首页 > 最新文献

Proceedings of the forty-eighth annual ACM symposium on Theory of Computing最新文献

英文 中文
Proceedings of the forty-eighth annual ACM symposium on Theory of Computing 第四十八届ACM计算理论年会论文集
D. Wichs, Y. Mansour
{"title":"Proceedings of the forty-eighth annual ACM symposium on Theory of Computing","authors":"D. Wichs, Y. Mansour","doi":"10.1145/2897518","DOIUrl":"https://doi.org/10.1145/2897518","url":null,"abstract":"","PeriodicalId":442965,"journal":{"name":"Proceedings of the forty-eighth annual ACM symposium on Theory of Computing","volume":"49 9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115634844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A tight space bound for consensus 必须达成共识的狭小空间
Pub Date : 2016-06-19 DOI: 10.1145/2897518.2897565
Leqi Zhu
Existing n-process randomized wait-free (and obstruction-free) consensus protocols from registers all use at least n registers. In 1992, it was proved that such protocols must use Omega(sqrt(n)) registers. Recently, this was improved to Omega(n) registers in the anonymous setting, where processes do not have identifiers. Closing the gap in the general case, however, remained an open problem. We resolve this problem by proving that every randomized wait-free (or obstruction-free) consensus protocol for n processes must use at least n-1 registers.
现有的n进程随机无等待(和无阻塞)共识协议都使用至少n个寄存器。1992年,证明了这样的协议必须使用Omega(sqrt(n))寄存器。最近,这被改进为匿名设置中的Omega(n)寄存器,其中进程没有标识符。然而,在一般情况下缩小差距仍然是一个悬而未决的问题。我们通过证明n个进程的每个随机无等待(或无阻碍)共识协议必须使用至少n-1个寄存器来解决这个问题。
{"title":"A tight space bound for consensus","authors":"Leqi Zhu","doi":"10.1145/2897518.2897565","DOIUrl":"https://doi.org/10.1145/2897518.2897565","url":null,"abstract":"Existing n-process randomized wait-free (and obstruction-free) consensus protocols from registers all use at least n registers. In 1992, it was proved that such protocols must use Omega(sqrt(n)) registers. Recently, this was improved to Omega(n) registers in the anonymous setting, where processes do not have identifiers. Closing the gap in the general case, however, remained an open problem. We resolve this problem by proving that every randomized wait-free (or obstruction-free) consensus protocol for n processes must use at least n-1 registers.","PeriodicalId":442965,"journal":{"name":"Proceedings of the forty-eighth annual ACM symposium on Theory of Computing","volume":"52 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126501746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Interactive compression for product distributions 产品分布的交互式压缩
Pub Date : 2016-06-19 DOI: 10.1145/2897518.2897537
Gillat Kol
We study the interactive compression problem: Given a two-party communication protocol with small information cost, can it be compressed so that the total number of bits communicated is also small? We consider the case where the parties have inputs that are independent of each other, and give a simulation protocol that communicates I^2 * polylog(I) bits, where I is the information cost of the original protocol. Our protocol is the first simulation protocol whose communication complexity is bounded by a polynomial in the information cost of the original protocol.
我们研究了交互压缩问题:给定一个信息成本小的双方通信协议,是否可以对其进行压缩,使通信的总比特数也小?我们考虑各方具有彼此独立的输入的情况,并给出一个模拟协议,该协议通信I^2 * polylog(I)位,其中I是原始协议的信息成本。本协议是第一个通信复杂度以原始协议的信息代价多项式为界的仿真协议。
{"title":"Interactive compression for product distributions","authors":"Gillat Kol","doi":"10.1145/2897518.2897537","DOIUrl":"https://doi.org/10.1145/2897518.2897537","url":null,"abstract":"We study the interactive compression problem: Given a two-party communication protocol with small information cost, can it be compressed so that the total number of bits communicated is also small? We consider the case where the parties have inputs that are independent of each other, and give a simulation protocol that communicates I^2 * polylog(I) bits, where I is the information cost of the original protocol. Our protocol is the first simulation protocol whose communication complexity is bounded by a polynomial in the information cost of the original protocol.","PeriodicalId":442965,"journal":{"name":"Proceedings of the forty-eighth annual ACM symposium on Theory of Computing","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121023520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Deterministic decremental single source shortest paths: beyond the o(mn) bound 确定性递减单源最短路径:超过0 (mn)界限
Pub Date : 2016-06-19 DOI: 10.1145/2897518.2897521
A. Bernstein, S. Chechik
In this paper we consider the decremental single-source shortest paths (SSSP) problem, where given a graph G and a source node s the goal is to maintain shortest paths between s and all other nodes in G under a sequence of online adversarial edge deletions. In their seminal work, Even and Shiloach [JACM 1981] presented an exact solution to the problem with only O(mn) total update time over all edge deletions. Their classic algorithm was the best known result for the decremental SSSP problem for three decades, even when approximate shortest paths are allowed. The first improvement over the Even-Shiloach algorithm was given by Bernstein and Roditty [SODA 2011], who for the case of an unweighted and undirected graph presented an approximate (1+) algorithm with constant query time and a total update time of O(n2+O(1/√logn)). This work triggered a series of new results, culminating in a recent breakthrough of Henzinger, Krinninger and Nanongkai [FOCS 14], who presented a -approximate algorithm whose total update time is near linear O(m1+ O(1/√logn)). In this paper they posed as a major open problem the question of derandomizing their result. In fact, all known improvements over the Even-Shiloach algorithm are randomized. All these algorithms maintain some truncated shortest path trees from a small subset of nodes. While in the randomized setting it is possible to “hide” these nodes from the adversary, in the deterministic setting this is impossible: the adversary can delete all edges touching these nodes, thus forcing the algorithm to choose a new set of nodes and incur a new computation of shortest paths. In this paper we present the first deterministic decremental SSSP algorithm that breaks the Even-Shiloach bound of O(mn) total update time, for unweighted and undirected graphs. Our algorithm is (1 + є) approximate and achieves a total update time of Õ(n2). Our algorithm can also achieve the same bounds in the incremental setting. It is worth mentioning that for dense instances where m = Ω(n2 − 1/√log(n)), our algorithm is also faster than all existing randomized algorithms.
本文考虑递减单源最短路径(SSSP)问题,其中给定一个图G和一个源节点s,目标是在一系列在线对抗性边删除下保持s与G中所有其他节点之间的最短路径。在他们的开创性工作中,Even和Shiloach [JACM 1981]提出了一个精确的解决方案,所有边缘删除的总更新时间仅为O(mn)。他们的经典算法是三十年来最著名的递减SSSP问题的结果,即使是在允许近似最短路径的情况下。Bernstein和Roditty [SODA 2011]对eveno - shiloach算法进行了第一次改进,对于无权无向图,他们提出了一种近似(1+)算法,查询时间恒定,总更新时间为O(n2+O(1/√logn)))。这项工作引发了一系列新的结果,最近Henzinger, Krinninger和Nanongkai的突破达到高潮[FOCS 14],他们提出了一个-近似算法,其总更新时间接近线性O(m1+ O(1/√logn)))。在这篇论文中,他们提出了一个重大的开放性问题,即结果的非随机化问题。事实上,所有已知的Even-Shiloach算法的改进都是随机的。所有这些算法都从一个小的节点子集中维护一些截断的最短路径树。虽然在随机设置中,可以对对手“隐藏”这些节点,但在确定性设置中,这是不可能的:对手可以删除与这些节点接触的所有边,从而迫使算法选择一组新的节点,并引发最短路径的新计算。在本文中,我们提出了第一个确定性递减SSSP算法,该算法打破了O(mn)总更新时间的Even-Shiloach界,用于无权无向图。我们的算法近似为(1 + n),总更新时间为Õ(n2)。我们的算法也可以在增量设置中实现相同的边界。值得一提的是,对于m = Ω(n2−1/√log(n))的密集实例,我们的算法也比所有现有的随机化算法快。
{"title":"Deterministic decremental single source shortest paths: beyond the o(mn) bound","authors":"A. Bernstein, S. Chechik","doi":"10.1145/2897518.2897521","DOIUrl":"https://doi.org/10.1145/2897518.2897521","url":null,"abstract":"In this paper we consider the decremental single-source shortest paths (SSSP) problem, where given a graph G and a source node s the goal is to maintain shortest paths between s and all other nodes in G under a sequence of online adversarial edge deletions. In their seminal work, Even and Shiloach [JACM 1981] presented an exact solution to the problem with only O(mn) total update time over all edge deletions. Their classic algorithm was the best known result for the decremental SSSP problem for three decades, even when approximate shortest paths are allowed. The first improvement over the Even-Shiloach algorithm was given by Bernstein and Roditty [SODA 2011], who for the case of an unweighted and undirected graph presented an approximate (1+) algorithm with constant query time and a total update time of O(n2+O(1/√logn)). This work triggered a series of new results, culminating in a recent breakthrough of Henzinger, Krinninger and Nanongkai [FOCS 14], who presented a -approximate algorithm whose total update time is near linear O(m1+ O(1/√logn)). In this paper they posed as a major open problem the question of derandomizing their result. In fact, all known improvements over the Even-Shiloach algorithm are randomized. All these algorithms maintain some truncated shortest path trees from a small subset of nodes. While in the randomized setting it is possible to “hide” these nodes from the adversary, in the deterministic setting this is impossible: the adversary can delete all edges touching these nodes, thus forcing the algorithm to choose a new set of nodes and incur a new computation of shortest paths. In this paper we present the first deterministic decremental SSSP algorithm that breaks the Even-Shiloach bound of O(mn) total update time, for unweighted and undirected graphs. Our algorithm is (1 + є) approximate and achieves a total update time of Õ(n2). Our algorithm can also achieve the same bounds in the incremental setting. It is worth mentioning that for dense instances where m = Ω(n2 − 1/√log(n)), our algorithm is also faster than all existing randomized algorithms.","PeriodicalId":442965,"journal":{"name":"Proceedings of the forty-eighth annual ACM symposium on Theory of Computing","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124053749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 58
Watermarking cryptographic capabilities 水印加密功能
Pub Date : 2016-06-19 DOI: 10.1145/2897518.2897651
A. Cohen, Justin Holmgren, R. Nishimaki, V. Vaikuntanathan, D. Wichs
A watermarking scheme for programs embeds some information called a mark into a program while preserving its functionality. No adversary can remove the mark without damaging the functionality of the program. In this work, we study the problem of watermarking various cryptographic programs such as pseudorandom function (PRF) evaluation, decryption, and signing. For example, given a PRF key K, we create a marked program C that evaluates the PRF F(K,). An adversary that gets C cannot come up with any program C* in which the mark is removed but which still evaluates the PRF correctly on even a small fraction of the inputs. The work of Barak, Goldreich, Impagliazzo, Rudich, Sahai, Vadhan, and Yang (CRYPTO'01 and Journal of ACM 59(2)) shows that, assuming indistinguishability obfuscation (iO), such watermarking is impossible if the marked program C evaluates the original program with perfect correctness. In this work we show that, assuming iO, such watermarking is possible if the marked program C is allowed to err with even a negligible probability, which would be undetectable to the user. Our watermarking schemes are public key, namely we use a secret marking key to embed marks in programs, and a public detection key that allows anyone to detect marks in programs. Our schemes are secure against chosen program attacks, that is even if the adversary is given oracle access to the marking functionality. We emphasize that our security notion of watermark non-removability considers arbitrary adversarial strategies to modify the marked program, in contrast to the prior works (Nishimaki, EUROCRYPT '13).
用于程序的水印方案在保留程序功能的同时将一些称为标记的信息嵌入到程序中。任何对手都无法在不破坏程序功能的情况下移除标记。在这项工作中,我们研究了各种加密程序的水印问题,如伪随机函数(PRF)评估,解密和签名。例如,给定一个PRF键K,我们创建一个计算PRF F(K,)的标记程序C。一个得到C的对手不能想出任何程序C*,其中的标记被删除,但仍然正确地评估PRF,即使是一小部分输入。Barak, Goldreich, Impagliazzo, Rudich, Sahai, Vadhan和Yang (CRYPTO'01 and Journal of ACM 59(2))的工作表明,假设不可区分混淆(iO),如果标记的程序C以完全正确的方式评估原始程序,则这种水印是不可能的。在这项工作中,我们表明,假设iO,这样的水印是可能的,如果被标记的程序C允许错误,甚至可以忽略不计的概率,这将是无法检测到的用户。我们的水印方案是公开密钥,即使用秘密标记密钥在程序中嵌入标记,以及使用公开检测密钥允许任何人检测程序中的标记。我们的方案对于选定的程序攻击是安全的,即使攻击者获得了对标记功能的oracle访问权限。我们强调,与之前的作品(Nishimaki, EUROCRYPT '13)相比,我们的水印不可移除性的安全概念考虑了任意对抗策略来修改标记程序。
{"title":"Watermarking cryptographic capabilities","authors":"A. Cohen, Justin Holmgren, R. Nishimaki, V. Vaikuntanathan, D. Wichs","doi":"10.1145/2897518.2897651","DOIUrl":"https://doi.org/10.1145/2897518.2897651","url":null,"abstract":"A watermarking scheme for programs embeds some information called a mark into a program while preserving its functionality. No adversary can remove the mark without damaging the functionality of the program. In this work, we study the problem of watermarking various cryptographic programs such as pseudorandom function (PRF) evaluation, decryption, and signing. For example, given a PRF key K, we create a marked program C that evaluates the PRF F(K,). An adversary that gets C cannot come up with any program C* in which the mark is removed but which still evaluates the PRF correctly on even a small fraction of the inputs. The work of Barak, Goldreich, Impagliazzo, Rudich, Sahai, Vadhan, and Yang (CRYPTO'01 and Journal of ACM 59(2)) shows that, assuming indistinguishability obfuscation (iO), such watermarking is impossible if the marked program C evaluates the original program with perfect correctness. In this work we show that, assuming iO, such watermarking is possible if the marked program C is allowed to err with even a negligible probability, which would be undetectable to the user. Our watermarking schemes are public key, namely we use a secret marking key to embed marks in programs, and a public detection key that allows anyone to detect marks in programs. Our schemes are secure against chosen program attacks, that is even if the adversary is given oracle access to the marking functionality. We emphasize that our security notion of watermark non-removability considers arbitrary adversarial strategies to modify the marked program, in contrast to the prior works (Nishimaki, EUROCRYPT '13).","PeriodicalId":442965,"journal":{"name":"Proceedings of the forty-eighth annual ACM symposium on Theory of Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131094087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 90
Enumerating parametric global minimum cuts by random interleaving 通过随机交错枚举参数全局最小切割
Pub Date : 2016-06-19 DOI: 10.1145/2897518.2897578
David R Karger
Recently, Aissi et al. gave new counting and algorithmic bounds for parametric minimum cuts in a graph, where each edge cost is a linear combination of multiple cost criteria and different cuts become minimum as the coefficients of the linear combination are varied. In this article, we derive better bounds using a mathematically simpler argument. We provide faster algorithms for enumerating these cuts. We give a lower bound showing our upper bounds have roughly the right degree. Our results also immediately generalize to parametric versions of other problems solved by the Contraction Algorithm, including approximate min-cuts, multi-way cuts, and a matroid optimization problem. We also give a first generalization to nonlinear parametric minimum cuts.
最近,Aissi等人给出了图中参数最小切割的新计数和算法界,其中每个边缘成本是多个成本标准的线性组合,不同的切割随着线性组合系数的变化而变得最小。在本文中,我们使用一个数学上更简单的论证来推导更好的界。我们提供了更快的算法来枚举这些切割。我们给出了下界,表明上界的度数大致正确。我们的结果也立即推广到其他由收缩算法解决的问题的参数化版本,包括近似最小切割,多路切割和一个矩阵优化问题。我们也给出了非线性参数最小割的第一个推广。
{"title":"Enumerating parametric global minimum cuts by random interleaving","authors":"David R Karger","doi":"10.1145/2897518.2897578","DOIUrl":"https://doi.org/10.1145/2897518.2897578","url":null,"abstract":"Recently, Aissi et al. gave new counting and algorithmic bounds for parametric minimum cuts in a graph, where each edge cost is a linear combination of multiple cost criteria and different cuts become minimum as the coefficients of the linear combination are varied. In this article, we derive better bounds using a mathematically simpler argument. We provide faster algorithms for enumerating these cuts. We give a lower bound showing our upper bounds have roughly the right degree. Our results also immediately generalize to parametric versions of other problems solved by the Contraction Algorithm, including approximate min-cuts, multi-way cuts, and a matroid optimization problem. We also give a first generalization to nonlinear parametric minimum cuts.","PeriodicalId":442965,"journal":{"name":"Proceedings of the forty-eighth annual ACM symposium on Theory of Computing","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127714522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Maximizing determinants under partition constraints 在划分约束下最大化行列式
Pub Date : 2016-06-19 DOI: 10.1145/2897518.2897649
Aleksandar Nikolov, Mohit Singh
Given a positive semidefinte matrix L whose columns and rows are indexed by a set U, and a partition matroid M=(U, I), we study the problem of selecting a basis B of M such that the determinant of the submatrix of L induced by the rows and columns in B is maximized. This problem appears in many areas including determinantal point processes in machine learning, experimental design, geographical placement problems, discrepancy theory and computational geometry to model subset selection problems that incorporate diversity. Our main result is to give a geometric concave program for the problem which approximates the optimum value within a factor of er+o(r), where r denotes the rank of the partition matroid M. We bound the integrality gap of the geometric concave program by giving a polynomial time randomized rounding algorithm. To analyze the rounding algorithm, we relate the solution of our algorithm as well the objective value of the relaxation to a certain stable polynomial. To prove the approximation guarantee, we utilize a general inequality about stable polynomials proved by Gurvits in the context of estimating the permanent of a doubly stochastic matrix.
给定一个列、行以集合U为索引的正半定矩阵L,以及一个划分矩阵M=(U, I),研究了选取M的一组基B,使由B中的行、列引起的L的子矩阵的行列式最大的问题。这个问题出现在许多领域,包括机器学习中的决定性点过程、实验设计、地理位置问题、差异理论和计算几何,以模拟包含多样性的子集选择问题。我们的主要结果是给出了在er+o(r)因子范围内逼近最优值的几何凹规划,其中r表示划分矩阵m的秩。我们通过给出多项式时间随机舍入算法来限定几何凹规划的完整性间隙。为了分析舍入算法,我们将算法的解和松弛的目标值联系到一个稳定的多项式上。为了证明近似保证,我们利用Gurvits证明的一个关于稳定多项式的一般不等式来估计一个双随机矩阵的永久性。
{"title":"Maximizing determinants under partition constraints","authors":"Aleksandar Nikolov, Mohit Singh","doi":"10.1145/2897518.2897649","DOIUrl":"https://doi.org/10.1145/2897518.2897649","url":null,"abstract":"Given a positive semidefinte matrix L whose columns and rows are indexed by a set U, and a partition matroid M=(U, I), we study the problem of selecting a basis B of M such that the determinant of the submatrix of L induced by the rows and columns in B is maximized. This problem appears in many areas including determinantal point processes in machine learning, experimental design, geographical placement problems, discrepancy theory and computational geometry to model subset selection problems that incorporate diversity. Our main result is to give a geometric concave program for the problem which approximates the optimum value within a factor of er+o(r), where r denotes the rank of the partition matroid M. We bound the integrality gap of the geometric concave program by giving a polynomial time randomized rounding algorithm. To analyze the rounding algorithm, we relate the solution of our algorithm as well the objective value of the relaxation to a certain stable polynomial. To prove the approximation guarantee, we utilize a general inequality about stable polynomials proved by Gurvits in the context of estimating the permanent of a doubly stochastic matrix.","PeriodicalId":442965,"journal":{"name":"Proceedings of the forty-eighth annual ACM symposium on Theory of Computing","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130194169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
Algebraic attacks against random local functions and their countermeasures 随机局部函数的代数攻击及其对策
Pub Date : 2016-06-19 DOI: 10.1145/2897518.2897554
B. Applebaum, Shachar Lovett
Suppose that you have n truly random bits x=(x1,…,xn) and you wish to use them to generate m≫ n pseudorandom bits y=(y1,…, ym) using a local mapping, i.e., each yi should depend on at most d=O(1) bits of x. In the polynomial regime of m=ns, s>1, the only known solution, originates from (Goldreich, ECCC 2000), is based on Random Local Functions: Compute yi by applying some fixed (public) d-ary predicate P to a random (public) tuple of distinct inputs (xi1,…,xid). Our goal in this paper is to understand, for any value of s, how the pseudorandomness of the resulting sequence depends on the choice of the underlying predicate. We derive the following results: (1) We show that pseudorandomness against F2-linear adversaries (i.e., the distribution y has low-bias) is achieved if the predicate is (a) k=Ω(s)-resilience, i.e., uncorrelated with any k-subset of its inputs, and (b) has algebraic degree of Ω(s) even after fixing Ω(s) of its inputs. We also show that these requirements are necessary, and so they form a tight characterization (up to constants) of security against linear attacks. Our positive result shows that a d-local low-bias generator can have output length of nΩ(d), answering an open question of Mossel, Shpilka and Trevisan (FOCS, 2003). Our negative result shows that a candidate for pseudorandom generator proposed by the first author (computational complexity, 2015) and by O’Donnell and Witmer (CCC 2014) is insecure. We use similar techniques to refute a conjecture of Feldman, Perkins and Vempala (STOC 2015) regarding the hardness of planted constraint satisfaction problems. (2) Motivated by the cryptanalysis literature, we consider security against algebraic attacks. We provide the first theoretical treatment of such attacks by formalizing a general notion of algebraic inversion and distinguishing attacks based on the Polynomial Calculus proof system. We show that algebraic attacks succeed if and only if there exist a degree e=O(s) non-zero polynomial Q whose roots cover the roots of P or cover the roots of P’s complement. As a corollary, we obtain the first example of a predicate P for which the generated sequence y passes all linear tests but fails to pass some polynomial-time computable test, answering an open question posed by the first author (Question 4.9, computational complexity 2015).
假设你有n个真正随机位x = (x1,…,xn)和您希望使用它们来生成m≫n伪随机比特y = (y1,…,ym)使用本地映射,也就是,最多每个易建联应该是依靠d = O(1)的x m = ns的多项式政权,s > 1,唯一已知的解决方案,源于(Goldreich ECCC 2000),是基于随机局部功能:计算易通过应用一些固定的(公共)d-ary谓词P随机(公共)元组不同的输入(ξ1,…,xid)。我们在本文中的目标是理解,对于任意s值,结果序列的伪随机性如何依赖于底层谓词的选择。我们得出以下结果:(1)我们表明,如果谓词是(a) k=Ω(s)-弹性,即与其输入的任何k子集不相关,则对f2 -线性对手的伪随机性(即,分布y具有低偏差)是实现的,并且(b)即使在固定Ω(s)之后,其输入的代数度也为Ω(s)。我们还说明了这些需求是必要的,因此它们形成了针对线性攻击的安全性的严格特征(直到常数)。我们的积极结果表明,d局部低偏置发生器可以具有nΩ(d)的输出长度,回答了Mossel, Shpilka和Trevisan (FOCS, 2003)的一个开放问题。我们的否定结果表明,第一作者(computational complexity, 2015)和O 'Donnell and Witmer (CCC 2014)提出的伪随机生成器候选方案是不安全的。我们使用类似的技术来反驳Feldman, Perkins和Vempala (STOC 2015)关于种植约束满足问题的硬度的猜想。(2)受密码分析文献的启发,我们考虑了针对代数攻击的安全性。我们通过形式化代数反转的一般概念和基于多项式微积分证明系统的区分攻击,提供了这种攻击的第一个理论处理。我们证明代数攻击成功当且仅当存在一个阶e=O(s)非零多项式Q,其根覆盖P的根或覆盖P的补的根。作为推论,我们得到了谓词P的第一个例子,其中生成的序列y通过了所有线性测试,但未能通过一些多项式时间可计算测试,回答了第一作者提出的一个开放问题(问题4.9,计算复杂性2015)。
{"title":"Algebraic attacks against random local functions and their countermeasures","authors":"B. Applebaum, Shachar Lovett","doi":"10.1145/2897518.2897554","DOIUrl":"https://doi.org/10.1145/2897518.2897554","url":null,"abstract":"Suppose that you have n truly random bits x=(x1,…,xn) and you wish to use them to generate m≫ n pseudorandom bits y=(y1,…, ym) using a local mapping, i.e., each yi should depend on at most d=O(1) bits of x. In the polynomial regime of m=ns, s>1, the only known solution, originates from (Goldreich, ECCC 2000), is based on Random Local Functions: Compute yi by applying some fixed (public) d-ary predicate P to a random (public) tuple of distinct inputs (xi1,…,xid). Our goal in this paper is to understand, for any value of s, how the pseudorandomness of the resulting sequence depends on the choice of the underlying predicate. We derive the following results: (1) We show that pseudorandomness against F2-linear adversaries (i.e., the distribution y has low-bias) is achieved if the predicate is (a) k=Ω(s)-resilience, i.e., uncorrelated with any k-subset of its inputs, and (b) has algebraic degree of Ω(s) even after fixing Ω(s) of its inputs. We also show that these requirements are necessary, and so they form a tight characterization (up to constants) of security against linear attacks. Our positive result shows that a d-local low-bias generator can have output length of nΩ(d), answering an open question of Mossel, Shpilka and Trevisan (FOCS, 2003). Our negative result shows that a candidate for pseudorandom generator proposed by the first author (computational complexity, 2015) and by O’Donnell and Witmer (CCC 2014) is insecure. We use similar techniques to refute a conjecture of Feldman, Perkins and Vempala (STOC 2015) regarding the hardness of planted constraint satisfaction problems. (2) Motivated by the cryptanalysis literature, we consider security against algebraic attacks. We provide the first theoretical treatment of such attacks by formalizing a general notion of algebraic inversion and distinguishing attacks based on the Polynomial Calculus proof system. We show that algebraic attacks succeed if and only if there exist a degree e=O(s) non-zero polynomial Q whose roots cover the roots of P or cover the roots of P’s complement. As a corollary, we obtain the first example of a predicate P for which the generated sequence y passes all linear tests but fails to pass some polynomial-time computable test, answering an open question posed by the first author (Question 4.9, computational complexity 2015).","PeriodicalId":442965,"journal":{"name":"Proceedings of the forty-eighth annual ACM symposium on Theory of Computing","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133870350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 65
Poly-logarithmic Frege depth lower bounds via an expander switching lemma 基于扩展开关引理的多对数Frege深度下界
Pub Date : 2016-06-19 DOI: 10.1145/2897518.2897637
T. Pitassi, Benjamin Rossman, R. Servedio, Li-Yang Tan
We show that any polynomial-size Frege refutation of a certain linear-size unsatisfiable 3-CNF formula over n variables must have depth Ω(√logn). This is an exponential improvement over the previous best results (Pitassi et al. 1993, Krajíček et al. 1995, Ben-Sasson 2002) which give Ω(loglogn) lower bounds. The 3-CNF formulas which we use to establish this result are Tseitin contradictions on 3-regular expander graphs. In more detail, our main result is a proof that for every d, any depth-d Frege refutation of the Tseitin contradiction over these n-node graphs must have size nΩ((logn)/d2). A key ingredient of our approach is a new switching lemma for a carefully designed random restriction process over these expanders. These random restrictions reduce a Tseitin instance on a 3-regular n-node expander to a Tseitin instance on a random subgraph which is a topological embedding of a 3-regular n′-node expander, for some n′ which is not too much less than n. Our result involves Ω(√logn) iterative applications of this type of random restriction.
我们证明了对n个变量上的某个线性大小的不可满足3-CNF公式的任何多项式大小的Frege反驳必须具有深度Ω(√logn)。与之前的最佳结果(Pitassi et al. 1993, Krajíček et al. 1995, Ben-Sasson 2002)相比,这是一个指数级的改进,后者给出了Ω(对数)下界。我们用来建立这一结果的3-CNF公式是3正则展开图上的tseittin矛盾。更详细地说,我们的主要结果是证明对于每一个d,在这些n节点图上对tseittin矛盾的任何深度d Frege反驳必须具有nΩ((logn)/d2)的大小。我们方法的一个关键组成部分是一个新的开关引理,用于在这些展开式上精心设计的随机限制过程。这些随机限制将一个3-正则n节点展开器上的tseittin实例减少到一个随机子图上的tseittin实例,该子图是一个3-正则n '节点展开器的拓扑嵌入,对于一些n '并不比n小太多。我们的结果涉及这种类型的随机限制的Ω(√logn)迭代应用。
{"title":"Poly-logarithmic Frege depth lower bounds via an expander switching lemma","authors":"T. Pitassi, Benjamin Rossman, R. Servedio, Li-Yang Tan","doi":"10.1145/2897518.2897637","DOIUrl":"https://doi.org/10.1145/2897518.2897637","url":null,"abstract":"We show that any polynomial-size Frege refutation of a certain linear-size unsatisfiable 3-CNF formula over n variables must have depth Ω(√logn). This is an exponential improvement over the previous best results (Pitassi et al. 1993, Krajíček et al. 1995, Ben-Sasson 2002) which give Ω(loglogn) lower bounds. The 3-CNF formulas which we use to establish this result are Tseitin contradictions on 3-regular expander graphs. In more detail, our main result is a proof that for every d, any depth-d Frege refutation of the Tseitin contradiction over these n-node graphs must have size nΩ((logn)/d2). A key ingredient of our approach is a new switching lemma for a carefully designed random restriction process over these expanders. These random restrictions reduce a Tseitin instance on a 3-regular n-node expander to a Tseitin instance on a random subgraph which is a topological embedding of a 3-regular n′-node expander, for some n′ which is not too much less than n. Our result involves Ω(√logn) iterative applications of this type of random restriction.","PeriodicalId":442965,"journal":{"name":"Proceedings of the forty-eighth annual ACM symposium on Theory of Computing","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130972586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
On the size of homogeneous and of depth four formulas with low individual degree 在尺寸均匀性和深度四种公式上具有较低的个别化程度
Pub Date : 2016-06-19 DOI: 10.1145/2897518.2897550
N. Kayal, Chandan Saha, Sébastien Tavenas
Let r be an integer. Let us call a polynomial f as a multi-r-ic polynomial if the degree of f with respect to any variable is at most r (this generalizes the notion of multilinear polynomials). We investigate arithmetic circuits in which the output is syntactically forced to be a multi-r-ic polynomial and refer to these as multi-r-ic circuits. Specifically, first define the formal degree of a node a with respect to a variable x inductively as follows. For a leaf it is 1 if a is labelled with x and zero otherwise; for an internal node labelled with * (respectively +) it is the sum of (respectively the maximum of) the formal degrees of the children with respect to x. We call an arithmetic circuit as a multi-r-ic circuit if the formal degree of the output node with respect to any variable is at most r. We prove lower bounds for various subclasses of multi-r-ic circuits.
设r为整数。我们称多项式f为多重r-ic多项式,如果f对任意变量的阶不超过r(这概括了多重线性多项式的概念)。我们研究的算术电路中,其输出在语法上被迫是一个多r-ic多项式,并将这些称为多r-ic电路。具体来说,首先归纳定义节点a相对于变量x的形式度,如下所示。对于叶节点,如果a被标记为x,则为1,否则为0;对于标记为*(分别为+)的内部节点,它是子节点相对于x的形式度的和(分别为最大值)。如果输出节点相对于任何变量的形式度不超过r,我们称算术电路为多r-ic电路。我们证明了多r-ic电路的各种子类的下界。
{"title":"On the size of homogeneous and of depth four formulas with low individual degree","authors":"N. Kayal, Chandan Saha, Sébastien Tavenas","doi":"10.1145/2897518.2897550","DOIUrl":"https://doi.org/10.1145/2897518.2897550","url":null,"abstract":"Let r be an integer. Let us call a polynomial f as a multi-r-ic polynomial if the degree of f with respect to any variable is at most r (this generalizes the notion of multilinear polynomials). We investigate arithmetic circuits in which the output is syntactically forced to be a multi-r-ic polynomial and refer to these as multi-r-ic circuits. Specifically, first define the formal degree of a node a with respect to a variable x inductively as follows. For a leaf it is 1 if a is labelled with x and zero otherwise; for an internal node labelled with * (respectively +) it is the sum of (respectively the maximum of) the formal degrees of the children with respect to x. We call an arithmetic circuit as a multi-r-ic circuit if the formal degree of the output node with respect to any variable is at most r. We prove lower bounds for various subclasses of multi-r-ic circuits.","PeriodicalId":442965,"journal":{"name":"Proceedings of the forty-eighth annual ACM symposium on Theory of Computing","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127673470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
期刊
Proceedings of the forty-eighth annual ACM symposium on Theory of Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1