271 research outputs found
Proving Differential Privacy with Shadow Execution
Recent work on formal verification of differential privacy shows a trend
toward usability and expressiveness -- generating a correctness proof of
sophisticated algorithm while minimizing the annotation burden on programmers.
Sometimes, combining those two requires substantial changes to program logics:
one recent paper is able to verify Report Noisy Max automatically, but it
involves a complex verification system using customized program logics and
verifiers.
In this paper, we propose a new proof technique, called shadow execution, and
embed it into a language called ShadowDP. ShadowDP uses shadow execution to
generate proofs of differential privacy with very few programmer annotations
and without relying on customized logics and verifiers. In addition to
verifying Report Noisy Max, we show that it can verify a new variant of Sparse
Vector that reports the gap between some noisy query answers and the noisy
threshold. Moreover, ShadowDP reduces the complexity of verification: for all
of the algorithms we have evaluated, type checking and verification in total
takes at most 3 seconds, while prior work takes minutes on the same algorithms.Comment: 23 pages, 12 figures, PLDI'1
Preserving Both Privacy and Utility in Network Trace Anonymization
As network security monitoring grows more sophisticated, there is an
increasing need for outsourcing such tasks to third-party analysts. However,
organizations are usually reluctant to share their network traces due to
privacy concerns over sensitive information, e.g., network and system
configuration, which may potentially be exploited for attacks. In cases where
data owners are convinced to share their network traces, the data are typically
subjected to certain anonymization techniques, e.g., CryptoPAn, which replaces
real IP addresses with prefix-preserving pseudonyms. However, most such
techniques either are vulnerable to adversaries with prior knowledge about some
network flows in the traces, or require heavy data sanitization or
perturbation, both of which may result in a significant loss of data utility.
In this paper, we aim to preserve both privacy and utility through shifting the
trade-off from between privacy and utility to between privacy and computational
cost. The key idea is for the analysts to generate and analyze multiple
anonymized views of the original network traces; those views are designed to be
sufficiently indistinguishable even to adversaries armed with prior knowledge,
which preserves the privacy, whereas one of the views will yield true analysis
results privately retrieved by the data owner, which preserves the utility. We
present the general approach and instantiate it based on CryptoPAn. We formally
analyze the privacy of our solution and experimentally evaluate it using real
network traces provided by a major ISP. The results show that our approach can
significantly reduce the level of information leakage (e.g., less than 1\% of
the information leaked by CryptoPAn) with comparable utility
Resonances for "large" ergodic systems in one dimension: a review
The present note reviews recent results on resonances for one-dimensional
quantum ergodic systems constrained to a large box. We restrict ourselves to
one dimensional models in the discrete case. We consider two type of ergodic
potentials on the half-axis, periodic potentials and random potentials. For
both models, we describe the behavior of the resonances near the real axis for
a large typical sample of the potential. In both cases, the linear density of
their real parts is given by the density of states of the full ergodic system.
While in the periodic case, the resonances distribute on a nice analytic curve
(once their imaginary parts are suitably renormalized), In the random case, the
resonances (again after suitable renormalization of both the real and imaginary
parts) form a two dimensional Poisson cloud
Wigner's -matrix elements for - A Generating Function Approach
A generating function for the Wigner's -matrix elements of is
derived. From this an explicit expression for the individual matrix elements is
obtained in a closed form.Comment: RevTex 3.0, 22 pages, no figure
Bures and Statistical Distance for Squeezed Thermal States
We compute the Bures distance between two thermal squeezed states and deduce
the Statistical Distance metric. By computing the curvature of this metric we
can identify regions of parameter space most sensitive to changes in these
parameters and thus lead to optimum detection statistics.Comment: 15 pages, 1 figure (not included - obtain from Author) To appear in
Journal of Physics
Fractional Cauchy problems on bounded domains: survey of recent results
In a fractional Cauchy problem, the usual first order time derivative is
replaced by a fractional derivative. This problem was first considered by
\citet{nigmatullin}, and \citet{zaslavsky} in for modeling some
physical phenomena.
The fractional derivative models time delays in a diffusion process. We will
give a survey of the recent results on the fractional Cauchy problem and its
generalizations on bounded domains D\subset \rd obtained in \citet{m-n-v-aop,
mnv-2}. We also study the solutions of fractional Cauchy problem where the
first time derivative is replaced with an infinite sum of fractional
derivatives. We point out a connection to eigenvalue problems for the
fractional time operators considered. The solutions to the eigenvalue problems
are expressed by Mittag-Leffler functions and its generalized versions. The
stochastic solution of the eigenvalue problems for the fractional derivatives
are given by inverse subordinators
Equilibrium configurations of two charged masses in General Relativity
An asymptotically flat static solution of Einstein-Maxwell equations which
describes the field of two non-extreme Reissner - Nordstr\"om sources in
equilibrium is presented. It is expressed in terms of physical parameters of
the sources (their masses, charges and separating distance). Very simple
analytical forms were found for the solution as well as for the equilibrium
condition which guarantees the absence of any struts on the symmetry axis. This
condition shows that the equilibrium is not possible for two black holes or for
two naked singularities. However, in the case when one of the sources is a
black hole and another one is a naked singularity, the equilibrium is possible
at some distance separating the sources. It is interesting that for
appropriately chosen parameters even a Schwarzschild black hole together with a
naked singularity can be "suspended" freely in the superposition of their
fields.Comment: 4 pages; accepted for publication in Phys. Rev.
Classification of bicovariant differential calculi on the Jordanian quantum groups GL_{g,h}(2) and SL_{h}(2) and quantum Lie algebras
We classify all 4-dimensional first order bicovariant calculi on the
Jordanian quantum group GL_{h,g}(2) and all 3-dimensional first order
bicovariant calculi on the Jordanian quantum group SL_{h}(2). In both cases we
assume that the bicovariant bimodules are generated as left modules by the
differentials of the quantum group generators. It is found that there are 3
1-parameter families of 4-dimensional bicovariant first order calculi on
GL_{h,g}(2) and that there is a single, unique, 3-dimensional bicovariant
calculus on SL_{h}(2). This 3-dimensional calculus may be obtained through a
classical-like reduction from any one of the three families of 4-dimensional
calculi on GL_{h,g}(2). Details of the higher order calculi and also the
quantum Lie algebras are presented for all calculi. The quantum Lie algebra
obtained from the bicovariant calculus on SL_{h}(2) is shown to be isomorphic
to the quantum Lie algebra we obtain as an ad-submodule within the Jordanian
universal enveloping algebra U_{h}(sl(2)) and also through a consideration of
the decomposition of the tensor product of two copies of the deformed adjoint
module. We also obtain the quantum Killing form for this quantum Lie algebra.Comment: 33 pages, AMSLaTeX, misleading remark remove
A Survey on the Krein-von Neumann Extension, the corresponding Abstract Buckling Problem, and Weyl-Type Spectral Asymptotics for Perturbed Krein Laplacians in Nonsmooth Domains
In the first (and abstract) part of this survey we prove the unitary
equivalence of the inverse of the Krein--von Neumann extension (on the
orthogonal complement of its kernel) of a densely defined, closed, strictly
positive operator, for some in a Hilbert space to an abstract buckling problem operator.
This establishes the Krein extension as a natural object in elasticity theory
(in analogy to the Friedrichs extension, which found natural applications in
quantum mechanics, elasticity, etc.).
In the second, and principal part of this survey, we study spectral
properties for , the Krein--von Neumann extension of the
perturbed Laplacian (in short, the perturbed Krein Laplacian)
defined on , where is measurable, bounded and
nonnegative, in a bounded open set belonging to a
class of nonsmooth domains which contains all convex domains, along with all
domains of class , .Comment: 68 pages. arXiv admin note: extreme text overlap with arXiv:0907.144
- …
