Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Jeremiah Blocki is active.

Publication


Featured researches published by Jeremiah Blocki.


conference on innovations in theoretical computer science | 2013

Differentially private data analysis of social networks via restricted sensitivity

Jeremiah Blocki; Avrim Blum; Anupam Datta; Or Sheffet

We introduce the notion of restricted sensitivity as an alternative to global and smooth sensitivity to improve accuracy in differentially private data analysis. The definition of restricted sensitivity is similar to that of global sensitivity except that instead of quantifying over all possible datasets, we take advantage of any beliefs about the dataset that a querier may have, to quantify over a restricted class of datasets. Specifically, given a query f and a hypothesis HH about the structure of a dataset D, we show generically how to transform f into a new query fHH whose global sensitivity (over all datasets including those that do not satisfy HH) matches the restricted sensitivity of the query f. Moreover, if the belief of the querier is correct (i.e., D ∈ HH) then fHH(D) = f(D). If the belief is incorrect, then fHH(D) may be inaccurate. We demonstrate the usefulness of this notion by considering the task of answering queries regarding social-networks, which we model as a combination of a graph and a labeling of its vertices. In particular, while our generic procedure is computationally inefficient, for the specific definition of H as graphs of bounded degree, we exhibit efficient ways of constructing fH using different projection-based techniques. We then analyze two important query classes: subgraph counting queries (e.g., number of triangles) and local profile queries (e.g., number of people who know a spy and a computer-scientist who know each other). We demonstrate that the restricted sensitivity of such queries can be significantly lower than their smooth sensitivity. Thus, using restricted sensitivity we can maintain privacy whether or not D ∈ HH, while providing more accurate results in the event that HH holds true.


international colloquium on automata languages and programming | 2010

Resolving the complexity of some data privacy problems

Jeremiah Blocki; Ryan Williams

We formally study two methods for data sanitation that have been used extensively in the database community: k-anonymity and l- diversity. We settle several open problems concerning the difficulty of applying these methods optimally, proving both positive and negative results: - 2-anonymity is in P. - The problem of partitioning the edges of a triangle-free graph into 4-stars (degree-three vertices) is NP-hard. This yields an alternative proof that 3-anonymity is NP-hard even when the database attributes are all binary. - 3-anonymity with only 27 attributes per record is MAX SNP-hard. - For databases with n rows, k-anonymity is in O(4n ċ poly(n)) time for all k > 1. - For databases with l attributes, alphabet size c, and n rows, k- Anonymity can be solved in 2O(k2(2c)l) + O(nl) time. - 3-diversity with binary attributes is NP-hard, with one sensitive attribute. - 2-diversity with binary attributes is NP-hard, with three sensitive attributes.


international conference on the theory and application of cryptology and information security | 2013

Naturally Rehearsing Passwords

Jeremiah Blocki; Manuel Blum; Anupam Datta

We introduce quantitative usability and security models to guide the design of password management schemes — systematic strategies to help users create and remember multiple passwords. In the same way that security proofs in cryptography are based on complexity-theoretic assumptions (e.g., hardness of factoring and discrete logarithm), we quantify usability by introducing usability assumptions. In particular, password management relies on assumptions about human memory, e.g., that a user who follows a particular rehearsal schedule will successfully maintain the corresponding memory. These assumptions are informed by research in cognitive science and can be tested empirically. Given rehearsal requirements and a user’s visitation schedule for each account, we use the total number of extra rehearsals that the user would have to do to remember all of his passwords as a measure of the usability of the password scheme. Our usability model leads us to a key observation: password reuse benefits users not only by reducing the number of passwords that the user has to memorize, but more importantly by increasing the natural rehearsal rate for each password. We also present a security model which accounts for the complexity of password management with multiple accounts and associated threats, including online, offline, and plaintext password leak attacks. Observing that current password management schemes are either insecure or unusable, we present Shared Cues — a new scheme in which the underlying secret is strategically shared across accounts to ensure that most rehearsal requirements are satisfied naturally while simultaneously providing strong security. The construction uses the Chinese Remainder Theorem to achieve these competing goals.


ieee computer security foundations symposium | 2011

Regret Minimizing Audits: A Learning-Theoretic Basis for Privacy Protection

Jeremiah Blocki; Nicolas Christin; Anupam Datta; Arunesh Sinha

Audit mechanisms are essential for privacy protection in permissive access control regimes, such as in hospitals where denying legitimate access requests can adversely affect patient care. Recognizing this need, we develop the first principled learning-theoretic foundation for audits. Our first contribution is a game-theoretic model that captures the interaction between the defender (e.g., hospital auditors) and the adversary (e.g., hospital employees). The model takes pragmatic considerations into account, in particular, the periodic nature of audits, a budget that constrains the number of actions that the defender can inspect, and a loss function that captures the economic impact of detected and missed violations on the organization. We assume that the adversary is worst-case as is standard in other areas of computer security. We also formulate a desirable property of the audit mechanism in this model based on the concept of regret in learning theory. Our second contribution is an efficient audit mechanism that provably minimizes regret for the defender. This mechanism learns from experience to guide the defenders auditing efforts. The regret bound is significantly better than prior results in the learning literature. The stronger bound is important from a practical standpoint because it implies that the recommendations from the mechanism will converge faster to the best fixed auditing strategy for the defender.


international cryptology conference | 2016

Efficiently Computing Data-Independent Memory-Hard Functions

Joël Alwen; Jeremiah Blocki

A memory-hard function MHF f is equipped with a space cost


network and distributed system security symposium | 2015

Spaced Repetition and Mnemonics Enable Recall of Multiple Strong Passwords

Jeremiah Blocki; Saranga Komanduri; Lorrie Faith Cranor; Anupam Datta


arXiv: Cryptography and Security | 2013

GOTCHA password hackers

Jeremiah Blocki; Manuel Blum; Anupam Datta

{\sigma }


theory and application of cryptographic techniques | 2017

Depth-Robust Graphs and Their Cumulative Memory Complexity

Joël Alwen; Jeremiah Blocki; Krzysztof Pietrzak


ieee computer security foundations symposium | 2016

CASH: A Cost Asymmetric Secure Hash Algorithm for Optimal Password Protection

Jeremiah Blocki; Anupam Datta

and time cost


theory of cryptography conference | 2016

Designing Proof of Human-Work Puzzles for Cryptocurrency and Beyond

Jeremiah Blocki; Hong-Sheng Zhou

Collaboration


Dive into the Jeremiah Blocki's collaboration.

Top Co-Authors

Avatar

Anupam Datta

Carnegie Mellon University

View shared research outputs
Top Co-Authors

Avatar

Arunesh Sinha

University of Southern California

View shared research outputs
Top Co-Authors

Avatar

Nicolas Christin

Carnegie Mellon University

View shared research outputs
Top Co-Authors

Avatar

Joël Alwen

Institute of Science and Technology Austria

View shared research outputs
Top Co-Authors

Avatar

Manuel Blum

Carnegie Mellon University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Avrim Blum

Carnegie Mellon University

View shared research outputs
Top Co-Authors

Avatar

Or Sheffet

Carnegie Mellon University

View shared research outputs
Researchain Logo
Decentralizing Knowledge