-
Digital me ontology and ethics
Authors:
Ljupco Kocarev,
Jasna Koteska
Abstract:
This paper addresses ontology and ethics of an AI agent called digital me. We define digital me as autonomous, decision-making, and learning agent, representing an individual and having practically immortal own life. It is assumed that digital me is equipped with the big-five personality model, ensuring that it provides a model of some aspects of a strong AI: consciousness, free will, and intentio…
▽ More
This paper addresses ontology and ethics of an AI agent called digital me. We define digital me as autonomous, decision-making, and learning agent, representing an individual and having practically immortal own life. It is assumed that digital me is equipped with the big-five personality model, ensuring that it provides a model of some aspects of a strong AI: consciousness, free will, and intentionality. As computer-based personality judgments are more accurate than those made by humans, digital me can judge the personality of the individual represented by the digital me, other individuals' personalities, and other digital me-s. We describe seven ontological qualities of digital me: a) double-layer status of Digital Being versus digital me, b) digital me versus real me, c) mind-digital me and body-digital me, d) digital me versus doppelganger (shadow digital me), e) non-human time concept, f) social quality, g) practical immortality. We argue that with the advancement of AI's sciences and technologies, there exist two digital me thresholds. The first threshold defines digital me having some (rudimentarily) form of consciousness, free will, and intentionality. The second threshold assumes that digital me is equipped with moral learning capabilities, implying that, in principle, digital me could develop their own ethics which significantly differs from human's understanding of ethics. Finally we discuss the implications of digital me metaethics, normative and applied ethics, the implementation of the Golden Rule in digital me-s, and we suggest two sets of normative principles for digital me: consequentialist and duty based digital me principles.
△ Less
Submitted 22 December, 2020;
originally announced December 2020.
-
Graphlets in Multiplex Networks
Authors:
Tamara Dimitrova,
Kristijan Petrovski,
Ljupco Kocarev
Abstract:
We develop graphlet analysis for multiplex networks and discuss how this analysis can be extended to multilayer and multilevel networks as well as to graphs with node and/or link categorical attributes. The analysis has been adapted for two typical examples of multiplexes: economic trade data represented as a 957-plex network and 75 social networks each represented as a 12-plex network. We show th…
▽ More
We develop graphlet analysis for multiplex networks and discuss how this analysis can be extended to multilayer and multilevel networks as well as to graphs with node and/or link categorical attributes. The analysis has been adapted for two typical examples of multiplexes: economic trade data represented as a 957-plex network and 75 social networks each represented as a 12-plex network. We show that wedges (open triads) occur more often in economic trade networks than in social networks, indicating the tendency of a country to produce/trade of a product in local structure of triads which are not closed. Moreover, our analysis provides evidence that the countries with small diversity tend to form correlated triangles. Wedges also appear in the social networks, however the dominant graphlets in social networks are triangles (closed triads). If a multiplex structure indicates a strong tie, the graphlet analysis provides another evidence for the concepts of strong/weak ties and structural holes. In contrast to Granovetter's seminal work on the strength of weak ties, in which it has been documented that the wedges with only strong ties are absent, here we show that for the analyzed 75 social networks, the wedges with only strong ties are not only present but also significantly correlated.
△ Less
Submitted 17 November, 2019;
originally announced December 2019.
-
Random Walk with Memory on Complex Networks
Authors:
Lasko Basnarkov,
Miroslav Mirchev,
Ljupco Kocarev
Abstract:
We study random walk on complex networks with transition probabilities which depend on the current and previously visited nodes. By using an absorbing Markov chain we derive an exact expression for the mean first passage time between pairs of nodes, for a random walk with a memory of one step. We have analyzed one particular model of random walk, where the transition probabilities depend on the nu…
▽ More
We study random walk on complex networks with transition probabilities which depend on the current and previously visited nodes. By using an absorbing Markov chain we derive an exact expression for the mean first passage time between pairs of nodes, for a random walk with a memory of one step. We have analyzed one particular model of random walk, where the transition probabilities depend on the number of paths to the second neighbors. The numerical experiments on paradigmatic complex networks verify the validity of the theoretical expressions, and also indicate that the flattening of the stationary occupation probability accompanies a nearly optimal random search.
△ Less
Submitted 28 August, 2020; v1 submitted 18 July, 2019;
originally announced July 2019.
-
Stability of decision trees and logistic regression
Authors:
Nino Arsov,
Martin Pavlovski,
Ljupco Kocarev
Abstract:
Decision trees and logistic regression are one of the most popular and well-known machine learning algorithms, frequently used to solve a variety of real-world problems. Stability of learning algorithms is a powerful tool to analyze their performance and sensitivity and subsequently allow researchers to draw reliable conclusions. The stability of these two algorithms has remained obscure. To that…
▽ More
Decision trees and logistic regression are one of the most popular and well-known machine learning algorithms, frequently used to solve a variety of real-world problems. Stability of learning algorithms is a powerful tool to analyze their performance and sensitivity and subsequently allow researchers to draw reliable conclusions. The stability of these two algorithms has remained obscure. To that end, in this paper, we derive two stability notions for decision trees and logistic regression: hypothesis and pointwise hypothesis stability. Additionally, we derive these notions for L2-regularized logistic regression and confirm existing findings that it is uniformly stable. We show that the stability of decision trees depends on the number of leaves in the tree, i.e., its depth, while for logistic regression, it depends on the smallest eigenvalue of the Hessian matrix of the cross-entropy loss. We show that logistic regression is not a stable learning algorithm. We construct the upper bounds on the generalization error of all three algorithms. Moreover, we present a novel stability measuring framework that allows one to measure the aforementioned notions of stability. The measures are equivalent to estimates of expected loss differences at an input example and then leverage bootstrap sampling to yield statistically reliable estimates. Finally, we apply this framework to the three algorithms analyzed in this paper to confirm our theoretical findings and, in addition, we discuss the possibilities of developing new training techniques to optimize the stability of logistic regression, and hence decrease its generalization error.
△ Less
Submitted 2 March, 2019;
originally announced March 2019.
-
Stacking and stability
Authors:
Nino Arsov,
Martin Pavlovski,
Ljupco Kocarev
Abstract:
Stacking is a general approach for combining multiple models toward greater predictive accuracy. It has found various application across different domains, ensuing from its meta-learning nature. Our understanding, nevertheless, on how and why stacking works remains intuitive and lacking in theoretical insight. In this paper, we use the stability of learning algorithms as an elemental analysis fram…
▽ More
Stacking is a general approach for combining multiple models toward greater predictive accuracy. It has found various application across different domains, ensuing from its meta-learning nature. Our understanding, nevertheless, on how and why stacking works remains intuitive and lacking in theoretical insight. In this paper, we use the stability of learning algorithms as an elemental analysis framework suitable for addressing the issue. To this end, we analyze the hypothesis stability of stacking, bag-stacking, and dag-stacking and establish a connection between bag-stacking and weighted bagging. We show that the hypothesis stability of stacking is a product of the hypothesis stability of each of the base models and the combiner. Moreover, in bag-stacking and dag-stacking, the hypothesis stability depends on the sampling strategy used to generate the training set replicates. Our findings suggest that 1) subsampling and bootstrap sampling improve the stability of stacking, and 2) stacking improves the stability of both subbagging and bagging.
△ Less
Submitted 25 January, 2019;
originally announced January 2019.
-
Sparse Three-parameter Restricted Indian Buffet Process for Understanding International Trade
Authors:
Melanie F. Pradier,
Viktor Stojkoski,
Zoran Utkovski,
Ljupco Kocarev,
Fernando Perez-Cruz
Abstract:
This paper presents a Bayesian nonparametric latent feature model specially suitable for exploratory analysis of high-dimensional count data. We perform a non-negative doubly sparse matrix factorization that has two main advantages: not only we are able to better approximate the row input distributions, but the inferred topics are also easier to interpret. By combining the three-parameter and rest…
▽ More
This paper presents a Bayesian nonparametric latent feature model specially suitable for exploratory analysis of high-dimensional count data. We perform a non-negative doubly sparse matrix factorization that has two main advantages: not only we are able to better approximate the row input distributions, but the inferred topics are also easier to interpret. By combining the three-parameter and restricted Indian buffet processes into a single prior, we increase the model flexibility, allowing for a full spectrum of sparse solutions in the latent space. We demonstrate the usefulness of our approach in the analysis of countries' economic structure. Compared to other approaches, empirical results show our model's ability to give easy-to-interpret information and better capture the underlying sparsity structure of data.
△ Less
Submitted 29 June, 2018;
originally announced June 2018.
-
Bridging Online and Offline Social Networks: Multiplex Analysis
Authors:
Sonja Filiposka,
Andrej Gajduk,
Tamara Dimitrova,
Ljupco Kocarev
Abstract:
We show that three basic actor characteristics, namely normalized reciprocity, three cycles, and triplets, can be expressed using an unified framework that is based on computing the similarity index between two sets associated with the actor: the set of her/his friends and the set of those considering her/him as a friend. These metrics are extended to multiplex networks and then computed for two f…
▽ More
We show that three basic actor characteristics, namely normalized reciprocity, three cycles, and triplets, can be expressed using an unified framework that is based on computing the similarity index between two sets associated with the actor: the set of her/his friends and the set of those considering her/him as a friend. These metrics are extended to multiplex networks and then computed for two friendship networks generated by collecting data from two groups of undergraduate students. We found that in offline communication strong and weak ties are (almost) equally presented, while in online communication weak ties are dominant. Moreover, weak ties are much less reciprocal than strong ties. However, across different layers of the multiplex network reciprocities are preserved, while triads (measured with normalized three cycles and triplets) are not significant.
△ Less
Submitted 6 May, 2016;
originally announced May 2016.
-
Graphlet characteristics in directed networks
Authors:
Igor Trpevski,
Tamara Dimitrova,
Tommy Boshkovski,
Ljupco Kocarev
Abstract:
A number of network structural characteristics have recently been the subject of particularly intense research, including degree distributions, community structure, and various measures of vertex centrality, to mention only a few. Vertices may have attributes associated with them; for example, properties of proteins in protein-protein interaction networks, users' social network profiles, or author…
▽ More
A number of network structural characteristics have recently been the subject of particularly intense research, including degree distributions, community structure, and various measures of vertex centrality, to mention only a few. Vertices may have attributes associated with them; for example, properties of proteins in protein-protein interaction networks, users' social network profiles, or authors' publication histories in co-authorship networks. In a network, two vertices might be considered similar if they have similar attributes (features, properties), or they can be considered similar based solely on the network structure. Similarity of this type is called structural similarity, to distinguish it from properties similarity, social similarity, textual similarity, functional similarity or other similarity types found in networks. Here we focus on the similarity problem by computing (1) for each vertex a vector of structural features, called signature vector, based on the number of graphlets associated with the vertex, and (2) for the network its graphlet correlation matrix, measuring graphlets dependencies and hence revealing unknown organizational principles of the network. We found that real-world networks generally have very different structural characteristics resulting in different graphlet correlation matrices. In particular, the graphlet correlation matrix of the brain effective network is computed for 40 healthy subjects and common (present in more than 70 percent subjects) dependencies are raveled. Thus, negative correlations are found for 2-node graphlets and 3-node graphlets that are wedges and positive correlations are found only for 3-node graphlets that are triangles. Graphlets characteristics in directed networks could further significantly increase our understanding of real-world networks.
△ Less
Submitted 22 March, 2016; v1 submitted 18 March, 2016;
originally announced March 2016.
-
Greedy reduction of navigation time in random search processes
Authors:
Igor Trpevski,
Ljupco Kocarev
Abstract:
Random search processes are instrumental in studying and understanding navigation properties of complex networks, food search strategies of animals, diffusion control of molecular processes in biological cells, and improving web search engines. An essential part of random search processes and their applications are various forms of (continuous or discrete time) random walk models. The efficiency o…
▽ More
Random search processes are instrumental in studying and understanding navigation properties of complex networks, food search strategies of animals, diffusion control of molecular processes in biological cells, and improving web search engines. An essential part of random search processes and their applications are various forms of (continuous or discrete time) random walk models. The efficiency of a random search strategy in complex networks is measured with the mean first passage time between two nodes or, more generally, with the mean first passage time between two subsets of the vertex set. In this paper we formulate a problem of adding a set of $k$ links between the two subsets of the vertex set that optimally reduce the mean first passage time between the sets. We demonstrate that the mean first passage time between two sets is non-increasing and supermodular set function defined over the set of links between the two sets. This allows us to use two greedy algorithms that approximately solve the problem and we compare their performance against several standard link prediction algorithms. We find that the proposed greedy algorithms are better at choosing the links that reduce the navigation time between the two sets.
△ Less
Submitted 26 January, 2016;
originally announced January 2016.
-
Opinion mining of text documents written in Macedonian language
Authors:
Andrej Gajduk,
Ljupco Kocarev
Abstract:
The ability to extract public opinion from web portals such as review sites, social networks and blogs will enable companies and individuals to form a view, an attitude and make decisions without having to do lengthy and costly researches and surveys. In this paper machine learning techniques are used for determining the polarity of forum posts on kajgana which are written in Macedonian language.…
▽ More
The ability to extract public opinion from web portals such as review sites, social networks and blogs will enable companies and individuals to form a view, an attitude and make decisions without having to do lengthy and costly researches and surveys. In this paper machine learning techniques are used for determining the polarity of forum posts on kajgana which are written in Macedonian language. The posts are classified as being positive, negative or neutral. We test different feature metrics and classifiers and provide detailed evaluation of their participation in improving the overall performance on a manually generated dataset. By achieving 92% accuracy, we show that the performance of systems for automated opinion mining is comparable to a human evaluator, thus making it a viable option for text data analysis. Finally, we present a few statistics derived from the forum posts using the developed system.
△ Less
Submitted 17 November, 2014;
originally announced November 2014.
-
On Energy-efficiency in Wireless Networks: A Game-theoretic Approach to Cooperation Inspired by Evolutionary Biology
Authors:
Zoran Utkovski,
Andrej Gajduk,
Lasko Basnarkov,
Darko Bosnakovski,
Ljupco Kocarev
Abstract:
We develop a game-theoretic framework to investigate the effect of cooperation on the energy efficiency in wireless networks. We address two examples of network architectures, resembling ad-hoc network and network with central infrastructure node. Most present approaches address the issue of energy efficiency in communication networks by using complex algorithms to enforce cooperation in the netwo…
▽ More
We develop a game-theoretic framework to investigate the effect of cooperation on the energy efficiency in wireless networks. We address two examples of network architectures, resembling ad-hoc network and network with central infrastructure node. Most present approaches address the issue of energy efficiency in communication networks by using complex algorithms to enforce cooperation in the network, followed by extensive signal processing at the network nodes. Instead, we address cooperative communication scenarios which are governed by simple, evolutionary-like, local rules, and do not require strategic complexity of the network nodes. The approach is motivated by recent results in evolutionary biology which suggest that cooperation can emerge in Nature by evolution, i. e. can be favoured by natural selection, if certain mechanism is at work. As result, we are able to show by experiments that cooperative behavior can indeed emerge and persist in wireless networks, even if the behavior of the individual nodes is driven by selfish decision making. The results from this work indicate that uncomplicated local rules, followed by simple fitness evaluation, can promote cooperation and generate network behavior which yields global energy efficiency in certain wireless networks.
△ Less
Submitted 16 May, 2014;
originally announced May 2014.
-
Energy-efficiency in Decentralized Wireless Networks: A Game-theoretic Approach inspired by Evolutionary Biology
Authors:
Andrej Gajduk,
Zoran Utkovski,
Lasko Basnarkov,
Ljupco Kocarev
Abstract:
Energy efficiency is gaining importance in wireless communication networks which have nodes with limited energy supply and signal processing capabilities. We present a numerical study of cooperative communication scenarios based on simple local rules. This is in contrast to most of the approaches in the literature which enforce cooperation by using complex algorithms and require strategic complexi…
▽ More
Energy efficiency is gaining importance in wireless communication networks which have nodes with limited energy supply and signal processing capabilities. We present a numerical study of cooperative communication scenarios based on simple local rules. This is in contrast to most of the approaches in the literature which enforce cooperation by using complex algorithms and require strategic complexity of the network nodes. The approach is motivated by recent results in evolutionary biology which suggest that, if certain mechanism is at work, cooperation can be favoured by natural selection, i. e. even selfish actions of the individual nodes can lead to emergence of cooperative behaviour in the network. The results of the simulations in the context of wireless communication networks verify these observations and indicate that uncomplicated local rules, followed by simple fitness evaluation, can generate network behaviour which yields global energy efficiency.
△ Less
Submitted 14 May, 2014;
originally announced May 2014.
-
Beyond network structure: How heterogenous susceptibility modulates the spread of epidemics
Authors:
Daniel Smilkov,
Cesar A. Hidalgo,
Ljupco Kocarev
Abstract:
The compartmental models used to study epidemic spreading often assume the same susceptibility for all individuals, and are therefore, agnostic about the effects that differences in susceptibility can have on epidemic spreading. Here we show that--for the SIS model--differential susceptibility can make networks more vulnerable to the spread of diseases when the correlation between a node's degree…
▽ More
The compartmental models used to study epidemic spreading often assume the same susceptibility for all individuals, and are therefore, agnostic about the effects that differences in susceptibility can have on epidemic spreading. Here we show that--for the SIS model--differential susceptibility can make networks more vulnerable to the spread of diseases when the correlation between a node's degree and susceptibility are positive, and less vulnerable when this correlation is negative. Moreover, we show that networks become more likely to contain a pocket of infection when individuals are more likely to connect with others that have similar susceptibility (the network is segregated). These results show that the failure to include differential susceptibility to epidemic models can lead to a systematic over/under estimation of fundamental epidemic parameters when the structure of the networks is not independent from the susceptibility of the nodes or when there are correlations between the susceptibility of connected individuals.
△ Less
Submitted 10 March, 2014;
originally announced March 2014.
-
The influence of the network topology on epidemic spreading
Authors:
Daniel Smilkov,
Ljupco Kocarev
Abstract:
The influence of the network's structure on the dynamics of spreading processes has been extensively studied in the last decade. Important results that partially answer this question show a weak connection between the macroscopic behavior of these processes and specific structural properties in the network, such as the largest eigenvalue of a topology related matrix. However, little is known about…
▽ More
The influence of the network's structure on the dynamics of spreading processes has been extensively studied in the last decade. Important results that partially answer this question show a weak connection between the macroscopic behavior of these processes and specific structural properties in the network, such as the largest eigenvalue of a topology related matrix. However, little is known about the direct influence of the network topology on microscopic level, such as the influence of the (neighboring) network on the probability of a particular node's infection. To answer this question, we derive both an upper and a lower bound for the probability that a particular node is infective in a susceptible-infective-susceptible model for two cases of spreading processes: reactive and contact processes. The bounds are derived by considering the $n-$hop neighborhood of the node; the bounds are tighter as one uses a larger $n-$hop neighborhood to calculate them. Consequently, using local information for different neighborhood sizes, we assess the extent to which the topology influences the spreading process, thus providing also a strong macroscopic connection between the former and the latter. Our findings are complemented by numerical results for a real-world e-mail network. A very good estimate for the infection density $ρ$ is obtained using only 2-hop neighborhoods which account for 0.4% of the entire network topology on average.
△ Less
Submitted 14 November, 2011;
originally announced November 2011.
-
Identifying communities by influence dynamics in social networks
Authors:
Angel Stanoev,
Daniel Smilkov,
Ljupco Kocarev
Abstract:
Communities are not static; they evolve, split and merge, appear and disappear, i.e. they are product of dynamical processes that govern the evolution of the network. A good algorithm for community detection should not only quantify the topology of the network, but incorporate the dynamical processes that take place on the network. We present a novel algorithm for community detection that combines…
▽ More
Communities are not static; they evolve, split and merge, appear and disappear, i.e. they are product of dynamical processes that govern the evolution of the network. A good algorithm for community detection should not only quantify the topology of the network, but incorporate the dynamical processes that take place on the network. We present a novel algorithm for community detection that combines network structure with processes that support creation and/or evolution of communities. The algorithm does not embrace the universal approach but instead tries to focus on social networks and model dynamic social interactions that occur on those networks. It identifies leaders, and communities that form around those leaders. It naturally supports overlapping communities by associating each node with a membership vector that describes node's involvement in each community. This way, in addition to overlapping communities, we can identify nodes that are good followers to their leader, and also nodes with no clear community involvement that serve as a proxy between several communities and are equally as important. We run the algorithm for several real social networks which we believe represent a good fraction of the wide body of social networks and discuss the results including other possible applications.
△ Less
Submitted 22 November, 2011; v1 submitted 27 April, 2011;
originally announced April 2011.
-
Rich-club and page-club coefficients for directed graphs
Authors:
Daniel Smilkov,
Ljupco Kocarev
Abstract:
Rich-club and page-club coefficients and their null models are introduced for directed graphs. Null models allow for a quantitative discussion of the rich-club and page-club phenomena. These coefficients are computed for four directed real-world networks: Arxiv High Energy Physics paper citation network, Web network (released from Google), Citation network among US Patents, and Email network from…
▽ More
Rich-club and page-club coefficients and their null models are introduced for directed graphs. Null models allow for a quantitative discussion of the rich-club and page-club phenomena. These coefficients are computed for four directed real-world networks: Arxiv High Energy Physics paper citation network, Web network (released from Google), Citation network among US Patents, and Email network from a EU research institution. The results show a high correlation between rich-club and page-club ordering. For journal paper citation network, we identify both rich-club and page-club ordering, showing that {}"elite" papers are cited by other {}"elite" papers. Google web network shows partial rich-club and page-club ordering up to some point and then a narrow declining of the corresponding normalized coefficients, indicating the lack of rich-club ordering and the lack of page-club ordering, i.e. high in-degree (PageRank) pages purposely avoid sharing links with other high in-degree (PageRank) pages. For UC patents citation network, we identify page-club and rich-club ordering providing a conclusion that {}"elite" patents are cited by other {}"elite" patents. Finally, for e-mail communication network we show lack of both rich-club and page-club ordering. We construct an example of synthetic network showing page-club ordering and the lack of rich-club ordering.
△ Less
Submitted 11 March, 2011;
originally announced March 2011.
-
Analytically solvable processes on networks
Authors:
Daniel Smilkov,
Ljupco Kocarev
Abstract:
We introduce a broad class of analytically solvable processes on networks. In the special case, they reduce to random walk and consensus process - two most basic processes on networks. Our class differs from previous models of interactions (such as stochastic Ising model, cellular automata, infinite particle system, and voter model) in several ways, two most important being: (i) the model is analy…
▽ More
We introduce a broad class of analytically solvable processes on networks. In the special case, they reduce to random walk and consensus process - two most basic processes on networks. Our class differs from previous models of interactions (such as stochastic Ising model, cellular automata, infinite particle system, and voter model) in several ways, two most important being: (i) the model is analytically solvable even when the dynamical equation for each node may be different and the network may have an arbitrary finite graph and influence structure; and (ii) in addition, when local dynamic is described by the same evolution equation, the model is decomposable: the equilibrium behavior of the system can be expressed as an explicit function of network topology and node dynamics
△ Less
Submitted 25 April, 2011; v1 submitted 11 March, 2011;
originally announced March 2011.
-
Distribution of Edge Load in Scale-free Trees
Authors:
Attila Fekete,
Gábor Vattay,
Ljupco Kocarev
Abstract:
Node betweenness has been studied recently by a number of authors, but until now less attention has been paid to edge betweenness. In this paper, we present an exact analytic study of edge betweenness in evolving scale-free and non-scale-free trees. We aim at the probability distribution of edge betweenness under the condition that a local property, the in-degree of the ``younger'' node of a ran…
▽ More
Node betweenness has been studied recently by a number of authors, but until now less attention has been paid to edge betweenness. In this paper, we present an exact analytic study of edge betweenness in evolving scale-free and non-scale-free trees. We aim at the probability distribution of edge betweenness under the condition that a local property, the in-degree of the ``younger'' node of a randomly selected edge, is known. En route to the conditional distribution of edge betweenness the exact joint distribution of cluster size and in-degree, and its one dimensional marginal distributions have been presented in the paper as well. From the derived probability distributions the expectation values of different quantities have been calculated. Our results provide an exact solution not only for infinite, but for finite networks as well.
△ Less
Submitted 12 December, 2007;
originally announced December 2007.
-
Security of public key cryptosystems based on Chebyshev Polynomials
Authors:
Pina Bergamo,
Paolo D'Arco,
Alfredo De Santis,
Ljupco Kocarev
Abstract:
Chebyshev polynomials have been recently proposed for designing public-key systems. Indeed, they enjoy some nice chaotic properties, which seem to be suitable for use in Cryptography. Moreover, they satisfy a semi-group property, which makes possible implementing a trapdoor mechanism. In this paper we study a public key cryptosystem based on such polynomials, which provides both encryption and d…
▽ More
Chebyshev polynomials have been recently proposed for designing public-key systems. Indeed, they enjoy some nice chaotic properties, which seem to be suitable for use in Cryptography. Moreover, they satisfy a semi-group property, which makes possible implementing a trapdoor mechanism. In this paper we study a public key cryptosystem based on such polynomials, which provides both encryption and digital signature. The cryptosystem works on real numbers and is quite efficient. Unfortunately, from our analysis it comes up that it is not secure. We describe an attack which permits to recover the corresponding plaintext from a given ciphertext. The same attack can be applied to produce forgeries if the cryptosystem is used for signing messages. Then, we point out that also other primitives, a Diffie-Hellman like key agreement scheme and an authentication scheme, designed along the same lines of the cryptosystem, are not secure due to the aforementioned attack. We close the paper by discussing the issues and the possibilities of constructing public key cryptosystems on real numbers.
△ Less
Submitted 10 November, 2004;
originally announced November 2004.