首页 > 最新文献

Proceedings 2001 IEEE International Conference on Cluster Computing最新文献

英文 中文
The complexity of factors of multivariate polynomials 多元多项式因子的复杂性
Pub Date : 2018-12-17 DOI: 10.1109/SFCS.2001.959912
Peter Burgisser
The existence of string functions, which are not polynomial time computable, but whose graph is checkable in polynomial time, is a basic assumption in cryptography. We prove that in the framework of algebraic complexity, there are no such families of polynomial functions of p-bounded degree overfields of characteristic zero. The proof relies on a polynomial upper bound on the approximative complexity of a factor g of a polynomial f in terms of the (approximative) complexity of f and the degree of the factor g. This extends a result by E. Kaltofen (1986). The concept of approximative complexity allows us to cope with the case that a factor has an exponential multiplicity, by using a perturbation argument. Our result extends to randomized (two-sided error) decision complexity.
字符串函数在多项式时间内不可计算,但其图在多项式时间内可校验,这是密码学中的一个基本假设。证明了在代数复杂度的框架下,特征为零的域上不存在p有界的多项式函数族。这个证明依赖于多项式f的一个因子g的近似复杂性的多项式上界,这个近似复杂性是根据f的(近似)复杂性和因子g的程度来表示的。这扩展了E. Kaltofen(1986)的一个结果。近似复杂性的概念允许我们通过使用摄动论证来处理因子具有指数多重性的情况。我们的结果扩展到随机(双侧误差)决策复杂性。
{"title":"The complexity of factors of multivariate polynomials","authors":"Peter Burgisser","doi":"10.1109/SFCS.2001.959912","DOIUrl":"https://doi.org/10.1109/SFCS.2001.959912","url":null,"abstract":"The existence of string functions, which are not polynomial time computable, but whose graph is checkable in polynomial time, is a basic assumption in cryptography. We prove that in the framework of algebraic complexity, there are no such families of polynomial functions of p-bounded degree overfields of characteristic zero. The proof relies on a polynomial upper bound on the approximative complexity of a factor g of a polynomial f in terms of the (approximative) complexity of f and the degree of the factor g. This extends a result by E. Kaltofen (1986). The concept of approximative complexity allows us to cope with the case that a factor has an exponential multiplicity, by using a perturbation argument. Our result extends to randomized (two-sided error) decision complexity.","PeriodicalId":378126,"journal":{"name":"Proceedings 2001 IEEE International Conference on Cluster Computing","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123161057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 58
Compact oracles for reachability and approximate distances in planar digraphs 用于平面有向图的可达性和近似距离的紧凑指示符
Pub Date : 2001-10-14 DOI: 10.1109/SFCS.2001.959898
M. Thorup
It is shown that a planar digraph can be preprocessed in near-linear time, producing a near-linear space distance oracle that can answer reachability queries in constant time. The oracle can be distributed as an O(log n) space label for each vertex and then we can determine if one vertex can reach another considering their two labels only. The approach generalizes to approximate distances in weighted planar digraphs where we can then get a (1+/spl epsi/) approximation distance in O(log log /spl Delta/+1//spl epsi/) time where /spl Delta/ is the longest finite distance in the graph and weights are assumed to be non-negative integers. Our scheme can be extended to find and route along the short dipaths. Our technique is based on a novel dipath decomposition of planar digraphs that instead of using the standard separator with O(/spl radic/n) vertices, in effect finds a separator using a constant number of dipaths.
结果表明,平面有向图可以在近线性时间内进行预处理,得到一个可以在常数时间内回答可达性查询的近线性空间距离预表。oracle可以为每个顶点分配一个O(log n)空间标签,然后我们可以确定一个顶点是否可以到达另一个顶点,只考虑它们的两个标签。该方法推广到加权平面有向图中的近似距离,然后我们可以在O(log log /spl Delta/+1//spl epsi/)时间内得到(1+/spl epsi/)近似距离,其中/spl Delta/是图中最长的有限距离,并且假设权值为非负整数。我们的方案可以推广到沿短通道寻找和路由。我们的技术是基于一种新的平面有向图的双径分解,它不是使用带有O(/spl径向/n)顶点的标准分隔符,而是使用常数数量的双径找到一个分隔符。
{"title":"Compact oracles for reachability and approximate distances in planar digraphs","authors":"M. Thorup","doi":"10.1109/SFCS.2001.959898","DOIUrl":"https://doi.org/10.1109/SFCS.2001.959898","url":null,"abstract":"It is shown that a planar digraph can be preprocessed in near-linear time, producing a near-linear space distance oracle that can answer reachability queries in constant time. The oracle can be distributed as an O(log n) space label for each vertex and then we can determine if one vertex can reach another considering their two labels only. The approach generalizes to approximate distances in weighted planar digraphs where we can then get a (1+/spl epsi/) approximation distance in O(log log /spl Delta/+1//spl epsi/) time where /spl Delta/ is the longest finite distance in the graph and weights are assumed to be non-negative integers. Our scheme can be extended to find and route along the short dipaths. Our technique is based on a novel dipath decomposition of planar digraphs that instead of using the standard separator with O(/spl radic/n) vertices, in effect finds a separator using a constant number of dipaths.","PeriodicalId":378126,"journal":{"name":"Proceedings 2001 IEEE International Conference on Cluster Computing","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115556040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 315
Approximate shape fitting via linearization 通过线性化近似形状拟合
Pub Date : 2001-10-14 DOI: 10.1109/SFCS.2001.959881
Sariel Har-Peled, Kasturi R. Varadarajan
Shape fitting is a fundamental optimization problem in computer science. The authors present a general and unified technique for solving a certain family of such problems. Given a point set P in R/sup d/, this technique can be used to /spl epsi/-approximate: (i) the min-width annulus and shell that contains P, (ii) minimum width cylindrical shell containing P, (iii) diameter, width, minimum volume bounding box of P, and (iv) all the previous measures for the case the points are moving. The running time of the resulting algorithms is O(n + 1//spl epsi//sup c/), where c is a constant that depends on the problem at hand. Our new general technique enables us to solve those problems without resorting to a careful and painful case by case analysis, as was previously done for those problems. Furthermore, for several of those problems our results are considerably simpler and faster than what was previously known. In particular, for the minimum width cylindrical shell problem, our solution is the first algorithm whose running time is subquadratic in n. (In fact we get running time linear in n.).
形状拟合是计算机科学中的一个基本优化问题。作者提出了一种通用的、统一的方法来解决这类问题。给定R/sup /中的点集P,该技术可用于/spl epsi/-近似:(i)包含P的最小宽度环空和壳,(ii)包含P的最小宽度圆柱壳,(iii) P的直径,宽度,最小体积边界框,以及(iv)所有先前的点在移动情况下的测量。结果算法的运行时间为O(n + 1//spl epsi//sup c/),其中c是一个常数,取决于手头的问题。我们的新通用技术使我们能够解决这些问题,而不必诉诸于仔细和痛苦的逐个案例分析,就像以前对这些问题所做的那样。此外,对于其中的一些问题,我们的结果比以前已知的要简单和快速得多。特别是,对于最小宽度圆柱壳问题,我们的解是第一个运行时间在n上是次二次的算法(实际上我们得到的运行时间在n上是线性的)。
{"title":"Approximate shape fitting via linearization","authors":"Sariel Har-Peled, Kasturi R. Varadarajan","doi":"10.1109/SFCS.2001.959881","DOIUrl":"https://doi.org/10.1109/SFCS.2001.959881","url":null,"abstract":"Shape fitting is a fundamental optimization problem in computer science. The authors present a general and unified technique for solving a certain family of such problems. Given a point set P in R/sup d/, this technique can be used to /spl epsi/-approximate: (i) the min-width annulus and shell that contains P, (ii) minimum width cylindrical shell containing P, (iii) diameter, width, minimum volume bounding box of P, and (iv) all the previous measures for the case the points are moving. The running time of the resulting algorithms is O(n + 1//spl epsi//sup c/), where c is a constant that depends on the problem at hand. Our new general technique enables us to solve those problems without resorting to a careful and painful case by case analysis, as was previously done for those problems. Furthermore, for several of those problems our results are considerably simpler and faster than what was previously known. In particular, for the minimum width cylindrical shell problem, our solution is the first algorithm whose running time is subquadratic in n. (In fact we get running time linear in n.).","PeriodicalId":378126,"journal":{"name":"Proceedings 2001 IEEE International Conference on Cluster Computing","volume":"235 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121867785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Randomly colouring graphs with lower bounds on girth and maximum degree 随机上色图形与下界的周长和最大程度
Pub Date : 2001-10-14 DOI: 10.1109/SFCS.2001.959934
M. Dyer, A. Frieze
We consider the problem of generating a random q-colouring of a graph G=(V, E). We consider the simple Glauber Dynamics chain. We show that if the maximum degree /spl Delta/>c/sub l/ ln n and the girth g>c/sub 2/ ln ln n (n=|V|), then this chain mixes rapidly provided C/sub 1/, C/sub 2/ are sufficiently large, q/A>/spl beta/, where /spl beta//spl ap/1.763 is the root of /spl beta/=e/sup 1//spl beta//. For this class of graphs, this beats the 11/spl Delta//6 bound of E. Vigoda (1999) for general graphs. We extend the result to random graphs.
我们考虑生成图G=(V, E)的随机q-着色问题。我们考虑简单的Glauber动力学链。我们证明,如果最大度/spl δ />c/sub - 1/ ln n和周长g>c/sub - 2/ ln - ln n (n=|V|),则在c/sub - 1/、c/sub - 2/足够大的情况下,q/A>/spl β /,其中/spl β //spl ap/1.763是/spl β /=e/sup 1//spl β //的根。对于这类图,这优于E. Vigoda(1999)对于一般图的11/spl Delta//6界。我们将结果推广到随机图。
{"title":"Randomly colouring graphs with lower bounds on girth and maximum degree","authors":"M. Dyer, A. Frieze","doi":"10.1109/SFCS.2001.959934","DOIUrl":"https://doi.org/10.1109/SFCS.2001.959934","url":null,"abstract":"We consider the problem of generating a random q-colouring of a graph G=(V, E). We consider the simple Glauber Dynamics chain. We show that if the maximum degree /spl Delta/>c/sub l/ ln n and the girth g>c/sub 2/ ln ln n (n=|V|), then this chain mixes rapidly provided C/sub 1/, C/sub 2/ are sufficiently large, q/A>/spl beta/, where /spl beta//spl ap/1.763 is the root of /spl beta/=e/sup 1//spl beta//. For this class of graphs, this beats the 11/spl Delta//6 bound of E. Vigoda (1999) for general graphs. We extend the result to random graphs.","PeriodicalId":378126,"journal":{"name":"Proceedings 2001 IEEE International Conference on Cluster Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123843185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 72
"Planar" tautologies hard for resolution “平面”重言式难以分辨
Pub Date : 2001-10-14 DOI: 10.1109/SFCS.2001.959896
Stefan S. Dantchev, Søren Riis
We prove exponential lower bounds on the resolution proofs of some tautologies, based on rectangular grid graphs. More specifically, we show a 2/sup /spl Omega/(n)/ lower bound for any resolution proof of the mutilated chessboard problem on a 2n/spl times/2n chessboard as well as for the Tseitin tautology (G. Tseitin, 1968) based on the n/spl times/n rectangular grid graph. The former result answers a 35 year old conjecture by J. McCarthy (1964).
在矩形网格图的基础上,我们证明了一些重言式的分辨率证明的指数下界。更具体地说,我们展示了一个2/sup /spl Omega/(n)/下界,适用于在2n/spl次/2n棋盘上残废棋盘问题的任何分辨率证明,以及基于n/spl次/n矩形网格图的tseittin重言式(G. tseittin, 1968)。前一个结果回答了J. McCarthy(1964) 35年前的猜想。
{"title":"\"Planar\" tautologies hard for resolution","authors":"Stefan S. Dantchev, Søren Riis","doi":"10.1109/SFCS.2001.959896","DOIUrl":"https://doi.org/10.1109/SFCS.2001.959896","url":null,"abstract":"We prove exponential lower bounds on the resolution proofs of some tautologies, based on rectangular grid graphs. More specifically, we show a 2/sup /spl Omega/(n)/ lower bound for any resolution proof of the mutilated chessboard problem on a 2n/spl times/2n chessboard as well as for the Tseitin tautology (G. Tseitin, 1968) based on the n/spl times/n rectangular grid graph. The former result answers a 35 year old conjecture by J. McCarthy (1964).","PeriodicalId":378126,"journal":{"name":"Proceedings 2001 IEEE International Conference on Cluster Computing","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114358825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Semi-direct product in groups and zig-zag product in graphs: connections and applications 群中的半直积与图中的之字形积:联系与应用
Pub Date : 2001-10-14 DOI: 10.1109/SFCS.2001.959939
N. Alon, A. Lubotzky, A. Wigderson
We consider the standard semi-direct product A/spl times/B of finite groups A, B. We show that with certain choices of generators for these three groups, the Cayley graph of A/spl times/B is (essentially) the zigzag product of the Cayley graphs of A and B. Thus, using the results of O. Reingold et al. (2000), the new Cayley graph is an expander if and only if its two components are. We develop some general ways of using this construction to obtain large constant-degree expanding Cayley graphs from small ones. A. Lubotzky and B. Weiss (1993) asked whether expansion is a group property; namely, is being an expander for (a Cayley graph of) a group G depend solely on G and not on the choice of generators. We use the above construction to answer the question in the negative, by showing an infinite family of groups A/sub i//spl times/B/sub i/ which are expanders with one choice of a (constant-size) set of generators and are not with another such choice. It is interesting to note that this problem is still open, though for "natural" families of groups like the symmetric groups S/sub n/ or the simple groups PSL(2, p).
我们考虑有限群A, B的标准半直积A/spl乘以/B。我们证明,对于这三个群的生成器的某些选择,A/spl乘以/B的Cayley图(本质上)是A和B的Cayley图的之积。因此,使用O. Reingold et al.(2000)的结果,新的Cayley图是一个展开当且仅当它的两个分量是。我们发展了一些利用这种构造从小的凯莱图得到大的等次展开图的一般方法。a . Lubotzky和B. Weiss(1993)提出了扩张是否是群体属性的问题;也就是说,是群G的(Cayley图)的展开式,它只依赖于G而不依赖于生成器的选择。我们用上面的结构来否定地回答这个问题,通过展示一个无限族群A/sub i//spl乘以/B/sub i/,它们是一个选择(恒定大小)生成器集合的展开器,而不是另一个这样的选择。有趣的是,这个问题仍然是开放的,尽管对于“自然”群族,如对称群S/sub n/或简单群PSL(2, p)。
{"title":"Semi-direct product in groups and zig-zag product in graphs: connections and applications","authors":"N. Alon, A. Lubotzky, A. Wigderson","doi":"10.1109/SFCS.2001.959939","DOIUrl":"https://doi.org/10.1109/SFCS.2001.959939","url":null,"abstract":"We consider the standard semi-direct product A/spl times/B of finite groups A, B. We show that with certain choices of generators for these three groups, the Cayley graph of A/spl times/B is (essentially) the zigzag product of the Cayley graphs of A and B. Thus, using the results of O. Reingold et al. (2000), the new Cayley graph is an expander if and only if its two components are. We develop some general ways of using this construction to obtain large constant-degree expanding Cayley graphs from small ones. A. Lubotzky and B. Weiss (1993) asked whether expansion is a group property; namely, is being an expander for (a Cayley graph of) a group G depend solely on G and not on the choice of generators. We use the above construction to answer the question in the negative, by showing an infinite family of groups A/sub i//spl times/B/sub i/ which are expanders with one choice of a (constant-size) set of generators and are not with another such choice. It is interesting to note that this problem is still open, though for \"natural\" families of groups like the symmetric groups S/sub n/ or the simple groups PSL(2, p).","PeriodicalId":378126,"journal":{"name":"Proceedings 2001 IEEE International Conference on Cluster Computing","volume":"232 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123361709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 72
Designing networks for selfish users is hard 为自私的用户设计网络是困难的
Pub Date : 2001-10-14 DOI: 10.1109/SFCS.2001.959923
T. Roughgarden
We consider a directed network in which every edge possesses a latency function specifying the time needed to traverse the edge given its congestion. Selfish, noncooperative agents constitute the network traffic and wish to travel from a source s to a sink t as quickly as possible. Since the route chosen by one network user affects the congestion (and hence the latency) experienced by others, we model the problem as a noncooperative game. Assuming each agent controls only a negligible portion of the overall traffic, Nash equilibria in this noncooperative game correspond to s-t flows in which all flow paths have equal latency. We give optimal inapproximability results and approximation algorithms for several network design problems of this type. For example, we prove that for networks with n nodes and continuous, nondecreasing latency functions, there is no approximation algorithm for this problem with approximation ratio less than n/2 (unless P = NP). We also prove this hardness result to be best possible by exhibiting an n/2-approximation algorithm. For networks in which the latency of each edge is a linear function of the congestion, we prove that there is no (4/3 - /spl epsi/)-approximation algorithm for the problem (for any /spl epsi/ > 0, unless P = NP); the existence of a 4/3-approximation algorithm follows easily from existing work, proving this hardness result sharp.
我们考虑一个有向网络,其中每条边都有一个延迟函数,指定在给定拥塞的情况下遍历该边所需的时间。自私的、不合作的代理构成了网络流量,它们希望尽可能快地从源s到达接收t。由于一个网络用户选择的路由会影响其他人所经历的拥塞(以及延迟),因此我们将该问题建模为非合作博弈。假设每个代理只控制总体流量的一个可忽略不计的部分,这个非合作博弈中的纳什均衡对应于s-t流,其中所有流路径具有相同的延迟。我们给出了这类网络设计问题的最优不逼近性结果和逼近算法。例如,我们证明了对于具有n个节点和连续的非递减延迟函数的网络,不存在近似比小于n/2的近似算法(除非P = NP)。我们还通过展示一个n/2近似算法来证明这个硬度结果是最好的。对于每条边的延迟是拥塞的线性函数的网络,我们证明了该问题不存在(4/3 - /spl epsi/)-逼近算法(对于任何/spl epsi/ > 0,除非P = NP);从已有的工作中可以很容易地推导出4/3近似算法的存在性,证明了这一结果的精确性。
{"title":"Designing networks for selfish users is hard","authors":"T. Roughgarden","doi":"10.1109/SFCS.2001.959923","DOIUrl":"https://doi.org/10.1109/SFCS.2001.959923","url":null,"abstract":"We consider a directed network in which every edge possesses a latency function specifying the time needed to traverse the edge given its congestion. Selfish, noncooperative agents constitute the network traffic and wish to travel from a source s to a sink t as quickly as possible. Since the route chosen by one network user affects the congestion (and hence the latency) experienced by others, we model the problem as a noncooperative game. Assuming each agent controls only a negligible portion of the overall traffic, Nash equilibria in this noncooperative game correspond to s-t flows in which all flow paths have equal latency. We give optimal inapproximability results and approximation algorithms for several network design problems of this type. For example, we prove that for networks with n nodes and continuous, nondecreasing latency functions, there is no approximation algorithm for this problem with approximation ratio less than n/2 (unless P = NP). We also prove this hardness result to be best possible by exhibiting an n/2-approximation algorithm. For networks in which the latency of each edge is a linear function of the congestion, we prove that there is no (4/3 - /spl epsi/)-approximation algorithm for the problem (for any /spl epsi/ > 0, unless P = NP); the existence of a 4/3-approximation algorithm follows easily from existing work, proving this hardness result sharp.","PeriodicalId":378126,"journal":{"name":"Proceedings 2001 IEEE International Conference on Cluster Computing","volume":"26 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116628548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 127
Resettably-sound zero-knowledge and its applications 可复位声音零知识及其应用
Pub Date : 2001-10-14 DOI: 10.1109/SFCS.2001.959886
B. Barak, Oded Goldreich, S. Goldwasser, Yehuda Lindell
Resettably-sound proofs and arguments maintain soundness even when the prover can reset the verifier to use the same random coins in repeated executions of the protocol. We show that resettably-sound zero-knowledge arguments for NP exist if collision-free hash functions exist. In contrast, resettably-sound zero-knowledge proofs are possible only for languages in P/poly. We present two applications of resettably-sound zero-knowledge arguments. First, we construct resettable zero-knowledge arguments of knowledge for NP, using a natural relaxation of the definition of arguments (and proofs) of knowledge. We note that, under the standard definition of proof of knowledge, it is impossible to obtain resettable zero-knowledge arguments of knowledge for languages outside BPP. Second, we construct a constant-round resettable zero-knowledge argument for NP in the public-key model, under the assumption that collision-free hash functions exist. This improves upon the sub-exponential hardness assumption required by previous constructions. We emphasize that our results use non-black-box zero-knowledge simulations. Indeed, we show that some of the results are impossible to achieve using black-box simulations. In particular, only languages in BPP have resettably-sound arguments that are zero-knowledge with respect to black-box simulation.
即使当证明者可以重置验证者在重复执行协议时使用相同的随机硬币时,可重置的可靠证明和参数也保持了可靠性。我们证明了如果无碰撞哈希函数存在,NP存在可重置声音的零知识参数。相比之下,可重设声音的零知识证明只可能用于P/poly语言。我们给出了可重设健全零知识论证的两个应用。首先,我们使用知识的参数(和证明)定义的自然松弛,为NP构造可重置的零知识的知识参数。我们注意到,在知识证明的标准定义下,对于BPP之外的语言,不可能获得可重置的知识零知识论证。其次,在假设无冲突哈希函数存在的情况下,我们构造了公钥模型中NP的常轮可重置零知识参数。这改进了以前构造所要求的次指数硬度假设。我们强调,我们的结果使用非黑盒零知识模拟。事实上,我们表明,一些结果是不可能实现使用黑盒模拟。特别是,只有BPP中的语言具有可重置的可靠参数,这些参数在黑盒模拟方面是零知识。
{"title":"Resettably-sound zero-knowledge and its applications","authors":"B. Barak, Oded Goldreich, S. Goldwasser, Yehuda Lindell","doi":"10.1109/SFCS.2001.959886","DOIUrl":"https://doi.org/10.1109/SFCS.2001.959886","url":null,"abstract":"Resettably-sound proofs and arguments maintain soundness even when the prover can reset the verifier to use the same random coins in repeated executions of the protocol. We show that resettably-sound zero-knowledge arguments for NP exist if collision-free hash functions exist. In contrast, resettably-sound zero-knowledge proofs are possible only for languages in P/poly. We present two applications of resettably-sound zero-knowledge arguments. First, we construct resettable zero-knowledge arguments of knowledge for NP, using a natural relaxation of the definition of arguments (and proofs) of knowledge. We note that, under the standard definition of proof of knowledge, it is impossible to obtain resettable zero-knowledge arguments of knowledge for languages outside BPP. Second, we construct a constant-round resettable zero-knowledge argument for NP in the public-key model, under the assumption that collision-free hash functions exist. This improves upon the sub-exponential hardness assumption required by previous constructions. We emphasize that our results use non-black-box zero-knowledge simulations. Indeed, we show that some of the results are impossible to achieve using black-box simulations. In particular, only languages in BPP have resettably-sound arguments that are zero-knowledge with respect to black-box simulation.","PeriodicalId":378126,"journal":{"name":"Proceedings 2001 IEEE International Conference on Cluster Computing","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131640662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 111
How to go beyond the black-box simulation barrier 如何超越黑盒模拟的障碍
Pub Date : 2001-10-14 DOI: 10.1109/SFCS.2001.959885
B. Barak
The simulation paradigm is central to cryptography. A simulator is an algorithm that tries to simulate the interaction of the adversary with an honest party, without knowing the private input of this honest party. Almost all known simulators use the adversary's algorithm as a black-box. We present the first constructions of non-black-box simulators. Using these new non-black-box techniques, we obtain several results that were previously proven to be impossible to obtain using black-box simulators. Specifically, assuming the existence of collision resistent hash functions, we construct a new zero-knowledge argument system for NP that satisfies the following properties: 1. This system has a constant number of rounds with negligible soundness error. 2. It remains zero knowledge even when composed concurrently n times, where n is the security parameter. Simultaneously obtaining 1 and 2 has been recently proven to be impossible to achieve using black-box simulators. 3. It is an Arthur-Merlin (public coins) protocol. Simultaneously obtaining 1 and 3 was known to be impossible to achieve with a black-box simulator. 4. It has a simulator that runs in strict polynomial time, rather than in expected polynomial time. All previously known constant-round, negligible-error zero-knowledge arguments utilized expected polynomial-time simulators.
模拟范式是密码学的核心。模拟器是一种算法,它试图模拟对手与诚实方的交互,而不知道这个诚实方的私人输入。几乎所有已知的模拟器都使用对手的算法作为黑盒。我们提出了非黑盒模拟器的第一个结构。使用这些新的非黑盒技术,我们获得了一些以前被证明不可能使用黑盒模拟器获得的结果。具体来说,假设存在抗碰撞哈希函数,我们构造了一个新的NP零知识参数系统,该系统满足以下性质:该系统具有恒定的发数,可靠性误差可以忽略不计。2. 即使并发组合n次,它仍然是零知识,其中n是安全参数。同时获得1和2最近被证明是不可能实现使用黑盒模拟器。3.它是Arthur-Merlin(公共货币)协议。同时获得1和3被认为是不可能实现的黑盒模拟器。4. 它有一个模拟器在严格的多项式时间内运行,而不是在预期的多项式时间内运行。所有以前已知的常轮、可忽略误差的零知识参数都使用了预期多项式时间模拟器。
{"title":"How to go beyond the black-box simulation barrier","authors":"B. Barak","doi":"10.1109/SFCS.2001.959885","DOIUrl":"https://doi.org/10.1109/SFCS.2001.959885","url":null,"abstract":"The simulation paradigm is central to cryptography. A simulator is an algorithm that tries to simulate the interaction of the adversary with an honest party, without knowing the private input of this honest party. Almost all known simulators use the adversary's algorithm as a black-box. We present the first constructions of non-black-box simulators. Using these new non-black-box techniques, we obtain several results that were previously proven to be impossible to obtain using black-box simulators. Specifically, assuming the existence of collision resistent hash functions, we construct a new zero-knowledge argument system for NP that satisfies the following properties: 1. This system has a constant number of rounds with negligible soundness error. 2. It remains zero knowledge even when composed concurrently n times, where n is the security parameter. Simultaneously obtaining 1 and 2 has been recently proven to be impossible to achieve using black-box simulators. 3. It is an Arthur-Merlin (public coins) protocol. Simultaneously obtaining 1 and 3 was known to be impossible to achieve with a black-box simulator. 4. It has a simulator that runs in strict polynomial time, rather than in expected polynomial time. All previously known constant-round, negligible-error zero-knowledge arguments utilized expected polynomial-time simulators.","PeriodicalId":378126,"journal":{"name":"Proceedings 2001 IEEE International Conference on Cluster Computing","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121688935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 487
Planar graphs, negative weight edges, shortest paths, and near linear time 平面图,负权边,最短路径和近线性时间
Pub Date : 2001-10-14 DOI: 10.1109/SFCS.2001.959897
Jittat Fakcharoenphol, Satish Rao
The authors present an O(n log/sup 3/ n) time algorithm for finding shortest paths in a planar graph with real weights. This can be compared to the best previous strongly polynomial time algorithm developed by R. Lipton et al., (1978 )which ran in O(n/sup 3/2/) time, and the best polynomial algorithm developed by M. Henzinger et al. (1994) which ran in O/spl tilde/(n/sup 4/3/) time. We also present significantly improved algorithms for query and dynamic versions of the shortest path problems.
作者提出了一种O(n log/sup 3/ n)时间算法,用于在具有实权的平面图中寻找最短路径。这可以与R. Lipton等人(1978)开发的最佳强多项式时间算法进行比较,该算法在O(n/sup 3/2/)时间内运行,以及M. Henzinger等人(1994)开发的最佳多项式算法在O/spl波浪/(n/sup 4/3/)时间内运行。我们还提出了查询和动态版本最短路径问题的显著改进算法。
{"title":"Planar graphs, negative weight edges, shortest paths, and near linear time","authors":"Jittat Fakcharoenphol, Satish Rao","doi":"10.1109/SFCS.2001.959897","DOIUrl":"https://doi.org/10.1109/SFCS.2001.959897","url":null,"abstract":"The authors present an O(n log/sup 3/ n) time algorithm for finding shortest paths in a planar graph with real weights. This can be compared to the best previous strongly polynomial time algorithm developed by R. Lipton et al., (1978 )which ran in O(n/sup 3/2/) time, and the best polynomial algorithm developed by M. Henzinger et al. (1994) which ran in O/spl tilde/(n/sup 4/3/) time. We also present significantly improved algorithms for query and dynamic versions of the shortest path problems.","PeriodicalId":378126,"journal":{"name":"Proceedings 2001 IEEE International Conference on Cluster Computing","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125521029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 253
期刊
Proceedings 2001 IEEE International Conference on Cluster Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1