Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–6 of 6 results for author: Dembo, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2005.10484  [pdf, other

    cs.CR

    Everything is a Race and Nakamoto Always Wins

    Authors: Amir Dembo, Sreeram Kannan, Ertem Nusret Tas, David Tse, Pramod Viswanath, Xuechao Wang, Ofer Zeitouni

    Abstract: Nakamoto invented the longest chain protocol, and claimed its security by analyzing the private double-spend attack, a race between the adversary and the honest nodes to grow a longer chain. But is it the worst attack? We answer the question in the affirmative for three classes of longest chain protocols, designed for different consensus models: 1) Nakamoto's original Proof-of-Work protocol; 2) Ou… ▽ More

    Submitted 30 August, 2020; v1 submitted 21 May, 2020; originally announced May 2020.

    Comments: 27 pages, 12 figures. A shorter version of this paper will appear in the 2020 ACM Conference on Computer and Communications Security (CCS)

  2. arXiv:1910.02218  [pdf, other

    cs.CR

    Proof-of-Stake Longest Chain Protocols: Security vs Predictability

    Authors: Vivek Bagaria, Amir Dembo, Sreeram Kannan, Sewoong Oh, David Tse, Pramod Viswanath, Xuechao Wang, Ofer Zeitouni

    Abstract: The Nakamoto longest chain protocol is remarkably simple and has been proven to provide security against any adversary with less than 50% of the total hashing power. Proof-of-stake (PoS) protocols are an energy efficient alternative; however existing protocols adopting Nakamoto's longest chain design achieve provable security only by allowing long-term predictability (which have serious security i… ▽ More

    Submitted 22 February, 2020; v1 submitted 5 October, 2019; originally announced October 2019.

    Comments: 65 pages, 16 figures

  3. arXiv:1503.03923  [pdf, ps, other

    math.PR cs.DM math.CO

    Extremal Cuts of Sparse Random Graphs

    Authors: Amir Dembo, Andrea Montanari, Subhabrata Sen

    Abstract: For Erdős-Rényi random graphs with average degree $γ$, and uniformly random $γ$-regular graph on $n$ vertices, we prove that with high probability the size of both the Max-Cut and maximum bisection are $n\Big(\fracγ{4} + {\sf P}_* \sqrt{\fracγ{4}} + o(\sqrtγ)\Big) + o(n)$ while the size of the minimum bisection is $n\Big(\fracγ{4}-{\sf P}_*\sqrt{\fracγ{4}} + o(\sqrtγ)\Big) + o(n)$. Our derivation… ▽ More

    Submitted 5 May, 2015; v1 submitted 12 March, 2015; originally announced March 2015.

    Comments: 19 pages

    Journal ref: Annals of Probability, 2017, Vol 45, No. 2, 1190- 1217

  4. arXiv:1110.4821  [pdf, ps, other

    math.PR cs.DM

    Factor models on locally tree-like graphs

    Authors: Amir Dembo, Andrea Montanari, Nike Sun

    Abstract: We consider homogeneous factor models on uniformly sparse graph sequences converging locally to a (unimodular) random tree $T$, and study the existence of the free energy density $φ$, the limit of the log-partition function divided by the number of vertices $n$ as $n$ tends to infinity. We provide a new interpolation scheme and use it to prove existence of, and to explicitly compute, the quantity… ▽ More

    Submitted 16 December, 2013; v1 submitted 21 October, 2011; originally announced October 2011.

    Comments: Published in at http://dx.doi.org/10.1214/12-AOP828 the Annals of Probability (http://www.imstat.org/aop/) by the Institute of Mathematical Statistics (http://www.imstat.org)

    Report number: IMS-AOP-AOP828

    Journal ref: Annals of Probability 2013, Vol. 41, No. 6, 4162-4213

  5. arXiv:math/0103007  [pdf, ps, other

    math.PR cs.IT

    Source Coding, Large Deviations, and Approximate Pattern Matching

    Authors: A. Dembo, I. Kontoyiannis

    Abstract: We present a development of parts of rate-distortion theory and pattern- matching algorithms for lossy data compression, centered around a lossy version of the Asymptotic Equipartition Property (AEP). This treatment closely parallels the corresponding development in lossless compression, a point of view that was advanced in an important paper of Wyner and Ziv in 1989. In the lossless case we rev… ▽ More

    Submitted 1 March, 2001; originally announced March 2001.

    Comments: 48 pages, review paper

    MSC Class: 94A15; 60F10; 60G60

  6. arXiv:math/0009018  [pdf, ps, other

    math.PR cs.IT

    Critical Behavior in Lossy Source Coding

    Authors: Amir Dembo, Ioannis Kontoyiannis

    Abstract: The following critical phenomenon was recently discovered. When a memoryless source is compressed using a variable-length fixed-distortion code, the fastest convergence rate of the (pointwise) compression ratio to the optimal $R(D)$ bits/symbol is either $O(\sqrt{n})$ or $O(\log n)$. We show it is always $O(\sqrt{n})$, except for discrete, uniformly distributed sources.

    Submitted 1 September, 2000; originally announced September 2000.

    Comments: 2 figures