Skip to main content

Showing 1–10 of 10 results for author: Tholoniat, P

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.16719  [pdf, other

    cs.CR

    Alistair: Efficient On-device Budgeting for Differentially-Private Ad-Measurement Systems

    Authors: Pierre Tholoniat, Kelly Kostopoulou, Peter McNeely, Prabhpreet Singh Sodhi, Anirudh Varanasi, Benjamin Case, Asaf Cidon, Roxana Geambasu, Mathias Lécuyer

    Abstract: With the impending removal of third-party cookies from major browsers and the introduction of new privacy-preserving advertising APIs, the research community has a timely opportunity to assist industry in qualitatively improving the Web's privacy. This paper discusses our efforts, within a W3C community group, to enhance existing privacy-preserving advertising measurement APIs. We analyze designs… ▽ More

    Submitted 12 July, 2024; v1 submitted 26 May, 2024; originally announced May 2024.

    Comments: added section 3.3 Algorithm

  2. arXiv:2402.07334  [pdf, other

    cs.CR cs.LG

    Differentially Private Training of Mixture of Experts Models

    Authors: Pierre Tholoniat, Huseyin A. Inan, Janardhan Kulkarni, Robert Sim

    Abstract: This position paper investigates the integration of Differential Privacy (DP) in the training of Mixture of Experts (MoE) models within the field of natural language processing. As Large Language Models (LLMs) scale to billions of parameters, leveraging expansive datasets, they exhibit enhanced linguistic capabilities and emergent abilities. However, this growth raises significant computational an… ▽ More

    Submitted 11 February, 2024; originally announced February 2024.

    Comments: Preliminary work presented as a poster at the 5th AAAI Workshop on Privacy-Preserving Artificial Intelligence (PPAI 24)

  3. Turbo: Effective Caching in Differentially-Private Databases

    Authors: Kelly Kostopoulou, Pierre Tholoniat, Asaf Cidon, Roxana Geambasu, Mathias Lécuyer

    Abstract: Differentially-private (DP) databases allow for privacy-preserving analytics over sensitive datasets or data streams. In these systems, user privacy is a limited resource that must be conserved with each query. We propose Turbo, a novel, state-of-the-art caching layer for linear query workloads over DP databases. Turbo builds upon private multiplicative weights (PMW), a DP mechanism that is powerf… ▽ More

    Submitted 23 October, 2023; v1 submitted 28 June, 2023; originally announced June 2023.

    Comments: Extended version of a paper presented at the 29th ACM Symposium on Operating Systems Principles (SOSP '23)

  4. arXiv:2212.13228  [pdf, other

    cs.CR cs.LG

    Packing Privacy Budget Efficiently

    Authors: Pierre Tholoniat, Kelly Kostopoulou, Mosharaf Chowdhury, Asaf Cidon, Roxana Geambasu, Mathias Lécuyer, Junfeng Yang

    Abstract: Machine learning (ML) models can leak information about users, and differential privacy (DP) provides a rigorous way to bound that leakage under a given budget. This DP budget can be regarded as a new type of compute resource in workloads of multiple ML models training on user data. Once it is used, the DP budget is forever consumed. Therefore, it is crucial to allocate it most efficiently to trai… ▽ More

    Submitted 26 December, 2022; originally announced December 2022.

  5. arXiv:2206.04489  [pdf, ps, other

    cs.CR cs.DC cs.FL

    Holistic Verification of Blockchain Consensus

    Authors: Nathalie Bertrand, Vincent Gramoli, Igor Konnov, Marijana Lazić, Pierre Tholoniat, Josef Widder

    Abstract: Blockchain has recently attracted the attention of the industry due, in part, to its ability to automate asset transfers. It requires distributed participants to reach a consensus on a block despite the presence of malicious (a.k.a. Byzantine) participants. Malicious participants exploit regularly weaknesses of these blockchain consensus algorithms, with sometimes devastating consequences. In fact… ▽ More

    Submitted 9 June, 2022; originally announced June 2022.

  6. arXiv:2106.15335  [pdf, other

    cs.CR cs.DC cs.LG

    Privacy Budget Scheduling

    Authors: Tao Luo, Mingen Pan, Pierre Tholoniat, Asaf Cidon, Roxana Geambasu, Mathias Lécuyer

    Abstract: Machine learning (ML) models trained on personal data have been shown to leak information about users. Differential privacy (DP) enables model training with a guaranteed bound on this leakage. Each new model trained with DP increases the bound on data leakage and can be seen as consuming part of a global privacy budget that should not be exceeded. This budget is a scarce resource that must be care… ▽ More

    Submitted 29 June, 2021; originally announced June 2021.

    Comments: Extended version of a paper presented at the 15th USENIX Symposium on Operating Systems Design and Implementation (OSDI '21)

  7. Feasibility of Cross-Chain Payment with Success Guarantees

    Authors: Rob van Glabbeek, Vincent Gramoli, Pierre Tholoniat

    Abstract: We consider the problem of cross-chain payment whereby customers of different escrows---implemented by a bank or a blockchain smart contract---successfully transfer digital assets without trusting each other. Prior to this work, cross-chain payment problems did not require this success, or any form of progress. We demonstrate that it is possible to solve this problem when assuming synchrony, in th… ▽ More

    Submitted 16 July, 2020; originally announced July 2020.

    Comments: This is a summary of the work reported in arXiv:1912.04513

    ACM Class: C.2.4; D.2.4; F.1.1; F.1.2

    Journal ref: Proc. 32nd ACM Symposium on Parallelism in Algorithms and Architectures, SPAA'20, July 2020, pp. 579-581

  8. arXiv:2006.04593  [pdf, other

    cs.LG cs.CR stat.ML

    ARIANN: Low-Interaction Privacy-Preserving Deep Learning via Function Secret Sharing

    Authors: Théo Ryffel, Pierre Tholoniat, David Pointcheval, Francis Bach

    Abstract: We propose AriaNN, a low-interaction privacy-preserving framework for private neural network training and inference on sensitive data. Our semi-honest 2-party computation protocol (with a trusted dealer) leverages function secret sharing, a recent lightweight cryptographic protocol that allows us to achieve an efficient online phase. We design optimized primitives for the building blocks of neural… ▽ More

    Submitted 28 October, 2021; v1 submitted 8 June, 2020; originally announced June 2020.

    Comments: 26 pages

  9. arXiv:1912.04513  [pdf, other

    cs.DC cs.LO

    Cross-Chain Payment Protocols with Success Guarantees

    Authors: Rob van Glabbeek, Vincent Gramoli, Pierre Tholoniat

    Abstract: In this paper, we consider the problem of cross-chain payment whereby customers of different escrows -- implemented by a bank or a blockchain smart contract -- successfully transfer digital assets without trusting each other. Prior to this work, cross-chain payment problems did not require this success or any form of progress. We introduce a new specification formalism called Asynchronous Networks… ▽ More

    Submitted 10 December, 2019; originally announced December 2019.

  10. arXiv:1909.07453  [pdf, other

    cs.DC

    Formal Verification of Blockchain Byzantine Fault Tolerance

    Authors: Pierre Tholoniat, Vincent Gramoli

    Abstract: To implement a blockchain, the trend is now to integrate a non-trivial Byzantine fault tolerant consensus algorithm instead of the seminal idea of waiting to receive blocks to decide upon the longest branch. After a decade of existence, blockchains trade now large amounts of valuable assets and a simple disagreement could lead to disastrous losses. Unfortunately, Byzantine consensus solutions used… ▽ More

    Submitted 14 October, 2019; v1 submitted 16 September, 2019; originally announced September 2019.