3,526 research outputs found

    The game semantics of game theory

    Get PDF
    We use a reformulation of compositional game theory to reunite game theory with game semantics, by viewing an open game as the System and its choice of contexts as the Environment. Specifically, the system is jointly controlled by n0n \geq 0 noncooperative players, each independently optimising a real-valued payoff. The goal of the system is to play a Nash equilibrium, and the goal of the environment is to prevent it. The key to this is the realisation that lenses (from functional programming) form a dialectica category, which have an existing game-semantic interpretation. In the second half of this paper, we apply these ideas to build a compact closed category of `computable open games' by replacing the underlying dialectica category with a wave-style geometry of interaction category, specifically the Int-construction applied to the cartesian monoidal category of directed-complete partial orders

    Privacy Against Statistical Inference

    Full text link
    We propose a general statistical inference framework to capture the privacy threat incurred by a user that releases data to a passive but curious adversary, given utility constraints. We show that applying this general framework to the setting where the adversary uses the self-information cost function naturally leads to a non-asymptotic information-theoretic approach for characterizing the best achievable privacy subject to utility constraints. Based on these results we introduce two privacy metrics, namely average information leakage and maximum information leakage. We prove that under both metrics the resulting design problem of finding the optimal mapping from the user's data to a privacy-preserving output can be cast as a modified rate-distortion problem which, in turn, can be formulated as a convex program. Finally, we compare our framework with differential privacy.Comment: Allerton 2012, 8 page

    Markov modeling of moving target defense games

    Get PDF
    We introduce a Markov-model-based framework for Moving Target Defense (MTD) analysis. The framework allows modeling of broad range of MTD strategies, provides general theorems about how the probability of a successful adversary defeating an MTD strategy is related to the amount of time/cost spent by the adversary, and shows how a multi-level composition of MTD strategies can be analyzed by a straightforward combination of the analysis for each one of these strategies. Within the proposed framework we define the concept of security capacity which measures the strength or effectiveness of an MTD strategy: the security capacity depends on MTD specific parameters and more general system parameters. We apply our framework to two concrete MTD strategies

    What's Right With a Syntactic Approach to Theories and Models?

    Get PDF
    Syntactic approaches in the philosophy of science, which are based on formalizations in predicate logic, are often considered in principle inferior to semantic approaches, which are based on formalizations with the help of structures. To compare the two kinds of approach, I identify some ambiguities in common semantic accounts and explicate the concept of a structure in a way that avoids hidden references to a specific vocabulary. From there, I argue that contrary to common opinion (i) unintended models do not pose a significant problem for syntactic approaches to scientific theories, (ii) syntactic approaches can be at least as language independent as semantic ones, and (iii) in syntactic approaches, scientific theories can be as well connected to the world as in semantic ones. Based on these results, I argue that syntactic and semantic approaches fare equally well when it comes to (iv) ease of application, (iv) accommodating the use of models in the sciences, and (vi) capturing the theory-observation relation

    Better Late than Never: Information Retrieval from Black Holes

    Get PDF
    We show that, in order to preserve the equivalence principle until late times in unitarily evaporating black holes, the thermodynamic entropy of a black hole must be primarily entropy of entanglement across the event horizon. For such black holes, we show that the information entering a black hole becomes encoded in correlations within a tripartite quantum state, the quantum analogue of a one-time pad, and is only decoded into the outgoing radiation very late in the evaporation. This behavior generically describes the unitary evaporation of highly entangled black holes and requires no specially designed evolution. Our work suggests the existence of a matter-field sum rule for any fundamental theory.Comment: Change of title to reflect information return. The physics of "energetic curtains" remains unchange
    corecore