Cryptography Reference
In-Depth Information
Secondly, we note that the definition of odd error detection needs to be
changed, since hc T F q \{
0
}
as well: We define odd error detection at bit i
as the case when hc T
=0and h i
= 0. The reason is that since
: h ( xc ) T = x ( hc T )and hc T
x ( hc T )
x F q \{
0
}
=0
=0 , (1)
all values of hc T have the same probability, and they are independent of the
value of h i .
Finally, the original algorithm adds up the vectors h in order to compute the
relative frequencies of p +
w
and q +
w
F q would disturb these
frequencies because entries of h greater than 1 bias the computation. Instead,
we add Θ ( h )=( θ ( h 1 ) ,...,θ ( h n k )), where
. Doing the same over
0 x =0
1 e .
θ :
F q F q ,x
In order to proceed, we introduce some notation. Consider the case where e and
a vector h are both non-zero in exactly i bits. In contrast to the binary case, we
don't have the equivalence i even
hc T = 0. Since every non-zero value of hc T
has the same probability (and occurs the same number of times when H w =
C ),
the quantities
( q,i )= ( q
1) i
C
(2)
q
( q
1) i
C ( q,i )=( q
1) i
·
( q
1)
(3)
q
reflect the relative frequencies of non-zero and zero values of hc T , respectively,
where
denotes rounding to the nearest integer. They are well-defined since
1) i /q N
( q
can only occur for q =2.
Using equation (1), we can calculate the respective probabilities.
+
{
0 . 5
}
= j =1 C
( q,j ) t 1
j 1 n t
( q
1) w j
w j
p ++
w
( q,j ) j n t
( q
(4)
j =1 C
1) w j
w j
( q,j ) t 1
j
n t
w j
( q
= j =1 C
1) w j
q ++
w
( q,j ) j n t
( q
(5)
j =1 C
1) w j
w j
= j =0 C ( q,j ) t 1
j 1 n t
( q
1) w j
w j
p −−
w
( q,j ) j n t
( q
(6)
j =0 C
1) w j
w j
= j =0 C ( q,j ) t 1
n t
w j
( q
1) w j
j
q −−
w
( q,j ) j
n t
w j
( q
(7)
j =0 C
1) w j
Consequently, we redefine
v ++
y,w
|{ h H w : hc T
=
=0
}|
(8)
v −−
y,w
|{ h H w : hc T =0
=
}|
(9)
 
Search WWH ::




Custom Search