@uniroma3.it
Professor with Department of Mathematics and Physics
Roma Tre University
My research interests are in theoretical computer science. In particular, my research ranges in Logic in Computer Science, Computational Methods for Systems Biology, Computational Number Theory, Cryptography and Cryptanalysis. Although this whole activity falls in Theoretical Computer Science, it achieves interdisciplinary research specificity. Interactions with other disciplines are the key to evaluating my activity. I developed a special kind of expertise while linking theoretical results with practical issues in the development of advanced applications for computer science.
PhD (date of defence 15 January 1999), at Equipe de Logique Mathématique of the University Paris 7, title of thesis Exécution et Programmes, thesis supervisor J.-Y. Girard;
DEA Logique et Fondements de l’Informatique, at University Paris 7, title of the master degree memory: Schémas Principaux et Réseaux de Preuves, supervisor J. van de Wiele;
Laurea of Mathematical Sciences at the University of Rome “La Sapienza”, the title of the “tesi di laurea”: Lambda Calcolo Puro, Reti di Dimostrazione e Riduzione di Testa, thesis supervisor C. Bo ̈hm co-supervisor G.F. Mascari.
Logic, Computer Science, Theoretical Computer Science, Computational Theory and Mathematics
Scopus Publications
Scholar Citations
Scholar h-index
Scholar i10-index
Marco Cianfriglia, Elia Onofri, and Marco Pedicini
Walter de Gruyter GmbH
Abstract We address the problem of user fast revocation in the lattice-based Ciphertext Policy Attribute-Based Encryption (CP-ABE) by extending the scheme originally introduced by Zhang and Zhang [Zhang J, Zhang Z. A ciphertext policy attribute-based encryption scheme without pairings. In: International Conference on Information Security and Cryptology. Springer; 2011. p. 324–40. doi: https://doi.org/10.1007/978-3-642-34704-7_23.]. While a lot of work exists on the construction of revocable schemes for CP-ABE based on pairings, works based on lattices are not so common, and – to the best of our knowledge – we introduce the first server-aided revocation scheme in a lattice-based CP-ABE scheme, hence being embedded in a post-quantum secure environment. In particular, we rely on semi-trusted “mediators” to provide a multi-step decryption capable of handling mediation without re-encryption. We comment on the scheme and its application, and we provide performance experiments on a prototype implementation in the Attribute-Based Encryption spin-off library of Palisade to evaluate the overhead compared with the original scheme.
Vilmos Komornik, Paola Loreti, and Marco Pedicini
Elsevier BV
Filippo Castiglione, Christine Nardini, Elia Onofri, Marco Pedicini, and Paolo Tieri
Institute of Electrical and Electronics Engineers (IEEE)
Drug repurposing is a highly active research area, aiming at finding novel uses for drugs that have been previously developed for other therapeutic purposes. Despite the flourishing of methodologies, success is still partial, and different approaches offer, each, peculiar advantages. In this composite landscape, we present a novel methodology focusing on an efficient mathematical procedure based on gene similarity scores and biased random walks which rely on robust drug-gene-disease association data sets. The recommendation mechanism is further unveiled by means of the Markov chain underlying the random walk process, hence providing explainability about how findings are suggested. Performances evaluation and the analysis of a case study on rheumatoid arthritis show that our approach is accurate in providing useful recommendations and is computationally efficient, compared to the state of the art of drug repurposing approaches.
Ginevra Giordani, Lorenzo Grassi, Silvia Onofri, and Marco Pedicini
Springer Nature Switzerland
Marco Cianfriglia, Elia Onofri, Silvia Onofri, and Marco Pedicini
Springer Science and Business Media LLC
AbstractAlgebraic Cryptanalysis is a widely used technique that tackles the problem of breaking ciphers mainly relying on the ability to express a cryptosystem as a solvable polynomial system. Each output bit/word can be expressed as a polynomial equation in the cipher’s inputs—namely the key and the plaintext or the initialisation vector bits/words. A part of research in this area consists in finding suitable algebraic structures where polynomial systems can be effectively solved, e.g., by computing Gröbner bases. In 2009, Dinur and Shamir proposed the cube attack, a chosen plaintext algebraic cryptanalysis technique for the offline acquisition of an equivalent system by means of monomial reduction; interpolation on cubes in the space of variables enables retrieving a linear polynomial system, hence making it exploitable in the online phase to recover the secret key. Since its introduction, this attack has received both many criticisms and endorsements from the crypto community; this work aims at providing, under a unified notation, a complete state-of-the-art review of recent developments by categorising contributions in five classes. We conclude the work with an in-depth description of the kite attack framework, a cipher-independent tool that implements cube attacks on GPUs. Mickey2.0 is adopted as a showcase.
Lorenzo Grassi, Silvia Onofri, Marco Pedicini, and Luca Sozzi
Universitatsbibliothek der Ruhr-Universitat Bochum
Motivated by new applications such as secure Multi-Party Computation (MPC), Fully Homomorphic Encryption (FHE), and Zero-Knowledge proofs (ZK), many MPC-, FHE- and ZK-friendly symmetric-key primitives that minimize the number of multiplications over Fp for a large prime p have been recently proposed in the literature. This goal is often achieved by instantiating the non-linear layer via power maps x↦xd. In this paper, we start an analysis of new non-linear permutation functions over Fnp that can be used as building blocks in such symmetrickey primitives. Given a local map F : Fmp→ Fp, we limit ourselves to focus on S-Boxes over Fnp for n ≥ m defined as SF (x0, x1, . . . , xn−1) = y0|y1| . . . |yn−1 where yi := F(xi, xi+1, . . . , xi+m−1). As main results, we prove that• given any quadratic function F : F2p→ Fp, the corresponding S-Box SF over Fnp for n ≥ 3 is never invertible;• similarly, given any quadratic function F : F3p → Fp, the corresponding S-Box SF over Fnp for n ≥ 5 is never invertible.Moreover, for each p ≥ 3, we present (1st) generalizations of the Lai-Massey construction over Fnp defined as before via functions F : Fmp → Fp for each n = m ≥ 2 and (2nd) (non-trivial) quadratic functions F : F3p → Fp such that SF over Fnp for n ∈ {3, 4} is invertible. As an open problem for future work, we conjecture that for each m ≥ 1 there exists a finite integer nmax(m) such that SF over Fnp defined as before via a quadratic function F : Fmp →Fp is not invertible for each n ≥ nmax(m). Finally, as a concrete application, we propose Neptune, a variant of the sponge hash function Poseidon, whose non-linear layer is designed by taking into account the results presented in this paper. We show that this variant leads to a concrete multiplication reduction with respect to Poseidon.
Marco Cianfriglia, Stefano Guarino, Massimo Bernaschi, Flavio Lombardi, and Marco Pedicini
Springer Science and Business Media LLC
Anna Chiara Lai, Marco Pedicini, and Mario Piazza
Cambridge University Press (CUP)
AbstractIn this paper, we propose and explore a new approach to abstract machines and optimal reduction via streams, infinite sequences of elements. We first define a sequential abstract machine capable of performing directed virtual reduction (DVR) and then we extend it to its parallel version, whose equivalence is explained through the properties of DVR itself. The result is a formal definition of the λ-calculus interpreter called Parallel Environment for Lambda Calculus Reduction (PELCR), a software for λ-calculus reduction based on the Geometry of Interaction. In particular, we describe PELCR as a stream-processing abstract machine, which in principle can also be applied to infinite streams.
Mario Piazza and Marco Pedicini
Springer International Publishing
Filippo Castiglione, Emiliano Mancini, Marco Pedicini, and Abdul Salam Jarrah
Elsevier
Marco Pedicini, Maria Concetta Palumbo, and Filippo Castiglione
Springer International Publishing
V. Komornik and M. Pedicini
Springer Science and Business Media LLC
Marco Cianfriglia, Stefano Guarino, Massimo Bernaschi, Flavio Lombardi, and Marco Pedicini
Springer International Publishing
Vilmos Komornik, Marco Pedicini, and Attila Pethő
Springer Science and Business Media LLC
We investigate the existence of simultaneous representations of real numbers x in bases 1 < q _1 < … < q _r, r ≥ 2, with a finite digit set A ⊂ ℝ. We prove that if A contains both positive and negative digits, then each real number has infinitely many common expansions. In general the bases depend on x . If A contains the digits −1, 0, 1, then there exist two non-empty open intervals I, J such that for any fixed q _1 ∈ I each x ∈ J has common expansions for some bases q _1 < … < q _r.
Anna Chiara Lai, Marco Pedicini, and Silvia Rognone
Springer Science and Business Media LLC
D. Canavese, E. Cesena, R. Ouchary, M. Pedicini, and L. Roversi
Elsevier BV
Daniele Canavese, Emanuele Cesena, Rachid Ouchary, Marco Pedicini, and Luca Roversi
Springer International Publishing
Emanuele Cesena, Marco Pedicini, and Luca Roversi
Springer Berlin Heidelberg
Vilmos Komornik, Anna Chiara Lai, and Marco Pedicini
European Mathematical Society - EMS - Publishing House GmbH
Expansions in noninteger bases often appear in number theory and probability theory, and they are closely connected to ergodic theory, measure theory and topology. For two-letter alphabets the golden ratio plays a special role: in smaller bases only trivial expansions are unique, whereas in greater bases there exist nontrivial unique expansions. In this paper we determine the corresponding critical bases for all three-letter alphabets and we establish the fractal nature of these bases in function of the alphabets.
Trevor Clancy, Marco Pedicini, Filippo Castiglione, Daniele Santoni, Vegard Nygaard, Timothy J Lavelle, Mikael Benson, and Eivind Hovig
Springer Science and Business Media LLC
Marco Pedicini, Fredrik Barrenäs, Trevor Clancy, Filippo Castiglione, Eivind Hovig, Kartiek Kanduri, Daniele Santoni, and Mikael Benson
Public Library of Science (PLoS)
Two T helper (Th) cell subsets, namely Th1 and Th2 cells, play an important role in inflammatory diseases. The two subsets are thought to counter-regulate each other, and alterations in their balance result in different diseases. This paradigm has been challenged by recent clinical and experimental data. Because of the large number of genes involved in regulating Th1 and Th2 cells, assessment of this paradigm by modeling or experiments is difficult. Novel algorithms based on formal methods now permit the analysis of large gene regulatory networks. By combining these algorithms with in silico knockouts and gene expression microarray data from human T cells, we examined if the results were compatible with a counter-regulatory role of Th1 and Th2 cells. We constructed a directed network model of genes regulating Th1 and Th2 cells through text mining and manual curation. We identified four attractors in the network, three of which included genes that corresponded to Th0, Th1 and Th2 cells. The fourth attractor contained a mixture of Th1 and Th2 genes. We found that neither in silico knockouts of the Th1 and Th2 attractor genes nor gene expression microarray data from patients with immunological disorders and healthy subjects supported a counter-regulatory role of Th1 and Th2 cells. By combining network modeling with transcriptomic data analysis and in silico knockouts, we have devised a practical way to help unravel complex regulatory network topology and to increase our understanding of how network actions may differ in health and disease.
Daniele Santoni, Marco Pedicini, and Filippo Castiglione
Oxford University Press (OUP)
Abstract Motivation: An unbalanced differentiation of T helper cells from precursor type TH0 to the TH1 or TH2 phenotype in immune responses often leads to a pathological condition. In general, immune reactions biased toward TH1 responses may result in auto-immune diseases, while enhanced TH2 responses may cause allergic reactions. The aim of this work is to integrate a gene network of the TH differentiation in an agent-based model of the hyper-sensitivity reaction. The implementation of such a system introduces a second level of description beyond the mesoscopic level of the inter-cellular interaction of the agent-based model. The intra-cellular level consists in the cell internal dynamics of gene activation and transcription. The gene regulatory network includes genes-related molecules that have been found to be involved in the differentiation process in TH cells. Results: The simulator reproduces the hallmarks of an IgE-mediated hypersensitive reaction and provides an example of how to combine the mesoscopic level description of immune cells with the microscopic gene-level dynamics. Availability: The basic version of the simulator of the immune response can be downloaded here: http://www.iac.cnr.it/~filippo/C-ImmSim.html Contact: f.castiglione@iac.cnr.it Supplementary information: Supplementary data are available at Bioinformatics online.
Marco Pedicini and Francesco Quaglia
Association for Computing Machinery (ACM)
In this article we present the implementation of an environment supporting Lévy's optimal reduction for the λ-calculus on parallel (or distributed) computing systems. In a similar approach to Lamping's, we base our work on a graph reduction technique, known as directed virtual reduction , which is actually a restriction of Danos-Regnier virtual reduction. The environment, which we refer to as PELCR (parallel environment for optimal lambda-calculus reduction), relies on a strategy for directed virtual reduction, namely half combustion . While developing PELCR we adopted both a message aggregation technique, allowing reduction of the communication overhead, and a fair policy for distributing dynamically originated load among processors. We also present an experimental study demonstrating the ability of PELCR to definitely exploit the parallelism intrinsic to λ-terms while performing the reduction. We show how PELCR allows achieving up to 70--80% of the ideal speedup on last generation multiprocessor computing systems. As a last note, the software modules have been developed with the C language and using a standard interface for message passing, that is, MPI, thus making PELCR itself a highly portable software package.