10 research outputs found
A New Approximate Min-Max Theorem with Applications in Cryptography
We propose a novel proof technique that can be applied to attack a broad
class of problems in computational complexity, when switching the order of
universal and existential quantifiers is helpful. Our approach combines the
standard min-max theorem and convex approximation techniques, offering
quantitative improvements over the standard way of using min-max theorems as
well as more concise and elegant proofs
Non-Malleable Codes Against Bounded Polynomial Time Tampering
We construct efficient non-malleable codes (NMC) that are (computationally) secure against tampering by functions computable in any fixed polynomial time. Our construction is in the plain (no-CRS) model and requires the assumptions that (1) is hard for circuits of some exponential () size (widely used in the derandomization literature), (2) sub-exponential trapdoor permutations exist, and (3) certificates with sub-exponential soundness exist.
While it is impossible to construct NMC secure against arbitrary polynomial-time tampering (Dziembowski, Pietrzak, Wichs, ICS \u2710),
the existence of NMC secure against -time tampering functions
(for any fixed ), was shown (Cheraghchi and Guruswami, ITCS \u2714) via a probabilistic construction. An explicit construction was given (Faust, Mukherjee, Venturi, Wichs, Eurocrypt \u2714) assuming an untamperable CRS with length longer than the runtime of the tampering function. In this work, we show that under computational assumptions, we can bypass these limitations. Specifically, under the assumptions listed above, we obtain non-malleable codes in the plain model against -time tampering functions (for any fixed ), with codeword length independent of the tampering time bound.
Our new construction of NMC draws a connection with non-interactive non-malleable commitments. In fact, we show that in the NMC setting,
it suffices to have a much weaker notion called quasi non-malleable
commitments---these are non-interactive, non-malleable commitments in
the plain model, in which the adversary runs in -time, whereas
the honest parties may run in longer (polynomial) time. We then
construct a 4-tag quasi non-malleable commitment from any sub-exponential OWF and the assumption that is hard for some exponential size -circuits, and use tag amplification techniques to support an exponential number of tags
Improved learning of k-parities
| openaire: EC/H2020/759557/EU//ALGOComWe consider the problem of learning k-parities in the online mistake-bound model: given a hidden vector (Formula Presented) where the hamming weight of x is k and a sequence of “questions” (Formula Presented), where the algorithm must reply to each question with (Formula Presented), what is the best trade-off between the number of mistakes made by the algorithm and its time complexity? We improve the previous best result of Buhrman et al. [BGM10] by an (Formula Presented) factor in the time complexity. Next, we consider the problem of learning k-parities in the PAC model in the presence of random classification noise of rate (Formula Presented). Here, we observe that even in the presence of classification noise of non-trivial rate, it is possible to learn k-parities in time better than (Formula Presented), whereas the current best algorithm for learning noisy k-parities, due to Grigorescu et al. [GRV11], inherently requires time (Formula Presented) even when the noise rate is polynomially small.Peer reviewe