-
Second-Order Time to Collision With Non-Static Acceleration
Authors:
Hossein Nick Zinat Matin,
Yuneil Yeo,
Amelie Ju-Kang Ngo,
Antonio R. Paiva,
Jean Utke,
Maria Laura Delle Monache
Abstract:
We propose a second-order time to collision (TTC) considering non-static acceleration and turning with realistic assumptions. This is equivalent to considering that the steering wheel is held at a fixed angle with constant pressure on the gas or brake pedal and matches the well-known bicycle model. Past works that use acceleration to compute TTC consider only longitudinally aligned acceleration.…
▽ More
We propose a second-order time to collision (TTC) considering non-static acceleration and turning with realistic assumptions. This is equivalent to considering that the steering wheel is held at a fixed angle with constant pressure on the gas or brake pedal and matches the well-known bicycle model. Past works that use acceleration to compute TTC consider only longitudinally aligned acceleration.
We additionally develop and present the Second-Order Time-to-Collision Algorithm using Region-based search (STAR) to efficiently compute the proposed second-order TTC and overcome the current limitations of the existing built-in functions. The evaluation of the algorithm in terms of error and computation time is conducted through statistical analysis.
Through numerical simulations and publicly accessible real-world trajectory datasets, we show that the proposed second-order TTC with non-static acceleration is superior at reflecting accurate collision times, especially when turning is involved.
△ Less
Submitted 11 February, 2025;
originally announced February 2025.
-
On the Analytical Properties of a Nonlinear Microscopic Dynamical Model for Connected and Automated Vehicles
Authors:
H. Nick Zinat Matin,
Y. Yeo,
X. Gong,
M. L. Delle Monache
Abstract:
In this paper, we propose an integrated dynamical model of Connected and Automated Vehicles (CAVs) which incorporates CAV technologies and a microscopic car-following model to improve safety, efficiency and convenience. We rigorously investigate the analytical properties such as well-posedness, maximum principle, perturbation and stability of the proposed model in some proper functional spaces. Fu…
▽ More
In this paper, we propose an integrated dynamical model of Connected and Automated Vehicles (CAVs) which incorporates CAV technologies and a microscopic car-following model to improve safety, efficiency and convenience. We rigorously investigate the analytical properties such as well-posedness, maximum principle, perturbation and stability of the proposed model in some proper functional spaces. Furthermore, we prove that the model is collision free and we derive and explicit lower bound on the distance as a safety measure.
△ Less
Submitted 27 May, 2024;
originally announced May 2024.
-
Star-specific Key-homomorphic PRFs from Learning with Linear Regression
Authors:
Vipin Singh Sehrawat,
Foo Yee Yeo,
Dmitriy Vassilyev
Abstract:
We introduce a novel method to derandomize the learning with errors (LWE) problem by generating deterministic yet sufficiently independent LWE instances that are constructed by using linear regression models, which are generated via (wireless) communication errors. We also introduce star-specific key-homomorphic (SSKH) pseudorandom functions (PRFs), which are defined by the respective sets of part…
▽ More
We introduce a novel method to derandomize the learning with errors (LWE) problem by generating deterministic yet sufficiently independent LWE instances that are constructed by using linear regression models, which are generated via (wireless) communication errors. We also introduce star-specific key-homomorphic (SSKH) pseudorandom functions (PRFs), which are defined by the respective sets of parties that construct them. We use our derandomized variant of LWE to construct a SSKH PRF family. The sets of parties constructing SSKH PRFs are arranged as star graphs with possibly shared vertices, i.e., the pairs of sets may have non-empty intersections. We reduce the security of our SSKH PRF family to the hardness of LWE. To establish the maximum number of SSKH PRFs that can be constructed -- by a set of parties -- in the presence of passive/active and external/internal adversaries, we prove several bounds on the size of maximally cover-free at most $t$-intersecting $k$-uniform family of sets $\mathcal{H}$, where the three properties are defined as: (i) $k$-uniform: $\forall A \in \mathcal{H}: |A| = k$, (ii) at most $t$-intersecting: $\forall A, B \in \mathcal{H}, B \neq A: |A \cap B| \leq t$, (iii) maximally cover-free: $\forall A \in \mathcal{H}: A \not\subseteq \bigcup\limits_{\substack{B \in \mathcal{H} \\ B \neq A}} B$. For the same purpose, we define and compute the mutual information between different linear regression hypotheses that are generated from overlapping training datasets.
△ Less
Submitted 28 July, 2023; v1 submitted 2 May, 2022;
originally announced May 2022.
-
Extremal Set Theory and LWE Based Access Structure Hiding Verifiable Secret Sharing with Malicious-Majority and Free Verification
Authors:
Vipin Singh Sehrawat,
Foo Yee Yeo,
Yvo Desmedt
Abstract:
Secret sharing allows distributing a secret among several parties such that only authorized subsets, specified by an access structure, can reconstruct the secret. Sehrawat and Desmedt (COCOON 2020) introduced hidden access structures, that remain secret until some authorized subset of parties collaborate. However, their scheme assumes semi-honest parties and supports only restricted access structu…
▽ More
Secret sharing allows distributing a secret among several parties such that only authorized subsets, specified by an access structure, can reconstruct the secret. Sehrawat and Desmedt (COCOON 2020) introduced hidden access structures, that remain secret until some authorized subset of parties collaborate. However, their scheme assumes semi-honest parties and supports only restricted access structures. We address these shortcomings by constructing an access structure hiding verifiable secret sharing scheme that supports all monotone access structures. It is the first secret sharing scheme to support cheater identification and share verifiability in malicious-majority settings. The verification procedure of our scheme incurs no communication overhead. As the building blocks of our scheme, we introduce and construct: (i) a set-system with $> \exp\left(c\frac{2(\log h)^2}{(\log\log h)}\right)+2\exp\left(c\frac{(\log h)^2}{(\log\log h)}\right)$ subsets of a set of $h$ elements. Our set-system, $\mathcal{H}$, is defined over $\mathbb{Z}_m$, where $m$ is a non-prime-power. The size of each set in $\mathcal{H}$ is divisible by $m$ but the sizes of their pairwise intersections are not, unless one set is a subset of another, (ii) a new variant of the learning with errors (LWE) problem, called PRIM-LWE, wherein the secret matrix is sampled such that its determinant is a generator of $\mathbb{Z}_q^*$, where $q$ is the LWE modulus. The security of our scheme relies on the hardness of the LWE problem, and its share size is $$(1+ o(1)) \dfrac{2^{\ell}}{\sqrt{π\ell/2}}(2 q^{\varrho + 0.5} + \sqrt{q} + \mathrmΘ(h)),$$ where $\varrho \leq 1$ is a constant and $\ell$ is the total number of parties. We also provide directions for future work to reduce the share size to
\[\leq \dfrac{1}{3} \left( (1+ o(1)) \dfrac{2^{\ell}}{\sqrt{π\ell/2}}(2 q^{\varrho + 0.5} + 2\sqrt{q}) \right).\]
△ Less
Submitted 13 September, 2021; v1 submitted 30 November, 2020;
originally announced November 2020.
-
Branching Rules For Splint Root Systems
Authors:
Logan Crew,
Alexandre A. Kirillov,
Yao-Rui Yeo
Abstract:
A root system is splint if it is a decomposition into a union of two root systems. Examples of such root systems arise naturally in studying embeddings of reductive Lie subalgebras into simple Lie algebras. Given a splint root system, one can try to understand its branching rule. In this paper we discuss methods to understand such branching rules, and give precise formulas for specific cases, incl…
▽ More
A root system is splint if it is a decomposition into a union of two root systems. Examples of such root systems arise naturally in studying embeddings of reductive Lie subalgebras into simple Lie algebras. Given a splint root system, one can try to understand its branching rule. In this paper we discuss methods to understand such branching rules, and give precise formulas for specific cases, including the restriction functor from the exceptional Lie algebra $\mathfrak{g}_2$ to $\mathfrak{sl}_3$.
△ Less
Submitted 21 December, 2018;
originally announced December 2018.
-
Cyclic division algebras and maximal tori
Authors:
Yao-Rui Yeo
Abstract:
We show the cardinality of a particular nonabelian cohomology associated to cyclic division algebras is equal to a certain partition number. This computation helps us interpret the number of conjugacy classes of maximal tori defined over an abelian extension.
We show the cardinality of a particular nonabelian cohomology associated to cyclic division algebras is equal to a certain partition number. This computation helps us interpret the number of conjugacy classes of maximal tori defined over an abelian extension.
△ Less
Submitted 6 September, 2018; v1 submitted 5 December, 2015;
originally announced December 2015.