首页 > 最新文献

2017 IEEE 58th Annual Symposium on Foundations of Computer Science (FOCS)最新文献

英文 中文
Deterministic Search for CNF Satisfying Assignments in Almost Polynomial Time 几乎多项式时间内满足赋值的CNF的确定性搜索
Pub Date : 2017-10-01 DOI: 10.1109/FOCS.2017.80
R. Servedio, Li-Yang Tan
We consider the fundamental derandomization problem of deterministically finding a satisfying assignment to a CNF formula that has many satisfying assignments. We give a deterministic algorithm which, given an n-variable poly(n)-clause CNF formula F that has at least ≥ 2^n satisfying assignments, runs in time [ n^{tilde{O}(loglog n)^2} ] for ≥ ge 1/polylog(n) and outputs a satisfying assignment of F. Prior to our work the fastest known algorithm for this problem was simply to enumerate over all seeds of a pseudorandom generator for CNFs; using the best known PRGs for CNFs cite{DETT10, this takes time n^{tilde{Ω}(log n)} even for constant ≥. Our approach is based on a new general framework relating deterministic search and deterministic approximate counting, which we believe may find further applications.
我们考虑一个基本的非随机化问题,即确定性地找到一个有许多满意赋值的CNF公式的满意赋值。我们给出了一个确定性算法,给定一个n变量poly(n)-clause - CNF公式F,它至少具有≥2^n个满足的赋值,运行时间[n^{tilde{O}(loglog n)^2} ] for ≥ge 1/polylog(n)并输出一个令人满意的赋值f。在我们的工作之前,已知最快的算法是简单地枚举CNFs的伪随机生成器的所有种子;对于CNFs cite{DETT10,使用最著名的PRGs,即使对于常数≥,也需要n^{tilde{Ω}(log n)}时间。我们的方法是基于一个与确定性搜索和确定性近似计数相关的新的通用框架,我们相信这可能会找到进一步的应用。
{"title":"Deterministic Search for CNF Satisfying Assignments in Almost Polynomial Time","authors":"R. Servedio, Li-Yang Tan","doi":"10.1109/FOCS.2017.80","DOIUrl":"https://doi.org/10.1109/FOCS.2017.80","url":null,"abstract":"We consider the fundamental derandomization problem of deterministically finding a satisfying assignment to a CNF formula that has many satisfying assignments. We give a deterministic algorithm which, given an n-variable poly(n)-clause CNF formula F that has at least ≥ 2^n satisfying assignments, runs in time [ n^{tilde{O}(loglog n)^2} ] for ≥ ge 1/polylog(n) and outputs a satisfying assignment of F. Prior to our work the fastest known algorithm for this problem was simply to enumerate over all seeds of a pseudorandom generator for CNFs; using the best known PRGs for CNFs cite{DETT10, this takes time n^{tilde{Ω}(log n)} even for constant ≥. Our approach is based on a new general framework relating deterministic search and deterministic approximate counting, which we believe may find further applications.","PeriodicalId":311592,"journal":{"name":"2017 IEEE 58th Annual Symposium on Foundations of Computer Science (FOCS)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127081268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Garbled Protocols and Two-Round MPC from Bilinear Maps 双线性映射的乱码协议和两轮MPC
Pub Date : 2017-10-01 DOI: 10.1109/FOCS.2017.60
Sanjam Garg, Akshayaram Srinivasan
In this paper, we initiate the study of garbled protocols — a generalization of Yaos garbled circuits construction to distributed protocols. More specifically, in a garbled protocol construction, each party can independently generate a garbled protocol component along with pairs of input labels. Additionally, it generates an encoding of its input. The evaluation procedure takes as input the set of all garbled protocol components and the labels corresponding to the input encodings of all parties and outputs the entire transcript of the distributed protocol.We provide constructions for garbling arbitrary protocols based on standard computational assumptions on bilinear maps (in the common random string model). Next, using garbled protocols we obtain a general compiler that compresses any arbitrary round multiparty secure computation protocol into a two-round UC secure protocol. Previously, two-round multiparty secure computation protocols were only known assuming witness encryption or learning-with errors. Benefiting from our generic approach we also obtain protocols (i) for the setting of random access machines (RAM programs) while keeping communication and computational costs proportional to running times, while (ii) making only a black-box use of the underlying group, eliminating the need for any expensive non-black-box group operations. Our results are obtained by a simple but powerful extension of the non-interactive zero-knowledge proof system of Groth, Ostrovsky and Sahai [Journal of ACM, 2012].
在本文中,我们启动了对乱码协议的研究—将姚的乱码电路构造推广到分布式协议。更具体地说,在乱码协议构造中,每一方都可以独立地生成一个乱码协议组件以及对输入标签。此外,它还生成其输入的编码。求值过程将所有乱码协议组件的集合和各方输入编码对应的标签作为输入,输出分布式协议的整个文本。我们提供了基于双线性映射(在普通随机字符串模型中)的标准计算假设的乱码任意协议的构造。其次,使用乱码协议,我们获得了一个通用编译器,该编译器将任意轮多方安全计算协议压缩为两轮UC安全协议。以前,两轮多方安全计算协议仅在假设证人加密或有错误学习的情况下才已知。得益于我们的通用方法,我们还获得了(i)用于设置随机存取机(RAM程序)的协议,同时保持通信和计算成本与运行时间成正比,同时(ii)仅使用底层组的黑盒,消除了任何昂贵的非黑盒组操作的需要。我们的结果是通过对growth, Ostrovsky和Sahai [Journal of ACM, 2012]的非交互式零知识证明系统的简单而强大的扩展获得的。
{"title":"Garbled Protocols and Two-Round MPC from Bilinear Maps","authors":"Sanjam Garg, Akshayaram Srinivasan","doi":"10.1109/FOCS.2017.60","DOIUrl":"https://doi.org/10.1109/FOCS.2017.60","url":null,"abstract":"In this paper, we initiate the study of garbled protocols — a generalization of Yaos garbled circuits construction to distributed protocols. More specifically, in a garbled protocol construction, each party can independently generate a garbled protocol component along with pairs of input labels. Additionally, it generates an encoding of its input. The evaluation procedure takes as input the set of all garbled protocol components and the labels corresponding to the input encodings of all parties and outputs the entire transcript of the distributed protocol.We provide constructions for garbling arbitrary protocols based on standard computational assumptions on bilinear maps (in the common random string model). Next, using garbled protocols we obtain a general compiler that compresses any arbitrary round multiparty secure computation protocol into a two-round UC secure protocol. Previously, two-round multiparty secure computation protocols were only known assuming witness encryption or learning-with errors. Benefiting from our generic approach we also obtain protocols (i) for the setting of random access machines (RAM programs) while keeping communication and computational costs proportional to running times, while (ii) making only a black-box use of the underlying group, eliminating the need for any expensive non-black-box group operations. Our results are obtained by a simple but powerful extension of the non-interactive zero-knowledge proof system of Groth, Ostrovsky and Sahai [Journal of ACM, 2012].","PeriodicalId":311592,"journal":{"name":"2017 IEEE 58th Annual Symposium on Foundations of Computer Science (FOCS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123901704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 49
Capacity of Neural Networks for Lifelong Learning of Composable Tasks 可组合任务的神经网络终身学习能力
Pub Date : 2017-10-01 DOI: 10.1109/FOCS.2017.41
L. Valiant
We investigate neural circuits in the exacting setting that (i) the acquisition of a piece of knowledge can occur from a single interaction, (ii) the result of each such interaction is a rapidly evaluatable subcircuit, (iii) hundreds of thousands of such subcircuits can be acquired in sequence without substantially degrading the earlier ones, and (iv) recall can be in the form of a rapid evaluation of a composition of subcircuits that have been so acquired at arbitrary different earlier times.We develop a complexity theory, in terms of asymptotically matching upper and lower bounds, on the capacity of a neural network for executing, in this setting, the following action, which we call {it association}: Each action sets up a subcircuit so that the excitation of a chosen set of neurons A will in future cause the excitation of another chosen set B.% As model of computation we consider the neuroidal model, a fully distributed model in which the quantitative resources n, the neuron numbers, d, the number of other neurons each neuron is connected to, and k, the inverse of the maximum synaptic strength, are all accounted for.A succession of experiences, possibly over a lifetime, results in the realization of a complex set of subcircuits. The composability requirement constrains the model to ensure that, for each association as realized by a subcircuit, the excitation in the triggering set of neurons A is quantitatively similar to that in the triggered set B, and also that the unintended excitation in the rest of the system is negligible. These requirements ensure that chains of associations can be triggeredWe first analyze what we call the Basic Mechanism, which uses only direct connections between neurons in the triggering set A and the target set B. We consider random networks of n neurons with expected number d of connections to and from each. We show that in the composable context capacity growth is limited by d^2, a severe limitation if the network is sparse, as it is in cortex. We go on to study the Expansive Mechanism, that additionally uses intermediate relay neurons which have high synaptic weights. For this mechanism we show that the capacity can grow as dn, to within logarithmic factors. From these two results it follows that in the composable regime, for the realistic cortical estimate of d=n^{frac{1}{2}, superlinear capacity of order n^{frac{3}{2}} in terms of the neuron numbers can be realized by the Expansive Mechanism, instead of the linear order n to which the Basic Mechanism is limited. More generally, for both mechanisms, we establish matching upper and lower bounds on capacity in terms of the parameters n, d, and the inverse maximum synaptic strength k.The results as stated above assume that in a set of associations, a target B can be triggered by at most one set A. It can be shown that the capacities are similar if the number m of As that can trigger a B is greater than one but small, but become severely constrained if m exceeds a c
我们研究的神经回路在严格的设置(i)知识的获取可以从一个单一的相互作用中发生,(ii)每个这样的相互作用的结果是一个可快速评估的子回路,(iii)成千上万的这样的子回路可以按顺序获得,而不会大大降低早期的,以及(iv)回忆可以以快速评估在任意不同的早期时间获得的子回路组成的形式。我们发展了一个复杂性理论,根据渐近匹配上界和下界,在这种情况下,神经网络执行以下动作的能力,我们称之为{it关联}:每个动作都建立了一个子电路,这样,对一组选定的神经元a的兴奋将在将来引起另一组选定的神经元b的兴奋。%作为计算模型,我们考虑神经形态模型,这是一个完全分布的模型,其中定量资源n,神经元数量,d,每个神经元连接的其他神经元数量,以及k,最大突触强度的倒数,都被考虑在内。一连串的经历,可能在一生中,导致一组复杂的子电路的实现。可组合性要求约束模型确保,对于由子电路实现的每个关联,神经元a触发集中的激励与触发集B中的激励在数量上相似,并且系统其余部分的意外激励可以忽略不计。我们首先分析我们所谓的基本机制,它只使用触发集A和目标集b中的神经元之间的直接连接。我们考虑n个神经元的随机网络,每个神经元之间的预期连接数为d。我们表明,在可组合上下文中,容量增长受到d^2的限制,如果网络是稀疏的,就像在皮质中一样,这是一个严重的限制。我们继续研究扩张性机制,它额外使用具有高突触权重的中间中继神经元。对于这种机制,我们表明容量可以在对数因子内以dn增长。由这两个结果可知,在可组合状态下,对于d=n^{frac{1}{2}的现实皮质估计,可以用扩展机制来实现n^{frac{3}{2}}的神经元数的超线性容量,而不是基本机制所局限的线性n阶容量。更普遍的是,为机制,建立匹配能力的上下界估计参数n, d,和逆最大突触强度k.The结果如上所述假设在一组关联,一个目标B最多可以由一组答:它可以表明,能力是相似的,如果可以引发B m的数量大于1,但小,但成为严重制约如果m超过某个阈值。
{"title":"Capacity of Neural Networks for Lifelong Learning of Composable Tasks","authors":"L. Valiant","doi":"10.1109/FOCS.2017.41","DOIUrl":"https://doi.org/10.1109/FOCS.2017.41","url":null,"abstract":"We investigate neural circuits in the exacting setting that (i) the acquisition of a piece of knowledge can occur from a single interaction, (ii) the result of each such interaction is a rapidly evaluatable subcircuit, (iii) hundreds of thousands of such subcircuits can be acquired in sequence without substantially degrading the earlier ones, and (iv) recall can be in the form of a rapid evaluation of a composition of subcircuits that have been so acquired at arbitrary different earlier times.We develop a complexity theory, in terms of asymptotically matching upper and lower bounds, on the capacity of a neural network for executing, in this setting, the following action, which we call {it association}: Each action sets up a subcircuit so that the excitation of a chosen set of neurons A will in future cause the excitation of another chosen set B.% As model of computation we consider the neuroidal model, a fully distributed model in which the quantitative resources n, the neuron numbers, d, the number of other neurons each neuron is connected to, and k, the inverse of the maximum synaptic strength, are all accounted for.A succession of experiences, possibly over a lifetime, results in the realization of a complex set of subcircuits. The composability requirement constrains the model to ensure that, for each association as realized by a subcircuit, the excitation in the triggering set of neurons A is quantitatively similar to that in the triggered set B, and also that the unintended excitation in the rest of the system is negligible. These requirements ensure that chains of associations can be triggeredWe first analyze what we call the Basic Mechanism, which uses only direct connections between neurons in the triggering set A and the target set B. We consider random networks of n neurons with expected number d of connections to and from each. We show that in the composable context capacity growth is limited by d^2, a severe limitation if the network is sparse, as it is in cortex. We go on to study the Expansive Mechanism, that additionally uses intermediate relay neurons which have high synaptic weights. For this mechanism we show that the capacity can grow as dn, to within logarithmic factors. From these two results it follows that in the composable regime, for the realistic cortical estimate of d=n^{frac{1}{2}, superlinear capacity of order n^{frac{3}{2}} in terms of the neuron numbers can be realized by the Expansive Mechanism, instead of the linear order n to which the Basic Mechanism is limited. More generally, for both mechanisms, we establish matching upper and lower bounds on capacity in terms of the parameters n, d, and the inverse maximum synaptic strength k.The results as stated above assume that in a set of associations, a target B can be triggered by at most one set A. It can be shown that the capacities are similar if the number m of As that can trigger a B is greater than one but small, but become severely constrained if m exceeds a c","PeriodicalId":311592,"journal":{"name":"2017 IEEE 58th Annual Symposium on Foundations of Computer Science (FOCS)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121483374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Efficient Bayesian Estimation from Few Samples: Community Detection and Related Problems 基于少量样本的高效贝叶斯估计:社区检测及相关问题
Pub Date : 2017-10-01 DOI: 10.1109/FOCS.2017.42
Samuel B. Hopkins, David Steurer
We propose an efficient meta-algorithm for Bayesian inference problems based on low-degree polynomials, semidefinite programming, and tensor decomposition. The algorithm is inspired by recent lower bound constructions for sum-of-squares and related to the method of moments. Our focus is on sample complexity bounds that are as tight as possible (up to additive lower-order terms) and often achieve statistical thresholds or conjectured computational thresholds.Our algorithm recovers the best known bounds for partial recovery in the stochastic block model, a widely-studied class of inference problems for community detection in graphs. We obtain the first partial recovery guarantees for the mixed-membership stochastic block model (Airoldi et el.) for constant average degree—up to what we conjecture to be the computational threshold for this model. %Our algorithm also captures smooth trade-offs between sample and computational complexity, for example, for tensor principal component analysis. We show that our algorithm exhibits a sharp computational threshold for the stochastic block model with multiple communities beyond the Kesten–Stigum bound—giving evidence that this task may require exponential time.The basic strategy of our algorithm is strikingly simple: we compute the best-possible low-degree approximation for the moments of the posterior distribution of the parameters and use a robust tensor decomposition algorithm to recover the parameters from these approximate posterior moments.
我们提出了一种基于低次多项式、半定规划和张量分解的贝叶斯推理问题的有效元算法。该算法的灵感来自于最近的平方和下界构造,并与矩量法有关。我们的重点是尽可能严格的样本复杂性界限(直到加性低阶项),并且经常达到统计阈值或推测的计算阈值。我们的算法恢复了随机块模型中最著名的部分恢复界,随机块模型是一类广泛研究的图中社区检测的推理问题。我们获得了混合隶属度随机块模型(Airoldi et el.)在恒定平均度—下的第一个部分恢复保证,该保证达到了我们推测的该模型的计算阈值。我们的算法还捕获样本和计算复杂性之间的平滑权衡,例如,用于张量主成分分析。我们表明,我们的算法对随机块模型显示出一个尖锐的计算阈值,该模型具有超过kesten&# x2013;Stigum边界—这表明该任务可能需要指数时间。我们的算法的基本策略非常简单:我们计算参数后验分布的矩的最佳低度近似值,并使用鲁棒张量分解算法从这些近似后验矩中恢复参数。
{"title":"Efficient Bayesian Estimation from Few Samples: Community Detection and Related Problems","authors":"Samuel B. Hopkins, David Steurer","doi":"10.1109/FOCS.2017.42","DOIUrl":"https://doi.org/10.1109/FOCS.2017.42","url":null,"abstract":"We propose an efficient meta-algorithm for Bayesian inference problems based on low-degree polynomials, semidefinite programming, and tensor decomposition. The algorithm is inspired by recent lower bound constructions for sum-of-squares and related to the method of moments. Our focus is on sample complexity bounds that are as tight as possible (up to additive lower-order terms) and often achieve statistical thresholds or conjectured computational thresholds.Our algorithm recovers the best known bounds for partial recovery in the stochastic block model, a widely-studied class of inference problems for community detection in graphs. We obtain the first partial recovery guarantees for the mixed-membership stochastic block model (Airoldi et el.) for constant average degree—up to what we conjecture to be the computational threshold for this model. %Our algorithm also captures smooth trade-offs between sample and computational complexity, for example, for tensor principal component analysis. We show that our algorithm exhibits a sharp computational threshold for the stochastic block model with multiple communities beyond the Kesten–Stigum bound—giving evidence that this task may require exponential time.The basic strategy of our algorithm is strikingly simple: we compute the best-possible low-degree approximation for the moments of the posterior distribution of the parameters and use a robust tensor decomposition algorithm to recover the parameters from these approximate posterior moments.","PeriodicalId":311592,"journal":{"name":"2017 IEEE 58th Annual Symposium on Foundations of Computer Science (FOCS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123375140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 75
The Power of Sum-of-Squares for Detecting Hidden Structures 平方和在检测隐藏结构中的作用
Pub Date : 2017-10-01 DOI: 10.1109/FOCS.2017.72
Samuel B. Hopkins, Pravesh Kothari, Aaron Potechin, P. Raghavendra, T. Schramm, David Steurer
We study planted problems—finding hidden structures in random noisy inputs—through the lens of the sum-of-squares semidefinite programming hierarchy (SoS). This family of powerful semidefinite programs has recently yielded many new algorithms for planted problems, often achieving the best known polynomial-time guarantees in terms of accuracy of recovered solutions and robustness to noise. One theme in recent work is the design of spectral algorithms which match the guarantees of SoS algorithms for planted problems. Classical spectral algorithms are often unable to accomplish this: the twist in these new spectral algorithms is the use of spectral structure of matrices whose entries are low-degree polynomials of the input variables.We prove that for a wide class of planted problems, including refuting random constraint satisfaction problems, tensor and sparse PCA, densest-ksubgraph, community detection in stochastic block models, planted clique, and others, eigenvalues of degree-d matrix polynomials are as powerful as SoS semidefinite programs of degree d. For such problems it is therefore always possible to match the guarantees of SoS without solving a large semidefinite program.Using related ideas on SoS algorithms and lowdegree matrix polynomials (and inspired by recent work on SoS and the planted clique problem [BHK+16]), we prove a new SoS lower bound for the tensor PCA problem.
我们研究了植入式问题—通过平方和半定规划层次(so)的透镜在随机噪声输入中寻找隐藏结构—。这一系列强大的半定规划最近产生了许多针对植入式问题的新算法,通常在恢复解的准确性和对噪声的鲁棒性方面实现了最著名的多项式时间保证。在最近的工作中,一个主题是谱算法的设计,匹配的保证的SoS算法的植入式问题。经典的谱算法往往无法做到这一点:这些新的谱算法的转折是使用矩阵的谱结构,其条目是输入变量的低次多项式。我们证明了对于广泛的一类种植问题,包括反驳随机约束满足问题,张量和稀疏PCA,密集-k子图,随机块模型中的社区检测,种植团等,d次矩阵多项式的特征值与d次的so半定规划一样强大。因此,对于此类问题,总是有可能匹配so的保证而无需求解大型半定规划。利用SoS算法和低次矩阵多项式的相关思想(并受到最近关于SoS和植团问题的研究[BHK+16]的启发),我们证明了张量PCA问题的一个新的SoS下界。
{"title":"The Power of Sum-of-Squares for Detecting Hidden Structures","authors":"Samuel B. Hopkins, Pravesh Kothari, Aaron Potechin, P. Raghavendra, T. Schramm, David Steurer","doi":"10.1109/FOCS.2017.72","DOIUrl":"https://doi.org/10.1109/FOCS.2017.72","url":null,"abstract":"We study planted problems—finding hidden structures in random noisy inputs—through the lens of the sum-of-squares semidefinite programming hierarchy (SoS). This family of powerful semidefinite programs has recently yielded many new algorithms for planted problems, often achieving the best known polynomial-time guarantees in terms of accuracy of recovered solutions and robustness to noise. One theme in recent work is the design of spectral algorithms which match the guarantees of SoS algorithms for planted problems. Classical spectral algorithms are often unable to accomplish this: the twist in these new spectral algorithms is the use of spectral structure of matrices whose entries are low-degree polynomials of the input variables.We prove that for a wide class of planted problems, including refuting random constraint satisfaction problems, tensor and sparse PCA, densest-ksubgraph, community detection in stochastic block models, planted clique, and others, eigenvalues of degree-d matrix polynomials are as powerful as SoS semidefinite programs of degree d. For such problems it is therefore always possible to match the guarantees of SoS without solving a large semidefinite program.Using related ideas on SoS algorithms and lowdegree matrix polynomials (and inspired by recent work on SoS and the planted clique problem [BHK+16]), we prove a new SoS lower bound for the tensor PCA problem.","PeriodicalId":311592,"journal":{"name":"2017 IEEE 58th Annual Symposium on Foundations of Computer Science (FOCS)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130189850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 103
Random Formulas, Monotone Circuits, and Interpolation 随机公式,单调电路和插值
Pub Date : 2017-10-01 DOI: 10.1109/FOCS.2017.20
P. Hrubes, P. Pudlák
We prove new lower bounds on the sizes of proofs in the Cutting Plane proof system, using a concept that we call unsatisfiability certificate. This approach is, essentially, equivalent to the well-known feasible interpolation method, but is applicable to CNF formulas that do not seem suitable for interpolation. Specifically, we prove exponential lower bounds for random k-CNFs, where k is the logarithm of the number of variables, and for the Weak Bit Pigeon Hole Principle. Furthermore, we prove a monotone variant of a hypothesis of Feige [12]. We give a superpolynomial lower bound on monotone real circuits that approximately decide the satisfiability of k-CNFs, where k = ω(1). For k ≈ logn, the lower bound is exponential.
我们用一个我们称之为不满意证明的概念,证明了切割平面证明系统中样张尺寸的新下界。这种方法本质上相当于众所周知的可行插值方法,但适用于似乎不适合插值的CNF公式。具体来说,我们证明了随机k- cnfs的指数下界,其中k是变量数的对数,以及弱比特鸽子洞原理。进一步,我们证明了Feige[12]的一个假设的单调变体。在单调实电路上给出了近似决定k- cnfs可满足性的一个超多项式下界,其中k = ω(1)。For k ≈Logn,下界是指数。
{"title":"Random Formulas, Monotone Circuits, and Interpolation","authors":"P. Hrubes, P. Pudlák","doi":"10.1109/FOCS.2017.20","DOIUrl":"https://doi.org/10.1109/FOCS.2017.20","url":null,"abstract":"We prove new lower bounds on the sizes of proofs in the Cutting Plane proof system, using a concept that we call unsatisfiability certificate. This approach is, essentially, equivalent to the well-known feasible interpolation method, but is applicable to CNF formulas that do not seem suitable for interpolation. Specifically, we prove exponential lower bounds for random k-CNFs, where k is the logarithm of the number of variables, and for the Weak Bit Pigeon Hole Principle. Furthermore, we prove a monotone variant of a hypothesis of Feige [12]. We give a superpolynomial lower bound on monotone real circuits that approximately decide the satisfiability of k-CNFs, where k = ω(1). For k ≈ logn, the lower bound is exponential.","PeriodicalId":311592,"journal":{"name":"2017 IEEE 58th Annual Symposium on Foundations of Computer Science (FOCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128755289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
White-Box vs. Black-Box Complexity of Search Problems: Ramsey and Graph Property Testing 搜索问题的白盒复杂度vs黑盒复杂度:Ramsey和图属性测试
Ilan Komargodski, M. Naor, E. Yogev
Ramsey theory assures us that in any graph there is a clique or independent set of a certain size, roughly logarithmic in the graph size. But how difficult is it to find the clique or independent set? If the graph is given explicitly, then it is possible to do so while examining a linear number of edges. If the graph is given by a black-box, where to figure out whether a certain edge exists the box should be queried, then a large number of queries must be issued. But what if one is given a program or circuit for computing the existence of an edge? This problem was raised by Buss and Goldberg and Papadimitriou in the context of TFNP, search problems with a guaranteed solution.We examine the relationship between black-box complexity and white-box complexity for search problems with guaranteed solution such as the above Ramsey problem. We show that under the assumption that collision resistant hash function exist (which follows from the hardness of problems such as factoring, discrete-log and learning with errors) the white-box Ramsey problem is hard and this is true even if one is looking for a much smaller clique or independent set than the theorem guarantees.In general, one cannot hope to translate all black-box hardness for TFNP into white-box hardness: we show this by adapting results concerning the random oracle methodology and the impossibility of instantiating it.Another model we consider is the succinct black-box, where there is a known upper bound on the size of the black-box (but no limit on the computation time). In this case we show that for all TFNP problems there is an upper bound on the number of queries proportional to the description size of the box times the solution size. On the other hand, for promise problems this is not the case.Finally, we consider the complexity of graph property testing in the white-box model. We show a property which is hard to test even when one is given the program for computing the graph. The hard property is whether the graph is a two-source extractor.
拉姆齐理论向我们保证,在任何图中都有一定大小的团或独立集,图的大小大致为对数。但是找到小团体或独立团体有多难呢?如果图是显式给出的,那么可以在检查线性数量的边时这样做。如果图是由一个黑盒子给出的,要想知道某条边是否存在,就需要查询黑盒子,那么就必须进行大量的查询。但是,如果给定一个程序或电路来计算边的存在性呢?这个问题是由Buss, Goldberg和Papadimitriou在TFNP的背景下提出的,TFNP是一种具有保证解的搜索问题。我们研究了具有保证解的搜索问题(如上述Ramsey问题)的黑盒复杂度和白盒复杂度之间的关系。我们证明,在抗碰撞哈希函数存在的假设下(这是从诸如因式分解、离散对数和带误差学习等问题的困难中得出的),白盒拉姆齐问题是困难的,即使一个人正在寻找比定理保证的小得多的团或独立集,这也是正确的。一般来说,人们不能希望将TFNP的所有黑盒硬度转化为白盒硬度:我们通过调整有关随机预言方法的结果和实例化它的不可能性来证明这一点。我们考虑的另一个模型是简洁的黑盒,黑盒的大小有一个已知的上限(但计算时间没有限制)。在这种情况下,我们表明,对于所有的TFNP问题,查询的数量有一个上界,这个上界与盒子的描述大小乘以解决方案大小成正比。另一方面,对于承诺问题,情况并非如此。最后,我们考虑了白盒模型中图属性测试的复杂性。我们展示了一个即使给出计算图的程序也难以检验的性质。硬属性是图是否是双源提取器。
{"title":"White-Box vs. Black-Box Complexity of Search Problems: Ramsey and Graph Property Testing","authors":"Ilan Komargodski, M. Naor, E. Yogev","doi":"10.1145/3341106","DOIUrl":"https://doi.org/10.1145/3341106","url":null,"abstract":"Ramsey theory assures us that in any graph there is a clique or independent set of a certain size, roughly logarithmic in the graph size. But how difficult is it to find the clique or independent set? If the graph is given explicitly, then it is possible to do so while examining a linear number of edges. If the graph is given by a black-box, where to figure out whether a certain edge exists the box should be queried, then a large number of queries must be issued. But what if one is given a program or circuit for computing the existence of an edge? This problem was raised by Buss and Goldberg and Papadimitriou in the context of TFNP, search problems with a guaranteed solution.We examine the relationship between black-box complexity and white-box complexity for search problems with guaranteed solution such as the above Ramsey problem. We show that under the assumption that collision resistant hash function exist (which follows from the hardness of problems such as factoring, discrete-log and learning with errors) the white-box Ramsey problem is hard and this is true even if one is looking for a much smaller clique or independent set than the theorem guarantees.In general, one cannot hope to translate all black-box hardness for TFNP into white-box hardness: we show this by adapting results concerning the random oracle methodology and the impossibility of instantiating it.Another model we consider is the succinct black-box, where there is a known upper bound on the size of the black-box (but no limit on the computation time). In this case we show that for all TFNP problems there is an upper bound on the number of queries proportional to the description size of the box times the solution size. On the other hand, for promise problems this is not the case.Finally, we consider the complexity of graph property testing in the white-box model. We show a property which is hard to test even when one is given the program for computing the graph. The hard property is whether the graph is a two-source extractor.","PeriodicalId":311592,"journal":{"name":"2017 IEEE 58th Annual Symposium on Foundations of Computer Science (FOCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128354122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
Lockable Obfuscation 可锁定的困惑
Pub Date : 2017-10-01 DOI: 10.1109/FOCS.2017.62
Rishab Goyal, Venkata Koppula, Brent Waters
In this paper we introduce the notion of lockable obfuscation. In a lockable obfuscation scheme there exists an obfuscation algorithm Obf that takes as input a security parameter, a program P, a message msg and lock value lck and outputs an obfuscated program oP. One can evaluate the obfuscated program oP on any input x where the output of evaluation is the message msg if P(x) = lck and otherwise receives a rejecting symbol.We proceed to provide a construction of lockable obfuscation and prove it secure under the Learning with Errors (LWE) assumption. Notably, our proof only requires LWE with polynomial hardness and does not require complexity leveraging.We follow this by describing multiple applications of lockable obfuscation. First, we show how to transform any attribute-based encryption (ABE) scheme into one in which the attributes used to encrypt the message are hidden from any user that is not authorized to decrypt the message. (Such a system is also know as predicate encryption with one-sided security.) The only previous construction due to Gorbunov, Vaikuntanathan and Wee is based off of a specific ABE scheme of Boneh. By enabling the transformation of any ABE scheme we can inherent different forms and features of the underlying scheme such as: multi-authority, adaptive security from polynomial hardness, regular language policies, etc.We also show applications of lockable obfuscation to separation and uninstantiability results. We first show how to create new separation results in circular encryption that were previously based on indistinguishability obfuscation. This results in new separation results from learning with error including a public key bit encryption scheme that it IND-CPA secure and not circular secure. The tool of lockable obfuscation allows these constructions to be almost immediately realized by translation from previous indistinguishability obfuscation based constructions.In a similar vein we provide random oracle uninstantiability results of the Fujisaki-Okamoto transformation (and related transformations) from the lockable obfuscation combined with fully homomorphic encryption. Again, we take advantage that previous work used indistinguishability obfuscation that obfuscated programs in a form that could easily be translated to lockable obfuscation.
本文引入了可锁定混淆的概念。在一个可锁定的混淆方案中,存在一个混淆算法Obf,它将一个安全参数、一个程序P、一个消息msg和锁值lck作为输入,并输出一个混淆的程序oP。一个人可以在任何输入x上计算混淆的程序oP,如果P(x) = lck,计算的输出是消息msg,否则接收一个拒绝符号。我们给出了一个可锁定混淆的构造,并证明了它在有错误学习(LWE)假设下是安全的。值得注意的是,我们的证明只需要具有多项式硬度的LWE,而不需要利用复杂性。接下来,我们将描述可锁定混淆的多个应用。首先,我们将展示如何将任何基于属性的加密(ABE)方案转换为对未经授权解密消息的任何用户隐藏用于加密消息的属性的方案。(这种系统也被称为具有单边安全性的谓词加密。)Gorbunov, Vaikuntanathan和Wee之前唯一的建筑是基于Boneh的特定ABE方案。通过实现任意ABE方案的转换,我们可以固有底层方案的不同形式和特征,例如:多权威、多项式硬度的自适应安全性、规则语言策略等。我们还展示了可锁定混淆对分离和不可实例化结果的应用。我们首先展示如何在循环加密中创建新的分离结果,而循环加密以前是基于不可区分性混淆的。这导致了新的分离结果,其中包括一个公钥位加密方案,它是IND-CPA安全的,而不是循环安全的。可锁定混淆的工具允许这些结构几乎可以立即实现从以前的不可区分混淆基于结构的翻译。在类似的情况下,我们提供了Fujisaki-Okamoto转换(以及相关转换)的随机oracle不可实例化结果,这些转换来自可锁定混淆与完全同态加密的结合。同样,我们利用了以前的工作使用的不可区分混淆,这种混淆的形式可以很容易地转换为可锁定混淆。
{"title":"Lockable Obfuscation","authors":"Rishab Goyal, Venkata Koppula, Brent Waters","doi":"10.1109/FOCS.2017.62","DOIUrl":"https://doi.org/10.1109/FOCS.2017.62","url":null,"abstract":"In this paper we introduce the notion of lockable obfuscation. In a lockable obfuscation scheme there exists an obfuscation algorithm Obf that takes as input a security parameter, a program P, a message msg and lock value lck and outputs an obfuscated program oP. One can evaluate the obfuscated program oP on any input x where the output of evaluation is the message msg if P(x) = lck and otherwise receives a rejecting symbol.We proceed to provide a construction of lockable obfuscation and prove it secure under the Learning with Errors (LWE) assumption. Notably, our proof only requires LWE with polynomial hardness and does not require complexity leveraging.We follow this by describing multiple applications of lockable obfuscation. First, we show how to transform any attribute-based encryption (ABE) scheme into one in which the attributes used to encrypt the message are hidden from any user that is not authorized to decrypt the message. (Such a system is also know as predicate encryption with one-sided security.) The only previous construction due to Gorbunov, Vaikuntanathan and Wee is based off of a specific ABE scheme of Boneh. By enabling the transformation of any ABE scheme we can inherent different forms and features of the underlying scheme such as: multi-authority, adaptive security from polynomial hardness, regular language policies, etc.We also show applications of lockable obfuscation to separation and uninstantiability results. We first show how to create new separation results in circular encryption that were previously based on indistinguishability obfuscation. This results in new separation results from learning with error including a public key bit encryption scheme that it IND-CPA secure and not circular secure. The tool of lockable obfuscation allows these constructions to be almost immediately realized by translation from previous indistinguishability obfuscation based constructions.In a similar vein we provide random oracle uninstantiability results of the Fujisaki-Okamoto transformation (and related transformations) from the lockable obfuscation combined with fully homomorphic encryption. Again, we take advantage that previous work used indistinguishability obfuscation that obfuscated programs in a form that could easily be translated to lockable obfuscation.","PeriodicalId":311592,"journal":{"name":"2017 IEEE 58th Annual Symposium on Foundations of Computer Science (FOCS)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115083380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 93
Random Θ(log n)-CNFs Are Hard for Cutting Planes 随机Θ(log n)-CNFs很难切割平面
Pub Date : 2017-10-01 DOI: 10.1109/FOCS.2017.19
Noah Fleming, D. Pankratov, T. Pitassi, Robert Robere
The random k-SAT model is the most important and well-studied distribution over k-SAT instances. It is closely connected to statistical physics and is a benchmark for satisfiability algorithms. We show that when k = Θ(log n), any Cutting Planes refutation for random k-SAT requires exponential size in the interesting regime where the number of clauses guarantees that the formula is unsatisfiable with high probability.
随机k-SAT模型是k-SAT实例上最重要和研究最充分的分布。它与统计物理密切相关,是可满足性算法的基准。我们表明,当k = Θ(log n)时,任何随机k- sat的切割平面反驳都需要在有趣区域内的指数大小,其中子句的数量保证公式在高概率下是不可满足的。
{"title":"Random Θ(log n)-CNFs Are Hard for Cutting Planes","authors":"Noah Fleming, D. Pankratov, T. Pitassi, Robert Robere","doi":"10.1109/FOCS.2017.19","DOIUrl":"https://doi.org/10.1109/FOCS.2017.19","url":null,"abstract":"The random k-SAT model is the most important and well-studied distribution over k-SAT instances. It is closely connected to statistical physics and is a benchmark for satisfiability algorithms. We show that when k = Θ(log n), any Cutting Planes refutation for random k-SAT requires exponential size in the interesting regime where the number of clauses guarantees that the formula is unsatisfiable with high probability.","PeriodicalId":311592,"journal":{"name":"2017 IEEE 58th Annual Symposium on Foundations of Computer Science (FOCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131059134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
High Dimensional Expanders Imply Agreement Expanders 高维展开器意味着协议展开器
Pub Date : 2017-10-01 DOI: 10.1109/FOCS.2017.94
Irit Dinur, T. Kaufman
We show that high dimensional expanders imply derandomized direct product tests, with a number of subsets that is linear in the size of the universe.Direct product tests belong to a family of tests called agreement tests that are important components in PCP constructions and include, for example, low degree tests such as line vs. line and plane vs. plane.For a generic hypergraph, we introduce the notion of agreement expansion, which captures the usefulness of the hypergraph for an agreement test. We show that explicit bounded degree agreement expanders exist, based on Ramanujan complexes.
我们证明了高维膨胀器意味着非随机直接积测试,具有许多在宇宙大小上是线性的子集。直接产品测试属于称为一致性测试的测试系列,是PCP构建中的重要组成部分,包括低程度测试,例如线与线、平面与平面。对于一般的超图,我们引入了协议展开的概念,它捕获了超图在一致性测试中的有用性。我们证明了基于Ramanujan复形的显有界度协议展开子的存在。
{"title":"High Dimensional Expanders Imply Agreement Expanders","authors":"Irit Dinur, T. Kaufman","doi":"10.1109/FOCS.2017.94","DOIUrl":"https://doi.org/10.1109/FOCS.2017.94","url":null,"abstract":"We show that high dimensional expanders imply derandomized direct product tests, with a number of subsets that is linear in the size of the universe.Direct product tests belong to a family of tests called agreement tests that are important components in PCP constructions and include, for example, low degree tests such as line vs. line and plane vs. plane.For a generic hypergraph, we introduce the notion of agreement expansion, which captures the usefulness of the hypergraph for an agreement test. We show that explicit bounded degree agreement expanders exist, based on Ramanujan complexes.","PeriodicalId":311592,"journal":{"name":"2017 IEEE 58th Annual Symposium on Foundations of Computer Science (FOCS)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131456291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 108
期刊
2017 IEEE 58th Annual Symposium on Foundations of Computer Science (FOCS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1