368 research outputs found

    Confidential Boosting with Random Linear Classifiers for Outsourced User-generated Data

    Full text link
    User-generated data is crucial to predictive modeling in many applications. With a web/mobile/wearable interface, a data owner can continuously record data generated by distributed users and build various predictive models from the data to improve their operations, services, and revenue. Due to the large size and evolving nature of users data, data owners may rely on public cloud service providers (Cloud) for storage and computation scalability. Exposing sensitive user-generated data and advanced analytic models to Cloud raises privacy concerns. We present a confidential learning framework, SecureBoost, for data owners that want to learn predictive models from aggregated user-generated data but offload the storage and computational burden to Cloud without having to worry about protecting the sensitive data. SecureBoost allows users to submit encrypted or randomly masked data to designated Cloud directly. Our framework utilizes random linear classifiers (RLCs) as the base classifiers in the boosting framework to dramatically simplify the design of the proposed confidential boosting protocols, yet still preserve the model quality. A Cryptographic Service Provider (CSP) is used to assist the Cloud's processing, reducing the complexity of the protocol constructions. We present two constructions of SecureBoost: HE+GC and SecSh+GC, using combinations of homomorphic encryption, garbled circuits, and random masking to achieve both security and efficiency. For a boosted model, Cloud learns only the RLCs and the CSP learns only the weights of the RLCs. Finally, the data owner collects the two parts to get the complete model. We conduct extensive experiments to understand the quality of the RLC-based boosting and the cost distribution of the constructions. Our results show that SecureBoost can efficiently learn high-quality boosting models from protected user-generated data

    The weak password problem: chaos, criticality, and encrypted p-CAPTCHAs

    Get PDF
    Vulnerabilities related to weak passwords are a pressing global economic and security issue. We report a novel, simple, and effective approach to address the weak password problem. Building upon chaotic dynamics, criticality at phase transitions, CAPTCHA recognition, and computational round-off errors we design an algorithm that strengthens security of passwords. The core idea of our method is to split a long and secure password into two components. The first component is memorized by the user. The second component is transformed into a CAPTCHA image and then protected using evolution of a two-dimensional dynamical system close to a phase transition, in such a way that standard brute-force attacks become ineffective. We expect our approach to have wide applications for authentication and encryption technologies.Comment: 5 pages, 6 figer

    Simple Encrypted Arithmetic Library - SEAL v2.1

    Get PDF
    Achieving fully homomorphic encryption was a longstanding open problem in cryptography until it was resolved by Gentry in 2009. Soon after, several homomorphic encryption schemes were proposed. The early homomorphic encryption schemes were extremely impractical, but recently new implementations, new data encoding techniques, and a better understanding of the applications have started to change the situation. In this paper we introduce the most recent version (v2.1) of Simple Encrypted Arithmetic Library - SEAL, a homomorphic encryption library developed by Microsoft Research, and describe some of its core functionality

    Foundations for Esports Curricula in Higher Education

    Get PDF
    Esports has generated an industry of increasing economic and cultural importance. In recent years, universities and other higher education institutions have responded to its growth by establishing programmes of study which aim to satisfy the needs of innovators operating in the area. However, there is not yet consensus on what an esports curriculum should include. Despite being a technology-driven sector with ethical and professional dimensions that intersect computing, current ACM and IEEE curricula do not mention esports. Furthermore, existing courses tend to provide teaching and training on a wide variety of topics aside from those traditionally in computer science. These include: live events management; psychological research; sports science; marketing; public relations; video (livestream) production; and community management; in addition to coaching and communication. This working group examined the requirements for developing esports studies at universities with a focus on understanding career prospects in esports and on the challenges presented by its interdisciplinary complexity. Thereby, paving the way for a framework to support the design of esports curricula in higher education

    Tweakable HCTR: A BBB Secure Tweakable Enciphering Scheme

    Get PDF
    \textsf{HCTR}, proposed by Wang et al., is one of the most efficient candidates of tweakable enciphering schemes that turns an nn-bit block cipher into a variable input length tweakable block cipher. Wang et al. have shown that \textsf{HCTR} offers a cubic security bound against all adaptive chosen plaintext and chosen ciphertext adversaries. Later in FSE 2008, Chakraborty and Nandi have improved its bound to O(σ2/2n)O(\sigma^2 / 2^n), where σ\sigma is the total number of blocks queried and nn is the block size of the block cipher. In this paper, we propose \textbf{tweakable \textsf{HCTR}} that turns an nn-bit tweakable block cipher to a variable input length tweakable block cipher by replacing all the block cipher calls of \textsf{HCTR} with tweakable block cipher. We show that when there is no repetition of the tweak, tweakable \textsf{HCTR} enjoys the optimal security against all adaptive chosen plaintext and chosen ciphertext adversaries. However, if the repetition of the tweak is limited, then the security of the construction remains close to the security bound in no repetition of the tweak case. Hence, it gives a graceful security degradation with the maximum number of repetition of tweaks

    Efficient Evaluation of Low Degree Multivariate Polynomials in Ring-LWE Homomorphic Encryption Schemes

    Get PDF
    Homomorphic encryption schemes allow to perform computations over encrypted data. In schemes based on RLWE assumption the plaintext data is a ring polynomial. In many use cases of homomorphic encryption only the degree-0 coefficient of this polynomial is used to encrypt data. In this context any computation on encrypted data can be performed. It is trickier to perform generic computations when more than one coefficient per ciphertext is used. In this paper we introduce a method to efficiently evaluate low-degree multivariate polynomials over encrypted data. The main idea is to encode several messages in the coefficients of a plaintext space polynomial. Using ring homomorphism operations and multiplications between ciphertexts, we compute multivariate monomials up to a given degree. Afterwards, using ciphertext additions we evaluate the input multivariate polynomial. We perform extensive experimentations of the proposed evaluation method. As example, evaluating an arbitrary multivariate degree-3 polynomial with 100 variables over Boolean space takes under 13 seconds

    Explosive Nucleosynthesis: What we learned and what we still do not understand

    Full text link
    This review touches on historical aspects, going back to the early days of nuclear astrophysics, initiated by B2^2FH and Cameron, discusses (i) the required nuclear input from reaction rates and decay properties up to the nuclear equation of state, continues (ii) with the tools to perform nucleosynthesis calculations and (iii) early parametrized nucleosynthesis studies, before (iv) reliable stellar models became available for the late stages of stellar evolution. It passes then through (v) explosive environments from core-collapse supernovae to explosive events in binary systems (including type Ia supernovae and compact binary mergers), and finally (vi) discusses the role of all these nucleosynthesis production sites in the evolution of galaxies. The focus is put on the comparison of early ideas and present, very recent, understanding.Comment: 11 pages, to appear in Springer Proceedings in Physics (Proc. of Intl. Conf. "Nuclei in the Cosmos XV", LNGS Assergi, Italy, June 2018

    Parametric localized modes in quadratic nonlinear photonic structures

    Get PDF
    We analyze two-color spatially localized modes formed by parametrically coupled fundamental and second-harmonic fields excited at quadratic (or chi-2) nonlinear interfaces embedded into a linear layered structure --- a quasi-one-dimensional quadratic nonlinear photonic crystal. For a periodic lattice of nonlinear interfaces, we derive an effective discrete model for the amplitudes of the fundamental and second-harmonic waves at the interfaces (the so-called discrete chi-2 equations), and find, numerically and analytically, the spatially localized solutions --- discrete gap solitons. For a single nonlinear interface in a linear superlattice, we study the properties of two-color localized modes, and describe both similarities and differences with quadratic solitons in homogeneous media.Comment: 9 pages, 8 figure

    Adoption of Global Investment Performance Standards: Case of ASEAN

    Get PDF
    Research on voluntary compliance with accepted international standards has paid overwhelming attention to financial reporting standards, but not to investment performance standards. Previous research on the adoption of the Global Investment Performance Standards has overlooked the unique region of the Association of Southeast Asian Nations. Using 17 years (1999 to 2015) worth of data from all ten countries, which generates 170 country-year observations for each variable of the study, this paper evaluates whether, and how, social and economic pressures influence the adoption of GIPS in the region in the Institutional Theory lens. The results suggest that social pressure is more impactful than economic pressure on the adoption of GIPS. The findings have generated useful contributions and implications in this vein, and several future research directions have been identified. Keywords: Global Investment Performance Standards (GIPS); ASEAN; investment profession; regional integration; voluntary adoption; sustainability reporting; Chartered Financial Analyst (CFA). JEL classification: G11, G15, N95, P1

    Male reproductive health and environmental xenoestrogens

    Get PDF
    EHP is a publication of the U.S. government. Publication of EHP lies in the public domain and is therefore without copyright. Research articles from EHP may be used freely; however, articles from the News section of EHP may contain photographs or figures copyrighted by other commercial organizations and individuals that may not be used without obtaining prior approval from both the EHP editors and the holder of the copyright. Use of any materials published in EHP should be acknowledged (for example, "Reproduced with permission from Environmental Health Perspectives") and a reference provided for the article from which the material was reproduced.Male reproductive health has deteriorated in many countries during the last few decades. In the 1990s, declining semen quality has been reported from Belgium, Denmark, France, and Great Britain. The incidence of testicular cancer has increased during the same time incidences of hypospadias and cryptorchidism also appear to be increasing. Similar reproductive problems occur in many wildlife species. There are marked geographic differences in the prevalence of male reproductive disorders. While the reasons for these differences are currently unknown, both clinical and laboratory research suggest that the adverse changes may be inter-related and have a common origin in fetal life or childhood. Exposure of the male fetus to supranormal levels of estrogens, such as diethlylstilbestrol, can result in the above-mentioned reproductive defects. The growing number of reports demonstrating that common environmental contaminants and natural factors possess estrogenic activity presents the working hypothesis that the adverse trends in male reproductive health may be, at least in part, associated with exposure to estrogenic or other hormonally active (e.g., antiandrogenic) environmental chemicals during fetal and childhood development. An extensive research program is needed to understand the extent of the problem, its underlying etiology, and the development of a strategy for prevention and intervention.Supported by EU Contract BMH4-CT96-0314
    • 

    corecore