271 research outputs found

    Proving Differential Privacy with Shadow Execution

    Full text link
    Recent work on formal verification of differential privacy shows a trend toward usability and expressiveness -- generating a correctness proof of sophisticated algorithm while minimizing the annotation burden on programmers. Sometimes, combining those two requires substantial changes to program logics: one recent paper is able to verify Report Noisy Max automatically, but it involves a complex verification system using customized program logics and verifiers. In this paper, we propose a new proof technique, called shadow execution, and embed it into a language called ShadowDP. ShadowDP uses shadow execution to generate proofs of differential privacy with very few programmer annotations and without relying on customized logics and verifiers. In addition to verifying Report Noisy Max, we show that it can verify a new variant of Sparse Vector that reports the gap between some noisy query answers and the noisy threshold. Moreover, ShadowDP reduces the complexity of verification: for all of the algorithms we have evaluated, type checking and verification in total takes at most 3 seconds, while prior work takes minutes on the same algorithms.Comment: 23 pages, 12 figures, PLDI'1

    Preserving Both Privacy and Utility in Network Trace Anonymization

    Full text link
    As network security monitoring grows more sophisticated, there is an increasing need for outsourcing such tasks to third-party analysts. However, organizations are usually reluctant to share their network traces due to privacy concerns over sensitive information, e.g., network and system configuration, which may potentially be exploited for attacks. In cases where data owners are convinced to share their network traces, the data are typically subjected to certain anonymization techniques, e.g., CryptoPAn, which replaces real IP addresses with prefix-preserving pseudonyms. However, most such techniques either are vulnerable to adversaries with prior knowledge about some network flows in the traces, or require heavy data sanitization or perturbation, both of which may result in a significant loss of data utility. In this paper, we aim to preserve both privacy and utility through shifting the trade-off from between privacy and utility to between privacy and computational cost. The key idea is for the analysts to generate and analyze multiple anonymized views of the original network traces; those views are designed to be sufficiently indistinguishable even to adversaries armed with prior knowledge, which preserves the privacy, whereas one of the views will yield true analysis results privately retrieved by the data owner, which preserves the utility. We present the general approach and instantiate it based on CryptoPAn. We formally analyze the privacy of our solution and experimentally evaluate it using real network traces provided by a major ISP. The results show that our approach can significantly reduce the level of information leakage (e.g., less than 1\% of the information leaked by CryptoPAn) with comparable utility

    Resonances for "large" ergodic systems in one dimension: a review

    Full text link
    The present note reviews recent results on resonances for one-dimensional quantum ergodic systems constrained to a large box. We restrict ourselves to one dimensional models in the discrete case. We consider two type of ergodic potentials on the half-axis, periodic potentials and random potentials. For both models, we describe the behavior of the resonances near the real axis for a large typical sample of the potential. In both cases, the linear density of their real parts is given by the density of states of the full ergodic system. While in the periodic case, the resonances distribute on a nice analytic curve (once their imaginary parts are suitably renormalized), In the random case, the resonances (again after suitable renormalization of both the real and imaginary parts) form a two dimensional Poisson cloud

    Wigner's DD-matrix elements for SU(3)SU(3) - A Generating Function Approach

    Get PDF
    A generating function for the Wigner's DD-matrix elements of SU(3)SU(3) is derived. From this an explicit expression for the individual matrix elements is obtained in a closed form.Comment: RevTex 3.0, 22 pages, no figure

    Bures and Statistical Distance for Squeezed Thermal States

    Get PDF
    We compute the Bures distance between two thermal squeezed states and deduce the Statistical Distance metric. By computing the curvature of this metric we can identify regions of parameter space most sensitive to changes in these parameters and thus lead to optimum detection statistics.Comment: 15 pages, 1 figure (not included - obtain from Author) To appear in Journal of Physics

    Fractional Cauchy problems on bounded domains: survey of recent results

    Full text link
    In a fractional Cauchy problem, the usual first order time derivative is replaced by a fractional derivative. This problem was first considered by \citet{nigmatullin}, and \citet{zaslavsky} in Rd\mathbb R^d for modeling some physical phenomena. The fractional derivative models time delays in a diffusion process. We will give a survey of the recent results on the fractional Cauchy problem and its generalizations on bounded domains D\subset \rd obtained in \citet{m-n-v-aop, mnv-2}. We also study the solutions of fractional Cauchy problem where the first time derivative is replaced with an infinite sum of fractional derivatives. We point out a connection to eigenvalue problems for the fractional time operators considered. The solutions to the eigenvalue problems are expressed by Mittag-Leffler functions and its generalized versions. The stochastic solution of the eigenvalue problems for the fractional derivatives are given by inverse subordinators

    Equilibrium configurations of two charged masses in General Relativity

    Get PDF
    An asymptotically flat static solution of Einstein-Maxwell equations which describes the field of two non-extreme Reissner - Nordstr\"om sources in equilibrium is presented. It is expressed in terms of physical parameters of the sources (their masses, charges and separating distance). Very simple analytical forms were found for the solution as well as for the equilibrium condition which guarantees the absence of any struts on the symmetry axis. This condition shows that the equilibrium is not possible for two black holes or for two naked singularities. However, in the case when one of the sources is a black hole and another one is a naked singularity, the equilibrium is possible at some distance separating the sources. It is interesting that for appropriately chosen parameters even a Schwarzschild black hole together with a naked singularity can be "suspended" freely in the superposition of their fields.Comment: 4 pages; accepted for publication in Phys. Rev.

    Classification of bicovariant differential calculi on the Jordanian quantum groups GL_{g,h}(2) and SL_{h}(2) and quantum Lie algebras

    Full text link
    We classify all 4-dimensional first order bicovariant calculi on the Jordanian quantum group GL_{h,g}(2) and all 3-dimensional first order bicovariant calculi on the Jordanian quantum group SL_{h}(2). In both cases we assume that the bicovariant bimodules are generated as left modules by the differentials of the quantum group generators. It is found that there are 3 1-parameter families of 4-dimensional bicovariant first order calculi on GL_{h,g}(2) and that there is a single, unique, 3-dimensional bicovariant calculus on SL_{h}(2). This 3-dimensional calculus may be obtained through a classical-like reduction from any one of the three families of 4-dimensional calculi on GL_{h,g}(2). Details of the higher order calculi and also the quantum Lie algebras are presented for all calculi. The quantum Lie algebra obtained from the bicovariant calculus on SL_{h}(2) is shown to be isomorphic to the quantum Lie algebra we obtain as an ad-submodule within the Jordanian universal enveloping algebra U_{h}(sl(2)) and also through a consideration of the decomposition of the tensor product of two copies of the deformed adjoint module. We also obtain the quantum Killing form for this quantum Lie algebra.Comment: 33 pages, AMSLaTeX, misleading remark remove

    A Survey on the Krein-von Neumann Extension, the corresponding Abstract Buckling Problem, and Weyl-Type Spectral Asymptotics for Perturbed Krein Laplacians in Nonsmooth Domains

    Full text link
    In the first (and abstract) part of this survey we prove the unitary equivalence of the inverse of the Krein--von Neumann extension (on the orthogonal complement of its kernel) of a densely defined, closed, strictly positive operator, SεIHS\geq \varepsilon I_{\mathcal{H}} for some ε>0\varepsilon >0 in a Hilbert space H\mathcal{H} to an abstract buckling problem operator. This establishes the Krein extension as a natural object in elasticity theory (in analogy to the Friedrichs extension, which found natural applications in quantum mechanics, elasticity, etc.). In the second, and principal part of this survey, we study spectral properties for HK,ΩH_{K,\Omega}, the Krein--von Neumann extension of the perturbed Laplacian Δ+V-\Delta+V (in short, the perturbed Krein Laplacian) defined on C0(Ω)C^\infty_0(\Omega), where VV is measurable, bounded and nonnegative, in a bounded open set ΩRn\Omega\subset\mathbb{R}^n belonging to a class of nonsmooth domains which contains all convex domains, along with all domains of class C1,rC^{1,r}, r>1/2r>1/2.Comment: 68 pages. arXiv admin note: extreme text overlap with arXiv:0907.144
    corecore