368 research outputs found
Confidential Boosting with Random Linear Classifiers for Outsourced User-generated Data
User-generated data is crucial to predictive modeling in many applications.
With a web/mobile/wearable interface, a data owner can continuously record data
generated by distributed users and build various predictive models from the
data to improve their operations, services, and revenue. Due to the large size
and evolving nature of users data, data owners may rely on public cloud service
providers (Cloud) for storage and computation scalability. Exposing sensitive
user-generated data and advanced analytic models to Cloud raises privacy
concerns. We present a confidential learning framework, SecureBoost, for data
owners that want to learn predictive models from aggregated user-generated data
but offload the storage and computational burden to Cloud without having to
worry about protecting the sensitive data. SecureBoost allows users to submit
encrypted or randomly masked data to designated Cloud directly. Our framework
utilizes random linear classifiers (RLCs) as the base classifiers in the
boosting framework to dramatically simplify the design of the proposed
confidential boosting protocols, yet still preserve the model quality. A
Cryptographic Service Provider (CSP) is used to assist the Cloud's processing,
reducing the complexity of the protocol constructions. We present two
constructions of SecureBoost: HE+GC and SecSh+GC, using combinations of
homomorphic encryption, garbled circuits, and random masking to achieve both
security and efficiency. For a boosted model, Cloud learns only the RLCs and
the CSP learns only the weights of the RLCs. Finally, the data owner collects
the two parts to get the complete model. We conduct extensive experiments to
understand the quality of the RLC-based boosting and the cost distribution of
the constructions. Our results show that SecureBoost can efficiently learn
high-quality boosting models from protected user-generated data
The weak password problem: chaos, criticality, and encrypted p-CAPTCHAs
Vulnerabilities related to weak passwords are a pressing global economic and
security issue. We report a novel, simple, and effective approach to address
the weak password problem. Building upon chaotic dynamics, criticality at phase
transitions, CAPTCHA recognition, and computational round-off errors we design
an algorithm that strengthens security of passwords. The core idea of our
method is to split a long and secure password into two components. The first
component is memorized by the user. The second component is transformed into a
CAPTCHA image and then protected using evolution of a two-dimensional dynamical
system close to a phase transition, in such a way that standard brute-force
attacks become ineffective. We expect our approach to have wide applications
for authentication and encryption technologies.Comment: 5 pages, 6 figer
Simple Encrypted Arithmetic Library - SEAL v2.1
Achieving fully homomorphic encryption was a longstanding open problem in cryptography until it was resolved by Gentry in 2009. Soon after, several homomorphic encryption schemes were proposed. The early homomorphic encryption schemes were extremely impractical, but recently new implementations, new data encoding techniques, and a better understanding of the applications have started to change the situation. In this paper we introduce the most recent version (v2.1) of Simple Encrypted Arithmetic Library - SEAL, a homomorphic encryption library developed by Microsoft Research, and describe some of its core functionality
Foundations for Esports Curricula in Higher Education
Esports has generated an industry of increasing economic and cultural importance. In recent years, universities and other higher education institutions have responded to its growth by establishing programmes of study which aim to satisfy the needs of innovators operating in the area. However, there is not yet consensus on what an esports curriculum should include. Despite being a technology-driven sector with ethical and professional dimensions that intersect computing, current ACM and IEEE curricula do not mention esports. Furthermore, existing courses tend to provide teaching and training on a wide variety of topics aside from those traditionally in computer science. These include: live events management; psychological research; sports science; marketing; public relations; video (livestream) production; and community management; in addition to coaching and communication. This working group examined the requirements for developing esports studies at universities with a focus on understanding career prospects in esports and on the challenges presented by its interdisciplinary complexity. Thereby, paving the way for a framework to support the design of esports curricula in higher education
Tweakable HCTR: A BBB Secure Tweakable Enciphering Scheme
\textsf{HCTR}, proposed by Wang et al., is one of the most efficient candidates of tweakable enciphering schemes that turns an -bit block cipher into a variable input length tweakable block cipher. Wang et al. have shown that \textsf{HCTR} offers a cubic security bound against all adaptive chosen plaintext and chosen ciphertext adversaries. Later in FSE 2008, Chakraborty and Nandi have improved its bound to , where is the total number of blocks queried and is the block size of the block cipher. In this paper, we propose \textbf{tweakable \textsf{HCTR}} that turns an -bit tweakable block cipher to a variable input length tweakable block cipher by replacing all the block cipher calls of \textsf{HCTR} with tweakable block cipher. We show that when there is no repetition of the tweak, tweakable \textsf{HCTR} enjoys the optimal security against all adaptive chosen plaintext and chosen ciphertext adversaries. However, if the repetition of the tweak is limited, then the security of the construction remains close to the security bound in no repetition of the tweak case. Hence, it gives a graceful security degradation with the maximum number of repetition of tweaks
Efficient Evaluation of Low Degree Multivariate Polynomials in Ring-LWE Homomorphic Encryption Schemes
Homomorphic encryption schemes allow to perform computations over encrypted data.
In schemes based on RLWE assumption the plaintext data is a ring polynomial.
In many use cases of homomorphic encryption only the degree-0 coefficient of this polynomial is used to encrypt data.
In this context any computation on encrypted data can be performed.
It is trickier to perform generic computations when more than one coefficient per ciphertext is used.
In this paper we introduce a method to efficiently evaluate low-degree multivariate polynomials over encrypted data.
The main idea is to encode several messages in the coefficients of a plaintext space polynomial.
Using ring homomorphism operations and multiplications between ciphertexts, we compute multivariate monomials up to a given degree.
Afterwards, using ciphertext additions we evaluate the input multivariate polynomial.
We perform extensive experimentations of the proposed evaluation method.
As example, evaluating an arbitrary multivariate degree-3 polynomial with 100 variables over Boolean space takes under 13 seconds
Explosive Nucleosynthesis: What we learned and what we still do not understand
This review touches on historical aspects, going back to the early days of
nuclear astrophysics, initiated by BFH and Cameron, discusses (i) the
required nuclear input from reaction rates and decay properties up to the
nuclear equation of state, continues (ii) with the tools to perform
nucleosynthesis calculations and (iii) early parametrized nucleosynthesis
studies, before (iv) reliable stellar models became available for the late
stages of stellar evolution. It passes then through (v) explosive environments
from core-collapse supernovae to explosive events in binary systems (including
type Ia supernovae and compact binary mergers), and finally (vi) discusses the
role of all these nucleosynthesis production sites in the evolution of
galaxies. The focus is put on the comparison of early ideas and present, very
recent, understanding.Comment: 11 pages, to appear in Springer Proceedings in Physics (Proc. of
Intl. Conf. "Nuclei in the Cosmos XV", LNGS Assergi, Italy, June 2018
Parametric localized modes in quadratic nonlinear photonic structures
We analyze two-color spatially localized modes formed by parametrically
coupled fundamental and second-harmonic fields excited at quadratic (or chi-2)
nonlinear interfaces embedded into a linear layered structure --- a
quasi-one-dimensional quadratic nonlinear photonic crystal. For a periodic
lattice of nonlinear interfaces, we derive an effective discrete model for the
amplitudes of the fundamental and second-harmonic waves at the interfaces (the
so-called discrete chi-2 equations), and find, numerically and analytically,
the spatially localized solutions --- discrete gap solitons. For a single
nonlinear interface in a linear superlattice, we study the properties of
two-color localized modes, and describe both similarities and differences with
quadratic solitons in homogeneous media.Comment: 9 pages, 8 figure
Adoption of Global Investment Performance Standards: Case of ASEAN
Research on voluntary compliance with accepted international standards has paid overwhelming attention to financial reporting standards, but not to investment performance standards. Previous research on the adoption of the Global Investment Performance Standards has overlooked the unique region of the Association of Southeast Asian Nations. Using 17 years (1999 to 2015) worth of data from all ten countries, which generates 170 country-year observations for each variable of the study, this paper evaluates whether, and how, social and economic pressures influence the adoption of GIPS in the region in the Institutional Theory lens. The results suggest that social pressure is more impactful than economic pressure on the adoption of GIPS. The findings have generated useful contributions and implications in this vein, and several future research directions have been identified.
Keywords: Global Investment Performance Standards (GIPS); ASEAN; investment profession; regional integration; voluntary adoption; sustainability reporting; Chartered Financial Analyst (CFA).
JEL classification: G11, G15, N95, P1
Male reproductive health and environmental xenoestrogens
EHP is a publication of the U.S. government. Publication of EHP lies in the public domain and is therefore without copyright.
Research articles from EHP may be used freely; however, articles from the News section of EHP may contain photographs or figures copyrighted by other commercial organizations and individuals that may not be used without obtaining prior approval from both the EHP editors and the holder of the copyright.
Use of any materials published in EHP should be acknowledged (for example, "Reproduced with permission from Environmental Health Perspectives") and a reference provided for the article from which the material was reproduced.Male reproductive health has deteriorated in many countries during the last few decades. In the 1990s, declining semen quality has been reported from Belgium, Denmark, France, and Great Britain. The incidence of testicular cancer has increased during the same time incidences of hypospadias and cryptorchidism also appear to be increasing. Similar reproductive problems occur in many wildlife species. There are marked geographic differences in the prevalence of male reproductive disorders. While the reasons for these differences are currently unknown, both clinical and laboratory research suggest that the adverse changes may be inter-related and have a common origin in fetal life or childhood. Exposure of the male fetus to supranormal levels of estrogens, such as diethlylstilbestrol, can result in the above-mentioned reproductive defects. The growing number of reports demonstrating that common environmental contaminants and natural factors possess estrogenic activity presents the working hypothesis that the adverse trends in male reproductive health may be, at least in part, associated with exposure to estrogenic or other hormonally active (e.g., antiandrogenic) environmental chemicals during fetal and childhood development. An extensive research program is needed to understand the extent of the problem, its underlying etiology, and the development of a strategy for prevention and intervention.Supported by EU Contract BMH4-CT96-0314
- âŠ