Information reconciliation Sample Clauses

Information reconciliation. Xxxxx, who obtained the bit string x0 of length n from the trusted third party first chooses a very large number of uniform random n-bit strings x1, . . . , xt and sends them to Bob, whereas she hides x0 in a random po- sition in the strings (in other words, she sends a random permutation of x0, . . . , xt to Bob). We do not care about the amount of communication needed in this simple protocol. A randomly chosen string matches Bob’s information with probability 2—n(1—p), while it matches Xxx’s information with probability 2—n(1—q). Thus, if q > p and n is large enough, we can choose t appropriately between 2n(1—q) and 2n(1—p), such that with high probability only the string x0 matches Bob’s information, while many strings will match Xxx’s information. In other words, Xxxxx and Xxx agree on a common string, while Xxx still has large min-entropy about x0. This method to do information reconciliation requires a large amount of communication. A different method often used in the literature is that Al- ice sends Bob the output of a randomly chosen two-universal hash func- tion applied on her input (including the information which two-universal hash function was chosen). The idea here is that the possible preimages of a two-universal hash function have similar properties as our randomly chosen strings. However, in this case it is not clear how Bob can recover the input of Xxxxx computationally efficiently. For this reason we will use error correcting codes in our construction, as explained in Section 3.3.
AutoNDA by SimpleDocs
Information reconciliation. This section describes information reconciliation, i.e., it shows how Al- ice and Bob can obtain a common string over which Xxx has large min- entropy. For this we assume that Xxxxx and Xxx have instances of random variables which are distributed according to a distribution PXYZ which satisfies H(X Z) > H(X Y) (i.e., we ignore the preprocessing in this sec- tion).
Information reconciliation. Finally, Xxxxx and Xxx need to ensure that they obtain a same key and correct the mismatch bits, which are very few in TDS. TDS uses an in-
Information reconciliation. Finally, Xxxxx and Xxx need to ensure that they obtain a same key and correct the mismatch bits, which are very few in TDS. TDS uses an in- formation reconciliation method, as presented in prior work [3, 28]. Note that the protocol has a threshold T such only Correlation coefficient 0.5 0.03 0.03 -11 5 10 15 20 25 30 0.02 Probability 0.01 01 40 80 120 Probability 0.01 0 Δσ^0 Δσ^1 20 40 60 80 150 180 210 Ba Bb Bc 240 CSI subcarrier index Singular value The difference of singular value σˆ2 Δσˆ2 a device with error bits fewer than T can start information reconciliation with Xxxxx.
Information reconciliation. The transmitter and the le- gitimate receiver exchange messages over the public in which i denotes the index of the channel use. When n is sufficiently large, the power constraint is equivalent to a trace constraint on the input covariance matrix KX = E XnT (XnT )† . In addition, the transmitter and the receiver are allowed to communicate over a two way, public, noiseless and authenticated channel to distill a secret-key from the symbols transmitted over the noisy channel. We refer the reader to [3] for a precise description of a key-distillation strategy. Suffice to say that it consists of transmissions over the noisy channel as well as exchanges channel to agree on a common bit sequence.
Information reconciliation. Xxxxx and Xxx exchange messages over the public channel, in order to agree on a common sequence of bits, extracted from the observations Xn or Y n.
Information reconciliation. In Round 0, Xxxxx sends to Bob, n and ht(x), where ht is the hash function introduced above. Next, Xxxxx computes p′ = ERRV(x, w) for a random w ∈ {0, 1}d. Xxxxx sends to Bob the string p′ (or rather a prefix of it), one bit per round, till Bob announces that he does not need more bits. Suppose we are at round k, after Xxxxx has sent the k-th bit of p′. Thus, by now Bob has received pk, the k-th bit long prefix of p′. He calculates, as we explain next, a set of candidate strings, which he thinks might be x. A string x′ is a candidate at round k if 1. x′ ∈ B = {u ∈ {0, 1}n | CS(n−k)(u | y, n, k + c) ≤ k + c}, and
AutoNDA by SimpleDocs

Related to Information reconciliation

  • Information Reporting We may report your performance under this Agreement to credit reporting agencies, including your failure to make minimum payments on time. A negative credit report may significantly harm your ability to obtain credit from other sources. We may also obtain follow-up credit reports on you (for example, when we review your Account for a credit line increase). We may exchange information about you or your Account with our affiliates, and, to the extent permitted by law, with other third parties. However, if you prefer that we not share such information with our affiliate companies, just call us at (000) 000-0000 or outside the Albuquerque area, 0-000-000-0000. You may also write to us at Nusenda Federal Credit Union, P.O. Box 8530, Albuquerque, New Mexico 87198. Closing Your Account. You may close your Account at any time by notifying us in writing. However, you remain responsible to pay the balance according to the terms of this Agreement. We may close your Account or suspend your Account privileges at any time without prior notice. We may also reissue a different Card, Account number, or different checks at any time. You must return the Card or the checks to us upon request. Lost or Stolen Cards. If any Card, Account Number or PIN is lost or stolen, or if you think someone used or may use them without your permission, notify us at once by calling the telephone number shown on the billing statement or by calling 0-000-000-0000. We may require you to provide certain information in writing to help us find out what happened. Do not use the Card after we've been notified, even if it is found or returned. You will not be liable for any unauthorized purchases or cash advances made after we've been notified of the loss or the theft; however, you must identify for us the charges on the billing statement that were not made by you or someone authorized by you, and from which you received no benefit. Credit Authorizations. We are not responsible if we do not approve a purchase or cash advance on your Account, or if a third party refuses to accept or honor the Card, even if you have sufficient credit available. We may limit the number of purchases or cash advances which may be approved in one day. If we detect unusual or suspicious activity on your Account, we may temporarily suspend your credit privileges until we can verify the activity. We may approve purchases or cash advances that cause the balance to exceed your credit line without waiving any of our rights under the Agreement. Waiver. Our failure to exercise, or our delay in exercising any of our rights under this Agreement for any reason does not mean that we will be unable to exercise these rights later.

  • Education Records Educational Records are official records, files and data directly related to a student and maintained by the school or local education agency, including but not limited to, records encompassing all the material kept in the student’s cumulative folder, such as general identifying data, records of attendance and of academic work completed, records of achievement, and results of evaluative tests, health data, disciplinary status, test protocols and individualized education programs. For purposes of this DPA, Education Records are referred to as Student Data. Personally Identifiable Information (PII): The terms “Personally Identifiable Information” or “PII” has the same meaning as that found in U.C.A § 53E-9-301, and includes both direct identifiers (such as a student’s or other family member’s name, address, student number, or biometric number) and indirect identifiers (such as a student’s date of birth, place of birth, or mother’s maiden name). Indirect identifiers that constitute PII also include metadata or other information that, alone or in combination, is linked or linkable to a specific student that would allow a reasonable person in the school community, who does not have personal knowledge of the relevant circumstances, to identify the student with reasonable certainty. For purposes of this DPA, Personally Identifiable Information shall include the categories of information listed in the definition of Student Data.

  • INFORMATION ASSURANCE (a) Information provided by LOCKHEED XXXXXX to SELLER remains the property of LOCKHEED XXXXXX. SELLER shall comply with the terms of any proprietary information agreement with LOCKHEED XXXXXX and comply with all proprietary information markings and restrictive legends applied by LOCKHEED XXXXXX to anything provided hereunder to SELLER. SELLER shall not use any LOCKHEED XXXXXX provided information for any purpose except to perform this Contract and shall not disclose such information to third parties without the prior written consent of LOCKHEED XXXXXX. SELLER shall maintain data protection processes and systems sufficient to adequately protect LOCKHEED XXXXXX provided information and comply with any law or regulation applicable to such information. (b) If SELLER becomes aware of any compromise of information used in the performance of this Contract or provided by LOCKHEED XXXXXX to SELLER, its officers, employees, agents, suppliers, or subcontractors (an “Incident”), SELLER shall take appropriate immediate actions to investigate and contain the Incident and any associated risks, including notification within seventy-two (72) hours to LOCKHEED XXXXXX after learning of the Incident. As used in this clause, “compromise” means that information has been exposed to unauthorized access, inadvertent disclosure, known misuse, loss, destruction, or alteration other than as required to perform the Work. SELLER shall provide reasonable cooperation to LOCKHEED XXXXXX in conducting any investigation regarding the nature and scope of any Incident. Any costs incurred in investigating or remedying Incidents shall be borne by SELLER. (c) Any LOCKHEED XXXXXX provided information identified as proprietary or subject to restrictions on public disclosure by law or regulation shall be encrypted (i) if transmitted via the Internet, or (ii) during electronic storage if potentially accessible by the Internet or otherwise by non-authorized users. (d) The provisions set forth above are in addition to and do not alter, change or supersede any obligations contained in a proprietary information agreement between the parties.

  • Basic Financial Information and Reporting (a) The Company will maintain true books and records of account in which full and correct entries will be made of all its business transactions pursuant to a system of accounting established and administered in accordance with generally accepted accounting principles consistently applied, and will set aside on its books all such proper accruals and reserves as shall be required under generally accepted accounting principles consistently applied. (b) As soon as practicable after the end of each fiscal year of the Company, and in any event within one hundred twenty (120) days thereafter, the Company will furnish each Investor a balance sheet of the Company, as at the end of such fiscal year, and a statement of income and a statement of cash flows of the Company, for such year, all prepared in accordance with generally accepted accounting principles consistently applied and setting forth in each case in comparative form the figures for the previous fiscal year, all in reasonable detail. Such financial statements shall be accompanied by a report and opinion thereon by independent public accountants of national standing selected by the Company's Board of Directors. (c) The Company will furnish each Investor, as soon as practicable after the end of the first, second and third quarterly accounting periods in each fiscal year of the Company, and in any event within forty-five (45) days thereafter, a balance sheet of the Company as of the end of each such quarterly period, and a statement of income and a statement of cash flows of the Company for such period and for the current fiscal year to date, prepared in accordance with generally accepted accounting principles, with the exception that no notes need be attached to such statements and year-end audit adjustments may not have been made. (d) So long as an Investor (with its Affiliates) shall own not less than five hundred thousand (500,000) shares of Registrable Securities (as adjusted for stock splits and combinations) (a "MAJOR INVESTOR"), the Company will furnish each such Major Investor (i) at least thirty (30) days prior to the beginning of each fiscal year an annual budget and operating plans for such fiscal year (and as soon as available, any subsequent revisions thereto); and (ii) as soon as practicable after the end of each month, and in any event within twenty (20) days thereafter, a balance sheet of the Company as of the end of each such month, and a statement of income and a statement of cash flows of the Company for such month and for the current fiscal year to date, including a comparison to plan figures for such period, prepared in accordance with generally accepted accounting principles consistently applied, with the exception that no notes need be attached to such statements and year-end audit adjustments may not have been made. (e) So long as any Series B Investor (with its Affiliates) owns any shares of Registrable Securities, the Company will furnish to three (3) Investors appointed by Atlas (as designated in writing to the Company) (i) at least thirty (30) days prior to the beginning of each fiscal year an annual budget and operating plans for such fiscal year (and as soon as available, any subsequent revisions thereto); and (ii) as soon as practicable after the end of each month, and in any event within twenty (20) days thereafter, a balance sheet of the Company as of the end of each such month, and a statement of income and a statement of cash flows of the Company for such month and for the current fiscal year to date, including a comparison to plan figures for such period, prepared in accordance with generally accepted accounting principles consistently applied, with the exception that no notes need be attached to such statements and year end audit adjustments may not have been made; provided, however, that after the termination of that certain Consulting Agreement (the "Consulting Agreement") between the Company and Atlas, dated as of April 19, 1999, Investors who are holders of Registrable Securities issued or issuable upon conversion of Series B Stock, or upon exercise of the Warrants, shall only be furnished with balance sheets and statements of income pursuant to this subsection (e).

  • Education Record An education record as defined in the Family Educational Rights and Privacy Act and its implementing regulations, 20 U.S.C. 1232g and 34 C.F.R. Part 99, respectively.

  • Budget Information Funding Source Funding Year of Appropriation Budget List Number Amount

  • Provision of Financial Information Whether or not the Company is subject to Section 13 or 15(d) of the Exchange Act, the Company shall, to the extent permitted under the Exchange Act, file with the Commission the annual reports, quarterly reports and other documents which the Company would have been required to file with the Commission pursuant to such Section 13 or 15(d) if the Company were so subject, such documents to be filed with the Commission on or prior to the respective dates (the “Required Filing Dates”) by which the Company would have been required so to file such documents if the Company were so subject. The Company shall also in any event (x) within 15 days of each Required Filing Date (i) if the Company is not then subject to Section 13 or 15(d) of the Exchange Act, transmit by mail to all Holders, as their names and addresses appear in the Security Register, without cost to such Holders, copies of the annual reports and quarterly reports which the Company would have been required to file with the Commission pursuant to Section 13 or 15(d) of the Exchange Act if the Company were subject to such Sections, and (ii) file with the Trustee copies of annual reports, quarterly reports and other documents which the Company would have been required to file with the Commission pursuant to Section 13 or 15(d) of the Exchange Act if the Company were subject to such Sections and (y) if filing such documents by the Company with the Commission is not permitted under the Exchange Act, promptly upon written request and payment of the reasonable cost of duplication and delivery, supply copies of such documents to any prospective Holder. Delivery of such reports, information and documents to the Trustee is for informational purposes only and the Trustee’s receipt of such shall not constitute constructive notice of any information contained therein or determinable from information contained therein, including the Company’s compliance with any of its covenants hereunder (as to which the Trustee is entitled to rely exclusively on Officers’ Certificates).

  • Financial Information, etc The Borrower will furnish, or will cause to be furnished, to the Administrative Agent and each Lender copies of the following financial statements, reports and information: (a) promptly when available and in any event within 90 days after the close of each Fiscal Year (i) a balance sheet at the close of such Fiscal Year, and statements of operations, of shareholders' equity and of cash flows for such Fiscal Year, of the Borrower and its Consolidated Subsidiaries certified without Impermissible Qualification by independent public accountants of recognized standing selected by the Borrower and reasonably acceptable to the Required Lenders, (ii) a Compliance Certificate calculated as of the close of such Fiscal Year, (iii) a projected financial statement of the Borrower and its Consolidated Subsidiaries for the following Fiscal Year, and (iv) the report filed by the Borrower with the SEC on Form 10-K for such Fiscal Year; (b) promptly when available and in any event within 45 days after the close of each of the first three Fiscal Quarters of each Fiscal Year (i) a balance sheet at the close of such Fiscal Quarter and statements of operations, of income and of cash flows for the period commencing at the close of the previous Fiscal Year and ending with the close of such Fiscal Quarter, of the Borrower and its Consolidated Subsidiaries certified by the chief accounting or financial Authorized Officer of the Borrower, (ii) a Compliance Certificate calculated as of the close of such Fiscal Quarter, and (iii) the report filed by the Borrower with the SEC on Form 10-Q for each such Fiscal Quarter; (c) promptly upon receipt thereof and upon request of the Administrative Agent or any Lender, copies of all management letters submitted to the Borrower by independent public accountants in connection with each annual or interim audit made by such accountants of the books of the Borrower or any Subsidiary; (d) promptly upon the incorporation or acquisition thereof, information regarding the creation or acquisition of any new Subsidiary; (e) promptly when available and in any event within ten days of publication, all material filings with the SEC; (f) within 45 days after the close of each Fiscal Quarter, an Applicable Margin Determination Ratio Certificate; and (g) such other information with respect to the financial condition, business, property, assets, revenues and operations of the Borrower and Subsidiaries as the Administrative Agent or any Lender may from time to time reasonably request.

  • Information Returns At the Closing or as soon thereafter as is practicable, Seller shall provide Purchaser with a list of all Deposits on which Seller is back-up withholding as of the Closing Date.

  • Monthly Reporting Within twenty (20) calendar days following the end of each calendar month, Registry Operator shall deliver to ICANN reports in the format set forth in Specification 3 attached hereto (“Specification 3”).

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!