composition theorem
Recently Published Documents


TOTAL DOCUMENTS

49
(FIVE YEARS 9)

H-INDEX

10
(FIVE YEARS 0)

2021 ◽  
Vol 2022 (1) ◽  
pp. 253-273
Author(s):  
Josh Smith ◽  
Hassan Jameel Asghar ◽  
Gianpaolo Gioiosa ◽  
Sirine Mrabet ◽  
Serge Gaspers ◽  
...  

Abstract We show that the ‘optimal’ use of the parallel composition theorem corresponds to finding the size of the largest subset of queries that ‘overlap’ on the data domain, a quantity we call the maximum overlap of the queries. It has previously been shown that a certain instance of this problem, formulated in terms of determining the sensitivity of the queries, is NP-hard, but also that it is possible to use graph-theoretic algorithms, such as finding the maximum clique, to approximate query sensitivity. In this paper, we consider a significant generalization of the aforementioned instance which encompasses both a wider range of differentially private mechanisms and a broader class of queries. We show that for a particular class of predicate queries, determining if they are disjoint can be done in time polynomial in the number of attributes. For this class, we show that the maximum overlap problem remains NP-hard as a function of the number of queries. However, we show that efficient approximate solutions exist by relating maximum overlap to the clique and chromatic numbers of a certain graph determined by the queries. The link to chromatic number allows us to use more efficient approximate algorithms, which cannot be done for the clique number as it may underestimate the privacy budget. Our approach is defined in the general setting of f-differential privacy, which subsumes standard pure differential privacy and Gaussian differential privacy. We prove the parallel composition theorem for f-differential privacy. We evaluate our approach on synthetic and real-world data sets of queries. We show that the approach can scale to large domain sizes (up to 1020000), and that its application can reduce the noise added to query answers by up to 60%.


Author(s):  
Dahmun Goudarzi ◽  
Thomas Prest ◽  
Matthieu Rivain ◽  
Damien Vergnaud

The probing security model is widely used to formally prove the security of masking schemes. Whenever a masked implementation can be proven secure in this model with a reasonable leakage rate, it is also provably secure in a realistic leakage model known as the noisy leakage model. This paper introduces a new framework for the composition of probing-secure circuits. We introduce the security notion of input-output separation (IOS) for a refresh gadget. From this notion, one can easily compose gadgets satisfying the classical probing security notion –which does not ensure composability on its own– to obtain a region probing secure circuit. Such a circuit is secure against an adversary placing up to t probes in each gadget composing the circuit, which ensures a tight reduction to the more realistic noisy leakage model. After introducing the notion and proving our composition theorem, we compare our approach to the composition approaches obtained with the (Strong) Non-Interference (S/NI) notions as well as the Probe-Isolating Non-Interference (PINI) notion. We further show that any uniform SNI gadget achieves the IOS security notion, while the converse is not true. We further describe a refresh gadget achieving the IOS property for any linear sharing with a quasilinear complexity Θ(n log n) and a O(1/ log n) leakage rate (for an n-size sharing). This refresh gadget is a simplified version of the quasilinear SNI refresh gadget proposed by Battistello, Coron, Prouff, and Zeitoun (ePrint 2016). As an application of our composition framework, we revisit the quasilinear-complexity masking scheme of Goudarzi, Joux and Rivain (Asiacrypt 2018). We improve this scheme by generalizing it to any base field (whereas the original proposal only applies to field with nth powers of unity) and by taking advantage of our composition approach. We further patch a flaw in the original security proof and extend it from the random probing model to the stronger region probing model. Finally, we present some application of this extended quasilinear masking scheme to AES and MiMC and compare the obtained performances.


Mathematics ◽  
2021 ◽  
Vol 9 (5) ◽  
pp. 474
Author(s):  
Luciano Abadias ◽  
Edgardo Alvarez ◽  
Rogelio Grau

We investigate the semi-linear, non-autonomous, first-order abstract differential equation x′(t)=A(t)x(t)+f(t,x(t),φ[α(t,x(t))]),t∈R. We obtain results on existence and uniqueness of (ω,c)-periodic (second-kind periodic) mild solutions, assuming that A(t) satisfies the so-called Acquistapace–Terreni conditions and the homogeneous associated problem has an integrable dichotomy. A new composition theorem and further regularity theorems are given.


2021 ◽  
Vol 2021 (1) ◽  
pp. 64-84
Author(s):  
Ashish Dandekar ◽  
Debabrota Basu ◽  
Stéphane Bressan

AbstractThe calibration of noise for a privacy-preserving mechanism depends on the sensitivity of the query and the prescribed privacy level. A data steward must make the non-trivial choice of a privacy level that balances the requirements of users and the monetary constraints of the business entity.Firstly, we analyse roles of the sources of randomness, namely the explicit randomness induced by the noise distribution and the implicit randomness induced by the data-generation distribution, that are involved in the design of a privacy-preserving mechanism. The finer analysis enables us to provide stronger privacy guarantees with quantifiable risks. Thus, we propose privacy at risk that is a probabilistic calibration of privacy-preserving mechanisms. We provide a composition theorem that leverages privacy at risk. We instantiate the probabilistic calibration for the Laplace mechanism by providing analytical results.Secondly, we propose a cost model that bridges the gap between the privacy level and the compensation budget estimated by a GDPR compliant business entity. The convexity of the proposed cost model leads to a unique fine-tuning of privacy level that minimises the compensation budget. We show its effectiveness by illustrating a realistic scenario that avoids overestimation of the compensation budget by using privacy at risk for the Laplace mechanism. We quantitatively show that composition using the cost optimal privacy at risk provides stronger privacy guarantee than the classical advanced composition. Although the illustration is specific to the chosen cost model, it naturally extends to any convex cost model. We also provide realistic illustrations of how a data steward uses privacy at risk to balance the trade-off between utility and privacy.


2021 ◽  
Vol 0 (0) ◽  
pp. 0
Author(s):  
Yongkun Li ◽  
Bing Li

<p style='text-indent:20px;'>We consider a class of neutral type Clifford-valued cellular neural networks with discrete delays and infinitely distributed delays. Unlike most previous studies on Clifford-valued neural networks, we assume that the self feedback connection weights of the networks are Clifford numbers rather than real numbers. In order to study the existence of <inline-formula><tex-math id="M1">\begin{document}$ (\mu, \nu) $\end{document}</tex-math></inline-formula>-pseudo compact almost automorphic solutions of the networks, we prove a composition theorem of <inline-formula><tex-math id="M2">\begin{document}$ (\mu, \nu) $\end{document}</tex-math></inline-formula>-pseudo compact almost automorphic functions with varying deviating arguments. Based on this composition theorem and the fixed point theorem, we establish the existence and the uniqueness of <inline-formula><tex-math id="M3">\begin{document}$ (\mu, \nu) $\end{document}</tex-math></inline-formula>-pseudo compact almost automorphic solutions of the networks. Then, we investigate the global exponential stability of the solution by employing differential inequality techniques. Finally, we give an example to illustrate our theoretical finding. Our results obtained in this paper are completely new, even when the considered networks are degenerated into real-valued, complex-valued or quaternion-valued networks.</p>


2020 ◽  
Vol 33 (4) ◽  
pp. 1585-1658
Author(s):  
Ralf Küsters ◽  
Max Tuengerthal ◽  
Daniel Rausch

Abstract In frameworks for universal composability, complex protocols can be built from sub-protocols in a modular way using composition theorems. However, as first pointed out and studied by Canetti and Rabin, this modular approach often leads to impractical implementations. For example, when using a functionality for digital signatures within a more complex protocol, parties have to generate new verification and signing keys for every session of the protocol. This motivates to generalize composition theorems to so-called joint state (composition) theorems, where different copies of a functionality may share some state, e.g., the same verification and signing keys. In this paper, we present a joint state theorem which is more general than the original theorem of Canetti and Rabin, for which several problems and limitations are pointed out. We apply our theorem to obtain joint state realizations for three functionalities: public-key encryption, replayable public-key encryption, and digital signatures. Unlike most other formulations, our functionalities model that ciphertexts and signatures are computed locally, rather than being provided by the adversary. To obtain the joint state realizations, the functionalities have to be designed carefully. Other formulations proposed in the literature are shown to be unsuitable. Our work is based on the IITM model. Our definitions and results demonstrate the expressivity and simplicity of this model. For example, unlike Canetti’s UC model, in the IITM model no explicit joint state operator needs to be defined and the joint state theorem follows immediately from the composition theorem in the IITM model.


2019 ◽  
Vol 74 (1) ◽  
pp. 145-158
Author(s):  
Jaroslav Šupina ◽  
Dávid Uhrik

Abstract We discuss several questions about Borel measurable functions on a topological space. We show that two Lindenbaum composition theorems [Lindenbaum, A. Sur les superpositions des fonctions représentables analytiquement, Fund. Math. 23 (1934), 15–37] proved for the real line hold in perfectly normal topological space as well. As an application, we extend a characterization of a certain class of topological spaces with hereditary Jayne-Rogers property for perfectly normal topological space. Finally, we pose an interesting question about lower and upper Δ02-measurable functions.


2018 ◽  
Vol 68 (6) ◽  
pp. 1397-1420 ◽  
Author(s):  
Chao Wang ◽  
Ravi P. Agarwal ◽  
Donal O’Regan

Abstract In this paper, by using the concept of changing-periodic time scales and composition theorem of time scales introduced in 2015, we establish a local phase space for functional dynamic equations with infinite delay (FDEID) on an arbitrary time scale with a bounded graininess function μ. Through Krasnoseľskiĭ’s fixed point theorem, some sufficient conditions for the existence of local-periodic solutions for FDEID are established for the first time. This research indicates that one can extract a local-periodic solution for dynamic equations on an arbitrary time scale with a bounded graininess function μ through some index function.


Sign in / Sign up

Export Citation Format

Share Document