53 research outputs found
The Freiman--Ruzsa Theorem over Finite Fields
Let G be a finite abelian group of torsion r and let A be a subset of G. The
Freiman--Ruzsa theorem asserts that if |A+A| < K|A| then A is contained in a
coset of a subgroup of G of size at most r^{K^4}K^2|A|. It was conjectured by
Ruzsa that the subgroup size can be reduced to r^{CK}|A| for some absolute
constant C >= 2. This conjecture was verified for r = 2 in a sequence of recent
works, which have, in fact, yielded a tight bound. In this work, we establish
the same conjecture for any prime torsion
Access Structure Hiding Secret Sharing from Novel Set Systems and Vector Families
Secret sharing provides a means to distribute shares of a secret such that
any authorized subset of shares, specified by an access structure, can be
pooled together to recompute the secret. The standard secret sharing model
requires public access structures, which violates privacy and facilitates the
adversary by revealing high-value targets. In this paper, we address this
shortcoming by introducing \emph{hidden access structures}, which remain secret
until some authorized subset of parties collaborate. The central piece of this
work is the construction of a set-system with strictly greater
than subsets of a set
of elements. Our set-system is defined over ,
where is a non-prime-power, such that the size of each set in
is divisible by but the sizes of their pairwise intersections are not
divisible by , unless one set is a subset of another. We derive a vector
family from such that superset-subset relationships
in are represented by inner products in . We use
to "encode" the access structures and thereby develop the first
\emph{access structure hiding} secret sharing scheme. For a setting with
parties, our scheme supports out of the
total monotone access structures, and its maximum
share size for any access structures is . The scheme assumes semi-honest polynomial-time parties, and its
security relies on the Generalized Diffie-Hellman assumption.Comment: This is the full version of the paper that appears in D. Kim et al.
(Eds.): COCOON 2020 (The 26th International Computing and Combinatorics
Conference), LNCS 12273, pp. 246-261. This version contains tighter bounds on
the maximum share size, and the total number of access structures supporte
Polynomials that Sign Represent Parity and Descartes' Rule of Signs
A real polynomial sign represents if
for every , the sign of equals
. Such sign representations are well-studied in computer
science and have applications to computational complexity and computational
learning theory. In this work, we present a systematic study of tradeoffs
between degree and sparsity of sign representations through the lens of the
parity function. We attempt to prove bounds that hold for any choice of set
. We show that sign representing parity over with the
degree in each variable at most requires sparsity at least . We show
that a tradeoff exists between sparsity and degree, by exhibiting a sign
representation that has higher degree but lower sparsity. We show a lower bound
of on the sparsity of polynomials of any degree representing
parity over . We prove exact bounds on the sparsity of such
polynomials for any two element subset . The main tool used is Descartes'
Rule of Signs, a classical result in algebra, relating the sparsity of a
polynomial to its number of real roots. As an application, we use bounds on
sparsity to derive circuit lower bounds for depth-two AND-OR-NOT circuits with
a Threshold Gate at the top. We use this to give a simple proof that such
circuits need size to compute parity, which improves the previous bound
of due to Goldmann (1997). We show a tight lower bound of
for the inner product function over .Comment: To appear in Computational Complexit
Locally decodable codes and the failure of cotype for projective tensor products
It is shown that for every there exists a Banach space
of finite cotype such that the projective tensor product \ell_p\tp X fails to
have finite cotype. More generally, if satisfy
then
\ell_{p_1}\tp\ell_{p_2}\tp\ell_{p_3} does not have finite cotype. This is a
proved via a connection to the theory of locally decodable codes
Submodular Minimization Under Congruency Constraints
Submodular function minimization (SFM) is a fundamental and efficiently
solvable problem class in combinatorial optimization with a multitude of
applications in various fields. Surprisingly, there is only very little known
about constraint types under which SFM remains efficiently solvable. The
arguably most relevant non-trivial constraint class for which polynomial SFM
algorithms are known are parity constraints, i.e., optimizing only over sets of
odd (or even) cardinality. Parity constraints capture classical combinatorial
optimization problems like the odd-cut problem, and they are a key tool in a
recent technique to efficiently solve integer programs with a constraint matrix
whose subdeterminants are bounded by two in absolute value.
We show that efficient SFM is possible even for a significantly larger class
than parity constraints, by introducing a new approach that combines techniques
from Combinatorial Optimization, Combinatorics, and Number Theory. In
particular, we can show that efficient SFM is possible over all sets (of any
given lattice) of cardinality r mod m, as long as m is a constant prime power.
This covers generalizations of the odd-cut problem with open complexity status,
and with relevance in the context of integer programming with higher
subdeterminants. To obtain our results, we establish a connection between the
correctness of a natural algorithm, and the inexistence of set systems with
specific combinatorial properties. We introduce a general technique to disprove
the existence of such set systems, which allows for obtaining extensions of our
results beyond the above-mentioned setting. These extensions settle two open
questions raised by Geelen and Kapadia [Combinatorica, 2017] in the context of
computing the girth and cogirth of certain types of binary matroids
- …