首页 > 最新文献

2016 IEEE 57th Annual Symposium on Foundations of Computer Science (FOCS)最新文献

英文 中文
Decremental Single-Source Reachability and Strongly Connected Components in Õ(m√n) Total Update Time 在Õ(m√n)总更新时间内递增的单源可达性和强连接组件
Pub Date : 2016-10-01 DOI: 10.1109/FOCS.2016.42
S. Chechik, Thomas Dueholm Hansen, G. Italiano, Jakub Lacki, Nikos Parotsidis
We present randomized algorithms with a total update time of Õ(m √n) for the problems of decremental single source reachability and decremental strongly connected components on directed graphs. This improves recent breakthrough results of Henzinger, Krinninger and Nanongkai [STOC 14, ICALP 15]. In addition, our algorithms are arguably simpler.
针对有向图上的递减单源可达性和递减强连通分量问题,提出了总更新时间为Õ(m√n)的随机化算法。这进一步完善了Henzinger、Krinninger和Nanongkai最近的突破性成果[STOC 14, ICALP 15]。此外,我们的算法可以说更简单。
{"title":"Decremental Single-Source Reachability and Strongly Connected Components in Õ(m√n) Total Update Time","authors":"S. Chechik, Thomas Dueholm Hansen, G. Italiano, Jakub Lacki, Nikos Parotsidis","doi":"10.1109/FOCS.2016.42","DOIUrl":"https://doi.org/10.1109/FOCS.2016.42","url":null,"abstract":"We present randomized algorithms with a total update time of Õ(m √n) for the problems of decremental single source reachability and decremental strongly connected components on directed graphs. This improves recent breakthrough results of Henzinger, Krinninger and Nanongkai [STOC 14, ICALP 15]. In addition, our algorithms are arguably simpler.","PeriodicalId":414001,"journal":{"name":"2016 IEEE 57th Annual Symposium on Foundations of Computer Science (FOCS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117178922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Online Algorithms for Covering and Packing Problems with Convex Objectives 凸目标覆盖与包装问题的在线算法
Pub Date : 2016-10-01 DOI: 10.1109/FOCS.2016.24
Y. Azar, Niv Buchbinder, T-H. Hubert Chan, Shahar Chen, I. Cohen, Anupam Gupta, Zhiyi Huang, N. Kang, V. Nagarajan, J. Naor, Debmalya Panigrahi
We present online algorithms for covering and packing problems with (non-linear) convex objectives. The convex covering problem is defined as: minR+nf(x) s.t. Ax ≥ 1, where f:R+n → R+ is a monotone convex function, and A is an m×n matrix with non-negative entries. In the online version, a new row of the constraint matrix, representing a new covering constraint, is revealed in each step and the algorithm is required to maintain a feasible and monotonically non-decreasing assignment x over time. We also consider a convex packing problem defined as: maxyϵR+m Σj=1m yj - g(AT y), where g:R+n→R+ is a monotone convex function. In the online version, each variable yj arrives online and the algorithm must decide the value of yj on its arrival. This represents the Fenchel dual of the convex covering program, when g is the convex conjugate of f. We use a primal-dual approach to give online algorithms for these generic problems, and use them to simplify, unify, and improve upon previous results for several applications.
我们提出了覆盖和包装问题的在线算法与(非线性)凸目标。定义凸覆盖问题为:minxϵR+nf(x) s.t.a x≥1,其中f:R+n→R+为单调凸函数,a为一个非负项的m×n矩阵。在在线版本中,每一步都会显示约束矩阵的新行,代表一个新的覆盖约束,并且要求算法随时间保持可行且单调不递减的赋值x。我们还考虑了一个定义为maxyϵR+m Σj=1m yj - g(AT y)的凸填充问题,其中g:R+n→R+是一个单调凸函数。在在线版本中,每个变量yj在线到达,算法必须在其到达时确定yj的值。当g是f的凸共轭时,这表示凸覆盖规划的Fenchel对偶。我们使用原始对偶方法给出这些一般问题的在线算法,并使用它们来简化,统一和改进先前几个应用的结果。
{"title":"Online Algorithms for Covering and Packing Problems with Convex Objectives","authors":"Y. Azar, Niv Buchbinder, T-H. Hubert Chan, Shahar Chen, I. Cohen, Anupam Gupta, Zhiyi Huang, N. Kang, V. Nagarajan, J. Naor, Debmalya Panigrahi","doi":"10.1109/FOCS.2016.24","DOIUrl":"https://doi.org/10.1109/FOCS.2016.24","url":null,"abstract":"We present online algorithms for covering and packing problems with (non-linear) convex objectives. The convex covering problem is defined as: min<sub>xϵ</sub>R<sub>+</sub><sup>n</sup>f(x) s.t. Ax ≥ 1, where f:R<sub>+</sub><sup>n</sup> → R<sub>+</sub> is a monotone convex function, and A is an m×n matrix with non-negative entries. In the online version, a new row of the constraint matrix, representing a new covering constraint, is revealed in each step and the algorithm is required to maintain a feasible and monotonically non-decreasing assignment x over time. We also consider a convex packing problem defined as: max<sub>yϵR+</sub><sup>m</sup> Σ<sub>j=1</sub><sup>m</sup> yj - g(A<sup>T</sup> y), where g:R<sub>+</sub><sup>n</sup>→R<sub>+</sub> is a monotone convex function. In the online version, each variable yj arrives online and the algorithm must decide the value of yj on its arrival. This represents the Fenchel dual of the convex covering program, when g is the convex conjugate of f. We use a primal-dual approach to give online algorithms for these generic problems, and use them to simplify, unify, and improve upon previous results for several applications.","PeriodicalId":414001,"journal":{"name":"2016 IEEE 57th Annual Symposium on Foundations of Computer Science (FOCS)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130581486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 58
Breaking the Three Round Barrier for Non-malleable Commitments 打破不可延展性承诺的三轮障碍
Pub Date : 2016-10-01 DOI: 10.1109/FOCS.2016.12
Vipul Goyal, Dakshita Khurana, A. Sahai
We construct two-message non-malleable commitments with respect to opening in the standard model, assuming only one-to-one one-way functions. Our protocol consists of two unidirectional messages by the committer (with no message from the receiver), and is secure against all polynomial-time adversaries in the standard synchronous setting. Pass (TCC 2013) proved that any commitment scheme with non-malleability with respect to commitment, using only 2 rounds of communication, cannot be proved secure via a black-box reduction to any "standard" intractability assumption. We extend this by showing a similar impossibility result for commitments with non-malleability with respect to opening, another standard notion of non-malleability for commitments, for any 2-message challenge-response protocol, as well. However, somewhat surprisingly, we show that this barrier breaks down in the setting of two unidirectional messages by the committer (with no message from the receiver), for non-malleability with respect to opening. ° Our protocol makes only black-box use of any non-interactive statistically binding commitment scheme. Such a scheme can be based on any one-to-one one-way function. ° Our techniques depart significantly from the commit-challenge-response structure followed by nearly all prior works on non-malleable protocols in the standard model. Our methods are combinatorial in nature. ° Our protocol resolves the round complexity of commitments with non-malleability with respect to opening via natural (non-embedding) black-box security reductions. We show that completely non-interactive non-malleable commitments w.r.t. opening cannot be proved secure via most natural black-box reductions. This result extends to also rule out bi-directional two-message non-malleable commitments w.r.t. opening in the synchronous or asynchronous setting. ° Our protocol, together with our impossibility result, also resolves the round complexity of block-wise non-malleable codes (Chandran et al) w.r.t. natural black-box reductions.
我们在标准模型中构造了关于开放的双消息非延展性承诺,假设只有一对一的单向函数。我们的协议由提交者的两条单向消息组成(没有来自接收者的消息),并且在标准同步设置中对所有多项式时间对手都是安全的。Pass (TCC 2013)证明,仅使用2轮通信,就承诺而言,任何具有不可延展性的承诺方案都不能通过对任何“标准”难处理假设的黑盒还原来证明是安全的。我们通过展示关于开放的具有不可延展性的承诺的类似不可能结果来扩展这一点,这是任何2消息挑战响应协议的承诺的另一个不可延展性的标准概念。然而,有些令人惊讶的是,我们展示了这个障碍在提交者设置的两个单向消息(没有来自接收者的消息)中被打破,因为关于打开的不可延展性。°我们的协议只在黑箱中使用任何非交互式的统计绑定承诺方案。这种方案可以基于任何一对一的单向函数。°我们的技术明显偏离了标准模型中几乎所有关于非延展性协议的先前工作所遵循的提交-挑战-响应结构。我们的方法本质上是组合的。°我们的协议通过自然的(非嵌入的)黑盒安全缩减,解决了关于开放的非延展性承诺的循环复杂性。我们表明,完全非交互的、不可延展性的承诺w.r.t.开放不能通过大多数自然黑盒约简证明是安全的。此结果还可以在同步或异步设置中排除双向双消息不可延展性承诺。°我们的协议,连同我们的不可能结果,也解决了块方向的不可延展性代码(Chandran等)的轮复杂度,而不是自然黑盒约简。
{"title":"Breaking the Three Round Barrier for Non-malleable Commitments","authors":"Vipul Goyal, Dakshita Khurana, A. Sahai","doi":"10.1109/FOCS.2016.12","DOIUrl":"https://doi.org/10.1109/FOCS.2016.12","url":null,"abstract":"We construct two-message non-malleable commitments with respect to opening in the standard model, assuming only one-to-one one-way functions. Our protocol consists of two unidirectional messages by the committer (with no message from the receiver), and is secure against all polynomial-time adversaries in the standard synchronous setting. Pass (TCC 2013) proved that any commitment scheme with non-malleability with respect to commitment, using only 2 rounds of communication, cannot be proved secure via a black-box reduction to any \"standard\" intractability assumption. We extend this by showing a similar impossibility result for commitments with non-malleability with respect to opening, another standard notion of non-malleability for commitments, for any 2-message challenge-response protocol, as well. However, somewhat surprisingly, we show that this barrier breaks down in the setting of two unidirectional messages by the committer (with no message from the receiver), for non-malleability with respect to opening. ° Our protocol makes only black-box use of any non-interactive statistically binding commitment scheme. Such a scheme can be based on any one-to-one one-way function. ° Our techniques depart significantly from the commit-challenge-response structure followed by nearly all prior works on non-malleable protocols in the standard model. Our methods are combinatorial in nature. ° Our protocol resolves the round complexity of commitments with non-malleability with respect to opening via natural (non-embedding) black-box security reductions. We show that completely non-interactive non-malleable commitments w.r.t. opening cannot be proved secure via most natural black-box reductions. This result extends to also rule out bi-directional two-message non-malleable commitments w.r.t. opening in the synchronous or asynchronous setting. ° Our protocol, together with our impossibility result, also resolves the round complexity of block-wise non-malleable codes (Chandran et al) w.r.t. natural black-box reductions.","PeriodicalId":414001,"journal":{"name":"2016 IEEE 57th Annual Symposium on Foundations of Computer Science (FOCS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126152112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
NP-Hardness of Reed-Solomon Decoding and the Prouhet-Tarry-Escott Problem Reed-Solomon译码的np -硬度与prouet - tarry - escott问题
Pub Date : 2016-10-01 DOI: 10.1109/FOCS.2016.86
V. Gandikota, Badih Ghazi, Elena Grigorescu
Establishing the complexity of Bounded Distance Decoding for Reed-Solomon codes is a fundamental open problem in coding theory, explicitly asked by Guruswami and Vardy (IEEE Trans. Inf. Theory, 2005). The problem is motivated by the large current gap between the regime when it is NP-hard, and the regime when it is efficiently solvable (i.e., the Johnson radius). We show the first NP-hardness results for asymptotically smaller decoding radii than the maximum likelihood decoding radius of Guruswami and Vardy. Specifically, for Reed-Solomon codes of length N and dimension K = O(N), we show that it is NP-hard to decode more than N-K-O/log N log log N) errors. Moreover, we show that the problem is NP-hard under quasipolynomial-time reductions for an error amount > N-K-c log N (with c > 0 an absolute constant). An alternative natural reformulation of the Bounded Distance Decoding problem for Reed-Solomon codes is as a Polynomial Reconstruction problem. In this view, our results show that it is NP-hard to decide whether there exists a degree K polynomial passing through K + O(log N / log log N) points from a given set of points (a1, b1), (a2, b2) ..., (aN, bN). Furthermore, it is NP-hard under quasipolynomial-time reductions to decide whether there is a degree K polynomial passing through K + c log N many points (with c > 0 an absolute constant). These results follow from the NP-hardness of a generalization of the classical Subset Sum problem to higher moments, called Moments Subset Sum, which has been a known open problem, and which may be of independent interest. We further reveal a strong connection with the well-studied Prouhet-Tarry-Escott problem in Number Theory, which turns out to capture a main barrier in extending our techniques. We believe the Prouhet-Tarry-Escott problem deserves further study in the theoretical computer science community.
确定Reed-Solomon码的有界距离解码的复杂性是编码理论中的一个基本开放问题,由Guruswami和Vardy (IEEE Trans.)明确提出。Inf. Theory, 2005)。该问题的动机是np困难状态与有效可解状态(即约翰逊半径)之间存在较大的电流间隙。我们展示了第一个np -硬度结果,其解码半径渐近小于Guruswami和Vardy的最大似然解码半径。具体来说,对于长度为N,维数为K = O(N)的Reed-Solomon码,我们证明了它是NP-hard解码超过N-K-O/log N log log N)个错误。此外,我们证明了在准多项式时间约简下,当误差量> N- k -c log N (c > 0是绝对常数)时,问题是np困难的。Reed-Solomon码的有界距离译码问题的另一种自然重构是多项式重构问题。在这种观点下,我们的结果表明,在给定的点(a1, b1), (a2, b2)…的集合中,是否存在K次多项式经过K + O(log N / log log N)个点是np困难的。, (aN, bN)。此外,在拟多项式时间约简下,判定是否存在K次多项式经过K + c log N个点(c > 0为绝对常数)是np困难的。这些结果来自于将经典子集和问题推广到更高矩的np -硬度,称为矩子集和,这是一个已知的开放问题,并且可能具有独立的兴趣。我们进一步揭示了与数论中得到充分研究的Prouhet-Tarry-Escott问题的密切联系,该问题被证明抓住了扩展我们技术的主要障碍。我们认为prouet - tarry - escott问题值得在理论计算机科学界进一步研究。
{"title":"NP-Hardness of Reed-Solomon Decoding and the Prouhet-Tarry-Escott Problem","authors":"V. Gandikota, Badih Ghazi, Elena Grigorescu","doi":"10.1109/FOCS.2016.86","DOIUrl":"https://doi.org/10.1109/FOCS.2016.86","url":null,"abstract":"Establishing the complexity of Bounded Distance Decoding for Reed-Solomon codes is a fundamental open problem in coding theory, explicitly asked by Guruswami and Vardy (IEEE Trans. Inf. Theory, 2005). The problem is motivated by the large current gap between the regime when it is NP-hard, and the regime when it is efficiently solvable (i.e., the Johnson radius). We show the first NP-hardness results for asymptotically smaller decoding radii than the maximum likelihood decoding radius of Guruswami and Vardy. Specifically, for Reed-Solomon codes of length N and dimension K = O(N), we show that it is NP-hard to decode more than N-K-O/log N log log N) errors. Moreover, we show that the problem is NP-hard under quasipolynomial-time reductions for an error amount > N-K-c log N (with c > 0 an absolute constant). An alternative natural reformulation of the Bounded Distance Decoding problem for Reed-Solomon codes is as a Polynomial Reconstruction problem. In this view, our results show that it is NP-hard to decide whether there exists a degree K polynomial passing through K + O(log N / log log N) points from a given set of points (a1, b1), (a2, b2) ..., (aN, bN). Furthermore, it is NP-hard under quasipolynomial-time reductions to decide whether there is a degree K polynomial passing through K + c log N many points (with c > 0 an absolute constant). These results follow from the NP-hardness of a generalization of the classical Subset Sum problem to higher moments, called Moments Subset Sum, which has been a known open problem, and which may be of independent interest. We further reveal a strong connection with the well-studied Prouhet-Tarry-Escott problem in Number Theory, which turns out to capture a main barrier in extending our techniques. We believe the Prouhet-Tarry-Escott problem deserves further study in the theoretical computer science community.","PeriodicalId":414001,"journal":{"name":"2016 IEEE 57th Annual Symposium on Foundations of Computer Science (FOCS)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121014257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
An Average-Case Depth Hierarchy Theorem for Higher Depth 高深度的平均情形深度层次定理
Pub Date : 2016-10-01 DOI: 10.1109/FOCS.2016.18
J. Håstad
We extend the recent hierarchy results of Rossman, Servedio and Tan [1] to address circuits of almost logarithmic depth. Our proof uses the same basic approach as [1] but a number of small differences enables us to obtain a stronger result by a significantly shorter proof.
我们扩展了Rossman, Servedio和Tan[1]最近的层次结果,以解决几乎对数深度的电路。我们的证明使用了与[1]相同的基本方法,但一些微小的差异使我们能够通过更短的证明获得更强的结果。
{"title":"An Average-Case Depth Hierarchy Theorem for Higher Depth","authors":"J. Håstad","doi":"10.1109/FOCS.2016.18","DOIUrl":"https://doi.org/10.1109/FOCS.2016.18","url":null,"abstract":"We extend the recent hierarchy results of Rossman, Servedio and Tan [1] to address circuits of almost logarithmic depth. Our proof uses the same basic approach as [1] but a number of small differences enables us to obtain a stronger result by a significantly shorter proof.","PeriodicalId":414001,"journal":{"name":"2016 IEEE 57th Annual Symposium on Foundations of Computer Science (FOCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128395132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
On the Communication Complexity of Approximate Fixed Points 关于近似不动点的通信复杂度
Pub Date : 2016-10-01 DOI: 10.1109/FOCS.2016.32
T. Roughgarden, Omri Weinstein
We study the two-party communication complexity of finding an approximate Brouwer fixed point of a composition of two Lipschitz functions g o f: [0,1]n → [0,1]n, where Alice holds f and Bob holds g. We prove an exponential (in n) lower bound on the deterministic communication complexity of this problem. Our technical approach is to adapt the Raz-McKenzie simulation theorem (FOCS 1999) into geometric settings, thereby "smoothly lifting" the deterministic query lower bound for finding an approximate fixed point (Hirsch, Papadimitriou and Vavasis, Complexity 1989) from the oracle model to the two-party model. Our results also suggest an approach to the well-known open problem of proving strong lower bounds on the communication complexity of computing approximate Nash equilibria. Specifically, we show that a slightly "smoother" version of our fixed-point computation lower bound (by an absolute constant factor) would imply that: The deterministic two-party communication complexity of finding an ∈ = Ω(1/log2 N)-approximate Nash equilibrium in an N × N bimatrix game (where each player knows only his own payoff matrix) is at least Nγ for some constant γ > 0. (In contrast, the nondeterministic communication complexity of this problem is only O(log6 N)). ; The deterministic (Number-In-Hand) multiparty communication complexity of finding an ∈ = Ω(1)-Nash equilibrium in a k-player constant-action game is at least 2Ω(k/log k) (while the nondeterministic communication complexity is only O(k)).
我们研究了寻找两个Lipschitz函数g of: [0,1]n→[0,1]n组合的近似browwer不动点的两方通信复杂度,其中Alice持有f, Bob持有g。我们证明了该问题的确定性通信复杂度的指数下界(在n中)。我们的技术方法是将Raz-McKenzie模拟定理(FOCS 1999)应用到几何设置中,从而“顺利地”将确定性查询下界从oracle模型提升到两方模型,以找到一个近似不移点(Hirsch, Papadimitriou和Vavasis, Complexity 1989)。我们的结果还提出了一种解决众所周知的开放问题的方法,即证明计算近似纳什均衡的通信复杂性的强下界。具体来说,我们展示了我们的定点计算下界(通过绝对常数因子)的稍微“平滑”版本将意味着:在N × N双矩阵博弈(每个参与者只知道自己的收益矩阵)中找到an∈= Ω(1/ log2n)的确定性两方通信复杂性-近似纳什均衡对于某些常数γ > 0至少是Nγ。(相比之下,该问题的不确定性通信复杂度仅为O(log6 N))。;在k-参与人恒定动作博弈中,寻找an∈= Ω(1)-纳什均衡的确定性(手数)多方通信复杂度至少为2Ω(k/log k)(而非确定性通信复杂度仅为O(k))。
{"title":"On the Communication Complexity of Approximate Fixed Points","authors":"T. Roughgarden, Omri Weinstein","doi":"10.1109/FOCS.2016.32","DOIUrl":"https://doi.org/10.1109/FOCS.2016.32","url":null,"abstract":"We study the two-party communication complexity of finding an approximate Brouwer fixed point of a composition of two Lipschitz functions g o f: [0,1]n → [0,1]n, where Alice holds f and Bob holds g. We prove an exponential (in n) lower bound on the deterministic communication complexity of this problem. Our technical approach is to adapt the Raz-McKenzie simulation theorem (FOCS 1999) into geometric settings, thereby \"smoothly lifting\" the deterministic query lower bound for finding an approximate fixed point (Hirsch, Papadimitriou and Vavasis, Complexity 1989) from the oracle model to the two-party model. Our results also suggest an approach to the well-known open problem of proving strong lower bounds on the communication complexity of computing approximate Nash equilibria. Specifically, we show that a slightly \"smoother\" version of our fixed-point computation lower bound (by an absolute constant factor) would imply that: The deterministic two-party communication complexity of finding an ∈ = Ω(1/log2 N)-approximate Nash equilibrium in an N × N bimatrix game (where each player knows only his own payoff matrix) is at least Nγ for some constant γ > 0. (In contrast, the nondeterministic communication complexity of this problem is only O(log6 N)). ; The deterministic (Number-In-Hand) multiparty communication complexity of finding an ∈ = Ω(1)-Nash equilibrium in a k-player constant-action game is at least 2Ω(k/log k) (while the nondeterministic communication complexity is only O(k)).","PeriodicalId":414001,"journal":{"name":"2016 IEEE 57th Annual Symposium on Foundations of Computer Science (FOCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128576138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Truly Sub-cubic Algorithms for Language Edit Distance and RNA-Folding via Fast Bounded-Difference Min-Plus Product 基于快速有界差分最小加积的语言编辑距离和rna折叠的真正亚三次算法
Pub Date : 2016-10-01 DOI: 10.1109/FOCS.2016.48
K. Bringmann, F. Grandoni, B. Saha, V. V. Williams
It is a major open problem whether the (min,+)-product of two n by n matrices has a truly sub-cubic time algorithm, as it is equivalent to the famous All-Pairs-Shortest-Paths problem (APSP) in n-vertex graphs. There are some restrictions of the (min,+)-product to special types of matrices that admit truly sub-cubic algorithms, each giving rise to a special case of APSP that can be solved faster. In this paper we consider a new, different and powerful restriction in which one matrix can be arbitrary, as long as the other matrix has "bounded differences" in either its columns or rows, i.e. any two consecutive entries differ by only a small amount. We obtain the first truly sub-cubic algorithm for this Bounded Differences (min,+)-product (answering an open problem of Chan and Lewenstein). Our new algorithm, combined with a strengthening of an approach of L. Valiant for solving context-free grammar parsing with matrix multiplication, yields the first truly sub-cubic algorithms for the following problems: Language Edit Distance (a major problem in the parsing community), RNA-folding (a major problem in bioinformatics) and Optimum Stack Generation (answering an open problem of Tarjan).
两个n × n矩阵的(min,+)-积是否具有真正的次三次时间算法是一个重大的开放问题,因为它相当于著名的n顶点图中的全对最短路径问题(APSP)。对于允许真正次三次算法的特殊类型的矩阵,(min,+)-积有一些限制,每一种都产生一种可以更快求解的特殊情况的APSP。本文考虑了一个新的、不同的、强大的约束,其中一个矩阵可以是任意的,只要另一个矩阵在其列或行中具有“有界差”,即任意两个连续的条目只有少量的差。我们得到了这个有界差分(min,+)乘积的第一个真正的次三次算法(回答了Chan和Lewenstein的一个开放问题)。我们的新算法,结合L. Valiant用矩阵乘法解决上下文无关语法解析的强化方法,产生了第一个真正的亚立方算法,用于以下问题:语言编辑距离(解析界的一个主要问题),rna折叠(生物信息学的一个主要问题)和最优堆栈生成(回答Tarjan的一个开放问题)。
{"title":"Truly Sub-cubic Algorithms for Language Edit Distance and RNA-Folding via Fast Bounded-Difference Min-Plus Product","authors":"K. Bringmann, F. Grandoni, B. Saha, V. V. Williams","doi":"10.1109/FOCS.2016.48","DOIUrl":"https://doi.org/10.1109/FOCS.2016.48","url":null,"abstract":"It is a major open problem whether the (min,+)-product of two n by n matrices has a truly sub-cubic time algorithm, as it is equivalent to the famous All-Pairs-Shortest-Paths problem (APSP) in n-vertex graphs. There are some restrictions of the (min,+)-product to special types of matrices that admit truly sub-cubic algorithms, each giving rise to a special case of APSP that can be solved faster. In this paper we consider a new, different and powerful restriction in which one matrix can be arbitrary, as long as the other matrix has \"bounded differences\" in either its columns or rows, i.e. any two consecutive entries differ by only a small amount. We obtain the first truly sub-cubic algorithm for this Bounded Differences (min,+)-product (answering an open problem of Chan and Lewenstein). Our new algorithm, combined with a strengthening of an approach of L. Valiant for solving context-free grammar parsing with matrix multiplication, yields the first truly sub-cubic algorithms for the following problems: Language Edit Distance (a major problem in the parsing community), RNA-folding (a major problem in bioinformatics) and Optimum Stack Generation (answering an open problem of Tarjan).","PeriodicalId":414001,"journal":{"name":"2016 IEEE 57th Annual Symposium on Foundations of Computer Science (FOCS)","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116386902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 59
Indistinguishability Obfuscation from DDH-Like Assumptions on Constant-Degree Graded Encodings 恒度分级编码中类似ddh假设的不可区分混淆
Pub Date : 2016-10-01 DOI: 10.1109/FOCS.2016.11
Huijia Lin, V. Vaikuntanathan
All constructions of general purpose indistinguishability obfuscation (IO) rely on either meta-assumptions that encapsulate an exponential family of assumptions (e.g., Pass, Seth and Telang, CRYPTO 2014 and Lin, EUROCRYPT 2016), or polynomial families of assumptions on graded encoding schemes with a high polynomial degree/multilinearity (e.g., Gentry, Lewko, Sahai and Waters, FOCS 2014). We present a new construction of IO, with a security reduction based on two assumptions: (a) a DDH-like assumption - called the sSXDH assumption - on constant degree graded encodings, and (b) the existence of polynomial-stretch pseudorandom generators (PRG) in NC0. Our assumption on graded encodings is simple, has constant size, and does not require handling composite-order rings. This narrows the gap between the mathematical objects that exist (bilinear maps, from elliptic curve groups) and ones that suffice to construct general purpose indistinguishability obfuscation.
通用不可区分混淆(IO)的所有结构都依赖于封装指数族假设的元假设(例如,Pass, Seth和Telang, CRYPTO 2014和Lin, EUROCRYPT 2016),或具有高多项式度/多重线性的分级编码方案的多项式族假设(例如,Gentry, Lewko, Sahai和Waters, FOCS 2014)。我们提出了一种新的IO结构,其安全性降低基于两个假设:(a)一个类似ddh的假设-称为sSXDH假设-关于常数度分级编码,以及(b) NC0中多项式-拉伸伪随机发生器(PRG)的存在。我们对分级编码的假设很简单,具有恒定的大小,并且不需要处理复合顺序环。这缩小了存在的数学对象(来自椭圆曲线群的双线性映射)与足以构建通用不可区分混淆的对象之间的差距。
{"title":"Indistinguishability Obfuscation from DDH-Like Assumptions on Constant-Degree Graded Encodings","authors":"Huijia Lin, V. Vaikuntanathan","doi":"10.1109/FOCS.2016.11","DOIUrl":"https://doi.org/10.1109/FOCS.2016.11","url":null,"abstract":"All constructions of general purpose indistinguishability obfuscation (IO) rely on either meta-assumptions that encapsulate an exponential family of assumptions (e.g., Pass, Seth and Telang, CRYPTO 2014 and Lin, EUROCRYPT 2016), or polynomial families of assumptions on graded encoding schemes with a high polynomial degree/multilinearity (e.g., Gentry, Lewko, Sahai and Waters, FOCS 2014). We present a new construction of IO, with a security reduction based on two assumptions: (a) a DDH-like assumption - called the sSXDH assumption - on constant degree graded encodings, and (b) the existence of polynomial-stretch pseudorandom generators (PRG) in NC0. Our assumption on graded encodings is simple, has constant size, and does not require handling composite-order rings. This narrows the gap between the mathematical objects that exist (bilinear maps, from elliptic curve groups) and ones that suffice to construct general purpose indistinguishability obfuscation.","PeriodicalId":414001,"journal":{"name":"2016 IEEE 57th Annual Symposium on Foundations of Computer Science (FOCS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131449323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 117
Strong Fooling Sets for Multi-player Communication with Applications to Deterministic Estimation of Stream Statistics 多玩家通信的强欺骗集及其在流统计的确定性估计中的应用
Pub Date : 2016-10-01 DOI: 10.1109/FOCS.2016.14
Amit Chakrabarti, S. Kale
We develop a paradigm for studying multi-player deterministic communication, based on a novel combinatorial concept that we call a strong fooling set. Our paradigm leads to optimal lower bounds on the per-player communication required for solving multi-player EQUALITY problems in a private-message setting. This in turn gives a very strong - O(1) versus Ω(n) - separation between private-message and one-way blackboard communication complexities. Applying our communication complexity results, we show that for deterministic data streaming algorithms, even loose estimations of some basic statistics of an input stream require large amounts of space. For instance, approximating the frequency moment Fk within a factor α requires Ω(n/α1/(1-k)) space for k > 1 and roughly Ω(n/αk/(k-1)) space for k > 1. In particular, approximation within any constant factor α, however large, requires linear space, with the trivial exception of k = 1. This is in sharp contrast to the situation for randomized streaming algorithms, which can approximate Fk to within (1±ε) factors using Õ(1) space for k ≤ 2 and o(n) space for all finite k and all constant ε > 0. Previous linear-space lower bounds for deterministic estimation were limited to small factors α, such as α <; 2 for approximating F0 or F2. We also provide certain space/approximation tradeoffs in a deterministic setting for the problems of estimating the empirical entropy of a stream as well as the size of the maximum matching and the edge connectivity of a streamed graph.
我们开发了一个研究多人确定性通信的范例,基于一个新的组合概念,我们称之为强愚弄集。我们的范例导致了解决私有消息设置中多玩家平等问题所需的每个玩家通信的最佳下限。这反过来又在私有消息和单向黑板通信复杂性之间提供了非常强的分离(0 (1)vs Ω(n))。应用我们的通信复杂性结果,我们表明,对于确定性数据流算法,即使对输入流的一些基本统计数据进行松散估计也需要大量的空间。例如,在因子α内近似频率矩Fk需要为k >提供Ω(n/α1/(1-k))空间,为k >提供Ω(n/αk/(k-1))空间。特别地,在任何常数因子α内的近似,无论多大,都需要线性空间,除了k = 1的平凡例外。这与随机流算法的情况形成鲜明对比,随机流算法对k≤2使用Õ(1)空间,对所有有限k和所有常数ε >使用o(n)空间,可以将Fk近似到(1±ε)因子内。以往确定性估计的线性空间下界仅限于小因子α,如α <;2表示近似F0或F2。我们还在确定性设置中为估计流的经验熵以及最大匹配的大小和流图的边缘连通性的问题提供了一定的空间/近似权衡。
{"title":"Strong Fooling Sets for Multi-player Communication with Applications to Deterministic Estimation of Stream Statistics","authors":"Amit Chakrabarti, S. Kale","doi":"10.1109/FOCS.2016.14","DOIUrl":"https://doi.org/10.1109/FOCS.2016.14","url":null,"abstract":"We develop a paradigm for studying multi-player deterministic communication, based on a novel combinatorial concept that we call a strong fooling set. Our paradigm leads to optimal lower bounds on the per-player communication required for solving multi-player EQUALITY problems in a private-message setting. This in turn gives a very strong - O(1) versus Ω(n) - separation between private-message and one-way blackboard communication complexities. Applying our communication complexity results, we show that for deterministic data streaming algorithms, even loose estimations of some basic statistics of an input stream require large amounts of space. For instance, approximating the frequency moment Fk within a factor α requires Ω(n/α1/(1-k)) space for k > 1 and roughly Ω(n/αk/(k-1)) space for k > 1. In particular, approximation within any constant factor α, however large, requires linear space, with the trivial exception of k = 1. This is in sharp contrast to the situation for randomized streaming algorithms, which can approximate Fk to within (1±ε) factors using Õ(1) space for k ≤ 2 and o(n) space for all finite k and all constant ε > 0. Previous linear-space lower bounds for deterministic estimation were limited to small factors α, such as α <; 2 for approximating F0 or F2. We also provide certain space/approximation tradeoffs in a deterministic setting for the problems of estimating the empirical entropy of a stream as well as the size of the maximum matching and the edge connectivity of a streamed graph.","PeriodicalId":414001,"journal":{"name":"2016 IEEE 57th Annual Symposium on Foundations of Computer Science (FOCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129067124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Polynomial-Time Tensor Decompositions with Sum-of-Squares 多项式时间张量分解与平方和
Pub Date : 2016-10-01 DOI: 10.1109/FOCS.2016.54
Tengyu Ma, Jonathan Shi, David Steurer
We give new algorithms based on the sum-of-squares method for tensor decomposition. Our results improve the best known running times from quasi-polynomial to polynomial for several problems, including decomposing random overcomplete 3-tensors and learning overcomplete dictionaries with constant relative sparsity. We also give the first robust analysis for decomposing overcomplete 4-tensors in the smoothed analysis model. A key ingredient of our analysis is to establish small spectral gaps in moment matrices derived from solutions to sum-of-squares relaxations. To enable this analysis we augment sum-of-squaresrelaxations with spectral analogs of maximum entropy constraints.
给出了基于平方和法的张量分解新算法。我们的结果改善了几个问题的最著名的从拟多项式到多项式的运行时间,包括分解随机过完备3张量和学习具有恒定相对稀疏性的过完备字典。本文还首次对光滑分析模型中的过完备4张量进行了鲁棒分析。我们分析的一个关键成分是在由平方和松弛的解导出的矩矩阵中建立小的谱间隙。为了实现这种分析,我们用最大熵约束的谱类似物来增强平方和松弛。
{"title":"Polynomial-Time Tensor Decompositions with Sum-of-Squares","authors":"Tengyu Ma, Jonathan Shi, David Steurer","doi":"10.1109/FOCS.2016.54","DOIUrl":"https://doi.org/10.1109/FOCS.2016.54","url":null,"abstract":"We give new algorithms based on the sum-of-squares method for tensor decomposition. Our results improve the best known running times from quasi-polynomial to polynomial for several problems, including decomposing random overcomplete 3-tensors and learning overcomplete dictionaries with constant relative sparsity. We also give the first robust analysis for decomposing overcomplete 4-tensors in the smoothed analysis model. A key ingredient of our analysis is to establish small spectral gaps in moment matrices derived from solutions to sum-of-squares relaxations. To enable this analysis we augment sum-of-squaresrelaxations with spectral analogs of maximum entropy constraints.","PeriodicalId":414001,"journal":{"name":"2016 IEEE 57th Annual Symposium on Foundations of Computer Science (FOCS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116899530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 112
期刊
2016 IEEE 57th Annual Symposium on Foundations of Computer Science (FOCS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1