70,546 research outputs found
Separating Two-Round Secure Computation From Oblivious Transfer
We consider the question of minimizing the round complexity of protocols for secure multiparty computation (MPC) with security against an arbitrary number of semi-honest parties. Very recently, Garg and Srinivasan (Eurocrypt 2018) and Benhamouda and Lin (Eurocrypt 2018) constructed such 2-round MPC protocols from minimal assumptions. This was done by showing a round preserving reduction to the task of secure 2-party computation of the oblivious transfer functionality (OT). These constructions made a novel non-black-box use of the underlying OT protocol. The question remained whether this can be done by only making black-box use of 2-round OT. This is of theoretical and potentially also practical value as black-box use of primitives tends to lead to more efficient constructions.
Our main result proves that such a black-box construction is impossible, namely that non-black-box use of OT is necessary. As a corollary, a similar separation holds when starting with any 2-party functionality other than OT.
As a secondary contribution, we prove several additional results that further clarify the landscape of black-box MPC with minimal interaction. In particular, we complement the separation from 2-party functionalities by presenting a complete 4-party functionality, give evidence for the difficulty of ruling out a complete 3-party functionality and for the difficulty of ruling out black-box constructions of 3-round MPC from 2-round OT, and separate a relaxed "non-compact" variant of 2-party homomorphic secret sharing from 2-round OT
Volume-Enclosing Surface Extraction
In this paper we present a new method, which allows for the construction of
triangular isosurfaces from three-dimensional data sets, such as 3D image data
and/or numerical simulation data that are based on regularly shaped, cubic
lattices. This novel volume-enclosing surface extraction technique, which has
been named VESTA, can produce up to six different results due to the nature of
the discretized 3D space under consideration. VESTA is neither template-based
nor it is necessarily required to operate on 2x2x2 voxel cell neighborhoods
only. The surface tiles are determined with a very fast and robust construction
technique while potential ambiguities are detected and resolved. Here, we
provide an in-depth comparison between VESTA and various versions of the
well-known and very popular Marching Cubes algorithm for the very first time.
In an application section, we demonstrate the extraction of VESTA isosurfaces
for various data sets ranging from computer tomographic scan data to simulation
data of relativistic hydrodynamic fireball expansions.Comment: 24 pages, 33 figures, 4 tables, final versio
Quantum Cryptography Beyond Quantum Key Distribution
Quantum cryptography is the art and science of exploiting quantum mechanical
effects in order to perform cryptographic tasks. While the most well-known
example of this discipline is quantum key distribution (QKD), there exist many
other applications such as quantum money, randomness generation, secure two-
and multi-party computation and delegated quantum computation. Quantum
cryptography also studies the limitations and challenges resulting from quantum
adversaries---including the impossibility of quantum bit commitment, the
difficulty of quantum rewinding and the definition of quantum security models
for classical primitives. In this review article, aimed primarily at
cryptographers unfamiliar with the quantum world, we survey the area of
theoretical quantum cryptography, with an emphasis on the constructions and
limitations beyond the realm of QKD.Comment: 45 pages, over 245 reference
Behavioural equivalences for timed systems
Timed transition systems are behavioural models that include an explicit
treatment of time flow and are used to formalise the semantics of several
foundational process calculi and automata. Despite their relevance, a general
mathematical characterisation of timed transition systems and their behavioural
theory is still missing. We introduce the first uniform framework for timed
behavioural models that encompasses known behavioural equivalences such as
timed bisimulations, timed language equivalences as well as their weak and
time-abstract counterparts. All these notions of equivalences are naturally
organised by their discriminating power in a spectrum. We prove that this
result does not depend on the type of the systems under scrutiny: it holds for
any generalisation of timed transition system. We instantiate our framework to
timed transition systems and their quantitative extensions such as timed
probabilistic systems
Glueability of Resource Proof-Structures: Inverting the Taylor Expansion
A Multiplicative-Exponential Linear Logic (MELL) proof-structure can be expanded into a set of resource proof-structures: its Taylor expansion. We introduce a new criterion characterizing those sets of resource proof-structures that are part of the Taylor expansion of some MELL proof-structure, through a rewriting system acting both on resource and MELL proof-structures
A -Vertex Kernel for Maximum Internal Spanning Tree
We consider the parameterized version of the maximum internal spanning tree
problem, which, given an -vertex graph and a parameter , asks for a
spanning tree with at least internal vertices. Fomin et al. [J. Comput.
System Sci., 79:1-6] crafted a very ingenious reduction rule, and showed that a
simple application of this rule is sufficient to yield a -vertex kernel.
Here we propose a novel way to use the same reduction rule, resulting in an
improved -vertex kernel. Our algorithm applies first a greedy procedure
consisting of a sequence of local exchange operations, which ends with a
local-optimal spanning tree, and then uses this special tree to find a
reducible structure. As a corollary of our kernel, we obtain a deterministic
algorithm for the problem running in time
A reconfigurations analogue of Brooks’ theorem.
Let G be a simple undirected graph on n vertices with maximum degree Δ. Brooks’ Theorem states that G has a Δ-colouring unless G is a complete graph, or a cycle with an odd number of vertices. To recolour G is to obtain a new proper colouring by changing the colour of one vertex. We show that from a k-colouring, k > Δ, a Δ-colouring of G can be obtained by a sequence of O(n 2) recolourings using only the original k colours unless
G is a complete graph or a cycle with an odd number of vertices, or
k = Δ + 1, G is Δ-regular and, for each vertex v in G, no two neighbours of v are coloured alike.
We use this result to study the reconfiguration graph R k (G) of the k-colourings of G. The vertex set of R k (G) is the set of all possible k-colourings of G and two colourings are adjacent if they differ on exactly one vertex. It is known that
if k ≤ Δ(G), then R k (G) might not be connected and it is possible that its connected components have superpolynomial diameter,
if k ≥ Δ(G) + 2, then R k (G) is connected and has diameter O(n 2).
We complete this structural classification by settling the missing case:
if k = Δ(G) + 1, then R k (G) consists of isolated vertices and at most one further component which has diameter O(n 2).
We also describe completely the computational complexity classification of the problem of deciding whether two k-colourings of a graph G of maximum degree Δ belong to the same component of R k (G) by settling the case k = Δ(G) + 1. The problem is
O(n 2) time solvable for k = 3,
PSPACE-complete for 4 ≤ k ≤ Δ(G),
O(n) time solvable for k = Δ(G) + 1,
O(1) time solvable for k ≥ Δ(G) + 2 (the answer is always yes)
- …