721 research outputs found

    Computationally Data-Independent Memory Hard Functions

    Get PDF
    Memory hard functions (MHFs) are an important cryptographic primitive that are used to design egalitarian proofs of work and in the construction of moderately expensive key-derivation functions resistant to brute-force attacks. Broadly speaking, MHFs can be divided into two categories: data-dependent memory hard functions (dMHFs) and data-independent memory hard functions (iMHFs). iMHFs are resistant to certain side-channel attacks as the memory access pattern induced by the honest evaluation algorithm is independent of the potentially sensitive input e.g., password. While dMHFs are potentially vulnerable to side-channel attacks (the induced memory access pattern might leak useful information to a brute-force attacker), they can achieve higher cumulative memory complexity (CMC) in comparison than an iMHF. In particular, any iMHF that can be evaluated in N steps on a sequential machine has CMC at most ?((N^2 log log N)/log N). By contrast, the dMHF scrypt achieves maximal CMC ?(N^2) - though the CMC of scrypt would be reduced to just ?(N) after a side-channel attack. In this paper, we introduce the notion of computationally data-independent memory hard functions (ciMHFs). Intuitively, we require that memory access pattern induced by the (randomized) ciMHF evaluation algorithm appears to be independent from the standpoint of a computationally bounded eavesdropping attacker - even if the attacker selects the initial input. We then ask whether it is possible to circumvent known upper bound for iMHFs and build a ciMHF with CMC ?(N^2). Surprisingly, we answer the question in the affirmative when the ciMHF evaluation algorithm is executed on a two-tiered memory architecture (RAM/Cache). We introduce the notion of a k-restricted dynamic graph to quantify the continuum between unrestricted dMHFs (k=n) and iMHFs (k=1). For any ? > 0 we show how to construct a k-restricted dynamic graph with k=?(N^(1-?)) that provably achieves maximum cumulative pebbling cost ?(N^2). We can use k-restricted dynamic graphs to build a ciMHF provided that cache is large enough to hold k hash outputs and the dynamic graph satisfies a certain property that we call "amenable to shuffling". In particular, we prove that the induced memory access pattern is indistinguishable to a polynomial time attacker who can monitor the locations of read/write requests to RAM, but not cache. We also show that when k=o(N^(1/log log N))then any k-restricted graph with constant indegree has cumulative pebbling cost o(N^2). Our results almost completely characterize the spectrum of k-restricted dynamic graphs

    Inapproximability for Antiferromagnetic Spin Systems in the Tree Non-Uniqueness Region

    Full text link
    A remarkable connection has been established for antiferromagnetic 2-spin systems, including the Ising and hard-core models, showing that the computational complexity of approximating the partition function for graphs with maximum degree D undergoes a phase transition that coincides with the statistical physics uniqueness/non-uniqueness phase transition on the infinite D-regular tree. Despite this clear picture for 2-spin systems, there is little known for multi-spin systems. We present the first analog of the above inapproximability results for multi-spin systems. The main difficulty in previous inapproximability results was analyzing the behavior of the model on random D-regular bipartite graphs, which served as the gadget in the reduction. To this end one needs to understand the moments of the partition function. Our key contribution is connecting: (i) induced matrix norms, (ii) maxima of the expectation of the partition function, and (iii) attractive fixed points of the associated tree recursions (belief propagation). The view through matrix norms allows a simple and generic analysis of the second moment for any spin system on random D-regular bipartite graphs. This yields concentration results for any spin system in which one can analyze the maxima of the first moment. The connection to fixed points of the tree recursions enables an analysis of the maxima of the first moment for specific models of interest. For k-colorings we prove that for even k, in the tree non-uniqueness region (which corresponds to k<D) it is NP-hard, unless NP=RP, to approximate the number of colorings for triangle-free D-regular graphs. Our proof extends to the antiferromagnetic Potts model, and, in fact, to every antiferromagnetic model under a mild condition

    Threshold graph limits and random threshold graphs

    Full text link
    We study the limit theory of large threshold graphs and apply this to a variety of models for random threshold graphs. The results give a nice set of examples for the emerging theory of graph limits.Comment: 47 pages, 8 figure

    Minimum Number of Probes for Brain Dynamics Observability

    Full text link
    In this paper, we address the problem of placing sensor probes in the brain such that the system dynamics' are generically observable. The system dynamics whose states can encode for instance the fire-rating of the neurons or their ensemble following a neural-topological (structural) approach, and the sensors are assumed to be dedicated, i.e., can only measure a state at each time. Even though the mathematical description of brain dynamics is (yet) to be discovered, we build on its observed fractal characteristics and assume that the model of the brain activity satisfies fractional-order dynamics. Although the sensor placement explored in this paper is particularly considering the observability of brain dynamics, the proposed methodology applies to any fractional-order linear system. Thus, the main contribution of this paper is to show how to place the minimum number of dedicated sensors, i.e., sensors measuring only a state variable, to ensure generic observability in discrete-time fractional-order systems for a specified finite interval of time. Finally, an illustrative example of the main results is provided using electroencephalogram (EEG) data.Comment: arXiv admin note: text overlap with arXiv:1507.0720

    Line-Graph Lattices: Euclidean and Non-Euclidean Flat Bands, and Implementations in Circuit Quantum Electrodynamics

    Full text link
    Materials science and the study of the electronic properties of solids are a major field of interest in both physics and engineering. The starting point for all such calculations is single-electron, or non-interacting, band structure calculations, and in the limit of strong on-site confinement this can be reduced to graph-like tight-binding models. In this context, both mathematicians and physicists have developed largely independent methods for solving these models. In this paper we will combine and present results from both fields. In particular, we will discuss a class of lattices which can be realized as line graphs of other lattices, both in Euclidean and hyperbolic space. These lattices display highly unusual features including flat bands and localized eigenstates of compact support. We will use the methods of both fields to show how these properties arise and systems for classifying the phenomenology of these lattices, as well as criteria for maximizing the gaps. Furthermore, we will present a particular hardware implementation using superconducting coplanar waveguide resonators that can realize a wide variety of these lattices in both non-interacting and interacting form
    • …
    corecore