-
Shapley Value Computation in Ontology-Mediated Query Answering
Authors:
Meghyn Bienvenu,
Diego Figueira,
Pierre Lafourcade
Abstract:
The Shapley value, originally introduced in cooperative game theory for wealth distribution, has found use in KR and databases for the purpose of assigning scores to formulas and database tuples based upon their contribution to obtaining a query result or inconsistency. In the present paper, we explore the use of Shapley values in ontology-mediated query answering (OMQA) and present a detailed com…
▽ More
The Shapley value, originally introduced in cooperative game theory for wealth distribution, has found use in KR and databases for the purpose of assigning scores to formulas and database tuples based upon their contribution to obtaining a query result or inconsistency. In the present paper, we explore the use of Shapley values in ontology-mediated query answering (OMQA) and present a detailed complexity analysis of Shapley value computation (SVC) in the OMQA setting. In particular, we establish a PF/#P-hard dichotomy for SVC for ontology-mediated queries (T,q) composed of an ontology T formulated in the description logic ELHI_\bot and a connected constant-free homomorphism-closed query q. We further show that the #P-hardness side of the dichotomy can be strengthened to cover possibly disconnected queries with constants. Our results exploit recently discovered connections between SVC and probabilistic query evaluation and allow us to generalize existing results on probabilistic OMQA.
△ Less
Submitted 29 July, 2024;
originally announced July 2024.
-
Optimal games in Room 25 solo and coop modes
Authors:
Pierre Lafourcade
Abstract:
We study the problem of optimal games for the solo and coop modes of the board game Room 25 (season 1). We show that the game cannot be won in a single turn for any starting configuration, but that it can be done in two for some configurations. We introduce an opening that wins in two turns with enough luck, while having a low probability of losing immediately. We then show that the game can be wo…
▽ More
We study the problem of optimal games for the solo and coop modes of the board game Room 25 (season 1). We show that the game cannot be won in a single turn for any starting configuration, but that it can be done in two for some configurations. We introduce an opening that wins in two turns with enough luck, while having a low probability of losing immediately. We then show that the game can be won in a single turn if the game's rules are slightly modified, although the probability of winning then becomes substantially lower than in the two-turn strategy. At last, we show that if the players are maximally unlucky, they will lose regardless of their strategy.
△ Less
Submitted 22 December, 2023;
originally announced January 2024.
-
When is Shapley Value Computation a Matter of Counting?
Authors:
Meghyn Bienvenu,
Diego Figueira,
Pierre Lafourcade
Abstract:
The Shapley value provides a natural means of quantifying the contributions of facts to database query answers. In this work, we seek to broaden our understanding of Shapley value computation (SVC) in the database setting by revealing how it relates to Fixed-size Generalized Model Counting (FGMC), which is the problem of computing the number of sub-databases of a given size and containing a given…
▽ More
The Shapley value provides a natural means of quantifying the contributions of facts to database query answers. In this work, we seek to broaden our understanding of Shapley value computation (SVC) in the database setting by revealing how it relates to Fixed-size Generalized Model Counting (FGMC), which is the problem of computing the number of sub-databases of a given size and containing a given set of assumed facts that satisfy a fixed query. Our focus will be on explaining the difficulty of SVC via FGMC, and to this end, we identify general conditions on queries which enable reductions from FGMC to SVC. As a byproduct, we not only obtain alternative explanations for most existing results on SVC, but also new complexity results. In particular, we establish FP-#P complexity dichotomies for constant-free connected UCQs and homomorphism-closed connected graph queries. We further explore variants of SVC, either in the absence of assumed facts, or where we measure the contribution of constants rather than facts.
△ Less
Submitted 25 March, 2024; v1 submitted 22 December, 2023;
originally announced December 2023.
-
The Calissons Puzzle
Authors:
Jean-Marie Favreau,
Yan Gerard,
Pascal Lafourcade,
Léo Robert
Abstract:
In 2022, Olivier Longuet, a French mathematics teacher, created a game called the \textit{calissons puzzle}. Given a triangular grid in a hexagon and some given edges of the grid, the problem is to find a calisson tiling such that no input edge is overlapped and calissons adjacent to an input edge have different orientations. We extend the puzzle to regions $R$ that are not necessarily hexagonal.…
▽ More
In 2022, Olivier Longuet, a French mathematics teacher, created a game called the \textit{calissons puzzle}. Given a triangular grid in a hexagon and some given edges of the grid, the problem is to find a calisson tiling such that no input edge is overlapped and calissons adjacent to an input edge have different orientations. We extend the puzzle to regions $R$ that are not necessarily hexagonal. The first interesting property of this puzzle is that, unlike the usual calisson or domino problems, it is solved neither by a maximal matching algorithm, nor by Thurston's algorithm. This raises the question of its complexity.
We prove that if the region $R$ is finite and simply connected, then the puzzle can be solved by an algorithm that we call the \textit{advancing surface algorithm} and whose complexity is $O(|\partial R|^3)$ where $\partial R|$ is the size of the boundary of the region $R$. In the case where the region is the entire infinite triangular grid, we prove that the existence of a solution can be solved with an algorithm of complexity $O(|X|^3)$ where $X$ is the set of input edges. To prove these theorems, we revisit William Thurston's results on the calisson tilability of a region $R$. The solutions involve equivalence between calisson tilings, stepped surfaces and certain DAG cuts that avoid passing through a set of edges that we call \textit{unbreakable}. It allows us to generalize Thurston's theorem characterizing tilable regions by rewriting it in terms of descending paths or absorbing cycles. Thurston's algorithm appears as a distance calculation algorithm following Dijkstra's paradigm. The introduction of a set $X$ of interior edges introduces negative weights that force a Bellman-Ford strategy to be preferred. These results extend Thurston's legacy by using computer science structures and algorithms.
△ Less
Submitted 5 July, 2023;
originally announced July 2023.
-
Robust crystal structure identification at extreme conditions using a density-independent spectral descriptor and supervised learning
Authors:
Paul Lafourcade,
Jean-Bernard Maillet,
Christophe Denoual,
Eléonore Duval,
Arnaud Allera,
Alexandra M. Goryaeva,
Mihai-Cosmin Marinica
Abstract:
The increased time- and length-scale of classical molecular dynamics simulations have led to raw data flows surpassing storage capacities, necessitating on-the-fly integration of structural analysis algorithms. As a result, algorithms must be computationally efficient, accurate, and stable at finite temperature to reliably extract the relevant features of the data at simulation time. In this work,…
▽ More
The increased time- and length-scale of classical molecular dynamics simulations have led to raw data flows surpassing storage capacities, necessitating on-the-fly integration of structural analysis algorithms. As a result, algorithms must be computationally efficient, accurate, and stable at finite temperature to reliably extract the relevant features of the data at simulation time. In this work, we leverage spectral descriptors to encode local atomic environments and build crystal structure classification models. In addition to the classical way spectral descriptors are computed, i.e. over a fixed radius neighborhood sphere around a central atom, we propose an extension to make them independent from the material's density. Models are trained on defect-free crystal structures with moderate thermal noise and elastic deformation, using the linear discriminant analysis (LDA) method for dimensionality reduction and logistic regression (LR) for subsequent classification. The proposed classification model is intentionally designed to be simple, incorporating only a limited number of parameters. This deliberate simplicity enables the model to be trained effectively even when working with small databases. Despite the limited training data, the model still demonstrates inherent transferability, making it applicable to a broader range of scenarios and datasets. The accuracy of our models in extreme conditions is compared to traditional algorithms from the literature, namely adaptive common neighbor analysis (a-CNA), polyhedral template matching (PTM) and diamond structure identification (IDS). Finally, we showcase two applications of our method: tracking a solid-solid BCC-to-HCP phase transformation in Zirconium at high pressure up to high temperature, and visualizing stress-induced dislocation loop expansion in single crystal FCC Aluminum containing a Frank-Read source, at high temperature.
△ Less
Submitted 10 July, 2023; v1 submitted 4 July, 2023;
originally announced July 2023.
-
Neighbors Map: an Efficient Atomic Descriptor for Structural Analysis
Authors:
Arnaud Allera,
Alexandra M. Goryaeva,
Paul Lafourcade,
Jean-Bernard Maillet,
Mihai-Cosmin Marinica
Abstract:
Accurate structural analysis is essential to gain physical knowledge and understanding of atomic-scale processes in materials from atomistic simulations. However, traditional analysis methods often reach their limits when applied to crystalline systems with thermal fluctuations, defect-induced distortions, partial vitrification, etc. In order to enhance the means of structural analysis, we present…
▽ More
Accurate structural analysis is essential to gain physical knowledge and understanding of atomic-scale processes in materials from atomistic simulations. However, traditional analysis methods often reach their limits when applied to crystalline systems with thermal fluctuations, defect-induced distortions, partial vitrification, etc. In order to enhance the means of structural analysis, we present a novel descriptor for encoding atomic environments into 2D images, based on a pixelated representation of graph-like architecture with weighted edge connections of neighboring atoms. This descriptor is well adapted for Convolutional Neural Networks and enables accurate structural analysis at a low computational cost. In this paper, we showcase a series of applications, including the classification of crystalline structures in distorted systems, tracking phase transformations up to the melting temperature, and analyzing liquid-to-amorphous transitions in pure metals and alloys. This work provides the foundation for robust and efficient structural analysis in materials science, opening up new possibilities for studying complex structural processes, which can not be described with traditional approaches.
△ Less
Submitted 22 September, 2023; v1 submitted 3 July, 2023;
originally announced July 2023.
-
Conflict Optimization for Binary CSP Applied to Minimum Partition into Plane Subgraphs and Graph Coloring
Authors:
Loïc Crombez,
Guilherme D. da Fonseca,
Florian Fontan,
Yan Gerard,
Aldo Gonzalez-Lorenzo,
Pascal Lafourcade,
Luc Libralesso,
Benjamin Momège,
Jack Spalding-Jamieson,
Brandon Zhang,
Da Wei Zheng
Abstract:
CG:SHOP is an annual geometric optimization challenge and the 2022 edition proposed the problem of coloring a certain geometric graph defined by line segments. Surprisingly, the top three teams used the same technique, called conflict optimization. This technique has been introduced in the 2021 edition of the challenge, to solve a coordinated motion planning problem. In this paper, we present the…
▽ More
CG:SHOP is an annual geometric optimization challenge and the 2022 edition proposed the problem of coloring a certain geometric graph defined by line segments. Surprisingly, the top three teams used the same technique, called conflict optimization. This technique has been introduced in the 2021 edition of the challenge, to solve a coordinated motion planning problem. In this paper, we present the technique in the more general framework of binary constraint satisfaction problems (binary CSP). Then, the top three teams describe their different implementations of the same underlying strategy. We evaluate the performance of those implementations to vertex color not only geometric graphs, but also other types of graphs.
△ Less
Submitted 24 March, 2023; v1 submitted 16 March, 2023;
originally announced March 2023.
-
An implicit FFT-based method for wave propagation in elastic heterogeneous media
Authors:
R. Sancho,
V. Rey de Pedraza,
P. Lafourcade,
R. A. Lebensohn,
J. Segurado
Abstract:
An FFT-based algorithm is developed to simulate the propagation of elastic waves in heterogeneous $d$-dimensional rectangular shape domains. The method allows one to prescribe the displacement as a function of time in a subregion of the domain, emulating the application of Dirichlet boundary conditions on an outer face. Time discretization is performed using an unconditionally stable beta-Newmark…
▽ More
An FFT-based algorithm is developed to simulate the propagation of elastic waves in heterogeneous $d$-dimensional rectangular shape domains. The method allows one to prescribe the displacement as a function of time in a subregion of the domain, emulating the application of Dirichlet boundary conditions on an outer face. Time discretization is performed using an unconditionally stable beta-Newmark approach. The implicit problem for obtaining the displacement at each time step is solved by transforming the equilibrium equations into Fourier space and solving the corresponding linear system with a preconditioned Krylov solver. The resulting method is validated against analytical solutions and compared with implicit and explicit finite element simulations and with an explicit FFT approach. The accuracy of the method is similar to or better than that of finite elements, and the numerical performance is clearly superior, allowing the use of much larger models. To illustrate the capabilities of the method, some numerical examples are presented, including the propagation of planar, circular, and spherical waves and the simulation of the propagation of a pulse in a polycrystalline medium.
△ Less
Submitted 15 November, 2022;
originally announced November 2022.
-
Near-collisions and their Impact on Biometric Security
Authors:
Axel Durbet,
Paul-Marie Grollemund,
Pascal Lafourcade,
Kevin Thiry-Atighehchi
Abstract:
Biometric recognition encompasses two operating modes. The first one is biometric identification which consists in determining the identity of an individual based on her biometrics and requires browsing the entire database (i.e., a 1:N search). The other one is biometric authentication which corresponds to verifying claimed biometrics of an individual (i.e., a 1:1 search) to authenticate her, or g…
▽ More
Biometric recognition encompasses two operating modes. The first one is biometric identification which consists in determining the identity of an individual based on her biometrics and requires browsing the entire database (i.e., a 1:N search). The other one is biometric authentication which corresponds to verifying claimed biometrics of an individual (i.e., a 1:1 search) to authenticate her, or grant her access to some services. The matching process is based on the similarities between a fresh and an enrolled biometric template. Considering the case of binary templates, we investigate how a highly populated database yields near-collisions, impacting the security of both the operating modes. Insight into the security of binary templates is given by establishing a lower bound on the size of templates and an upper bound on the size of a template database depending on security parameters. We provide efficient algorithms for partitioning a leaked template database in order to improve the generation of a master-template-set that can impersonates any enrolled user and possibly some future users. Practical impacts of proposed algorithms are finally emphasized with experimental studies.
△ Less
Submitted 18 July, 2022; v1 submitted 6 May, 2022;
originally announced May 2022.
-
Elastic anisotropy of 1,3,5-Triamino-2,4,6-Trinitrobenzene as a function of temperature and pressure: A Molecular Dynamics study
Authors:
Paul Lafourcade,
Jean-Bernard Maillet,
Nicolas Bruzy,
Christophe Denoual
Abstract:
The equation of state of the triclinic compound 1,3,5-triamino-2,4,6-trinitrobenzene (TATB) as well as its second-order isothermal elastic tensor were computed through classical molecular dynamics simulations under various temperature and pressure conditions. Hydrostatic pressures similar to previous diamond anvil cell experiments were imposed within the range [0, 66] GPa and temperatures chosen b…
▽ More
The equation of state of the triclinic compound 1,3,5-triamino-2,4,6-trinitrobenzene (TATB) as well as its second-order isothermal elastic tensor were computed through classical molecular dynamics simulations under various temperature and pressure conditions. Hydrostatic pressures similar to previous diamond anvil cell experiments were imposed within the range [0, 66] GPa and temperatures chosen between 100 and 900 K in conjunction with the most recent version of an all-atom fully-flexible molecule force field. The isothermal elastic constants were computed using the generalized Hooke's law by fitting Cauchy stress vs. linear strain curves. Along isobaric pathways, TATB single crystal stiffness is found to undergo linear softening, less pronounced at high pressure, while maintaining its elastic anisotropy. On the other hand, along an isothermal pathways, a non-linear increase is observed in the elastic constants with a significant decrease in anisotropy. Towards a precise mesoscopic modeling of TATB single crystal mechanical behavior, we provide "ready to plug-in" analytical formulations of the P,V,T equation of state and pressure-temperature dependent non-linear elasticity.
△ Less
Submitted 10 January, 2022;
originally announced January 2022.
-
The critical layer in quadratic flow boundary layers over acoustic linings
Authors:
Matthew J. King,
Edward J. Brambley,
Renan Liupekevicius,
Miren Radia,
Paul Lafourcade,
Tauqeer H. Shah
Abstract:
A straight cylindrical duct is considered containing an axial mean flow that is uniform everywhere except within a boundary layer near the wall, which need not be thin. Within this boundary layer the mean flow varies parabolically. The linearized Euler equations are Fourier transformed to give the Pridmore-Brown equation, for which the Greens function is constructed using Frobenius series. Inverti…
▽ More
A straight cylindrical duct is considered containing an axial mean flow that is uniform everywhere except within a boundary layer near the wall, which need not be thin. Within this boundary layer the mean flow varies parabolically. The linearized Euler equations are Fourier transformed to give the Pridmore-Brown equation, for which the Greens function is constructed using Frobenius series. Inverting the spatial Fourier transform, the critical layer contribution is given as the non-modal contribution from integrating around the continuous spectrum branch cut. This contribution is found to be the dominant downstream contribution to the pressure perturbation in certain cases, particularly for thicker boundary layers. The continuous spectrum branch cut is also found to stabilize what are otherwise convectively unstable modes by hiding them behind the branch cut. Overall, the contribution from the critical layer is found to give a neutrally stable non-modal wave with a phase velocity equal to the mean flow velocity at the source when the source is located within the sheared-flow region, and to decay algebraically along the duct as $O(x^{-5/2})$ for a source located with the uniform flow region. The Frobenius expansion, in addition to being numerically accurate close to the critical layer where other numerical methods loose accuracy, is also able to locate modal poles hidden behind the branch cut, which other methods are unable to find; this includes the stabilized hydrodynamic instability. Matlab code is provided to compute the Greens function.
△ Less
Submitted 24 October, 2022; v1 submitted 2 December, 2021;
originally announced December 2021.
-
Authentication Attacks on Projection-based Cancelable Biometric Schemes
Authors:
Axel Durbet,
Pascal Lafourcade,
Denis Migdal,
Kevin Thiry-Atighehchi,
Paul-Marie Grollemund
Abstract:
Cancelable biometric schemes aim at generating secure biometric templates by combining user specific tokens, such as password, stored secret or salt, along with biometric data. This type of transformation is constructed as a composition of a biometric transformation with a feature extraction algorithm. The security requirements of cancelable biometric schemes concern the irreversibility, unlinkabi…
▽ More
Cancelable biometric schemes aim at generating secure biometric templates by combining user specific tokens, such as password, stored secret or salt, along with biometric data. This type of transformation is constructed as a composition of a biometric transformation with a feature extraction algorithm. The security requirements of cancelable biometric schemes concern the irreversibility, unlinkability and revocability of templates, without losing in accuracy of comparison. While several schemes were recently attacked regarding these requirements, full reversibility of such a composition in order to produce colliding biometric characteristics, and specifically presentation attacks, were never demonstrated to the best of our knowledge. In this paper, we formalize these attacks for a traditional cancelable scheme with the help of integer linear programming (ILP) and quadratically constrained quadratic programming (QCQP). Solving these optimization problems allows an adversary to slightly alter its fingerprint image in order to impersonate any individual. Moreover, in an even more severe scenario, it is possible to simultaneously impersonate several individuals.
△ Less
Submitted 18 July, 2022; v1 submitted 28 October, 2021;
originally announced October 2021.
-
Shadoks Approach to Low-Makespan Coordinated Motion Planning
Authors:
Loïc Crombez,
Guilherme D. da Fonseca,
Yan Gerard,
Aldo Gonzalez-Lorenzo,
Pascal Lafourcade,
Luc Libralesso
Abstract:
This paper describes the heuristics used by the Shadoks team for the CG:SHOP 2021 challenge. This year's problem is to coordinate the motion of multiple robots in order to reach their targets without collisions and minimizing the makespan. It is a classical multi agent path finding problem with the specificity that the instances are highly dense in an unbounded grid. Using the heuristics outlined…
▽ More
This paper describes the heuristics used by the Shadoks team for the CG:SHOP 2021 challenge. This year's problem is to coordinate the motion of multiple robots in order to reach their targets without collisions and minimizing the makespan. It is a classical multi agent path finding problem with the specificity that the instances are highly dense in an unbounded grid. Using the heuristics outlined in this paper, our team won first place with the best solution to 202 out of 203 instances and optimal solutions to at least 105 of them. The main ingredients include several different strategies to compute initial solutions coupled with a heuristic called Conflict Optimizer to reduce the makespan of existing solutions.
△ Less
Submitted 9 March, 2022; v1 submitted 25 March, 2021;
originally announced March 2021.
-
A Faster Cryptographer's Conspiracy Santa
Authors:
Xavier Bultel,
Jannik Dreier,
Jean-Guillaume Dumas,
Pascal Lafourcade
Abstract:
In Conspiracy Santa, a variant of Secret Santa, a group of people offer each other Christmas gifts, where each member of the group receives a gift from the other members of the group. To that end, the members of the group form conspiracies, to decide on appropriate gifts, and usually divide the cost of each gift among all participants of that conspiracy. This requires to settle the shared expenses…
▽ More
In Conspiracy Santa, a variant of Secret Santa, a group of people offer each other Christmas gifts, where each member of the group receives a gift from the other members of the group. To that end, the members of the group form conspiracies, to decide on appropriate gifts, and usually divide the cost of each gift among all participants of that conspiracy. This requires to settle the shared expenses per conspiracy, so Conspiracy Santa can actually be seen as an aggregation of several shared expenses problems. First, we show that the problem of finding a minimal number of transaction when settling shared expenses is NP-complete. Still, there exist good greedy approximations. Second, we present a greedy distributed secure solution to Conspiracy Santa. This solution allows a group of n people to share the expenses for the gifts in such a way that no participant learns the price of his gift, but at the same time notably reduces the number of transactions to 2 $\times$ n + 1 with respect to a na{ï}ve aggregation of n $\times$ (n -- 2). Furthermore, our solution does not require a trusted third party, and can either be implemented physically (the participants are in the same room and exchange money using envelopes) or, over Internet, using a cryptocurrency.
△ Less
Submitted 19 May, 2020;
originally announced May 2020.
-
Optimal Threshold Padlock Systems
Authors:
Jannik Dreier,
Jean-Guillaume Dumas,
Pascal Lafourcade,
Léo Robert
Abstract:
In 1968, Liu described the problem of securing documents in a shared secret project. In an example, at least six out of eleven participating scientists need to be present to open the lock securing the secret documents. Shamir proposed a mathematical solution to this physical problem in 1979, by designing an efficient $k$-out-of-$n$ secret sharing scheme based on Lagrange's interpolation. Liu and S…
▽ More
In 1968, Liu described the problem of securing documents in a shared secret project. In an example, at least six out of eleven participating scientists need to be present to open the lock securing the secret documents. Shamir proposed a mathematical solution to this physical problem in 1979, by designing an efficient $k$-out-of-$n$ secret sharing scheme based on Lagrange's interpolation. Liu and Shamir also claimed that the minimal solution using physical locks is clearly impractical and exponential in the number of participants. In this paper we relax some implicit assumptions in their claim and propose an optimal physical solution to the problem of Liu that uses physical padlocks, but the number of padlocks is not greater than the number of participants. Then, we show that no device can do better for $k$-out-of-$n$ threshold padlock systems as soon as $k\geq{\sqrt{2n}}$, which holds true in particular for Liu's example. More generally, we derive bounds required to implement any threshold system and prove a lower bound of $\mathcal{O}{\log(n)}$ padlocks for any threshold larger than $2$. For instance we propose an optimal scheme reaching that bound for $2$-out-of-$n$ threshold systems and requiring less than $2\log_2(n)$ padlocks. We also discuss more complex access structures, a wrapping technique, and other sublinear realizations like an algorithm to generate $3$-out-of-$n$ systems with $2.5\sqrt{n}$ padlocks. Finally we give an algorithm building $k$-out-of-$n$ threshold padlock systems with only $\mathcal{O}{\log(n)^{k-1}}$ padlocks. Apart from the physical world, our results also show that it is possible to implement secret sharing over small fields.
△ Less
Submitted 30 March, 2021; v1 submitted 24 April, 2020;
originally announced April 2020.
-
Infinite Grid Exploration by Disoriented Robots
Authors:
Quentin Bramas,
Stephane Devismes,
Pascal Lafourcade
Abstract:
We deal with a set of autonomous robots moving on an infinite grid. Those robots are opaque, have limited visibility capabilities, and run using synchronous Look-Compute-Move cycles. They all agree on a common chirality, but have no global compass. Finally, they may use lights of different colors, but except from that, robots have neither persistent memories, nor communication mean. We consider th…
▽ More
We deal with a set of autonomous robots moving on an infinite grid. Those robots are opaque, have limited visibility capabilities, and run using synchronous Look-Compute-Move cycles. They all agree on a common chirality, but have no global compass. Finally, they may use lights of different colors, but except from that, robots have neither persistent memories, nor communication mean. We consider the infinite grid exploration (IGE) problem. For this problem we give two impossibility results and three algorithms, including one which is optimal in terms of number of robots. In more detail, we first show that two robots are not sufficient in our settings to solve the problem, even when robots have a common coordinate system. We then show that if the robots' coordinate systems are not self-consistent, three or four robots are not sufficient to solve the problem. Finally, we present three algorithms that solve the IGE problem in various settings. The first algorithm uses six robots with constant colors and a visibility range of one. The second one uses the minimum number of robots, i.e., five, as well as five modifiable colors, still under visibility one. The last algorithm requires seven oblivious anonymous robots, yet assuming visibility two. Notice that the two last algorithms also satisfy achieve exclusiveness.
△ Less
Submitted 2 July, 2019; v1 submitted 22 May, 2019;
originally announced May 2019.
-
Private Multi-party Matrix Multiplication and Trust Computations
Authors:
Jean-Guillaume Dumas,
Pascal Lafourcade,
Jean-Baptiste Orfila,
Maxime Puys
Abstract:
This paper deals with distributed matrix multiplication. Each player owns only one row of both matrices and wishes to learn about one distinct row of the product matrix, without revealing its input to the other players. We first improve on a weighted average protocol, in order to securely compute a dot-product with a quadratic volume of communications and linear number of rounds. We also propose a…
▽ More
This paper deals with distributed matrix multiplication. Each player owns only one row of both matrices and wishes to learn about one distinct row of the product matrix, without revealing its input to the other players. We first improve on a weighted average protocol, in order to securely compute a dot-product with a quadratic volume of communications and linear number of rounds. We also propose a protocol with five communication rounds, using a Paillier-like underlying homomorphic public key cryptosystem, which is secure in the semi-honest model or secure with high probability in the malicious adversary model. Using ProVerif, a cryptographic protocol verification tool, we are able to check the security of the protocol and provide a countermeasure for each attack found by the tool. We also give a randomization method to avoid collusion attacks. As an application, we show that this protocol enables a distributed and secure evaluation of trust relationships in a network, for a large class of trust evaluation schemes.
△ Less
Submitted 13 July, 2016;
originally announced July 2016.
-
Physical Zero-Knowledge Proofs for Akari, Takuzu, Kakuro and KenKen
Authors:
Xavier Bultel,
Jannik Dreier,
Jean-Guillaume Dumas,
Pascal Lafourcade
Abstract:
Akari, Takuzu, Kakuro and KenKen are logic games similar to Sudoku. In Akari, a labyrinth on a grid has to be lit by placing lanterns, respecting various constraints. In Takuzu a grid has to be filled with 0's and 1's, while respecting certain constraints. In Kakuro a grid has to be filled with numbers such that the sums per row and column match given values; similarly in KenKen a grid has to be f…
▽ More
Akari, Takuzu, Kakuro and KenKen are logic games similar to Sudoku. In Akari, a labyrinth on a grid has to be lit by placing lanterns, respecting various constraints. In Takuzu a grid has to be filled with 0's and 1's, while respecting certain constraints. In Kakuro a grid has to be filled with numbers such that the sums per row and column match given values; similarly in KenKen a grid has to be filled with numbers such that in given areas the product, sum, difference or quotient equals a given value. We give physical algorithms to realize zero-knowledge proofs for these games which allow a player to show that he knows a solution without revealing it. These interactive proofs can be realized with simple office material as they only rely on cards and envelopes. Moreover, we formalize our algorithms and prove their security.
△ Less
Submitted 3 June, 2016;
originally announced June 2016.
-
Brandt's Fully Private Auction Protocol Revisited
Authors:
Jannik Dreier,
Jean-Guillaume Dumas,
Pascal Lafourcade
Abstract:
Auctions have a long history, having been recorded as early as 500 B.C. Nowadays, electronic auctions have been a great success and are increasingly used. Many cryptographic protocols have been proposed to address the various security requirements of these electronic transactions, in particular to ensure privacy. Brandt developed a protocol that computes the winner using homomorphic operations on…
▽ More
Auctions have a long history, having been recorded as early as 500 B.C. Nowadays, electronic auctions have been a great success and are increasingly used. Many cryptographic protocols have been proposed to address the various security requirements of these electronic transactions, in particular to ensure privacy. Brandt developed a protocol that computes the winner using homomorphic operations on a distributed ElGamal encryption of the bids. He claimed that it ensures full privacy of the bidders, i.e. no information apart from the winner and the winning price is leaked. We first show that this protocol -- when using malleable interactive zero-knowledge proofs -- is vulnerable to attacks by dishonest bidders. Such bidders can manipulate the publicly available data in a way that allows the seller to deduce all participants' bids. Additionally we discuss some issues with verifiability as well as attacks on non-repudiation, fairness and the privacy of individual bidders exploiting authentication problems.
△ Less
Submitted 14 May, 2013; v1 submitted 25 October, 2012;
originally announced October 2012.
-
Benaloh's Dense Probabilistic Encryption Revisited
Authors:
Laurent Fousse,
Pascal Lafourcade,
Mohamed Alnuaimi
Abstract:
In 1994, Josh Benaloh proposed a probabilistic homomorphic encryption scheme, enhancing the poor expansion factor provided by Goldwasser and Micali's scheme. Since then, numerous papers have taken advantage of Benaloh's homomorphic encryption function, including voting schemes, computing multi-party trust privately, non-interactive verifiable secret sharing, online poker... In this paper we show t…
▽ More
In 1994, Josh Benaloh proposed a probabilistic homomorphic encryption scheme, enhancing the poor expansion factor provided by Goldwasser and Micali's scheme. Since then, numerous papers have taken advantage of Benaloh's homomorphic encryption function, including voting schemes, computing multi-party trust privately, non-interactive verifiable secret sharing, online poker... In this paper we show that the original description of the scheme is incorrect, possibly resulting in ambiguous decryption of ciphertexts. We give a corrected description of the scheme and provide a complete proof of correctness. We also compute the probability of failure of the original scheme. Finally we analyze several applications using Benaloh's encryption scheme. We show in each case the impact of a bad choice in the key generation phase of Benaloh's scheme. For instance in the application of e-voting protocol, it can inverse the result of an election, which is a non negligible consequence.
△ Less
Submitted 14 September, 2010; v1 submitted 17 August, 2010;
originally announced August 2010.
-
How to prevent type-flaw attacks on security protocols under algebraic properties
Authors:
Sreekanth Malladi,
Pascal Lafourcade
Abstract:
Type-flaw attacks upon security protocols wherein agents are led to misinterpret message types have been reported frequently in the literature. Preventing them is crucial for protocol security and verification. Heather et al. proved that tagging every message field with it's type prevents all type-flaw attacks under a free message algebra and perfect encryption system. In this paper, we prove that…
▽ More
Type-flaw attacks upon security protocols wherein agents are led to misinterpret message types have been reported frequently in the literature. Preventing them is crucial for protocol security and verification. Heather et al. proved that tagging every message field with it's type prevents all type-flaw attacks under a free message algebra and perfect encryption system. In this paper, we prove that type-flaw attacks can be prevented with the same technique even under the ACUN algebraic properties of XOR which is commonly used in "real-world" protocols such as SSL 3.0. Our proof method is general and can be easily extended to other monoidal operators that possess properties such as Inverse and Idempotence as well. We also discuss how tagging could be used to prevent type-flaw attacks under other properties such as associativity of pairing, commutative encryption, prefix property and homomorphic encryption.
△ Less
Submitted 28 March, 2010;
originally announced March 2010.
-
The NAO humanoid: a combination of performance and affordability
Authors:
David Gouaillier,
Vincent Hugel,
Pierre Blazevic,
Chris Kilner,
Jerome Monceaux,
Pascal Lafourcade,
Brice Marnier,
Julien Serre,
Bruno Maisonnier
Abstract:
This article presents the design of the autonomous humanoid robot called NAO that is built by the French company Aldebaran-Robotics. With its height of 0.57 m and its weight about 4.5 kg, this innovative robot is lightweight and compact. It distinguishes itself from its existing Japanese, American, and other counterparts thanks to its pelvis kinematics design, its proprietary actuation system ba…
▽ More
This article presents the design of the autonomous humanoid robot called NAO that is built by the French company Aldebaran-Robotics. With its height of 0.57 m and its weight about 4.5 kg, this innovative robot is lightweight and compact. It distinguishes itself from its existing Japanese, American, and other counterparts thanks to its pelvis kinematics design, its proprietary actuation system based on brush DC motors, its electronic, computer and distributed software architectures. This robot has been designed to be affordable without sacrificing quality and performance. It is an open and easy-to-handle platform where the user can change all the embedded system software or just add some applications to make the robot adopt specific behaviours. The robot's head and forearms are modular and can be changed to promote further evolution. The comprehensive and functional design is one of the reasons that helped select NAO to replace the AIBO quadrupeds in the 2008 RoboCup standard league.
△ Less
Submitted 21 September, 2008; v1 submitted 21 July, 2008;
originally announced July 2008.