首页 > 最新文献

Journal of the ACM (JACM)最新文献

英文 中文
Synchronization Strings: Codes for Insertions and Deletions Approaching the Singleton Bound 同步字符串:接近单例边界的插入和删除代码
Pub Date : 2021-09-13 DOI: 10.1145/3468265
Bernhard Haeupler, Amirbehshad Shahrasbi
We introduce synchronization strings, which provide a novel way to efficiently deal with synchronization errors, i.e., insertions and deletions. Synchronization errors are strictly more general and much harder to cope with than more commonly considered Hamming-type errors, i.e., symbol substitutions and erasures. For every ε > 0, synchronization strings allow us to index a sequence with an ε-O(1)-size alphabet, such that one can efficiently transform k synchronization errors into (1 + ε)k Hamming-type errors. This powerful new technique has many applications. In this article, we focus on designing insdel codes, i.e., error correcting block codes (ECCs) for insertion-deletion channels. While ECCs for both Hamming-type errors and synchronization errors have been intensely studied, the latter has largely resisted progress. As Mitzenmacher puts it in his 2009 survey [30]: “Channels with synchronization errors...are simply not adequately understood by current theory. Given the near-complete knowledge, we have for channels with erasures and errors...our lack of understanding about channels with synchronization errors is truly remarkable.” Indeed, it took until 1999 for the first insdel codes with constant rate, constant distance, and constant alphabet size to be constructed and only since 2016 are there constructions of constant rate insdel codes for asymptotically large noise rates. Even in the asymptotically large or small noise regimes, these codes are polynomially far from the optimal rate-distance tradeoff. This makes the understanding of insdel codes up to this work equivalent to what was known for regular ECCs after Forney introduced concatenated codes in his doctoral thesis 50 years ago. A straightforward application of our synchronization strings-based indexing method gives a simple black-box construction that transforms any ECC into an equally efficient insdel code with only a small increase in the alphabet size. This instantly transfers much of the highly developed understanding for regular ECCs into the realm of insdel codes. Most notably, for the complete noise spectrum, we obtain efficient “near-MDS” insdel codes, which get arbitrarily close to the optimal rate-distance tradeoff given by the Singleton bound. In particular, for any δ ∈ (0,1) and ε > 0, we give a family of insdel codes achieving a rate of 1 - δ - ε over a constant-size alphabet that efficiently corrects a δ fraction of insertions or deletions.
我们引入了同步字符串,它提供了一种新的方法来有效地处理同步错误,即插入和删除。同步错误严格来说比一般认为的汉明类型错误(即符号替换和擦除)更通用,也更难处理。对于每个ε > 0,同步字符串允许我们用ε- o(1)-大小的字母表索引序列,这样就可以有效地将k个同步错误转换为(1 + ε)k个hming型错误。这项强大的新技术有许多用途。在本文中,我们专注于设计插入码,即插入-删除通道的纠错块码(ECCs)。虽然对汉明型错误和同步错误的ECCs进行了深入的研究,但后者在很大程度上阻碍了进展。正如Mitzenmacher在他2009年的调查中所说的[30]:“具有同步错误的通道……是目前的理论无法充分理解的。鉴于几乎完全的知识,我们有擦除和错误的通道……我们对存在同步错误的通道缺乏了解,这一点确实值得注意。”事实上,直到1999年才构造出第一个具有恒定速率、恒定距离和恒定字母大小的内码,直到2016年才构造出具有渐近大噪声率的恒定速率内码。即使在渐近的大噪声或小噪声条件下,这些码也多项式地远离最佳速率-距离权衡。这使得对这项工作的内部代码的理解相当于50年前Forney在他的博士论文中引入串联代码后对常规ecc的理解。我们基于同步字符串的索引方法的一个直接应用程序提供了一个简单的黑盒结构,它将任何ECC转换为同样高效的内部代码,仅增加了少量的字母大小。这立即将对常规ecc的高度理解转移到内部代码领域。最值得注意的是,对于完整的噪声谱,我们获得了有效的“近mds”内码,它可以任意接近单例界给出的最佳速率-距离权衡。特别地,对于任意δ∈(0,1)且ε > 0,我们给出了一组在恒定大小的字母表上实现1 - δ - ε率的插入码,有效地纠正了δ分数的插入或删除。
{"title":"Synchronization Strings: Codes for Insertions and Deletions Approaching the Singleton Bound","authors":"Bernhard Haeupler, Amirbehshad Shahrasbi","doi":"10.1145/3468265","DOIUrl":"https://doi.org/10.1145/3468265","url":null,"abstract":"We introduce synchronization strings, which provide a novel way to efficiently deal with synchronization errors, i.e., insertions and deletions. Synchronization errors are strictly more general and much harder to cope with than more commonly considered Hamming-type errors, i.e., symbol substitutions and erasures. For every ε > 0, synchronization strings allow us to index a sequence with an ε-O(1)-size alphabet, such that one can efficiently transform k synchronization errors into (1 + ε)k Hamming-type errors. This powerful new technique has many applications. In this article, we focus on designing insdel codes, i.e., error correcting block codes (ECCs) for insertion-deletion channels. While ECCs for both Hamming-type errors and synchronization errors have been intensely studied, the latter has largely resisted progress. As Mitzenmacher puts it in his 2009 survey [30]: “Channels with synchronization errors...are simply not adequately understood by current theory. Given the near-complete knowledge, we have for channels with erasures and errors...our lack of understanding about channels with synchronization errors is truly remarkable.” Indeed, it took until 1999 for the first insdel codes with constant rate, constant distance, and constant alphabet size to be constructed and only since 2016 are there constructions of constant rate insdel codes for asymptotically large noise rates. Even in the asymptotically large or small noise regimes, these codes are polynomially far from the optimal rate-distance tradeoff. This makes the understanding of insdel codes up to this work equivalent to what was known for regular ECCs after Forney introduced concatenated codes in his doctoral thesis 50 years ago. A straightforward application of our synchronization strings-based indexing method gives a simple black-box construction that transforms any ECC into an equally efficient insdel code with only a small increase in the alphabet size. This instantly transfers much of the highly developed understanding for regular ECCs into the realm of insdel codes. Most notably, for the complete noise spectrum, we obtain efficient “near-MDS” insdel codes, which get arbitrarily close to the optimal rate-distance tradeoff given by the Singleton bound. In particular, for any δ ∈ (0,1) and ε > 0, we give a family of insdel codes achieving a rate of 1 - δ - ε over a constant-size alphabet that efficiently corrects a δ fraction of insertions or deletions.","PeriodicalId":17199,"journal":{"name":"Journal of the ACM (JACM)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75462891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
The Reachability Problem for Two-Dimensional Vector Addition Systems with States 带状态的二维矢量加法系统的可达性问题
Pub Date : 2021-08-12 DOI: 10.1145/3464794
Michael Blondin, Matthias Englert, A. Finkel, Stefan Göller, C. Haase, R. Lazic, P. McKenzie, Patrick Totzke
We prove that the reachability problem for two-dimensional vector addition systems with states is NL-complete or PSPACE-complete, depending on whether the numbers in the input are encoded in unary or binary. As a key underlying technical result, we show that, if a configuration is reachable, then there exists a witnessing path whose sequence of transitions is contained in a bounded language defined by a regular expression of pseudo-polynomially bounded length. This, in turn, enables us to prove that the lengths of minimal reachability witnesses are pseudo-polynomially bounded.
我们证明了具有状态的二维矢量加法系统的可达性问题是nl完全或pspace完全的,这取决于输入中的数字是用一元还是二进制编码的。作为一个关键的基础技术结果,我们表明,如果一个配置是可达的,那么存在一个见证路径,其转换序列包含在由伪多项式有界长度的正则表达式定义的有界语言中。这反过来又使我们能够证明最小可达性见证的长度是伪多项式有界的。
{"title":"The Reachability Problem for Two-Dimensional Vector Addition Systems with States","authors":"Michael Blondin, Matthias Englert, A. Finkel, Stefan Göller, C. Haase, R. Lazic, P. McKenzie, Patrick Totzke","doi":"10.1145/3464794","DOIUrl":"https://doi.org/10.1145/3464794","url":null,"abstract":"We prove that the reachability problem for two-dimensional vector addition systems with states is NL-complete or PSPACE-complete, depending on whether the numbers in the input are encoded in unary or binary. As a key underlying technical result, we show that, if a configuration is reachable, then there exists a witnessing path whose sequence of transitions is contained in a bounded language defined by a regular expression of pseudo-polynomially bounded length. This, in turn, enables us to prove that the lengths of minimal reachability witnesses are pseudo-polynomially bounded.","PeriodicalId":17199,"journal":{"name":"Journal of the ACM (JACM)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74602097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Invited Articles Foreword 特邀文章前言
Pub Date : 2021-03-24 DOI: 10.1145/3456290
É. Tardos
The Invited Articles section of this issue consists of two articles. The article “Uniform, Integral, and Feasible Proofs for the Determinant Identities,” by Iddo Tzameret and Stephen Cook, was invited from the 32nd ACM/ IEEE Symposium on Logic in Computer Science (LICS’17). We want to thank the LICS’17 Program Committee for their help in selecting this invited article, and editor Andrew Pitts for handling the article. The second article, “Exploiting Spontaneous Transmissions for Broadcasting and Leader Election in Radio Networks,” by Artur Czumaj and Peter Davies, won the best student paper award at the 36th ACM Symposium on Principles of Distributed Computing (POCD’17). We want to thank the PODC’17 Program Committee for their help in selecting this invited article, and editor Christian Scheideler for handling the article.
本期特邀文章部分由两篇文章组成。Iddo Tzameret和Stephen Cook的文章“行列式恒等式的一致、积分和可行证明”被邀请参加第32届ACM/ IEEE计算机科学逻辑研讨会(LICS ' 17)。我们要感谢LICS ' 17项目委员会在选择这篇特邀文章方面的帮助,以及编辑Andrew Pitts对这篇文章的处理。由Artur Czumaj和Peter Davies撰写的第二篇文章“利用无线网络中的广播和领导人选举的自发传输”在第36届ACM分布式计算原理研讨会(POCD ' 17)上获得了最佳学生论文奖。我们要感谢PODC ' 17项目委员会在选择这篇受邀文章时的帮助,以及编辑Christian Scheideler对这篇文章的处理。
{"title":"Invited Articles Foreword","authors":"É. Tardos","doi":"10.1145/3456290","DOIUrl":"https://doi.org/10.1145/3456290","url":null,"abstract":"The Invited Articles section of this issue consists of two articles. The article “Uniform, Integral, and Feasible Proofs for the Determinant Identities,” by Iddo Tzameret and Stephen Cook, was invited from the 32nd ACM/ IEEE Symposium on Logic in Computer Science (LICS’17). We want to thank the LICS’17 Program Committee for their help in selecting this invited article, and editor Andrew Pitts for handling the article. The second article, “Exploiting Spontaneous Transmissions for Broadcasting and Leader Election in Radio Networks,” by Artur Czumaj and Peter Davies, won the best student paper award at the 36th ACM Symposium on Principles of Distributed Computing (POCD’17). We want to thank the PODC’17 Program Committee for their help in selecting this invited article, and editor Christian Scheideler for handling the article.","PeriodicalId":17199,"journal":{"name":"Journal of the ACM (JACM)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91079741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On Nonconvex Optimization for Machine Learning 机器学习中的非凸优化
Pub Date : 2021-02-24 DOI: 10.1145/3418526
Chi Jin, Praneeth Netrapalli, Rong Ge, S. Kakade, Michael I. Jordan
Gradient descent (GD) and stochastic gradient descent (SGD) are the workhorses of large-scale machine learning. While classical theory focused on analyzing the performance of these methods in convex optimization problems, the most notable successes in machine learning have involved nonconvex optimization, and a gap has arisen between theory and practice. Indeed, traditional analyses of GD and SGD show that both algorithms converge to stationary points efficiently. But these analyses do not take into account the possibility of converging to saddle points. More recent theory has shown that GD and SGD can avoid saddle points, but the dependence on dimension in these analyses is polynomial. For modern machine learning, where the dimension can be in the millions, such dependence would be catastrophic. We analyze perturbed versions of GD and SGD and show that they are truly efficient—their dimension dependence is only polylogarithmic. Indeed, these algorithms converge to second-order stationary points in essentially the same time as they take to converge to classical first-order stationary points.
梯度下降(GD)和随机梯度下降(SGD)是大规模机器学习的核心。虽然经典理论侧重于分析这些方法在凸优化问题中的性能,但机器学习中最显著的成功涉及非凸优化,并且理论与实践之间出现了差距。事实上,传统的GD和SGD分析表明,这两种算法都能有效地收敛到平稳点。但是这些分析没有考虑到收敛到鞍点的可能性。最近的理论表明,GD和SGD可以避免鞍点,但在这些分析中对维数的依赖是多项式的。对于现代机器学习来说,维度可以达到数百万,这种依赖将是灾难性的。我们分析了GD和SGD的扰动版本,并表明它们是真正有效的——它们的维数依赖只是多对数的。实际上,这些算法收敛到二阶不动点的时间与收敛到经典一阶不动点的时间基本相同。
{"title":"On Nonconvex Optimization for Machine Learning","authors":"Chi Jin, Praneeth Netrapalli, Rong Ge, S. Kakade, Michael I. Jordan","doi":"10.1145/3418526","DOIUrl":"https://doi.org/10.1145/3418526","url":null,"abstract":"Gradient descent (GD) and stochastic gradient descent (SGD) are the workhorses of large-scale machine learning. While classical theory focused on analyzing the performance of these methods in convex optimization problems, the most notable successes in machine learning have involved nonconvex optimization, and a gap has arisen between theory and practice. Indeed, traditional analyses of GD and SGD show that both algorithms converge to stationary points efficiently. But these analyses do not take into account the possibility of converging to saddle points. More recent theory has shown that GD and SGD can avoid saddle points, but the dependence on dimension in these analyses is polynomial. For modern machine learning, where the dimension can be in the millions, such dependence would be catastrophic. We analyze perturbed versions of GD and SGD and show that they are truly efficient—their dimension dependence is only polylogarithmic. Indeed, these algorithms converge to second-order stationary points in essentially the same time as they take to converge to classical first-order stationary points.","PeriodicalId":17199,"journal":{"name":"Journal of the ACM (JACM)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90049589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Exploiting Spontaneous Transmissions for Broadcasting and Leader Election in Radio Networks 利用无线网络中的自发传输进行广播和领导人选举
Pub Date : 2021-01-21 DOI: 10.1145/3446383
A. Czumaj, Peter Davies
We study two fundamental communication primitives: broadcasting and leader election in the classical model of multi-hop radio networks with unknown topology and without collision detection mechanisms. It has been known for almost 20 years that in undirected networks with n nodes and diameter D, randomized broadcasting requires Ω(D log n/D + log2 n) rounds, assuming that uninformed nodes are not allowed to communicate (until they are informed). Only very recently, Haeupler and Wajc (PODC'2016) showed that this bound can be improved for the model with spontaneous transmissions, providing an O(D log n log log n/log D + logO(1) n)-time broadcasting algorithm. In this article, we give a new and faster algorithm that completes broadcasting in O(D log n/log D + logO(1) n) time, succeeding with high probability. This yields the first optimal O(D)-time broadcasting algorithm whenever n is polynomial in D. Furthermore, our approach can be applied to design a new leader election algorithm that matches the performance of our broadcasting algorithm. Previously, all fast randomized leader election algorithms have used broadcasting as a subroutine and their complexity has been asymptotically strictly larger than the complexity of broadcasting. In particular, the fastest previously known randomized leader election algorithm of Ghaffari and Haeupler (SODA'2013) requires O(D log n/D min {log log n, log n/D} + logO(1) n)-time, succeeding with high probability. Our new algorithm again requires O(D log n/log D + logO(1) n) time, also succeeding with high probability.
研究了拓扑未知、无碰撞检测机制的经典多跳无线网络模型中的广播和leader选举两个基本通信原语。近20年来,人们已经知道,在具有n个节点和直径为D的无向网络中,随机广播需要Ω(D log n/D + log2 n)轮,假设不知情的节点不允许通信(直到它们被告知)。直到最近,Haeupler和Wajc (PODC'2016)才表明,对于具有自发传输的模型,可以改进该边界,提供O(D log n log n/log D + logO(1) n)时间广播算法。在本文中,我们给出了一种新的更快的算法,该算法在O(D log n/log D + logO(1) n)时间内完成广播,成功率高。当n是D中的多项式时,这产生了第一个最优的O(D)时间广播算法。此外,我们的方法可以应用于设计一个新的领导人选举算法,该算法与我们的广播算法的性能相匹配。在此之前,所有快速随机领导人选举算法都将广播作为子程序,其复杂度渐近严格大于广播复杂度。特别是,目前已知最快的Ghaffari和Haeupler (SODA’2013)随机领导人选举算法需要O(D log n/D min {log log n, log n/D} + logO(1) n)时间,成功率高。我们的新算法同样需要O(D log n/log D + logO(1) n)时间,同样有高概率成功。
{"title":"Exploiting Spontaneous Transmissions for Broadcasting and Leader Election in Radio Networks","authors":"A. Czumaj, Peter Davies","doi":"10.1145/3446383","DOIUrl":"https://doi.org/10.1145/3446383","url":null,"abstract":"We study two fundamental communication primitives: broadcasting and leader election in the classical model of multi-hop radio networks with unknown topology and without collision detection mechanisms. It has been known for almost 20 years that in undirected networks with n nodes and diameter D, randomized broadcasting requires Ω(D log n/D + log2 n) rounds, assuming that uninformed nodes are not allowed to communicate (until they are informed). Only very recently, Haeupler and Wajc (PODC'2016) showed that this bound can be improved for the model with spontaneous transmissions, providing an O(D log n log log n/log D + logO(1) n)-time broadcasting algorithm. In this article, we give a new and faster algorithm that completes broadcasting in O(D log n/log D + logO(1) n) time, succeeding with high probability. This yields the first optimal O(D)-time broadcasting algorithm whenever n is polynomial in D. Furthermore, our approach can be applied to design a new leader election algorithm that matches the performance of our broadcasting algorithm. Previously, all fast randomized leader election algorithms have used broadcasting as a subroutine and their complexity has been asymptotically strictly larger than the complexity of broadcasting. In particular, the fastest previously known randomized leader election algorithm of Ghaffari and Haeupler (SODA'2013) requires O(D log n/D min {log log n, log n/D} + logO(1) n)-time, succeeding with high probability. Our new algorithm again requires O(D log n/log D + logO(1) n) time, also succeeding with high probability.","PeriodicalId":17199,"journal":{"name":"Journal of the ACM (JACM)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75362515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Invited Article Foreword 特邀文章前言
Pub Date : 2021-01-15 DOI: 10.1145/3442687
É. Tardos
The Invited Article section of this issue includes “The Reachability Problem for Petri Nets Is Not Elementary,” by Wojciech Czerwiński, Sławomir Lasota, Ranko Lazić, Jérôme Leroux, and Flip Mazowiecki, which won the best paper award at the 51st Annual ACM Symposium on the Theory of Computing (STOC’19). We thank the STOC’19 Program Committee for their help in selecting this invited article, and we thank editor Martin Grohe for handling this article.
本期的特邀文章部分包括Wojciech Czerwiński, Sławomir Lasota, Ranko laziki, Jérôme Leroux和Flip Mazowiecki的“Petri网的可达性问题不是基本的”,这篇文章在第51届ACM计算理论研讨会(STOC ' 19)上获得了最佳论文奖。我们感谢STOC ' 19项目委员会在选择这篇特邀文章方面的帮助,我们感谢编辑Martin Grohe对这篇文章的处理。
{"title":"Invited Article Foreword","authors":"É. Tardos","doi":"10.1145/3442687","DOIUrl":"https://doi.org/10.1145/3442687","url":null,"abstract":"The Invited Article section of this issue includes “The Reachability Problem for Petri Nets Is Not Elementary,” by Wojciech Czerwiński, Sławomir Lasota, Ranko Lazić, Jérôme Leroux, and Flip Mazowiecki, which won the best paper award at the 51st Annual ACM Symposium on the Theory of Computing (STOC’19). We thank the STOC’19 Program Committee for their help in selecting this invited article, and we thank editor Martin Grohe for handling this article.","PeriodicalId":17199,"journal":{"name":"Journal of the ACM (JACM)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79222530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mildly Short Vectors in Cyclotomic Ideal Lattices in Quantum Polynomial Time 在量子多项式时间内的环切理想格中的轻度短向量
Pub Date : 2021-01-06 DOI: 10.1145/3431725
R. Cramer, L. Ducas, B. Wesolowski
In this article, we study the geometry of units and ideals of cyclotomic rings and derive an algorithm to find a mildly short vector in any given cyclotomic ideal lattice in quantum polynomial time, under some plausible number-theoretic assumptions. More precisely, given an ideal lattice of the cyclotomic ring of conductor m, the algorithm finds an approximation of the shortest vector by a factor exp (Õ(√ m)). This result exposes an unexpected hardness gap between these structured lattices and general lattices: The best known polynomial time generic lattice algorithms can only reach an approximation factor exp (Õ(m)). Following a recent series of attacks, these results call into question the hardness of various problems over structured lattices, such as Ideal-SVP and Ring-LWE, upon which relies the security of a number of cryptographic schemes. NOTE. This article is an extended version of a conference paper [11]. The results are generalized to arbitrary cyclotomic fields. In particular, we also extend some results of Reference [10] to arbitrary cyclotomic fields. In addition, we prove the numerical stability of the method of Reference [10]. These extended results appeared in the Ph.D. dissertation of the third author [46].
在本文中,我们研究了环的单位和理想的几何性质,并在一些似是而非的数论假设下,导出了在量子多项式时间内在任意给定的环理想格上求一个微短向量的算法。更准确地说,给定导体m的环的理想晶格,该算法通过因子exp (Õ(√m))找到最短向量的近似值。这个结果揭示了这些结构化晶格和一般晶格之间意想不到的硬度差距:最著名的多项式时间通用晶格算法只能达到近似因子exp (Õ(m))。在最近的一系列攻击之后,这些结果引发了对结构化格(如Ideal-SVP和Ring-LWE)上各种问题的硬度的质疑,这些问题依赖于许多加密方案的安全性。请注意。本文是一篇会议论文[11]的扩展版。所得结果可推广到任意分眼场。特别地,我们还将文献[10]的一些结果推广到任意的分环场。此外,我们还证明了文献[10]中方法的数值稳定性。这些扩展结果出现在第三作者的博士论文中[46]。
{"title":"Mildly Short Vectors in Cyclotomic Ideal Lattices in Quantum Polynomial Time","authors":"R. Cramer, L. Ducas, B. Wesolowski","doi":"10.1145/3431725","DOIUrl":"https://doi.org/10.1145/3431725","url":null,"abstract":"In this article, we study the geometry of units and ideals of cyclotomic rings and derive an algorithm to find a mildly short vector in any given cyclotomic ideal lattice in quantum polynomial time, under some plausible number-theoretic assumptions. More precisely, given an ideal lattice of the cyclotomic ring of conductor m, the algorithm finds an approximation of the shortest vector by a factor exp (Õ(√ m)). This result exposes an unexpected hardness gap between these structured lattices and general lattices: The best known polynomial time generic lattice algorithms can only reach an approximation factor exp (Õ(m)). Following a recent series of attacks, these results call into question the hardness of various problems over structured lattices, such as Ideal-SVP and Ring-LWE, upon which relies the security of a number of cryptographic schemes. NOTE. This article is an extended version of a conference paper [11]. The results are generalized to arbitrary cyclotomic fields. In particular, we also extend some results of Reference [10] to arbitrary cyclotomic fields. In addition, we prove the numerical stability of the method of Reference [10]. These extended results appeared in the Ph.D. dissertation of the third author [46].","PeriodicalId":17199,"journal":{"name":"Journal of the ACM (JACM)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82129226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Bernoulli Factories and Black-box Reductions in Mechanism Design 机构设计中的伯努利工厂和黑盒约简
Pub Date : 2021-01-06 DOI: 10.1145/3440988
S. Dughmi, Jason D. Hartline, Robert D. Kleinberg, Rad Niazadeh
We provide a polynomial time reduction from Bayesian incentive compatible mechanism design to Bayesian algorithm design for welfare maximization problems. Unlike prior results, our reduction achieves exact incentive compatibility for problems with multi-dimensional and continuous type spaces. The key technical barrier preventing exact incentive compatibility in prior black-box reductions is that repairing violations of incentive constraints requires understanding the distribution of the mechanism’s output, which is typically #P-hard to compute. Reductions that instead estimate the output distribution by sampling inevitably suffer from sampling error, which typically precludes exact incentive compatibility. We overcome this barrier by employing and generalizing the computational model in the literature on Bernoulli Factories. In a Bernoulli factory problem, one is given a function mapping the bias of an “input coin” to that of an “output coin,” and the challenge is to efficiently simulate the output coin given only sample access to the input coin. This is the key ingredient in designing an incentive compatible mechanism for bipartite matching, which can be used to make the approximately incentive compatible reduction of Hartline et al. [18] exactly incentive compatible.
给出了福利最大化问题的贝叶斯激励相容机制设计到贝叶斯算法设计的多项式时间缩减。与先前的结果不同,我们的约简对具有多维和连续类型空间的问题实现了精确的激励相容。在先前的黑盒约简中,阻碍激励兼容的关键技术障碍是,修复违反激励约束的行为需要理解机制产出的分布,这通常是很难计算的。通过抽样来估计输出分布的减少不可避免地会受到抽样误差的影响,这通常会排除精确的激励兼容性。我们通过采用和推广伯努利工厂文献中的计算模型来克服这一障碍。在伯努利工厂问题中,给定一个映射“输入币”到“输出币”偏差的函数,挑战是在只给定输入币的样本访问权限的情况下有效地模拟输出币。这是设计二部匹配激励相容机制的关键要素,它可以使Hartline等[18]的近似激励相容约简完全激励相容。
{"title":"Bernoulli Factories and Black-box Reductions in Mechanism Design","authors":"S. Dughmi, Jason D. Hartline, Robert D. Kleinberg, Rad Niazadeh","doi":"10.1145/3440988","DOIUrl":"https://doi.org/10.1145/3440988","url":null,"abstract":"We provide a polynomial time reduction from Bayesian incentive compatible mechanism design to Bayesian algorithm design for welfare maximization problems. Unlike prior results, our reduction achieves exact incentive compatibility for problems with multi-dimensional and continuous type spaces. The key technical barrier preventing exact incentive compatibility in prior black-box reductions is that repairing violations of incentive constraints requires understanding the distribution of the mechanism’s output, which is typically #P-hard to compute. Reductions that instead estimate the output distribution by sampling inevitably suffer from sampling error, which typically precludes exact incentive compatibility. We overcome this barrier by employing and generalizing the computational model in the literature on Bernoulli Factories. In a Bernoulli factory problem, one is given a function mapping the bias of an “input coin” to that of an “output coin,” and the challenge is to efficiently simulate the output coin given only sample access to the input coin. This is the key ingredient in designing an incentive compatible mechanism for bipartite matching, which can be used to make the approximately incentive compatible reduction of Hartline et al. [18] exactly incentive compatible.","PeriodicalId":17199,"journal":{"name":"Journal of the ACM (JACM)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74170892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
EPTAS and Subexponential Algorithm for Maximum Clique on Disk and Unit Ball Graphs 圆盘和单位球图上最大团的EPTAS和亚指数算法
Pub Date : 2021-01-06 DOI: 10.1145/3433160
Marthe Bonamy, Édouard Bonnet, N. Bousquet, Pierre Charbit, P. Giannopoulos, Eun Jung Kim, Paweł Rzaͅżewski, F. Sikora, Stéphan Thomassé
A (unit) disk graph is the intersection graph of closed (unit) disks in the plane. Almost three decades ago, an elegant polynomial-time algorithm was found for MAXIMUM CLIQUE on unit disk graphs [Clark, Colbourn, Johnson; Discrete Mathematics ’90]. Since then, it has been an intriguing open question whether or not tractability can be extended to general disk graphs. We show that the disjoint union of two odd cycles is never the complement of a disk graph nor of a unit (3-dimensional) ball graph. From that fact and existing results, we derive a simple QPTAS and a subexponential algorithm running in time 2Õ(n2/3) for MAXIMUM CLIQUE on disk and unit ball graphs. We then obtain a randomized EPTAS for computing the independence number on graphs having no disjoint union of two odd cycles as an induced subgraph, bounded VC-dimension, and linear independence number. This, in combination with our structural results, yields a randomized EPTAS for MAX CLIQUE on disk and unit ball graphs. MAX CLIQUE on unit ball graphs is equivalent to finding, given a collection of points in R3, a maximum subset of points with diameter at most some fixed value. In stark contrast, MAXIMUM CLIQUE on ball graphs and unit 4-dimensional ball graphs, as well as intersection graphs of filled ellipses (even close to unit disks) or filled triangles is unlikely to have such algorithms. Indeed, we show that, for all those problems, there is a constant ratio of approximation that cannot be attained even in time 2n1−ɛ, unless the Exponential Time Hypothesis fails.
(单位)磁盘图是平面上封闭(单位)磁盘的相交图。大约三十年前,一个优雅的多项式时间算法被发现用于单位磁盘图上的MAXIMUM CLIQUE [Clark, Colbourn, Johnson;[j]。从那时起,可跟踪性是否可以扩展到一般磁盘图一直是一个有趣的开放性问题。我们证明了两个奇环的不相交并既不是圆盘图的补,也不是单位(三维)球图的补。根据这一事实和现有的结果,我们推导了一个简单的QPTAS和一个运行时间为2Õ(n2/3)的亚指数算法,用于磁盘和单位球图上的MAXIMUM CLIQUE。然后,我们得到了一个随机的EPTAS,用于计算两个奇循环不相交并的图作为诱导子图、有界vc维和线性独立数的独立数。这与我们的结构结果相结合,产生了磁盘和单位球图上MAX CLIQUE的随机EPTAS。单位球图上的MAX CLIQUE等价于在R3中给定一个点的集合,求一个直径不超过某个固定值的点的最大子集。与之形成鲜明对比的是,球图和单位四维球图上的MAXIMUM CLIQUE,以及填充椭圆(甚至接近单位圆盘)或填充三角形的相交图不太可能有这样的算法。事实上,我们证明了,对于所有这些问题,存在一个常数的近似比,即使在时间2n1−i中也不能达到,除非指数时间假设失效。
{"title":"EPTAS and Subexponential Algorithm for Maximum Clique on Disk and Unit Ball Graphs","authors":"Marthe Bonamy, Édouard Bonnet, N. Bousquet, Pierre Charbit, P. Giannopoulos, Eun Jung Kim, Paweł Rzaͅżewski, F. Sikora, Stéphan Thomassé","doi":"10.1145/3433160","DOIUrl":"https://doi.org/10.1145/3433160","url":null,"abstract":"A (unit) disk graph is the intersection graph of closed (unit) disks in the plane. Almost three decades ago, an elegant polynomial-time algorithm was found for MAXIMUM CLIQUE on unit disk graphs [Clark, Colbourn, Johnson; Discrete Mathematics ’90]. Since then, it has been an intriguing open question whether or not tractability can be extended to general disk graphs. We show that the disjoint union of two odd cycles is never the complement of a disk graph nor of a unit (3-dimensional) ball graph. From that fact and existing results, we derive a simple QPTAS and a subexponential algorithm running in time 2Õ(n2/3) for MAXIMUM CLIQUE on disk and unit ball graphs. We then obtain a randomized EPTAS for computing the independence number on graphs having no disjoint union of two odd cycles as an induced subgraph, bounded VC-dimension, and linear independence number. This, in combination with our structural results, yields a randomized EPTAS for MAX CLIQUE on disk and unit ball graphs. MAX CLIQUE on unit ball graphs is equivalent to finding, given a collection of points in R3, a maximum subset of points with diameter at most some fixed value. In stark contrast, MAXIMUM CLIQUE on ball graphs and unit 4-dimensional ball graphs, as well as intersection graphs of filled ellipses (even close to unit disks) or filled triangles is unlikely to have such algorithms. Indeed, we show that, for all those problems, there is a constant ratio of approximation that cannot be attained even in time 2n1−ɛ, unless the Exponential Time Hypothesis fails.","PeriodicalId":17199,"journal":{"name":"Journal of the ACM (JACM)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80199353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Solving Linear Programs in the Current Matrix Multiplication Time 求解当前矩阵乘法时间下的线性程序
Pub Date : 2021-01-05 DOI: 10.1145/3424305
Michael B. Cohen, Y. Lee, Zhao Song
This article shows how to solve linear programs of the form minAx=b,x≥ 0 c⊤ x with n variables in time O*((nω+n2.5−α/2+n2+1/6) log (n/δ)), where ω is the exponent of matrix multiplication, α is the dual exponent of matrix multiplication, and δ is the relative accuracy. For the current value of ω δ 2.37 and α δ 0.31, our algorithm takes O*(nω log (n/δ)) time. When ω = 2, our algorithm takes O*(n2+1/6 log (n/δ)) time. Our algorithm utilizes several new concepts that we believe may be of independent interest: • We define a stochastic central path method. • We show how to maintain a projection matrix √ WA⊤ (AWA⊤)−1A√ W in sub-quadratic time under ell2 multiplicative changes in the diagonal matrix W.
本文给出了在时间为O*((nω+n2.5 - α/2+n2+1/6) log (n/δ))的情况下,如何求解形式为minAx=b,x≥0 c∞x有n个变量的线性规划,其中ω为矩阵乘法的指数,α为矩阵乘法的对偶指数,δ为相对精度。对于ω δ 2.37和α δ 0.31的电流值,我们的算法需要O*(nω log (n/δ))时间。当ω = 2时,我们的算法需要O*(n2+1/6 log (n/δ))时间。我们的算法利用了几个我们认为可能独立感兴趣的新概念:•我们定义了一个随机中心路径方法。•我们展示了如何在对角矩阵W的ell2乘法变化下,在次二次时间内维持一个投影矩阵√WA∈(AWA∈)−1A∈W。
{"title":"Solving Linear Programs in the Current Matrix Multiplication Time","authors":"Michael B. Cohen, Y. Lee, Zhao Song","doi":"10.1145/3424305","DOIUrl":"https://doi.org/10.1145/3424305","url":null,"abstract":"This article shows how to solve linear programs of the form minAx=b,x≥ 0 c⊤ x with n variables in time O*((nω+n2.5−α/2+n2+1/6) log (n/δ)), where ω is the exponent of matrix multiplication, α is the dual exponent of matrix multiplication, and δ is the relative accuracy. For the current value of ω δ 2.37 and α δ 0.31, our algorithm takes O*(nω log (n/δ)) time. When ω = 2, our algorithm takes O*(n2+1/6 log (n/δ)) time. Our algorithm utilizes several new concepts that we believe may be of independent interest: • We define a stochastic central path method. • We show how to maintain a projection matrix √ WA⊤ (AWA⊤)−1A√ W in sub-quadratic time under ell2 multiplicative changes in the diagonal matrix W.","PeriodicalId":17199,"journal":{"name":"Journal of the ACM (JACM)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82147837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
期刊
Journal of the ACM (JACM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1