Skip to main content

Showing 1–8 of 8 results for author: Zikas, V

Searching in archive cs. Search in all archives.
.
  1. arXiv:2505.14551  [pdf

    cs.GT cs.AI cs.CR

    Trustworthy Reputation Games and Applications to Proof-of-Reputation Blockchains

    Authors: Petros Drineas, Rohit Nema, Rafail Ostrovsky, Vassilis Zikas

    Abstract: Reputation systems play an essential role in the Internet era, as they enable people to decide whom to trust, by collecting and aggregating data about users' behavior. Recently, several works proposed the use of reputation for the design and scalability improvement of decentralized (blockchain) ledgers; however, such systems are prone to manipulation and to our knowledge no game-theoretic treatmen… ▽ More

    Submitted 20 May, 2025; originally announced May 2025.

  2. arXiv:2502.07066  [pdf, ps, other

    cs.CR math.ST stat.ME

    General-Purpose $f$-DP Estimation and Auditing in a Black-Box Setting

    Authors: Önder Askin, Holger Dette, Martin Dunsche, Tim Kutta, Yun Lu, Yu Wei, Vassilis Zikas

    Abstract: In this paper we propose new methods to statistically assess $f$-Differential Privacy ($f$-DP), a recent refinement of differential privacy (DP) that remedies certain weaknesses of standard DP (including tightness under algorithmic composition). A challenge when deploying differentially private mechanisms is that DP is hard to validate, especially in the black-box setting. This has led to numerous… ▽ More

    Submitted 13 June, 2025; v1 submitted 10 February, 2025; originally announced February 2025.

    Comments: 25 pages, 35 figures

  3. arXiv:2312.16253  [pdf, other

    cs.DC

    Near-Optimal Communication Byzantine Reliable Broadcast under a Message Adversary

    Authors: Timothé Albouy, Davide Frey, Ran Gelles, Carmit Hazay, Michel Raynal, Elad Michael Schiller, François Taïani, Vassilis Zikas

    Abstract: We address the problem of Reliable Broadcast in asynchronous message-passing systems with $n$ nodes, of which up to $t$ are malicious (faulty), in addition to a message adversary that can drop some of the messages sent by correct (non-faulty) nodes. We present a Message-Adversary-Tolerant Byzantine Reliable Broadcast (MBRB) algorithm that communicates ${\cal O}(|m|+nκ)$ bits per node, where $|m|$… ▽ More

    Submitted 14 October, 2024; v1 submitted 25 December, 2023; originally announced December 2023.

  4. arXiv:2312.14506  [pdf, other

    cs.CR cs.DC

    Concurrent Asynchronous Byzantine Agreement in Expected-Constant Rounds, Revisited

    Authors: Ran Cohen, Pouyan Forghani, Juan Garay, Rutvik Patel, Vassilis Zikas

    Abstract: It is well known that without randomization, Byzantine agreement (BA) requires a linear number of rounds in the synchronous setting, while it is flat out impossible in the asynchronous setting. The primitive which allows to bypass the above limitation is known as oblivious common coin (OCC). It allows parties to agree with constant probability on a random coin, where agreement is oblivious, i.e.,… ▽ More

    Submitted 22 December, 2023; originally announced December 2023.

    Comments: A preliminary version of this work appeared in TCC 2023

  5. arXiv:2309.01243  [pdf, other

    cs.CR cs.LG

    The Normal Distributions Indistinguishability Spectrum and its Application to Privacy-Preserving Machine Learning

    Authors: Yun Lu, Malik Magdon-Ismail, Yu Wei, Vassilis Zikas

    Abstract: Differential Privacy (DP) (and its variants) is the most common method for machine learning (ML) on privacy-sensitive data. In big data analytics, one often uses randomized sketching/aggregation algorithms to make processing high-dimensional data tractable. Intuitively, such ML algorithms should provide some inherent privacy, yet most existing DP mechanisms do not leverage or under-utilize this in… ▽ More

    Submitted 21 June, 2024; v1 submitted 3 September, 2023; originally announced September 2023.

  6. arXiv:2302.05520  [pdf, ps, other

    cs.DS

    Synchrony/Asynchrony vs. Stationary/Mobile? The Latter is Superior...in Theory

    Authors: Eli Gafni, Vasileios Zikas

    Abstract: Like Asynchrony, Mobility of faults precludes consensus. Yet, a model M in which Consensus is solvable, has an analogue relaxed model in which Consensus is not solvable and for which we can ask, whether Consensus is solvable if the system initially behaves like the relaxed analogue model, but eventually morphs into M. We consider two relaxed analogues of M. The first is the traditional Asynchronou… ▽ More

    Submitted 10 February, 2023; originally announced February 2023.

  7. arXiv:1901.07986  [pdf, ps, other

    cs.LG cs.CR stat.ML

    PD-ML-Lite: Private Distributed Machine Learning from Lighweight Cryptography

    Authors: Maksim Tsikhanovich, Malik Magdon-Ismail, Muhammad Ishaq, Vassilis Zikas

    Abstract: Privacy is a major issue in learning from distributed data. Recently the cryptographic literature has provided several tools for this task. However, these tools either reduce the quality/accuracy of the learning algorithm---e.g., by adding noise---or they incur a high performance penalty and/or involve trusting external authorities. We propose a methodology for {\sl private distributed machine l… ▽ More

    Submitted 10 April, 2019; v1 submitted 23 January, 2019; originally announced January 2019.

  8. arXiv:1805.05750  [pdf, other

    cs.CR cs.GT

    How Private Are Commonly-Used Voting Rules?

    Authors: Ao Liu, Yun Lu, Lirong Xia, Vassilis Zikas

    Abstract: Differential privacy has been widely applied to provide privacy guarantees by adding random noise to the function output. However, it inevitably fails in many high-stakes voting scenarios, where voting rules are required to be deterministic. In this work, we present the first framework for answering the question: "How private are commonly-used voting rules?" Our answers are two-fold. First, we sho… ▽ More

    Submitted 23 March, 2021; v1 submitted 15 May, 2018; originally announced May 2018.

    Journal ref: Proceedings of the 36th Conference on Uncertainty in Artificial Intelligence (UAI), in Proceedings of Machine Learning Research 124:629-638 (2020)