14,618 research outputs found
Approximate Degree, Secret Sharing, and Concentration Phenomena
The epsilon-approximate degree deg~_epsilon(f) of a Boolean function f is the least degree of a real-valued polynomial that approximates f pointwise to within epsilon. A sound and complete certificate for approximate degree being at least k is a pair of probability distributions, also known as a dual polynomial, that are perfectly k-wise indistinguishable, but are distinguishable by f with advantage 1 - epsilon. Our contributions are:
- We give a simple, explicit new construction of a dual polynomial for the AND function on n bits, certifying that its epsilon-approximate degree is Omega (sqrt{n log 1/epsilon}). This construction is the first to extend to the notion of weighted degree, and yields the first explicit certificate that the 1/3-approximate degree of any (possibly unbalanced) read-once DNF is Omega(sqrt{n}). It draws a novel connection between the approximate degree of AND and anti-concentration of the Binomial distribution.
- We show that any pair of symmetric distributions on n-bit strings that are perfectly k-wise indistinguishable are also statistically K-wise indistinguishable with at most K^{3/2} * exp (-Omega (k^2/K)) error for all k < K <= n/64. This bound is essentially tight, and implies that any symmetric function f is a reconstruction function with constant advantage for a ramp secret sharing scheme that is secure against size-K coalitions with statistical error K^{3/2} * exp (-Omega (deg~_{1/3}(f)^2/K)) for all values of K up to n/64 simultaneously. Previous secret sharing schemes required that K be determined in advance, and only worked for f=AND. Our analysis draws another new connection between approximate degree and concentration phenomena.
As a corollary of this result, we show that for any d deg~_{1/3}(f). These upper and lower bounds were also previously only known in the case f=AND
Modes of Information Flow
Information flow between components of a system takes many forms and is key
to understanding the organization and functioning of large-scale, complex
systems. We demonstrate three modalities of information flow from time series X
to time series Y. Intrinsic information flow exists when the past of X is
individually predictive of the present of Y, independent of Y's past; this is
most commonly considered information flow. Shared information flow exists when
X's past is predictive of Y's present in the same manner as Y's past; this
occurs due to synchronization or common driving, for example. Finally,
synergistic information flow occurs when neither X's nor Y's pasts are
predictive of Y's present on their own, but taken together they are. The two
most broadly-employed information-theoretic methods of quantifying information
flow---time-delayed mutual information and transfer entropy---are both
sensitive to a pair of these modalities: time-delayed mutual information to
both intrinsic and shared flow, and transfer entropy to both intrinsic and
synergistic flow. To quantify each mode individually we introduce our
cryptographic flow ansatz, positing that intrinsic flow is synonymous with
secret key agreement between X and Y. Based on this, we employ an
easily-computed secret-key-agreement bound---intrinsic mutual
information&mdashto quantify the three flow modalities in a variety of systems
including asymmetric flows and financial markets.Comment: 11 pages; 10 figures;
http://csc.ucdavis.edu/~cmg/compmech/pubs/ite.ht
Sharp Indistinguishability Bounds from Non-Uniform Approximations
We study the basic problem of distinguishing between two symmetric probability distributions over n bits by observing k bits of a sample, subject to the constraint that all (k-1)-wise marginal distributions of the two distributions are identical to each other. Previous works of Bogdanov et al. [Bogdanov et al., 2019] and of Huang and Viola [Huang and Viola, 2019] have established approximately tight results on the maximal possible statistical distance between the k-wise marginals of such distributions when k is at most a small constant fraction of n. Naor and Shamir [Naor and Shamir, 1994] gave a tight bound for all k in the special case k = n and when distinguishing with the OR function; they also derived a non-tight result for general k and n. Krause and Simon [Krause and Simon, 2000] gave improved upper and lower bounds for general k and n when distinguishing with the OR function, but these bounds are exponentially far apart when k = ?(n). In this work we provide sharp upper and lower bounds on the maximal statistical distance that hold for all k and n. Upper bounds on the statistical distance have typically been obtained by providing uniform low-degree polynomial approximations to certain higher-degree polynomials. This is the first work to construct suitable non-uniform approximations for this purpose; the sharpness and wider applicability of our result stems from this non-uniformity
Recommended from our members
Design of Hardware with Quantifiable Security against Reverse Engineering
Semiconductors are a 412 billion dollar industry and integrated circuits take on important roles in human life, from everyday use in smart-devices to critical applications like healthcare and aviation. Saving today\u27s hardware systems from attackers can be a huge concern considering the budget spent on designing these chips and the sensitive information they may contain. In particular, after fabrication, the chip can be subject to a malicious reverse engineer that tries to invasively figure out the function of the chip or other sensitive data. Subsequent to an attack, a system can be subject to cloning, counterfeiting, or IP theft. This dissertation addresses some issues concerning the security of hardware systems in such scenarios.
First, the issue of privacy risks from approximate computing is investigated in Chapter 2. Simulation experiments show that the erroneous outputs produced on each chip instance can reveal the identity of the chip that performed the computation, which jeopardizes user privacy.
The next two chapters deal with camouflaging, which is a technique to prevent reverse engineering from extracting circuit information from the layout. Chapter 3 provides a design automation method to protect camouflaged circuits against an adversary with prior knowledge about the circuit\u27s viable functions. Chapter 4 provides a method to reverse engineer camouflaged circuits. The proposed reverse engineering formulation uses Boolean Satisfiability (SAT) solving in a way that incorporates laser fault injection and laser voltage probing capabilities to figure out the function of an aggressively camouflaged circuit with unknown gate functions and connections.
Chapter 5 addresses the challenge of secure key storage in hardware by proposing a new key storage method that applies threshold-defined behavior of memory cells to store secret information in a way that achieves a high degree of protection against invasive reverse engineering. This approach requires foundry support to encode the secrets as threshold voltage offsets in transistors. In Chapter 6, a secret key storage approach is introduced that does not rely on a trusted foundry. This approach only relies on the foundry to fabricate the hardware infrastructure for key generation but not to encode the secret key. The key is programmed by the IP integrator or the user after fabrication via directed accelerated aging of transistors. Additionally, this chapter presents the design of a working hardware prototype on PCB that demonstrates this scheme.
Finally, chapter 7 concludes the dissertation and summarizes possible future research
Small steps for mankind: Modeling the emergence of cumulative culture from joint active inference communication
Although the increase in the use of dynamical modeling in the literature on cultural evolution makes current models more mathematically sophisticated, these models have yet to be tested or validated. This paper provides a testable deep active inference formulation of social behavior and accompanying simulations of cumulative culture in two steps: First, we cast cultural transmission as a bi-directional process of communication that induces a generalized synchrony (operationalized as a particular convergence) between the belief states of interlocutors. Second, we cast social or cultural exchange as a process of active inference by equipping agents with the choice of who to engage in communication with. This induces trade-offs between confirmation of current beliefs and exploration of the social environment. We find that cumulative culture emerges from belief updating (i.e., active inference and learning) in the form of a joint minimization of uncertainty. The emergent cultural equilibria are characterized by a segregation into groups, whose belief systems are actively sustained by selective, uncertainty minimizing, dyadic exchanges. The nature of these equilibria depends sensitively on the precision afforded by various probabilistic mappings in each individual's generative model of their encultured niche
Cross Flow Filtration Modeling Using Analytical and Numerical Solutions Along with Implementation as a Web-Based Calculator
In this thesis, we present a 1D model for the complex phenomenon of cross-flow filtration. We begin by developing the governing equations and providing analytical solutions that can be found using Laplace transforms for both the simple clean filter case, and the more complex filter with fouling in the form of cake, and depth plugging of the filter media. A walk through of the set up and implementation of a simple web-based application is given, and the code to produce the web application for this model is included in an appendix. The web application acts as a calculator, accepting model parameters and returning graphical output on the client side while the numerical solution is calculated on the server side. Lastly technique of a least-squares finite element approach is applied to the governing equations to obtain approximate solutions now under the assumption that viscosity is not constant, but varies linearly with respect to time. The major contribution from this thesis is the development of a web-based application for simulation of cross flow filtration, set in a framework that can be applied for a wide variety of modeling problems. This thesis is a significant step towards the long term goal to combine multiple disciplines including fluid dynamics, mathematics, and computer science, to produce an effective and robust modeling tool
- …