Skip to main content

Showing 1–5 of 5 results for author: Jahanara, M

.
  1. arXiv:2404.08158  [pdf, ps, other

    cs.CC cs.DS cs.LG

    On the Power of Interactive Proofs for Learning

    Authors: Tom Gur, Mohammad Mahdi Jahanara, Mohammad Mahdi Khodabandeh, Ninad Rajgopal, Bahar Salamatian, Igor Shinkar

    Abstract: We continue the study of doubly-efficient proof systems for verifying agnostic PAC learning, for which we obtain the following results. - We construct an interactive protocol for learning the $t$ largest Fourier characters of a given function $f \colon \{0,1\}^n \to \{0,1\}$ up to an arbitrarily small error, wherein the verifier uses $\mathsf{poly}(t)$ random examples. This improves upon the Int… ▽ More

    Submitted 11 April, 2024; originally announced April 2024.

    Comments: 58 pages, To appear in STOC 2024

  2. arXiv:2402.15293  [pdf, other

    cs.CR

    SoK: What don't we know? Understanding Security Vulnerabilities in SNARKs

    Authors: Stefanos Chaliasos, Jens Ernstberger, David Theodore, David Wong, Mohammad Jahanara, Benjamin Livshits

    Abstract: Zero-knowledge proofs (ZKPs) have evolved from being a theoretical concept providing privacy and verifiability to having practical, real-world implementations, with SNARKs (Succinct Non-Interactive Argument of Knowledge) emerging as one of the most significant innovations. Prior work has mainly focused on designing more efficient SNARK systems and providing security proofs for them. Many think of… ▽ More

    Submitted 11 July, 2024; v1 submitted 23 February, 2024; originally announced February 2024.

  3. arXiv:2201.12648  [pdf, other

    cs.LG cs.CR cs.DS

    Private Boosted Decision Trees via Smooth Re-Weighting

    Authors: Vahid R. Asadi, Marco L. Carmosino, Mohammadmahdi Jahanara, Akbar Rafiey, Bahar Salamatian

    Abstract: Protecting the privacy of people whose data is used by machine learning algorithms is important. Differential Privacy is the appropriate mathematical framework for formal guarantees of privacy, and boosted decision trees are a popular machine learning technique. So we propose and test a practical algorithm for boosting decision trees that guarantees differential privacy. Privacy is enforced becaus… ▽ More

    Submitted 29 January, 2022; originally announced January 2022.

  4. arXiv:2009.04892  [pdf, ps, other

    cs.CC

    Toward Probabilistic Checking against Non-Signaling Strategies with Constant Locality

    Authors: Mohammad Mahdi Jahanara, Sa** Koroth, Igor Shinkar

    Abstract: Non-signaling strategies are a generalization of quantum strategies that have been studied in physics over the past three decades. Recently, they have found applications in theoretical computer science, including to proving inapproximability results for linear programming and to constructing protocols for delegating computation. A central tool for these applications is probabilistically checkable… ▽ More

    Submitted 10 September, 2020; originally announced September 2020.

  5. arXiv:1806.07583  [pdf, ps, other

    cs.CR

    UniqueID: Decentralized Proof-of-Unique-Human

    Authors: MohammadJavad Hajialikhani, MohammadMahdi Jahanara

    Abstract: Bitcoin and Ethereum are novel mechanisms for decentralizing the concept of money and computation. Extending decentralization to the human identity concept, we can think of using blockchain for creating a list of verified human identities with a one-person-one-ID property. UniqueID is a Decentralized Autonomous Organization(DAO) for maintaining human identities such that every physical human entit… ▽ More

    Submitted 20 June, 2018; originally announced June 2018.

    Comments: 9 pages