Recently attention has been drawn to the frequently observed fifth power of the golden mean in many disciplines of science and technology. Whereas in a forthcoming contribution the focus will be directed towards <i...Recently attention has been drawn to the frequently observed fifth power of the golden mean in many disciplines of science and technology. Whereas in a forthcoming contribution the focus will be directed towards <i>Fibonacci</i> number-based helical structures of living as well as inorganic matter, in this short letter the geometry of the Great Pyramid of the ancient Egyptians was investigated once more. The surprising main result is that the ratio of the in-sphere volume of the pyramid and the pyramid volume itself is given by π⋅<i>φ</i><sup>5</sup>, where <i>φ</i> = 0.618033987<span style="white-space:nowrap;">⋅<span style="white-space:nowrap;">⋅</span><span style="white-space:nowrap;">⋅</span></span> is nature’s most important number, the golden mean. In this way not only phase transitions from microscopic to cosmic scale are connected with <i>φ</i><sup>5</sup>, also ingenious ancient builders have intuitively guessed its magic before.展开更多
Zhou Dan, an articulate lawyer, led a semi-secret life until recently when he was invited to give a talk to the Homosexual Studies class at Fudan University in Shanghai.
In 1040,Lady Godiva“rode naked on a horse throughCoventry—a city in England. She was trying to persuade herhusband,the Earl of Chester,not to make the townspeoplepay more taxes.To show respect,everyone in the town s...In 1040,Lady Godiva“rode naked on a horse throughCoventry—a city in England. She was trying to persuade herhusband,the Earl of Chester,not to make the townspeoplepay more taxes.To show respect,everyone in the town stayedindoors so that they would not see her.One man peeped—quickly looked—through his window and so became known展开更多
Identity-Based Encryption (IBE) has seen limited adoption, largely due to the absolute trust that must be placed in the private key generator (PKG)—an authority that computes the private keys for all the users in the...Identity-Based Encryption (IBE) has seen limited adoption, largely due to the absolute trust that must be placed in the private key generator (PKG)—an authority that computes the private keys for all the users in the environment. Several constructions have been proposed to reduce the trust required in the PKG (and thus preserve the privacy of users), but these have generally relied on unrealistic assumptions regarding non-collusion between various entities in the system. Unfortunately, these constructions have not significantly improved IBE adoption rates in real-world environments. In this paper, we present a construction that reduces trust in the PKG without unrealistic non-collusion assumptions. We achieve this by incorporating a novel combination of digital credential technology and bilinear maps, and making use of multiple randomly-chosen entities to complete certain tasks. The main result and primary contribution of this paper are a thorough security analysis of this proposed construction, examining the various entity types, attacker models, and collusion opportunities in this environment. We show that this construction can prevent, or at least mitigate, all considered attacks. We conclude that our construction appears to be effective in preserving user privacy and we hope that this construction and its security analysis will encourage greater use of IBE in real-world environments.展开更多
文摘Recently attention has been drawn to the frequently observed fifth power of the golden mean in many disciplines of science and technology. Whereas in a forthcoming contribution the focus will be directed towards <i>Fibonacci</i> number-based helical structures of living as well as inorganic matter, in this short letter the geometry of the Great Pyramid of the ancient Egyptians was investigated once more. The surprising main result is that the ratio of the in-sphere volume of the pyramid and the pyramid volume itself is given by π⋅<i>φ</i><sup>5</sup>, where <i>φ</i> = 0.618033987<span style="white-space:nowrap;">⋅<span style="white-space:nowrap;">⋅</span><span style="white-space:nowrap;">⋅</span></span> is nature’s most important number, the golden mean. In this way not only phase transitions from microscopic to cosmic scale are connected with <i>φ</i><sup>5</sup>, also ingenious ancient builders have intuitively guessed its magic before.
文摘Zhou Dan, an articulate lawyer, led a semi-secret life until recently when he was invited to give a talk to the Homosexual Studies class at Fudan University in Shanghai.
文摘In 1040,Lady Godiva“rode naked on a horse throughCoventry—a city in England. She was trying to persuade herhusband,the Earl of Chester,not to make the townspeoplepay more taxes.To show respect,everyone in the town stayedindoors so that they would not see her.One man peeped—quickly looked—through his window and so became known
文摘Identity-Based Encryption (IBE) has seen limited adoption, largely due to the absolute trust that must be placed in the private key generator (PKG)—an authority that computes the private keys for all the users in the environment. Several constructions have been proposed to reduce the trust required in the PKG (and thus preserve the privacy of users), but these have generally relied on unrealistic assumptions regarding non-collusion between various entities in the system. Unfortunately, these constructions have not significantly improved IBE adoption rates in real-world environments. In this paper, we present a construction that reduces trust in the PKG without unrealistic non-collusion assumptions. We achieve this by incorporating a novel combination of digital credential technology and bilinear maps, and making use of multiple randomly-chosen entities to complete certain tasks. The main result and primary contribution of this paper are a thorough security analysis of this proposed construction, examining the various entity types, attacker models, and collusion opportunities in this environment. We show that this construction can prevent, or at least mitigate, all considered attacks. We conclude that our construction appears to be effective in preserving user privacy and we hope that this construction and its security analysis will encourage greater use of IBE in real-world environments.