1,149 research outputs found

    Verifying proofs in constant depth

    Get PDF
    In this paper we initiate the study of proof systems where verification of proofs proceeds by NC circuits. We investigate the question which languages admit proof systems in this very restricted model. Formulated alternatively, we ask which languages can be enumerated by NC functions. Our results show that the answer to this problem is not determined by the complexity of the language. On the one hand, we construct NC proof systems for a variety of languages ranging from regular to NP-complete. On the other hand, we show by combinatorial methods that even easy regular languages such as Exact-OR do not admit NC proof systems. We also present a general construction of proof systems for regular languages with strongly connected NFA's

    Fractional Fokker-Planck Equations for Subdiffusion with Space-and-Time-Dependent Forces

    Get PDF
    We have derived a fractional Fokker-Planck equation for subdiffusion in a general space-and- time-dependent force field from power law waiting time continuous time random walks biased by Boltzmann weights. The governing equation is derived from a generalized master equation and is shown to be equivalent to a subordinated stochastic Langevin equation.Comment: 5 page

    The fractional Schr\"{o}dinger operator and Toeplitz matrices

    Full text link
    Confining a quantum particle in a compact subinterval of the real line with Dirichlet boundary conditions, we identify the connection of the one-dimensional fractional Schr\"odinger operator with the truncated Toeplitz matrices. We determine the asymptotic behaviour of the product of eigenvalues for the α\alpha-stable symmetric laws by employing the Szeg\"o's strong limit theorem. The results of the present work can be applied to a recently proposed model for a particle hopping on a bounded interval in one dimension whose hopping probability is given a discrete representation of the fractional Laplacian.Comment: 10 pages, 2 figure

    Controlled Data Sharing for Collaborative Predictive Blacklisting

    Get PDF
    Although sharing data across organizations is often advocated as a promising way to enhance cybersecurity, collaborative initiatives are rarely put into practice owing to confidentiality, trust, and liability challenges. In this paper, we investigate whether collaborative threat mitigation can be realized via a controlled data sharing approach, whereby organizations make informed decisions as to whether or not, and how much, to share. Using appropriate cryptographic tools, entities can estimate the benefits of collaboration and agree on what to share in a privacy-preserving way, without having to disclose their datasets. We focus on collaborative predictive blacklisting, i.e., forecasting attack sources based on one's logs and those contributed by other organizations. We study the impact of different sharing strategies by experimenting on a real-world dataset of two billion suspicious IP addresses collected from Dshield over two months. We find that controlled data sharing yields up to 105% accuracy improvement on average, while also reducing the false positive rate.Comment: A preliminary version of this paper appears in DIMVA 2015. This is the full version. arXiv admin note: substantial text overlap with arXiv:1403.212

    On the Concrete Security of Goldreich’s Pseudorandom Generator

    Get PDF
    International audienceLocal pseudorandom generators allow to expand a short random string into a long pseudo-random string, such that each output bit depends on a constant number d of input bits. Due to its extreme efficiency features, this intriguing primitive enjoys a wide variety of applications in cryptography and complexity. In the polynomial regime, where the seed is of size n and the output of size n s for s > 1, the only known solution, commonly known as Goldreich's PRG, proceeds by applying a simple d-ary predicate to public random sized subsets of the bits of the seed. While the security of Goldreich's PRG has been thoroughly investigated, with a variety of results deriving provable security guarantees against class of attacks in some parameter regimes and necessary criteria to be satisfied by the underlying predicate, little is known about its concrete security and efficiency. Motivated by its numerous theoretical applications and the hope of getting practical instantiations for some of them, we initiate a study of the concrete security of Goldreich's PRG, and evaluate its resistance to cryptanalytic attacks. Along the way, we develop a new guess-and-determine-style attack, and identify new criteria which refine existing criteria and capture the security guarantees of candidate local PRGs in a more fine-grained way

    A functional non-central limit theorem for jump-diffusions with periodic coefficients driven by stable Levy-noise

    Full text link
    We prove a functional non-central limit theorem for jump-diffusions with periodic coefficients driven by strictly stable Levy-processes with stability index bigger than one. The limit process turns out to be a strictly stable Levy process with an averaged jump-measure. Unlike in the situation where the diffusion is driven by Brownian motion, there is no drift related enhancement of diffusivity.Comment: Accepted to Journal of Theoretical Probabilit

    Lognormal scale invariant random measures

    Full text link
    In this article, we consider the continuous analog of the celebrated Mandelbrot star equation with lognormal weights. Mandelbrot introduced this equation to characterize the law of multiplicative cascades. We show existence and uniqueness of measures satisfying the aforementioned continuous equation; these measures fall under the scope of the Gaussian multiplicative chaos theory developed by J.P. Kahane in 1985 (or possibly extensions of this theory). As a by product, we also obtain an explicit characterization of the covariance structure of these measures. We also prove that qualitative properties such as long-range independence or isotropy can be read off the equation.Comment: 31 pages; Probability Theory and Related Fields (2012) electronic versio

    Private Outsourcing of Polynomial Evaluation and Matrix Multiplication using Multilinear Maps

    Full text link
    {\em Verifiable computation} (VC) allows a computationally weak client to outsource the evaluation of a function on many inputs to a powerful but untrusted server. The client invests a large amount of off-line computation and gives an encoding of its function to the server. The server returns both an evaluation of the function on the client's input and a proof such that the client can verify the evaluation using substantially less effort than doing the evaluation on its own. We consider how to privately outsource computations using {\em privacy preserving} VC schemes whose executions reveal no information on the client's input or function to the server. We construct VC schemes with {\em input privacy} for univariate polynomial evaluation and matrix multiplication and then extend them such that the {\em function privacy} is also achieved. Our tool is the recently developed {mutilinear maps}. The proposed VC schemes can be used in outsourcing {private information retrieval (PIR)}.Comment: 23 pages, A preliminary version appears in the 12th International Conference on Cryptology and Network Security (CANS 2013

    A Feynman-Kac Formula for Anticommuting Brownian Motion

    Get PDF
    Motivated by application to quantum physics, anticommuting analogues of Wiener measure and Brownian motion are constructed. The corresponding Ito integrals are defined and the existence and uniqueness of solutions to a class of stochastic differential equations is established. This machinery is used to provide a Feynman-Kac formula for a class of Hamiltonians. Several specific examples are considered.Comment: 21 page
    corecore