首页 > 最新文献

Proceedings of the 5th conference on Innovations in theoretical computer science最新文献

英文 中文
Cryptogenography
Joshua Brody, S. K. Jakobsen, Dominik Scheder, P. Winkler
We consider the following cryptographic secret leaking problem. A group of players communicate with the goal of learning (and perhaps revealing) a secret held initially by one of them. Their conversation is monitored by a computationally unlimited eavesdropper, who wants to learn the identity of the secret-holder. Despite the unavailability of key, some protection can be provided to the identity of the secret-holder. We call the study of such communication problems, either from the group's or the eavesdropper's point of view, cryptogenography. We introduce a basic cryptogenography problem and show that two players can force the eavesdropper to missguess the origin of a secret bit with probability 1/3; we complement this with a hardness result showing that they cannot do better than than 3/8. We prove that larger numbers of players can do better than 0.5644, but no group of any size can achieve 0.75.
我们考虑以下的密码秘密泄露问题。一群玩家交流的目标是了解(也许是揭露)最初由其中一人持有的秘密。他们的谈话被一个不受计算限制的窃听者监视,他想知道秘密持有者的身份。尽管无法获得密钥,但可以对秘密持有者的身份提供一定的保护。我们把对这种通信问题的研究,无论是从组织的角度还是从窃听者的角度,称为密码学。我们引入了一个基本的密码学问题,并证明两个玩家可以迫使窃听者以1/3的概率猜错秘密位的来源;我们用硬度结果来补充这一点,表明它们不能超过3/8。我们证明更多的玩家可以做得比0.5644更好,但任何规模的群体都无法达到0.75。
{"title":"Cryptogenography","authors":"Joshua Brody, S. K. Jakobsen, Dominik Scheder, P. Winkler","doi":"10.1145/2554797.2554800","DOIUrl":"https://doi.org/10.1145/2554797.2554800","url":null,"abstract":"We consider the following cryptographic secret leaking problem. A group of players communicate with the goal of learning (and perhaps revealing) a secret held initially by one of them. Their conversation is monitored by a computationally unlimited eavesdropper, who wants to learn the identity of the secret-holder. Despite the unavailability of key, some protection can be provided to the identity of the secret-holder. We call the study of such communication problems, either from the group's or the eavesdropper's point of view, cryptogenography. We introduce a basic cryptogenography problem and show that two players can force the eavesdropper to missguess the origin of a secret bit with probability 1/3; we complement this with a hardness result showing that they cannot do better than than 3/8. We prove that larger numbers of players can do better than 0.5644, but no group of any size can achieve 0.75.","PeriodicalId":382856,"journal":{"name":"Proceedings of the 5th conference on Innovations in theoretical computer science","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115003892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
On the automorphism groups of strongly regular graphs I 关于强正则图的自同构群I
L. Babai
We derive structural constraints on the automorphism groups of strongly regular (s.r.) graphs, giving a surprisingly strong answer to a decades-old problem, with tantalizing implications to testing isomorphism of s.r. graphs, and raising new combinatorial challenges. S.r. graphs, while not believed to be Graph Isomorphism (GI) complete, have long been recognized as hard cases for GI, and, in this author's view, present some of the core difficulties of the general GI problem. Progress on the complexity of testing their isomorphism has been intermittent (Babai 1980, Spielman 1996, BW & CST (STOC'13) and BCSTW (FOCS'13)), and the current best bound is exp(Õ(n1/5)) (n is the number of vertices). Our main result is that if X is a s.r. graph then, with straightforward exceptions, the degree of the largest alternating group involved in the automorphism group Aut(X) (as a quotient of a subgroup) is O((ln n)2ln ln n). (The exceptions admit trivial linear-time GI testing.) The design of isomorphism tests for various classes of structures is intimately connected with the study of the automorphism groups of those structures. We include a brief survey of these connections, starting with an 1869 paper by Jordan on trees. In particular, our result amplifies the potential of Luks's divide-and-conquer methods (1980) to be applicable to testing isomorphism of s.r. graphs in quasipolynomial time. The challenge remains to find a hierarchy of combinatorial substructures through which this potential can be realized. We expect that the generality of our result will help in this regard; the result applies not only to s.r. graphs but to all graphs with strong spectral expansion and with a relatively small number of common neighbors for every pair of vertices. We state a purely mathematical conjecture that could bring us closer to finding the right kind of hierarchy. We also outline the broader GI context, and state conjectures in terms of "primitive coherent configurations." These are generalizations of s.r. graphs, relevant to the general GI problem. Another consequence of the main result is the strongest argument to date against GI-completeness of s.r. graphs: we prove that no polynomial-time categorical reduction of GI to isomorphism of s.r. graphs is possible. All known reductions between isomorphism problems of various classes of structures fit into our notion of "categorical reduction." The proof of the main result is elementary; it is based on known results in spectral graph theory and on a 1987 lemma on permutations by Ákos Seress and the author.
我们推导了强正则图的自同构群上的结构约束,对一个存在了几十年的问题给出了令人惊讶的强有力的答案,对测试强正则图的同构具有诱人的意义,并提出了新的组合挑战。S.r.图,虽然不被认为是图同构(GI)完备的,但长期以来一直被认为是GI的困难案例,并且,在笔者看来,呈现了一般GI问题的一些核心困难。关于测试它们同态的复杂性的进展是断断续续的(Babai 1980, Spielman 1996, BW & CST (STOC'13)和BCSTW (FOCS'13)),目前最好的界是exp(Õ(n1/5)) (n是顶点的数量)。我们的主要结果是,如果X是一个s.r.图,那么,除了简单的例外,自同构群Aut(X)中涉及的最大交替群的程度(作为子群的商)是O((ln n)2ln ln n)。(这些例外允许平凡的线性时间GI检验。)各类结构的同构检验的设计与这些结构的自同构群的研究密切相关。我们从1869年乔丹关于树木的一篇论文开始,对这些联系进行了简要的调查。特别是,我们的结果放大了Luks的分治方法(1980)在拟多项式时间内测试sr图同构的潜力。挑战仍然是找到一个层次的组合子结构,通过它可以实现这种潜力。我们期望我们的结果的普遍性将在这方面有所帮助;这一结果不仅适用于sr图,而且适用于所有具有强谱展开且每对顶点具有相对较少的共同邻居的图。我们陈述一个纯粹的数学猜想,它可以使我们更接近于找到正确的层次结构。我们还概述了更广泛的GI上下文,并根据“原始连贯配置”陈述了猜想。这些是广义广义图的推广,与一般的GI问题相关。主要结果的另一个结果是迄今为止反对s.r.图的GI-完备性的最强有力的论据:我们证明了GI不可能在多项式时间上分类化到s.r.图的同构。所有已知的各种结构的同构问题之间的约简都符合我们的“范畴约简”概念。主要结果的证明是初等的;它是基于谱图理论的已知结果和Ákos Seress和作者1987年关于排列的引理。
{"title":"On the automorphism groups of strongly regular graphs I","authors":"L. Babai","doi":"10.1145/2554797.2554830","DOIUrl":"https://doi.org/10.1145/2554797.2554830","url":null,"abstract":"We derive structural constraints on the automorphism groups of strongly regular (s.r.) graphs, giving a surprisingly strong answer to a decades-old problem, with tantalizing implications to testing isomorphism of s.r. graphs, and raising new combinatorial challenges. S.r. graphs, while not believed to be Graph Isomorphism (GI) complete, have long been recognized as hard cases for GI, and, in this author's view, present some of the core difficulties of the general GI problem. Progress on the complexity of testing their isomorphism has been intermittent (Babai 1980, Spielman 1996, BW & CST (STOC'13) and BCSTW (FOCS'13)), and the current best bound is exp(Õ(n1/5)) (n is the number of vertices). Our main result is that if X is a s.r. graph then, with straightforward exceptions, the degree of the largest alternating group involved in the automorphism group Aut(X) (as a quotient of a subgroup) is O((ln n)2ln ln n). (The exceptions admit trivial linear-time GI testing.) The design of isomorphism tests for various classes of structures is intimately connected with the study of the automorphism groups of those structures. We include a brief survey of these connections, starting with an 1869 paper by Jordan on trees. In particular, our result amplifies the potential of Luks's divide-and-conquer methods (1980) to be applicable to testing isomorphism of s.r. graphs in quasipolynomial time. The challenge remains to find a hierarchy of combinatorial substructures through which this potential can be realized. We expect that the generality of our result will help in this regard; the result applies not only to s.r. graphs but to all graphs with strong spectral expansion and with a relatively small number of common neighbors for every pair of vertices. We state a purely mathematical conjecture that could bring us closer to finding the right kind of hierarchy. We also outline the broader GI context, and state conjectures in terms of \"primitive coherent configurations.\" These are generalizations of s.r. graphs, relevant to the general GI problem. Another consequence of the main result is the strongest argument to date against GI-completeness of s.r. graphs: we prove that no polynomial-time categorical reduction of GI to isomorphism of s.r. graphs is possible. All known reductions between isomorphism problems of various classes of structures fit into our notion of \"categorical reduction.\" The proof of the main result is elementary; it is based on known results in spectral graph theory and on a 1987 lemma on permutations by Ákos Seress and the author.","PeriodicalId":382856,"journal":{"name":"Proceedings of the 5th conference on Innovations in theoretical computer science","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114299442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Partial tests, universal tests and decomposability 部分测试、通用测试和可分解性
E. Fischer, Yonatan Goldhirsh, Oded Lachish
For a property P and a sub-property P', we say that P is P'-partially testable with q queries} if there exists an algorithm that distinguishes, with high probability, inputs in P' from inputs ε-far from P, using q queries. Some natural properties require many queries to test, but can be partitioned into a small number of subsets for which they are partially testable with very few queries, sometimes even a number independent of the input size. For properties over {0,1}, the notion of being thus partitionable ties in closely with Merlin-Arthur proofs of Proximity (MAPs) as defined independently in [14] a partition into r partially-testable properties is the same as a Merlin-Arthur system where the proof consists of the identity of one of the r partially-testable properties, giving a 2-way translation to an O(log r) size proof. Our main result is that for some low complexity properties a partition as above cannot exist, and moreover that for each of our properties there does not exist even a single sub-property featuring both a large size and a query-efficient partial test, in particular improving the lower bound set in [14]. For this we use neither the traditional Yao-type arguments nor the more recent communication complexity method, but open up a new approach for proving lower bounds. First, we use entropy analysis, which allows us to apply our arguments directly to 2-sided tests, thus avoiding the cost of the conversion in [14] from 2-sided to 1-sided tests. Broadly speaking we use "distinguishing instances" of a supposed test to show that a uniformly random choice of a member of the sub-property has "low entropy areas", ultimately leading to it having a low total entropy and hence having a small base set. Additionally, to have our arguments apply to adaptive tests, we use a mechanism of "rearranging" the input bits (through a decision tree that adaptively reads the entire input) to expose the low entropy that would otherwise not be apparent. We also explore the possibility of a connection in the other direction, namely whether the existence of a good partition (or MAP) can lead to a relatively query-efficient standard property test. We provide some preliminary results concerning this question, including a simple lower bound on the possible trade-off. Our second major result is a positive trade-off result for the restricted framework of 1-sided proximity oblivious tests. This is achieved through the construction of a "universal tester" that works the same for all properties admitting the restricted test. Our tester is very related to the notion of sample-based testing (for a non-constant number of queries) as defined by Goldreich and Ron in [13]. In particular it partially resolves an open problem raised by [13].
对于属性P和子属性P',我们说P是P'-通过q查询部分可测试},如果存在一种算法,可以使用q查询以高概率区分P'中的输入和远离P的输入ε。一些自然属性需要许多查询来测试,但可以划分为少量的子集,这些子集可以用很少的查询进行部分测试,有时甚至是与输入大小无关的数量。对于{0,1}上的性质,可分区的概念与在[14]中独立定义的邻近性的Merlin-Arthur证明(MAPs)密切相关,划分为r个部分可测试性质与证明由r个部分可测试性质之一的恒等式组成的Merlin-Arthur系统相同,给出了一个2向转换为O(log r)大小的证明。我们的主要结果是,对于一些低复杂度的性质,不存在上述划分,而且对于我们的每个性质,甚至不存在一个既具有大尺寸又具有查询效率的部分测试的子性质,特别是改进了[14]中的下界集。为此,我们既没有使用传统的姚式论证,也没有使用最近的通信复杂度方法,而是开辟了一种证明下界的新方法。首先,我们使用熵分析,它允许我们直接将我们的参数应用于双侧检验,从而避免了[14]中从双侧检验到单侧检验的转换成本。一般来说,我们使用假定测试的“区分实例”来表明,子属性的成员的均匀随机选择具有“低熵区域”,最终导致它具有低总熵,因此具有小基集。此外,为了将我们的论点应用于自适应测试,我们使用了一种“重新排列”输入比特的机制(通过一个自适应读取整个输入的决策树)来暴露低熵,否则就不会很明显。我们还探讨了另一个方向上连接的可能性,即一个好的分区(或MAP)的存在是否能够导致查询效率相对较高的标准属性测试。我们提供了一些关于这个问题的初步结果,包括一个可能权衡的简单下界。我们的第二个主要结果是对单侧接近无关测试的限制框架的积极权衡结果。这是通过构建一个“通用测试仪”来实现的,该测试仪对所有允许限制测试的属性都具有相同的工作原理。我们的测试器与Goldreich和Ron在[13]中定义的基于样本的测试(针对非恒定数量的查询)的概念非常相关。特别是,它部分地解决了[13]提出的一个开放性问题。
{"title":"Partial tests, universal tests and decomposability","authors":"E. Fischer, Yonatan Goldhirsh, Oded Lachish","doi":"10.1145/2554797.2554841","DOIUrl":"https://doi.org/10.1145/2554797.2554841","url":null,"abstract":"For a property P and a sub-property P', we say that P is P'-partially testable with q queries} if there exists an algorithm that distinguishes, with high probability, inputs in P' from inputs ε-far from P, using q queries. Some natural properties require many queries to test, but can be partitioned into a small number of subsets for which they are partially testable with very few queries, sometimes even a number independent of the input size. For properties over {0,1}, the notion of being thus partitionable ties in closely with Merlin-Arthur proofs of Proximity (MAPs) as defined independently in [14] a partition into r partially-testable properties is the same as a Merlin-Arthur system where the proof consists of the identity of one of the r partially-testable properties, giving a 2-way translation to an O(log r) size proof. Our main result is that for some low complexity properties a partition as above cannot exist, and moreover that for each of our properties there does not exist even a single sub-property featuring both a large size and a query-efficient partial test, in particular improving the lower bound set in [14]. For this we use neither the traditional Yao-type arguments nor the more recent communication complexity method, but open up a new approach for proving lower bounds. First, we use entropy analysis, which allows us to apply our arguments directly to 2-sided tests, thus avoiding the cost of the conversion in [14] from 2-sided to 1-sided tests. Broadly speaking we use \"distinguishing instances\" of a supposed test to show that a uniformly random choice of a member of the sub-property has \"low entropy areas\", ultimately leading to it having a low total entropy and hence having a small base set. Additionally, to have our arguments apply to adaptive tests, we use a mechanism of \"rearranging\" the input bits (through a decision tree that adaptively reads the entire input) to expose the low entropy that would otherwise not be apparent. We also explore the possibility of a connection in the other direction, namely whether the existence of a good partition (or MAP) can lead to a relatively query-efficient standard property test. We provide some preliminary results concerning this question, including a simple lower bound on the possible trade-off. Our second major result is a positive trade-off result for the restricted framework of 1-sided proximity oblivious tests. This is achieved through the construction of a \"universal tester\" that works the same for all properties admitting the restricted test. Our tester is very related to the notion of sample-based testing (for a non-constant number of queries) as defined by Goldreich and Ron in [13]. In particular it partially resolves an open problem raised by [13].","PeriodicalId":382856,"journal":{"name":"Proceedings of the 5th conference on Innovations in theoretical computer science","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126938521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Session details: Session 4: 16:00--16:10 会话详情:会话4:16:00—16:10
David Xiao
{"title":"Session details: Session 4: 16:00--16:10","authors":"David Xiao","doi":"10.1145/3255056","DOIUrl":"https://doi.org/10.1145/3255056","url":null,"abstract":"","PeriodicalId":382856,"journal":{"name":"Proceedings of the 5th conference on Innovations in theoretical computer science","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125366707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Session details: Session 1: 08:30--8:40 会议详情:会议1:08:30—8:40
Kobbi Nissim
{"title":"Session details: Session 1: 08:30--8:40","authors":"Kobbi Nissim","doi":"10.1145/3255053","DOIUrl":"https://doi.org/10.1145/3255053","url":null,"abstract":"","PeriodicalId":382856,"journal":{"name":"Proceedings of the 5th conference on Innovations in theoretical computer science","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124384363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Redrawing the boundaries on purchasing data from privacy-sensitive individuals 重新划定从隐私敏感的个人那里购买数据的界限
Kobbi Nissim, S. Vadhan, David Xiao
We prove new positive and negative results concerning the existence of truthful and individually rational mechanisms for purchasing private data from individuals with unbounded and sensitive privacy preferences. We strengthen the impossibility results of Ghosh and Roth (EC 2011) by extending it to a much wider class of privacy valuations. In particular, these include privacy valuations that are based on (ε δ)-differentially private mechanisms for non-zero δ, ones where the privacy costs are measured in a per-database manner (rather than taking the worst case), and ones that do not depend on the payments made to players (which might not be observable to an adversary). To bypass this impossibility result, we study a natural special setting where individuals have monotonic privacy valuations, which captures common contexts where certain values for private data are expected to lead to higher valuations for privacy (e. g. having a particular disease). We give new mechanisms that are individually rational for all players with monotonic privacy valuations, truthful for all players whose privacy valuations are not too large, and accurate if there are not too many players with too-large privacy valuations. We also prove matching lower bounds showing that in some respects our mechanism cannot be improved significantly.
我们证明了关于从具有无限和敏感隐私偏好的个人购买私人数据的真实和个体理性机制的存在的新的积极和消极结果。我们加强了Ghosh和Roth (EC 2011)的不可能结果,将其扩展到更广泛的隐私估值类别。特别是,这些包括基于(ε δ)的隐私评估——非零δ的差异隐私机制,隐私成本以每个数据库的方式衡量(而不是采取最坏的情况),以及不依赖于向玩家支付的费用(这可能不会被对手观察到)的隐私评估。为了绕过这个不可能的结果,我们研究了一个自然的特殊设置,其中个人具有单调的隐私估值,它捕获了私有数据的某些值预计会导致更高隐私估值的常见背景(例如患有特定疾病)。我们给出了新的机制,这些机制对于所有具有单调隐私估值的参与者来说都是理性的,对于所有隐私估值不太大的参与者来说都是真实的,如果没有太多的参与者具有过大的隐私估值,则是准确的。我们还证明了匹配下界,表明在某些方面我们的机制不能得到显著改进。
{"title":"Redrawing the boundaries on purchasing data from privacy-sensitive individuals","authors":"Kobbi Nissim, S. Vadhan, David Xiao","doi":"10.1145/2554797.2554835","DOIUrl":"https://doi.org/10.1145/2554797.2554835","url":null,"abstract":"We prove new positive and negative results concerning the existence of truthful and individually rational mechanisms for purchasing private data from individuals with unbounded and sensitive privacy preferences. We strengthen the impossibility results of Ghosh and Roth (EC 2011) by extending it to a much wider class of privacy valuations. In particular, these include privacy valuations that are based on (ε δ)-differentially private mechanisms for non-zero δ, ones where the privacy costs are measured in a per-database manner (rather than taking the worst case), and ones that do not depend on the payments made to players (which might not be observable to an adversary). To bypass this impossibility result, we study a natural special setting where individuals have monotonic privacy valuations, which captures common contexts where certain values for private data are expected to lead to higher valuations for privacy (e. g. having a particular disease). We give new mechanisms that are individually rational for all players with monotonic privacy valuations, truthful for all players whose privacy valuations are not too large, and accurate if there are not too many players with too-large privacy valuations. We also prove matching lower bounds showing that in some respects our mechanism cannot be improved significantly.","PeriodicalId":382856,"journal":{"name":"Proceedings of the 5th conference on Innovations in theoretical computer science","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121749227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 66
Robust device independent quantum key distribution 鲁棒设备无关量子密钥分发
U. Vazirani, Thomas Vidick
Quantum cryptography is based on the discovery that the laws of quantum mechanics allow levels of security that are impossible to replicate in a classical world [2, 8, 12]. Can such levels of security be guaranteed even when the quantum devices on which the protocol relies are untrusted? This fundamental question in quantum cryptography dates back to the early nineties when the challenge of achieving device independent quantum key distribution, or DIQKD, was first formulated [9]. We answer this challenge affirmatively by exhibiting a robust protocol for DIQKD and rigorously proving its security. The protocol achieves a linear key rate while tolerating a constant noise rate in the devices. The security proof assumes only that the devices can be modeled by the laws of quantum mechanics and are spatially isolated from each other and any adversary's laboratory. In particular, we emphasize that the devices may have quantum memory. All previous proofs of security relied either on the use of many independent pairs of devices [6, 4, 7], or on the absence of noise [10, 1]. To prove security for a DIQKD protocol it is necessary to establish at least that the generated key is truly random even in the presence of a quantum adversary. This is already a challenge, one that was recently resolved [14]. DIQKD is substantially harder, since now the protocol must also guarantee that the key is completely secret from the quantum adversary's point of view, and the entire protocol is robust against noise; this in spite of the substantial amounts of classical information leaked to the adversary throughout the protocol, as part of the error estimation and information reconciliation procedures. Our proof of security builds upon a number of techniques, including randomness extractors that are secure against quantum storage [3] as well as ideas originating in the coding strategy used in the proof of the Holevo-Schumacher-Westmoreland theorem [5, 11] which we apply to bound correlations across multiple rounds in a way not unrelated to information-theoretic proofs of the parallel repetition property for multiplayer games. Our main result can be understood as a new bound on monogamy [13] of entanglement in the type of complex scenario that arises in a key distribution protocol. Precise statements of our results and detailed proofs can be found at arXiv:1210.1810.
量子密码学的基础是发现量子力学定律允许在经典世界中不可能复制的安全级别[2,8,12]。即使在协议所依赖的量子设备不受信任的情况下,也能保证这种级别的安全吗?量子密码学中的这个基本问题可以追溯到上世纪90年代初,当时首次提出了实现与设备无关的量子密钥分发(DIQKD)的挑战[9]。我们通过展示一个健壮的DIQKD协议并严格证明其安全性来肯定地回答这个挑战。该协议实现了一个线性密钥率,同时在设备中容忍恒定的噪声率。安全证明只假设这些设备可以按照量子力学定律建模,并且在空间上彼此隔离,与任何对手的实验室隔离。我们特别强调,这些器件可能具有量子存储器。以前所有的安全性证明要么依赖于使用许多独立的设备对[6,4,7],要么依赖于没有噪声[10,1]。为了证明DIQKD协议的安全性,至少有必要确定即使存在量子对手,生成的密钥也是真正随机的。这已经是一个挑战,最近才得到解决[14]。DIQKD的难度要大得多,因为现在协议还必须保证从量子对手的角度来看,密钥是完全保密的,而且整个协议对噪声具有鲁棒性;尽管在整个协议中,作为错误估计和信息协调过程的一部分,大量的经典信息泄露给了对手。我们的安全性证明建立在许多技术的基础上,包括对量子存储安全的随机提取器[3],以及起源于Holevo-Schumacher-Westmoreland定理证明中使用的编码策略[5,11],我们将其应用于多个回合的绑定相关性,以一种与多人游戏并行重复属性的信息论证明并非无关的方式。我们的主要结果可以理解为在密钥分发协议中出现的复杂场景类型中纠缠的一夫一妻制[13]的新界限。我们的结果的精确陈述和详细的证明可以在arXiv:1210.1810找到。
{"title":"Robust device independent quantum key distribution","authors":"U. Vazirani, Thomas Vidick","doi":"10.1145/2554797.2554802","DOIUrl":"https://doi.org/10.1145/2554797.2554802","url":null,"abstract":"Quantum cryptography is based on the discovery that the laws of quantum mechanics allow levels of security that are impossible to replicate in a classical world [2, 8, 12]. Can such levels of security be guaranteed even when the quantum devices on which the protocol relies are untrusted? This fundamental question in quantum cryptography dates back to the early nineties when the challenge of achieving device independent quantum key distribution, or DIQKD, was first formulated [9]. We answer this challenge affirmatively by exhibiting a robust protocol for DIQKD and rigorously proving its security. The protocol achieves a linear key rate while tolerating a constant noise rate in the devices. The security proof assumes only that the devices can be modeled by the laws of quantum mechanics and are spatially isolated from each other and any adversary's laboratory. In particular, we emphasize that the devices may have quantum memory. All previous proofs of security relied either on the use of many independent pairs of devices [6, 4, 7], or on the absence of noise [10, 1]. To prove security for a DIQKD protocol it is necessary to establish at least that the generated key is truly random even in the presence of a quantum adversary. This is already a challenge, one that was recently resolved [14]. DIQKD is substantially harder, since now the protocol must also guarantee that the key is completely secret from the quantum adversary's point of view, and the entire protocol is robust against noise; this in spite of the substantial amounts of classical information leaked to the adversary throughout the protocol, as part of the error estimation and information reconciliation procedures. Our proof of security builds upon a number of techniques, including randomness extractors that are secure against quantum storage [3] as well as ideas originating in the coding strategy used in the proof of the Holevo-Schumacher-Westmoreland theorem [5, 11] which we apply to bound correlations across multiple rounds in a way not unrelated to information-theoretic proofs of the parallel repetition property for multiplayer games. Our main result can be understood as a new bound on monogamy [13] of entanglement in the type of complex scenario that arises in a key distribution protocol. Precise statements of our results and detailed proofs can be found at arXiv:1210.1810.","PeriodicalId":382856,"journal":{"name":"Proceedings of the 5th conference on Innovations in theoretical computer science","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129147041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Session details: Session 6: 10:30--10:40 会议详情:会议6:10:30—10:40
V. Vaikuntanathan
{"title":"Session details: Session 6: 10:30--10:40","authors":"V. Vaikuntanathan","doi":"10.1145/3255058","DOIUrl":"https://doi.org/10.1145/3255058","url":null,"abstract":"","PeriodicalId":382856,"journal":{"name":"Proceedings of the 5th conference on Innovations in theoretical computer science","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115896518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Linear-time encodable codes meeting the gilbert-varshamov bound and their cryptographic applications 满足gilbert-varshamov界的线性时间可编码码及其密码学应用
E. Druk, Y. Ishai
A random linear code has good minimal distance with high probability. The conjectured intractability of decoding random linear codes has recently found many applications in cryptography. One disadvantage of random linear codes is that their encoding complexity grows quadratically with the message length. Motivated by this disadvantage, we present a randomized construction of linear error-correcting codes which can be encoded in linear time and yet enjoy several useful features of random linear codes. Our construction is based on a linear-time computable hash function due to Ishai, Kushilevitz, Ostrovsky and Sahai [25]. We demonstrate the usefulness of these new codes by presenting several applications in coding theory and cryptography. These include the first family of linear-time encodable codes meeting the Gilbert-Varshamov bound, the first nontrivial linear-time secret sharing schemes, and plausible candidates for symmetric encryption and identification schemes which can be conjectured to achieve better asymptotic efficiency/security tradeoffs than all current candidates.
随机线性码具有良好的最小距离和高概率。随机线性码解码的难解性最近在密码学中得到了许多应用。随机线性码的一个缺点是其编码复杂度随消息长度呈二次增长。针对这一缺点,我们提出了一种线性纠错码的随机结构,它可以在线性时间内编码,同时又具有随机线性码的几个有用的特征。我们的构造是基于Ishai, Kushilevitz, Ostrovsky和Sahai[25]的线性时间可计算哈希函数。我们通过介绍编码理论和密码学中的几个应用来证明这些新代码的有用性。其中包括满足Gilbert-Varshamov界的第一个线性时间可编码码族,第一个非平凡线性时间秘密共享方案,以及对称加密和识别方案的合理候选方案,这些方案可以推测出比所有现有候选方案更好的渐近效率/安全权衡。
{"title":"Linear-time encodable codes meeting the gilbert-varshamov bound and their cryptographic applications","authors":"E. Druk, Y. Ishai","doi":"10.1145/2554797.2554815","DOIUrl":"https://doi.org/10.1145/2554797.2554815","url":null,"abstract":"A random linear code has good minimal distance with high probability. The conjectured intractability of decoding random linear codes has recently found many applications in cryptography. One disadvantage of random linear codes is that their encoding complexity grows quadratically with the message length. Motivated by this disadvantage, we present a randomized construction of linear error-correcting codes which can be encoded in linear time and yet enjoy several useful features of random linear codes. Our construction is based on a linear-time computable hash function due to Ishai, Kushilevitz, Ostrovsky and Sahai [25]. We demonstrate the usefulness of these new codes by presenting several applications in coding theory and cryptography. These include the first family of linear-time encodable codes meeting the Gilbert-Varshamov bound, the first nontrivial linear-time secret sharing schemes, and plausible candidates for symmetric encryption and identification schemes which can be conjectured to achieve better asymptotic efficiency/security tradeoffs than all current candidates.","PeriodicalId":382856,"journal":{"name":"Proceedings of the 5th conference on Innovations in theoretical computer science","volume":"9 11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127043977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
Session details: Session 10: 10:30--10:40 会议详情:会议10:10:30—10:40
Deeparnab Chakrabarty
{"title":"Session details: Session 10: 10:30--10:40","authors":"Deeparnab Chakrabarty","doi":"10.1145/3255062","DOIUrl":"https://doi.org/10.1145/3255062","url":null,"abstract":"","PeriodicalId":382856,"journal":{"name":"Proceedings of the 5th conference on Innovations in theoretical computer science","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114547813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Proceedings of the 5th conference on Innovations in theoretical computer science
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1