New Constructions of Identity-Based and Key-Dependent Message Secure Encryption Schemes ?
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
The Multiplicative Weights Update Method: a Meta Algorithm and Applications
The Multiplicative Weights Update Method: a Meta Algorithm and Applications Sanjeev Arora∗ Elad Hazan Satyen Kale Abstract Algorithms in varied fields use the idea of maintaining a distribution over a certain set and use the multiplicative update rule to iteratively change these weights. Their analysis are usually very similar and rely on an exponential potential function. We present a simple meta algorithm that unifies these disparate algorithms and drives them as simple instantiations of the meta algo- rithm. 1 Introduction Algorithms in varied fields work as follows: a distribution is maintained on a certain set, and at each step the probability assigned to i is multi- plied or divided by (1 + C(i)) where C(i) is some kind of “payoff” for element i. (Rescaling may be needed to ensure that the new values form a distribution.) Some examples include: the Ada Boost algorithm in ma- chine learning [FS97]; algorithms for game playing studied in economics (see below), the Plotkin-Shmoys-Tardos algorithm for packing and covering LPs [PST91], and its improvements in the case of flow problems by Young, Garg-Konneman, and Fleischer [You95, GK98, Fle00]; Impagliazzo’s proof of the Yao XOR lemma [Imp95], etc. The analysis of the running time uses a potential function argument and the final running time is proportional to 1/2. It has been clear to most researchers that these results are very similar, see for instance, Khandekar’s PhD thesis [Kha04]. Here we point out that these are all instances of the same (more general) algorithm. This meta ∗This project supported by David and Lucile Packard Fellowship and NSF grant CCR- 0205594. -
January 2011 Prizes and Awards
January 2011 Prizes and Awards 4:25 P.M., Friday, January 7, 2011 PROGRAM SUMMARY OF AWARDS OPENING REMARKS FOR AMS George E. Andrews, President BÔCHER MEMORIAL PRIZE: ASAF NAOR, GUNTHER UHLMANN American Mathematical Society FRANK NELSON COLE PRIZE IN NUMBER THEORY: CHANDRASHEKHAR KHARE AND DEBORAH AND FRANKLIN TEPPER HAIMO AWARDS FOR DISTINGUISHED COLLEGE OR UNIVERSITY JEAN-PIERRE WINTENBERGER TEACHING OF MATHEMATICS LEVI L. CONANT PRIZE: DAVID VOGAN Mathematical Association of America JOSEPH L. DOOB PRIZE: PETER KRONHEIMER AND TOMASZ MROWKA EULER BOOK PRIZE LEONARD EISENBUD PRIZE FOR MATHEMATICS AND PHYSICS: HERBERT SPOHN Mathematical Association of America RUTH LYTTLE SATTER PRIZE IN MATHEMATICS: AMIE WILKINSON DAVID P. R OBBINS PRIZE LEROY P. S TEELE PRIZE FOR LIFETIME ACHIEVEMENT: JOHN WILLARD MILNOR Mathematical Association of America LEROY P. S TEELE PRIZE FOR MATHEMATICAL EXPOSITION: HENRYK IWANIEC BÔCHER MEMORIAL PRIZE LEROY P. S TEELE PRIZE FOR SEMINAL CONTRIBUTION TO RESEARCH: INGRID DAUBECHIES American Mathematical Society FOR AMS-MAA-SIAM LEVI L. CONANT PRIZE American Mathematical Society FRANK AND BRENNIE MORGAN PRIZE FOR OUTSTANDING RESEARCH IN MATHEMATICS BY AN UNDERGRADUATE STUDENT: MARIA MONKS LEONARD EISENBUD PRIZE FOR MATHEMATICS AND OR PHYSICS F AWM American Mathematical Society LOUISE HAY AWARD FOR CONTRIBUTIONS TO MATHEMATICS EDUCATION: PATRICIA CAMPBELL RUTH LYTTLE SATTER PRIZE IN MATHEMATICS M. GWENETH HUMPHREYS AWARD FOR MENTORSHIP OF UNDERGRADUATE WOMEN IN MATHEMATICS: American Mathematical Society RHONDA HUGHES ALICE T. S CHAFER PRIZE FOR EXCELLENCE IN MATHEMATICS BY AN UNDERGRADUATE WOMAN: LOUISE HAY AWARD FOR CONTRIBUTIONS TO MATHEMATICS EDUCATION SHERRY GONG Association for Women in Mathematics ALICE T. S CHAFER PRIZE FOR EXCELLENCE IN MATHEMATICS BY AN UNDERGRADUATE WOMAN FOR JPBM Association for Women in Mathematics COMMUNICATIONS AWARD: NICOLAS FALACCI AND CHERYL HEUTON M. -
Securely Obfuscating Re-Encryption
Securely Obfuscating Re-Encryption Susan Hohenberger¤ Guy N. Rothblumy abhi shelatz Vinod Vaikuntanathanx December 1, 2008 Abstract We present a positive obfuscation result for a traditional cryptographic functionality. This posi- tive result stands in contrast to well-known impossibility results [3] for general obfuscation and recent impossibility and improbability [13] results for obfuscation of many cryptographic functionalities. Whereas other positive obfuscation results in the standard model apply to very simple point func- tions, our obfuscation result applies to the signi¯cantly more complex and widely-used re-encryption functionality. This functionality takes a ciphertext for message m encrypted under Alice's public key and transforms it into a ciphertext for the same message m under Bob's public key. To overcome impossibility results and to make our results meaningful for cryptographic functionalities, our scheme satis¯es a de¯nition of obfuscation which incorporates more security-aware provisions. ¤Johns Hopkins University, [email protected]. Research partially performed at IBM Zurich Research Laboratory, Switzer- land. yMIT CSAIL, [email protected]. Research supported by NSF grant CNS-0430450 and NSF grant CFF-0635297. zUniversity of Virginia, [email protected]. Research performed at IBM Zurich Research Laboratory, Switzerland. xMIT CSAIL, [email protected] 1 1 Introduction A recent line of research in theoretical cryptography aims to understand whether it is possible to obfuscate programs so that a program's code becomes unintelligible while its functionality remains unchanged. A general method for obfuscating programs would lead to the solution of many open problems in cryptography. Unfortunately, Barak, Goldreich, Impagliazzo, Rudich, Sahai, Vadhan and Yang [3] show that for many notions of obfuscation, a general program obfuscator does not exist|i.e., they exhibit a class of circuits which cannot be obfuscated. -
The Gödel Prize 2020 - Call for Nominatonn
The Gödel Prize 2020 - Call for Nominatonn Deadline: February 15, 2020 The Gödel Prize for outntanding papern in the area of theoretial iomputer niienie in nponnored jointly by the European Annoiiaton for Theoretial Computer Siienie (EATCS) and the Annoiiaton for Computng Maihinery, Speiial Innterent Group on Algorithmn and Computaton Theory (AC M SInGACT) The award in prenented annually, with the prenentaton taaing plaie alternately at the Innternatonal Colloquium on Automata, Languagen, and Programming (InCALP) and the AC M Symponium on Theory of Computng (STOC) The 28th Gödel Prize will be awarded at the 47th Innternatonal Colloquium on Automata, Languagen, and Programming to be held during 8-12 July, 2020 in Beijing The Prize in named in honour of Kurt Gödel in reiogniton of hin major iontributonn to mathematial logii and of hin interent, diniovered in a leter he wrote to John von Neumann nhortly before von Neumann’n death, in what han beiome the famoun “P vernun NP” quenton The Prize iniluden an award of USD 5,000 Award Committee: The 2020 Award Commitee ionnintn of Samnon Abramnay (Univernity of Oxford), Anuj Dawar (Chair, Univernity of Cambridge), Joan Feigenbaum (Yale Univernity), Robert Krauthgamer (Weizmann Innnttute), Daniel Spielman (Yale Univernity) and David Zuiaerman (Univernity of Texan, Auntn) Eligibility: The 2020 Prize rulen are given below and they nupernede any diferent interpretaton of the generii rule to be found on webniten of both SInGACT and EATCS Any renearih paper or nerien of papern by a ningle author or by -
On Differentially Private Graph Sparsification and Applications
On Differentially Private Graph Sparsification and Applications Raman Arora Jalaj Upadhyay Johns Hopkins University Rutgers University [email protected] [email protected] Abstract In this paper, we study private sparsification of graphs. In particular, we give an algorithm that given an input graph, returns a sparse graph which approximates the spectrum of the input graph while ensuring differential privacy. This allows one to solve many graph problems privately yet efficiently and accurately. This is exemplified with application of the proposed meta-algorithm to graph algorithms for privately answering cut-queries, as well as practical algorithms for computing MAX-CUT and SPARSEST-CUT with better accuracy than previously known. We also give an efficient private algorithm to learn Laplacian eigenmap on a graph. 1 Introduction Data from social and communication networks have become a rich source to gain useful insights into the social, behavioral, and information sciences. Such data is naturally modeled as observations on a graph, and encodes rich, fine-grained, and structured information. At the same time, due to the seamless nature of data acquisition, often collected through personal devices, the individual information content in network data is often highly sensitive. This raises valid privacy concerns pertaining the analysis and release of such data. We address these concerns in this paper by presenting a novel algorithm that can be used to publish a succinct differentially private representation of network data with minimal degradation in accuracy for various graph related tasks. There are several notions of differential privacy one can consider in the setting described above. Depending on privacy requirements, one can consider edge level privacy that renders two graphs that differ in a single edge as in-distinguishable based on the algorithm’s output; this is the setting studied in many recent works [9, 19, 25, 54]. -
Obfuscating Compute-And-Compare Programs Under LWE
58th Annual IEEE Symposium on Foundations of Computer Science Obfuscating Compute-and-Compare Programs under LWE Daniel Wichs Giorgos Zirdelis Northeastern University Northeastern University [email protected] [email protected] Abstract—We show how to obfuscate a large and expres- that the obfuscated program can be simulated given black- sive class of programs, which we call compute-and-compare box access to the program’s functionality. Unfortunately, programs, under the learning-with-errors (LWE) assumption. they showed that general purpose VBB obfuscation is un- Each such program CC[f,y] is parametrized by an arbitrary polynomial-time computable function f along with a target achievable. This leaves open two possibilities: (1) achieving value y and we define CC[f,y](x) to output 1 if f(x)=y weaker security notions of obfuscation for general programs, and 0 otherwise. In other words, the program performs an and (2) achieving virtual black box obfuscation for restricted arbitrary computation f and then compares its output against classes of programs. y a target . Our obfuscator satisfies distributional virtual-black- Along the first direction, Barak et al. proposed a weaker box security, which guarantees that the obfuscated program does not reveal any partial information about the function f security notion called indistinguishability obfuscation (iO) or the target value y, as long as they are chosen from some which guarantees that the obfuscations of two functionally distribution where y has sufficient pseudo-entropy given f. equivalent programs are indistinguishable. In a breakthrough We also extend our result to multi-bit compute-and-compare result, Garg, Gentry, Halevi, Raykova, Sahai and Waters MBCC[f,y,z](x) z programs which output a message if [GGH+13b] showed how to iO-obfuscate all polynomial- f(x)=y. -
October 1983 Table of Contents
Fairfield Meeting (October 28-29)- Page 614 San Luis Obispo Meeting (November 11-12)-Page 622 Evanston Meeting (November 11-12)-Page 630 Notices of the American Mathematical Society October 1983, Issue 228 Volume 30, Number 6, Pages 569- 712 Providence, Rhode Island USA ISSN 0002-9920 Calendar of AMS Meetings THIS CALENDAR lists all meetings which have been approved by the Council prior to the date this issue of the Notices was sent to press. The summer and annual meetings are joint meetings of the Mathematical Association of America and the Ameri· can Mathematical Society. The meeting dates which fall rather far in the future are subject to change; this is particularly true of meetings to which no numbers have yet been assigned. Programs of the meetings will appear in the issues indicated below. First and second announcements of the meetings will have appeared in earlier issues. ABSTRACTS OF PAPERS presented at a meeting of the Society are published in the journal Abstracts of papers presented to the American Mathematical Society in the issue corresponding to that of the Notices which contains the program of the meet· ing. Abstracts should be submitted on special forms which are available in many departments of mathematics and from the office of the Society in Providence. Abstracts of papers to be presented at the meeting must be received at the headquarters of the Society in Providence, Rhode Island, on or before the deadline given below for the meeting. Note that the deadline for ab· stracts submitted for consideration for presentation at special sessions is usually three weeks earlier than that specified below. -
Proof Verification and Hardness of Approximation Problems
Proof Verification and Hardness of Approximation Problems Sanjeev Arora∗ Carsten Lundy Rajeev Motwaniz Madhu Sudanx Mario Szegedy{ Abstract that finding a solution within any constant factor of optimal is also NP-hard. Garey and Johnson The class PCP(f(n); g(n)) consists of all languages [GJ76] studied MAX-CLIQUE: the problem of find- L for which there exists a polynomial-time probabilistic ing the largest clique in a graph. They showed oracle machine that uses O(f(n)) random bits, queries that if a polynomial time algorithm computes MAX- O(g(n)) bits of its oracle and behaves as follows: If CLIQUE within a constant multiplicative factor then x 2 L then there exists an oracle y such that the ma- MAX-CLIQUE has a polynomial-time approximation chine accepts for all random choices but if x 62 L then scheme (PTAS) [GJ78], i.e., for any c > 1 there ex- for every oracle y the machine rejects with high proba- ists a polynomial-time algorithm that approximates bility. Arora and Safra very recently characterized NP MAX-CLIQUE within a factor of c. They used graph as PCP(log n; (log log n)O(1)). We improve on their products to construct \gap increasing reductions" that result by showing that NP = PCP(log n; 1). Our re- mapped an instance of the clique problem into an- sult has the following consequences: other instance in order to enlarge the relative gap of 1. MAXSNP-hard problems (e.g., metric TSP, the clique sizes. Berman and Schnitger [BS92] used MAX-SAT, MAX-CUT) do not have polynomial the ideas of increasing gaps to show that if the clique time approximation schemes unless P=NP. -
Exploring Differential Obliviousness∗
Exploring Differential Obliviousness∗ Amos Beimely Kobbi Nissimz Mohammad Zaherix October 4, 2019 Abstract In a recent paper, Chan et al. [SODA ’19] proposed a relaxation of the notion of (full) memory obliv- iousness, which was introduced by Goldreich and Ostrovsky [J. ACM ’96] and extensively researched by cryptographers. The new notion, differential obliviousness, requires that any two neighboring inputs exhibit similar memory access patterns, where the similarity requirement is that of differential privacy. Chan et al. demonstrated that differential obliviousness allows achieving improved efficiency for several algorithmic tasks, including sorting, merging of sorted lists, and range query data structures. In this work, we continue the exploration of differential obliviousness, focusing on algorithms that do not necessarily examine all their input. This choice is motivated by the fact that the existence of loga- rithmic overhead ORAM protocols implies that differential obliviousness can yield at most a logarithmic improvement in efficiency for computations that need to examine all their input. In particular, we explore property testing, where we show that differential obliviousness yields an almost linear improvement in overhead in the dense graph model, and at most quadratic improvement in the bounded degree model. We also explore tasks where a non-oblivious algorithm would need to explore different portions of the input, where the latter would depend on the input itself, and where we show that such a behavior can be maintained under differential obliviousness, but not under full obliviousness. Our examples suggest that there would be benefits in further exploring which class of computational tasks are amenable to differential obliviousness. arXiv:1905.01373v2 [cs.CR] 2 Oct 2019 ∗Work supported by NSF grant No. -
The Gödel Prize 2019 - Call for Nominations Deadline: February 15, 2019
The Gödel Prize 2019 - Call for Nominations Deadline: February 15, 2019 The Gödel Prize for outstanding papers in the area of theoretical computer science is sponsored jointly by the European Association for Theoretical Computer Science (EATCS) and the Association for Computing Machinery, Special Interest Group on Algorithms and Computation Theory (ACM SIGACT). The award is presented annually, with the presentation taking place alternately at the International Colloquium on Automata, Languages, and Programming (ICALP) and the ACM Symposium on Theory of Computing (STOC). The 27th Gödel Prize will be awarded at 51st Annual ACM Symposium on the Theory of Computing to be held during June 23-26, 2019 in Phoenix, AZ. The Prize is named in honor of Kurt Gödel in recognition of his major contributions to mathematical logic and of his interest, discovered in a letter he wrote to John von Neumann shortly before von Neumann’s death, in what has become the famous “P versus NP” question. The Prize includes an award of USD 5,000. Award Committee: The 2019 Award Committee consists of Anuj Dawar (Cambridge University), Robert Krauthgamer (Weizmann Institute), Joan Feigenbaum (Yale University), Giuseppe Persiano (Università di Salerno), Omer Reingold (Chair, Stanford University) and Daniel Spielman (Yale University). Eligibility: The 2019 Prize rules are given below and they supersede any different interpretation of the generic rule to be found on websites of both SIGACT and EATCS. Any research paper or series of papers by a single author or by a team of authors is deemed eligible if: - The main results were not published (in either preliminary or final form) in a journal or conference proceedings before January 1st, 2006. -
Martin Dyer, Mark Jerrum, Marek Karpinski (Editors): Design And
Martin Dyer, Mark Jerrum, Marek Karpinski (editors): Design and Analysis of Randomized and Approximation Algorithms Dagstuhl-Seminar-Report; 309 03.06. - 08.06.2001 (01231) 1 OVERVIEW The Workshop was concerned with the newest development in the design and analysis of randomized and approximation algorithms. The main focus of the workshop was on two specific topics: ap- proximation algorithms for optimization problems, and approximation algorithms for measurement problems, and the various interactions between them. Here, new important paradigms have been discovered recently connecting probabilistic proof verification theory to the theory of approximate computation. Also, some new broadly applicable techniques have emerged recently for designing efficient approximation algorithms for a number of computationally hard optimization and measure- ment problems. This workshop has addressed the above topics and also fundamental insights into the new paradigms and design techniques. The workshop was organized jointly with the RAND- APX meeting on approximation algorithms and intractability and was partially supported by the IST grant 14036 (RAND-APX). The 47 participants of the workshop came from ten countries, thirteen of them came from North America. The 33 lectures delivered at this workshop covered a wide body of research in the above areas. The Program of the meeting and Abstracts of all talks are listed in the subsequent sections of this report. The meeting was hold in a very informal and stimulating atmosphere. Thanks to everybody who contributed to the success of this meeting and made it a very enjoyable event! Martin Dyer Mark Jerrum Marek Karpinski Acknowlegement. We thank Annette Beyer, Christine Marikar, and Angelika Mueller for their continuous support and help in organizing this workshop. -
Quantum Proof Systems for Iterated Exponential Time, and Beyond∗
Quantum Proof Systems for Iterated Exponential Time, and Beyond∗ Joseph Fitzsimons Zhengfeng Ji Horizon Quantum Computing University of Technology Sydney Singapore Australia Thomas Vidick Henry Yuen California Institute of Technology University of Toronto USA Canada ABSTRACT ACM Reference Format: We show that any language solvable in nondeterministic time Joseph Fitzsimons, Zhengfeng Ji, Thomas Vidick, and Henry Yuen. 2019. Quantum Proof Systems for Iterated Exponential Time, and Beyond. In exp¹exp¹· · · exp¹nººº, where the number of iterated exponentials Proceedings of the 51st Annual ACM SIGACT Symposium on the Theory of R¹nº is an arbitrary function , can be decided by a multiprover inter- Computing (STOC ’19), June 23–26, 2019, Phoenix, AZ, USA. ACM, New York, active proof system with a classical polynomial-time verifier and a NY, USA,8 pages. https://doi.org/10.1145/3313276.3316343 constant number of quantum entangled provers, with completeness 1 and soundness 1 − exp(−C exp¹· · · exp¹nººº, where the number of 1 INTRODUCTION iterated exponentials is R¹nº − 1 and C > 0 is a universal constant. The result was previously known for R = 1 and R = 2; we obtain it The combined study of interactive proof systems and quantum for any time-constructible function R. entanglement has led to multiple discoveries at the intersection The result is based on a compression technique for interactive of theoretical computer science and quantum physics. On the one proof systems with entangled provers that significantly simplifies hand, the study has revealed that quantum entanglement, a fun- and strengthens a protocol compression result of Ji (STOC’17).