19 research outputs found

    Approximating Cumulative Pebbling Cost Is Unique Games Hard

    Get PDF
    The cumulative pebbling complexity of a directed acyclic graph GG is defined as cc(G)=min⁥P∑i∣Pi∣\mathsf{cc}(G) = \min_P \sum_i |P_i|, where the minimum is taken over all legal (parallel) black pebblings of GG and ∣Pi∣|P_i| denotes the number of pebbles on the graph during round ii. Intuitively, cc(G)\mathsf{cc}(G) captures the amortized Space-Time complexity of pebbling mm copies of GG in parallel. The cumulative pebbling complexity of a graph GG is of particular interest in the field of cryptography as cc(G)\mathsf{cc}(G) is tightly related to the amortized Area-Time complexity of the Data-Independent Memory-Hard Function (iMHF) fG,Hf_{G,H} [AS15] defined using a constant indegree directed acyclic graph (DAG) GG and a random oracle H(⋅)H(\cdot). A secure iMHF should have amortized Space-Time complexity as high as possible, e.g., to deter brute-force password attacker who wants to find xx such that fG,H(x)=hf_{G,H}(x) = h. Thus, to analyze the (in)security of a candidate iMHF fG,Hf_{G,H}, it is crucial to estimate the value cc(G)\mathsf{cc}(G) but currently, upper and lower bounds for leading iMHF candidates differ by several orders of magnitude. Blocki and Zhou recently showed that it is NP\mathsf{NP}-Hard to compute cc(G)\mathsf{cc}(G), but their techniques do not even rule out an efficient (1+Δ)(1+\varepsilon)-approximation algorithm for any constant Δ>0\varepsilon>0. We show that for any constant c>0c > 0, it is Unique Games hard to approximate cc(G)\mathsf{cc}(G) to within a factor of cc. (See the paper for the full abstract.)Comment: 28 pages, updated figures and corrected typo

    Algebraic and Combinatorial Methods in Computational Complexity

    Get PDF
    At its core, much of Computational Complexity is concerned with combinatorial objects and structures. But it has often proven true that the best way to prove things about these combinatorial objects is by establishing a connection (perhaps approximate) to a more well-behaved algebraic setting. Indeed, many of the deepest and most powerful results in Computational Complexity rely on algebraic proof techniques. The PCP characterization of NP and the Agrawal-Kayal-Saxena polynomial-time primality test are two prominent examples. Recently, there have been some works going in the opposite direction, giving alternative combinatorial proofs for results that were originally proved algebraically. These alternative proofs can yield important improvements because they are closer to the underlying problems and avoid the losses in passing to the algebraic setting. A prominent example is Dinur's proof of the PCP Theorem via gap amplification which yielded short PCPs with only a polylogarithmic length blowup (which had been the focus of significant research effort up to that point). We see here (and in a number of recent works) an exciting interplay between algebraic and combinatorial techniques. This seminar aims to capitalize on recent progress and bring together researchers who are using a diverse array of algebraic and combinatorial methods in a variety of settings

    Computationally efficient error-correcting codes and holographic proofs

    Get PDF
    Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Mathematics, 1995.Includes bibliographical references (p. 139-145).by Daniel Alan Spielman.Ph.D

    The Complexity of Explicit Constructions

    Get PDF

    Higher Dimensional Discrete Cheeger Inequalities

    Full text link
    For graphs there exists a strong connection between spectral and combinatorial expansion properties. This is expressed, e.g., by the discrete Cheeger inequality, the lower bound of which states that λ(G)≀h(G)\lambda(G) \leq h(G), where λ(G)\lambda(G) is the second smallest eigenvalue of the Laplacian of a graph GG and h(G)h(G) is the Cheeger constant measuring the edge expansion of GG. We are interested in generalizations of expansion properties to finite simplicial complexes of higher dimension (or uniform hypergraphs). Whereas higher dimensional Laplacians were introduced already in 1945 by Eckmann, the generalization of edge expansion to simplicial complexes is not straightforward. Recently, a topologically motivated notion analogous to edge expansion that is based on Z2\mathbb{Z}_2-cohomology was introduced by Gromov and independently by Linial, Meshulam and Wallach. It is known that for this generalization there is no higher dimensional analogue of the lower bound of the Cheeger inequality. A different, combinatorially motivated generalization of the Cheeger constant, denoted by h(X)h(X), was studied by Parzanchevski, Rosenthal and Tessler. They showed that indeed λ(X)≀h(X)\lambda(X) \leq h(X), where λ(X)\lambda(X) is the smallest non-trivial eigenvalue of the ((k−1)(k-1)-dimensional upper) Laplacian, for the case of kk-dimensional simplicial complexes XX with complete (k−1)(k-1)-skeleton. Whether this inequality also holds for kk-dimensional complexes with non-complete (k−1)(k-1)-skeleton has been an open question. We give two proofs of the inequality for arbitrary complexes. The proofs differ strongly in the methods and structures employed, and each allows for a different kind of additional strengthening of the original result.Comment: 14 pages, 2 figure

    Isoperimetric Inequalities in Simplicial Complexes

    Full text link
    In graph theory there are intimate connections between the expansion properties of a graph and the spectrum of its Laplacian. In this paper we define a notion of combinatorial expansion for simplicial complexes of general dimension, and prove that similar connections exist between the combinatorial expansion of a complex, and the spectrum of the high dimensional Laplacian defined by Eckmann. In particular, we present a Cheeger-type inequality, and a high-dimensional Expander Mixing Lemma. As a corollary, using the work of Pach, we obtain a connection between spectral properties of complexes and Gromov's notion of geometric overlap. Using the work of Gunder and Wagner, we give an estimate for the combinatorial expansion and geometric overlap of random Linial-Meshulam complexes

    Design of Minimal Fault Tolerant On-Board Networks : Practical constructions

    Get PDF
    International audienceThe problem we consider originates from the design of effi- cient on-board networks in satellites (also called Traveling Wave Tube Amplifiers). Signals incoming in the network through ports have to be routed through an on-board network to amplifiers. The network is made of expensive switches with four links and subject to two types of con- straints. First, the amplifiers may fail during satellite lifetime and cannot be repaired. Secondly, as the satellite is rotating, all the ports are not well oriented and hence not available. Let us assume that we have p + ports (inputs) and p + k amplifiers (outputs), then a (p, , k)−network is said to be valid if, for any choice of p inputs and p outputs, there exist p edge-disjoint paths linking all the chosen inputs to all the chosen outputs. Then, the objective is to design a valid network having the min- imum number of switches denoted N(p, , k). In the special case where = 0, these networks were already studied as selectors. Here we present validity certificates from which derive lower bounds for N(p, , k); we also provide constructions of optimal (or quasi optimal) networks for practical values of and k (1 k 8

    Lower Bounds for Matrix Factorization

    Get PDF
    We study the problem of constructing explicit families of matrices which cannot be expressed as a product of a few sparse matrices. In addition to being a natural mathematical question on its own, this problem appears in various incarnations in computer science; the most significant being in the context of lower bounds for algebraic circuits which compute linear transformations, matrix rigidity and data structure lower bounds. We first show, for every constant dd, a deterministic construction in subexponential time of a family {Mn}\{M_n\} of n×nn \times n matrices which cannot be expressed as a product Mn=A1⋯AdM_n = A_1 \cdots A_d where the total sparsity of A1,
,AdA_1,\ldots,A_d is less than n1+1/(2d)n^{1+1/(2d)}. In other words, any depth-dd linear circuit computing the linear transformation Mn⋅xM_n\cdot x has size at least n1+Ω(1/d)n^{1+\Omega(1/d)}. This improves upon the prior best lower bounds for this problem, which are barely super-linear, and were obtained by a long line of research based on the study of super-concentrators (albeit at the cost of a blow up in the time required to construct these matrices). We then outline an approach for proving improved lower bounds through a certain derandomization problem, and use this approach to prove asymptotically optimal quadratic lower bounds for natural special cases, which generalize many of the common matrix decompositions

    Design of Minimal Fault Tolerant On-Board Networks : Practical constructions

    Get PDF
    International audienceThe problem we consider originates from the design of effi- cient on-board networks in satellites (also called Traveling Wave Tube Amplifiers). Signals incoming in the network through ports have to be routed through an on-board network to amplifiers. The network is made of expensive switches with four links and subject to two types of con- straints. First, the amplifiers may fail during satellite lifetime and cannot be repaired. Secondly, as the satellite is rotating, all the ports are not well oriented and hence not available. Let us assume that we have p + ports (inputs) and p + k amplifiers (outputs), then a (p, , k)−network is said to be valid if, for any choice of p inputs and p outputs, there exist p edge-disjoint paths linking all the chosen inputs to all the chosen outputs. Then, the objective is to design a valid network having the min- imum number of switches denoted N(p, , k). In the special case where = 0, these networks were already studied as selectors. Here we present validity certificates from which derive lower bounds for N(p, , k); we also provide constructions of optimal (or quasi optimal) networks for practical values of and k (1 k 8
    corecore