Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Sune K. Jakobsen is active.

Publication


Featured researches published by Sune K. Jakobsen.


international conference on the theory and application of cryptology and information security | 2017

Linear-Time Zero-Knowledge Proofs for Arithmetic Circuit Satisfiability

Jonathan Bootle; Andrea Cerulli; Essam Ghadafi; Jens Groth; Mohammad Hajiabadi; Sune K. Jakobsen

We give computationally efficient zero-knowledge proofs of knowledge for arithmetic circuit satisfiability over a large field. For a circuit with N addition and multiplication gates, the prover only uses O(N) multiplications and the verifier only uses O(N) additions in the field. If the commitments we use are statistically binding, our zero-knowledge proofs have unconditional soundness, while if the commitments are statistically hiding we get computational soundness. Our zero-knowledge proofs also have sub-linear communication if the commitment scheme is compact. Our construction proceeds in three steps. First, we give a zero-knowledge proof for arithmetic circuit satisfiability in an ideal linear commitment model where the prover may commit to secret vectors of field elements, and the verifier can receive certified linear combinations of those vectors. Second, we show that the ideal linear commitment proof can be instantiated using error-correcting codes and non-interactive commitments. Finally, by choosing efficient instantiations of the primitives we obtain linear-time zero-knowledge proofs.


IEEE Transactions on Information Theory | 2014

Mutual Information Matrices Are Not Always Positive Semidefinite

Sune K. Jakobsen

For discrete random variables X<sub>1</sub>, ..., X<sub>n</sub> we construct an n by n matrix. In the (i, j)-entry we put the mutual information I(X<sub>i</sub> ; X<sub>j</sub>) between X<sub>i</sub> and X<sub>j</sub>. In particular, in the (i, i)-entry we put the entropy H(X<sub>i</sub>) = I(X<sub>i</sub>; X<sub>i</sub>) of X<sub>i</sub>. This matrix, called the mutual information matrix of (X<sub>1</sub>, ..., X<sub>n</sub>), has been conjectured to be positive semidefinite. In this paper, we give counterexamples to the conjecture, and show that the conjecture holds for up to three random variables.


international colloquium on automata, languages and programming | 2017

Information Theoretical Cryptogenography.

Sune K. Jakobsen

We consider problems where n people are communicating and a random subset of them is trying to leak information, without making it clear who are leaking the information. We introduce a measure of suspicion and show that the amount of leaked information will always be bounded by the expected increase in suspicion, and that this bound is tight. Suppose a large number of people have some information they want to leak, but they want to ensure that after the communication, an observer will assign probability at most c to the events that each of them is trying to leak the information. How much information can they reliably leak, per person who is leaking? We show that the answer is


conference on innovations in theoretical computer science | 2016

How To Bootstrap Anonymous Communication

Sune K. Jakobsen; Claudio Orlandi


conference on innovations in theoretical computer science | 2016

Timeability of Extensive-Form Games

Sune K. Jakobsen; Troels Bjerre Sørensen; Vincent Conitzer

\left( \frac{-\log (1-c)}{c}-\log (e)\right)


mathematical foundations of computer science | 2015

A Numbers-on-Foreheads Game

Sune K. Jakobsen


Notre Dame Journal of Formal Logic | 2016

Some Remarks on Real Numbers Induced by First-Order Spectra

Sune K. Jakobsen; Jakob Grue Simonsen

-log(1-c)c-log(e) bits.


IACR Cryptology ePrint Archive | 2018

Nearly Linear-Time Zero-Knowledge Proofs for Correct Program Execution.

Jonathan Bootle; Andrea Cerulli; Jens Groth; Sune K. Jakobsen; Mary Maller

We ask whether it is possible to anonymously communicate a large amount of data using only public (non-anonymous) communication together with a small anonymous channel. We think this is a central question in the theory of anonymous communication and to the best of our knowledge this is the first formal study in this direction. Towards this goal, we introduce the novel concept of anonymous steganography: think of a leaker Lea who wants to leak a large document to Joe the journalist. Using anonymous steganography Lea can embed this document in innocent looking communication on some popular website (such as cat videos on YouTube or funny memes on 9GAG). Then Lea provides Joe with a short decoding key dk which, when applied to the entire website, recovers the document while hiding the identity of Lea among the large number of users of the website. Our contributions include: Introducing and formally defining anonymous steganography, A construction showing that anonymous steganography is possible (which uses recent results in circuits obfuscation), A lower bound on the number of bits which are needed to bootstrap anonymous communication.


IACR Cryptology ePrint Archive | 2017

Linear-Time Zero-Knowledge Proofs for Arithmetic Circuit Satisfiability.

Jonathan Bootle; Andrea Cerulli; Essam Ghadafi; Jens Groth; Mohammad Hajiabadi; Sune K. Jakobsen

Extensive-form games constitute the standard representation scheme for games with a temporal component. But do all extensive-form games correspond to protocols that we can implement in the real world? We often rule out games with imperfect recall, which prescribe that an agent forget something that she knew before. In this paper, we show that even some games with perfect recall can be problematic to implement. Specifically, we show that if the agents have a sense of time passing (say, access to a clock), then some extensive-form games can no longer be implemented; no matter how we attempt to time the game, some information will leak to the agents that they are not supposed to have. We say such a game is not exactly timeable. We provide easy-to-check necessary and sufficient conditions for a game to be exactly timeable. Most of the technical depth of the paper concerns how to approximately time games, which we show can always be done, though it may require large amounts of time. Specifically, we show that some games require time proportional to the power tower of height proportional to the number of players, which in practice would make them untimeable. We hope to convince the reader that timeability should be a standard assumption, just as perfect recall is today. Besides the conceptual contribution to game theory, we show that timeability has implications for onion routing protocols.


CoRR , abs/15 (2015) | 2015

How to Bootstrap Anonymous Communication.

Sune K. Jakobsen; Claudio Orlandi

Is there a joint distribution of n random variables over the natural numbers, such that they always form an increasing sequence and whenever you take two subsets of the set of random variables of the same cardinality, their distribution is almost the same?

Collaboration


Dive into the Sune K. Jakobsen's collaboration.

Top Co-Authors

Avatar

Andrea Cerulli

University College London

View shared research outputs
Top Co-Authors

Avatar

Jens Groth

University College London

View shared research outputs
Top Co-Authors

Avatar

Jonathan Bootle

University College London

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Mary Maller

University College London

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge