首页 > 最新文献

Proceedings 2001 IEEE International Conference on Cluster Computing最新文献

英文 中文
The complexity of factors of multivariate polynomials 多元多项式因子的复杂性
Pub Date : 2018-12-17 DOI: 10.1109/SFCS.2001.959912
Peter Burgisser
The existence of string functions, which are not polynomial time computable, but whose graph is checkable in polynomial time, is a basic assumption in cryptography. We prove that in the framework of algebraic complexity, there are no such families of polynomial functions of p-bounded degree overfields of characteristic zero. The proof relies on a polynomial upper bound on the approximative complexity of a factor g of a polynomial f in terms of the (approximative) complexity of f and the degree of the factor g. This extends a result by E. Kaltofen (1986). The concept of approximative complexity allows us to cope with the case that a factor has an exponential multiplicity, by using a perturbation argument. Our result extends to randomized (two-sided error) decision complexity.
字符串函数在多项式时间内不可计算,但其图在多项式时间内可校验,这是密码学中的一个基本假设。证明了在代数复杂度的框架下,特征为零的域上不存在p有界的多项式函数族。这个证明依赖于多项式f的一个因子g的近似复杂性的多项式上界,这个近似复杂性是根据f的(近似)复杂性和因子g的程度来表示的。这扩展了E. Kaltofen(1986)的一个结果。近似复杂性的概念允许我们通过使用摄动论证来处理因子具有指数多重性的情况。我们的结果扩展到随机(双侧误差)决策复杂性。
{"title":"The complexity of factors of multivariate polynomials","authors":"Peter Burgisser","doi":"10.1109/SFCS.2001.959912","DOIUrl":"https://doi.org/10.1109/SFCS.2001.959912","url":null,"abstract":"The existence of string functions, which are not polynomial time computable, but whose graph is checkable in polynomial time, is a basic assumption in cryptography. We prove that in the framework of algebraic complexity, there are no such families of polynomial functions of p-bounded degree overfields of characteristic zero. The proof relies on a polynomial upper bound on the approximative complexity of a factor g of a polynomial f in terms of the (approximative) complexity of f and the degree of the factor g. This extends a result by E. Kaltofen (1986). The concept of approximative complexity allows us to cope with the case that a factor has an exponential multiplicity, by using a perturbation argument. Our result extends to randomized (two-sided error) decision complexity.","PeriodicalId":378126,"journal":{"name":"Proceedings 2001 IEEE International Conference on Cluster Computing","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123161057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 58
Compact oracles for reachability and approximate distances in planar digraphs 用于平面有向图的可达性和近似距离的紧凑指示符
Pub Date : 2001-10-14 DOI: 10.1109/SFCS.2001.959898
M. Thorup
It is shown that a planar digraph can be preprocessed in near-linear time, producing a near-linear space distance oracle that can answer reachability queries in constant time. The oracle can be distributed as an O(log n) space label for each vertex and then we can determine if one vertex can reach another considering their two labels only. The approach generalizes to approximate distances in weighted planar digraphs where we can then get a (1+/spl epsi/) approximation distance in O(log log /spl Delta/+1//spl epsi/) time where /spl Delta/ is the longest finite distance in the graph and weights are assumed to be non-negative integers. Our scheme can be extended to find and route along the short dipaths. Our technique is based on a novel dipath decomposition of planar digraphs that instead of using the standard separator with O(/spl radic/n) vertices, in effect finds a separator using a constant number of dipaths.
结果表明,平面有向图可以在近线性时间内进行预处理,得到一个可以在常数时间内回答可达性查询的近线性空间距离预表。oracle可以为每个顶点分配一个O(log n)空间标签,然后我们可以确定一个顶点是否可以到达另一个顶点,只考虑它们的两个标签。该方法推广到加权平面有向图中的近似距离,然后我们可以在O(log log /spl Delta/+1//spl epsi/)时间内得到(1+/spl epsi/)近似距离,其中/spl Delta/是图中最长的有限距离,并且假设权值为非负整数。我们的方案可以推广到沿短通道寻找和路由。我们的技术是基于一种新的平面有向图的双径分解,它不是使用带有O(/spl径向/n)顶点的标准分隔符,而是使用常数数量的双径找到一个分隔符。
{"title":"Compact oracles for reachability and approximate distances in planar digraphs","authors":"M. Thorup","doi":"10.1109/SFCS.2001.959898","DOIUrl":"https://doi.org/10.1109/SFCS.2001.959898","url":null,"abstract":"It is shown that a planar digraph can be preprocessed in near-linear time, producing a near-linear space distance oracle that can answer reachability queries in constant time. The oracle can be distributed as an O(log n) space label for each vertex and then we can determine if one vertex can reach another considering their two labels only. The approach generalizes to approximate distances in weighted planar digraphs where we can then get a (1+/spl epsi/) approximation distance in O(log log /spl Delta/+1//spl epsi/) time where /spl Delta/ is the longest finite distance in the graph and weights are assumed to be non-negative integers. Our scheme can be extended to find and route along the short dipaths. Our technique is based on a novel dipath decomposition of planar digraphs that instead of using the standard separator with O(/spl radic/n) vertices, in effect finds a separator using a constant number of dipaths.","PeriodicalId":378126,"journal":{"name":"Proceedings 2001 IEEE International Conference on Cluster Computing","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115556040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 315
Approximate shape fitting via linearization 通过线性化近似形状拟合
Pub Date : 2001-10-14 DOI: 10.1109/SFCS.2001.959881
Sariel Har-Peled, Kasturi R. Varadarajan
Shape fitting is a fundamental optimization problem in computer science. The authors present a general and unified technique for solving a certain family of such problems. Given a point set P in R/sup d/, this technique can be used to /spl epsi/-approximate: (i) the min-width annulus and shell that contains P, (ii) minimum width cylindrical shell containing P, (iii) diameter, width, minimum volume bounding box of P, and (iv) all the previous measures for the case the points are moving. The running time of the resulting algorithms is O(n + 1//spl epsi//sup c/), where c is a constant that depends on the problem at hand. Our new general technique enables us to solve those problems without resorting to a careful and painful case by case analysis, as was previously done for those problems. Furthermore, for several of those problems our results are considerably simpler and faster than what was previously known. In particular, for the minimum width cylindrical shell problem, our solution is the first algorithm whose running time is subquadratic in n. (In fact we get running time linear in n.).
形状拟合是计算机科学中的一个基本优化问题。作者提出了一种通用的、统一的方法来解决这类问题。给定R/sup /中的点集P,该技术可用于/spl epsi/-近似:(i)包含P的最小宽度环空和壳,(ii)包含P的最小宽度圆柱壳,(iii) P的直径,宽度,最小体积边界框,以及(iv)所有先前的点在移动情况下的测量。结果算法的运行时间为O(n + 1//spl epsi//sup c/),其中c是一个常数,取决于手头的问题。我们的新通用技术使我们能够解决这些问题,而不必诉诸于仔细和痛苦的逐个案例分析,就像以前对这些问题所做的那样。此外,对于其中的一些问题,我们的结果比以前已知的要简单和快速得多。特别是,对于最小宽度圆柱壳问题,我们的解是第一个运行时间在n上是次二次的算法(实际上我们得到的运行时间在n上是线性的)。
{"title":"Approximate shape fitting via linearization","authors":"Sariel Har-Peled, Kasturi R. Varadarajan","doi":"10.1109/SFCS.2001.959881","DOIUrl":"https://doi.org/10.1109/SFCS.2001.959881","url":null,"abstract":"Shape fitting is a fundamental optimization problem in computer science. The authors present a general and unified technique for solving a certain family of such problems. Given a point set P in R/sup d/, this technique can be used to /spl epsi/-approximate: (i) the min-width annulus and shell that contains P, (ii) minimum width cylindrical shell containing P, (iii) diameter, width, minimum volume bounding box of P, and (iv) all the previous measures for the case the points are moving. The running time of the resulting algorithms is O(n + 1//spl epsi//sup c/), where c is a constant that depends on the problem at hand. Our new general technique enables us to solve those problems without resorting to a careful and painful case by case analysis, as was previously done for those problems. Furthermore, for several of those problems our results are considerably simpler and faster than what was previously known. In particular, for the minimum width cylindrical shell problem, our solution is the first algorithm whose running time is subquadratic in n. (In fact we get running time linear in n.).","PeriodicalId":378126,"journal":{"name":"Proceedings 2001 IEEE International Conference on Cluster Computing","volume":"235 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121867785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Randomly colouring graphs with lower bounds on girth and maximum degree 随机上色图形与下界的周长和最大程度
Pub Date : 2001-10-14 DOI: 10.1109/SFCS.2001.959934
M. Dyer, A. Frieze
We consider the problem of generating a random q-colouring of a graph G=(V, E). We consider the simple Glauber Dynamics chain. We show that if the maximum degree /spl Delta/>c/sub l/ ln n and the girth g>c/sub 2/ ln ln n (n=|V|), then this chain mixes rapidly provided C/sub 1/, C/sub 2/ are sufficiently large, q/A>/spl beta/, where /spl beta//spl ap/1.763 is the root of /spl beta/=e/sup 1//spl beta//. For this class of graphs, this beats the 11/spl Delta//6 bound of E. Vigoda (1999) for general graphs. We extend the result to random graphs.
我们考虑生成图G=(V, E)的随机q-着色问题。我们考虑简单的Glauber动力学链。我们证明,如果最大度/spl δ />c/sub - 1/ ln n和周长g>c/sub - 2/ ln - ln n (n=|V|),则在c/sub - 1/、c/sub - 2/足够大的情况下,q/A>/spl β /,其中/spl β //spl ap/1.763是/spl β /=e/sup 1//spl β //的根。对于这类图,这优于E. Vigoda(1999)对于一般图的11/spl Delta//6界。我们将结果推广到随机图。
{"title":"Randomly colouring graphs with lower bounds on girth and maximum degree","authors":"M. Dyer, A. Frieze","doi":"10.1109/SFCS.2001.959934","DOIUrl":"https://doi.org/10.1109/SFCS.2001.959934","url":null,"abstract":"We consider the problem of generating a random q-colouring of a graph G=(V, E). We consider the simple Glauber Dynamics chain. We show that if the maximum degree /spl Delta/>c/sub l/ ln n and the girth g>c/sub 2/ ln ln n (n=|V|), then this chain mixes rapidly provided C/sub 1/, C/sub 2/ are sufficiently large, q/A>/spl beta/, where /spl beta//spl ap/1.763 is the root of /spl beta/=e/sup 1//spl beta//. For this class of graphs, this beats the 11/spl Delta//6 bound of E. Vigoda (1999) for general graphs. We extend the result to random graphs.","PeriodicalId":378126,"journal":{"name":"Proceedings 2001 IEEE International Conference on Cluster Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123843185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 72
"Planar" tautologies hard for resolution “平面”重言式难以分辨
Pub Date : 2001-10-14 DOI: 10.1109/SFCS.2001.959896
Stefan S. Dantchev, Søren Riis
We prove exponential lower bounds on the resolution proofs of some tautologies, based on rectangular grid graphs. More specifically, we show a 2/sup /spl Omega/(n)/ lower bound for any resolution proof of the mutilated chessboard problem on a 2n/spl times/2n chessboard as well as for the Tseitin tautology (G. Tseitin, 1968) based on the n/spl times/n rectangular grid graph. The former result answers a 35 year old conjecture by J. McCarthy (1964).
在矩形网格图的基础上,我们证明了一些重言式的分辨率证明的指数下界。更具体地说,我们展示了一个2/sup /spl Omega/(n)/下界,适用于在2n/spl次/2n棋盘上残废棋盘问题的任何分辨率证明,以及基于n/spl次/n矩形网格图的tseittin重言式(G. tseittin, 1968)。前一个结果回答了J. McCarthy(1964) 35年前的猜想。
{"title":"\"Planar\" tautologies hard for resolution","authors":"Stefan S. Dantchev, Søren Riis","doi":"10.1109/SFCS.2001.959896","DOIUrl":"https://doi.org/10.1109/SFCS.2001.959896","url":null,"abstract":"We prove exponential lower bounds on the resolution proofs of some tautologies, based on rectangular grid graphs. More specifically, we show a 2/sup /spl Omega/(n)/ lower bound for any resolution proof of the mutilated chessboard problem on a 2n/spl times/2n chessboard as well as for the Tseitin tautology (G. Tseitin, 1968) based on the n/spl times/n rectangular grid graph. The former result answers a 35 year old conjecture by J. McCarthy (1964).","PeriodicalId":378126,"journal":{"name":"Proceedings 2001 IEEE International Conference on Cluster Computing","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114358825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Semi-direct product in groups and zig-zag product in graphs: connections and applications 群中的半直积与图中的之字形积:联系与应用
Pub Date : 2001-10-14 DOI: 10.1109/SFCS.2001.959939
N. Alon, A. Lubotzky, A. Wigderson
We consider the standard semi-direct product A/spl times/B of finite groups A, B. We show that with certain choices of generators for these three groups, the Cayley graph of A/spl times/B is (essentially) the zigzag product of the Cayley graphs of A and B. Thus, using the results of O. Reingold et al. (2000), the new Cayley graph is an expander if and only if its two components are. We develop some general ways of using this construction to obtain large constant-degree expanding Cayley graphs from small ones. A. Lubotzky and B. Weiss (1993) asked whether expansion is a group property; namely, is being an expander for (a Cayley graph of) a group G depend solely on G and not on the choice of generators. We use the above construction to answer the question in the negative, by showing an infinite family of groups A/sub i//spl times/B/sub i/ which are expanders with one choice of a (constant-size) set of generators and are not with another such choice. It is interesting to note that this problem is still open, though for "natural" families of groups like the symmetric groups S/sub n/ or the simple groups PSL(2, p).
我们考虑有限群A, B的标准半直积A/spl乘以/B。我们证明,对于这三个群的生成器的某些选择,A/spl乘以/B的Cayley图(本质上)是A和B的Cayley图的之积。因此,使用O. Reingold et al.(2000)的结果,新的Cayley图是一个展开当且仅当它的两个分量是。我们发展了一些利用这种构造从小的凯莱图得到大的等次展开图的一般方法。a . Lubotzky和B. Weiss(1993)提出了扩张是否是群体属性的问题;也就是说,是群G的(Cayley图)的展开式,它只依赖于G而不依赖于生成器的选择。我们用上面的结构来否定地回答这个问题,通过展示一个无限族群A/sub i//spl乘以/B/sub i/,它们是一个选择(恒定大小)生成器集合的展开器,而不是另一个这样的选择。有趣的是,这个问题仍然是开放的,尽管对于“自然”群族,如对称群S/sub n/或简单群PSL(2, p)。
{"title":"Semi-direct product in groups and zig-zag product in graphs: connections and applications","authors":"N. Alon, A. Lubotzky, A. Wigderson","doi":"10.1109/SFCS.2001.959939","DOIUrl":"https://doi.org/10.1109/SFCS.2001.959939","url":null,"abstract":"We consider the standard semi-direct product A/spl times/B of finite groups A, B. We show that with certain choices of generators for these three groups, the Cayley graph of A/spl times/B is (essentially) the zigzag product of the Cayley graphs of A and B. Thus, using the results of O. Reingold et al. (2000), the new Cayley graph is an expander if and only if its two components are. We develop some general ways of using this construction to obtain large constant-degree expanding Cayley graphs from small ones. A. Lubotzky and B. Weiss (1993) asked whether expansion is a group property; namely, is being an expander for (a Cayley graph of) a group G depend solely on G and not on the choice of generators. We use the above construction to answer the question in the negative, by showing an infinite family of groups A/sub i//spl times/B/sub i/ which are expanders with one choice of a (constant-size) set of generators and are not with another such choice. It is interesting to note that this problem is still open, though for \"natural\" families of groups like the symmetric groups S/sub n/ or the simple groups PSL(2, p).","PeriodicalId":378126,"journal":{"name":"Proceedings 2001 IEEE International Conference on Cluster Computing","volume":"232 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123361709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 72
Designing networks for selfish users is hard 为自私的用户设计网络是困难的
Pub Date : 2001-10-14 DOI: 10.1109/SFCS.2001.959923
T. Roughgarden
We consider a directed network in which every edge possesses a latency function specifying the time needed to traverse the edge given its congestion. Selfish, noncooperative agents constitute the network traffic and wish to travel from a source s to a sink t as quickly as possible. Since the route chosen by one network user affects the congestion (and hence the latency) experienced by others, we model the problem as a noncooperative game. Assuming each agent controls only a negligible portion of the overall traffic, Nash equilibria in this noncooperative game correspond to s-t flows in which all flow paths have equal latency. We give optimal inapproximability results and approximation algorithms for several network design problems of this type. For example, we prove that for networks with n nodes and continuous, nondecreasing latency functions, there is no approximation algorithm for this problem with approximation ratio less than n/2 (unless P = NP). We also prove this hardness result to be best possible by exhibiting an n/2-approximation algorithm. For networks in which the latency of each edge is a linear function of the congestion, we prove that there is no (4/3 - /spl epsi/)-approximation algorithm for the problem (for any /spl epsi/ > 0, unless P = NP); the existence of a 4/3-approximation algorithm follows easily from existing work, proving this hardness result sharp.
我们考虑一个有向网络,其中每条边都有一个延迟函数,指定在给定拥塞的情况下遍历该边所需的时间。自私的、不合作的代理构成了网络流量,它们希望尽可能快地从源s到达接收t。由于一个网络用户选择的路由会影响其他人所经历的拥塞(以及延迟),因此我们将该问题建模为非合作博弈。假设每个代理只控制总体流量的一个可忽略不计的部分,这个非合作博弈中的纳什均衡对应于s-t流,其中所有流路径具有相同的延迟。我们给出了这类网络设计问题的最优不逼近性结果和逼近算法。例如,我们证明了对于具有n个节点和连续的非递减延迟函数的网络,不存在近似比小于n/2的近似算法(除非P = NP)。我们还通过展示一个n/2近似算法来证明这个硬度结果是最好的。对于每条边的延迟是拥塞的线性函数的网络,我们证明了该问题不存在(4/3 - /spl epsi/)-逼近算法(对于任何/spl epsi/ > 0,除非P = NP);从已有的工作中可以很容易地推导出4/3近似算法的存在性,证明了这一结果的精确性。
{"title":"Designing networks for selfish users is hard","authors":"T. Roughgarden","doi":"10.1109/SFCS.2001.959923","DOIUrl":"https://doi.org/10.1109/SFCS.2001.959923","url":null,"abstract":"We consider a directed network in which every edge possesses a latency function specifying the time needed to traverse the edge given its congestion. Selfish, noncooperative agents constitute the network traffic and wish to travel from a source s to a sink t as quickly as possible. Since the route chosen by one network user affects the congestion (and hence the latency) experienced by others, we model the problem as a noncooperative game. Assuming each agent controls only a negligible portion of the overall traffic, Nash equilibria in this noncooperative game correspond to s-t flows in which all flow paths have equal latency. We give optimal inapproximability results and approximation algorithms for several network design problems of this type. For example, we prove that for networks with n nodes and continuous, nondecreasing latency functions, there is no approximation algorithm for this problem with approximation ratio less than n/2 (unless P = NP). We also prove this hardness result to be best possible by exhibiting an n/2-approximation algorithm. For networks in which the latency of each edge is a linear function of the congestion, we prove that there is no (4/3 - /spl epsi/)-approximation algorithm for the problem (for any /spl epsi/ > 0, unless P = NP); the existence of a 4/3-approximation algorithm follows easily from existing work, proving this hardness result sharp.","PeriodicalId":378126,"journal":{"name":"Proceedings 2001 IEEE International Conference on Cluster Computing","volume":"26 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116628548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 127
How to go beyond the black-box simulation barrier 如何超越黑盒模拟的障碍
Pub Date : 2001-10-14 DOI: 10.1109/SFCS.2001.959885
B. Barak
The simulation paradigm is central to cryptography. A simulator is an algorithm that tries to simulate the interaction of the adversary with an honest party, without knowing the private input of this honest party. Almost all known simulators use the adversary's algorithm as a black-box. We present the first constructions of non-black-box simulators. Using these new non-black-box techniques, we obtain several results that were previously proven to be impossible to obtain using black-box simulators. Specifically, assuming the existence of collision resistent hash functions, we construct a new zero-knowledge argument system for NP that satisfies the following properties: 1. This system has a constant number of rounds with negligible soundness error. 2. It remains zero knowledge even when composed concurrently n times, where n is the security parameter. Simultaneously obtaining 1 and 2 has been recently proven to be impossible to achieve using black-box simulators. 3. It is an Arthur-Merlin (public coins) protocol. Simultaneously obtaining 1 and 3 was known to be impossible to achieve with a black-box simulator. 4. It has a simulator that runs in strict polynomial time, rather than in expected polynomial time. All previously known constant-round, negligible-error zero-knowledge arguments utilized expected polynomial-time simulators.
模拟范式是密码学的核心。模拟器是一种算法,它试图模拟对手与诚实方的交互,而不知道这个诚实方的私人输入。几乎所有已知的模拟器都使用对手的算法作为黑盒。我们提出了非黑盒模拟器的第一个结构。使用这些新的非黑盒技术,我们获得了一些以前被证明不可能使用黑盒模拟器获得的结果。具体来说,假设存在抗碰撞哈希函数,我们构造了一个新的NP零知识参数系统,该系统满足以下性质:该系统具有恒定的发数,可靠性误差可以忽略不计。2. 即使并发组合n次,它仍然是零知识,其中n是安全参数。同时获得1和2最近被证明是不可能实现使用黑盒模拟器。3.它是Arthur-Merlin(公共货币)协议。同时获得1和3被认为是不可能实现的黑盒模拟器。4. 它有一个模拟器在严格的多项式时间内运行,而不是在预期的多项式时间内运行。所有以前已知的常轮、可忽略误差的零知识参数都使用了预期多项式时间模拟器。
{"title":"How to go beyond the black-box simulation barrier","authors":"B. Barak","doi":"10.1109/SFCS.2001.959885","DOIUrl":"https://doi.org/10.1109/SFCS.2001.959885","url":null,"abstract":"The simulation paradigm is central to cryptography. A simulator is an algorithm that tries to simulate the interaction of the adversary with an honest party, without knowing the private input of this honest party. Almost all known simulators use the adversary's algorithm as a black-box. We present the first constructions of non-black-box simulators. Using these new non-black-box techniques, we obtain several results that were previously proven to be impossible to obtain using black-box simulators. Specifically, assuming the existence of collision resistent hash functions, we construct a new zero-knowledge argument system for NP that satisfies the following properties: 1. This system has a constant number of rounds with negligible soundness error. 2. It remains zero knowledge even when composed concurrently n times, where n is the security parameter. Simultaneously obtaining 1 and 2 has been recently proven to be impossible to achieve using black-box simulators. 3. It is an Arthur-Merlin (public coins) protocol. Simultaneously obtaining 1 and 3 was known to be impossible to achieve with a black-box simulator. 4. It has a simulator that runs in strict polynomial time, rather than in expected polynomial time. All previously known constant-round, negligible-error zero-knowledge arguments utilized expected polynomial-time simulators.","PeriodicalId":378126,"journal":{"name":"Proceedings 2001 IEEE International Conference on Cluster Computing","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121688935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 487
Unique sink orientations of cubes 立方体的独特下沉方向
Pub Date : 2001-10-14 DOI: 10.1109/SFCS.2001.959931
Tibor Szabó, E. Welzl
Suppose we are given (the edge graph of) an n-dimensional hypercube with its edges oriented so that every face has a unique sink. Such an orientation is called a unique sink orientation, and we are interested in finding the unique sink of the whole cube, when the orientation is given implicitly. The basic operation available is the so-called vertex evaluation, where we can access an arbitrary vertex of the cube, for which we obtain the orientations of the incident edges. Unique sink orientations occur when the edges of a deformed geometric n-dimensional cube (i.e., a polytope with the combinatorial structure of a cube) are oriented according to some generic linear function. These orientations are easily seen to be acyclic. The main motivation for studying unique sink orientations are certain linear complementarity problems, which allow this combinatorial abstraction (due to Stickney and Watson, 1978), where orientations with cycles can arise. Similarly, some quadratic optimization problems, like computing the smallest enclosing ball of a finite point set, can be formulated as finding a sink in a unique sink orientation (with cycles possible). For acyclic unique sink orientations, randomized procedures due to Bernd Gartner (1998, 2001) with an expected number of at Most e/sup 2/spl radic/n/ vertex evaluations have been known. For the general case, a simple randomized (3/2)/sup n/ procedure exists (without explicit mention in the literature). We present new algorithms, a deterministic O(1.61/sup n/) procedure and a randomized O((43/20)/sup n/2/)=O(1.47/sup n/) procedure for unique sink orientations. An interesting aspect of these algorithms is that they do not proceed on a path to the sink (in a simplex-like fashion), but they exploit the potential of random access (in the sense of arbitrary access) to any vertex of the cube. We consider this feature the main contribution of the paper. We believe that unique sink orientations have a rich structure, and there is ample space for improvement on the bounds given above.
假设我们给出了一个n维超立方体的边缘图,它的边缘定向使得每个面都有一个唯一的sink。这样的方向被称为唯一汇聚方向,我们感兴趣的是找到整个立方体的唯一汇聚,当方向是隐式给定的。可用的基本操作是所谓的顶点计算,我们可以访问立方体的任意顶点,从而获得入射边的方向。当一个变形的几何n维立方体(即具有立方体组合结构的多面体)的边缘根据某些一般线性函数定向时,就会出现唯一的汇聚方向。这些取向很容易被看作是无环的。研究唯一汇方向的主要动机是某些线性互补问题,它允许这种组合抽象(由于Stickney和Watson, 1978),其中可能出现带循环的方向。类似地,一些二次优化问题,如计算有限点集的最小封闭球,可以表述为在唯一的汇聚方向上找到一个汇聚(可能有循环)。对于非循环唯一汇方向,由Bernd Gartner(1998,2001)提出的随机化程序,其期望数量最多为e/sup 2/spl根/n/顶点评估。对于一般情况,存在一个简单的随机(3/2)/sup /程序(在文献中没有明确提及)。我们提出了一个新的算法,一个确定性的O(1.61/sup n/)过程和一个随机的O((43/20)/sup n/2/)=O(1.47/sup n/)过程。这些算法的一个有趣的方面是,它们不沿着通往汇聚点的路径前进(以类似于简单函数的方式),但它们利用了对立方体任何顶点的随机访问(在任意访问的意义上)的潜力。我们认为这一特点是本文的主要贡献。我们认为,独特的汇取向具有丰富的结构,并且在上述边界上有很大的改进空间。
{"title":"Unique sink orientations of cubes","authors":"Tibor Szabó, E. Welzl","doi":"10.1109/SFCS.2001.959931","DOIUrl":"https://doi.org/10.1109/SFCS.2001.959931","url":null,"abstract":"Suppose we are given (the edge graph of) an n-dimensional hypercube with its edges oriented so that every face has a unique sink. Such an orientation is called a unique sink orientation, and we are interested in finding the unique sink of the whole cube, when the orientation is given implicitly. The basic operation available is the so-called vertex evaluation, where we can access an arbitrary vertex of the cube, for which we obtain the orientations of the incident edges. Unique sink orientations occur when the edges of a deformed geometric n-dimensional cube (i.e., a polytope with the combinatorial structure of a cube) are oriented according to some generic linear function. These orientations are easily seen to be acyclic. The main motivation for studying unique sink orientations are certain linear complementarity problems, which allow this combinatorial abstraction (due to Stickney and Watson, 1978), where orientations with cycles can arise. Similarly, some quadratic optimization problems, like computing the smallest enclosing ball of a finite point set, can be formulated as finding a sink in a unique sink orientation (with cycles possible). For acyclic unique sink orientations, randomized procedures due to Bernd Gartner (1998, 2001) with an expected number of at Most e/sup 2/spl radic/n/ vertex evaluations have been known. For the general case, a simple randomized (3/2)/sup n/ procedure exists (without explicit mention in the literature). We present new algorithms, a deterministic O(1.61/sup n/) procedure and a randomized O((43/20)/sup n/2/)=O(1.47/sup n/) procedure for unique sink orientations. An interesting aspect of these algorithms is that they do not proceed on a path to the sink (in a simplex-like fashion), but they exploit the potential of random access (in the sense of arbitrary access) to any vertex of the cube. We consider this feature the main contribution of the paper. We believe that unique sink orientations have a rich structure, and there is ample space for improvement on the bounds given above.","PeriodicalId":378126,"journal":{"name":"Proceedings 2001 IEEE International Conference on Cluster Computing","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121535078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 82
Vickrey prices and shortest paths: what is an edge worth? Vickrey价格和最短路径:一条边值多少钱?
Pub Date : 2001-10-14 DOI: 10.1109/SFCS.2001.959899
J. Hershberger, S. Suri
We solve a shortest path problem that is motivated by recent interest in pricing networks or other computational resources. Informally, how much is an edge in a network worth to a user who wants to send data between two nodes along a shortest path? If the network is a decentralized entity, such as the Internet, in which multiple self-interested agents own different parts of the network, then auction-based pricing seems appropriate. A celebrated result from auction theory shows that the use of Vickrey pricing motivates the owners of the network resources to bid truthfully. In Vickrey's scheme, each agent is compensated in proportion to the marginal utility he brings to the auction. In the context of shortest path routing, an edge's utility is the value by which it lowers the length of the shortest path, i.e., the difference between the shortest path lengths with and without the edge. Our problem is to compute these marginal values for all the edges of the network efficiently. The naive method requires solving the single-source shortest path problem up to n times, for an n-node network. We show that the Vickrey prices for all the edges can be computed in the same asymptotic time complexity as one single-source shortest path problem. This solves an open problem posed by N. Nisan and A. Ronen (1999).
我们解决了一个最短路径问题,这个问题是由最近对定价网络或其他计算资源的兴趣所激发的。非正式地说,对于想要沿着最短路径在两个节点之间发送数据的用户来说,网络中的一条边值多少钱?如果网络是一个分散的实体,比如互联网,其中多个自利的代理拥有网络的不同部分,那么基于拍卖的定价似乎是合适的。拍卖理论的一个著名结果表明,使用维克里定价可以激励网络资源的所有者诚实地出价。在维克瑞的方案中,每个代理人按照他为拍卖带来的边际效用的比例获得补偿。在最短路径路由的上下文中,边的效用是它降低最短路径长度的值,即有边和没有边的最短路径长度之差。我们的问题是有效地计算网络所有边的这些边缘值。对于n个节点的网络,朴素方法需要求解最多n次的单源最短路径问题。我们证明了所有边的Vickrey价格可以在与单源最短路径问题相同的渐近时间复杂度下计算。这解决了N. Nisan和A. Ronen(1999)提出的一个开放性问题。
{"title":"Vickrey prices and shortest paths: what is an edge worth?","authors":"J. Hershberger, S. Suri","doi":"10.1109/SFCS.2001.959899","DOIUrl":"https://doi.org/10.1109/SFCS.2001.959899","url":null,"abstract":"We solve a shortest path problem that is motivated by recent interest in pricing networks or other computational resources. Informally, how much is an edge in a network worth to a user who wants to send data between two nodes along a shortest path? If the network is a decentralized entity, such as the Internet, in which multiple self-interested agents own different parts of the network, then auction-based pricing seems appropriate. A celebrated result from auction theory shows that the use of Vickrey pricing motivates the owners of the network resources to bid truthfully. In Vickrey's scheme, each agent is compensated in proportion to the marginal utility he brings to the auction. In the context of shortest path routing, an edge's utility is the value by which it lowers the length of the shortest path, i.e., the difference between the shortest path lengths with and without the edge. Our problem is to compute these marginal values for all the edges of the network efficiently. The naive method requires solving the single-source shortest path problem up to n times, for an n-node network. We show that the Vickrey prices for all the edges can be computed in the same asymptotic time complexity as one single-source shortest path problem. This solves an open problem posed by N. Nisan and A. Ronen (1999).","PeriodicalId":378126,"journal":{"name":"Proceedings 2001 IEEE International Conference on Cluster Computing","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124232945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 254
期刊
Proceedings 2001 IEEE International Conference on Cluster Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1