28,777 research outputs found
Exotic complex Hadamard matrices, and their equivalence
In this paper we use a design theoretical approach to construct new,
previously unknown complex Hadamard matrices. Our methods generalize and extend
the earlier results of de la Harpe--Jones and Munemasa--Watatani and offer a
theoretical explanation for the existence of some sporadic examples of complex
Hadamard matrices in the existing literature. As it is increasingly difficult
to distinguish inequivalent matrices from each other, we propose a new
invariant, the fingerprint of complex Hadamard matrices. As a side result, we
refute a conjecture of Koukouvinos et al. on (n-8)x(n-8) minors of real
Hadamard matrices.Comment: 10 pages. To appear in Cryptography and Communications: Discrete
Structures, Boolean Functions and Sequence
Separations of Matroid Freeness Properties
Properties of Boolean functions on the hypercube invariant with respect to
linear transformations of the domain are among the most well-studied properties
in the context of property testing. In this paper, we study the fundamental
class of linear-invariant properties called matroid freeness properties. These
properties have been conjectured to essentially coincide with all testable
linear-invariant properties, and a recent sequence of works has established
testability for increasingly larger subclasses. One question left open,
however, is whether the infinitely many syntactically different properties
recently shown testable in fact correspond to new, semantically distinct ones.
This is a crucial issue since it has also been shown that there exist
subclasses of these properties for which an infinite set of syntactically
different representations collapse into one of a small, finite set of
properties, all previously known to be testable.
An important question is therefore to understand the semantics of matroid
freeness properties, and in particular when two syntactically different
properties are truly distinct. We shed light on this problem by developing a
method for determining the relation between two matroid freeness properties P
and Q. Furthermore, we show that there is a natural subclass of matroid
freeness properties such that for any two properties P and Q from this
subclass, a strong dichotomy must hold: either P is contained in Q or the two
properties are "well separated." As an application of this method, we exhibit
new, infinite hierarchies of testable matroid freeness properties such that at
each level of the hierarchy, there are functions that are far from all
functions lying in lower levels of the hierarchy. Our key technical tool is an
apparently new notion of maps between linear matroids, called matroid
homomorphisms, that might be of independent interest
Testing Linear-Invariant Non-Linear Properties
We consider the task of testing properties of Boolean functions that are
invariant under linear transformations of the Boolean cube. Previous work in
property testing, including the linearity test and the test for Reed-Muller
codes, has mostly focused on such tasks for linear properties. The one
exception is a test due to Green for "triangle freeness": a function
f:\cube^{n}\to\cube satisfies this property if do not all
equal 1, for any pair x,y\in\cube^{n}.
Here we extend this test to a more systematic study of testing for
linear-invariant non-linear properties. We consider properties that are
described by a single forbidden pattern (and its linear transformations), i.e.,
a property is given by points v_{1},...,v_{k}\in\cube^{k} and
f:\cube^{n}\to\cube satisfies the property that if for all linear maps
L:\cube^{k}\to\cube^{n} it is the case that do
not all equal 1. We show that this property is testable if the underlying
matroid specified by is a graphic matroid. This extends
Green's result to an infinite class of new properties.
Our techniques extend those of Green and in particular we establish a link
between the notion of "1-complexity linear systems" of Green and Tao, and
graphic matroids, to derive the results.Comment: This is the full version; conference version appeared in the
proceedings of STACS 200
Galois correspondence for counting quantifiers
We introduce a new type of closure operator on the set of relations,
max-implementation, and its weaker analog max-quantification. Then we show that
approximation preserving reductions between counting constraint satisfaction
problems (#CSPs) are preserved by these two types of closure operators.
Together with some previous results this means that the approximation
complexity of counting CSPs is determined by partial clones of relations that
additionally closed under these new types of closure operators. Galois
correspondence of various kind have proved to be quite helpful in the study of
the complexity of the CSP. While we were unable to identify a Galois
correspondence for partial clones closed under max-implementation and
max-quantification, we obtain such results for slightly different type of
closure operators, k-existential quantification. This type of quantifiers are
known as counting quantifiers in model theory, and often used to enhance first
order logic languages. We characterize partial clones of relations closed under
k-existential quantification as sets of relations invariant under a set of
partial functions that satisfy the condition of k-subset surjectivity. Finally,
we give a description of Boolean max-co-clones, that is, sets of relations on
{0,1} closed under max-implementations.Comment: 28 pages, 2 figure
Systematic Construction of Nonlinear Product Attacks on Block Ciphers
A major open problem in block cipher cryptanalysis is discovery of new invariant properties of complex type. Recent papers show that this can be achieved for SCREAM, Midori64, MANTIS-4, T-310 or for DES with modified S-boxes. Until now such attacks are hard to find and seem to happen by some sort of incredible coincidence. In this paper we abstract the attack from any particular block cipher. We study these attacks in terms of transformations on multivariate polynomials. We shall demonstrate how numerous variables including key variables may sometimes be eliminated and at the end two very complex Boolean polynomials will become equal. We present a general construction of an attack where multiply all the polynomials lying on one or several cycles. Then under suitable conditions the non-linear functions involved will be eliminated totally. We obtain a periodic invariant property holding for any number of rounds. A major difficulty with invariant attacks is that they typically work only for some keys. In T-310 our attack works for any key and also in spite of the presence of round constants
The quantum adversary method and classical formula size lower bounds
We introduce two new complexity measures for Boolean functions, or more
generally for functions of the form f:S->T. We call these measures sumPI and
maxPI. The quantity sumPI has been emerging through a line of research on
quantum query complexity lower bounds via the so-called quantum adversary
method [Amb02, Amb03, BSS03, Zha04, LM04], culminating in [SS04] with the
realization that these many different formulations are in fact equivalent.
Given that sumPI turns out to be such a robust invariant of a function, we
begin to investigate this quantity in its own right and see that it also has
applications to classical complexity theory.
As a surprising application we show that sumPI^2(f) is a lower bound on the
formula size, and even, up to a constant multiplicative factor, the
probabilistic formula size of f. We show that several formula size lower bounds
in the literature, specifically Khrapchenko and its extensions [Khr71, Kou93],
including a key lemma of [Has98], are in fact special cases of our method.
The second quantity we introduce, maxPI(f), is always at least as large as
sumPI(f), and is derived from sumPI in such a way that maxPI^2(f) remains a
lower bound on formula size. While sumPI(f) is always a lower bound on the
quantum query complexity of f, this is not the case in general for maxPI(f). A
strong advantage of sumPI(f) is that it has both primal and dual
characterizations, and thus it is relatively easy to give both upper and lower
bounds on the sumPI complexity of functions. To demonstrate this, we look at a
few concrete examples, for three functions: recursive majority of three, a
function defined by Ambainis, and the collision problem.Comment: Appears in Conference on Computational Complexity 200
- …