首页 > 最新文献

2016 IEEE 57th Annual Symposium on Foundations of Computer Science (FOCS)最新文献

英文 中文
Extension Complexity of Independent Set Polytopes 独立集多面体的可拓复杂度
Mika Göös, Rahul Jain, Thomas Watson
We exhibit an n-node graph whose independent set polytope requires extended formulations of size exponential in Ω(n/log n). Previously, no explicit examples of n-dimensional 0/1-polytopes were known with extension complexity larger than exponential in Θ(√n). Our construction is inspired by a relatively little-known connection between extended formulations and (monotone) circuit depth.
我们展示了一个n节点图,其独立集多边形需要在Ω(n/log n)中扩展成指数大小的公式。以前,在Θ(√n)中没有已知的n维0/1多边形的扩展复杂度大于指数的显式例子。我们的构造受到扩展公式和(单调)电路深度之间相对鲜为人知的联系的启发。
{"title":"Extension Complexity of Independent Set Polytopes","authors":"Mika Göös, Rahul Jain, Thomas Watson","doi":"10.1137/16M109884X","DOIUrl":"https://doi.org/10.1137/16M109884X","url":null,"abstract":"We exhibit an n-node graph whose independent set polytope requires extended formulations of size exponential in Ω(n/log n). Previously, no explicit examples of n-dimensional 0/1-polytopes were known with extension complexity larger than exponential in Θ(√n). Our construction is inspired by a relatively little-known connection between extended formulations and (monotone) circuit depth.","PeriodicalId":414001,"journal":{"name":"2016 IEEE 57th Annual Symposium on Foundations of Computer Science (FOCS)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114141281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 48
Robust Estimators in High Dimensions without the Computational Intractability 无计算复杂度的高维鲁棒估计
Pub Date : 2016-04-21 DOI: 10.1109/FOCS.2016.85
Ilias Diakonikolas, Gautam Kamath, D. Kane, J. Li, Ankur Moitra, Alistair Stewart
We study high-dimensional distribution learning in an agnostic setting where an adversary is allowed to arbitrarily corrupt an epsilon fraction of the samples. Such questions have a rich history spanning statistics, machine learning and theoretical computer science. Even in the most basic settings, the only known approaches are either computationally inefficient or lose dimension dependent factors in their error guarantees. This raises the following question: Is high-dimensional agnostic distribution learning even possible, algorithmically? In this work, we obtain the first computationally efficient algorithms for agnostically learning several fundamental classes of high-dimensional distributions: (1) a single Gaussian, (2) a product distribution on the hypercube, (3) mixtures of two product distributions (under a natural balancedness condition), and (4) mixtures of k Gaussians with identical spherical covariances. All our algorithms achieve error that is independent of the dimension, and in many cases depends nearly-linearly on the fraction of adversarially corrupted samples. Moreover, we develop a general recipe for detecting and correcting corruptions in high-dimensions, that may be applicable to many other problems.
我们在一个不可知的环境中研究高维分布学习,在这种环境中,对手被允许任意破坏样本的ε分数。这些问题有着丰富的历史,涵盖了统计学、机器学习和理论计算机科学。即使在最基本的设置中,唯一已知的方法要么计算效率低下,要么在误差保证中失去与维度相关的因素。这就提出了以下问题:高维不可知论分布学习在算法上是否可行?在这项工作中,我们获得了第一个计算高效的算法,用于不可知性地学习几种高维分布的基本类别:(1)单个高斯分布,(2)超立方体上的乘积分布,(3)两个乘积分布的混合物(在自然平衡条件下),以及(4)具有相同球协方差的k个高斯分布的混合物。我们所有的算法都实现了与维数无关的误差,并且在许多情况下几乎线性地依赖于对抗性损坏样本的比例。此外,我们还开发了一种在高维中检测和纠正损坏的通用方法,这可能适用于许多其他问题。
{"title":"Robust Estimators in High Dimensions without the Computational Intractability","authors":"Ilias Diakonikolas, Gautam Kamath, D. Kane, J. Li, Ankur Moitra, Alistair Stewart","doi":"10.1109/FOCS.2016.85","DOIUrl":"https://doi.org/10.1109/FOCS.2016.85","url":null,"abstract":"We study high-dimensional distribution learning in an agnostic setting where an adversary is allowed to arbitrarily corrupt an epsilon fraction of the samples. Such questions have a rich history spanning statistics, machine learning and theoretical computer science. Even in the most basic settings, the only known approaches are either computationally inefficient or lose dimension dependent factors in their error guarantees. This raises the following question: Is high-dimensional agnostic distribution learning even possible, algorithmically? In this work, we obtain the first computationally efficient algorithms for agnostically learning several fundamental classes of high-dimensional distributions: (1) a single Gaussian, (2) a product distribution on the hypercube, (3) mixtures of two product distributions (under a natural balancedness condition), and (4) mixtures of k Gaussians with identical spherical covariances. All our algorithms achieve error that is independent of the dimension, and in many cases depends nearly-linearly on the fraction of adversarially corrupted samples. Moreover, we develop a general recipe for detecting and correcting corruptions in high-dimensions, that may be applicable to many other problems.","PeriodicalId":414001,"journal":{"name":"2016 IEEE 57th Annual Symposium on Foundations of Computer Science (FOCS)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131636256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 437
No Occurrence Obstructions in Geometric Complexity Theory 几何复杂性理论中的无发生障碍
Pub Date : 2016-04-21 DOI: 10.1109/FOCS.2016.49
Peter Bürgisser, Christian Ikenmeyer, G. Panova
The permanent versus determinant conjecture is a major problem in complexity theory that is equivalent to the separation of the complexity classes VP ws and VNP. Mulmuley and Sohoni [SIAM J Comput 2001] suggested 8to study a strengthened version of this conjecture over the complex numbers that amounts to separating the orbit closures of the determinant and padded permanent polynomials. In that paper it was also proposed to separate these orbit closures by exhibiting occurrence obstructions, which are irreducible representations of GLn2(C), which occur in one coordinate ring of the orbit closure, but not in the other. We prove that this approach is impossible. However, we do not rule out the approach to the permanent versus determinant problem via multiplicity obstructions as proposed by in [32].
恒久对行列式猜想是复杂性理论中的一个主要问题,它等价于复杂性类VP、ws和VNP的分离。Mulmuley和Sohoni [SIAM J Comput 2001]建议在复数上研究这一猜想的强化版本,即分离行列式多项式和填充永久多项式的轨道闭包。在那篇论文中,还提出了通过显示发生障碍物来分离这些轨道闭包,这是GLn2(C)的不可约表示,它出现在轨道闭包的一个坐标环上,而不在另一个坐标环上。我们证明这种方法是不可能的。然而,我们不排除在b[32]中提出的通过多重障碍来解决永久性与行列性问题的方法。
{"title":"No Occurrence Obstructions in Geometric Complexity Theory","authors":"Peter Bürgisser, Christian Ikenmeyer, G. Panova","doi":"10.1109/FOCS.2016.49","DOIUrl":"https://doi.org/10.1109/FOCS.2016.49","url":null,"abstract":"The permanent versus determinant conjecture is a major problem in complexity theory that is equivalent to the separation of the complexity classes VP ws and VNP. Mulmuley and Sohoni [SIAM J Comput 2001] suggested 8to study a strengthened version of this conjecture over the complex numbers that amounts to separating the orbit closures of the determinant and padded permanent polynomials. In that paper it was also proposed to separate these orbit closures by exhibiting occurrence obstructions, which are irreducible representations of GLn2(C), which occur in one coordinate ring of the orbit closure, but not in the other. We prove that this approach is impossible. However, we do not rule out the approach to the permanent versus determinant problem via multiplicity obstructions as proposed by in [32].","PeriodicalId":414001,"journal":{"name":"2016 IEEE 57th Annual Symposium on Foundations of Computer Science (FOCS)","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124701588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 63
Subexponential Parameterized Algorithms for Planar and Apex-Minor-Free Graphs via Low Treewidth Pattern Covering 基于低树宽模式覆盖的平面图和顶点无次图的亚指数参数化算法
Pub Date : 2016-04-20 DOI: 10.1109/FOCS.2016.62
F. Fomin, D. Lokshtanov, D. Marx, Marcin Pilipczuk, Michal Pilipczuk, Saket Saurabh
We prove the following theorem. Given a planar graph G and an integer k, it is possible in polynomial time to randomly sample a subset A of vertices of G with the following properties: 1) A induces a subgraph of G of treewidth O(√(k log k)), and 2) for every connected subgraph H of G on at most k vertices, the probability that A covers the whole vertex set of H is at least (2O(√k log2 k) · nO(1))-1, where n is the number of vertices of G. Together with standard dynamic programming techniques for graphs of bounded treewidth, this result gives a versatile technique for obtaining (randomized) subexponential parameterized algorithms for problems on planar graphs, usually with running time bound 2O(√(k log2 k))nO(1). The technique can be applied to problems expressible as searching for a small, connected pattern with a prescribed property in a large host graph, examples of such problems include DIRECTED k-Path, WEIGHTED k-Path, VERTEX COVER LOCAL SEARCH, and SUBGRAPH ISOMORPHISM, among others. Up to this point, it was open whether these problems can be solved in subexponential parameterized time on planar graphs, because they are not amenable to the classic technique of bidimensionality. Furthermore, all our results hold in fact on any class of graphs that exclude a fixed apex graph as a minor, in particular on graphs embeddable in any fixed surface.
我们证明下面的定理。给定一个平面图G和一个整数k,可以在多项式时间内随机采样G的顶点子集a,并具有以下性质:1)诱发的子图G treewidth O(√日志k (k),和2)对于每一个连通子图H (G在大多数k个顶点,一套覆盖整个顶点的概率至少H (2 O(√k log2 k)·没有(1)),其中n是G的顶点数和标准的有界treewidth动态编程技术图表,这个结果给出了一个通用的技术获取(随机)subexponential参数化算法有关平面图形的问题,通常运行时间限定为2O(√(k log2k))nO(1)。该技术可以应用于在大型主图中搜索具有规定属性的小型连接模式的问题,此类问题的示例包括DIRECTED k-Path, WEIGHTED k-Path, VERTEX COVER LOCAL SEARCH和SUBGRAPH ISOMORPHISM等。到目前为止,这些问题是否能在平面图上的亚指数参数化时间内得到解决是一个开放的问题,因为它们不适合经典的二维技术。此外,我们所有的结果实际上都适用于任何不含固定顶点图作为次元的图,特别是可嵌入于任何固定曲面的图。
{"title":"Subexponential Parameterized Algorithms for Planar and Apex-Minor-Free Graphs via Low Treewidth Pattern Covering","authors":"F. Fomin, D. Lokshtanov, D. Marx, Marcin Pilipczuk, Michal Pilipczuk, Saket Saurabh","doi":"10.1109/FOCS.2016.62","DOIUrl":"https://doi.org/10.1109/FOCS.2016.62","url":null,"abstract":"We prove the following theorem. Given a planar graph G and an integer k, it is possible in polynomial time to randomly sample a subset A of vertices of G with the following properties: 1) A induces a subgraph of G of treewidth O(√(k log k)), and 2) for every connected subgraph H of G on at most k vertices, the probability that A covers the whole vertex set of H is at least (2O(√k log2 k) · nO(1))-1, where n is the number of vertices of G. Together with standard dynamic programming techniques for graphs of bounded treewidth, this result gives a versatile technique for obtaining (randomized) subexponential parameterized algorithms for problems on planar graphs, usually with running time bound 2O(√(k log2 k))nO(1). The technique can be applied to problems expressible as searching for a small, connected pattern with a prescribed property in a large host graph, examples of such problems include DIRECTED k-Path, WEIGHTED k-Path, VERTEX COVER LOCAL SEARCH, and SUBGRAPH ISOMORPHISM, among others. Up to this point, it was open whether these problems can be solved in subexponential parameterized time on planar graphs, because they are not amenable to the classic technique of bidimensionality. Furthermore, all our results hold in fact on any class of graphs that exclude a fixed apex graph as a minor, in particular on graphs embeddable in any fixed surface.","PeriodicalId":414001,"journal":{"name":"2016 IEEE 57th Annual Symposium on Foundations of Computer Science (FOCS)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125583842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Max-Information, Differential Privacy, and Post-selection Hypothesis Testing 最大信息、差异隐私和选择后假设检验
Pub Date : 2016-04-13 DOI: 10.1109/FOCS.2016.59
Ryan M. Rogers, Aaron Roth, Adam D. Smith, Om Thakkar
In this paper, we initiate a principled study of how the generalization properties of approximate differential privacy can be used to perform adaptive hypothesis testing, while giving statistically valid p-value corrections. We do this by observing that the guarantees of algorithms with bounded approximate max-information are sufficient to correct the p-values of adaptively chosen hypotheses, and then by proving that algorithms that satisfy (∈,δ)-differential privacy have bounded approximate max information when their inputs are drawn from a product distribution. This substantially extends the known connection between differential privacy and max-information, which previously was only known to hold for (pure) (∈,0)-differential privacy. It also extends our understanding of max-information as a partially unifying measure controlling the generalization properties of adaptive data analyses. We also show a lower bound, proving that (despite the strong composition properties of max-information), when data is drawn from a product distribution, (∈,δ)-differentially private algorithms can come first in a composition with other algorithms satisfying max-information bounds, but not necessarily second if the composition is required to itself satisfy a nontrivial max-information bound. This, in particular, implies that the connection between (∈,δ)-differential privacy and max-information holds only for inputs drawn from product distributions, unlike the connection between (∈,0)-differential privacy and max-information.
在本文中,我们发起了一个原则性的研究,如何利用近似微分隐私的泛化属性来进行自适应假设检验,同时给出统计有效的p值修正。我们通过观察具有有界近似最大信息的算法的保证足以纠正自适应选择的假设的p值来做到这一点,然后通过证明满足(∈,δ)-微分隐私的算法在其输入来自乘积分布时具有有界近似最大信息来证明这一点。这极大地扩展了差分隐私和max-information之间的已知联系,而之前已知的这种联系只适用于(pure)(∈,0)-差分隐私。它还扩展了我们对最大信息作为控制自适应数据分析泛化特性的部分统一度量的理解。我们还展示了一个下界,证明(尽管最大信息的强组合特性),当数据从乘积分布中提取时,(∈,δ)-差分私有算法可以在与满足最大信息界的其他算法的组合中首先出现,但如果组合本身需要满足非平凡的最大信息界,则不一定是第二。这特别意味着(∈,δ)-微分隐私和max-information之间的联系只适用于从乘积分布中提取的输入,而不像(∈,0)-微分隐私和max-information之间的联系。
{"title":"Max-Information, Differential Privacy, and Post-selection Hypothesis Testing","authors":"Ryan M. Rogers, Aaron Roth, Adam D. Smith, Om Thakkar","doi":"10.1109/FOCS.2016.59","DOIUrl":"https://doi.org/10.1109/FOCS.2016.59","url":null,"abstract":"In this paper, we initiate a principled study of how the generalization properties of approximate differential privacy can be used to perform adaptive hypothesis testing, while giving statistically valid p-value corrections. We do this by observing that the guarantees of algorithms with bounded approximate max-information are sufficient to correct the p-values of adaptively chosen hypotheses, and then by proving that algorithms that satisfy (∈,δ)-differential privacy have bounded approximate max information when their inputs are drawn from a product distribution. This substantially extends the known connection between differential privacy and max-information, which previously was only known to hold for (pure) (∈,0)-differential privacy. It also extends our understanding of max-information as a partially unifying measure controlling the generalization properties of adaptive data analyses. We also show a lower bound, proving that (despite the strong composition properties of max-information), when data is drawn from a product distribution, (∈,δ)-differentially private algorithms can come first in a composition with other algorithms satisfying max-information bounds, but not necessarily second if the composition is required to itself satisfy a nontrivial max-information bound. This, in particular, implies that the connection between (∈,δ)-differential privacy and max-information holds only for inputs drawn from product distributions, unlike the connection between (∈,0)-differential privacy and max-information.","PeriodicalId":414001,"journal":{"name":"2016 IEEE 57th Annual Symposium on Foundations of Computer Science (FOCS)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129678886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 80
A Discrete and Bounded Envy-Free Cake Cutting Protocol for Any Number of Agents 任意数量代理的离散有界无嫉妒切蛋糕协议
Pub Date : 2016-04-13 DOI: 10.1109/FOCS.2016.52
H. Aziz, Simon Mackenzie
We consider the well-studied cake cutting problem in which the goal is to find an envy-free allocation based on queries from n agents. The problem has received attention in computer science, mathematics, and economics. It has been a major open problem whether there exists a discrete and bounded envy-free protocol. We resolve the problem by proposing a discrete and bounded envy-free protocol for any number of agents. The maximum number of queries required by the protocol is nnnnnn. Even if we do not run our protocol to completion, it can find in at most nn+1 queries an envy-free partial allocation of the cake in which each agent gets at least 1/n of the value of the whole cake.
我们考虑一个研究得很好的切蛋糕问题,其目标是基于n个代理的查询找到一个无嫉妒的分配。这个问题已经引起了计算机科学、数学和经济学的关注。是否存在一种离散的、有界的无嫉妒协议一直是一个重大的开放性问题。我们通过对任意数量的代理提出一个离散的、有界的无嫉妒协议来解决这个问题。该协议所需的最大查询数是nnnnnn。即使我们没有将协议运行到完成,它也可以在最多nn+1个查询中找到一个没有嫉妒的蛋糕部分分配,其中每个代理至少获得整个蛋糕价值的1/n。
{"title":"A Discrete and Bounded Envy-Free Cake Cutting Protocol for Any Number of Agents","authors":"H. Aziz, Simon Mackenzie","doi":"10.1109/FOCS.2016.52","DOIUrl":"https://doi.org/10.1109/FOCS.2016.52","url":null,"abstract":"We consider the well-studied cake cutting problem in which the goal is to find an envy-free allocation based on queries from n agents. The problem has received attention in computer science, mathematics, and economics. It has been a major open problem whether there exists a discrete and bounded envy-free protocol. We resolve the problem by proposing a discrete and bounded envy-free protocol for any number of agents. The maximum number of queries required by the protocol is nnnnnn. Even if we do not run our protocol to completion, it can find in at most nn+1 queries an envy-free partial allocation of the cake in which each agent gets at least 1/n of the value of the whole cake.","PeriodicalId":414001,"journal":{"name":"2016 IEEE 57th Annual Symposium on Foundations of Computer Science (FOCS)","volume":"161 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121176264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 147
Ramanujan Graphs in Polynomial Time 多项式时间的Ramanujan图
Pub Date : 2016-04-12 DOI: 10.1109/FOCS.2016.37
Michael B. Cohen
Recent work by Marcus, Spielman and Srivastava proves the existence of bipartite Ramanujan (multi) graphs of all degrees and all sizes. However, that paper did not provide a polynomial time algorithm to actually compute such graphs. Here, we provide a polynomial time algorithm to compute certain expected characteristic polynomials related to this construction. This leads to a deterministic polynomial time algorithm to compute bipartite Ramanujan (multi) graphs of all degrees and all sizes.
Marcus, Spielman和Srivastava最近的工作证明了所有度和所有大小的二部Ramanujan(多)图的存在性。然而,那篇论文并没有提供一个多项式时间算法来实际计算这种图。在这里,我们提供了一个多项式时间算法来计算与此结构相关的某些期望特征多项式。这导致了一个确定性多项式时间算法来计算所有度和所有大小的二部拉马努金(多)图。
{"title":"Ramanujan Graphs in Polynomial Time","authors":"Michael B. Cohen","doi":"10.1109/FOCS.2016.37","DOIUrl":"https://doi.org/10.1109/FOCS.2016.37","url":null,"abstract":"Recent work by Marcus, Spielman and Srivastava proves the existence of bipartite Ramanujan (multi) graphs of all degrees and all sizes. However, that paper did not provide a polynomial time algorithm to actually compute such graphs. Here, we provide a polynomial time algorithm to compute certain expected characteristic polynomials related to this construction. This leads to a deterministic polynomial time algorithm to compute bipartite Ramanujan (multi) graphs of all degrees and all sizes.","PeriodicalId":414001,"journal":{"name":"2016 IEEE 57th Annual Symposium on Foundations of Computer Science (FOCS)","volume":"243 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124546908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 48
Zero-Knowledge Proof Systems for QMA QMA的零知识证明系统
Pub Date : 2016-04-11 DOI: 10.1109/FOCS.2016.13
A. Broadbent, Zhengfeng Ji, F. Song, John Watrous
Prior work has established that all problems in NP admit classical zero-knowledge proof systems, and under reasonable hardness assumptions for quantum computations, these proof systems can be made secure against quantum attacks. We prove a result representing a further quantum generalization of this fact, which is that every problem in the complexity class QMA has a quantum zero-knowledge proof system. More specifically, assuming the existence of an unconditionally binding and quantum computationally concealing commitment scheme, we prove that every problem in the complexity class QMA has a quantum interactive proof system that is zero-knowledge with respect to efficient quantum computations. Our QMA proof system is sound against arbitrary quantum provers, but only requires an honest prover to perform polynomial-time quantum computations, provided that it holds a quantum witness for a given instance of the QMA problem under consideration.
先前的工作已经确定,NP中的所有问题都允许经典的零知识证明系统,并且在量子计算的合理硬度假设下,这些证明系统可以免受量子攻击。我们证明了一个结果,代表了这一事实的进一步量子推广,即复杂性类QMA中的每个问题都有一个量子零知识证明系统。更具体地说,假设存在无条件绑定和量子计算隐藏的承诺方案,我们证明了复杂性类QMA中的每个问题都有一个关于有效量子计算的零知识的量子交互证明系统。我们的QMA证明系统对任意量子证明者是健全的,但只需要一个诚实的证明者来执行多项式时间的量子计算,前提是它持有正在考虑的QMA问题的给定实例的量子见证。
{"title":"Zero-Knowledge Proof Systems for QMA","authors":"A. Broadbent, Zhengfeng Ji, F. Song, John Watrous","doi":"10.1109/FOCS.2016.13","DOIUrl":"https://doi.org/10.1109/FOCS.2016.13","url":null,"abstract":"Prior work has established that all problems in NP admit classical zero-knowledge proof systems, and under reasonable hardness assumptions for quantum computations, these proof systems can be made secure against quantum attacks. We prove a result representing a further quantum generalization of this fact, which is that every problem in the complexity class QMA has a quantum zero-knowledge proof system. More specifically, assuming the existence of an unconditionally binding and quantum computationally concealing commitment scheme, we prove that every problem in the complexity class QMA has a quantum interactive proof system that is zero-knowledge with respect to efficient quantum computations. Our QMA proof system is sound against arbitrary quantum provers, but only requires an honest prover to perform polynomial-time quantum computations, provided that it holds a quantum witness for a given instance of the QMA problem under consideration.","PeriodicalId":414001,"journal":{"name":"2016 IEEE 57th Annual Symposium on Foundations of Computer Science (FOCS)","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127582620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 47
A Nearly Tight Sum-of-Squares Lower Bound for the Planted Clique Problem 种植团问题的近紧平方和下界
Pub Date : 2016-04-11 DOI: 10.1109/FOCS.2016.53
B. Barak, Samuel B. Hopkins, Jonathan A. Kelner, Pravesh Kothari, Ankur Moitra, Aaron Potechin
We prove that with high probability over the choice of a random graph G from the Erdös-Rényi distribution G(n,1/2), the nO(d)-time degree d Sum-of-Squares semidefinite programming relaxation for the clique problem will give a value of at least n1/2-c(d/log n)1/2 for some constant c > 0. This yields a nearly tight n1/2-o(1) bound on the value of this program for any degree d = o(log n). Moreover we introduce a new framework that we call pseudo-calibration to construct Sum-of-Squares lower bounds. This framework is inspired by taking a computational analogue of Bayesian probability theory. It yields a general recipe for constructing good pseudo-distributions (i.e., dual certificates for the Sum-of-Squares semidefinite program), and sheds further light on the ways in which this hierarchy differs from others.
我们证明了从Erdös-Rényi分布G(n,1/2)中选择一个随机图G,对于团问题的n (d)时间阶d平方和半定规划松弛,对于某个常数c > 0,其值至少为n1/2-c(d/log n)1/2,具有高概率。对于任意阶d = o(log n),这产生了该程序值的近紧密的n1/2-o(1)界。此外,我们引入了一个称为伪校准的新框架来构造平方和下界。这个框架的灵感来自于贝叶斯概率论的计算模拟。它给出了构造良好伪分布(即平方和半确定程序的双重证书)的一般方法,并进一步阐明了该层次结构与其他层次结构的不同之处。
{"title":"A Nearly Tight Sum-of-Squares Lower Bound for the Planted Clique Problem","authors":"B. Barak, Samuel B. Hopkins, Jonathan A. Kelner, Pravesh Kothari, Ankur Moitra, Aaron Potechin","doi":"10.1109/FOCS.2016.53","DOIUrl":"https://doi.org/10.1109/FOCS.2016.53","url":null,"abstract":"We prove that with high probability over the choice of a random graph G from the Erdös-Rényi distribution G(n,1/2), the nO(d)-time degree d Sum-of-Squares semidefinite programming relaxation for the clique problem will give a value of at least n1/2-c(d/log n)1/2 for some constant c > 0. This yields a nearly tight n1/2-o(1) bound on the value of this program for any degree d = o(log n). Moreover we introduce a new framework that we call pseudo-calibration to construct Sum-of-Squares lower bounds. This framework is inspired by taking a computational analogue of Bayesian probability theory. It yields a general recipe for constructing good pseudo-distributions (i.e., dual certificates for the Sum-of-Squares semidefinite program), and sheds further light on the ways in which this hierarchy differs from others.","PeriodicalId":414001,"journal":{"name":"2016 IEEE 57th Annual Symposium on Foundations of Computer Science (FOCS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114843548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 197
Amortized Dynamic Cell-Probe Lower Bounds from Four-Party Communication 四方通信的平摊动态蜂窝探测下界
Pub Date : 2016-04-11 DOI: 10.1109/FOCS.2016.41
Omri Weinstein, Huacheng Yu
This paper develops a new technique for proving amortized, randomized cell-probe lower bounds on dynamic data structure problems. We introduce a new randomized nondeterministic four-party communication model that enables "accelerated", error-preserving simulations of dynamic data structures. We use this technique to prove an Ω(n(log n/log log n)2) cell-probe lower bound for the dynamic 2D weighted orthogonal range counting problem (2D-ORC) with n/poly log n updates and n queries, that holds even for data structures with exp(-Ω̃(n)) success probability. This result not only proves the highest amortized lower bound to date, but is also tight in the strongest possible sense, as a matching upper bound can be obtained by a deterministic data structure with worst-case operational time. This is the first demonstration of a "sharp threshold" phenomenon for dynamic data structures. Our broader motivation is that cell-probe lower bounds for exponentially small success facilitate reductions from dynamic to static data structures. As a proof-of-concept, we show that a slightly strengthened version of our lower bound would imply an Ω((log n/log log n)2) lower bound for the static 3D-ORC problem with O(n logO(1) n) space. Such result would give a near quadratic improvement over the highest known static cell-probe lower bound, and break the long standing Ω(log n) barrier for static data structures.
本文提出了一种新的方法来证明动态数据结构问题上的平摊随机胞探针下界。我们引入了一种新的随机非确定性四方通信模型,该模型可以“加速”,保持动态数据结构的错误模拟。我们使用该技术证明了具有n/poly log n更新和n次查询的动态2D加权正交范围计数问题(2D- orc)的Ω(n(log n/log log n)2)细胞探针下界,该下界甚至适用于具有exp(-Ω (n))成功概率的数据结构。这个结果不仅证明了迄今为止的最高平摊下界,而且在最强的可能意义上也是紧密的,因为一个匹配的上界可以通过一个具有最坏情况操作时间的确定性数据结构得到。这是动态数据结构的“锐阈值”现象的第一个演示。我们更广泛的动机是,对于指数级小的成功,细胞探针的下限有助于从动态数据结构减少到静态数据结构。作为概念验证,我们证明了下界的一个稍微加强的版本将意味着具有O(n logO(1) n)空间的静态3D-ORC问题的Ω((log n/log log n)2)下界。这样的结果将比已知的最高静态细胞探针下界提供近二次的改进,并打破静态数据结构长期存在的Ω(log n)障碍。
{"title":"Amortized Dynamic Cell-Probe Lower Bounds from Four-Party Communication","authors":"Omri Weinstein, Huacheng Yu","doi":"10.1109/FOCS.2016.41","DOIUrl":"https://doi.org/10.1109/FOCS.2016.41","url":null,"abstract":"This paper develops a new technique for proving amortized, randomized cell-probe lower bounds on dynamic data structure problems. We introduce a new randomized nondeterministic four-party communication model that enables \"accelerated\", error-preserving simulations of dynamic data structures. We use this technique to prove an Ω(n(log n/log log n)2) cell-probe lower bound for the dynamic 2D weighted orthogonal range counting problem (2D-ORC) with n/poly log n updates and n queries, that holds even for data structures with exp(-Ω̃(n)) success probability. This result not only proves the highest amortized lower bound to date, but is also tight in the strongest possible sense, as a matching upper bound can be obtained by a deterministic data structure with worst-case operational time. This is the first demonstration of a \"sharp threshold\" phenomenon for dynamic data structures. Our broader motivation is that cell-probe lower bounds for exponentially small success facilitate reductions from dynamic to static data structures. As a proof-of-concept, we show that a slightly strengthened version of our lower bound would imply an Ω((log n/log log n)2) lower bound for the static 3D-ORC problem with O(n logO(1) n) space. Such result would give a near quadratic improvement over the highest known static cell-probe lower bound, and break the long standing Ω(log n) barrier for static data structures.","PeriodicalId":414001,"journal":{"name":"2016 IEEE 57th Annual Symposium on Foundations of Computer Science (FOCS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114377517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
期刊
2016 IEEE 57th Annual Symposium on Foundations of Computer Science (FOCS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1