Primal Implication as Encryption

نویسنده

  • Vladimir N. Krupski
چکیده

We propose a “cryptographic” interpretation for the propositional connectives of primal infon logic introduced by Y. Gurevich and I. Neeman and prove the corresponding soundness and completeness results. Primal implication φ→p ψ corresponds to the encryption of ψ with a secret key φ, primal disjunction φ ∨p ψ is a group key and ⊥ reflects some backdoor constructions such as full superuser permissions or a universal decryption key. For the logic of ⊥ as a universal key (it was never considered before) we prove that the derivability problem has linear time complexity. We also show that the universal key can be emulated using primal disjunction.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Primal strong co-ideals in semirings

In this paper, we introduce the notion of primal strong co-ideals and give some results involving them. It is shown thatsubtractive strong co-ideals are intersection of all primal strong co-ideals that contain them. Also we prove that the representation of strong co-ideals as reduced intersections of primal strong co-ideals is unique.

متن کامل

On 2-primal Ore Extensions

When R is a local ring with a nilpotent maximal ideal, the Ore extension R[x;σ, δ] will or will not be 2-primal depending on the δ-stability of the maximal ideal of R. In the case where R[x;σ, δ] is 2-primal, it will satisfy an even stronger condition; in the case where R[x;σ, δ] is not 2-primal, it will fail to satisfy an even weaker condition. 1. Background and motivation In [13, Proposition ...

متن کامل

Gradient Primal-Dual Algorithm Converges to Second-Order Stationary Solutions for Nonconvex Distributed Optimization

In this work, we study two first-order primal-dual based algorithms, the Gradient Primal-Dual Algorithm (GPDA) and the Gradient Alternating Direction Method of Multipliers (GADMM), for solving a class of linearly constrained non-convex optimization problems. We show that with random initialization of the primal and dual variables, both algorithms are able to compute second-order stationary solu...

متن کامل

Transitive Primal Infon Logic

Primal infon logic was introduced in 2009 in connection with access control. In addition to traditional logic constructs, it contains unary connectives p said indispensable in the intended access control applications. Propositional primal infon logic is decidable in linear time, yet suffices for many common access control scenarios. The most obvious limitation on its expressivity is the failure...

متن کامل

A Performance Survey of Meta-Heuristic And Brute-Force Search Algorithms to Cryptanalysis The SDES Encryption Algorithm

For many years, cryptanalysis has been considered as an attractive topic in jeopardizing the security and resistance of an encryption algorithm. The SDES encryption algorithm is a symmetric cryptography algorithm that performs a cryptographic operation using a crypt key. In the world of encryption, there are many search algorithms to cryptanalysis. In these researches, brute force attack algori...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014