Atom: Horizontally Scaling Strong Anonymity
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
On the Randomness Complexity of Interactive Proofs and Statistical Zero-Knowledge Proofs*
On the Randomness Complexity of Interactive Proofs and Statistical Zero-Knowledge Proofs* Benny Applebaum† Eyal Golombek* Abstract We study the randomness complexity of interactive proofs and zero-knowledge proofs. In particular, we ask whether it is possible to reduce the randomness complexity, R, of the verifier to be comparable with the number of bits, CV , that the verifier sends during the interaction. We show that such randomness sparsification is possible in several settings. Specifically, unconditional sparsification can be obtained in the non-uniform setting (where the verifier is modelled as a circuit), and in the uniform setting where the parties have access to a (reusable) common-random-string (CRS). We further show that constant-round uniform protocols can be sparsified without a CRS under a plausible worst-case complexity-theoretic assumption that was used previously in the context of derandomization. All the above sparsification results preserve statistical-zero knowledge provided that this property holds against a cheating verifier. We further show that randomness sparsification can be applied to honest-verifier statistical zero-knowledge (HVSZK) proofs at the expense of increasing the communica- tion from the prover by R−F bits, or, in the case of honest-verifier perfect zero-knowledge (HVPZK) by slowing down the simulation by a factor of 2R−F . Here F is a new measure of accessible bit complexity of an HVZK proof system that ranges from 0 to R, where a maximal grade of R is achieved when zero- knowledge holds against a “semi-malicious” verifier that maliciously selects its random tape and then plays honestly. -
The Versatility of Microblogging
www.spireresearch.com Side Click: The versatility of microblogging Microblogging is well-established globally as a way of keeping in touch with others about events occurring in their lives in real-time. Popular microblogging sites include Twitter in the U.S., Tencent QQ in China and Me2day in South Korea. Twitter has 140 million active users1, while China’s Tencent QQ has a staggering 721 million active user accounts2, ranking only behind Facebook in terms of being the most used social networking service worldwide. Microblogging allows users to combine blogging and instant messaging to post short messages on their profiles3; including small and conversational talk, self-promotion, spam and news 4 . On a deeper level, microblogging has altered the way people consume and generate information – not only democratizing the broadcasting of information but also enabling it to be done in real-time. Connecting to stakeholders There are several benefits to integrating microblogging into a business’s regular stakeholder communication regime. Consumers who “follow” a company’s products or services would be the first to know of any promotions. The company also benefits through obtaining prompt feedback and suggestions for improvement. A concerned investor 1 Twitter turns six, Twitter Blog, 21 March 21 2012 2 QQ Continues to Dominate Instant Messaging in China, eMarketer Inc., 27 April 2012 3 An Insight Into Microblogging Trends And Toolbars, ArticlesXpert,21 January 2012 4 Twitter Study – August 2009, PearAnalytics.com, August 2009 © 2012 Spire Research and Consulting Pte Ltd would want to be the first to know of any important news which might impact her returns. -
Oacerts: Oblivious Attribute Certificates
OACerts: Oblivious Attribute Certificates Jiangtao Li and Ninghui Li CERIAS and Department of Computer Science, Purdue University 250 N. University Street, West Lafayette, IN 47907 {jtli,ninghui}@cs.purdue.edu Abstract. We propose Oblivious Attribute Certificates (OACerts), an attribute certificate scheme in which a certificate holder can select which attributes to use and how to use them. In particular, a user can use attribute values stored in an OACert obliviously, i.e., the user obtains a service if and only if the attribute values satisfy the policy of the service provider, yet the service provider learns nothing about these attribute values. This way, the service provider’s access con- trol policy is enforced in an oblivious fashion. To enable the oblivious access control using OACerts, we propose a new cryp- tographic primitive called Oblivious Commitment-Based Envelope (OCBE). In an OCBE scheme, Bob has an attribute value committed to Alice and Alice runs a protocol with Bob to send an envelope (encrypted message) to Bob such that: (1) Bob can open the envelope if and only if his committed attribute value sat- isfies a predicate chosen by Alice, (2) Alice learns nothing about Bob’s attribute value. We develop provably secure and efficient OCBE protocols for the Pedersen commitment scheme and predicates such as =, ≥, ≤, >, <, 6= as well as logical combinations of them. 1 Introduction In Trust Management and certificate-based access control Systems [3, 40, 19, 11, 34, 33], access control decisions are based on attributes of requesters, which are estab- lished by digitally signed certificates. Each certificate associates a public key with the key holder’s identity and/or attributes such as employer, group membership, credit card information, birth-date, citizenship, and so on. -
How Generation Y Talks About Sustainability on Tumblr Yeu Olivia
Yeu Olivia Han Microblogging the Environment Spring 2013 Microblogging the Environment: How Generation Y Talks About Sustainability on Tumblr Yeu Olivia Han ABSTRACT Environmental discourses represent how people understand complex environmental issues and create material consequences in policy, human behavior, and society. On microblogs, users exchange small amounts of content such as short sentences, individual images, or video links. Little research exists on the relationship between environmental discourse and microblogs, so I ask why environmental discourse takes the forms it does on the microblog Tumblr, by examining discursive content, form, and context. I coded 102 blog posts, conducted 3 interviews with bloggers, and performed discourse analysis on 8 posts. I identified environmental problem solving, which privileges human agency and seeks solutions within current political economic systems, as the most common form of environmental discourse on Tumblr. I found that Tumblr microblogs used little technical language, had many “shares” and “likes,” and communicated in a subjective tone. These features make environmental discourse accessible to a wide audience, allowing for broad diffusion of environmental information and encouraging collaboration. In the neoliberal context we lack the correct frames for understanding environmental issues. Instead of arguing about whether the science is right or wrong, policy makers should determine what to do about these issues and when to act. Though Tumblr is a part of and reflects aspects of neoliberalism, -
Microblogging Tool That Allows Users to Post Brief, 140-Character Messages -- Called "Tweets" -- and Follow Other Users' Activities
MICRO-BLOGGING AND PERFORMANCE APPS AND SITES Instagram lets users snap, edit, and share photos and 15-second videos, either publicly or with a private network of followers. It unites the most popular features of social media sites: sharing, seeing, and commenting on photos. It also lets you apply fun filters and effects to your photos, making them look high-quality and artistic. What parents need to know • Teens are on the lookout for "likes." Similar to the way they use Facebook, teens may measure the "success" of their photos -- even their self-worth -- by the number of likes or comments they receive. Posting a photo or video can be problematic if teens are posting to validate their popularity. • Public photos are the default. Photos and videos shared on Instagram are public unless privacy settings are adjusted. Hashtags and location information can make photos even more visible to communities beyond a teen's followers if his or her account is public. • Private messaging is now an option. Instagram Direct allows users to send "private messages" to up to 15 mutual friends. These pictures don't show up on their public feeds. Although there's nothing wrong with group chats, kids may be more likely to share inappropriate stuff with their inner circles. Tumblr is like a cross between a blog and Twitter: It's a streaming scrapbook of text, photos, and/or videos and audio clips. Users create and follow short blogs, or "tumblogs," that can be seen by anyone online (if made public). Many teens have tumblogs for personal use: sharing photos, videos, musings, and things they find funny with their friends. -
Simple Doubly-Efficient Interactive Proof Systems for Locally
Electronic Colloquium on Computational Complexity, Revision 3 of Report No. 18 (2017) Simple doubly-efficient interactive proof systems for locally-characterizable sets Oded Goldreich∗ Guy N. Rothblumy September 8, 2017 Abstract A proof system is called doubly-efficient if the prescribed prover strategy can be implemented in polynomial-time and the verifier’s strategy can be implemented in almost-linear-time. We present direct constructions of doubly-efficient interactive proof systems for problems in P that are believed to have relatively high complexity. Specifically, such constructions are presented for t-CLIQUE and t-SUM. In addition, we present a generic construction of such proof systems for a natural class that contains both problems and is in NC (and also in SC). The proof systems presented by us are significantly simpler than the proof systems presented by Goldwasser, Kalai and Rothblum (JACM, 2015), let alone those presented by Reingold, Roth- blum, and Rothblum (STOC, 2016), and can be implemented using a smaller number of rounds. Contents 1 Introduction 1 1.1 The current work . 1 1.2 Relation to prior work . 3 1.3 Organization and conventions . 4 2 Preliminaries: The sum-check protocol 5 3 The case of t-CLIQUE 5 4 The general result 7 4.1 A natural class: locally-characterizable sets . 7 4.2 Proof of Theorem 1 . 8 4.3 Generalization: round versus computation trade-off . 9 4.4 Extension to a wider class . 10 5 The case of t-SUM 13 References 15 Appendix: An MA proof system for locally-chracterizable sets 18 ∗Department of Computer Science, Weizmann Institute of Science, Rehovot, Israel. -
Automatic Hashtag Recommendation for Microblogs Using Topic-Specific
Automatic Hashtag Recommendation for Microblogs using Topic-specific Translation Model Zhuoye Ding Qi Zhang XuanJing Huang School of Computer Science, Fudan University, 825 Zhangheng Road, Shanghai, P.R.China {09110240024,qi_zhang,xjhuang}@fudan.edu.cn ABSTRACT Microblogging services continue to grow in popularity, users publish massive instant messages every day through them. Many tweets are marked with hashtags, which usually represent groups or topics of tweets. Hashtags may provide valuable information for lots of applications, such as retrieval, opinion mining, classification, and so on. However, since hashtags should be manually annotated, only 14.6% tweets contain them (Wang et al., 2011). In this paper, we adopt topic-specific translation model(TSTM) to suggest hashtags for microblogs. It combines the advantages of both topic model and translation model. Experimental result on dataset crawled from real world microblogging service demonstrates that the proposed method can outperform some state-of-the-art methods. TITLEAND ABSTRACTIN CHINESE 基基基于于于特特特定定定话话话题题题下下下翻翻翻译译译模模模型型型的的的微微微博博博标标标签签签推推推荐荐荐 微博服务变得越来越流行,用户可以通过微博提交大量的及时信息。很多条微博被用户通 过标签标记,这些标签代表了微博的话题类别。标签可以为很多应用提供有价值的信息, 比如检索,情感分析,分类等等。微博的标签本应该由用户自行标记,然而,根据统计只 有14.6%的微博包含标签。在这篇论文中,我们提出了一种基于特定话题的翻译模型,来 为每条微博自动推荐标签。此模型综合了话题模型和翻译模型的优点。在基于真实微博语 料的实验中,我们提出的方法超过了很多经典的方法。 KEYWORDS: Microblogs, Tag recommendation, Topic model. KEYWORDSIN CHINESE: 微博,标签推荐,话题模型. Proceedings of COLING 2012: Posters, pages 265–274, COLING 2012, Mumbai, December 2012. 265 1 Introduction Hashtags, which are usually -
Constructing and Performing an On-Air Radio Identity in a Changing Media Landscape
CONSTRUCTING AND PERFORMING AN ON-AIR RADIO IDENTITY IN A CHANGING MEDIA LANDSCAPE A Dissertation Submitted to the Temple University Graduate Board In Partial Fulfillment of the Requirements for the Degree DOCTOR OF PHILOSOPHY by David F. Crider January 2014 Examining Committee Members: Dr. Nancy Morris, Advisory Chair, Department of Media Studies and Production Dr. Patrick Murphy, Department of Media Studies and Production Dr. Donnalyn Pompper, Department of Strategic Communication Dr. Catherine Hastings, External Member, Susquehanna University ii © Copyright 2014 by David F. Crider All Rights Reserved iii ABSTRACT The radio industry is fighting to stay relevant in an age of expanding media options. Scholarship has slackened, and media experts say that radio’s best days are in the past. This dissertation investigates how today’s radio announcer presents him/herself on the air as a personality, creating and performing a self that is meant for mass consumption by a listening audience. A participant observation of eleven different broadcast sites was conducted, backed by interviews with most key on-air personnel at each site. A grounded theory approach was used for data analysis. The resulting theoretical model focuses on the performance itself as the focal point that determines a successful (positive) interaction for personality and listener. Associated processes include narrative formation of the on- air personality, communication that takes place outside of the performance, effects of setting and situation, the role of the listening audience, and the reduction of social distance between personality and listener. The model demonstrates that a personality performed with the intent of being realistic and relatable will be more likely to cement a connection with the listener that leads to repeated listening and ultimately loyalty and fidelity to that personality. -
A Zero Knowledge Sumcheck and Its Applications
A Zero Knowledge Sumcheck and its Applications Alessandro Chiesa Michael A. Forbes Nicholas Spooner [email protected] [email protected] [email protected] UC Berkeley Simons Institute for the Theory of Computing University of Toronto and UC Berkeley April 6, 2017 Abstract Many seminal results in Interactive Proofs (IPs) use algebraic techniques based on low-degree polynomials, the study of which is pervasive in theoretical computer science. Unfortunately, known methods for endowing such proofs with zero knowledge guarantees do not retain this rich algebraic structure. In this work, we develop algebraic techniques for obtaining zero knowledge variants of proof protocols in a way that leverages and preserves their algebraic structure. Our constructions achieve unconditional (perfect) zero knowledge in the Interactive Probabilistically Checkable Proof (IPCP) model of Kalai and Raz [KR08] (the prover first sends a PCP oracle, then the prover and verifier engage in an Interactive Proof in which the verifier may query the PCP). Our main result is a zero knowledge variant of the sumcheck protocol [LFKN92] in the IPCP model. The sumcheck protocol is a key building block in many IPs, including the protocol for polynomial-space computation due to Shamir [Sha92], and the protocol for parallel computation due to Goldwasser, Kalai, and Rothblum [GKR15]. A core component of our result is an algebraic commitment scheme, whose hiding property is guaranteed by algebraic query complexity lower bounds [AW09; JKRS09]. This commitment scheme can then be used to considerably strengthen our previous work [BCFGRS16] that gives a sumcheck protocol with much weaker zero knowledge guarantees, itself using algebraic techniques based on algorithms for polynomial identity testing [RS05; BW04]. -
Arxiv:1403.5206V2 [Cs.SI] 30 Jul 2014
What is Tumblr: A Statistical Overview and Comparison Yi Chang‡, Lei Tang§, Yoshiyuki Inagaki† and Yan Liu‡ † Yahoo Labs, Sunnyvale, CA 94089, USA § @WalmartLabs, San Bruno, CA 94066, USA ‡ University of Southern California, Los Angeles, CA 90089 [email protected],[email protected], [email protected],[email protected] Abstract Traditional blogging sites, such as Blogspot6 and Living- Social7, have high quality content but little social interac- Tumblr, as one of the most popular microblogging platforms, tions. Nardi et al. (Nardi et al. 2004) investigated blogging has gained momentum recently. It is reported to have 166.4 as a form of personal communication and expression, and millions of users and 73.4 billions of posts by January 2014. showed that the vast majority of blog posts are written by While many articles about Tumblr have been published in ordinarypeople with a small audience. On the contrary, pop- major press, there is not much scholar work so far. In this pa- 8 per, we provide some pioneer analysis on Tumblr from a va- ular social networking sites like Facebook , have richer so- riety of aspects. We study the social network structure among cial interactions, but lower quality content comparing with Tumblr users, analyze its user generated content, and describe blogosphere. Since most social interactions are either un- reblogging patterns to analyze its user behavior. We aim to published or less meaningful for the majority of public audi- provide a comprehensive statistical overview of Tumblr and ence, it is natural for Facebook users to form different com- compare it with other popular social services, including blo- munities or social circles. -
Zero Knowledge and Soundness Are Symmetric∗
Zero Knowledge and Soundness are Symmetric∗ Shien Jin Ong Salil Vadhan Division of Engineering and Applied Sciences Harvard University Cambridge, Massachusetts, USA. E-mail: {shienjin,salil}@eecs.harvard.edu November 14, 2006 Abstract We give a complexity-theoretic characterization of the class of problems in NP having zero- knowledge argument systems that is symmetric in its treatment of the zero knowledge and the soundness conditions. From this, we deduce that the class of problems in NP ∩ coNP having zero-knowledge arguments is closed under complement. Furthermore, we show that a problem in NP has a statistical zero-knowledge argument system if and only if its complement has a computational zero-knowledge proof system. What is novel about these results is that they are unconditional, i.e. do not rely on unproven complexity assumptions such as the existence of one-way functions. Our characterization of zero-knowledge arguments also enables us to prove a variety of other unconditional results about the class of problems in NP having zero-knowledge arguments, such as equivalences between honest-verifier and malicious-verifier zero knowledge, private coins and public coins, inefficient provers and efficient provers, and non-black-box simulation and black-box simulation. Previously, such results were only known unconditionally for zero-knowledge proof systems, or under the assumption that one-way functions exist for zero-knowledge argument systems. Keywords: zero-knowledge argument systems, statistical zero knowledge, complexity classes, clo- sure under complement, distributional one-way functions. ∗Both the authors were supported by NSF grant CNS-0430336 and ONR grant N00014-04-1-0478. -
Personalized Hashtag Suggestion for Microblogs
Personalized Hashtag Suggestion for Microblogs Juan Xu, Qi Zhang, Xuanjing Huang School of Computer Science, Shanghai Key Laboratory of Intelligent Information Processing, Fudan University f13916430285, qz, [email protected] Abstract. In microblogging services, users can generate hashtags to categorize their tweets. However, a majority of microblogs do not contain hashtags, which has intrigued active research on the problem of automatic hashtag recommenda- tion for microblogs. Previous work conducted on this problem mostly does not take the user’s preference into consideration. In this paper, we propose a novel personalized hashtag recommendation method for microblogs based on a proba- bilistic generative model which exploits users’ perspectives on microblog posts for hashtag generation. Our experiments on a real microblogs dataset show that the proposed method outperforms state-of-the-art methods. We also show some case studies that demonstrate the advantages of considering both the content and user’s personal preferences for hashtag suggestion. 1 Introduction Microblogging services overload us with information, bombarding us with thousands of tweets, blog posts, and status updates every day. For example, Twitter, one of the most popular microblogging tools, has grown rapidly, with an estimated 200 million users generating 400 million tweets per day recently1. To cope with the volume of infor- mation shared daily, hashtags ¡akeywords prefaced with “#” in microblogging services ¡ahave been introduced to help users categorize and search for tweets. Past empirical research shows that hashtags can be useful in many applications, including sentiment analysis [1, 2], breaking event discoveries [3], query expansion [4], etc. In the spectrum of industry, Google started supporting Google+ hashtags in search queries on Sep 25, 20132.