首页 > 最新文献

Proceedings of the 5th conference on Innovations in theoretical computer science最新文献

英文 中文
The truth behind the myth of the folk theorem 民间定理神话背后的真相
Joseph Y. Halpern, R. Pass, Lior Seeman
We study the problem of computing an ε-Nash equilibrium in repeated games. Earlier work by Borgs et al. [2010] suggests that this problem is intractable. We show that if we make a slight change to their model---modeling the players as polynomial-time Turing machines that maintain state (rather than stateless polynomial-time Turing machines)---and make some standard cryptographic hardness assumptions (the existence of public key encryption), the problem can actually be solved in polynomial time.
研究了重复博弈中ε-纳什均衡的计算问题。Borgs等人[2010]的早期研究表明,这个问题很难解决。我们表明,如果我们对他们的模型做一点改变——将参与者建模为保持状态的多项式时间图灵机(而不是无状态的多项式时间图灵机)——并做出一些标准的加密硬度假设(公钥加密的存在),这个问题实际上可以在多项式时间内解决。
{"title":"The truth behind the myth of the folk theorem","authors":"Joseph Y. Halpern, R. Pass, Lior Seeman","doi":"10.1145/2554797.2554847","DOIUrl":"https://doi.org/10.1145/2554797.2554847","url":null,"abstract":"We study the problem of computing an ε-Nash equilibrium in repeated games. Earlier work by Borgs et al. [2010] suggests that this problem is intractable. We show that if we make a slight change to their model---modeling the players as polynomial-time Turing machines that maintain state (rather than stateless polynomial-time Turing machines)---and make some standard cryptographic hardness assumptions (the existence of public key encryption), the problem can actually be solved in polynomial time.","PeriodicalId":382856,"journal":{"name":"Proceedings of the 5th conference on Innovations in theoretical computer science","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130063191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Decompositions of triangle-dense graphs 三角密集图的分解
Rishi Gupta, T. Roughgarden, C. Seshadhri
High triangle density -- the graph property stating that a constant fraction of two-hop paths belong to a triangle -- is a common signature of social networks. This paper studies triangle-dense graphs from a structural perspective. We prove constructively that significant portions of a triangle-dense graph are contained in a disjoint union of dense, radius 2 subgraphs. This result quantifies the extent to which triangle-dense graphs resemble unions of cliques. We also show that our algorithm recovers planted clusterings in approximation-stable k-median instances.
高三角密度是社交网络的常见特征,即两跳路径中有一定比例属于三角形的图形属性。本文从结构的角度研究了三角密集图。我们建设性地证明了一个三角形密集图的有效部分包含在一个半径为2的密集子图的不相交并中。这个结果量化了三角形密集图与团的并集相似的程度。我们还证明了我们的算法在近似稳定的k中值实例中恢复种植聚类。
{"title":"Decompositions of triangle-dense graphs","authors":"Rishi Gupta, T. Roughgarden, C. Seshadhri","doi":"10.1145/2554797.2554840","DOIUrl":"https://doi.org/10.1145/2554797.2554840","url":null,"abstract":"High triangle density -- the graph property stating that a constant fraction of two-hop paths belong to a triangle -- is a common signature of social networks. This paper studies triangle-dense graphs from a structural perspective. We prove constructively that significant portions of a triangle-dense graph are contained in a disjoint union of dense, radius 2 subgraphs. This result quantifies the extent to which triangle-dense graphs resemble unions of cliques. We also show that our algorithm recovers planted clusterings in approximation-stable k-median instances.","PeriodicalId":382856,"journal":{"name":"Proceedings of the 5th conference on Innovations in theoretical computer science","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134430553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
Attribute-efficient evolvability of linear functions 线性函数的属性有效演化性
E. Angelino, Varun Kanade
In a seminal paper, Valiant (2006) introduced a computational model for evolution to address the question of complexity that can arise through Darwinian mechanisms. Valiant views evolution as a restricted form of computational learning, where the goal is to evolve a hypothesis that is close to the ideal function. Feldman (2008) showed that (correlational) statistical query learning algorithms could be framed as evolutionary mechanisms in Valiant's model. P. Valiant (2012) considered evolvability of real-valued functions and also showed that weak-optimization algorithms that use weak-evaluation oracles could be converted to evolutionary mechanisms. In this work, we focus on the complexity of representations of evolutionary mechanisms. In general, the reductions of Feldman and P. Valiant may result in intermediate representations that are arbitrarily complex polynomial-sized circuits). We argue that biological constraints often dictate that the representations have low complexity, such as constant depth and fan-in circuits. We give mechanisms for evolving sparse linear functions under a large class of smooth distributions. These evolutionary algorithms are attribute-efficient in the sense that the size of the representations and the number of generations required depend only on the sparsity of the target function and the accuracy parameter, but have no dependence on the total number of attributes.
在一篇开创性的论文中,Valiant(2006)引入了一个进化的计算模型,以解决达尔文机制可能产生的复杂性问题。Valiant认为进化是一种有限形式的计算学习,其目标是进化出一个接近理想函数的假设。Feldman(2008)表明(相关的)统计查询学习算法可以作为Valiant模型中的进化机制。P. Valiant(2012)考虑了实值函数的可进化性,并表明使用弱评估神谕的弱优化算法可以转换为进化机制。在这项工作中,我们关注进化机制表征的复杂性。一般来说,Feldman和P. Valiant的约简可能会导致中间表示(任意复杂的多项式大小的电路)。我们认为,生物限制通常决定了表征具有低复杂性,例如恒定深度和风扇电路。给出了一类光滑分布下稀疏线性函数的演化机制。这些进化算法是属性高效的,因为表示的大小和所需的代数仅取决于目标函数的稀疏性和精度参数,而不依赖于属性的总数。
{"title":"Attribute-efficient evolvability of linear functions","authors":"E. Angelino, Varun Kanade","doi":"10.1145/2554797.2554824","DOIUrl":"https://doi.org/10.1145/2554797.2554824","url":null,"abstract":"In a seminal paper, Valiant (2006) introduced a computational model for evolution to address the question of complexity that can arise through Darwinian mechanisms. Valiant views evolution as a restricted form of computational learning, where the goal is to evolve a hypothesis that is close to the ideal function. Feldman (2008) showed that (correlational) statistical query learning algorithms could be framed as evolutionary mechanisms in Valiant's model. P. Valiant (2012) considered evolvability of real-valued functions and also showed that weak-optimization algorithms that use weak-evaluation oracles could be converted to evolutionary mechanisms. In this work, we focus on the complexity of representations of evolutionary mechanisms. In general, the reductions of Feldman and P. Valiant may result in intermediate representations that are arbitrarily complex polynomial-sized circuits). We argue that biological constraints often dictate that the representations have low complexity, such as constant depth and fan-in circuits. We give mechanisms for evolving sparse linear functions under a large class of smooth distributions. These evolutionary algorithms are attribute-efficient in the sense that the size of the representations and the number of generations required depend only on the sparsity of the target function and the accuracy parameter, but have no dependence on the total number of attributes.","PeriodicalId":382856,"journal":{"name":"Proceedings of the 5th conference on Innovations in theoretical computer science","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116225474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Tree codes and a conjecture on exponential sums 树码和关于指数和的一个猜想
Cristopher Moore, L. Schulman
We propose a new conjecture on some exponential sums. These particular sums have not apparently been considered in the literature. Subject to the conjecture we obtain the first effective construction of asymptotically good tree codes. The available numerical evidence is consistent with the conjecture and is sufficient to certify codes for significant-length communications.
我们提出了关于指数和的一个新猜想。在文献中显然没有考虑到这些特定的金额。根据这个猜想,我们得到了第一个渐近良好树码的有效构造。现有的数值证据与推测一致,足以证明有效长度通信的代码。
{"title":"Tree codes and a conjecture on exponential sums","authors":"Cristopher Moore, L. Schulman","doi":"10.1145/2554797.2554813","DOIUrl":"https://doi.org/10.1145/2554797.2554813","url":null,"abstract":"We propose a new conjecture on some exponential sums. These particular sums have not apparently been considered in the literature. Subject to the conjecture we obtain the first effective construction of asymptotically good tree codes. The available numerical evidence is consistent with the conjecture and is sufficient to certify codes for significant-length communications.","PeriodicalId":382856,"journal":{"name":"Proceedings of the 5th conference on Innovations in theoretical computer science","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126045564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
Locally testable codes and cayley graphs 局部可测试代码和凯利图
Parikshit Gopalan, S. Vadhan, Yuan Zhou
We give two new characterizations of ( 2-linear, smooth) locally testable error-correcting codes in terms of Cayley graphs over Fh2: A locally testable code is equivalent to a Cayley graph over h2 whose set of generators is significantly larger than h and has no short linear dependencies, bbut yields a shortest-path metric that embeds into l with constant distortion. This extends and gives a converse to a result of Khot and Naor (2006), which showed that codes with large dual distance imply Cayley graphs that have no low-distortion embeddings into l . A locally testable code is equivalent to a Cayley graph over Fh2 that has significantly more than h eigenvalues near 1, which have no short linear dependencies among them and which "explain" all of the large eigenvalues. This extends and gives a converse to a recent construction of Barak et al. (2012), which showed that locally testable codes imply Cayley graphs that are small-set expanders but have many large eigenvalues.
我们用Fh2上的Cayley图给出了(2-linear, smooth)局部可测试纠错码的两个新特征:一个局部可测试码等价于h2上的Cayley图,其生成器集明显大于h并且没有短线性依赖关系,但产生了一个以恒定失真嵌入到l中的最短路径度量。这扩展了Khot和Naor(2006)的结果,并给出了相反的结果,该结果表明具有大对偶距离的代码意味着没有低失真嵌入到l中的Cayley图。局部可测试的代码相当于Fh2上的Cayley图,它在1附近有明显多于h个特征值,它们之间没有短线性依赖关系,并且“解释”所有大特征值。这扩展并给出了Barak等人(2012)最近的构造的反转,该构造表明局部可测试代码暗示Cayley图是小集展开器,但具有许多大特征值。
{"title":"Locally testable codes and cayley graphs","authors":"Parikshit Gopalan, S. Vadhan, Yuan Zhou","doi":"10.1145/2554797.2554807","DOIUrl":"https://doi.org/10.1145/2554797.2554807","url":null,"abstract":"We give two new characterizations of ( 2-linear, smooth) locally testable error-correcting codes in terms of Cayley graphs over Fh2: A locally testable code is equivalent to a Cayley graph over h2 whose set of generators is significantly larger than h and has no short linear dependencies, bbut yields a shortest-path metric that embeds into l with constant distortion. This extends and gives a converse to a result of Khot and Naor (2006), which showed that codes with large dual distance imply Cayley graphs that have no low-distortion embeddings into l . A locally testable code is equivalent to a Cayley graph over Fh2 that has significantly more than h eigenvalues near 1, which have no short linear dependencies among them and which \"explain\" all of the large eigenvalues. This extends and gives a converse to a recent construction of Barak et al. (2012), which showed that locally testable codes imply Cayley graphs that are small-set expanders but have many large eigenvalues.","PeriodicalId":382856,"journal":{"name":"Proceedings of the 5th conference on Innovations in theoretical computer science","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125796359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Multireference alignment using semidefinite programming 使用半定规划的多参考对齐
A. Bandeira, M. Charikar, A. Singer, Andy Zhu
The multireference alignment problem consists of estimating a signal from multiple noisy shifted observations. Inspired by existing Unique-Games approximation algorithms, we provide a semidefinite program (SDP) based relaxation which approximates the maximum likelihood estimator (MLE) for the multireference alignment problem. Although we show this MLE problem is Unique-Games hard to approximate within any constant, we observe that our poly-time approximation algorithm for this problem appears to perform quite well in typical instances, outperforming existing methods. In an attempt to explain this behavior we provide stability guarantees for our SDP under a random noise model on the observations. This case is more challenging to analyze than traditional semi-random instances of Unique-Games: the noise model is on vertices of a graph and translates into dependent noise on the edges. Interestingly, we show that if certain positivity constraints in the relaxation are dropped, its solution becomes equivalent to performing phase correlation, a popular method used for pairwise alignment in imaging applications. Finally, we describe how symmetry reduction techniques from matrix representation theory can greatly decrease the computational cost of the SDP considered.
多参考点对准问题包括从多个有噪声偏移的观测值中估计一个信号。在已有的Unique-Games近似算法的启发下,针对多参考对齐问题,提出了一种基于半定规划(SDP)的近似最大似然估计(MLE)的松弛算法。尽管我们发现这个MLE问题是Unique-Games难以在任何常数范围内进行近似,但我们观察到我们针对这个问题的多时间近似算法在典型情况下表现得相当好,优于现有方法。为了解释这种行为,我们在观测的随机噪声模型下为我们的SDP提供了稳定性保证。这种情况比传统的Unique-Games的半随机实例更具挑战性:噪声模型位于图的顶点上,并转化为边缘上的依赖噪声。有趣的是,我们表明,如果放弃松弛中的某些正性约束,其解就等同于执行相位相关,这是成像应用中用于成对对准的常用方法。最后,我们描述了如何从矩阵表示理论对称约简技术可以大大减少计算成本的SDP考虑。
{"title":"Multireference alignment using semidefinite programming","authors":"A. Bandeira, M. Charikar, A. Singer, Andy Zhu","doi":"10.1145/2554797.2554839","DOIUrl":"https://doi.org/10.1145/2554797.2554839","url":null,"abstract":"The multireference alignment problem consists of estimating a signal from multiple noisy shifted observations. Inspired by existing Unique-Games approximation algorithms, we provide a semidefinite program (SDP) based relaxation which approximates the maximum likelihood estimator (MLE) for the multireference alignment problem. Although we show this MLE problem is Unique-Games hard to approximate within any constant, we observe that our poly-time approximation algorithm for this problem appears to perform quite well in typical instances, outperforming existing methods. In an attempt to explain this behavior we provide stability guarantees for our SDP under a random noise model on the observations. This case is more challenging to analyze than traditional semi-random instances of Unique-Games: the noise model is on vertices of a graph and translates into dependent noise on the edges. Interestingly, we show that if certain positivity constraints in the relaxation are dropped, its solution becomes equivalent to performing phase correlation, a popular method used for pairwise alignment in imaging applications. Finally, we describe how symmetry reduction techniques from matrix representation theory can greatly decrease the computational cost of the SDP considered.","PeriodicalId":382856,"journal":{"name":"Proceedings of the 5th conference on Innovations in theoretical computer science","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130488135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 97
Expanders with respect to Hadamard spaces and random graphs: extended abstract 关于Hadamard空间和随机图的展开式:扩展抽象
M. Mendel, A. Naor
It is shown that there exists a sequence of 3-regular graphs {Gn}∞n=1 and a Hadamard space X such that {Gn}∞n=1 forms an expander sequence with respect to {X{, yet random regular graphs are not expanders with respect to {X{. This answers a question of [31]. {Gn}∞n=1 are also shown to be expanders with respect to random regular graphs, yielding a deterministic sublinear time constant factor approximation algorithm for computing the average squared distance in subsets of a random graph. The proof uses the Euclidean cone over a random graph, an auxiliary continuous geometric object that allows for the implementation of martingale methods. This extended abstract does not contain proofs. The full version of this paper can be found at arXiv:1306.5434.
证明了存在一个3-正则图序列{Gn}∞n=1和一个Hadamard空间X,使得{Gn}∞n=1对{X{形成可展开序列,但随机正则图对{X{不是可展开序列。这回答了[31]的一个问题。{Gn}∞n=1也被证明是关于随机正则图的展开式,给出了一种确定的次线性时间常数因子近似算法,用于计算随机图子集的平均平方距离。该证明使用了随机图上的欧几里得锥,这是一个辅助的连续几何对象,允许实现鞅方法。这个扩展的摘要不包含证明。全文可在arXiv:1306.5434中找到。
{"title":"Expanders with respect to Hadamard spaces and random graphs: extended abstract","authors":"M. Mendel, A. Naor","doi":"10.1145/2554797.2554829","DOIUrl":"https://doi.org/10.1145/2554797.2554829","url":null,"abstract":"It is shown that there exists a sequence of 3-regular graphs {Gn}∞n=1 and a Hadamard space X such that {Gn}∞n=1 forms an expander sequence with respect to {X{, yet random regular graphs are not expanders with respect to {X{. This answers a question of [31]. {Gn}∞n=1 are also shown to be expanders with respect to random regular graphs, yielding a deterministic sublinear time constant factor approximation algorithm for computing the average squared distance in subsets of a random graph. The proof uses the Euclidean cone over a random graph, an auxiliary continuous geometric object that allows for the implementation of martingale methods. This extended abstract does not contain proofs. The full version of this paper can be found at arXiv:1306.5434.","PeriodicalId":382856,"journal":{"name":"Proceedings of the 5th conference on Innovations in theoretical computer science","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132454627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Building one-time memories from isolated qubits: (extended abstract) 从孤立的量子位构建一次性存储器:(扩展摘要)
Yi-Kai Liu
One-time memories (OTM's) are simple tamper-resistant cryptographic devices, which can be used to implement one-time programs, a very general form of software protection and program obfuscation. Here we investigate the possibility of building OTM's using quantum mechanical devices. It is known that OTM's cannot exist in a fully-quantum world or in a fully-classical world. Instead, we propose a new model based on isolated qubits - qubits that can only be accessed using local operations and classical communication (LOCC). This model combines a quantum resource (single-qubit measurements) with a classical restriction (on communication between qubits), and can be implemented using current technologies, such as nitrogen vacancy centers in diamond. In this model, we construct OTM's that are information-theoretically secure against one-pass LOCC adversaries that use 2-outcome measurements. Our construction resembles Wiesner's old idea of quantum conjugate coding, implemented using random error-correcting codes; our proof of security uses entropy chaining to bound the supremum of a suitable empirical process. In addition, we conjecture that our random codes can be replaced by some class of efficiently-decodable codes, to get computationally-efficient OTM's that are secure against computationally-bounded LOCC adversaries. In addition, we construct data-hiding states, which allow an LOCC sender to encode an (n-O(1))-bit messsage into n qubits, such that at most half of the message can be extracted by a one-pass LOCC receiver, but the whole message can be extracted by a general quantum receiver.
一次性存储器(OTM)是简单的防篡改加密设备,可用于实现一次性程序,这是一种非常通用的软件保护和程序混淆形式。本文研究了利用量子力学器件构建OTM的可能性。已知OTM不可能存在于全量子世界或全经典世界中。相反,我们提出了一种基于孤立量子比特的新模型-只能通过局部操作和经典通信(LOCC)访问的量子比特。该模型将量子资源(单量子位测量)与经典限制(量子位之间的通信)相结合,并且可以使用当前技术实现,例如金刚石中的氮空位中心。在这个模型中,我们构建的OTM在信息理论上是安全的,可以对抗使用2个结果测量的单次LOCC对手。我们的结构类似于Wiesner的量子共轭编码的旧思想,使用随机纠错码实现;我们的安全性证明使用熵链来约束一个合适的经验过程的极值。此外,我们推测我们的随机码可以被一些有效可解码的代码所取代,以获得计算效率高的OTM,这些OTM对计算有限的LOCC对手是安全的。此外,我们构建了数据隐藏状态,允许LOCC发送方将(n- o(1))位的消息编码为n个量子位,使得单次LOCC接收方最多可以提取消息的一半,而一般量子接收方可以提取整个消息。
{"title":"Building one-time memories from isolated qubits: (extended abstract)","authors":"Yi-Kai Liu","doi":"10.1145/2554797.2554823","DOIUrl":"https://doi.org/10.1145/2554797.2554823","url":null,"abstract":"One-time memories (OTM's) are simple tamper-resistant cryptographic devices, which can be used to implement one-time programs, a very general form of software protection and program obfuscation. Here we investigate the possibility of building OTM's using quantum mechanical devices. It is known that OTM's cannot exist in a fully-quantum world or in a fully-classical world. Instead, we propose a new model based on isolated qubits - qubits that can only be accessed using local operations and classical communication (LOCC). This model combines a quantum resource (single-qubit measurements) with a classical restriction (on communication between qubits), and can be implemented using current technologies, such as nitrogen vacancy centers in diamond. In this model, we construct OTM's that are information-theoretically secure against one-pass LOCC adversaries that use 2-outcome measurements. Our construction resembles Wiesner's old idea of quantum conjugate coding, implemented using random error-correcting codes; our proof of security uses entropy chaining to bound the supremum of a suitable empirical process. In addition, we conjecture that our random codes can be replaced by some class of efficiently-decodable codes, to get computationally-efficient OTM's that are secure against computationally-bounded LOCC adversaries. In addition, we construct data-hiding states, which allow an LOCC sender to encode an (n-O(1))-bit messsage into n qubits, such that at most half of the message can be extracted by a one-pass LOCC receiver, but the whole message can be extracted by a general quantum receiver.","PeriodicalId":382856,"journal":{"name":"Proceedings of the 5th conference on Innovations in theoretical computer science","volume":"239 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134314208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Faster private release of marginals on small databases 在小型数据库上更快地私有发布边际值
Karthekeyan Chandrasekaran, J. Thaler, Jonathan Ullman, A. Wan
We study the problem of answering k-way marginal queries on a database D ϵ ({0,1}d)n, while preserving differential privacy. The answer to a k-way marginal query is the fraction of the database's records x in {0,1}d with a given value in each of a given set of up to k columns. Marginal queries enable a rich class of statistical analyses on a dataset, and designing efficient algorithms for privately answering marginal queries has been identified as an important open problem in private data analysis. For any k, we give a differentially private online algorithm that runs in time poly (n, 2o(d)) per query and answers any sequence of poly(n) many k-way marginal queries with error at most ±0.01 on every query, provided n ≥ d0.51. To the best of our knowledge, this is the first algorithm capable of privately answering marginal queries with a non-trivial worst-case accuracy guarantee for databases containing poly(d, k) records in time exp(o(d)). Our algorithm runs the private multiplicative weights algorithm (Hardt and Rothblum, FOCS '10) on a new approximate polynomial representation of the database. We derive our representation for the database by approximating the OR function restricted to low Hamming weight inputs using low-degree polynomials with coefficients of bounded L1-norm. In doing so, we show new upper and lower bounds on the degree of such polynomials, which may be of independent approximation-theoretic interest.
我们研究了在保留差分隐私的情况下回答数据库D λ ({0,1} D)n上的k-way边际查询的问题。k-way边际查询的答案是数据库记录x在{0,1}d中与给定值在最多k列的给定集合中的每一列中的分数。边际查询为数据集的统计分析提供了丰富的类别,设计有效的算法来回答边际查询已被确定为私有数据分析中的一个重要开放问题。对于任意k,我们给出了一个差分私有在线算法,该算法每次查询的运行时间为poly(n, 20 (d)),并且在n≥d0.51的条件下,每次查询的误差不超过±0.01,可以回答任意序列的poly(n)多个k-way边缘查询。据我们所知,这是第一个能够在exp(o(d))时间内对包含poly(d, k)记录的数据库私下回答边缘查询的非平凡最坏情况准确性保证的算法。我们的算法在数据库的一个新的近似多项式表示上运行私有乘法权重算法(Hardt and Rothblum, FOCS '10)。我们通过使用具有有界l1范数系数的低次多项式近似限制于低汉明权值输入的OR函数来推导数据库的表示。在这样做的过程中,我们展示了这些多项式度的新的上下界,这可能是独立的近似理论的兴趣。
{"title":"Faster private release of marginals on small databases","authors":"Karthekeyan Chandrasekaran, J. Thaler, Jonathan Ullman, A. Wan","doi":"10.1145/2554797.2554833","DOIUrl":"https://doi.org/10.1145/2554797.2554833","url":null,"abstract":"We study the problem of answering k-way marginal queries on a database D ϵ ({0,1}d)n, while preserving differential privacy. The answer to a k-way marginal query is the fraction of the database's records x in {0,1}d with a given value in each of a given set of up to k columns. Marginal queries enable a rich class of statistical analyses on a dataset, and designing efficient algorithms for privately answering marginal queries has been identified as an important open problem in private data analysis. For any k, we give a differentially private online algorithm that runs in time poly (n, 2o(d)) per query and answers any sequence of poly(n) many k-way marginal queries with error at most ±0.01 on every query, provided n ≥ d0.51. To the best of our knowledge, this is the first algorithm capable of privately answering marginal queries with a non-trivial worst-case accuracy guarantee for databases containing poly(d, k) records in time exp(o(d)). Our algorithm runs the private multiplicative weights algorithm (Hardt and Rothblum, FOCS '10) on a new approximate polynomial representation of the database. We derive our representation for the database by approximating the OR function restricted to low Hamming weight inputs using low-degree polynomials with coefficients of bounded L1-norm. In doing so, we show new upper and lower bounds on the degree of such polynomials, which may be of independent approximation-theoretic interest.","PeriodicalId":382856,"journal":{"name":"Proceedings of the 5th conference on Innovations in theoretical computer science","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123793764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 48
Limits of local algorithms over sparse random graphs 稀疏随机图上局部算法的极限
D. Gamarnik, M. Sudan
Local algorithms on graphs are algorithms that run in parallel on the nodes of a graph to compute some global structural feature of the graph. Such algorithms use only local information available at nodes to determine local aspects of the global structure, while also potentially using some randomness. Research over the years has shown that such algorithms can be surprisingly powerful in terms of computing structures like large independent sets in graphs locally. These algorithms have also been implicitly considered in the work on graph limits, where a conjecture due to Hatami, Lovász and Szegedy [17] implied that local algorithms may be able to compute near-maximum independent sets in (sparse) random d-regular graphs. In this paper we refute this conjecture and show that every independent set produced by local algorithms is smaller that the largest one by a multiplicative factor of at least 1/2+1/(2√2) ≈ .853, asymptotically as d → ∞. Our result is based on an important clustering phenomena predicted first in the literature on spin glasses, and recently proved rigorously for a variety of constraint satisfaction problems on random graphs. Such properties suggest that the geometry of the solution space can be quite intricate. The specific clustering property, that we prove and apply in this paper shows that typically every two large independent sets in a random graph either have a significant intersection, or have a nearly empty intersection. As a result, large independent sets are clustered according to the proximity to each other. While the clustering property was postulated earlier as an obstruction for the success of local algorithms, such as for example, the Belief Propagation algorithm, our result is the first one where the clustering property is used to formally prove limits on local algorithms.
图上的局部算法是在图的节点上并行运行以计算图的某些全局结构特征的算法。这种算法只使用节点上可用的局部信息来确定全局结构的局部方面,同时也可能使用一些随机性。多年来的研究表明,这种算法在计算结构(如局部图中的大型独立集)方面的功能非常强大。这些算法在图极限的研究中也被隐式地考虑,其中由Hatami、Lovász和Szegedy[17]提出的一个猜想表明,局部算法可能能够计算(稀疏)随机d-正则图中的近极大独立集。本文反驳了这一猜想,并证明了由局部算法产生的每一个独立集都比最大集小1/2+1/(2√2)≈.853,且渐近地为d→∞。我们的结果是基于一个重要的聚类现象,首先在自旋玻璃的文献中预测,最近严格证明了各种随机图上的约束满足问题。这些性质表明,解空间的几何结构可以相当复杂。本文证明并应用的特定聚类性质表明,在随机图中,通常每两个大的独立集要么有一个显著交集,要么有一个近空交集。因此,根据彼此的接近度对大型独立集进行聚类。虽然早先聚类属性被假设为局部算法(例如信念传播算法)成功的障碍,但我们的结果是第一个使用聚类属性正式证明局部算法限制的结果。
{"title":"Limits of local algorithms over sparse random graphs","authors":"D. Gamarnik, M. Sudan","doi":"10.1145/2554797.2554831","DOIUrl":"https://doi.org/10.1145/2554797.2554831","url":null,"abstract":"Local algorithms on graphs are algorithms that run in parallel on the nodes of a graph to compute some global structural feature of the graph. Such algorithms use only local information available at nodes to determine local aspects of the global structure, while also potentially using some randomness. Research over the years has shown that such algorithms can be surprisingly powerful in terms of computing structures like large independent sets in graphs locally. These algorithms have also been implicitly considered in the work on graph limits, where a conjecture due to Hatami, Lovász and Szegedy [17] implied that local algorithms may be able to compute near-maximum independent sets in (sparse) random d-regular graphs. In this paper we refute this conjecture and show that every independent set produced by local algorithms is smaller that the largest one by a multiplicative factor of at least 1/2+1/(2√2) ≈ .853, asymptotically as d → ∞. Our result is based on an important clustering phenomena predicted first in the literature on spin glasses, and recently proved rigorously for a variety of constraint satisfaction problems on random graphs. Such properties suggest that the geometry of the solution space can be quite intricate. The specific clustering property, that we prove and apply in this paper shows that typically every two large independent sets in a random graph either have a significant intersection, or have a nearly empty intersection. As a result, large independent sets are clustered according to the proximity to each other. While the clustering property was postulated earlier as an obstruction for the success of local algorithms, such as for example, the Belief Propagation algorithm, our result is the first one where the clustering property is used to formally prove limits on local algorithms.","PeriodicalId":382856,"journal":{"name":"Proceedings of the 5th conference on Innovations in theoretical computer science","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121366893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 141
期刊
Proceedings of the 5th conference on Innovations in theoretical computer science
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1