Theoretical Computer Science最新文献

筛选
英文 中文
Private least absolute deviations with heavy-tailed data
IF 0.9 4区 计算机科学
Theoretical Computer Science Pub Date : 2025-01-13 DOI: 10.1016/j.tcs.2025.115071
Di Wang , Jinhui Xu
{"title":"Private least absolute deviations with heavy-tailed data","authors":"Di Wang ,&nbsp;Jinhui Xu","doi":"10.1016/j.tcs.2025.115071","DOIUrl":"10.1016/j.tcs.2025.115071","url":null,"abstract":"<div><div>We study the problem of Differentially Private Stochastic Convex Optimization (DPSCO) with heavy-tailed data. Specifically, we focus on the problem of Least Absolute Deviations, i.e., <span><math><msub><mrow><mi>ℓ</mi></mrow><mrow><mn>1</mn></mrow></msub></math></span>-norm linear regression, in the <em>ϵ</em>-DP model. While most previous work focuses on the case where the loss function is Lipschitz, in this paper we only need to assume the variates have bounded moments. Firstly, we study the case where the <span><math><msub><mrow><mi>ℓ</mi></mrow><mrow><mn>2</mn></mrow></msub></math></span> norm of data has a bounded second-order moment. We propose an algorithm that is based on the exponential mechanism and show that it is possible to achieve an upper bound of <span><math><mover><mrow><mi>O</mi></mrow><mrow><mo>˜</mo></mrow></mover><mo>(</mo><msqrt><mrow><mfrac><mrow><mi>d</mi></mrow><mrow><mi>n</mi><mi>ϵ</mi></mrow></mfrac></mrow></msqrt><mo>)</mo></math></span> (with high probability). Next, we relax the assumption to bounded <em>θ</em>-th order moment with some <span><math><mi>θ</mi><mo>∈</mo><mo>(</mo><mn>1</mn><mo>,</mo><mn>2</mn><mo>)</mo></math></span> and show that it is possible to achieve an upper bound of <span><math><mover><mrow><mi>O</mi></mrow><mrow><mo>˜</mo></mrow></mover><mo>(</mo><msup><mrow><mo>(</mo><mfrac><mrow><mi>d</mi></mrow><mrow><mi>n</mi><mi>ϵ</mi></mrow></mfrac><mo>)</mo></mrow><mrow><mfrac><mrow><mi>θ</mi><mo>−</mo><mn>1</mn></mrow><mrow><mi>θ</mi></mrow></mfrac></mrow></msup><mo>)</mo></math></span>. Our algorithms can also be extended to more relaxed cases where only each coordinate of the data has bounded moments, and we can get an upper bound of <span><math><mover><mrow><mi>O</mi></mrow><mrow><mo>˜</mo></mrow></mover><mo>(</mo><mfrac><mrow><mi>d</mi></mrow><mrow><msqrt><mrow><mi>n</mi><mi>ϵ</mi></mrow></msqrt></mrow></mfrac><mo>)</mo></math></span> and <span><math><mover><mrow><mi>O</mi></mrow><mrow><mo>˜</mo></mrow></mover><mo>(</mo><mfrac><mrow><mi>d</mi></mrow><mrow><msup><mrow><mo>(</mo><mi>n</mi><mi>ϵ</mi><mo>)</mo></mrow><mrow><mfrac><mrow><mi>θ</mi><mo>−</mo><mn>1</mn></mrow><mrow><mi>θ</mi></mrow></mfrac></mrow></msup></mrow></mfrac><mo>)</mo></math></span> in the second and <em>θ</em>-th moment case respectively.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1030 ","pages":"Article 115071"},"PeriodicalIF":0.9,"publicationDate":"2025-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143305539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the computational and descriptional complexity of multi-pattern languages
IF 0.9 4区 计算机科学
Theoretical Computer Science Pub Date : 2025-01-10 DOI: 10.1016/j.tcs.2025.115063
Jingnan Xie , Harry B. Hunt III , Richard E. Stearns
{"title":"On the computational and descriptional complexity of multi-pattern languages","authors":"Jingnan Xie ,&nbsp;Harry B. Hunt III ,&nbsp;Richard E. Stearns","doi":"10.1016/j.tcs.2025.115063","DOIUrl":"10.1016/j.tcs.2025.115063","url":null,"abstract":"<div><div>We study the complexity of a restricted version of the universality problem: testing equivalence to <span><math><msup><mrow><mo>{</mo><mn>0</mn><mo>,</mo><mn>1</mn><mo>}</mo></mrow><mrow><mo>⁎</mo></mrow></msup></math></span> for languages that are either <span><math><msup><mrow><mo>{</mo><mn>0</mn><mo>,</mo><mn>1</mn><mo>}</mo></mrow><mrow><mo>⁎</mo></mrow></msup></math></span> or <span><math><msup><mrow><mo>{</mo><mn>0</mn><mo>,</mo><mn>1</mn><mo>}</mo></mrow><mrow><mo>⁎</mo></mrow></msup><mo>−</mo><mo>{</mo><mi>w</mi><mo>}</mo></math></span> where <span><math><mi>w</mi><mo>∈</mo><msup><mrow><mo>{</mo><mn>0</mn><mo>,</mo><mn>1</mn><mo>}</mo></mrow><mrow><mo>⁎</mo></mrow></msup></math></span>. We show that this restricted problem for multi-pattern languages (MPL) is NP-hard, and for multi-pattern languages with regular substitutions (MPL<sub>REG</sub>) is not recursively enumerable. Moreover, this undecidability result holds for any class of languages that effectively contains <span><math><mo>{</mo><mi>w</mi><mi>#</mi><mi>w</mi><mspace></mspace><mo>|</mo><mspace></mspace><mi>w</mi><mo>∈</mo><msup><mrow><mo>{</mo><mn>0</mn><mo>,</mo><mn>1</mn><mo>}</mo></mrow><mrow><mo>⁎</mo></mrow></msup><mo>}</mo></math></span>, and is effectively closed under union, and concatenation with regular sets. Consequently, it has broad applicability and extends to many generalizations of regular languages. Sufficient conditions are then presented for a language predicate to be as hard as the restricted universality problem. By applying these conditions, we develop a uniform method for showing undecidability and complexity results simultaneously via highly efficient many-one reductions. In addition, the properties of this restricted universality problem can be used to investigate the descriptional complexity of multi-patterns. We show that the trade-off between multi-patterns and regular expressions is not exponential-size bounded. Non-recursive trade-offs between multi-patterns (or multi-patterns with regular substitutions) and numerous classes of language descriptors are also established.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1030 ","pages":"Article 115063"},"PeriodicalIF":0.9,"publicationDate":"2025-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143306088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluating the reliability of complete Josephus cubes under extra link fault with the optimal solution of the edge isoperimetric problem
IF 0.9 4区 计算机科学
Theoretical Computer Science Pub Date : 2025-01-09 DOI: 10.1016/j.tcs.2025.115064
Sufang Liu , Zhaoman Huang , Yueke Lv , Chia-Wei Lee
{"title":"Evaluating the reliability of complete Josephus cubes under extra link fault with the optimal solution of the edge isoperimetric problem","authors":"Sufang Liu ,&nbsp;Zhaoman Huang ,&nbsp;Yueke Lv ,&nbsp;Chia-Wei Lee","doi":"10.1016/j.tcs.2025.115064","DOIUrl":"10.1016/j.tcs.2025.115064","url":null,"abstract":"<div><div>The <em>h</em>-extra edge-connectivity of a connected graph <em>G</em> <span><math><msub><mrow><mi>λ</mi></mrow><mrow><mi>h</mi></mrow></msub><mo>(</mo><mi>G</mi><mo>)</mo></math></span>, as a generalization of the classic Menger's Theorem, is the minimum number of edges that need to be removed to disconnect graph <em>G</em> and ensure that each component of the remaining graph has at least <em>h</em> vertices. This paper focuses on the reliability of the <em>h</em>-extra edge-connectivity of the complete Josephus cube <span><math><mi>C</mi><mi>J</mi><msub><mrow><mi>C</mi></mrow><mrow><mi>n</mi></mrow></msub></math></span> interconnection network, a variant of <span><math><msub><mrow><mi>Q</mi></mrow><mrow><mi>n</mi></mrow></msub></math></span>, as the underlying topology, denoted as <span><math><msub><mrow><mi>λ</mi></mrow><mrow><mi>h</mi></mrow></msub><mo>(</mo><mi>C</mi><mi>J</mi><msub><mrow><mi>C</mi></mrow><mrow><mi>n</mi></mrow></msub><mo>)</mo></math></span>. By analyzing the properties of the optimal solution of the edge isoperimetric problem on <span><math><mi>C</mi><mi>J</mi><msub><mrow><mi>C</mi></mrow><mrow><mi>n</mi></mrow></msub></math></span>, the exact value and the <span><math><msub><mrow><mi>λ</mi></mrow><mrow><mi>h</mi></mrow></msub></math></span>-optimality of the <span><math><msub><mrow><mi>λ</mi></mrow><mrow><mi>h</mi></mrow></msub><mo>(</mo><mi>C</mi><mi>J</mi><msub><mrow><mi>C</mi></mrow><mrow><mi>n</mi></mrow></msub><mo>)</mo></math></span> for <span><math><mn>1</mn><mo>≤</mo><mi>h</mi><mo>≤</mo><msup><mrow><mn>2</mn></mrow><mrow><mo>⌊</mo><mi>n</mi><mo>/</mo><mn>2</mn><mo>⌋</mo><mo>+</mo><mn>1</mn></mrow></msup></math></span> is characterized. For a sufficiently large positive integer <em>n</em>, about 44.44% of positive integers <em>h</em> in the well-defined interval <span><math><mn>1</mn><mo>≤</mo><mi>h</mi><mo>≤</mo><msup><mrow><mn>2</mn></mrow><mrow><mi>n</mi><mo>−</mo><mn>1</mn></mrow></msup></math></span>, the corresponding <span><math><msub><mrow><mi>λ</mi></mrow><mrow><mi>h</mi></mrow></msub><mo>(</mo><mi>C</mi><mi>J</mi><msub><mrow><mi>C</mi></mrow><mrow><mi>n</mi></mrow></msub><mo>)</mo></math></span> occurs a concentration phenomenon.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1030 ","pages":"Article 115064"},"PeriodicalIF":0.9,"publicationDate":"2025-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143306089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Feasibility analysis of recurrent DAG tasks is PSPACE-hard
IF 0.9 4区 计算机科学
Theoretical Computer Science Pub Date : 2025-01-08 DOI: 10.1016/j.tcs.2024.115062
Vincenzo Bonifaci , Alberto Marchetti-Spaccamela
{"title":"Feasibility analysis of recurrent DAG tasks is PSPACE-hard","authors":"Vincenzo Bonifaci ,&nbsp;Alberto Marchetti-Spaccamela","doi":"10.1016/j.tcs.2024.115062","DOIUrl":"10.1016/j.tcs.2024.115062","url":null,"abstract":"<div><div>We study a popular task model for scheduling parallel real-time tasks, where the internal parallelism of each task is modeled by a directed acyclic graph (DAG). We show that deciding the feasibility of a set of sporadically recurrent DAG tasks is hard for the complexity class <span>PSPACE</span>, thus ruling out approaches to this problem that rely on Integer Linear Programming or Satisfiability solvers (assuming <span><math><mtext>NP</mtext><mo>≠</mo><mtext>PSPACE</mtext></math></span>).</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1030 ","pages":"Article 115062"},"PeriodicalIF":0.9,"publicationDate":"2025-01-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143306090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Large deviation properties for pattern statistics in primitive rational models
IF 0.9 4区 计算机科学
Theoretical Computer Science Pub Date : 2025-01-07 DOI: 10.1016/j.tcs.2024.115055
Massimiliano Goldwurm, Marco Vignati
{"title":"Large deviation properties for pattern statistics in primitive rational models","authors":"Massimiliano Goldwurm,&nbsp;Marco Vignati","doi":"10.1016/j.tcs.2024.115055","DOIUrl":"10.1016/j.tcs.2024.115055","url":null,"abstract":"<div><div>We present a large deviation property for pattern statistics representing the number of occurrences of a symbol in words of given length generated at random according to a rational stochastic model. This result is proved assuming that the transition matrix of the model is primitive. We show how the rate function of the large deviation property depends on the main eigenvalues and eigenvectors of the transition matrices associated with the different symbols of the alphabet. We also yield general conditions to guarantee that the range of validity of the large deviation estimate coincides with the whole interval <span><math><mo>(</mo><mn>0</mn><mo>,</mo><mn>1</mn><mo>)</mo></math></span>, which represents in our context the largest possible open interval where the property may hold. The case of smaller intervals of validity is finally examined by means of examples.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1030 ","pages":"Article 115055"},"PeriodicalIF":0.9,"publicationDate":"2025-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143306092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Point enclosure problem for homothetic polygons
IF 0.9 4区 计算机科学
Theoretical Computer Science Pub Date : 2025-01-07 DOI: 10.1016/j.tcs.2024.115054
Waseem Akram, Sanjeev Saxena
{"title":"Point enclosure problem for homothetic polygons","authors":"Waseem Akram,&nbsp;Sanjeev Saxena","doi":"10.1016/j.tcs.2024.115054","DOIUrl":"10.1016/j.tcs.2024.115054","url":null,"abstract":"<div><div>In this paper, we investigate the following problem: “given a set <span><math><mi>S</mi></math></span> of <em>n</em> homothetic polygons, preprocess <span><math><mi>S</mi></math></span> to efficiently report all the polygons of <span><math><mi>S</mi></math></span> containing a query point.” A set of polygons is said to be homothetic if each polygon can be obtained from any other polygon in the set using scaling and translation operations. The problem is a counterpart of the homothetic range search problem discussed by Chazelle and Edelsbrunner (1987) <span><span>[9]</span></span>. We show that after preprocessing a set of homothetic polygons with a constant number of vertices, queries can be answered in <span><math><mi>O</mi><mo>(</mo><mi>log</mi><mo>⁡</mo><mi>n</mi><mo>+</mo><mi>k</mi><mo>)</mo></math></span> optimal time, where <em>k</em> is the output size. The preprocessing takes <span><math><mi>O</mi><mo>(</mo><mi>n</mi><mi>log</mi><mo>⁡</mo><mi>n</mi><mo>)</mo></math></span> space and time. We also study the problem in a dynamic setting where insertion and deletion operations are allowed. The results we obtain also hold for <em>c</em>-oriented triangles, where <em>c</em> is a fixed constant.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1030 ","pages":"Article 115054"},"PeriodicalIF":0.9,"publicationDate":"2025-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143305459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An automata-based approach for addressing erroneous behaviors and deadlocks in component-based systems
IF 0.9 4区 计算机科学
Theoretical Computer Science Pub Date : 2025-01-06 DOI: 10.1016/j.tcs.2024.115052
Maria Pittou, George Rahonis
{"title":"An automata-based approach for addressing erroneous behaviors and deadlocks in component-based systems","authors":"Maria Pittou,&nbsp;George Rahonis","doi":"10.1016/j.tcs.2024.115052","DOIUrl":"10.1016/j.tcs.2024.115052","url":null,"abstract":"<div><div>In component-based modeling, a system is built by constructing several coordinating components. In turn, the communication principles among components are modeled by architectures that characterize the permissible interactions and the topology of the components. Several architectures impose also order restrictions to the appearance of the permissible interactions. The application of an architecture to a component-based system does not guarantee that the behaviors of the system meet all the requirements of the architecture. In turn, this can lead the system to actions that do not follow the intended order of the interactions, which we call erroneous behaviors. In this paper, we tackle the problem of such order violations by introducing a formal framework for building component-based systems that avoid erroneous behaviors. For this, we formalize the systems by nondeterministic finite automata and we model their architecture by a fragment of extended propositional interaction logic. This logic achieves to encode the order restrictions in the occurrence of the permissible interactions of the architecture. Given a component-based system with an architecture, we propose an automata-based method for constructing a respective system without erroneous behaviors. Our algorithm returns a system that is also free of deadlocks, meaning that the system does not reach states from which it can no longer progress.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1030 ","pages":"Article 115052"},"PeriodicalIF":0.9,"publicationDate":"2025-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143305537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Extensional concepts in intensional type theory, revisited
IF 0.9 4区 计算机科学
Theoretical Computer Science Pub Date : 2025-01-02 DOI: 10.1016/j.tcs.2024.115051
Krzysztof Kapulkin, Yufeng Li
{"title":"Extensional concepts in intensional type theory, revisited","authors":"Krzysztof Kapulkin,&nbsp;Yufeng Li","doi":"10.1016/j.tcs.2024.115051","DOIUrl":"10.1016/j.tcs.2024.115051","url":null,"abstract":"<div><div>Revisiting a classic result from M. Hofmann's dissertation, we give a direct proof of Morita equivalence, in the sense of V. Isaev, between extensional type theory and intensional type theory extended by the principles of functional extensionality and of uniqueness of identity proofs.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1029 ","pages":"Article 115051"},"PeriodicalIF":0.9,"publicationDate":"2025-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143340393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the complexity of minimizing energy consumption of partitioning DAG tasks
IF 0.9 4区 计算机科学
Theoretical Computer Science Pub Date : 2024-12-31 DOI: 10.1016/j.tcs.2024.115047
Wei Liu , Jian-Jia Chen , Yongjie Yang
{"title":"On the complexity of minimizing energy consumption of partitioning DAG tasks","authors":"Wei Liu ,&nbsp;Jian-Jia Chen ,&nbsp;Yongjie Yang","doi":"10.1016/j.tcs.2024.115047","DOIUrl":"10.1016/j.tcs.2024.115047","url":null,"abstract":"<div><div>We study a graph partition problem where the input is a directed acyclic graph (DAG) representing tasks as vertices and dependencies between tasks as arcs. The goal is to assign the tasks to <em>k</em> heterogeneous machines in a way that minimizes the total energy consumed for completing the tasks. We first show that the problem is <span>NP</span>-hard. Then, we present polynomial-time algorithms for two special cases: one where there are only two machines, and another where the input DAG is a directed path. Finally, we examine a variant where there are only two machines, with one capable of executing a limited number of tasks, and demonstrate that this special case remains computationally hard.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1030 ","pages":"Article 115047"},"PeriodicalIF":0.9,"publicationDate":"2024-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143306091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identity-based matchmaking encryption with stronger security and instantiation on lattices
IF 0.9 4区 计算机科学
Theoretical Computer Science Pub Date : 2024-12-30 DOI: 10.1016/j.tcs.2024.115048
Yuejun Wang , Baocang Wang , Qiqi Lai , Yu Zhan
{"title":"Identity-based matchmaking encryption with stronger security and instantiation on lattices","authors":"Yuejun Wang ,&nbsp;Baocang Wang ,&nbsp;Qiqi Lai ,&nbsp;Yu Zhan","doi":"10.1016/j.tcs.2024.115048","DOIUrl":"10.1016/j.tcs.2024.115048","url":null,"abstract":"<div><div>An identity-based matchmaking encryption (IB-ME) scheme proposed at JOC 2021 supports anonymous but authenticated communications in a way that communication parties can both specify the senders or receivers on the fly. IB-ME is easy to be used in several network applications requiring privacy-preserving for its efficient implementation and special syntax. Despite the rigorous security proofs in previous security models, the existing IB-ME schemes are still possibly vulnerable to some potential neglected attacks. Aiming at the above problems, we provide a stronger security definition of authenticity considering new attacks to fit real-world scenarios and then propose a generic construction of IB-ME satisfying the new model. Inspired by the prior IB-ME construction of Chen et al., the proposed scheme is constructed by combining 2-level anonymous hierarchical IBE (HIBE) and identity-based signature (IBS) schemes. In order to upgrade lattice-based IB-ME with better efficiency, we additionally improve a lattice IBS, as an independent technical contribution, to shorten its signature and thus reduce the final IB-ME ciphertext size. By combining the improved IBS and any 2-level adaptively-secure lattice-based HIBE with anonymity, we finally obtain the <em>first</em> lattice-based IB-ME construction achieving privacy and new-proposed stronger authenticity simultaneously.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1029 ","pages":"Article 115048"},"PeriodicalIF":0.9,"publicationDate":"2024-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143340392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信