A decade of lattice cryptography

C Peikert - Foundations and trends® in theoretical computer …, 2016‏ - nowpublishers.com
Lattice-based cryptography is the use of conjectured hard problems on point lattices in Rn
as the foundation for secure cryptographic systems. Attractive features of lattice cryptography …

Computational complexity: a conceptual perspective

O Goldreich - ACM Sigact News, 2008‏ - dl.acm.org
This book is rooted in the thesis that complexity theory is extremely rich in conceptual
content, and that this contents should be explicitly communicated in expositions and courses …

Undetectable watermarks for language models

M Christ, S Gunn, O Zamir - The Thirty Seventh Annual …, 2024‏ - proceedings.mlr.press
Recent advances in the capabilities of large language models such as GPT-4 have spurred
increasing concern about our ability to detect AI-generated text. Prior works have suggested …

Does learning require memorization? a short tale about a long tail

V Feldman - Proceedings of the 52nd Annual ACM SIGACT …, 2020‏ - dl.acm.org
State-of-the-art results on image recognition tasks are achieved using over-parameterized
learning algorithms that (nearly) perfectly fit the training set and are known to fit well even …

Multicalibration: Calibration for the (computationally-identifiable) masses

U Hébert-Johnson, M Kim… - International …, 2018‏ - proceedings.mlr.press
We develop and study multicalibration as a new measure of fairness in machine learning
that aims to mitigate inadvertent or malicious discrimination that is introduced at training time …

Forward and backward private searchable encryption from constrained cryptographic primitives

R Bost, B Minaud, O Ohrimenko - … of the 2017 ACM SIGSAC Conference …, 2017‏ - dl.acm.org
Using dynamic Searchable Symmetric Encryption, a user with limited storage resources can
securely outsource a database to an untrusted server, in such a way that the database can …

Learning quantum states and unitaries of bounded gate complexity

H Zhao, L Lewis, I Kannan, Y Quek, HY Huang… - PRX Quantum, 2024‏ - APS
While quantum state tomography is notoriously hard, most states hold little interest to
practically minded tomographers. Given that states and unitaries appearing in nature are of …

Wolverine: fast, scalable, and communication-efficient zero-knowledge proofs for boolean and arithmetic circuits

C Weng, K Yang, J Katz, X Wang - 2021 IEEE Symposium on …, 2021‏ - ieeexplore.ieee.org
Efficient zero-knowledge (ZK) proofs for arbitrary boolean or arithmetic circuits have recently
attracted much attention. Existing solutions suffer from either significant prover overhead (ie …

Accountable algorithms

JA Kroll - 2015‏ - search.proquest.com
Important decisions about people are increasingly made by algorithms: Votes are counted;
voter rolls are purged; financial aid decisions are made; taxpayers are chosen for audits; air …

Privacy-preserving and efficient data sharing for blockchain-based intelligent transportation systems

S Jiang, J Cao, H Wu, K Chen, X Liu - Information Sciences, 2023‏ - Elsevier
Recent years have witnessed the development and adoption of blockchain technology in
intelligent transportation systems (ITS) because of its authenticity and traceability. However …