Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–42 of 42 results for author: Ryan, P

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.13240  [pdf, ps, other

    cs.CR cs.HC

    Intelligo ut Confido: Understanding, Trust and User Experience in Verifiable Receipt-Free E-Voting (long version)

    Authors: Marie-Laure Zollinger, Peter B. Rønne, Steve Schneider, Peter Y. A. Ryan, Wojtek Jamroga

    Abstract: Voting protocols seek to provide integrity and vote privacy in elections. To achieve integrity, procedures have been proposed allowing voters to verify their vote - however this impacts both the user experience and privacy. Especially, vote verification can lead to vote-buying or coercion, if an attacker can obtain documentation, i.e. a receipt, of the cast vote. Thus, some voting protocols go fur… ▽ More

    Submitted 18 July, 2024; originally announced July 2024.

  2. arXiv:2406.09029  [pdf

    cs.CY

    Fair by design: A sociotechnical approach to justifying the fairness of AI-enabled systems across the lifecycle

    Authors: Marten H. L. Kaas, Christopher Burr, Zoe Porter, Berk Ozturk, Philippa Ryan, Michael Katell, Nuala Polo, Kalle Westerling, Ibrahim Habli

    Abstract: Fairness is one of the most commonly identified ethical principles in existing AI guidelines, and the development of fair AI-enabled systems is required by new and emerging AI regulation. But most approaches to addressing the fairness of AI-enabled systems are limited in scope in two significant ways: their substantive content focuses on statistical measures of fairness, and they do not emphasize… ▽ More

    Submitted 13 June, 2024; originally announced June 2024.

    Comments: 18 pages, 2 figures

  3. arXiv:2404.13426  [pdf, other

    cs.CY

    Data Privacy Vocabulary (DPV) -- Version 2

    Authors: Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake

    Abstract: The Data Privacy Vocabulary (DPV), developed by the W3C Data Privacy Vocabularies and Controls Community Group (DPVCG), enables the creation of machine-readable, interoperable, and standards-based representations for describing the processing of personal data. The group has also published extensions to the DPV to describe specific applications to support legislative requirements such as the EU's G… ▽ More

    Submitted 27 August, 2024; v1 submitted 20 April, 2024; originally announced April 2024.

    Comments: Accepted for Presentation in The 23rd International Semantic Web Conference (ISWC 2024)

  4. arXiv:2401.09459  [pdf, other

    cs.CY cs.AI

    What's my role? Modelling responsibility for AI-based safety-critical systems

    Authors: Philippa Ryan, Zoe Porter, Joanna Al-Qaddoumi, John McDermid, Ibrahim Habli

    Abstract: AI-Based Safety-Critical Systems (AI-SCS) are being increasingly deployed in the real world. These can pose a risk of harm to people and the environment. Reducing that risk is an overarching priority during development and operation. As more AI-SCS become autonomous, a layer of risk management via human intervention has been removed. Following an accident it will be important to identify causal co… ▽ More

    Submitted 30 December, 2023; originally announced January 2024.

    Comments: 22 pages, 7 figures, 2 tables

    ACM Class: I.2.0; K.4.0

  5. arXiv:2311.03372  [pdf, ps, other

    cs.SE

    A Declaration of Software Independence

    Authors: Wojciech Jamroga, Peter Y. A. Ryan, Steve Schneider, Carsten Schurmann, Philip B. Stark

    Abstract: A voting system should not merely report the outcome: it should also provide sufficient evidence to convince reasonable observers that the reported outcome is correct. Many deployed systems, notably paperless DRE machines still in use in US elections, fail certainly the second, and quite possibly the first of these requirements. Rivest and Wack proposed the principle of software independence (SI)… ▽ More

    Submitted 26 October, 2023; originally announced November 2023.

  6. arXiv:2309.04607  [pdf

    cs.CL cs.AI

    Linking Symptom Inventories using Semantic Textual Similarity

    Authors: Eamonn Kennedy, Shashank Vadlamani, Hannah M Lindsey, Kelly S Peterson, Kristen Dams OConnor, Kenton Murray, Ronak Agarwal, Houshang H Amiri, Raeda K Andersen, Talin Babikian, David A Baron, Erin D Bigler, Karen Caeyenberghs, Lisa Delano-Wood, Seth G Disner, Ekaterina Dobryakova, Blessen C Eapen, Rachel M Edelstein, Carrie Esopenko, Helen M Genova, Elbert Geuze, Naomi J Goodrich-Hunsaker, Jordan Grafman, Asta K Haberg, Cooper B Hodges , et al. (57 additional authors not shown)

    Abstract: An extensive library of symptom inventories has been developed over time to measure clinical symptoms, but this variety has led to several long standing issues. Most notably, results drawn from different settings and studies are not comparable, which limits reproducibility. Here, we present an artificial intelligence (AI) approach using semantic textual similarity (STS) to link symptoms and scores… ▽ More

    Submitted 8 September, 2023; originally announced September 2023.

  7. arXiv:2308.02608  [pdf

    cs.AI cs.CY cs.RO

    Unravelling Responsibility for AI

    Authors: Zoe Porter, Philippa Ryan, Phillip Morgan, Joanna Al-Qaddoumi, Bernard Twomey, John McDermid, Ibrahim Habli

    Abstract: It is widely acknowledged that we need to establish where responsibility lies for the outputs and impacts of AI-enabled systems. But without a clear and precise understanding of what "responsibility" means, deliberations about where responsibility lies will be, at best, unfocused and incomplete and, at worst, misguided. To address this concern, this paper draws upon central distinctions in philoso… ▽ More

    Submitted 8 May, 2024; v1 submitted 4 August, 2023; originally announced August 2023.

  8. arXiv:2307.05727  [pdf

    cs.AI cs.CE

    An Open-Source Knowledge Graph Ecosystem for the Life Sciences

    Authors: Tiffany J. Callahan, Ignacio J. Tripodi, Adrianne L. Stefanski, Luca Cappelletti, Sanya B. Taneja, Jordan M. Wyrwa, Elena Casiraghi, Nicolas A. Matentzoglu, Justin Reese, Jonathan C. Silverstein, Charles Tapley Hoyt, Richard D. Boyce, Scott A. Malec, Deepak R. Unni, Marcin P. Joachimiak, Peter N. Robinson, Christopher J. Mungall, Emanuele Cavalleri, Tommaso Fontana, Giorgio Valentini, Marco Mesiti, Lucas A. Gillenwater, Brook Santangelo, Nicole A. Vasilevsky, Robert Hoehndorf , et al. (7 additional authors not shown)

    Abstract: Translational research requires data at multiple scales of biological organization. Advancements in sequencing and multi-omics technologies have increased the availability of these data, but researchers face significant integration challenges. Knowledge graphs (KGs) are used to model complex phenomena, and methods exist to construct them automatically. However, tackling complex biomedical integrat… ▽ More

    Submitted 30 January, 2024; v1 submitted 11 July, 2023; originally announced July 2023.

  9. arXiv:2210.10694  [pdf, other

    cs.MA

    Verification of the Socio-Technical Aspects of Voting: The Case of the Polish Postal Vote 2020

    Authors: Wojciech Jamroga, Peter Y. A. Ryan, Yan Kim

    Abstract: Voting procedures are designed and implemented by people, for people, and with significant human involvement. Thus, one should take into account the human factors in order to comprehensively analyze properties of an election and detect threats. In particular, it is essential to assess how actions and strategies of the involved agents (voters, municipal office employees, mail clerks) can influence… ▽ More

    Submitted 18 October, 2023; v1 submitted 19 October, 2022; originally announced October 2022.

  10. arXiv:2209.04732  [pdf

    cs.DB cs.AI

    Ontologizing Health Systems Data at Scale: Making Translational Discovery a Reality

    Authors: Tiffany J. Callahan, Adrianne L. Stefanski, Jordan M. Wyrwa, Chenjie Zeng, Anna Ostropolets, Juan M. Banda, William A. Baumgartner Jr., Richard D. Boyce, Elena Casiraghi, Ben D. Coleman, Janine H. Collins, Sara J. Deakyne-Davies, James A. Feinstein, Melissa A. Haendel, Asiyah Y. Lin, Blake Martin, Nicolas A. Matentzoglu, Daniella Meeker, Justin Reese, Jessica Sinclair, Sanya B. Taneja, Katy E. Trinkley, Nicole A. Vasilevsky, Andrew Williams, Xingman A. Zhang , et al. (7 additional authors not shown)

    Abstract: Background: Common data models solve many challenges of standardizing electronic health record (EHR) data, but are unable to semantically integrate all the resources needed for deep phenotyping. Open Biological and Biomedical Ontology (OBO) Foundry ontologies provide computable representations of biological knowledge and enable the integration of heterogeneous data. However, mapping EHR data to OB… ▽ More

    Submitted 30 January, 2023; v1 submitted 10 September, 2022; originally announced September 2022.

    Comments: Supplementary Material is included at the end of the manuscript

    ACM Class: J.3

  11. arXiv:2202.03655  [pdf, other

    cs.LG math.NA

    Linear Time Kernel Matrix Approximation via Hyperspherical Harmonics

    Authors: John Paul Ryan, Anil Damle

    Abstract: We propose a new technique for constructing low-rank approximations of matrices that arise in kernel methods for machine learning. Our approach pairs a novel automatically constructed analytic expansion of the underlying kernel function with a data-dependent compression step to further optimize the approximation. This procedure works in linear time and is applicable to any isotropic kernel. Moreov… ▽ More

    Submitted 8 February, 2022; originally announced February 2022.

  12. Dynamics of targeted ransomware negotiation

    Authors: Pierce Ryan, John Fokker, Sorcha Healy, Andreas Amann

    Abstract: In this paper, we consider how the development of targeted ransomware has affected the dynamics of ransomware negotiations to better understand how to respond to ransomware attacks. We construct a model of ransomware negotiations as an asymmetric non-cooperative two-player game. In particular, our model considers the investments that a malicious actor must make in order to conduct a successful tar… ▽ More

    Submitted 13 April, 2022; v1 submitted 1 October, 2021; originally announced October 2021.

    Journal ref: IEEE Access Volume 10, 32836-32844, 2022

  13. arXiv:2107.06090  [pdf, ps, other

    cs.CR

    PakeMail: authentication and key management in decentralized secure email and messaging via PAKE

    Authors: Itzel Vazquez Sandoval, Arash Atashpendar, Gabriele Lenzini, Peter Y. A. Ryan

    Abstract: We propose the use of PAKE for achieving and enhancing entity authentication (EA) and key management (KM) in the context of decentralized end-to-end encrypted email and secure messaging, i.e., where neither a public key infrastructure nor trusted third parties are used. This approach not only simplifies the EA process by requiring users to share only a low-entropy secret, e.g., a memorable word, b… ▽ More

    Submitted 13 July, 2021; originally announced July 2021.

    Comments: arXiv admin note: substantial text overlap with arXiv:2005.10787

  14. arXiv:2106.04487  [pdf, other

    cs.LG math.NA

    The Fast Kernel Transform

    Authors: John Paul Ryan, Sebastian Ament, Carla P. Gomes, Anil Damle

    Abstract: Kernel methods are a highly effective and widely used collection of modern machine learning algorithms. A fundamental limitation of virtually all such methods are computations involving the kernel matrix that naively scale quadratically (e.g., constructing the kernel matrix and matrix-vector multiplication) or cubically (solving linear systems) with the size of the data set $N.$ We propose the Fas… ▽ More

    Submitted 8 June, 2021; originally announced June 2021.

  15. arXiv:2105.14901  [pdf, other

    cs.HC

    User Experience Design for E-Voting: How mental models align with security mechanisms

    Authors: Marie-Laure Zollinger, Verena Distler, Peter B. Roenne, Peter Y. A. Ryan, Carine Lallemand, Vincent Koenig

    Abstract: This paper presents a mobile application for vote-casting and vote-verification based on the Selene e-voting protocol and explains how it was developed and implemented using the User Experience Design process. The resulting interface was tested with 38 participants, and user experience data was collected via questionnaires and semi-structured interviews on user experience and perceived security. R… ▽ More

    Submitted 15 June, 2021; v1 submitted 31 May, 2021; originally announced May 2021.

    Comments: E-Vote-ID 2019 TalTech Proceedings

    Journal ref: Fourth International Joint Conference on Electronic Voting E-Vote-ID 2019, p187--202

  16. arXiv:2105.14783  [pdf, other

    cs.CR

    Electryo, In-person Voting with Transparent Voter Verifiability and Eligibility Verifiability

    Authors: Peter B. Roenne, Peter Y. A Ryan, Marie-Laure Zollinger

    Abstract: Selene is an e-voting protocol that allows voters to directly check their individual vote, in cleartext, in the final tally via a tracker system, while providing good coercion mitigation. This is in contrast to conventional, end-to-end verifiable schemes in which the voter verifies the presence of an encryption of her vote on the bulletin board. The Selene mechanism can be applied to many e-voting… ▽ More

    Submitted 31 May, 2021; originally announced May 2021.

    Comments: E-Vote-ID 2018 TUT Proceedings

  17. arXiv:2102.02625  [pdf

    cs.SE cs.CY cs.LG

    Safety Case Templates for Autonomous Systems

    Authors: Robin Bloomfield, Gareth Fletcher, Heidy Khlaaf, Luke Hinde, Philippa Ryan

    Abstract: This report documents safety assurance argument templates to support the deployment and operation of autonomous systems that include machine learning (ML) components. The document presents example safety argument templates covering: the development of safety requirements, hazard analysis, a safety monitor architecture for an autonomous system including at least one ML element, a component with ML… ▽ More

    Submitted 11 March, 2021; v1 submitted 29 January, 2021; originally announced February 2021.

    Comments: 136 pages, 57 figures

    Report number: Adelard D/1294/87004/1

  18. arXiv:2102.01995  [pdf, ps, other

    cs.MA

    Convergence Voting: From Pairwise Comparisons to Consensus

    Authors: Gergei Bana, Wojciech Jamroga, David Naccache, Peter Y. A. Ryan

    Abstract: An important aspect of AI design and ethics is to create systems that reflect aggregate preferences of the society. To this end, the techniques of social choice theory are often utilized. We propose a new social choice function motivated by the PageRank algorithm. The function ranks voting options based on the Condorcet graph of pairwise comparisons. To this end, we transform the Condorcet graph i… ▽ More

    Submitted 1 March, 2021; v1 submitted 3 February, 2021; originally announced February 2021.

  19. A Common Semantic Model of the GDPR Register of Processing Activities

    Authors: Paul Ryan, Harshvardhan J. Pandit, Rob Brennan

    Abstract: The creation and maintenance of a Register of Processing Activities (ROPA) is an essential process for the demonstration of GDPR compliance. We analyse ROPA templates from six EU Data Protection Regulators and show that template scope and granularity vary widely between jurisdictions. We then propose a flexible, consolidated data model for consistent processing of ROPAs (CSM-ROPA). We analyse the… ▽ More

    Submitted 1 February, 2021; originally announced February 2021.

  20. arXiv:2011.07887  [pdf, ps, other

    cs.CY cs.MA

    A Survey of Requirements for COVID-19 Mitigation Strategies. Part I: Newspaper Clips

    Authors: Wojciech Jamroga, David Mestel, Peter B. Roenne, Peter Y. A. Ryan, Marjan Skrobot

    Abstract: The COVID-19 pandemic has influenced virtually all aspects of our lives. Across the world, countries have applied various mitigation strategies for the epidemic, based on social, political, and technological instruments. We postulate that one should {identify the relevant requirements} before committing to a particular mitigation strategy. One way to achieve it is through an overview of what is co… ▽ More

    Submitted 18 October, 2023; v1 submitted 16 November, 2020; originally announced November 2020.

  21. arXiv:2008.07361  [pdf

    stat.AP cs.LG stat.ME stat.ML

    Logistic regression models for patient-level prediction based on massive observational data: Do we need all data?

    Authors: Luis H. John, Jan A. Kors, Jenna M. Reps, Patrick B. Ryan, Peter R. Rijnbeek

    Abstract: Objective: Provide guidance on sample size considerations for developing predictive models by empirically establishing the adequate sample size, which balances the competing objectives of improving model performance and reducing model complexity as well as computational requirements. Materials and Methods: We empirically assess the effect of sample size on prediction performance and model comple… ▽ More

    Submitted 24 July, 2024; v1 submitted 14 August, 2020; originally announced August 2020.

    Journal ref: International Journal of Medical Informatics, Volume 163, July 2022, Article number 104762

  22. arXiv:2008.00877  [pdf

    cs.CY cs.CR

    Towards a Semantic Model of the GDPR Register of Processing Activities

    Authors: Paul Ryan, Harshvardhan J. Pandit, Rob Brennan

    Abstract: A core requirement for GDPR compliance is the maintenance of a register of processing activities (ROPA). Our analysis of six ROPA templates from EU data protection regulators shows the scope and granularity of a ROPA is subject to widely varying guidance in different jurisdictions. We present a consolidated data model based on common concepts and relationships across analysed templates. We then an… ▽ More

    Submitted 3 August, 2020; originally announced August 2020.

  23. arXiv:2007.12412  [pdf, other

    cs.CR cs.AI cs.LO cs.MA

    Model Checkers Are Cool: How to Model Check Voting Protocols in Uppaal

    Authors: Wojciech Jamroga, Yan Kim, Damian Kurpiewski, Peter Y. A. Ryan

    Abstract: The design and implementation of an e-voting system is a challenging task. Formal analysis can be of great help here. In particular, it can lead to a better understanding of how the voting system works, and what requirements on the system are relevant. In this paper, we propose that the state-of-art model checker Uppaal provides a good environment for modelling and preliminary verification of voti… ▽ More

    Submitted 18 October, 2023; v1 submitted 24 July, 2020; originally announced July 2020.

  24. arXiv:2007.09085  [pdf, other

    cs.CR q-bio.QM

    Preservation of DNA Privacy During the Large Scale Detection of COVID-19

    Authors: Marcel Hollenstein, David Naccache, Peter B. Rønne, Peter Y A Ryan, Robert Weil, Ofer Yifrach-Stav

    Abstract: As humanity struggles to contain the global COVID-19 pandemic, privacy concerns are emerging regarding confinement, tracing and testing. The scientific debate concerning privacy of the COVID-19 tracing efforts has been intense, especially focusing on the choice between centralised and decentralised tracing apps. The privacy concerns regarding COVID-19 testing, however, have not received as much at… ▽ More

    Submitted 1 August, 2020; v1 submitted 17 July, 2020; originally announced July 2020.

    Comments: 10 pages, 1 figure

  25. Design Challenges for GDPR RegTech

    Authors: Paul Ryan, Martin Crane, Rob Brennan

    Abstract: The Accountability Principle of the GDPR requires that an organisation can demonstrate compliance with the regulations. A survey of GDPR compliance software solutions shows significant gaps in their ability to demonstrate compliance. In contrast, RegTech has recently brought great success to financial compliance, resulting in reduced risk, cost saving and enhanced financial regulatory compliance.… ▽ More

    Submitted 21 May, 2020; originally announced May 2020.

    Journal ref: Proceedings of the 22nd International Conference on Enterprise Information Systems - (Volume 2) May 5-7, 2020

  26. arXiv:2003.00790  [pdf

    cs.SE cs.RO eess.SY

    Towards Identifying and closing Gaps in Assurance of autonomous Road vehicleS -- a collection of Technical Notes Part 2

    Authors: Robin Bloomfield, Gareth Fletcher, Heidy Khlaaf, Philippa Ryan, Shuji Kinoshita, Yoshiki Kinoshit, Makoto Takeyama, Yutaka Matsubara, Peter Popov, Kazuki Imai, Yoshinori Tsutake

    Abstract: This report provides an introduction and overview of the Technical Topic Notes (TTNs) produced in the Towards Identifying and closing Gaps in Assurance of autonomous Road vehicleS (Tigars) project. These notes aim to support the development and evaluation of autonomous vehicles. Part 1 addresses: Assurance-overview and issues, Resilience and Safety Requirements, Open Systems Perspective and Formal… ▽ More

    Submitted 28 February, 2020; originally announced March 2020.

    Comments: Authors of the individual notes are indicated in the text

    Report number: Adelard Tigars D5.6 D/1259/138008/7

  27. arXiv:2003.00789  [pdf

    cs.SE cs.LG cs.RO eess.SY

    Towards Identifying and closing Gaps in Assurance of autonomous Road vehicleS -- a collection of Technical Notes Part 1

    Authors: Robin Bloomfield, Gareth Fletcher, Heidy Khlaaf, Philippa Ryan, Shuji Kinoshita, Yoshiki Kinoshit, Makoto Takeyama, Yutaka Matsubara, Peter Popov, Kazuki Imai, Yoshinori Tsutake

    Abstract: This report provides an introduction and overview of the Technical Topic Notes (TTNs) produced in the Towards Identifying and closing Gaps in Assurance of autonomous Road vehicleS (Tigars) project. These notes aim to support the development and evaluation of autonomous vehicles. Part 1 addresses: Assurance-overview and issues, Resilience and Safety Requirements, Open Systems Perspective and Formal… ▽ More

    Submitted 28 February, 2020; originally announced March 2020.

    Comments: Authors of individual Topic Notes are indicated in the body of the report

    Report number: Adelard Tigars D5.6 v2.0 (D/1259/138008/7)

  28. arXiv:1908.04947  [pdf, ps, other

    cs.CR cs.CY stat.AP

    Risk-Limiting Tallies

    Authors: Wojciech Jamroga, Peter B. Roenne, Peter Y. A. Ryan, Philip B. Stark

    Abstract: Many voter-verifiable, coercion-resistant schemes have been proposed, but even the most carefully designed systems necessarily leak information via the announced result. In corner cases, this may be problematic. For example, if all the votes go to one candidate then all vote privacy evaporates. The mere possibility of candidates getting no or few votes could have implications for security in pract… ▽ More

    Submitted 14 August, 2019; originally announced August 2019.

  29. arXiv:1906.02686  [pdf, other

    eess.SP cs.CR

    Fusion of Mobile Device Signal Data Attributes Enables Multi-Protocol Entity Resolution and Enhanced Large-Scale Tracking

    Authors: Brian Thompson, Dave Cedel, Jeremy Martin, Peter Ryan, Sarah Kern

    Abstract: Use of persistent identifiers in wireless communication protocols is a known privacy concern as they can be used to track the location of mobile devices. Furthermore, inherent structure in the assignment of hardware identifiers as well as upper-layer network protocol data attributes can leak additional device information. We introduce SEXTANT, a computational framework that combines improvements o… ▽ More

    Submitted 5 June, 2019; originally announced June 2019.

    Comments: 21 pages, 10 figures

    ACM Class: I.m

  30. arXiv:1903.06821  [pdf, ps, other

    astro-ph.IM cs.DL

    Availability of Hyperlinked Resources in Astrophysics Papers

    Authors: P. Wesley Ryan, Alice Allen, Peter Teuben

    Abstract: Astrophysics papers often rely on software which may or may not be available, and URLs are often used as proxy citations for software and data. We extracted all URLs from two journals' 2015 research articles, removed those from certain long-term reliable domains, and tested the remainder to determine what percentage of these URLs were accessible in October 2018.

    Submitted 20 March, 2019; v1 submitted 15 March, 2019; originally announced March 2019.

    Comments: 4 pages, 2 tables; revised

  31. arXiv:1901.02560  [pdf, ps, other

    cs.CR cs.CC cs.DS quant-ph

    Coercion-Resistant Voting in Linear Time via Fully Homomorphic Encryption: Towards a Quantum-Safe Scheme

    Authors: Peter B. Rønne, Arash Atashpendar, Kristian Gjøsteen, Peter Y. A. Ryan

    Abstract: We present an approach for performing the tallying work in the coercion-resistant JCJ voting protocol, introduced by Juels, Catalano, and Jakobsson, in linear time using fully homomorphic encryption (FHE). The suggested enhancement also paves the path towards making JCJ quantum-resistant, while leaving the underlying structure of JCJ intact. The exhaustive, comparison-based approach of JCJ using p… ▽ More

    Submitted 5 February, 2019; v1 submitted 8 January, 2019; originally announced January 2019.

    Comments: 9 pages; added acknowledgments, revised the first paragraph in the section on security remarks, revised a few sentences throughout; to appear in the proceedings of Financial Cryptography and Data Security 2019, published by Springer

  32. arXiv:1812.02245  [pdf, ps, other

    quant-ph cs.CR cs.IT

    Revisiting Deniability in Quantum Key Exchange via Covert Communication and Entanglement Distillation

    Authors: Arash Atashpendar, G. Vamsi Policharla, Peter B. Rønne, Peter Y. A. Ryan

    Abstract: We revisit the notion of deniability in quantum key exchange (QKE), a topic that remains largely unexplored. In the only work on this subject by Donald Beaver, it is argued that QKE is not necessarily deniable due to an eavesdropping attack that limits key equivocation. We provide more insight into the nature of this attack and how it extends to other constructions such as QKE obtained from unclon… ▽ More

    Submitted 5 December, 2018; originally announced December 2018.

    Comments: 16 pages, published in the proceedings of NordSec 2018

    Journal ref: NordSec 2018. Lecture Notes in Computer Science, vol. 11252, pp 104-120, Springer, Cham (2018)

  33. arXiv:1807.11609  [pdf, other

    cs.IT cs.DM

    A Proof of Entropy Minimization for Outputs in Deletion Channels via Hidden Word Statistics

    Authors: Arash Atashpendar, David Mestel, A. W. Roscoe, Peter Y. A. Ryan

    Abstract: From the output produced by a memoryless deletion channel from a uniformly random input of known length $n$, one obtains a posterior distribution on the channel input. The difference between the Shannon entropy of this distribution and that of the uniform prior measures the amount of information about the channel input which is conveyed by the output of length $m$, and it is natural to ask for whi… ▽ More

    Submitted 30 July, 2018; originally announced July 2018.

    Comments: 11 pages, 2 figures

  34. arXiv:1802.02432  [pdf, other

    cs.CR

    CryptoRec: Privacy-preserving Recommendation as a Service

    Authors: Jun Wang, Afonso Arriaga, Qiang Tang, Peter Y. A. Ryan

    Abstract: Recommender systems rely on large datasets of historical data and entail serious privacy risks. A server offering Recommendation as a Service to a client might leak more information than necessary regarding its recommendation model and dataset. At the same time, the disclosure of the client's preferences to the server is also a matter of concern. Devising privacy-preserving protocols using general… ▽ More

    Submitted 13 May, 2018; v1 submitted 7 February, 2018; originally announced February 2018.

    Comments: Major Revision: 1. Introduce a new one-iteration re-training process for the sake of efficiency; 2. Change security level settings; 3, change the paper title, from "CryptoRec: Secure Recommendations as a Service" to "CryptoRec: Privacy-preserving Recommendation as a Service"

  35. arXiv:1802.00703  [pdf, other

    cs.IT cs.DM

    From Clustering Supersequences to Entropy Minimizing Subsequences for Single and Double Deletions

    Authors: Arash Atashpendar, Marc Beunardeau, Aisling Connolly, Rémi Géraud, David Mestel, A. W. Roscoe, Peter Y. A. Ryan

    Abstract: A binary string transmitted via a memoryless i.i.d. deletion channel is received as a subsequence of the original input. From this, one obtains a posterior distribution on the channel input, corresponding to a set of candidate supersequences weighted by the number of times the received subsequence can be embedded in them. In a previous work it is conjectured on the basis of experimental data that… ▽ More

    Submitted 4 March, 2019; v1 submitted 2 February, 2018; originally announced February 2018.

    Comments: 25 pages, 2 figures, submitted to IEEE Transactions on Information Theory; added references, minor writing improvements, fixed a minor flaw in section 5, improved notation, added proof of entropy minimization for the Rényi entropy for the case of single deletions, improved the presentation of the proofs in the appendix, added more details to the framework section, results unchanged

  36. arXiv:1801.02094  [pdf, ps, other

    astro-ph.IM cs.DL

    Schroedinger's code: A preliminary study on research source code availability and link persistence in astrophysics

    Authors: Alice Allen, Peter J. Teuben, P. Wesley Ryan

    Abstract: We examined software usage in a sample set of astrophysics research articles published in 2015 and searched for source code for the software mentioned in these research papers. We categorized the software to indicate whether source code is available for download and whether there are restrictions to accessing it, and if source code is not available, whether some other form of the software, such as… ▽ More

    Submitted 9 February, 2018; v1 submitted 6 January, 2018; originally announced January 2018.

    Comments: Accepted to ApJS

  37. arXiv:1707.08619  [pdf, other

    cs.CR

    Public Evidence from Secret Ballots

    Authors: Matthew Bernhard, Josh Benaloh, J. Alex Halderman, Ronald L. Rivest, Peter Y. A. Ryan, Philip B. Stark, Vanessa Teague, Poorvi L. Vora, Dan S. Wallach

    Abstract: Elections seem simple---aren't they just counting? But they have a unique, challenging combination of security and privacy requirements. The stakes are high; the context is adversarial; the electorate needs to be convinced that the results are correct; and the secrecy of the ballot must be ensured. And they have practical constraints: time is of the essence, and voting systems need to be affordabl… ▽ More

    Submitted 4 August, 2017; v1 submitted 26 July, 2017; originally announced July 2017.

    Comments: To appear in E-Vote-Id '17

  38. arXiv:1610.06343  [pdf, ps, other

    cs.CR

    (Universal) Unconditional Verifiability in E-Voting without Trusted Parties

    Authors: Gina Gallegos-Garcia, Vincenzo Iovino, Alfredo Rial, Peter B. Roenne, Peter Y. A. Ryan

    Abstract: In traditional e-voting protocols, privacy is often provided by a trusted authority that learns the votes and computes the tally. Some protocols replace the trusted authority by a set of authorities, and privacy is guaranteed if less than a threshold number of authorities are corrupt. For verifiability, stronger security guarantees are demanded. Typically, corrupt authorities that try to fake the… ▽ More

    Submitted 20 October, 2016; originally announced October 2016.

  39. arXiv:1504.03778  [pdf

    cs.CR

    End-to-end verifiability

    Authors: Josh Benaloh, Ronald Rivest, Peter Y. A. Ryan, Philip Stark, Vanessa Teague, Poorvi Vora

    Abstract: This pamphlet describes end-to-end election verifiability (E2E-V) for a nontechnical audience: election officials, public policymakers, and anyone else interested in secure, transparent, evidence-based electronic elections. This work is part of the Overseas Vote Foundation's End-to-End Verifiable Internet Voting: Specification and Feasibility Assessment Study (E2E VIV Project), funded by the Dem… ▽ More

    Submitted 14 April, 2015; originally announced April 2015.

  40. arXiv:1406.3289  [pdf, other

    cs.DM math.CO

    Indeterminate Strings, Prefix Arrays & Undirected Graphs

    Authors: Manolis Christodoulakis, P. J. Ryan, W. F. Smyth, Shu Wang

    Abstract: An integer array y = y[1..n] is said to be feasible if and only if y[1] = n and, for every i \in 2..n, i \le i+y[i] \le n+1. A string is said to be indeterminate if and only if at least one of its elements is a subset of cardinality greater than one of a given alphabet Sigma; otherwise it is said to be regular. A feasible array y is said to be regular if and only if it is the prefix array of some… ▽ More

    Submitted 12 June, 2014; originally announced June 2014.

    Comments: 20 pages

  41. arXiv:1404.6822  [pdf, other

    cs.CR

    vVote: a Verifiable Voting System

    Authors: Chris Culnane, Peter Y. A. Ryan, Steve Schneider, Vanessa Teague

    Abstract: The Pret a Voter cryptographic voting system was designed to be flexible and to offer voters a familiar and easy voting experience. In this paper we present a case study of our efforts to adapt Pret a Voter to the idiosyncrasies of elections in the Australian state of Victoria. This technical report includes general background, user experience and details of the cryptographic protocols and human p… ▽ More

    Submitted 20 September, 2015; v1 submitted 27 April, 2014; originally announced April 2014.

    Comments: Previously titled "Draft Technical Report for VEC vVote System"

  42. arXiv:1001.5050  [pdf, ps, other

    cs.SE cs.CR cs.CY

    Formal Modelling of a Usable Identity Management Solution for Virtual Organisations

    Authors: Ali N. Haidar, P. V. Coveney, Ali E. Abdallah, P. Y. A Ryan, B. Beckles, J. M. Brooke, M . A. S. Jones

    Abstract: This paper attempts to accurately model security requirements for computational grid environments with particular focus on authentication. We introduce the Audited Credential Delegation (ACD) architecture as a solution to some of the virtual organisations identity management usability problems. The approach uses two complementary models: one is state based, described in Z notation, and the other… ▽ More

    Submitted 27 January, 2010; originally announced January 2010.

    Journal ref: EPTCS 16, 2010, pp. 41-50