220 research outputs found
Sanitization of FHE ciphertexts
By definition, fully homomorphic encryption (FHE) schemes support homomorphic decryption, and all known FHE constructions are bootstrapped from a Somewhat Homomorphic Encryption (SHE) scheme via this technique. Additionally, when a public key is provided, ciphertexts are also re-randomizable, e.g., by adding to them fresh encryptions of 0. From those two operations we devise an algorithm to sanitize a ciphertext, by making its distribution canonical. In particular, the distribution of the ciphertext does not depend on the circuit that led to it via homomorphic evaluation, thus providing circuit privacy in the honest-but-curious model. Unlike the previous approach based on noise flooding, our approach does not degrade much the security/efficiency trade-off of the underlying FHE. The technique can be applied to all lattice-based FHE proposed so far, without substantially affecting their concrete parameters
An O(M(n) log n) algorithm for the Jacobi symbol
The best known algorithm to compute the Jacobi symbol of two n-bit integers
runs in time O(M(n) log n), using Sch\"onhage's fast continued fraction
algorithm combined with an identity due to Gauss. We give a different O(M(n)
log n) algorithm based on the binary recursive gcd algorithm of Stehl\'e and
Zimmermann. Our implementation - which to our knowledge is the first to run in
time O(M(n) log n) - is faster than GMP's quadratic implementation for inputs
larger than about 10000 decimal digits.Comment: Submitted to ANTS IX (Nancy, July 2010
Facility Location in Evolving Metrics
Understanding the dynamics of evolving social or infrastructure networks is a
challenge in applied areas such as epidemiology, viral marketing, or urban
planning. During the past decade, data has been collected on such networks but
has yet to be fully analyzed. We propose to use information on the dynamics of
the data to find stable partitions of the network into groups. For that
purpose, we introduce a time-dependent, dynamic version of the facility
location problem, that includes a switching cost when a client's assignment
changes from one facility to another. This might provide a better
representation of an evolving network, emphasizing the abrupt change of
relationships between subjects rather than the continuous evolution of the
underlying network. We show that in realistic examples this model yields indeed
better fitting solutions than optimizing every snapshot independently. We
present an -approximation algorithm and a matching hardness result,
where is the number of clients and the number of time steps. We also
give an other algorithms with approximation ratio for the variant
where one pays at each time step (leasing) for each open facility
Security considerations for Galois non-dual RLWE families
We explore further the hardness of the non-dual discrete variant of the
Ring-LWE problem for various number rings, give improved attacks for certain
rings satisfying some additional assumptions, construct a new family of
vulnerable Galois number fields, and apply some number theoretic results on
Gauss sums to deduce the likely failure of these attacks for 2-power cyclotomic
rings and unramified moduli
Stellar model atmospheres with magnetic line blanketing
Model atmospheres of A and B stars are computed taking into account magnetic
line blanketing. These calculations are based on the new stellar model
atmosphere code LLModels which implements direct treatment of the opacities due
to the bound-bound transitions and ensures an accurate and detailed description
of the line absorption. The anomalous Zeeman effect was calculated for the
field strengths between 1 and 40 kG and a field vector perpendicular to the
line of sight. The model structure, high-resolution energy distribution,
photometric colors, metallic line spectra and the hydrogen Balmer line profiles
are computed for magnetic stars with different metallicities and are discussed
with respect to those of non-magnetic reference models. The magnetically
enhanced line blanketing changes the atmospheric structure and leads to a
redistribution of energy in the stellar spectrum. The most noticeable feature
in the optical region is the appearance of the 5200 A depression. However, this
effect is prominent only in cool A stars and disappears for higher effective
temperatures. The presence of a magnetic field produces opposite variation of
the flux distribution in the optical and UV region. A deficiency of the UV flux
is found for the whole range of considered effective temperatures, whereas the
``null wavelength'' where flux remains unchanged shifts towards the shorter
wavelengths for higher temperatures.Comment: accepted by Astronomy & Astrophysic
δ-subgaussian Random Variables in Cryptography
In the Ring-LWE literature, there are several works that use a statistical framework based on delta-subgaussian random variables. These were introduced by Miccancio and Peikert (Eurocrypt 2012) as a relaxation of subgaussian random variables. In this paper, we completely characterise delta-subgaussian random variables. In particular, we show that this relaxation from a subgaussian random variable corresponds only to the shifting of the mean. Next, we give an alternative noncentral formulation for a delta-subgaussian random variable, which we argue is more statistically natural. This formulation enables us to extend prior results on sums of delta-subgaussian random variables, and on their discretisation
Depth optimized efficient homomorphic sorting
We introduce a sorting scheme which is capable of efficiently sorting encrypted data without the secret key. The technique is obtained by focusing on the multiplicative depth of the sorting circuit alongside the more traditional metrics such as number of comparisons and number of iterations. The reduced depth allows much reduced noise growth and thereby makes it possible to select smaller parameter sizes in somewhat homomorphic encryption instantiations resulting in greater efficiency savings. We first consider a number of well known comparison based sorting algorithms as well as some sorting networks, and analyze their circuit implementations with respect to multiplicative depth. In what follows, we introduce a new ranking based sorting scheme and rigorously analyze the multiplicative depth complexity as O(log(N) + log(l)), where N is the size of the array to be sorted and l is the bit size of the array elements. Finally, we simulate our sorting scheme using a leveled/batched instantiation of a SWHE library. Our sorting scheme performs favorably over the analyzed classical sorting algorithms
Temporal networks of face-to-face human interactions
The ever increasing adoption of mobile technologies and ubiquitous services
allows to sense human behavior at unprecedented levels of details and scale.
Wearable sensors are opening up a new window on human mobility and proximity at
the finest resolution of face-to-face proximity. As a consequence, empirical
data describing social and behavioral networks are acquiring a longitudinal
dimension that brings forth new challenges for analysis and modeling. Here we
review recent work on the representation and analysis of temporal networks of
face-to-face human proximity, based on large-scale datasets collected in the
context of the SocioPatterns collaboration. We show that the raw behavioral
data can be studied at various levels of coarse-graining, which turn out to be
complementary to one another, with each level exposing different features of
the underlying system. We briefly review a generative model of temporal contact
networks that reproduces some statistical observables. Then, we shift our focus
from surface statistical features to dynamical processes on empirical temporal
networks. We discuss how simple dynamical processes can be used as probes to
expose important features of the interaction patterns, such as burstiness and
causal constraints. We show that simulating dynamical processes on empirical
temporal networks can unveil differences between datasets that would otherwise
look statistically similar. Moreover, we argue that, due to the temporal
heterogeneity of human dynamics, in order to investigate the temporal
properties of spreading processes it may be necessary to abandon the notion of
wall-clock time in favour of an intrinsic notion of time for each individual
node, defined in terms of its activity level. We conclude highlighting several
open research questions raised by the nature of the data at hand.Comment: Chapter of the book "Temporal Networks", Springer, 2013. Series:
Understanding Complex Systems. Holme, Petter; Saram\"aki, Jari (Eds.
CRYSTALS-Dilithium: A lattice-based digital signature scheme
In this paper, we present the lattice-based signature scheme Dilithium, which is a component of the CRYSTALS (Cryptographic Suite for Algebraic Lattices) suite that was submitted to NIST’s call for post-quantum cryptographic standards. The design of the scheme avoids all uses of discrete Gaussian sampling and is easily implementable in constant-time. For the same security levels, our scheme has a public key that is 2.5X smaller than the previously most efficient lattice-based schemes that did not use Gaussians, while having essentially the same signature size. In addition to the new design, we significantly improve the running time of the main component of many lattice-based constructions – the number theoretic transform. Our AVX2-based implementation results in a speed-up of roughly a factor of 2 over the previously best algorithms that appear in the literature. The techniques for obtaining this speed-up also have applications to other lattice-based schemes
Bursty egocentric network evolution in Skype
In this study we analyze the dynamics of the contact list evolution of
millions of users of the Skype communication network. We find that egocentric
networks evolve heterogeneously in time as events of edge additions and
deletions of individuals are grouped in long bursty clusters, which are
separated by long inactive periods. We classify users by their link creation
dynamics and show that bursty peaks of contact additions are likely to appear
shortly after user account creation. We also study possible relations between
bursty contact addition activity and other user-initiated actions like free and
paid service adoption events. We show that bursts of contact additions are
associated with increases in activity and adoption - an observation that can
inform the design of targeted marketing tactics.Comment: 7 pages, 6 figures. Social Network Analysis and Mining (2013
- …