1,380 Hits in 5.1 sec

PRIME: A few primitives can boost robustness to common corruptions [article]

Apostolos Modas, Rahul Rade, Guillermo Ortiz-Jiménez, Seyed-Mohsen Moosavi-Dezfooli, Pascal Frossard
2022 arXiv   pre-print
In this work, we take a step back and follow a principled approach to achieve robustness to common corruptions.  ...  PRIME outperforms the prior art in terms of corruption robustness, while its simplicity and plug-and-play nature enable combination with other methods to further boost their robustness.  ...  This work has been partially supported by the CHIST-ERA program under Swiss NSF Grant 20CH21 180444, and partially by Google via a Postdoctoral Fellowship and a GCP Research Credit Award.  ... 
arXiv:2112.13547v2 fatcat:hommnaqv6fdj3odve76t7vhpsy

Breaking the O(√(n))-Bit Barrier: Byzantine Agreement with Polylog Bits Per Party [article]

Elette Boyle and Ran Cohen and Aarushi Goel
2021 arXiv   pre-print
Byzantine agreement (BA), the task of n parties to agree on one of their input bits in the face of malicious agents, is a powerful primitive that lies at the core of a vast range of distributed protocols  ...  to full agreement, and does so in a single round.  ...  The setup and corruption phase is identical to that in the robustness game.  ... 
arXiv:2002.02516v4 fatcat:7l5ulreb7bbbjmu4vk2ll4l45m

HoneyBadgerMPC and AsynchroMix: Practical AsynchronousMPC and its Application to Anonymous Communication [article]

Donghang Lu, Thomas Yurek, Samarth Kulshreshtha, Rahul Govind, Rahul Mahadev, Aniket Kate, Andrew K. Miller
2019 IACR Cryptology ePrint Archive  
Even a single malicious server can cause the protocol to abort while seeing the output for itself, which in the context of an anonymous communication service would create a vulnerability to censorship  ...  To remedy this we propose a new MPC implementation, HoneyBadgerMPC, that combines a robust online phase with an optimistic offline phase that is efficient enough to run continuously alongside the online  ...  Asynchronous Reliable Broadcast and Common Subset We employ an asynchronous reliable broadcast primitive in order to receive client inputs.  ... 
dblp:journals/iacr/LuYKGMKM19 fatcat:fkrpynqjpzdpxjum2koipsg2sm

Diogenes: Lightweight Scalable RSA Modulus Generation with a Dishonest Majority [article]

Megan Chen, Carmit Hazay, Yuval Ishai, Yuriy Kashnikov, Daniele Micciancio, Tarik Riviere, Abhi Shelat, Muthuramakrishnan Venkitasubramaniam, Ruihan Wang
2020 IACR Cryptology ePrint Archive  
Our protocol satisfies a stronger security guarantee where a deviating party can be identified when the protocol aborts (referred to as security with identifiable-abort) and allows for "public verifiability  ...  In a nutshell, we design the "best" protocol for this scale that is secure against passive corruption, then amplify it to obtain active security using efficient non-interactive zero-knowledge arguments  ...  Upgrading to active security. Our actively secure protocol follows the above blueprint with a few key differences.  ... 
dblp:journals/iacr/ChenHIKMRSVW20 fatcat:qxjagzuppvhcrmti3jhb3weuiq

Pride and prejudice: Comparative corruption research and the British case

Sappho Xenakis
2010 Crime, law and social change  
These limitations serve to reinforce expectations that corruption is a menace to be associated primarily with societies of the global periphery.  ...  comparative and domestic-focused levels of analysis. a particular course of typological comparative research that seeks to explain why  ...  Particular thanks for extended feedback are due also to Leonidas Cheliotis, Kimberly Hutchings, Uli Sedelmeier, John Sidel, and Andrew Walter.  ... 
doi:10.1007/s10611-010-9243-8 fatcat:nvs4refcgrfkbdbjjd2q5bxlaa

Semi-supervised intelligent surveillance system for secure environments

C. Fookes, S. Denman, R. Lakemond, D. Ryan, S. Sridharan, M. Piccardi
2010 2010 IEEE International Symposium on Industrial Electronics  
This paper proposes a semi-supervised intelligent visual surveillance system to exploit the information from multicamera networks for the monitoring of people and vehicles.  ...  Modules are proposed to perform critical surveillance tasks including: the management and calibration of cameras within a multi-camera network; tracking of objects across multiple views; recognition of  ...  ACKNOWLEDGMENT This research was supported by the Australian Government Department of the Prime Minister and Cabinet.  ... 
doi:10.1109/isie.2010.5636922 fatcat:hsuepfx5evbmvir5zv2726jo3e

Leading Digital Socio-Economy to Efficiency – A Primer on Tokenomics [article]

Ricky Lamberty and Danny de Waard and Alexander Poddey
2020 arXiv   pre-print
Cryptographic token represent a new phenomena of the crypto movement with the ability to program rules and incentives to steer participant behaviors that transforms them from purely technical to socio-economic  ...  Through the usage of cryptographically secure and digitally scarce tokens, a next evolutionary step of the Internet has come.  ...  Cryptoeconomics can be understood as the combination of cryptography, game-theory and economics to create robust decentralized peer-to-peer networks.  ... 
arXiv:2008.02538v1 fatcat:rlvxyi5j4nbrnjrx62q57io6gu

Cosmos++: Relativistic Magnetohydrodynamics on Unstructured Grids with Local Adaptive Refinement

Peter Anninos, P. Chris Fragile, Jay D. Salmonson
2005 Astrophysical Journal  
A number of tests are presented to demonstrate robustness of the numerical algorithms and adaptive mesh framework over a wide spectrum of problems, boosts, and astrophysical applications, including relativistic  ...  The dual energy approach allows for accurate modeling of highly relativistic flows at boost factors well beyond what has been achieved to date by standard artificial viscosity methods.  ...  The authors would like to thank the VisIt development team at Lawrence Livermore National Laboratory (, especially Hank Childs, for visualization support.  ... 
doi:10.1086/497294 fatcat:4toebbomvbbpfcijpuuczzr4ne

Fast Actively Secure OT Extension for Short Secrets [article]

Arpita Patra, Pratik Sarkar, Ajith Suresh
2019 arXiv   pre-print
problems of interest such as private set intersection (PSI), private information retrieval (PIR), contract signing to name a few.  ...  OT extension protocols are introduced to compute a very large number of OTs referred to as extended OTs at the cost of a small number of OTs referred to as seed OTs.  ...  Acknowledgements We thank Peter Scholl and Emmanuela Orsini for pointing out a bug in the initial version of the paper.  ... 
arXiv:1911.08834v1 fatcat:qbfglhr5vvcxdmixkic64mmdpq

Control-Flow Integrity: Attacks and Protections

Sarwar Sayeed, Hector Marco-Gisbert, Ismael Ripoll, Miriam Birch
2019 Applied Sciences  
Despite the intense efforts to prevent programmers from writing code with memory errors, memory corruption vulnerabilities are still a major security threat.  ...  Control-flow Integrity (CFI) is a large family of techniques that aims to eradicate memory error exploitation by ensuring that the instruction pointer (IP) of a running process cannot be controlled by  ...  It comprises two prime attributes. First, it recategorizes function pointers at run-time to boost typecasting. Second, it restricts swapping of two valid pointers which consist of the same type.  ... 
doi:10.3390/app9204229 fatcat:u5gsvzq6vfa7bah6zfl3ktxsza

Dragoon: Private Decentralized HITs Made Practical [article]

Yuan Lu, Qiang Tang, Guiling Wang
2020 arXiv   pre-print
However, the inherent limits of blockchain cause decentralized HITs to face a few "new" challenges.  ...  We further instantiate our protocol to implement a system called Dragoon, an instance of which is deployed atop Ethereum to facilitate an image annotation task used by ImageNet.  ...  ACKNOWLEDGMENT Qiang is supported in part by and a Google Faculty Award. We would like to thank the anonymous reviewers for their valuable suggestions and comments about this paper.  ... 
arXiv:2003.10074v3 fatcat:5uq3ya6plngalkbbuhdswkr35y

SoK: Understanding BFT Consensus in the Age of Blockchains [article]

Gang Wang
2021 IACR Cryptology ePrint Archive  
We aim that this paper can provide system researchers and developers a concrete view of the current design landscape and help them find solutions to concrete problems.  ...  It also maintains other benefits including optimal resilience to tolerate up to n/3 adaptive Byzantine corruption, optimal expected constant running time, and optimal O(n 2 ) messages.  ...  to the level of a few thousands [19] .  ... 
dblp:journals/iacr/Wang21c fatcat:wggbkbi25fg43fieebp4qzlk3m

BLAZE: Blazing Fast Privacy-Preserving Machine Learning [article]

Arpita Patra, Ajith Suresh
2020 arXiv   pre-print
We propose BLAZE, a blazing fast PPML framework in the three server setting tolerating one malicious corruption over a ring (ℓ).  ...  Leveraging an input-independent preprocessing phase, BLAZE has a fast input-dependent online phase relying on efficient PPML primitives such as: (i) A dot product protocol for which the communication in  ...  Also, we use a commitment scheme, denoted by Com(), to boost the security of our constructions from abort to fairness.  ... 
arXiv:2005.09042v1 fatcat:mk2pzykomjbenp7dxikn3les74

A Survey and Perspective on Artificial Intelligence for Security-Aware Electronic Design Automation [article]

David Selasi Koblah, Rabin Yu Acharya, Daniel Capecci, Olivia P. Dizon-Paradis, Shahin Tajik, Fatemeh Ganji, Damon L. Woodard, Domenic Forte
2022 arXiv   pre-print
However, the security concerns and issues related to IC design have been highly overlooked.  ...  complexity, aggressive time-to-market, and the growing number of ubiquitous interconnected devices (IoT).  ...  In recent years, a few researchers have leveraged circuit sizing based automation and optimization tools to design robust PUFs that can produce unique yet random and reliable output bit suitable for device  ... 
arXiv:2204.09579v2 fatcat:tebjzerhfvaepbwmka7ipiccxy

Between a Rock and a Hard Place: Interpolating between MPC and FHE [chapter]

Ashish Choudhury, Jake Loftus, Emmanuela Orsini, Arpita Patra, Nigel P. Smart
2013 Lecture Notes in Computer Science  
Thus one can trade communication for computation in a simple way. Our protocol is based on an interactive protocol for "bootstrapping" a somewhat homomorphic encryption (SHE) scheme.  ...  The key contribution is that our presented protocol is highly communication efficient enabling us to obtain reduced communication when compared to traditional MPC protocols for relatively small values  ...  The second author was supported by an Trend Micro Ltd, and the fifth author was supported by in part by a Royal Society Wolfson Merit Award.  ... 
doi:10.1007/978-3-642-42045-0_12 fatcat:2fkf2m7cinbgnhsmilbldcajre
« Previous Showing results 1 — 15 out of 1,380 results