27,809 research outputs found

    Fully leakage-resilient signatures revisited: Graceful degradation, noisy leakage, and construction in the bounded-retrieval model

    Get PDF
    We construct new leakage-resilient signature schemes. Our schemes remain unforgeable against an adversary leaking arbitrary (yet bounded) information on the entire state of the signer (sometimes known as fully leakage resilience), including the random coin tosses of the signing algorithm. The main feature of our constructions is that they offer a graceful degradation of security in situations where standard existential unforgeability is impossible

    Minimum cycle and homology bases of surface embedded graphs

    Get PDF
    We study the problems of finding a minimum cycle basis (a minimum weight set of cycles that form a basis for the cycle space) and a minimum homology basis (a minimum weight set of cycles that generates the 11-dimensional (Z2\mathbb{Z}_2)-homology classes) of an undirected graph embedded on a surface. The problems are closely related, because the minimum cycle basis of a graph contains its minimum homology basis, and the minimum homology basis of the 11-skeleton of any graph is exactly its minimum cycle basis. For the minimum cycle basis problem, we give a deterministic O(nω+22gn2+m)O(n^\omega+2^{2g}n^2+m)-time algorithm for graphs embedded on an orientable surface of genus gg. The best known existing algorithms for surface embedded graphs are those for general graphs: an O(mω)O(m^\omega) time Monte Carlo algorithm and a deterministic O(nm2/logn+n2m)O(nm^2/\log n + n^2 m) time algorithm. For the minimum homology basis problem, we give a deterministic O((g+b)3nlogn+m)O((g+b)^3 n \log n + m)-time algorithm for graphs embedded on an orientable or non-orientable surface of genus gg with bb boundary components, assuming shortest paths are unique, improving on existing algorithms for many values of gg and nn. The assumption of unique shortest paths can be avoided with high probability using randomization or deterministically by increasing the running time of the homology basis algorithm by a factor of O(logn)O(\log n).Comment: A preliminary version of this work was presented at the 32nd Annual International Symposium on Computational Geometr

    Stochastic Combinatorial Optimization via Poisson Approximation

    Full text link
    We study several stochastic combinatorial problems, including the expected utility maximization problem, the stochastic knapsack problem and the stochastic bin packing problem. A common technical challenge in these problems is to optimize some function of the sum of a set of random variables. The difficulty is mainly due to the fact that the probability distribution of the sum is the convolution of a set of distributions, which is not an easy objective function to work with. To tackle this difficulty, we introduce the Poisson approximation technique. The technique is based on the Poisson approximation theorem discovered by Le Cam, which enables us to approximate the distribution of the sum of a set of random variables using a compound Poisson distribution. We first study the expected utility maximization problem introduced recently [Li and Despande, FOCS11]. For monotone and Lipschitz utility functions, we obtain an additive PTAS if there is a multidimensional PTAS for the multi-objective version of the problem, strictly generalizing the previous result. For the stochastic bin packing problem (introduced in [Kleinberg, Rabani and Tardos, STOC97]), we show there is a polynomial time algorithm which uses at most the optimal number of bins, if we relax the size of each bin and the overflow probability by eps. For stochastic knapsack, we show a 1+eps-approximation using eps extra capacity, even when the size and reward of each item may be correlated and cancelations of items are allowed. This generalizes the previous work [Balghat, Goel and Khanna, SODA11] for the case without correlation and cancelation. Our algorithm is also simpler. We also present a factor 2+eps approximation algorithm for stochastic knapsack with cancelations. the current known approximation factor of 8 [Gupta, Krishnaswamy, Molinaro and Ravi, FOCS11].Comment: 42 pages, 1 figure, Preliminary version appears in the Proceeding of the 45th ACM Symposium on the Theory of Computing (STOC13

    A Method for Finding Structured Sparse Solutions to Non-negative Least Squares Problems with Applications

    Full text link
    Demixing problems in many areas such as hyperspectral imaging and differential optical absorption spectroscopy (DOAS) often require finding sparse nonnegative linear combinations of dictionary elements that match observed data. We show how aspects of these problems, such as misalignment of DOAS references and uncertainty in hyperspectral endmembers, can be modeled by expanding the dictionary with grouped elements and imposing a structured sparsity assumption that the combinations within each group should be sparse or even 1-sparse. If the dictionary is highly coherent, it is difficult to obtain good solutions using convex or greedy methods, such as non-negative least squares (NNLS) or orthogonal matching pursuit. We use penalties related to the Hoyer measure, which is the ratio of the l1l_1 and l2l_2 norms, as sparsity penalties to be added to the objective in NNLS-type models. For solving the resulting nonconvex models, we propose a scaled gradient projection algorithm that requires solving a sequence of strongly convex quadratic programs. We discuss its close connections to convex splitting methods and difference of convex programming. We also present promising numerical results for example DOAS analysis and hyperspectral demixing problems.Comment: 38 pages, 14 figure

    The signature of a splice

    Get PDF
    We study the behavior of the signature of colored links [Flo05, CF08] under the splice operation. We extend the construction to colored links in integral homology spheres and show that the signature is almost additive, with a correction term independent of the links. We interpret this correction term as the signature of a generalized Hopf link and give a simple closed formula to compute it.Comment: Updated version. Sign corrected in Theorems 2.2 and 2.10 of the previous version. Also Corollary 2.6 was corrected and an Example added. 24 pages, 5 figures. To appear in IMR

    Various L2-signatures and a topological L2-signature theorem

    Full text link
    For a normal covering over a closed oriented topological manifold we give a proof of the L2-signature theorem with twisted coefficients, using Lipschitz structures and the Lipschitz signature operator introduced by Teleman. We also prove that the L-theory isomorphism conjecture as well as the C^*_max-version of the Baum-Connes conjecture imply the L2-signature theorem for a normal covering over a Poincar space, provided that the group of deck transformations is torsion-free. We discuss the various possible definitions of L2-signatures (using the signature operator, using the cap product of differential forms, using a cap product in cellular L2-cohomology,...) in this situation, and prove that they all coincide.Comment: comma in metadata (author field) added
    corecore