127 research outputs found
The Computational Wiretap Channel
We present the computational wiretap channel: Alice has some data x and wants
to share some computation h(x) with Bob. To do this, she sends f(x), where f is
some sufficient statistic for h. An eavesdropper, Eve, is interested in
computing another function g(x). We show that, under some conditions on f and
g, this channel can be approximated, from Eve's point of view, by the classic
Wyner wiretap channel.Comment: Presented at the 56th Annual Allerton Conference on Communication,
Control, and Computin
Optimal Binary Differential Privacy via Graphs
We present the notion of \emph{reasonable utility} for binary mechanisms,
which applies to all utility functions in the literature. This notion induces a
partial ordering on the performance of all binary differentially private (DP)
mechanisms. DP mechanisms that are maximal elements of this ordering are
optimal DP mechanisms for every reasonable utility. By looking at differential
privacy as a randomized graph coloring, we characterize these optimal DP in
terms of their behavior on a certain subset of the boundary datasets we call a
boundary hitting set. In the process of establishing our results, we also
introduce a useful notion that generalizes DP conditions for binary-valued
queries, which we coin as suitable pairs. Suitable pairs abstract away the
algebraic roles of in the DP framework, making the
derivations and understanding of our proofs simpler. Additionally, the notion
of a suitable pair can potentially capture privacy conditions in frameworks
other than DP and may be of independent interest
LO-phonon assisted polariton lasing in a ZnO based microcavity
Polariton relaxation mechanisms are analysed experimentally and theoretically
in a ZnO-based polariton laser. A minimum lasing threshold is obtained when the
energy difference between the exciton reservoir and the bottom of the lower
polariton branch is resonant with the LO phonon energy. Tuning off this
resonance increases the threshold, and exciton-exciton scattering processes
become involved in the polariton relaxation. These observations are
qualitatively reproduced by simulations based on the numerical solution of the
semi-classical Boltzmann equations
CRYPTO-MINE: Cryptanalysis via Mutual Information Neural Estimation
The use of Mutual Information (MI) as a measure to evaluate the efficiency of
cryptosystems has an extensive history. However, estimating MI between unknown
random variables in a high-dimensional space is challenging. Recent advances in
machine learning have enabled progress in estimating MI using neural networks.
This work presents a novel application of MI estimation in the field of
cryptography. We propose applying this methodology directly to estimate the MI
between plaintext and ciphertext in a chosen plaintext attack. The leaked
information, if any, from the encryption could potentially be exploited by
adversaries to compromise the computational security of the cryptosystem. We
evaluate the efficiency of our approach by empirically analyzing multiple
encryption schemes and baseline approaches. Furthermore, we extend the analysis
to novel network coding-based cryptosystems that provide individual secrecy and
study the relationship between information leakage and input distribution
The Inflammasome Drives GSDMD-Independent Secondary Pyroptosis and IL-1 Release in the Absence of Caspase-1 Protease Activity.
Inflammasomes activate the protease caspase-1, which cleaves interleukin-1β and interleukin-18 to generate the mature cytokines and controls their secretion and a form of inflammatory cell death called pyroptosis. By generating mice expressing enzymatically inactive caspase-1 <sup>C284A</sup> , we provide genetic evidence that caspase-1 protease activity is required for canonical IL-1 secretion, pyroptosis, and inflammasome-mediated immunity. In caspase-1-deficient cells, caspase-8 can be activated at the inflammasome. Using mice either lacking the pyroptosis effector gasdermin D (GSDMD) or expressing caspase-1 <sup>C284A</sup> , we found that GSDMD-dependent pyroptosis prevented caspase-8 activation at the inflammasome. In the absence of GSDMD-dependent pyroptosis, the inflammasome engaged a delayed, alternative form of lytic cell death that was accompanied by the release of large amounts of mature IL-1 and contributed to host protection. Features of this cell death modality distinguished it from apoptosis, suggesting it may represent a distinct form of pro-inflammatory regulated necrosis
- …