943 research outputs found

    Intertwining Order Preserving Encryption and Differential Privacy

    Full text link
    Ciphertexts of an order-preserving encryption (OPE) scheme preserve the order of their corresponding plaintexts. However, OPEs are vulnerable to inference attacks that exploit this preserved order. At another end, differential privacy has become the de-facto standard for achieving data privacy. One of the most attractive properties of DP is that any post-processing (inferential) computation performed on the noisy output of a DP algorithm does not degrade its privacy guarantee. In this paper, we intertwine the two approaches and propose a novel differentially private order preserving encryption scheme, OPϵ\epsilon. Under OPϵ\epsilon, the leakage of order from the ciphertexts is differentially private. As a result, in the least, OPϵ\epsilon ensures a formal guarantee (specifically, a relaxed DP guarantee) even in the face of inference attacks. To the best of our knowledge, this is the first work to intertwine DP with a property-preserving encryption scheme. We demonstrate OPϵ\epsilon's practical utility in answering range queries via extensive empirical evaluation on four real-world datasets. For instance, OPϵ\epsilon misses only around 44 in every 10K10K correct records on average for a dataset of size 732K\sim732K with an attribute of domain size 18K\sim18K and ϵ=1\epsilon= 1

    A Survey on Effective Invocation Methods of Massive LLM Services

    Full text link
    Language models as a service (LMaaS) enable users to accomplish tasks without requiring specialized knowledge, simply by paying a service provider. However, numerous providers offer massive large language model (LLM) services with variations in latency, performance, and pricing. Consequently, constructing the cost-saving LLM services invocation strategy with low-latency and high-performance responses that meet specific task demands becomes a pressing challenge. This paper provides a comprehensive overview of the LLM services invocation methods. Technically, we give a formal definition of the problem of constructing effective invocation strategy in LMaaS and present the LLM services invocation framework. The framework classifies existing methods into four different components, including input abstract, semantic cache, solution design, and output enhancement, which can be freely combined with each other. Finally, we emphasize the open challenges that have not yet been well addressed in this task and shed light on future research

    A New Caspase-8 Isoform Caspase-8s Increased Sensitivity to Apoptosis in Jurkat Cells

    Get PDF
    Caspase-8 is a key initiator of death receptor-induced apoptosis. Here we report a novel short isoform of caspase-8 (caspase-8s), which encodes the first (Death Effector Domain) DED and part of the second DED, missing the C-terminal caspase domain. In vivo binding assays showed that transfected caspase-8s bound to (Fas-associated death domain protein) FADD, the adaptor protein in (death-induced signal complex) DISC. To investigate the potential effects of caspase-8s on cell apoptosis, Jurkat cells were stably transfected with caspase-8s. Overexpression of caspase-8s increased sensitivity to the apoptotic stimuli, Fas-agonistic antibody CH11. These results suggest that caspase-8s may act as a promoter of apoptosis through binding to FADD and is involved in the regulation of apoptosis. In addition, the results also indicate that the first DED was an important structure mediating combination between caspase-8 and FADD
    corecore