首页 > 最新文献

Proceedings of the 5th conference on Innovations in theoretical computer science最新文献

英文 中文
Rational arguments: single round delegation with sublinear verification 理性论证:次线性验证的单轮授权
Siyao Guo, Pavel Hubácek, Alon Rosen, Margarita Vald
Rational proofs, recently introduced by Azar and Micali (STOC 2012), are a variant of interactive proofs in which the prover is neither honest nor malicious, but rather rational. The advantage of rational proofs over their classical counterparts is that they allow for extremely low communication and verification time. Azar and Micali demonstrated their potential by giving a one message rational proof for #SAT, in which the verifier runs in time O(n), where $n$ denotes the instance size. In a follow-up work (EC 2013), Azar and Micali proposed "super-efficient" and interactive versions of rational proofs and argued that they capture precisely the class TC0 of constant-depth, polynomial-size circuits with threshold gates. In this paper, we show that by considering rational arguments, in which the prover is additionally restricted to be computationally bounded, the class NC1, of search problems computable by log-space uniform circuits of O(log n)-depth, admits rational protocols that are simultaneously one-round and polylog(n) time verifiable. This demonstrates the potential of rational arguments as a way to extend the notion of "super-efficient" rational proofs beyond the class TC0. The low interaction nature of our protocols, along with their sub-linear verification time, make them well suited for delegation of computation. While they provide a weaker (yet arguably meaningful) guarantee of soundness, they compare favorably with each of the known delegation schemes in at least one aspect. They are simple, rely on standard complexity hardness assumptions, provide a correctness guarantee for all instances, and do not require preprocessing.
最近由Azar和Micali (STOC 2012)引入的理性证明是交互式证明的一种变体,其中证明者既不诚实也不恶意,而是理性的。理性证明相对于经典证明的优势在于,它们允许极低的通信和验证时间。Azar和Micali通过给出#SAT的一条消息理性证明来展示他们的潜力,其中验证器运行时间为O(n),其中$n$表示实例大小。在后续工作(EC 2013)中,Azar和Micali提出了“超高效”和交互版本的理性证明,并认为它们精确地捕获了TC0类的等深度、多项式大小的带有阈值门的电路。在本文中,我们证明了通过考虑理性论证(其中证明者被附加限制为计算有界),由O(log n)深度的对数空间一致电路可计算的搜索问题的NC1类,允许同时是单轮和多对数(n)时间可验证的理性协议。这证明了理性论证作为一种将“超高效”理性证明概念扩展到TC0类之外的方法的潜力。我们的协议的低交互性质,以及它们的亚线性验证时间,使它们非常适合计算委托。虽然它们提供的可靠性保证较弱(但可以说是有意义的),但它们至少在一个方面优于每种已知的委托方案。它们很简单,依赖于标准的复杂性硬度假设,为所有实例提供正确性保证,并且不需要预处理。
{"title":"Rational arguments: single round delegation with sublinear verification","authors":"Siyao Guo, Pavel Hubácek, Alon Rosen, Margarita Vald","doi":"10.1145/2554797.2554845","DOIUrl":"https://doi.org/10.1145/2554797.2554845","url":null,"abstract":"Rational proofs, recently introduced by Azar and Micali (STOC 2012), are a variant of interactive proofs in which the prover is neither honest nor malicious, but rather rational. The advantage of rational proofs over their classical counterparts is that they allow for extremely low communication and verification time. Azar and Micali demonstrated their potential by giving a one message rational proof for #SAT, in which the verifier runs in time O(n), where $n$ denotes the instance size. In a follow-up work (EC 2013), Azar and Micali proposed \"super-efficient\" and interactive versions of rational proofs and argued that they capture precisely the class TC0 of constant-depth, polynomial-size circuits with threshold gates. In this paper, we show that by considering rational arguments, in which the prover is additionally restricted to be computationally bounded, the class NC1, of search problems computable by log-space uniform circuits of O(log n)-depth, admits rational protocols that are simultaneously one-round and polylog(n) time verifiable. This demonstrates the potential of rational arguments as a way to extend the notion of \"super-efficient\" rational proofs beyond the class TC0. The low interaction nature of our protocols, along with their sub-linear verification time, make them well suited for delegation of computation. While they provide a weaker (yet arguably meaningful) guarantee of soundness, they compare favorably with each of the known delegation schemes in at least one aspect. They are simple, rely on standard complexity hardness assumptions, provide a correctness guarantee for all instances, and do not require preprocessing.","PeriodicalId":382856,"journal":{"name":"Proceedings of the 5th conference on Innovations in theoretical computer science","volume":"282 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115119492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Session details: Session 11: 14:00--14:10 会议详情:会议11:14:00—14:10
Shubhangi Saraf
{"title":"Session details: Session 11: 14:00--14:10","authors":"Shubhangi Saraf","doi":"10.1145/3255063","DOIUrl":"https://doi.org/10.1145/3255063","url":null,"abstract":"","PeriodicalId":382856,"journal":{"name":"Proceedings of the 5th conference on Innovations in theoretical computer science","volume":"98 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123139342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Black-box obfuscation for d-CNFs d-CNFs的黑箱混淆
Zvika Brakerski, G. Rothblum
We show how to securely obfuscate a new class of functions: conjunctions of NC0d circuits. These are functions of the form C(→/x) = ∧mi=1 C1(→/x), where each C1 is a boolean NC0d circuits circuit, whose output bit is only a function of d = O(1) bits of the input →/x. For example, d-CNFs, where each clause is a disjunction of at most d variables, are in this class. Given such a function, we produce an obfuscated program that preserves the input-output functionality of the given function, but reveals nothing else. Our construction is based on multilinear maps, and can be instantiated using the recent candidates proposed by Garg, Gentry and Halevi (EUROCRYPT 2013) and by Coron, Lepoint and Tibouchi (CRYPTO 2013). We prove that the construction is a secure obfuscation in a generic multilinear group model, under the black-box definition of Barak et al. (CRYPTO 2001). Security is based on a new worst-case hardness assumption about exponential hardness of the NP-complete problem 3-SAT, the Bounded Speedup Hypothesis. One of the new techniques we introduce is a method for enforcing input consistency, which we call randomizing sub-assignments. We hope that this technique can find further application in constructing secure obfuscators. The family of functions we obfuscate is considerably richer than previous works that consider black-box obfuscation. As one application, we show how to achieve obfuscated functional point testing: namely, to construct a circuit that checks whether ƒ(→/x) = →/y, where ƒ is an arbitrary "public" polynomial-time computable function, but →/y is a "secret" point that is hidden in the obfuscation.
我们展示了如何安全地混淆一类新的函数:NC0d电路的连接。这些函数的形式是C(→/x) =∧mi=1 C1(→/x),其中每个C1都是一个布尔NC0d电路,其输出位仅是输入→/x的d = O(1)位的函数。例如,d- cnfs,其中每个子句是最多d个变量的析取,就属于这类。给定这样一个函数,我们生成一个混淆的程序,它保留了给定函数的输入输出功能,但没有显示任何其他功能。我们的构建基于多线性地图,并且可以使用Garg, Gentry和Halevi (EUROCRYPT 2013)以及Coron, Lepoint和Tibouchi (CRYPTO 2013)最近提出的候选地图进行实例化。在Barak等人(CRYPTO 2001)的黑盒定义下,我们证明了该构造是一个一般多线性群模型中的安全混淆。安全性是基于np完全问题3-SAT的指数硬度的一个新的最坏情况硬度假设,即有界加速假设。我们引入的新技术之一是一种强制输入一致性的方法,我们称之为随机子分配。我们希望该技术能够在构建安全混淆器中得到进一步的应用。我们混淆的函数族比以前考虑黑盒混淆的工作要丰富得多。作为一个应用,我们展示了如何实现混淆功能点测试:即构造一个电路来检查是否有(→/x) =→/y,其中,f是一个任意的“公开”多项式时间可计算函数,而→/y是隐藏在混淆中的“秘密”点。
{"title":"Black-box obfuscation for d-CNFs","authors":"Zvika Brakerski, G. Rothblum","doi":"10.1145/2554797.2554820","DOIUrl":"https://doi.org/10.1145/2554797.2554820","url":null,"abstract":"We show how to securely obfuscate a new class of functions: conjunctions of NC0d circuits. These are functions of the form C(→/x) = ∧mi=1 C1(→/x), where each C1 is a boolean NC0d circuits circuit, whose output bit is only a function of d = O(1) bits of the input →/x. For example, d-CNFs, where each clause is a disjunction of at most d variables, are in this class. Given such a function, we produce an obfuscated program that preserves the input-output functionality of the given function, but reveals nothing else. Our construction is based on multilinear maps, and can be instantiated using the recent candidates proposed by Garg, Gentry and Halevi (EUROCRYPT 2013) and by Coron, Lepoint and Tibouchi (CRYPTO 2013). We prove that the construction is a secure obfuscation in a generic multilinear group model, under the black-box definition of Barak et al. (CRYPTO 2001). Security is based on a new worst-case hardness assumption about exponential hardness of the NP-complete problem 3-SAT, the Bounded Speedup Hypothesis. One of the new techniques we introduce is a method for enforcing input consistency, which we call randomizing sub-assignments. We hope that this technique can find further application in constructing secure obfuscators. The family of functions we obfuscate is considerably richer than previous works that consider black-box obfuscation. As one application, we show how to achieve obfuscated functional point testing: namely, to construct a circuit that checks whether ƒ(→/x) = →/y, where ƒ is an arbitrary \"public\" polynomial-time computable function, but →/y is a \"secret\" point that is hidden in the obfuscation.","PeriodicalId":382856,"journal":{"name":"Proceedings of the 5th conference on Innovations in theoretical computer science","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124577510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
Session details: Session 12: 16:00--16:10 会议详情:会议12:16:00—16:10
K. Etessami
{"title":"Session details: Session 12: 16:00--16:10","authors":"K. Etessami","doi":"10.1145/3255064","DOIUrl":"https://doi.org/10.1145/3255064","url":null,"abstract":"","PeriodicalId":382856,"journal":{"name":"Proceedings of the 5th conference on Innovations in theoretical computer science","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122500794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Decision trees, protocols and the entropy-influence conjecture 决策树、协议和熵影响猜想
Andrew Wan, John Wright, Chenggang Wu
Given ƒ : {--1, 1}n → {-- 1, 1}, define the spectral distribution of ƒ to be the distribution on subsets of [n] in which the set S is sampled with probability ƒ(S)2. Then the Fourier Entropy-Influence (FEI) conjecture of Friedgut and Kalai [2] states that there is some absolute constant C such that H[ƒ2] ≤ C ⋅ Inf[ƒ]. Here, H[ƒ2] denotes the Shannon entropy of ƒ's spectral distribution, and Inf[ƒ] is the total influence of ƒ. This conjecture is one of the major open problems in the analysis of Boolean functions, and settling it would have several interesting consequences. Previous results on the FEI conjecture have been largely through direct calculation. In this paper we study a natural interpretation of the conjecture, which states that there exists a communication protocol which, given subset S of [n] distributed as ƒ2, can communicate the value of S using at most C⋅Inf[ƒ] bits in expectation. Using this interpretation, we are able show the following results: First, if ƒ is computable by a read-k decision tree, then H[ƒ2] ≤ 9k ⋅ Inf[ƒ]. Next, if ƒ has Inf[ƒ] ≥ 1 and is computable by a decision tree with expected depth d, then H[[ƒ2] ≤ 12d⋅ Inf[ƒ]. Finally, we give a new proof of the main theorem of O'Donnell and Tan [8], i.e. that their FEI+ conjecture composes. In addition, we show that natural improvements to our decision tree results would be sufficient to prove the FEI conjecture in its entirety. We believe that our methods give more illuminating proofs than previous results about the FEI conjecture.
给定φ:{—1,1}n→{—1,1},定义φ的谱分布为集合S以概率φ (S)2采样的[n]子集上的分布。然后,Friedgut和Kalai[2]的傅里叶熵-影响(FEI)猜想指出,存在一个绝对常数C,使得H[ƒ2]≤C⋅Inf[f]。其中,H[ƒ2]为f谱分布的香农熵,Inf[f]为f的总影响。这个猜想是布尔函数分析中的主要开放问题之一,解决它会有几个有趣的结果。以前关于FEI猜想的结果大部分是通过直接计算得到的。本文研究了该猜想的一种自然解释,该解释表明存在一种通信协议,当给定分布为ƒ2的[n]子集S时,该通信协议可以在期望范围内最多使用C⋅Inf[f]位来通信S的值。利用这种解释,我们可以得到以下结果:首先,如果f可由一棵读-k决策树计算,则H[ƒ2]≤9k⋅Inf[f]。其次,如果f的Inf[f]≥1,且可由期望深度为d的决策树计算,则H[[ƒ2]≤12d⋅Inf[f]。最后,我们给出了O'Donnell和Tan[8]的主要定理的一个新的证明,即他们的FEI+猜想可以合成。此外,我们证明了对决策树结果的自然改进足以证明FEI猜想的完整性。我们相信我们的方法比以前关于FEI猜想的结果提供了更有启发性的证明。
{"title":"Decision trees, protocols and the entropy-influence conjecture","authors":"Andrew Wan, John Wright, Chenggang Wu","doi":"10.1145/2554797.2554806","DOIUrl":"https://doi.org/10.1145/2554797.2554806","url":null,"abstract":"Given ƒ : {--1, 1}n → {-- 1, 1}, define the spectral distribution of ƒ to be the distribution on subsets of [n] in which the set S is sampled with probability ƒ(S)2. Then the Fourier Entropy-Influence (FEI) conjecture of Friedgut and Kalai [2] states that there is some absolute constant C such that H[ƒ2] ≤ C ⋅ Inf[ƒ]. Here, H[ƒ2] denotes the Shannon entropy of ƒ's spectral distribution, and Inf[ƒ] is the total influence of ƒ. This conjecture is one of the major open problems in the analysis of Boolean functions, and settling it would have several interesting consequences. Previous results on the FEI conjecture have been largely through direct calculation. In this paper we study a natural interpretation of the conjecture, which states that there exists a communication protocol which, given subset S of [n] distributed as ƒ2, can communicate the value of S using at most C⋅Inf[ƒ] bits in expectation. Using this interpretation, we are able show the following results: First, if ƒ is computable by a read-k decision tree, then H[ƒ2] ≤ 9k ⋅ Inf[ƒ]. Next, if ƒ has Inf[ƒ] ≥ 1 and is computable by a decision tree with expected depth d, then H[[ƒ2] ≤ 12d⋅ Inf[ƒ]. Finally, we give a new proof of the main theorem of O'Donnell and Tan [8], i.e. that their FEI+ conjecture composes. In addition, we show that natural improvements to our decision tree results would be sufficient to prove the FEI conjecture in its entirety. We believe that our methods give more illuminating proofs than previous results about the FEI conjecture.","PeriodicalId":382856,"journal":{"name":"Proceedings of the 5th conference on Innovations in theoretical computer science","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130683845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Sequential decision making with vector outcomes 具有向量结果的顺序决策
Y. Azar, U. Feige, M. Feldman, Moshe Tennenholtz
We study a multi-round optimization setting in which in each round a player may select one of several actions, and each action produces an outcome vector, not observable to the player until the round ends. The final payoff for the player is computed by applying some known function f to the sum of all outcome vectors (e.g., the minimum of all coordinates of the sum). We show that standard notions of performance measure (such as comparison to the best single action) used in related expert and bandit settings (in which the payoff in each round is scalar) are not useful in our vector setting. Instead, we propose a different performance measure, and design algorithms that have vanishing regret with respect to our new measure.
我们研究了一个多轮优化设置,在每个回合中,玩家可以选择几个行动中的一个,每个行动产生一个结果向量,直到回合结束才会被玩家观察到。玩家的最终收益是通过将某些已知函数f应用于所有结果向量(游戏邦注:例如,所有坐标的最小值)的总和来计算的。我们表明,在相关的专家和强盗设置(其中每轮的收益是标量)中使用的标准性能度量概念(例如与最佳单动作的比较)在我们的矢量设置中是无用的。相反,我们提出了一种不同的性能度量,并设计了相对于我们的新度量具有消失遗憾的算法。
{"title":"Sequential decision making with vector outcomes","authors":"Y. Azar, U. Feige, M. Feldman, Moshe Tennenholtz","doi":"10.1145/2554797.2554817","DOIUrl":"https://doi.org/10.1145/2554797.2554817","url":null,"abstract":"We study a multi-round optimization setting in which in each round a player may select one of several actions, and each action produces an outcome vector, not observable to the player until the round ends. The final payoff for the player is computed by applying some known function f to the sum of all outcome vectors (e.g., the minimum of all coordinates of the sum). We show that standard notions of performance measure (such as comparison to the best single action) used in related expert and bandit settings (in which the payoff in each round is scalar) are not useful in our vector setting. Instead, we propose a different performance measure, and design algorithms that have vanishing regret with respect to our new measure.","PeriodicalId":382856,"journal":{"name":"Proceedings of the 5th conference on Innovations in theoretical computer science","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132119198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Approximation schemes via Sherali-Adams hierarchy for dense constraint satisfaction problems and assignment problems 基于Sherali-Adams层次的密集约束满足问题和分配问题的逼近格式
Yuichi Yoshida, Yuan Zhou
We consider approximation schemes for the maximum constraint satisfaction problems and the maximum assignment problems. Though they are NP-Hard in general, if the instance is "dense" or "locally dense", then they are known to have approximation schemes that run in polynomial time or quasi-polynomial time. In this paper, we give a unified method of showing these approximation schemes based on the Sherali-Adams linear programming relaxation hierarchy. We also use our linear programming-based framework to show new algorithmic results on the optimization version of the hypergraph isomorphism problem.
研究了最大约束满足问题和最大分配问题的逼近格式。虽然它们通常是NP-Hard,但如果实例是“密集的”或“局部密集的”,则已知它们具有在多项式时间或准多项式时间内运行的近似方案。本文给出了一种基于Sherali-Adams线性规划松弛层次的统一逼近格式的表示方法。我们还使用基于线性规划的框架展示了超图同构问题的优化版本的新算法结果。
{"title":"Approximation schemes via Sherali-Adams hierarchy for dense constraint satisfaction problems and assignment problems","authors":"Yuichi Yoshida, Yuan Zhou","doi":"10.1145/2554797.2554836","DOIUrl":"https://doi.org/10.1145/2554797.2554836","url":null,"abstract":"We consider approximation schemes for the maximum constraint satisfaction problems and the maximum assignment problems. Though they are NP-Hard in general, if the instance is \"dense\" or \"locally dense\", then they are known to have approximation schemes that run in polynomial time or quasi-polynomial time. In this paper, we give a unified method of showing these approximation schemes based on the Sherali-Adams linear programming relaxation hierarchy. We also use our linear programming-based framework to show new algorithmic results on the optimization version of the hypergraph isomorphism problem.","PeriodicalId":382856,"journal":{"name":"Proceedings of the 5th conference on Innovations in theoretical computer science","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127995689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Candidate weak pseudorandom functions in AC0 ○ MOD2 AC0〇MOD2中的候选弱伪随机函数
Adi Akavia, Andrej Bogdanov, Siyao Guo, Akshay Kamath, Alon Rosen
Pseudorandom functions (PRFs) play a fundamental role in symmetric-key cryptography. However, they are inherently complex and cannot be implemented in the class AC0 (MOD2). Weak pseudorandom functions (weak PRFs) do not suffer from this complexity limitation, yet they suffice for many cryptographic applications. We study the minimal complexity requirements for constructing weak PRFs. To this end We conjecture that the function family FA(x) = g(Ax), where A is a random square GF(2) matrix and g is a carefully chosen function of constant depth, is a weak PRF. In support of our conjecture, we show that functions in this family are inapproximable by GF(2) polynomials of low degree and do not correlate with any fixed Boolean function family of subexponential size. We study the class AC0 ○ MOD2 that captures the complexity of our construction. We conjecture that all functions in this class have a Fourier coefficient of magnitude exp(- poly log n) and prove this conjecture in the case when the MOD2 function is typical. We investigate the relation between the hardness of learning noisy parities and the existence of weak PRFs in AC0 ○ MOD2. We argue that such a complexity-driven approach can play a role in bridging the gap between the theory and practice of cryptography.
伪随机函数在对称密钥密码学中起着重要的作用。然而,它们本质上是复杂的,不能在类AC0 (MOD2)中实现。弱伪随机函数(弱prf)不受这种复杂性限制,但它们足以满足许多加密应用程序。研究了构造弱PRFs的最小复杂度要求。为此,我们推测函数族FA(x) = g(Ax)是一个弱PRF,其中A是一个随机平方GF(2)矩阵,g是一个精心选择的等深度函数。为了支持我们的猜想,我们证明了这个族中的函数是不能被低次的GF(2)多项式近似的,并且不与任何固定的亚指数大小的布尔函数族相关。我们研究类AC0〇MOD2捕获我们的结构的复杂性。我们推测这类函数的傅里叶系数为exp(- poly log n),并在MOD2函数为典型的情况下证明了这一推测。研究了AC0〇MOD2中学习噪声对的难易程度与弱PRFs的存在性之间的关系。我们认为,这种复杂性驱动的方法可以在弥合密码学理论和实践之间的差距方面发挥作用。
{"title":"Candidate weak pseudorandom functions in AC0 ○ MOD2","authors":"Adi Akavia, Andrej Bogdanov, Siyao Guo, Akshay Kamath, Alon Rosen","doi":"10.1145/2554797.2554821","DOIUrl":"https://doi.org/10.1145/2554797.2554821","url":null,"abstract":"Pseudorandom functions (PRFs) play a fundamental role in symmetric-key cryptography. However, they are inherently complex and cannot be implemented in the class AC0 (MOD2). Weak pseudorandom functions (weak PRFs) do not suffer from this complexity limitation, yet they suffice for many cryptographic applications. We study the minimal complexity requirements for constructing weak PRFs. To this end We conjecture that the function family FA(x) = g(Ax), where A is a random square GF(2) matrix and g is a carefully chosen function of constant depth, is a weak PRF. In support of our conjecture, we show that functions in this family are inapproximable by GF(2) polynomials of low degree and do not correlate with any fixed Boolean function family of subexponential size. We study the class AC0 ○ MOD2 that captures the complexity of our construction. We conjecture that all functions in this class have a Fourier coefficient of magnitude exp(- poly log n) and prove this conjecture in the case when the MOD2 function is typical. We investigate the relation between the hardness of learning noisy parities and the existence of weak PRFs in AC0 ○ MOD2. We argue that such a complexity-driven approach can play a role in bridging the gap between the theory and practice of cryptography.","PeriodicalId":382856,"journal":{"name":"Proceedings of the 5th conference on Innovations in theoretical computer science","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127328985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 48
Invitation games and the price of stability 邀请游戏和稳定的价格
U. Feige, Moshe Tennenholtz
Given an arbitrary 2-player game G that we refer to as the basic game, we propose a notion of a multiplayer invitation game that proceeds for a fixed number of rounds, where in each round some player (whose identity is determined by a scheduler) gets to invite a player of his choice to play a match of the basic game. The question that we study is how does the price of stability of the invitation game compare to that of the basic game. For a wide range of schedulers we prove a dichotomy result, showing that there are only two types of basic games, those that we call invitation resistant in which the price of stability of the invitation version is equal to that of the basic game, and those that we call asymptotically efficient in which the price of stability tends to 0 as the number of rounds grows. 1 In particular, when the basic game is the prisoners dilemma the game is asymptotically efficient if and only if the payoff when both players defect is nonzero.
给定一个任意的2人游戏G(我们称之为基本游戏),我们提出了一个多人邀请游戏的概念,该游戏进行固定数量的回合,在每一轮中,一些玩家(其身份由调度程序决定)可以邀请他选择的玩家参加基本游戏的比赛。我们研究的问题是,邀请游戏的稳定性价格与基本游戏的稳定性价格相比如何。对于大范围的调度程序,我们证明了一个二分法结果,表明只有两种类型的基本博弈,一种是我们称为邀请抵抗的,其中邀请版本的稳定性价格等于基本博弈的稳定性价格,另一种是我们称为渐近有效的,其中稳定性价格随着轮次的增加而趋于0。特别地,当基本博弈是囚徒困境时,当且仅当双方参与者背叛时的收益不为零时,博弈是渐近有效的。
{"title":"Invitation games and the price of stability","authors":"U. Feige, Moshe Tennenholtz","doi":"10.1145/2554797.2554808","DOIUrl":"https://doi.org/10.1145/2554797.2554808","url":null,"abstract":"Given an arbitrary 2-player game G that we refer to as the basic game, we propose a notion of a multiplayer invitation game that proceeds for a fixed number of rounds, where in each round some player (whose identity is determined by a scheduler) gets to invite a player of his choice to play a match of the basic game. The question that we study is how does the price of stability of the invitation game compare to that of the basic game. For a wide range of schedulers we prove a dichotomy result, showing that there are only two types of basic games, those that we call invitation resistant in which the price of stability of the invitation version is equal to that of the basic game, and those that we call asymptotically efficient in which the price of stability tends to 0 as the number of rounds grows. 1 In particular, when the basic game is the prisoners dilemma the game is asymptotically efficient if and only if the payoff when both players defect is nonzero.","PeriodicalId":382856,"journal":{"name":"Proceedings of the 5th conference on Innovations in theoretical computer science","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116537308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Session details: Session 5: 08:30--08:40 会话详情:会话5:08:30—08:40
Costis Daskalakis
{"title":"Session details: Session 5: 08:30--08:40","authors":"Costis Daskalakis","doi":"10.1145/3255057","DOIUrl":"https://doi.org/10.1145/3255057","url":null,"abstract":"","PeriodicalId":382856,"journal":{"name":"Proceedings of the 5th conference on Innovations in theoretical computer science","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131036667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Proceedings of the 5th conference on Innovations in theoretical computer science
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1