Skip to main content

Showing 1–13 of 13 results for author: Persiano, G

Searching in archive cs. Search in all archives.
.
  1. arXiv:2308.16042  [pdf, ps, other

    cs.DS

    Optimal Non-Adaptive Cell Probe Dictionaries and Hashing

    Authors: Kasper Green Larsen, Rasmus Pagh, Giuseppe Persiano, Toniann Pitassi, Kevin Yeo, Or Zamir

    Abstract: We present a simple and provably optimal non-adaptive cell probe data structure for the static dictionary problem. Our data structure supports storing a set of n key-value pairs from [u]x[u] using s words of space and answering key lookup queries in t = O(lg(u/n)/ lg(s/n)) nonadaptive probes. This generalizes a solution to the membership problem (i.e., where no values are associated with keys) due… ▽ More

    Submitted 19 April, 2024; v1 submitted 30 August, 2023; originally announced August 2023.

    Comments: Appears at ICALP 2024. This paper is a merge and revision of two previous reports [PY20] and [LPPZ23]

  2. arXiv:2001.05053   

    cs.DS

    Tight Static Lower Bounds for Non-Adaptive Data Structures

    Authors: Giuseppe Persiano, Kevin Yeo

    Abstract: In this paper, we study the static cell probe complexity of non-adaptive data structures that maintain a subset of $n$ points from a universe consisting of $m=n^{1+Ω(1)}$ points. A data structure is defined to be non-adaptive when the memory locations that are chosen to be accessed during a query depend only on the query inputs and not on the contents of memory. We prove an… ▽ More

    Submitted 17 April, 2024; v1 submitted 14 January, 2020; originally announced January 2020.

    Comments: This paper has been superceded and merged with arXiv:2308.16042

  3. arXiv:1904.05452  [pdf, ps, other

    cs.CR cs.DS

    What Storage Access Privacy is Achievable with Small Overhead?

    Authors: Sarvar Patel, Giuseppe Persiano, Kevin Yeo

    Abstract: Oblivious RAM (ORAM) and private information retrieval (PIR) are classic cryptographic primitives used to hide the access pattern to data whose storage has been outsourced to an untrusted server. Unfortunately, both primitives require considerable overhead compared to plaintext access. For large-scale storage infrastructure with highly frequent access requests, the degradation in response time and… ▽ More

    Submitted 10 April, 2019; originally announced April 2019.

    Comments: To appear at PODS'19

  4. arXiv:1901.10221  [pdf, other

    cs.CR

    Secure selections on encrypted multi-writer streams

    Authors: Angelo Massimo Perillo, Giuseppe Persiano, Alberto Trombetta

    Abstract: Performing searches over encrypted data is a very current and active area. Several efficient solutions have been provided for the single-writer scenario in which all sensitive data originates with one party (the Data Owner) that encrypts it and uploads it to a public repository. Subsequently the Data Owner (or authorized clients, the Query Sources) accesses the encrypted data through a Query Proce… ▽ More

    Submitted 9 October, 2019; v1 submitted 29 January, 2019; originally announced January 2019.

    Comments: 31 pages, 1 figure

  5. arXiv:1705.07069  [pdf, other

    cs.CR cs.DC cs.DS

    CacheShuffle: An Oblivious Shuffle Algorithm Using Caches

    Authors: Sarvar Patel, Giuseppe Persiano, Kevin Yeo

    Abstract: We consider Oblivious Shuffling and K-Oblivious Shuffling, a refinement thereof. We provide efficient algorithms for both and discuss their application to the design of Oblivious RAM. The task of K-Oblivious Shuffling is to obliviously shuffle N encrypted blocks that have been randomly allocated on the server in such a way that an adversary learns nothing about the new allocation of blocks. The se… ▽ More

    Submitted 17 October, 2017; v1 submitted 19 May, 2017; originally announced May 2017.

    Comments: 29 pages, 4 figures

  6. arXiv:1603.02971  [pdf, ps, other

    cs.GT cs.DS cs.MA cs.SI

    Discrete Preference Games in Heterogeneous Social Networks: Subverted Majorities and the Swing Player

    Authors: Vincenzo Auletta, Ioannis Caragiannis, Diodato Ferraioli, Clemente Galdi, Giuseppe Persiano

    Abstract: We study discrete preference games in heterogeneous social networks. These games model the interplay between a player's private belief and his/her publicly stated opinion (which could be different from the player's belief) as a strategic game in which the players' strategies are the opinions and the cost of an opinion in a state is a convex combination through a parameter $α\in[0,1]$ of two factor… ▽ More

    Submitted 9 March, 2016; originally announced March 2016.

  7. arXiv:1403.2514  [pdf, other

    cs.CR

    Answering queries using pairings

    Authors: Alberto Trombetta, Giuseppe Persiano, Stefano Braghin

    Abstract: Outsourcing data in the cloud has become nowadays very common. Since -- generally speaking -- cloud data storage and management providers cannot be fully trusted, mechanisms providing the confidentiality of the stored data are necessary. A possible solution is to encrypt all the data, but -- of course -- this poses serious problems about the effective usefulness of the stored data. In this work, w… ▽ More

    Submitted 11 March, 2014; originally announced March 2014.

    Comments: 18 pages, 5 figures

  8. arXiv:1402.4050  [pdf, ps, other

    cs.GT cs.DS cs.MA cs.SI

    Minority Becomes Majority in Social Networks

    Authors: Vincenzo Auletta, Ioannis Caragiannis, Diodato Ferraioli, Clemente Galdi, Giuseppe Persiano

    Abstract: It is often observed that agents tend to imitate the behavior of their neighbors in a social network. This imitating behavior might lead to the strategic decision of adopting a public behavior that differs from what the agent believes is the right one and this can subvert the behavior of the population as a whole. In this paper, we consider the case in which agents express preferences over two a… ▽ More

    Submitted 1 October, 2015; v1 submitted 17 February, 2014; originally announced February 2014.

    Comments: To appear in WINE 2015

  9. arXiv:1307.2756  [pdf, other

    cs.CR cs.SI

    Secure and Policy-Private Resource Sharing in an Online Social Network

    Authors: Stefano Braghin, Vincenzo Iovino, Giuseppe Persiano, Alberto Trombetta

    Abstract: Providing functionalities that allow online social network users to manage in a secure and private way the publication of their information and/or resources is a relevant and far from trivial topic that has been under scrutiny from various research communities. In this work, we provide a framework that allows users to define highly expressive access policies to their resources in a way that the en… ▽ More

    Submitted 10 July, 2013; originally announced July 2013.

  10. arXiv:1212.1884  [pdf, ps, other

    cs.GT cs.DM cs.DS

    Convergence to Equilibrium of Logit Dynamics for Strategic Games

    Authors: Vincenzo Auletta, Diodato Ferraioli, Francesco Pasquale, Paolo Penna, Giuseppe Persiano

    Abstract: We present the first general bounds on the mixing time of the Markov chain associated to the logit dynamics for wide classes of strategic games. The logit dynamics with inverse noise beta describes the behavior of a complex system whose individual components act selfishly and keep responding according to some partial ("noisy") knowledge of the system, where the capacity of the agent to know the sy… ▽ More

    Submitted 11 December, 2012; v1 submitted 9 December, 2012; originally announced December 2012.

  11. arXiv:1207.2908  [pdf, ps, other

    cs.GT cs.DM

    Logit Dynamics with Concurrent Updates for Local-Interaction Games

    Authors: Vincenzo Auletta, Diodato Ferraioli, Francesco Pasquale, Paolo Penna, Giuseppe Persiano

    Abstract: Logit choice dynamics are a family of randomized best response dynamics based on the logit choice function [McFadden, 1974], used for modeling players with limited rationality and knowledge. In this paper we study the all-logit dynamics, where at each time step all players concurrently update their strategies according to the logit choice function. In the well studied one-logit dynamics [Blume, 19… ▽ More

    Submitted 30 December, 2013; v1 submitted 12 July, 2012; originally announced July 2012.

  12. arXiv:1107.4537  [pdf, ps, other

    cs.GT

    Metastability of Logit Dynamics for Coordination Games

    Authors: Vincenzo Auletta, Diodato Ferraioli, Francesco Pasquale, Giuseppe Persiano

    Abstract: Logit Dynamics [Blume, Games and Economic Behavior, 1993] are randomized best response dynamics for strategic games: at every time step a player is selected uniformly at random and she chooses a new strategy according to a probability distribution biased toward strategies promising higher payoffs. This process defines an ergodic Markov chain, over the set of strategy profiles of the game, whose un… ▽ More

    Submitted 30 May, 2017; v1 submitted 22 July, 2011; originally announced July 2011.

  13. Mixing Time and Stationary Expected Social Welfare of Logit Dynamics

    Authors: Vincenzo Auletta, Diodato Ferraioli, Francesco Pasquale, Giuseppe Persiano

    Abstract: We study "logit dynamics" [Blume, Games and Economic Behavior, 1993] for strategic games. This dynamics works as follows: at every stage of the game a player is selected uniformly at random and she plays according to a "noisy" best-response where the noise level is tuned by a parameter $β$. Such a dynamics defines a family of ergodic Markov chains, indexed by $β$, over the set of strategy profiles… ▽ More

    Submitted 23 May, 2011; v1 submitted 18 February, 2010; originally announced February 2010.

    Comments: 28 pages