You're reading the public-facing archive of the Category Theory Zulip server.
To join the server you need an invite. Anybody can get an invite by contacting Matteo Capucci at name dot surname at gmail dot com.
For all things related to this archive refer to the same person.
Hey all,
This is the discussion thread of Annabelle McIver's talk, "The Category of Correlations".
The talk, besides being on Zoom, is livestreamed here: https://youtu.be/NI0L9tWQg04
Date and time: Sunday, 7 Jun, 12h UTC.
Hello all! We start in 20 minutes.
Would it be fair to characterize the idea/motivation of the category of correlations in the following way:
Since the secret is fixed across different information leaks, when we compose leaks into a network they don't depend on independent instances of the secret, but rather on a copy of the original secret. Thus, if we think of leaks as processes generating data that might depend on the secret, they have to compose in a way where the dependence on the secret is "sourced" from a common "ancestor" - the original secret.
Since Annabelle won't be able to comment herself before later today/tomorrow: the category of correlations from the end of her talk is introduced in Section 3 of this paper.
Hi all! Here's the video.
https://youtu.be/2M6sJzZiaiI
Tomáš Gonda said:
Would it be fair to characterize the idea/motivation of the category of correlations in the following way:
Since the secret is fixed across different information leaks, when we compose leaks into a network they don't depend on independent instances of the secret, but rather on a copy of the original secret. Thus, if we think of leaks as processes generating data that might depend on the secret, they have to compose in a way where the dependence on the secret is "sourced" from a common "ancestor" - the original secret.
Thanks for this. I think that characterisation looks right. Many concrete analyses of eg a program usually focusses on stand alone secrets and so this problem does not arise. It's only when one tries to compose things together that the analysis forces one to think about these things. In those little snuppets "print (x>0)" there are no state changes and so everything is easier, because the "original secret" is still what it was.
BTW -- the reference to the paper describing the category in detail is https://dblp.org/rec/bibtex/conf/birthday/RabehajaMMS19