Asymptotic granularity reduction and its application
نویسندگان
چکیده
It is well known that the inverse function of y = x with the derivative y′ = 1 is x = y, the inverse function of y = c with the derivative y′ = 0 is nonexistent, and so on. Hence, on the assumption that the noninvertibility of the univariate increasing function y = f (x) with x > 0 is in direct proportion to the growth rate reflected by its derivative, the authors put forward a method of comparing difficulties in inverting two functions on a continuous or discrete interval called asymptotic granularity reduction (AGR) which integrates asymptotic analysis with logarithmic granularities, and is an extension and a complement to polynomial time (Turing) reduction (PTR). Prove by AGR that inverting y ≡ x x (mod p) is computationally harder than inverting y ≡ g x (mod p), and inverting y ≡ g x n (mod p) is computationally equivalent to inverting y ≡ g x (mod p), which are compatible with the results from PTR. Besides, apply AGR to the comparison of inverting y ≡ x n (mod p) with y ≡ g x (mod p), y ≡ g g1 x (mod p) with y ≡ g x (mod p), and y ≡ x n + x + 1 (mod p) with y ≡ x n (mod p) in difficulty, and observe that the results are consistent with existing facts, which further illustrates that AGR is suitable for comparison of inversion problems in difficulty. Last, prove by AGR that inverting y ≡ x n g x (mod p) is computationally equivalent to inverting y ≡ g x (mod p) when PTR cannot be utilized expediently. AGR with the assumption partitions the complexities of problems more detailedly, and finds out some new evidence for the securities of cryptosystems.
منابع مشابه
Asymptotic algorithm for computing the sample variance of interval data
The problem of the sample variance computation for epistemic inter-val-valued data is, in general, NP-hard. Therefore, known efficient algorithms for computing variance require strong restrictions on admissible intervals like the no-subset property or heavy limitations on the number of possible intersections between intervals. A new asymptotic algorithm for computing the upper bound of the samp...
متن کاملThe Relatedness and Comparative Utility of Various Approaches to Operational Semantics
We examine three approaches to operational semantics: transition semantics, natural semantics, and reduction semantics. First we compare the style and expressive power of the three forms of semantics by using them to construct semantics for various language features. Program abortion, interleaving, and block structure particularly distinguish the three. Natural semantics was very good at specif...
متن کاملA Novel Distance Measure of Multi-Granularity Linguistic Variables and Its Application to MADM
Many decision problems are under uncertain environments with vague and imprecise information using multi-granularity linguistic variables. In this paper, we describe the linguistic hierarchical structure in a different way. The suitable numerical scales are given with the purpose of making transformation between multi-granularity linguistic variables and numerical values. A novel distance measu...
متن کاملCalculating Credit Risk Capital Charges with the One-Factor Model
Even in the simple Vasicek one-factor credit portfolio model, the exact contributions to credit value-at-risk cannot be calculated without Monte-Carlo simulation. As this may require a lot of computational time, there is a need for approximate analytical formulae. In this note, we develop formulae according to two different approaches: the granularity adjustment approach initiated by M. Gordy a...
متن کاملAsymptotic Efficiencies of the MLE Based on Bivariate Record Values from Bivariate Normal Distribution
Abstract. Maximum likelihood (ML) estimation based on bivariate record data is considered as the general inference problem. Assume that the process of observing k records is repeated m times, independently. The asymptotic properties including consistency and asymptotic normality of the Maximum Likelihood (ML) estimates of parameters of the underlying distribution is then established, when m is ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Theor. Comput. Sci.
دوره 412 شماره
صفحات -
تاریخ انتشار 2011