Algorithmic Game Theory Jerusalem, May 22Nd-26Th, 2011
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Going Beyond Dual Execution: MPC for Functions with Efficient Verification
Going Beyond Dual Execution: MPC for Functions with Efficient Verification Carmit Hazay abhi shelat ∗ Bar-Ilan University Northeastern Universityy Muthuramakrishnan Venkitasubramaniamz University of Rochester Abstract The dual execution paradigm of Mohassel and Franklin (PKC’06) and Huang, Katz and Evans (IEEE ’12) shows how to achieve the notion of 1-bit leakage security at roughly twice the cost of semi-honest security for the special case of two-party secure computation. To date, there are no multi-party compu- tation (MPC) protocols that offer such a strong trade-off between security and semi-honest performance. Our main result is to address this shortcoming by designing 1-bit leakage protocols for the multi- party setting, albeit for a special class of functions. We say that function f (x, y) is efficiently verifiable by g if the running time of g is always smaller than f and g(x, y, z) = 1 if and only if f (x, y) = z. In the two-party setting, we first improve dual execution by observing that the “second execution” can be an evaluation of g instead of f , and that by definition, the evaluation of g is asymptotically more efficient. Our main MPC result is to construct a 1-bit leakage protocol for such functions from any passive protocol for f that is secure up to additive errors and any active protocol for g. An important result by Genkin et al. (STOC ’14) shows how the classic protocols by Goldreich et al. (STOC ’87) and Ben-Or et al. (STOC ’88) naturally support this property, which allows to instantiate our compiler with two-party and multi-party protocols. -
ACM Honors Eminent Researchers for Technical Innovations That Have Improved How We Live and Work 2016 Recipients Made Contribu
Contact: Jim Ormond 212-626-0505 [email protected] ACM Honors Eminent Researchers for Technical Innovations That Have Improved How We Live and Work 2016 Recipients Made Contributions in Areas Including Big Data Analysis, Computer Vision, and Encryption NEW YORK, NY, May 3, 2017 – ACM, the Association for Computing Machinery (www.acm.org), today announced the recipients of four prestigious technical awards. These leaders were selected by their peers for making significant contributions that have had far-reaching impact on how we live and work. The awards reflect achievements in file sharing, broadcast encryption, information visualization and computer vision. The 2016 recipients will be formally honored at the ACM Awards Banquet on June 24 in San Francisco. The 2016 Award Recipients include: • Mahadev Satyanarayanan, Michael L. Kazar, Robert N. Sidebotham, David A. Nichols, Michael J. West, John H. Howard, Alfred Z. Spector and Sherri M. Nichols, recipients of the ACM Software System Award for developing the Andrew File System (AFS). AFS was the first distributed file system designed for tens of thousands of machines, and pioneered the use of scalable, secure and ubiquitous access to shared file data. To achieve the goal of providing a common shared file system used by large networks of people, AFS introduced novel approaches to caching, security, management and administration. AFS is still in use today as both an open source system and as the file system in commercial applications. It has also inspired several cloud-based storage applications. The 2016 Software System Award recipients designed and built the Andrew File System in the 1980s while working as a team at the Information Technology Center (ITC), a partnership between Carnegie Mellon University and IBM. -
Potential Games. Congestion Games. Price of Anarchy and Price of Stability
8803 Connections between Learning, Game Theory, and Optimization Maria-Florina Balcan Lecture 13: October 5, 2010 Reading: Algorithmic Game Theory book, Chapters 17, 18 and 19. Price of Anarchy and Price of Staility We assume a (finite) game with n players, where player i's set of possible strategies is Si. We let s = (s1; : : : ; sn) denote the (joint) vector of strategies selected by players in the space S = S1 × · · · × Sn of joint actions. The game assigns utilities ui : S ! R or costs ui : S ! R to any player i at any joint action s 2 S: any player maximizes his utility ui(s) or minimizes his cost ci(s). As we recall from the introductory lectures, any finite game has a mixed Nash equilibrium (NE), but a finite game may or may not have pure Nash equilibria. Today we focus on games with pure NE. Some NE are \better" than others, which we formalize via a social objective function f : S ! R. Two classic social objectives are: P sum social welfare f(s) = i ui(s) measures social welfare { we make sure that the av- erage satisfaction of the population is high maxmin social utility f(s) = mini ui(s) measures the satisfaction of the most unsatisfied player A social objective function quantifies the efficiency of each strategy profile. We can now measure how efficient a Nash equilibrium is in a specific game. Since a game may have many NE we have at least two natural measures, corresponding to the best and the worst NE. We first define the best possible solution in a game Definition 1. -
Compact E-Cash and Simulatable Vrfs Revisited
Compact E-Cash and Simulatable VRFs Revisited Mira Belenkiy1, Melissa Chase2, Markulf Kohlweiss3, and Anna Lysyanskaya4 1 Microsoft, [email protected] 2 Microsoft Research, [email protected] 3 KU Leuven, ESAT-COSIC / IBBT, [email protected] 4 Brown University, [email protected] Abstract. Efficient non-interactive zero-knowledge proofs are a powerful tool for solving many cryptographic problems. We apply the recent Groth-Sahai (GS) proof system for pairing product equations (Eurocrypt 2008) to two related cryptographic problems: compact e-cash (Eurocrypt 2005) and simulatable verifiable random functions (CRYPTO 2007). We present the first efficient compact e-cash scheme that does not rely on a ran- dom oracle. To this end we construct efficient GS proofs for signature possession, pseudo randomness and set membership. The GS proofs for pseudorandom functions give rise to a much cleaner and substantially faster construction of simulatable verifiable random functions (sVRF) under a weaker number theoretic assumption. We obtain the first efficient fully simulatable sVRF with a polynomial sized output domain (in the security parameter). 1 Introduction Since their invention [BFM88] non-interactive zero-knowledge proofs played an important role in ob- taining feasibility results for many interesting cryptographic primitives [BG90,GO92,Sah99], such as the first chosen ciphertext secure public key encryption scheme [BFM88,RS92,DDN91]. The inefficiency of these constructions often motivated independent practical instantiations that were arguably conceptually less elegant, but much more efficient ([CS98] for chosen ciphertext security). We revisit two important cryptographic results of pairing-based cryptography, compact e-cash [CHL05] and simulatable verifiable random functions [CL07], that have very elegant constructions based on non-interactive zero-knowledge proof systems, but less elegant practical instantiations. -
Curriculum Vitae
Curriculum Vitae Prof. Michal Feldman School of Computer Science, Tel-Aviv University Personal Details • Born: Israel, 1976 • Gender: Female • email: [email protected] Education • Ph.D.: Information Management and Systems, University of California at Berkeley, May 2005. Thesis title: Incentives for cooperation in peer-to-peer systems. • B.Sc.: Bar-Ilan University, Computer Science, Summa Cum Laude, June 1999. Academic Positions 2013 - present: Associate Professor, School of Computer Science, Tel-Aviv University, Israel. Associate Professor, School of Business Administration and Center for 2011 - 2013: the Study of Rationality, Hebrew University of Jerusalem, Israel. 2007 - 2011: Senior Lecturer, School of Business Administration and Center for the Study of Rationality, Hebrew University of Jerusalem, Israel. Additional Positions 2011 - 2013: Visiting Researcher (weekly visitor), Microsoft Research New England, Cambridge, MA, USA. 2011 - 2013: Visiting Professor, Harvard School of Engineering and Applied Sciences, Center for Research on Computation and Society, School of Computer Science, Cambridge, MA, USA (Marie Curie IOF program). 2008 - 2011: Senior Researcher (part-time), Microsoft Research in Herzliya, Israel. 2007 - 2013: Member, Center for the Study of Rationality, Hebrew University. 2005 - 2007: Post-Doctoral Fellow (Lady Davis fellowship), Hebrew University, School of Computer Science and Engineering. 2004: Ph.D. Intern, HP Labs, Palo Alto, California, USA. 1 Grants (Funding ID) • European Research Council (ERC) Starting Grant: \Algorithmic Mechanism Design - Beyond Truthfulness": 1.4 million Euro, 2013-2017. • FP7 Marie Curie International Outgoing Fellowship (IOF): \Innovations in Algorithmic Game Theory" (IAGT): 313,473 Euro, 2011-2014. • Israel Science Foundation (ISF) grant. \Equilibria Under Coalitional Covenants in Non-Cooperative Games - Existence, Quality and Computation:" 688,000 NIS (172,000 NIS /year), 2009-2013. -
Information Theory Methods in Communication Complexity
INFORMATION THEORY METHODS IN COMMUNICATION COMPLEXITY BY NIKOLAOS LEONARDOS A dissertation submitted to the Graduate School—New Brunswick Rutgers, The State University of New Jersey in partial fulfillment of the requirements for the degree of Doctor of Philosophy Graduate Program in Computer Science Written under the direction of Michael Saks and approved by New Brunswick, New Jersey JANUARY, 2012 ABSTRACT OF THE DISSERTATION Information theory methods in communication complexity by Nikolaos Leonardos Dissertation Director: Michael Saks This dissertation is concerned with the application of notions and methods from the field of information theory to the field of communication complexity. It con- sists of two main parts. In the first part of the dissertation, we prove lower bounds on the random- ized two-party communication complexity of functions that arise from read-once boolean formulae. A read-once boolean formula is a formula in propositional logic with the property that every variable appears exactly once. Such a formula can be represented by a tree, where the leaves correspond to variables, and the in- ternal nodes are labeled by binary connectives. Under certain assumptions, this representation is unique. Thus, one can define the depth of a formula as the depth of the tree that represents it. The complexity of the evaluation of general read-once formulae has attracted interest mainly in the decision tree model. In the communication complexity model many interesting results deal with specific read-once formulae, such as disjointness and tribes. In this dissertation we use information theory methods to prove lower bounds that hold for any read-once ii formula. -
The Next Digital Decade Essays on the Future of the Internet
THE NEXT DIGITAL DECADE ESSAYS ON THE FUTURE OF THE INTERNET Edited by Berin Szoka & Adam Marcus THE NEXT DIGITAL DECADE ESSAYS ON THE FUTURE OF THE INTERNET Edited by Berin Szoka & Adam Marcus NextDigitalDecade.com TechFreedom techfreedom.org Washington, D.C. This work was published by TechFreedom (TechFreedom.org), a non-profit public policy think tank based in Washington, D.C. TechFreedom’s mission is to unleash the progress of technology that improves the human condition and expands individual capacity to choose. We gratefully acknowledge the generous and unconditional support for this project provided by VeriSign, Inc. More information about this book is available at NextDigitalDecade.com ISBN 978-1-4357-6786-7 © 2010 by TechFreedom, Washington, D.C. This work is licensed under the Creative Commons Attribution- NonCommercial-ShareAlike 3.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by-nc-sa/3.0/ or send a letter to Creative Commons, 171 Second Street, Suite 300, San Francisco, California, 94105, USA. Cover Designed by Jeff Fielding. THE NEXT DIGITAL DECADE: ESSAYS ON THE FUTURE OF THE INTERNET 3 TABLE OF CONTENTS Foreword 7 Berin Szoka 25 Years After .COM: Ten Questions 9 Berin Szoka Contributors 29 Part I: The Big Picture & New Frameworks CHAPTER 1: The Internet’s Impact on Culture & Society: Good or Bad? 49 Why We Must Resist the Temptation of Web 2.0 51 Andrew Keen The Case for Internet Optimism, Part 1: Saving the Net from Its Detractors 57 Adam Thierer CHAPTER 2: Is the Generative -
Limitations and Possibilities of Algorithmic Mechanism Design By
Incentives, Computation, and Networks: Limitations and Possibilities of Algorithmic Mechanism Design by Yaron Singer A dissertation submitted in partial satisfaction of the requirements for the degree of Doctor of Philosophy in Computer Science in the Graduate Division of the University of California, Berkeley Committee in charge: Professor Christos Papadimitriou, Chair Professor Shachar Kariv Professor Scott Shenker Spring 2012 Incentives, Computation, and Networks: Limitations and Possibilities of Algorithmic Mechanism Design Copyright 2012 by Yaron Singer 1 Abstract Incentives, Computation, and Networks: Limitations and Possibilities of Algorithmic Mechanism Design by Yaron Singer Doctor of Philosophy in Computer Science University of California, Berkeley Professor Christos Papadimitriou, Chair In the past decade, a theory of manipulation-robust algorithms has been emerging to address the challenges that frequently occur in strategic environments such as the internet. The theory, known as algorithmic mechanism design, builds on the foundations of classical mechanism design from microeconomics and is based on the idea of incentive compatible pro- tocols. Such protocols achieve system-wide objectives through careful design that ensures it is in every agent's best interest to comply with the protocol. As it turns out, however, implementing incentive compatible protocols as advocated in classical mechanism design the- ory often necessitates solving intractable problems. To address this, algorithmic mechanism design focuses on designing -
Electronic Commerce (Algorithmic Game Theory) (Tentative Syllabus)
EECS 547: Electronic Commerce (Algorithmic Game Theory) (Tentative Syllabus) Lecture: Tuesday and Thursday 10:30am-Noon in 1690 BBB Section: Friday 3pm-4pm in EECS 3427 Email: [email protected] Instructor: Grant Schoenebeck Office Hours: Wednesday 3pm and by appointment; 3636 BBBB Graduate Student Instructor: Biaoshuai Tao Office Hours: 4-5pm Friday in Learning Center (between BBB and Dow in basement) Introduction: As the internet draws together strategic actors, it becomes increasingly important to understand how strategic agents interact with computational artifacts. Algorithmic game theory studies both how to models strategic agents (game theory) and how to design systems that take agent strategies into account (mechanism design). On-line auction sites (including search word auctions), cyber currencies, and crowd-sourcing are all obvious applications. However, even more exist such as designing non- monetary award systems (reputation systems, badges, leader-boards, Facebook “likes”), recommendation systems, and data-analysis when strategic agents are involved. In this particular course, we will especially focus on information elicitation mechanisms (crowd- sourcing). Description: Modeling and analysis for strategic decision environments, combining computational and economic perspectives. Essential elements of game theory, including solution concepts and equilibrium computation. Design of mechanisms for resource allocation and social choice, for example as motivated by problems in electronic commerce and social computing. Format: The two weeks will be background lectures. The next half of the class will be seminar style and will focus on crowd-sourcing, and especially information elicitation mechanisms. Each class period, the class will read a paper (or set of papers), and a pair of students will briefly present the papers and lead a class discussion. -
On SZK and PP
Electronic Colloquium on Computational Complexity, Revision 2 of Report No. 140 (2016) On SZK and PP Adam Bouland1, Lijie Chen2, Dhiraj Holden1, Justin Thaler3, and Prashant Nalini Vasudevan1 1CSAIL, Massachusetts Institute of Technology, Cambridge, MA USA 2IIIS, Tsinghua University, Beijing, China 3Georgetown University, Washington, DC USA Abstract In both query and communication complexity, we give separations between the class NISZK, con- taining those problems with non-interactive statistical zero knowledge proof systems, and the class UPP, containing those problems with randomized algorithms with unbounded error. These results significantly improve on earlier query separations of Vereschagin [Ver95] and Aaronson [Aar12] and earlier commu- nication complexity separations of Klauck [Kla11] and Razborov and Sherstov [RS10]. In addition, our results imply an oracle relative to which the class NISZK 6⊆ PP. This answers an open question of Wa- trous from 2002 [Aar]. The technical core of our result is a stronger hardness amplification theorem for approximate degree, which roughly says that composing the gapped-majority function with any function of high approximate degree yields a function with high threshold degree. Using our techniques, we also give oracles relative to which the following two separations hold: perfect zero knowledge (PZK) is not contained in its complement (coPZK), and SZK (indeed, even NISZK) is not contained in PZK (indeed, even HVPZK). Along the way, we show that HVPZK is contained in PP in a relativizing manner. We prove a number of implications of these results, which may be of independent interest outside of structural complexity. Specifically, our oracle separation implies that certain parameters of the Polariza- tion Lemma of Sahai and Vadhan [SV03] cannot be much improved in a black-box manner. -
László Lovász Avi Wigderson De L’Université Eötvös Loránd À De L’Institute for Advanced Study De Budapest, En Hongrie Et À Princeton, Aux États-Unis
2021 L’Académie des sciences et des lettres de Norvège a décidé de décerner le prix Abel 2021 à László Lovász Avi Wigderson de l’université Eötvös Loránd à de l’Institute for Advanced Study de Budapest, en Hongrie et à Princeton, aux États-Unis, « pour leurs contributions fondamentales à l’informatique théorique et aux mathématiques discrètes, et pour leur rôle de premier plan dans leur transformation en domaines centraux des mathématiques contemporaines ». L’informatique théorique est l’étude de la puissance croissante sur plusieurs autres sciences, ce et des limites du calcul. Elle trouve son origine qui permet de faire de nouvelles découvertes dans les travaux fondateurs de Kurt Gödel, Alonzo en « chaussant des lunettes d’informaticien ». Church, Alan Turing et John von Neumann, qui ont Les structures discrètes telles que les graphes, conduit au développement de véritables ordinateurs les chaînes de caractères et les permutations physiques. L’informatique théorique comprend deux sont au cœur de l’informatique théorique, et les sous-disciplines complémentaires : l’algorithmique mathématiques discrètes et l’informatique théorique qui développe des méthodes efficaces pour une ont naturellement été des domaines étroitement multitude de problèmes de calcul ; et la complexité, liés. Certes, ces deux domaines ont énormément qui montre les limites inhérentes à l’efficacité des bénéficié des champs de recherche plus traditionnels algorithmes. La notion d’algorithmes en temps des mathématiques, mais on constate également polynomial mise en avant dans les années 1960 par une influence croissante dans le sens inverse. Alan Cobham, Jack Edmonds et d’autres, ainsi que Les applications, concepts et techniques de la célèbre conjecture P≠NP de Stephen Cook, Leonid l’informatique théorique ont généré de nouveaux Levin et Richard Karp ont eu un fort impact sur le défis, ouvert de nouvelles directions de recherche domaine et sur les travaux de Lovász et Wigderson. -
The Flajolet-Martin Sketch Itself Preserves Differential Privacy: Private Counting with Minimal Space
The Flajolet-Martin Sketch Itself Preserves Differential Privacy: Private Counting with Minimal Space Adam Smith Shuang Song Abhradeep Thakurta Boston University Google Research, Brain Team Google Research, Brain Team [email protected] [email protected] [email protected] Abstract We revisit the problem of counting the number of distinct elements F0(D) in a data stream D, over a domain [u]. We propose an ("; δ)-differentially private algorithm that approximates F0(D) within a factor of (1 ± γ), and with additive error of p O( ln(1/δ)="), using space O(ln(ln(u)/γ)/γ2). We improve on the prior work at least quadratically and up to exponentially, in terms of both space and additive p error. Our additive error guarantee is optimal up to a factor of O( ln(1/δ)), n ln(u) 1 o and the space bound is optimal up to a factor of O min ln γ ; γ2 . We assume the existence of an ideal uniform random hash function, and ignore the space required to store it. We later relax this requirement by assuming pseudo- random functions and appealing to a computational variant of differential privacy, SIM-CDP. Our algorithm is built on top of the celebrated Flajolet-Martin (FM) sketch. We show that FM-sketch is differentially private as is, as long as there are p ≈ ln(1/δ)=(εγ) distinct elements in the data set. Along the way, we prove a structural result showing that the maximum of k i.i.d. random variables is statisti- cally close (in the sense of "-differential privacy) to the maximum of (k + 1) i.i.d.