422 research outputs found

    On Pseudorandom Encodings

    Get PDF
    We initiate a study of pseudorandom encodings: efficiently computable and decodable encoding functions that map messages from a given distribution to a random-looking distribution. For instance, every distribution that can be perfectly and efficiently compressed admits such a pseudorandom encoding. Pseudorandom encodings are motivated by a variety of cryptographic applications, including password-authenticated key exchange, “honey encryption” and steganography. The main question we ask is whether every efficiently samplable distribution admits a pseudorandom encoding. Under different cryptographic assumptions, we obtain positive and negative answers for different flavors of pseudorandom encodings, and relate this question to problems in other areas of cryptography. In particular, by establishing a twoway relation between pseudorandom encoding schemes and efficient invertible sampling algorithms, we reveal a connection between adaptively secure multiparty computation for randomized functionalities and questions in the domain of steganography

    Brief Report: Question-Asking and Collateral Language Acquisition in Children with Autism

    Get PDF
    The literature suggests children with autism use communication primarily for requests and protests, and almost never for information-seeking. This study investigated whether teaching “Where” questions using intrinsic reinforcement procedures would produce the generalized use of the question, and whether concomitant improvements in related language structures, provided as answers to the children’s questions, would occur. In the context of a multiple baseline across participants design, data showed that the children could rapidly acquire and generalize the query, and that there were collateral improvements in the children’s use of language structures corresponding to the answers to the questions the children asked. The results are discussed in the context of teaching child initiations to improve linguistic competence in children with autism

    On the Power of Amortization in Secret Sharing: dd-Uniform Secret Sharing and CDS with Constant Information Rate

    Get PDF
    Consider the following secret-sharing problem. Your goal is to distribute a long file ss between nn servers such that (d1)(d-1)-subsets cannot recover the file, (d+1)(d+1)-subsets can recover the file, and dd-subsets should be able to recover ss if and only if they appear in some predefined list LL. How small can the information ratio (i.e., the number of bits stored on a server per each bit of the secret) be? We initiate the study of such dd-uniform access structures, and view them as a useful scaled-down version of general access structures. Our main result shows that, for constant dd, any dd-uniform access structure admits a secret sharing scheme with a *constant* asymptotic information ratio of cdc_d that does not grow with the number of servers nn. This result is based on a new construction of dd-party Conditional Disclosure of Secrets (Gertner et al., JCSS \u2700) for arbitrary predicates over nn-size domain in which each party communicates at most four bits per secret bit. In both settings, previous results achieved non-constant information ratio which grows asymptotically with nn even for the simpler (and widely studied) special case of d=2d=2. Moreover, our results provide a unique example for a natural class of access structures FF that can be realized with information rate smaller than its bit-representation length logF\log |F| (i.e., Ω(dlogn)\Omega( d \log n) for dd-uniform access structures) showing that amortization can beat the representation size barrier. Our main result applies to exponentially long secrets, and so it should be mainly viewed as a barrier against amortizable lower-bound techniques. We also show that in some natural simple cases (e.g., low-degree predicates), amortization kicks in even for quasi-polynomially long secrets. Finally, we prove some limited lower-bounds, point out some limitations of existing lower-bound techniques, and describe some applications to the setting of private simultaneous messages

    Estimates of live-tree carbon stores in the Pacific Northwest are sensitive to model selection

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>Estimates of live-tree carbon stores are influenced by numerous uncertainties. One of them is model-selection uncertainty: one has to choose among multiple empirical equations and conversion factors that can be plausibly justified as locally applicable to calculate the carbon store from inventory measurements such as tree height and diameter at breast height (DBH). Here we quantify the model-selection uncertainty for the five most numerous tree species in six counties of northwest Oregon, USA.</p> <p>Results</p> <p>The results of our study demonstrate that model-selection error may introduce 20 to 40% uncertainty into a live-tree carbon estimate, possibly making this form of error the largest source of uncertainty in estimation of live-tree carbon stores. The effect of model selection could be even greater if models are applied beyond the height and DBH ranges for which they were developed.</p> <p>Conclusions</p> <p>Model-selection uncertainty is potentially large enough that it could limit the ability to track forest carbon with the precision and accuracy required by carbon accounting protocols. Without local validation based on detailed measurements of usually destructively sampled trees, it is very difficult to choose the best model when there are several available. Our analysis suggests that considering tree form in equation selection may better match trees to existing equations and that substantial gaps exist, in terms of both species and diameter ranges, that are ripe for new model-building effort.</p

    Inside Organizations: Pricing, Politics, and Path Dependence

    Get PDF
    When economists have considered organizations, much attention has focused on the boundary of the firm, rather than its internal structures and processes. In contrast, this review sketches three approaches to the economic theory of internal organization—one substantially developed, another rapidly emerging, and a third on the horizon. The first approach (pricing) applies Pigou's prescription: If markets get prices wrong, then the economist's job is to fix the prices. The second approach (politics) considers environments where important actions inside organizations simply cannot be priced, so power and control become central. Finally, the third approach (path dependence) complements the first two by shifting attention from the between variance to the within. That is, rather than asking how organizations confronting different circumstances should choose different structures and processes, the focus here is on how path dependence can cause persistent performance differences among seemingly similar enterprises

    Presidential Commission on the Supreme Court of the United States Final Report

    Get PDF
    On April 9, 2021, President Joseph R. Biden, Jr. issued Executive Order 14023 establishing this Commission, to consist of “individuals having experience with and knowledge of the Federal judiciary and the Supreme Court of the United States.” The Order charged the Commission with producing a report for the President that addresses three sets of questions. First, the Report should include “[a]n account of the contemporary commentary and debate about the role and operation of the Supreme Court in our constitutional system and about the functioning of the constitutional process by which the President nominates and, by and with the advice and consent of the Senate, appoints Justices to the Supreme Court.” Second, the Report should consider the “historical background of other periods in the Nation’s history when the Supreme Court’s role and the nominations and advice-and-consent process were subject to critical assessment and prompted proposals for reform.” Third, the Report should provide an analysis of the principal arguments for and against particular proposals to reform the Supreme Court, “including an appraisal of [their] merits and legality,” and should be informed by “a broad spectrum of ideas.” The Report begins by explaining the genesis of today’s Court reform debate, including by identifying developments that gave rise to President Biden’s decision to issue the April 2021 Executive Order, particularly the debates surrounding the most recent nominations. This Introduction emphasizes that the Court’s composition and jurisprudence long have been subjects of public controversy and debate in the nation’s civic life: The Court serves as a crucial guardian of the rule of law and also plays a central role in major social and political conflicts. Its decisions have profound effects on the life of the nation. Though conflict surrounding the processes by which the President nominates and the Senate confirms Justices is not new, it has become more intensely partisan in recent years. The Introduction also articulates three common and interrelated ideas frequently invoked in reform debates and throughout the Chapters of the Report: the importance of protecting or enhancing the Court’s legitimacy; the role of judicial independence in our system of government; and the value of democracy and its relationship to the Supreme Court’s decisionmaking. These important ideas can mean different things to different people. The Introduction discusses the range of meanings ascribed to these terms, with the aim of clarifying how they are deployed in arguments for and against reform
    corecore