Abhishek Bhowmick
University of Texas at Austin
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Abhishek Bhowmick.
international conference on the theory and application of cryptology and information security | 2011
Raghav Bhaskar; Abhishek Bhowmick; Vipul Goyal; Srivatsan Laxman; Abhradeep Thakurta
Differential Privacy (DP) has emerged as a formal, flexible framework for privacy protection, with a guarantee that is agnostic to auxiliary information and that admits simple rules for composition. Benefits notwithstanding, a major drawback of DP is that it provides noisy responses to queries, making it unsuitable for many applications. We propose a new notion called Noiseless Privacy that provides exact answers to queries, without adding any noise whatsoever. While the form of our guarantee is similar to DP, where the privacy comes from is very different, based on statistical assumptions on the data and on restrictions to the auxiliary information available to the adversary. We present a first set of results for Noiseless Privacy of arbitrary Boolean-function queries and of linear Real-function queries, when data are drawn independently, from nearly-uniform and Gaussian distributions respectively. We also derive simple rules for composition under models of dynamically changing data.
international symposium on information theory | 2011
Ankit Singh Rawat; Sriram Vishwanath; Abhishek Bhowmick; Emina Soljanin
This paper determines mechanisms for distributed storage that are simultaneously repair and update efficient. Repair efficiency demands that minimum information be downloaded from surviving nodes to reconstruct failed storage nodes. Update efficiency desires that changes in the original data require minimal updates at the storage nodes. These two requirements can be seen as counteracting one another, as the latter imposes a sparsity constraint on the encoding process that is not desirable for the former. In this paper we establish the existence of the codes that meet both requirements: require only logarithmic updates when data changes, while simultaneously minimizing repair bandwidth for exact reconstruction. To show this, we use a combination of KG codes for update efficiency with interference-alignment strategies for distributed storage.
symposium on the theory of computing | 2013
Abhishek Bhowmick; Zeev Dvir; Shachar Lovett
A Matching Vector (MV) family modulo m is a pair of ordered lists U=(u<sub>1</sub>,...,u<sub>t</sub>) and V=(v<sub>1</sub>,...,v<sub>t</sub>) where u<sub>i</sub>,v<sub>j</sub> ∈ Z<sub>m</sub><sup>n</sup> with the following inner product pattern: for any i, {u<sub>i</sub>,v<sub>i</sub>}=0, and for any i ≠ j, {u<sub>i</sub>,v<sub>j</sub>} ≠ 0. A MV family is called q-restricted if inner products {u<sub>i</sub>,v<sub>j</sub>} take at most q different values. Our interest in MV families stems from their recent application in the construction of sub-exponential locally decodable codes (LDCs). There, q-restricted MV families are used to construct LDCs with q queries, and there is special interest in the regime where q is constant. When m is a prime it is known that such constructions yield codes with exponential block length. However, for composite m the behaviour is dramatically different. A recent work by Efremenko [8] (based on an approach initiated by Yekhanin [24]) gives the first sub-exponential LDC with constant queries. It is based on a construction of a MV family of super-polynomial size by Grolmusz [10] modulo composite m. In this work, we prove two lower bounds on the block length of LDCs which are based on black box construction using MV families. When q is constant (or sufficiently small), we prove that such LDCs must have a quadratic block length. When the modulus m is constant (as it is in the construction of Efremenko [8]) we prove a super-polynomial lower bound on the block-length of the LDCs, assuming a well-known conjecture in additive combinatorics, the polynomial Freiman-Ruzsa conjecture over Z<sub>m</sub>.
conference on computational complexity | 2015
Abhishek Bhowmick; Shachar Lovett
The problem of constructing explicit functions which cannot be approximated by low degree polynomials has been extensively studied in computational complexity, motivated by applications in circuit lower bounds, pseudo-randomness, constructions of Ramsey graphs and locally decodable codes. Still, most of the known lower bounds become trivial for polynomials of super-logarithmic degree. Here, we suggest a new barrier explaining this phenomenon. We show that many of the existing lower bound proof techniques extend to nonclassical polynomials, an extension of classical polynomials which arose in higher order Fourier analysis. Moreover, these techniques are tight for nonclassical polynomials of logarithmic degree.
Finite Fields and Their Applications | 2015
Abhishek Bhowmick; Thái Hoàng Lê
We discuss the problem of constructing a small subset of a finite field containing primitive elements of the field. Given a finite field,
SIAM Journal on Computing | 2014
Abhishek Bhowmick; Zeev Dvir; Shachar Lovett
\mathbb{F}_{q^n}
Finite Fields and Their Applications | 2017
Abhishek Bhowmick; Thái Hoàng Lê; Yu-Ru Liu
, small
conference on innovations in theoretical computer science | 2015
Abhishek Bhowmick; Ariel Gabizon; Thái Hoàng Lê; David Zuckerman
q
symposium on the theory of computing | 2015
Abhishek Bhowmick; Shachar Lovett
and large
Electronic Colloquium on Computational Complexity | 2015
Abhishek Bhowmick; Shachar Lovett
n