Recognizing Parameters of the Information Security Unit Implemented by the Threshold K-Valued Function
Keywords:
threshold k-valued function, threshold logic, ellipsoid method, the characterization of threshold functionsAbstract
This article discusses some approaches to the recognition of the parameters of the threshold k-valued functions, which can be used for building information processing and security units. The main focus is put on the issue of proving k-valued function belonging to the threshold class. For solving this problem it is proposed to use the input coefficients of expansion and increase. With the help of the latter, the coefficients of linear forms of the k-valued threshold function are procedurally approximated. Along with the proposed analytical approach, the article discusses an algorithmic method based on reducing the problem of finding a threshold representation of k-valued functions to the system of linear inequalities, for the solution of which the ellipsoid method, modified by Khachiyan, is applied. The comparative analysis of the proposed methods is carried out based on experiments.References
Published
2016-06-06
How to Cite
Burdeljov, A., Nikonov, V., & Lapikov, I. (2016). Recognizing Parameters of the Information Security Unit Implemented by the Threshold K-Valued Function. SPIIRAS Proceedings, 3(46), 108-127. https://doi.org/10.15622/sp.46.9
Section
Information Security
Authors who publish with this journal agree to the following terms:
Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).