Skip to main content

Showing 1–6 of 6 results for author: Mazor, N

.
  1. arXiv:2503.04388  [pdf, other

    cs.CL

    More Documents, Same Length: Isolating the Challenge of Multiple Documents in RAG

    Authors: Shahar Levy, Nir Mazor, Lihi Shalmon, Michael Hassid, Gabriel Stanovsky

    Abstract: Retrieval-augmented generation (RAG) provides LLMs with relevant documents. Although previous studies noted that retrieving many documents can degrade performance, they did not isolate how the quantity of documents affects performance while controlling for context length. We evaluate various language models on custom datasets derived from a multi-hop QA task. We keep the context length and positio… ▽ More

    Submitted 6 March, 2025; originally announced March 2025.

    Comments: Preprint

  2. arXiv:2502.15629  [pdf, ps, other

    cs.CR

    Mildly Accurate Computationally Differentially Private Inner Product Protocols Imply Oblivious Transfer

    Authors: Iftach Haitner, Noam Mazor, Jad Silbak, Eliad Tsfadia, Chao Yan

    Abstract: In distributed differential privacy, multiple parties collaboratively analyze their combined data while protecting the privacy of each party's data from the eyes of the others. Interestingly, for certain fundamental two-party functions like inner product and Hamming distance, the accuracy of distributed solutions significantly lags behind what can be achieved in the centralized model. However, und… ▽ More

    Submitted 21 February, 2025; originally announced February 2025.

  3. arXiv:2108.07664  [pdf, ps, other

    cs.CR

    On the Complexity of Two-Party Differential Privacy

    Authors: Iftach Haitner, Noam Mazor, Jad Silbak, Eliad Tsfadia

    Abstract: In distributed differential privacy, the parties perform analysis over their joint data while preserving the privacy for both datasets. Interestingly, for a few fundamental two-party functions such as inner product and Hamming distance, the accuracy of the distributed solution lags way behind what is achievable in the client-server setting. McGregor, Mironov, Pitassi, Reingold, Talwar, and Vadhan… ▽ More

    Submitted 17 June, 2022; v1 submitted 17 August, 2021; originally announced August 2021.

    Comments: Accepted to STOC 2022

  4. arXiv:2105.01958  [pdf, ps, other

    cs.CR

    On the Communication Complexity of Key-Agreement Protocols

    Authors: Iftach Haitner, Noam Mazor, Rotem Oshman, Omer Reingold, Amir Yehudayoff

    Abstract: Key-agreement protocols whose security is proven in the random oracle model are an important alternative to protocols based on public-key cryptography. In the random oracle model, the parties and the eavesdropper have access to a shared random function (an "oracle"), but the parties are limited in the number of queries they can make to the oracle. The random oracle serves as an abstraction for bla… ▽ More

    Submitted 6 May, 2021; v1 submitted 5 May, 2021; originally announced May 2021.

    Comments: A preliminary version appeared in ITCS 2019

  5. arXiv:2105.00770  [pdf, ps, other

    cs.CC cs.CR

    Channels of Small Log-Ratio Leakage and Characterization of Two-Party Differentially Private Computation

    Authors: Iftach Haitner, Noam Mazor, Ronen Shaltiel, Jad Silbak

    Abstract: Consider a PPT two-party protocol $π=(A,B)$ in which the parties get no private inputs and obtain outputs $O^A,O^B\in \{0,1\}$, and let $V^A$ and $V^B$ denote the parties' individual views. Protocol $π$ has $α$-agreement if $Pr[O^A=O^B]=1/2+α$. The leakage of $π$ is the amount of information a party obtains about the event $\{O^A=O^B\}$; that is, the leakage $ε$ is the maximum, over $P\in\{A,B\}$,… ▽ More

    Submitted 9 May, 2021; v1 submitted 3 May, 2021; originally announced May 2021.

    Comments: A preliminary version appeared in TCC 2019

  6. arXiv:2105.00761  [pdf, ps, other

    cs.CC cs.CR

    Lower Bounds on the Time/Memory Tradeoff of Function Inversion

    Authors: Dror Chawin, Iftach Haitner, Noam Mazor

    Abstract: We study time/memory tradeoffs of function inversion: an algorithm, i.e., an inverter, equipped with an s-bit advice on a randomly chosen function $f : [n] -> [n]$ and using $q$ oracle queries to $f$, tries to invert a randomly chosen output $y$ of $f$, i.e., to find $x\in f^{-1}(y)$. Much progress was done regarding adaptive function inversion - the inverter is allowed to make adaptive oracle que… ▽ More

    Submitted 9 May, 2021; v1 submitted 3 May, 2021; originally announced May 2021.

    Comments: A preliminary version appeared in TCC 2020