) 0 R : 0 + x = x x R (1.4) x R, 1 ( x) R : x + ( x) = 0 (1.5) (x y) z = x (y z) (1.6) x y =
More informationII R n k +1 v 0,, v k k v 1 v 0,, v k v v 0,, v k R n 1 a 0,, a k a 0 v 0 + a k v k v 0 v k k k v 0,, v k σ k σ dimσ = k 1.3. k
II 231017 1 1.1. R n k +1 v 0,, v k k v 1 v 0,, v k v 0 1.2. v 0,, v k R n 1 a 0,, a k a 0 v 0 + a k v k v 0 v k k k v 0,, v k σ kσ dimσ = k 1.3. k σ {v 0,...,v k } {v i0,...,v il } l σ τ < τ τ σ 1.4.
More informationmeiji_resume_1.PDF
β β β (q 1,q,..., q n ; p 1, p,..., p n ) H(q 1,q,..., q n ; p 1, p,..., p n ) Hψ = εψ ε k = k +1/ ε k = k(k 1) (x, y, z; p x, p y, p z ) (r; p r ), (θ; p θ ), (ϕ; p ϕ ) ε k = 1/ k p i dq i E total = E
More information1 Introduction 1 (1) (2) (3) () {f n (x)} n=1 [a, b] K > 0 n, x f n (x) K < ( ) x [a, b] lim f n (x) f(x) (1) f(x)? (2) () f(x)? b lim a f n (x)dx = b
1 Introduction 2 2.1 2.2 2.3 3 3.1 3.2 σ- 4 4.1 4.2 5 5.1 5.2 5.3 6 7 8. Fubini,,. 1 1 Introduction 1 (1) (2) (3) () {f n (x)} n=1 [a, b] K > 0 n, x f n (x) K < ( ) x [a, b] lim f n (x) f(x) (1) f(x)?
More informationuntitled
1 SS 2 2 (DS) 3 2.1 DS................................ 3 2.2 DS................................ 4 2.3.................................. 4 2.4 (channel papacity)............................ 6 2.5........................................
More informationS I. dy fx x fx y fx + C 3 C vt dy fx 4 x, y dy yt gt + Ct + C dt v e kt xt v e kt + C k x v k + C C xt v k 3 r r + dr e kt S Sr πr dt d v } dt k e kt
S I. x yx y y, y,. F x, y, y, y,, y n http://ayapin.film.s.dendai.ac.jp/~matuda n /TeX/lecture.html PDF PS yx.................................... 3.3.................... 9.4................5..............
More information20 6 4 1 4 1.1 1.................................... 4 1.1.1.................................... 4 1.1.2 1................................ 5 1.2................................... 7 1.2.1....................................
More informationPSCHG000.PS
a b c a ac bc ab bc a b c a c a b bc a b c a ac bc ab bc a b c a ac bc ab bc a b c a ac bc ab bc de df d d d d df d d d d d d d a a b c a b b a b c a b c b a a a a b a b a
More information,. Black-Scholes u t t, x c u 0 t, x x u t t, x c u t, x x u t t, x + σ x u t, x + rx ut, x rux, t 0 x x,,.,. Step 3, 7,,, Step 6., Step 4,. Step 5,,.
9 α ν β Ξ ξ Γ γ o δ Π π ε ρ ζ Σ σ η τ Θ θ Υ υ ι Φ φ κ χ Λ λ Ψ ψ µ Ω ω Def, Prop, Th, Lem, Note, Remark, Ex,, Proof, R, N, Q, C [a, b {x R : a x b} : a, b {x R : a < x < b} : [a, b {x R : a x < b} : a,
More informationad bc A A A = ad bc ( d ) b c a n A n A n A A det A A ( ) a b A = c d det A = ad bc σ {,,,, n} {,,, } {,,, } {,,, } ( ) σ = σ() = σ() = n sign σ sign(
I n n A AX = I, YA = I () n XY A () X = IX = (YA)X = Y(AX) = YI = Y X Y () XY A A AB AB BA (AB)(B A ) = A(BB )A = AA = I (BA)(A B ) = B(AA )B = BB = I (AB) = B A (BA) = A B A B A = B = 5 5 A B AB BA A
More information_TZ_4797-haus-local
1.1.................................... 3.3.................................. 4.4......................... 8.5... 10.6.................... 1.7... 14 3 16 3.1 ()........................... 16 3. 7... 17
More information1 X X A, B X = A B A B A B X 1.1 R R I I a, b(a < b) I a x b = x I 1.2 R A 1.3 X : (1)X (2)X X (3)X A, B X = A B A B = 1.4 f : X Y X Y ( ) A Y A Y A f
1 X X A, B X = A B A B A B X 1.1 R R I I a, b(a < b) I a x b = x I 1. R A 1.3 X : (1)X ()X X (3)X A, B X = A B A B = 1.4 f : X Y X Y ( ) A Y A Y A f 1 (A) f X X f 1 (A) = X f 1 (A) = A a A f f(x) = a x
More informationA S- hara/lectures/lectures-j.html r A = A 5 : 5 = max{ A, } A A A A B A, B A A A %
A S- http://www.math.kyushu-u.ac.jp/ hara/lectures/lectures-j.html r A S- 3.4.5. 9 phone: 9-8-444, e-mail: hara@math.kyushu-u.ac.jp, http://www.math.kyushu-u.ac.jp/ hara/lectures/lectures-j.html Office
More informationTitle 最適年金の理論 Author(s) 藤井, 隆雄 ; 林, 史明 ; 入谷, 純 ; 小黒, 一正 Citation Issue Date Type Technical Report Text Version publisher URL
Title 最適年金の理論 Author(s) 藤井, 隆雄 ; 林, 史明 ; 入谷, 純 ; 小黒, 一正 Citation Issue 2012-06 Date Type Technical Report Text Version publisher URL http://hdl.handle.net/10086/23085 Right Hitotsubashi University Repository
More informationp06.dvi
I 6 : 1 (1) u(t) y(t) : n m a n i y (i) = b m i u (i) i=0 i=0 t, y (i) y i (u )., a 0 0, b 0 0. : 2 (2), Laplace, (a 0 s n +a 1 s n 1 + +a n )Y(s) = (b 0 s m + b 1 s m 1 + +b m )U(s),, Y(s) U(s) = b 0s
More information特集_03-07.Q3C
3-7 Error Detection and Authentication in Quantum Key Distribution YAMAMURA Akihiro and ISHIZUKA Hirokazu Detecting errors in a raw key and authenticating a private key are crucial for quantum key distribution
More information13 0 1 1 4 11 4 12 5 13 6 2 10 21 10 22 14 3 20 31 20 32 25 33 28 4 31 41 32 42 34 43 38 5 41 51 41 52 43 53 54 6 57 61 57 62 60 70 0 Gauss a, b, c x, y f(x, y) = ax 2 + bxy + cy 2 = x y a b/2 b/2 c x
More information:00-16:10
3 3 2007 8 10 13:00-16:10 2 Diffie-Hellman (1976) K K p:, b [1, p 1] Given: p: prime, b [1, p 1], s.t. {b i i [0, p 2]} = {1,..., p 1} a {b i i [0, p 2]} Find: x [0, p 2] s.t. a b x mod p Ind b a := x
More information70 : 20 : A B (20 ) (30 ) 50 1
70 : 0 : A B (0 ) (30 ) 50 1 1 4 1.1................................................ 5 1. A............................................... 6 1.3 B............................................... 7 8.1 A...............................................
More information医系の統計入門第 2 版 サンプルページ この本の定価 判型などは, 以下の URL からご覧いただけます. このサンプルページの内容は, 第 2 版 1 刷発行時のものです.
医系の統計入門第 2 版 サンプルページ この本の定価 判型などは, 以下の URL からご覧いただけます. http://www.morikita.co.jp/books/mid/009192 このサンプルページの内容は, 第 2 版 1 刷発行時のものです. i 2 t 1. 2. 3 2 3. 6 4. 7 5. n 2 ν 6. 2 7. 2003 ii 2 2013 10 iii 1987
More information(1) (2) (1) (2) 2 3 {a n } a 2 + a 4 + a a n S n S n = n = S n
. 99 () 0 0 0 () 0 00 0 350 300 () 5 0 () 3 {a n } a + a 4 + a 6 + + a 40 30 53 47 77 95 30 83 4 n S n S n = n = S n 303 9 k d 9 45 k =, d = 99 a d n a n d n a n = a + (n )d a n a n S n S n = n(a + a n
More informationZ: Q: R: C: sin 6 5 ζ a, b
Z: Q: R: C: 3 3 7 4 sin 6 5 ζ 9 6 6............................... 6............................... 6.3......................... 4 7 6 8 8 9 3 33 a, b a bc c b a a b 5 3 5 3 5 5 3 a a a a p > p p p, 3,
More informationmobius1
H + : ω = ( a, b, c, d, ad bc > 0) 3.. ( c 0 )... ( 5z + 2 : ω = L (*) z + 4 5z + 2 z = z =, 2. (*) z + 4 5z+ 2 6( z+) ω + = + = z+ 4 z+ 4 5z+ 2 3( z 2) ω 2 = 2= z+ 4 z+ 4 ω + z + = 2 ω 2 z 2 x + T ( x)
More information1 1.1 R (ring) R1 R4 R1 R (commutative [abelian] group) R2 a, b, c R (ab)c = a(bc) (associative law) R3 a, b, c R a(b + c) = ab + ac, (a + b)c = ac +
ALGEBRA II Hiroshi SUZUKI Department of Mathematics International Christian University 2004 1 1 1 2 2 1 3 3 1 4 4 1 5 5 1 6 6 1 7 7 1 7.1....................... 7 1 7.2........................... 7 4 8
More informationLINEAR ALGEBRA I Hiroshi SUZUKI Department of Mathematics International Christian University
LINEAR ALGEBRA I Hiroshi SUZUKI Department of Mathematics International Christian University 2002 2 2 2 2 22 2 3 3 3 3 3 4 4 5 5 6 6 7 7 8 8 9 Cramer 9 0 0 E-mail:hsuzuki@icuacjp 0 3x + y + 2z 4 x + y
More information8.1 Fubini 8.2 Fubini 9 (0%) 10 (50%) Carathéodory 10.3 Fubini 1 Introduction 1 (1) (2) {f n (x)} n=1 [a, b] K > 0 n, x f n (x) K < ( ) x [a
% 100% 1 Introduction 2 (100%) 2.1 2.2 2.3 3 (100%) 3.1 3.2 σ- 4 (100%) 4.1 4.2 5 (100%) 5.1 5.2 5.3 6 (100%) 7 (40%) 8 Fubini (90%) 2007.11.5 1 8.1 Fubini 8.2 Fubini 9 (0%) 10 (50%) 10.1 10.2 Carathéodory
More informationJuly 28, H H 0 H int = H H 0 H int = H int (x)d 3 x Schrödinger Picture Ψ(t) S =e iht Ψ H O S Heisenberg Picture Ψ H O H (t) =e iht O S e i
July 8, 4. H H H int H H H int H int (x)d 3 x Schrödinger Picture Ψ(t) S e iht Ψ H O S Heisenberg Picture Ψ H O H (t) e iht O S e iht Interaction Picture Ψ(t) D e iht Ψ(t) S O D (t) e iht O S e ih t (Dirac
More informationx 3 a (mod p) ( ). a, b, m Z a b m a b (mod m) a b m 2.2 (Z/mZ). a = {x x a (mod m)} a Z m 0, 1... m 1 Z/mZ = {0, 1... m 1} a + b = a +
1 1 22 1 x 3 (mod ) 2 2.1 ( )., b, m Z b m b (mod m) b m 2.2 (Z/mZ). = {x x (mod m)} Z m 0, 1... m 1 Z/mZ = {0, 1... m 1} + b = + b, b = b Z/mZ 1 1 Z Q R Z/Z 2.3 ( ). m {x 0, x 1,..., x m 1 } modm 2.4
More informationI , : ~/math/functional-analysis/functional-analysis-1.tex
I 1 2004 8 16, 2017 4 30 1 : ~/math/functional-analysis/functional-analysis-1.tex 1 3 1.1................................... 3 1.2................................... 3 1.3.....................................
More information−g”U›ß™ö‡Æ…X…y…N…g…‰
1 / 74 ( ) 2019 3 8 URL: http://www.math.kyoto-u.ac.jp/ ichiro/ 2 / 74 Contents 1 Pearson 2 3 Doob h- 4 (I) 5 (II) 6 (III-1) - 7 (III-2-a) 8 (III-2-b) - 9 (III-3) Pearson 3 / 74 Pearson Definition 1 ρ
More information> > <., vs. > x 2 x y = ax 2 + bx + c y = 0 2 ax 2 + bx + c = 0 y = 0 x ( x ) y = ax 2 + bx + c D = b 2 4ac (1) D > 0 x (2) D = 0 x (3
13 2 13.0 2 ( ) ( ) 2 13.1 ( ) ax 2 + bx + c > 0 ( a, b, c ) ( ) 275 > > 2 2 13.3 x 2 x y = ax 2 + bx + c y = 0 2 ax 2 + bx + c = 0 y = 0 x ( x ) y = ax 2 + bx + c D = b 2 4ac (1) D >
More informationK 2 X = 4 MWG(f), X P 2 F, υ 0 : X P 2 2,, {f λ : X λ P 1 } λ Λ NS(X λ ), (υ 0 ) λ : X λ P 2 ( 1) X 6, f λ K X + F, f ( 1), n, n 1 (cf [10]) X, f : X
2 E 8 1, E 8, [6], II II, E 8, 2, E 8,,, 2 [14],, X/C, f : X P 1 2 3, f, (O), f X NS(X), (O) T ( 1), NS(X), T [15] : MWG(f) NS(X)/T, MWL(f) 0 (T ) NS(X), MWL(f) MWL(f) 0, : {f λ : X λ P 1 } λ Λ NS(X λ
More informationx x x 2, A 4 2 Ax.4 A A A A λ λ 4 λ 2 A λe λ λ2 5λ + 6 0,...λ 2, λ 2 3 E 0 E 0 p p Ap λp λ 2 p 4 2 p p 2 p { 4p 2 2p p + 2 p, p 2 λ {
K E N Z OU 2008 8. 4x 2x 2 2 2 x + x 2. x 2 2x 2, 2 2 d 2 x 2 2.2 2 3x 2... d 2 x 2 5 + 6x 0 2 2 d 2 x 2 + P t + P 2tx Qx x x, x 2 2 2 x 2 P 2 tx P tx 2 + Qx x, x 2. d x 4 2 x 2 x x 2.3 x x x 2, A 4 2
More information研修コーナー
l l l l l l l l l l l α α β l µ l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l l
More informationX G P G (X) G BG [X, BG] S 2 2 2 S 2 2 S 2 = { (x 1, x 2, x 3 ) R 3 x 2 1 + x 2 2 + x 2 3 = 1 } R 3 S 2 S 2 v x S 2 x x v(x) T x S 2 T x S 2 S 2 x T x S 2 = { ξ R 3 x ξ } R 3 T x S 2 S 2 x x T x S 2
More information2 1,2, , 2 ( ) (1) (2) (3) (4) Cameron and Trivedi(1998) , (1987) (1982) Agresti(2003)
3 1 1 1 2 1 2 1,2,3 1 0 50 3000, 2 ( ) 1 3 1 0 4 3 (1) (2) (3) (4) 1 1 1 2 3 Cameron and Trivedi(1998) 4 1974, (1987) (1982) Agresti(2003) 3 (1)-(4) AAA, AA+,A (1) (2) (3) (4) (5) (1)-(5) 1 2 5 3 5 (DI)
More informationTD(0) Q AC (Reward): () Pr(r t+1 s t+1 = s,s t = s, a t = a) t R a ss = E(r t+1 s t+1 = s,s t = s, a t = a) R t = r t+1 + γr t γ T r t+t +1 = T
() 2009 TD(0) Q AC 2009 1/42 2009 2/42 TD(0) Q AC (Renforcement Learnng) : (polcy) Acton: a t Agent (= Controller) Envronment (= Controlled object) State: s t Reward: r t TD(0) Q AC (Envronment) (Markov
More information1 θ i (1) A B θ ( ) A = B = sin 3θ = sin θ (A B sin 2 θ) ( ) 1 2 π 3 < = θ < = 2 π 3 Ax Bx3 = 1 2 θ = π sin θ (2) a b c θ sin 5θ = sin θ f(sin 2 θ) 2
θ i ) AB θ ) A = B = sin θ = sin θ A B sin θ) ) < = θ < = Ax Bx = θ = sin θ ) abc θ sin 5θ = sin θ fsin θ) fx) = ax bx c ) cos 5 i sin 5 ) 5 ) αβ α iβ) 5 α 4 β α β β 5 ) a = b = c = ) fx) = 0 x x = x =
More informationTOP URL 1
TOP URL http://amonphys.web.fc.com/ 3.............................. 3.............................. 4.3 4................... 5.4........................ 6.5........................ 8.6...........................7
More informationit-ken_open.key
深層学習技術の進展 ImageNet Classification 画像認識 音声認識 自然言語処理 機械翻訳 深層学習技術は これらの分野において 特に圧倒的な強みを見せている Figure (Left) Eight ILSVRC-2010 test Deep images and the cited4: from: ``ImageNet Classification with Networks et
More informationr 1 m A r/m i) t ii) m i) t B(t; m) ( B(t; m) = A 1 + r ) mt m ii) B(t; m) ( B(t; m) = A 1 + r ) mt m { ( = A 1 + r ) m } rt r m n = m r m n B
1 1.1 1 r 1 m A r/m i) t ii) m i) t Bt; m) Bt; m) = A 1 + r ) mt m ii) Bt; m) Bt; m) = A 1 + r ) mt m { = A 1 + r ) m } rt r m n = m r m n Bt; m) Aert e lim 1 + 1 n 1.1) n!1 n) e a 1, a 2, a 3,... {a n
More informationOABC OA OC 4, OB, AOB BOC COA 60 OA a OB b OC c () AB AC () ABC D OD ABC OD OA + p AB + q AC p q () OABC 4 f(x) + x ( ), () y f(x) P l 4 () y f(x) l P
4 ( ) ( ) ( ) ( ) 4 5 5 II III A B (0 ) 4, 6, 7 II III A B (0 ) ( ),, 6, 8, 9 II III A B (0 ) ( [ ] ) 5, 0, II A B (90 ) log x x () (a) y x + x (b) y sin (x + ) () (a) (b) (c) (d) 0 e π 0 x x x + dx e
More information2016 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 1 16 2 1 () X O 3 (O1) X O, O (O2) O O (O3) O O O X (X, O) O X X (O1), (O2), (O3) (O2) (O3) n (O2) U 1,..., U n O U k O k=1 (O3) U λ O( λ Λ) λ Λ U λ O 0 X 0 (O2) n =
More information( )
NAIST-IS-MT0851100 2010 2 4 ( ) CR CR CR 1980 90 CR Kerberos SSH CR CR CR CR CR CR,,, ID, NAIST-IS- MT0851100, 2010 2 4. i On the Key Management Policy of Challenge Response Authentication Schemes Toshiya
More informationx () g(x) = f(t) dt f(x), F (x) 3x () g(x) g (x) f(x), F (x) (3) h(x) = x 3x tf(t) dt.9 = {(x, y) ; x, y, x + y } f(x, y) = xy( x y). h (x) f(x), F (x
[ ] IC. f(x) = e x () f(x) f (x) () lim f(x) lim f(x) x + x (3) lim f(x) lim f(x) x + x (4) y = f(x) ( ) ( s46). < a < () a () lim a log xdx a log xdx ( ) n (3) lim log k log n n n k=.3 z = log(x + y ),
More informationV 0 = + r pv (H) + qv (T ) = + r ps (H) + qs (T ) = S 0 X n+ (T ) = n S n+ (T ) + ( + r)(x n n S n ) = ( + r)x n + n (d r)s n = ( + r)v n + V n+(h) V
I (..2) (0 < d < + r < u) X 0, X X = 0 S + ( + r)(x 0 0 S 0 ) () X 0 = 0, P (X 0) =, P (X > 0) > 0 0 H, T () X 0 = 0, X (H) = 0 us 0 ( + r) 0 S 0 = 0 S 0 (u r) X (T ) = 0 ds 0 ( + r) 0 S 0 = 0 S 0 (d r)
More informationuntitled
17 5 13 1 2 1.1... 2 1.2... 2 1.3... 3 2 3 2.1... 3 2.2... 5 3 6 3.1... 6 3.2... 7 3.3 t... 7 3.4 BC a... 9 3.5... 10 4 11 1 1 θ n ˆθ. ˆθ, ˆθ, ˆθ.,, ˆθ.,.,,,. 1.1 ˆθ σ 2 = E(ˆθ E ˆθ) 2 b = E(ˆθ θ). Y 1,,Y
More information1 1 n 0, 1, 2,, n n 2 a, b a n b n a, b n a b (mod n) 1 1. n = (mod 10) 2. n = (mod 9) n II Z n := {0, 1, 2,, n 1} 1.
1 1 n 0, 1, 2,, n 1 1.1 n 2 a, b a n b n a, b n a b (mod n) 1 1. n = 10 1567 237 (mod 10) 2. n = 9 1567 1826578 (mod 9) n II Z n := {0, 1, 2,, n 1} 1.2 a b a = bq + r (0 r < b) q, r q a b r 2 1. a = 456,
More information1 4 1 ( ) ( ) ( ) ( ) () 1 4 2
7 1995, 2017 7 21 1 2 2 3 3 4 4 6 (1).................................... 6 (2)..................................... 6 (3) t................. 9 5 11 (1)......................................... 11 (2)
More informationAC Modeling and Control of AC Motors Seiji Kondo, Member 1. q q (1) PM (a) N d q Dept. of E&E, Nagaoka Unive
AC Moeling an Control of AC Motors Seiji Kono, Member 1. (1) PM 33 54 64. 1 11 1(a) N 94 188 163 1 Dept. of E&E, Nagaoka University of Technology 163 1, Kamitomioka-cho, Nagaoka, Niigata 94 188 (a) 巻数
More information_0212_68<5A66><4EBA><79D1>_<6821><4E86><FF08><30C8><30F3><30DC><306A><3057><FF09>.pdf
More information
2012 A, N, Z, Q, R, C
2012 A, N, Z, Q, R, C 1 2009 9 2 2011 2 3 2012 9 1 2 2 5 3 11 4 16 5 22 6 25 7 29 8 32 1 1 1.1 3 1 1 1 1 1 1? 3 3 3 3 3 3 3 1 1, 1 1 + 1 1 1+1 2 2 1 2+1 3 2 N 1.2 N (i) 2 a b a 1 b a < b a b b a a b (ii)
More information28 SAS-X Proposal of Multi Device Authenticable Password Management System using SAS-X 1195074 2017 2 3 SAS-X Web ID/ ID/ Web SAS-2 SAS-X i Abstract Proposal of Multi Device Authenticable Password Management
More information20 9 19 1 3 11 1 3 111 3 112 1 4 12 6 121 6 122 7 13 7 131 8 132 10 133 10 134 12 14 13 141 13 142 13 143 15 144 16 145 17 15 19 151 1 19 152 20 2 21 21 21 211 21 212 1 23 213 1 23 214 25 215 31 22 33
More information18 ( ) I II III A B C(100 ) 1, 2, 3, 5 I II A B (100 ) 1, 2, 3 I II A B (80 ) 6 8 I II III A B C(80 ) 1 n (1 + x) n (1) n C 1 + n C
8 ( ) 8 5 4 I II III A B C( ),,, 5 I II A B ( ),, I II A B (8 ) 6 8 I II III A B C(8 ) n ( + x) n () n C + n C + + n C n = 7 n () 7 9 C : y = x x A(, 6) () A C () C P AP Q () () () 4 A(,, ) B(,, ) C(,,
More information