166 research outputs found

    Privacy-Preserving Trust Management Mechanisms from Private Matching Schemes

    Full text link
    Cryptographic primitives are essential for constructing privacy-preserving communication mechanisms. There are situations in which two parties that do not know each other need to exchange sensitive information on the Internet. Trust management mechanisms make use of digital credentials and certificates in order to establish trust among these strangers. We address the problem of choosing which credentials are exchanged. During this process, each party should learn no information about the preferences of the other party other than strictly required for trust establishment. We present a method to reach an agreement on the credentials to be exchanged that preserves the privacy of the parties. Our method is based on secure two-party computation protocols for set intersection. Namely, it is constructed from private matching schemes.Comment: The material in this paper will be presented in part at the 8th DPM International Workshop on Data Privacy Management (DPM 2013

    Flexible and Robust Privacy-Preserving Implicit Authentication

    Full text link
    Implicit authentication consists of a server authenticating a user based on the user's usage profile, instead of/in addition to relying on something the user explicitly knows (passwords, private keys, etc.). While implicit authentication makes identity theft by third parties more difficult, it requires the server to learn and store the user's usage profile. Recently, the first privacy-preserving implicit authentication system was presented, in which the server does not learn the user's profile. It uses an ad hoc two-party computation protocol to compare the user's fresh sampled features against an encrypted stored user's profile. The protocol requires storing the usage profile and comparing against it using two different cryptosystems, one of them order-preserving; furthermore, features must be numerical. We present here a simpler protocol based on set intersection that has the advantages of: i) requiring only one cryptosystem; ii) not leaking the relative order of fresh feature samples; iii) being able to deal with any type of features (numerical or non-numerical). Keywords: Privacy-preserving implicit authentication, privacy-preserving set intersection, implicit authentication, active authentication, transparent authentication, risk mitigation, data brokers.Comment: IFIP SEC 2015-Intl. Information Security and Privacy Conference, May 26-28, 2015, IFIP AICT, Springer, to appea

    Estimation of turbulence in fan-rotor wakes for broadband noise prediction during acoustic preliminary design

    Get PDF
    When calculating broadband fan noise caused by rotor-stator wake interaction analytically, information about the airflow, particularly about the turbulence in the rotor wakes, is necessary. During the pre-design phase, two-dimensional streamline methods are commonly used. These provide only general flow quantities like mean-flow velocities or total-pressure losses. Turbulent parameters such as turbulent kinetic energy and turbulent integral length scale need to be deduced from these quantities. There are several models mentioned in the literature which correlate the wake size with the wake turbulence. But they usually comprise calibration factors that need to be assessed empirically by numerical simulations or measurements. The contribution of the paper is to present an updated semi-empirical model for rotor-wake turbulence quantities, derived on the basis of an extensive comparison of the model with measurements and numerical simulations on four different turbofan stages. A recalibration of the empirical factors improved the noise prediction by 8 dB, reaching an accuracy of 2 dB. In addition, it is shown, that the endwall flow is responsible for large variance in the noise prediction, and may have a contribution of up to 2 dB to the overall sound power

    Response of non-equilibrium systems with long-range initial correlations

    Full text link
    The long-time dynamics of the dd-dimensional spherical model with a non-conserved order parameter and quenched from an initial state with long-range correlations is studied through the exact calculation of the two-time autocorrelation and autoresponse functions. In the aging regime, these are given in terms of non-trivial universal scaling functions of both time variables. At criticality, five distinct types of aging are found, depending on the form of the initial correlations, while at low temperatures only a single type of aging exists. The autocorrelation and autoreponse exponents are shown to be generically different and to depend on the initial conditions. The scaling form of the two-time response functions agrees with a recent prediction coming from local scale invariance.Comment: Latex, 18pp, 2 figures (final version

    Fluctuations in the coarsening dynamics of the O(N) model: are they similar to those in glassy systems?

    Full text link
    We study spatio-temporal fluctuations in the non-equilibrium dynamics of the d dimensional O(N) in the large N limit. We analyse the invariance of the dynamic equations for the global correlation and response in the slow ageing regime under transformations of time. We find that these equations are invariant under scale transformations. We extend this study to the action in the dynamic generating functional finding similar results. This model therefore falls into a different category from glassy problems in which full time-reparametrisation invariance, a larger symmetry that emcompasses time scale invariance, is expected to be realised asymptotically. Consequently, the spatio-temporal fluctuations of the large N O(N) model should follow a different pattern from that of glassy systems. We compute the fluctuations of local, as well as spatially separated, two-field composite operators and responses, and we confront our results with the ones found numerically for the 3d Edwards-Anderson model and kinetically constrained lattice gases. We analyse the dependence of the fluctuations of the composite operators on the growing domain length and we compare to what has been found in super-cooled liquids and glasses. Finally, we show that the development of time-reparametrisation invariance in glassy systems is intimately related to a well-defined and finite effective temperature, specified from the modification of the fluctuation-dissipation theorem out of equilibrium. We then conjecture that the global asymptotic time-reparametrisation invariance is broken down to time scale invariance in all coarsening systems.Comment: 57 pages, 5 figure

    The kinetic spherical model in a magnetic field

    Full text link
    The long-time kinetics of the spherical model in an external magnetic field and below the equilibrium critical temperature is studied. The solution of the associated stochastic Langevin equation is reduced exactly to a single non-linear Volterra equation. For a sufficiently small external field, the kinetics of the magnetization-reversal transition from the metastable to the ground state is compared to the ageing behaviour of coarsening systems quenched into the low-temperature phase. For an oscillating magnetic field and below the critical temperature, we find evidence for the absence of the frequency-dependent dynamic phase transition, which was observed previously to occur in Ising-like systems.Comment: 26 pages, 12 figure

    Efficient Techniques for Privacy-Preserving Sharing of Sensitive Information

    Get PDF
    The need for privacy-preserving sharing of sensitive information occurs in many different and realistic everyday scenarios, ranging from national security to social networking. A typical setting involves two parties: one seeks information from the other without revealing the interest while the latter is either willing, or compelled, to share only the requested information. This poses two challenges: (1) how to enable sharing such that parties learn no information beyond what they are entitled to, and (2) how to do so efficiently, in real-world practical terms. This paper explores the notion of Privacy-Preserving Sharing of Sensitive Information (PPSSI), and provides a concrete and efficient instantiation, modeled in the context of simple database querying. Proposed approach functions as a privacy shield to protect parties from disclosing more than the required minimum of their respective sensitive information. PPSSI deployment prompts several challenges, which are addressed in this paper. Extensive experimental results attest to the practicality of attained privacy features and show that our approach incurs quite low overhead (e.g., 10% slower than standard MySQL). © 2011 Springer-Verlag

    Mean Field Theory of Josephson Junction Arrays with Charge Frustration

    Full text link
    Using the path integral approach, we provide an explicit derivation of the equation for the phase boundary for quantum Josephson junction arrays with offset charges and non-diagonal capacitance matrix. For the model with nearest neighbor capacitance matrix and uniform offset charge q/2e=1/2q/2e=1/2, we determine, in the low critical temperature expansion, the most relevant contributions to the equation for the phase boundary. We explicitly construct the charge distributions on the lattice corresponding to the lowest energies. We find a reentrant behavior even with a short ranged interaction. A merit of the path integral approach is that it allows to provide an elegant derivation of the Ginzburg-Landau free energy for a general model with charge frustration and non-diagonal capacitance matrix. The partition function factorizes as a product of a topological term, depending only on a set of integers, and a non-topological one, which is explicitly evaluated.Comment: LaTex, 24 pages, 8 figure

    Quantum-Phase Transitions of Interacting Bosons and the Supersolid Phase

    Full text link
    We investigate the properties of strongly interacting bosons in two dimensions at zero temperature using mean-field theory, a variational Ansatz for the ground state wave function, and Monte Carlo methods. With on-site and short-range interactions a rich phase diagram is obtained. Apart from the homogeneous superfluid and Mott-insulating phases, inhomogeneous charge-density wave phases appear, that are stabilized by the finite-range interaction. Furthermore, our analysis demonstrates the existence of a supersolid phase, in which both long-range order (related to the charge-density wave) and off-diagonal long-range order coexist. We also obtain the critical exponents for the various phase transitions.Comment: RevTex, 20 pages, 10 PostScript figures include
    • …
    corecore