127 research outputs found

    The Computational Wiretap Channel

    Full text link
    We present the computational wiretap channel: Alice has some data x and wants to share some computation h(x) with Bob. To do this, she sends f(x), where f is some sufficient statistic for h. An eavesdropper, Eve, is interested in computing another function g(x). We show that, under some conditions on f and g, this channel can be approximated, from Eve's point of view, by the classic Wyner wiretap channel.Comment: Presented at the 56th Annual Allerton Conference on Communication, Control, and Computin

    Optimal Binary Differential Privacy via Graphs

    Full text link
    We present the notion of \emph{reasonable utility} for binary mechanisms, which applies to all utility functions in the literature. This notion induces a partial ordering on the performance of all binary differentially private (DP) mechanisms. DP mechanisms that are maximal elements of this ordering are optimal DP mechanisms for every reasonable utility. By looking at differential privacy as a randomized graph coloring, we characterize these optimal DP in terms of their behavior on a certain subset of the boundary datasets we call a boundary hitting set. In the process of establishing our results, we also introduce a useful notion that generalizes DP conditions for binary-valued queries, which we coin as suitable pairs. Suitable pairs abstract away the algebraic roles of ε,δ\varepsilon,\delta in the DP framework, making the derivations and understanding of our proofs simpler. Additionally, the notion of a suitable pair can potentially capture privacy conditions in frameworks other than DP and may be of independent interest

    LO-phonon assisted polariton lasing in a ZnO based microcavity

    Full text link
    Polariton relaxation mechanisms are analysed experimentally and theoretically in a ZnO-based polariton laser. A minimum lasing threshold is obtained when the energy difference between the exciton reservoir and the bottom of the lower polariton branch is resonant with the LO phonon energy. Tuning off this resonance increases the threshold, and exciton-exciton scattering processes become involved in the polariton relaxation. These observations are qualitatively reproduced by simulations based on the numerical solution of the semi-classical Boltzmann equations

    CRYPTO-MINE: Cryptanalysis via Mutual Information Neural Estimation

    Full text link
    The use of Mutual Information (MI) as a measure to evaluate the efficiency of cryptosystems has an extensive history. However, estimating MI between unknown random variables in a high-dimensional space is challenging. Recent advances in machine learning have enabled progress in estimating MI using neural networks. This work presents a novel application of MI estimation in the field of cryptography. We propose applying this methodology directly to estimate the MI between plaintext and ciphertext in a chosen plaintext attack. The leaked information, if any, from the encryption could potentially be exploited by adversaries to compromise the computational security of the cryptosystem. We evaluate the efficiency of our approach by empirically analyzing multiple encryption schemes and baseline approaches. Furthermore, we extend the analysis to novel network coding-based cryptosystems that provide individual secrecy and study the relationship between information leakage and input distribution

    The Inflammasome Drives GSDMD-Independent Secondary Pyroptosis and IL-1 Release in the Absence of Caspase-1 Protease Activity.

    Get PDF
    Inflammasomes activate the protease caspase-1, which cleaves interleukin-1β and interleukin-18 to generate the mature cytokines and controls their secretion and a form of inflammatory cell death called pyroptosis. By generating mice expressing enzymatically inactive caspase-1 <sup>C284A</sup> , we provide genetic evidence that caspase-1 protease activity is required for canonical IL-1 secretion, pyroptosis, and inflammasome-mediated immunity. In caspase-1-deficient cells, caspase-8 can be activated at the inflammasome. Using mice either lacking the pyroptosis effector gasdermin D (GSDMD) or expressing caspase-1 <sup>C284A</sup> , we found that GSDMD-dependent pyroptosis prevented caspase-8 activation at the inflammasome. In the absence of GSDMD-dependent pyroptosis, the inflammasome engaged a delayed, alternative form of lytic cell death that was accompanied by the release of large amounts of mature IL-1 and contributed to host protection. Features of this cell death modality distinguished it from apoptosis, suggesting it may represent a distinct form of pro-inflammatory regulated necrosis
    corecore