Primal Implication as Encryption
نویسنده
چکیده
We propose a “cryptographic” interpretation for the propositional connectives of primal infon logic introduced by Y. Gurevich and I. Neeman and prove the corresponding soundness and completeness results. Primal implication φ→p ψ corresponds to the encryption of ψ with a secret key φ, primal disjunction φ ∨p ψ is a group key and ⊥ reflects some backdoor constructions such as full superuser permissions or a universal decryption key. For the logic of ⊥ as a universal key (it was never considered before) we prove that the derivability problem has linear time complexity. We also show that the universal key can be emulated using primal disjunction.
منابع مشابه
Primal strong co-ideals in semirings
In this paper, we introduce the notion of primal strong co-ideals and give some results involving them. It is shown thatsubtractive strong co-ideals are intersection of all primal strong co-ideals that contain them. Also we prove that the representation of strong co-ideals as reduced intersections of primal strong co-ideals is unique.
متن کاملOn 2-primal Ore Extensions
When R is a local ring with a nilpotent maximal ideal, the Ore extension R[x;σ, δ] will or will not be 2-primal depending on the δ-stability of the maximal ideal of R. In the case where R[x;σ, δ] is 2-primal, it will satisfy an even stronger condition; in the case where R[x;σ, δ] is not 2-primal, it will fail to satisfy an even weaker condition. 1. Background and motivation In [13, Proposition ...
متن کاملGradient Primal-Dual Algorithm Converges to Second-Order Stationary Solutions for Nonconvex Distributed Optimization
In this work, we study two first-order primal-dual based algorithms, the Gradient Primal-Dual Algorithm (GPDA) and the Gradient Alternating Direction Method of Multipliers (GADMM), for solving a class of linearly constrained non-convex optimization problems. We show that with random initialization of the primal and dual variables, both algorithms are able to compute second-order stationary solu...
متن کاملTransitive Primal Infon Logic
Primal infon logic was introduced in 2009 in connection with access control. In addition to traditional logic constructs, it contains unary connectives p said indispensable in the intended access control applications. Propositional primal infon logic is decidable in linear time, yet suffices for many common access control scenarios. The most obvious limitation on its expressivity is the failure...
متن کاملA Performance Survey of Meta-Heuristic And Brute-Force Search Algorithms to Cryptanalysis The SDES Encryption Algorithm
For many years, cryptanalysis has been considered as an attractive topic in jeopardizing the security and resistance of an encryption algorithm. The SDES encryption algorithm is a symmetric cryptography algorithm that performs a cryptographic operation using a crypt key. In the world of encryption, there are many search algorithms to cryptanalysis. In these researches, brute force attack algori...
متن کامل