166 research outputs found
Privacy-Preserving Trust Management Mechanisms from Private Matching Schemes
Cryptographic primitives are essential for constructing privacy-preserving
communication mechanisms. There are situations in which two parties that do not
know each other need to exchange sensitive information on the Internet. Trust
management mechanisms make use of digital credentials and certificates in order
to establish trust among these strangers. We address the problem of choosing
which credentials are exchanged. During this process, each party should learn
no information about the preferences of the other party other than strictly
required for trust establishment. We present a method to reach an agreement on
the credentials to be exchanged that preserves the privacy of the parties. Our
method is based on secure two-party computation protocols for set intersection.
Namely, it is constructed from private matching schemes.Comment: The material in this paper will be presented in part at the 8th DPM
International Workshop on Data Privacy Management (DPM 2013
Flexible and Robust Privacy-Preserving Implicit Authentication
Implicit authentication consists of a server authenticating a user based on
the user's usage profile, instead of/in addition to relying on something the
user explicitly knows (passwords, private keys, etc.). While implicit
authentication makes identity theft by third parties more difficult, it
requires the server to learn and store the user's usage profile. Recently, the
first privacy-preserving implicit authentication system was presented, in which
the server does not learn the user's profile. It uses an ad hoc two-party
computation protocol to compare the user's fresh sampled features against an
encrypted stored user's profile. The protocol requires storing the usage
profile and comparing against it using two different cryptosystems, one of them
order-preserving; furthermore, features must be numerical. We present here a
simpler protocol based on set intersection that has the advantages of: i)
requiring only one cryptosystem; ii) not leaking the relative order of fresh
feature samples; iii) being able to deal with any type of features (numerical
or non-numerical).
Keywords: Privacy-preserving implicit authentication, privacy-preserving set
intersection, implicit authentication, active authentication, transparent
authentication, risk mitigation, data brokers.Comment: IFIP SEC 2015-Intl. Information Security and Privacy Conference, May
26-28, 2015, IFIP AICT, Springer, to appea
Estimation of turbulence in fan-rotor wakes for broadband noise prediction during acoustic preliminary design
When calculating broadband fan noise caused by rotor-stator wake interaction analytically, information about the airflow, particularly about the turbulence in the rotor wakes, is necessary. During the pre-design phase, two-dimensional streamline methods are commonly used. These provide only general flow quantities like mean-flow velocities or total-pressure losses. Turbulent parameters such as turbulent kinetic energy and turbulent integral length scale need to be deduced from these quantities. There are several models mentioned in the literature which correlate the wake size with the wake turbulence. But they usually comprise calibration factors that need to be assessed empirically by numerical simulations or measurements. The contribution of the paper is to present an updated semi-empirical model for rotor-wake turbulence quantities, derived on the basis of an extensive comparison of the model with measurements and numerical simulations on four different turbofan stages. A recalibration of the empirical factors improved the noise prediction by 8 dB, reaching an accuracy of 2 dB. In addition, it is shown, that the endwall flow is responsible for large variance in the noise prediction, and may have a contribution of up to 2 dB to the overall sound power
Response of non-equilibrium systems with long-range initial correlations
The long-time dynamics of the -dimensional spherical model with a
non-conserved order parameter and quenched from an initial state with
long-range correlations is studied through the exact calculation of the
two-time autocorrelation and autoresponse functions. In the aging regime, these
are given in terms of non-trivial universal scaling functions of both time
variables. At criticality, five distinct types of aging are found, depending on
the form of the initial correlations, while at low temperatures only a single
type of aging exists. The autocorrelation and autoreponse exponents are shown
to be generically different and to depend on the initial conditions. The
scaling form of the two-time response functions agrees with a recent prediction
coming from local scale invariance.Comment: Latex, 18pp, 2 figures (final version
Fluctuations in the coarsening dynamics of the O(N) model: are they similar to those in glassy systems?
We study spatio-temporal fluctuations in the non-equilibrium dynamics of the
d dimensional O(N) in the large N limit. We analyse the invariance of the
dynamic equations for the global correlation and response in the slow ageing
regime under transformations of time. We find that these equations are
invariant under scale transformations. We extend this study to the action in
the dynamic generating functional finding similar results. This model therefore
falls into a different category from glassy problems in which full
time-reparametrisation invariance, a larger symmetry that emcompasses time
scale invariance, is expected to be realised asymptotically. Consequently, the
spatio-temporal fluctuations of the large N O(N) model should follow a
different pattern from that of glassy systems. We compute the fluctuations of
local, as well as spatially separated, two-field composite operators and
responses, and we confront our results with the ones found numerically for the
3d Edwards-Anderson model and kinetically constrained lattice gases. We analyse
the dependence of the fluctuations of the composite operators on the growing
domain length and we compare to what has been found in super-cooled liquids and
glasses. Finally, we show that the development of time-reparametrisation
invariance in glassy systems is intimately related to a well-defined and finite
effective temperature, specified from the modification of the
fluctuation-dissipation theorem out of equilibrium. We then conjecture that the
global asymptotic time-reparametrisation invariance is broken down to time
scale invariance in all coarsening systems.Comment: 57 pages, 5 figure
The kinetic spherical model in a magnetic field
The long-time kinetics of the spherical model in an external magnetic field
and below the equilibrium critical temperature is studied. The solution of the
associated stochastic Langevin equation is reduced exactly to a single
non-linear Volterra equation. For a sufficiently small external field, the
kinetics of the magnetization-reversal transition from the metastable to the
ground state is compared to the ageing behaviour of coarsening systems quenched
into the low-temperature phase. For an oscillating magnetic field and below the
critical temperature, we find evidence for the absence of the
frequency-dependent dynamic phase transition, which was observed previously to
occur in Ising-like systems.Comment: 26 pages, 12 figure
Efficient Techniques for Privacy-Preserving Sharing of Sensitive Information
The need for privacy-preserving sharing of sensitive information occurs in many different and realistic everyday scenarios, ranging from national security to social networking. A typical setting involves two parties: one seeks information from the other without revealing the interest while the latter is either willing, or compelled, to share only the requested information. This poses two challenges: (1) how to enable sharing such that parties learn no information beyond what they are entitled to, and (2) how to do so efficiently, in real-world practical terms. This paper explores the notion of Privacy-Preserving Sharing of Sensitive Information (PPSSI), and provides a concrete and efficient instantiation, modeled in the context of simple database querying. Proposed approach functions as a privacy shield to protect parties from disclosing more than the required minimum of their respective sensitive information. PPSSI deployment prompts several challenges, which are addressed in this paper. Extensive experimental results attest to the practicality of attained privacy features and show that our approach incurs quite low overhead (e.g., 10% slower than standard MySQL). © 2011 Springer-Verlag
Mean Field Theory of Josephson Junction Arrays with Charge Frustration
Using the path integral approach, we provide an explicit derivation of the
equation for the phase boundary for quantum Josephson junction arrays with
offset charges and non-diagonal capacitance matrix. For the model with nearest
neighbor capacitance matrix and uniform offset charge , we determine,
in the low critical temperature expansion, the most relevant contributions to
the equation for the phase boundary. We explicitly construct the charge
distributions on the lattice corresponding to the lowest energies. We find a
reentrant behavior even with a short ranged interaction. A merit of the path
integral approach is that it allows to provide an elegant derivation of the
Ginzburg-Landau free energy for a general model with charge frustration and
non-diagonal capacitance matrix. The partition function factorizes as a product
of a topological term, depending only on a set of integers, and a
non-topological one, which is explicitly evaluated.Comment: LaTex, 24 pages, 8 figure
Quantum-Phase Transitions of Interacting Bosons and the Supersolid Phase
We investigate the properties of strongly interacting bosons in two
dimensions at zero temperature using mean-field theory, a variational Ansatz
for the ground state wave function, and Monte Carlo methods. With on-site and
short-range interactions a rich phase diagram is obtained. Apart from the
homogeneous superfluid and Mott-insulating phases, inhomogeneous charge-density
wave phases appear, that are stabilized by the finite-range interaction.
Furthermore, our analysis demonstrates the existence of a supersolid phase, in
which both long-range order (related to the charge-density wave) and
off-diagonal long-range order coexist. We also obtain the critical exponents
for the various phase transitions.Comment: RevTex, 20 pages, 10 PostScript figures include
- …