5,303 research outputs found
Deterministic Identity Testing for Sum of Read-Once Oblivious Arithmetic Branching Programs
A read-once oblivious arithmetic branching program (ROABP) is an arithmetic
branching program (ABP) where each variable occurs in at most one layer. We
give the first polynomial time whitebox identity test for a polynomial computed
by a sum of constantly many ROABPs. We also give a corresponding blackbox
algorithm with quasi-polynomial time complexity . In both the
cases, our time complexity is double exponential in the number of ROABPs.
ROABPs are a generalization of set-multilinear depth- circuits. The prior
results for the sum of constantly many set-multilinear depth- circuits were
only slightly better than brute-force, i.e. exponential-time.
Our techniques are a new interplay of three concepts for ROABP: low
evaluation dimension, basis isolating weight assignment and low-support rank
concentration. We relate basis isolation to rank concentration and extend it to
a sum of two ROABPs using evaluation dimension (or partial derivatives).Comment: 22 pages, Computational Complexity Conference, 201
Communication Complexity and Secure Function Evaluation
We suggest two new methodologies for the design of efficient secure
protocols, that differ with respect to their underlying computational models.
In one methodology we utilize the communication complexity tree (or branching
for f and transform it into a secure protocol. In other words, "any function f
that can be computed using communication complexity c can be can be computed
securely using communication complexity that is polynomial in c and a security
parameter". The second methodology uses the circuit computing f, enhanced with
look-up tables as its underlying computational model. It is possible to
simulate any RAM machine in this model with polylogarithmic blowup. Hence it is
possible to start with a computation of f on a RAM machine and transform it
into a secure protocol.
We show many applications of these new methodologies resulting in protocols
efficient either in communication or in computation. In particular, we
exemplify a protocol for the "millionaires problem", where two participants
want to compare their values but reveal no other information. Our protocol is
more efficient than previously known ones in either communication or
computation
MPC for MPC: Secure Computation on a Massively Parallel Computing Architecture
Massively Parallel Computation (MPC) is a model of computation widely believed to best capture realistic parallel computing architectures such as large-scale MapReduce and Hadoop clusters. Motivated by the fact that many data analytics tasks performed on these platforms involve sensitive user data, we initiate the theoretical exploration of how to leverage MPC architectures to enable efficient, privacy-preserving computation over massive data. Clearly if a computation task does not lend itself to an efficient implementation on MPC even without security, then we cannot hope to compute it efficiently on MPC with security. We show, on the other hand, that any task that can be efficiently computed on MPC can also be securely computed with comparable efficiency. Specifically, we show the following results:
- any MPC algorithm can be compiled to a communication-oblivious counterpart while asymptotically preserving its round and space complexity, where communication-obliviousness ensures that any network intermediary observing the communication patterns learn no information about the secret inputs;
- assuming the existence of Fully Homomorphic Encryption with a suitable notion of compactness and other standard cryptographic assumptions, any MPC algorithm can be compiled to a secure counterpart that defends against an adversary who controls not only intermediate network routers but additionally up to 1/3 - ? fraction of machines (for an arbitrarily small constant ?) - moreover, this compilation preserves the round complexity tightly, and preserves the space complexity upto a multiplicative security parameter related blowup.
As an initial exploration of this important direction, our work suggests new definitions and proposes novel protocols that blend algorithmic and cryptographic techniques
Deterministic Black-Box Identity Testing -Ordered Algebraic Branching Programs
In this paper we study algebraic branching programs (ABPs) with restrictions
on the order and the number of reads of variables in the program. Given a
permutation of variables, for a -ordered ABP (-OABP), for
any directed path from source to sink, a variable can appear at most once
on , and the order in which variables appear on must respect . An
ABP is said to be of read , if any variable appears at most times in
. Our main result pertains to the identity testing problem. Over any field
and in the black-box model, i.e. given only query access to the polynomial,
we have the following result: read -OABP computable polynomials can be
tested in \DTIME[2^{O(r\log r \cdot \log^2 n \log\log n)}].
Our next set of results investigates the computational limitations of OABPs.
It is shown that any OABP computing the determinant or permanent requires size
and read . We give a multilinear polynomial
in variables over some specifically selected field , such that
any OABP computing must read some variable at least times. We show
that the elementary symmetric polynomial of degree in variables can be
computed by a size read OABP, but not by a read OABP, for
any . Finally, we give an example of a polynomial and two
variables orders , such that can be computed by a read-once
-OABP, but where any -OABP computing must read some variable at
least $2^n
- …