Can PPAD Hardness be Based on Standard Cryptographic Assumptions?

Size: px
Start display at page:

Download "Can PPAD Hardness be Based on Standard Cryptographic Assumptions?"

Transcription

1 Can PPAD Hardness be Based on Standard Cryptographc Assumptons? Alon Rosen Gl Segev Ido Shahaf Abstract We consder the queston of whether PPAD hardness can be based on standard cryptographc assumptons, such as the exstence of one-way functons or publc-key encrypton. Ths queston s partcularly well-motvated n lght of new devastatng attacks on obfuscaton canddates and ther underlyng buldng blocks, whch are currently the only known source for PPAD hardness. Central n the study of obfuscaton-based PPAD hardness s the snk-of-verfable-lne (SVL) problem, an ntermedate step n constructng nstances of the PPAD-complete problem source-or-snk. Wthn the framework of black-box reductons we prove the followng results: Average-case PPAD hardness (and even SVL hardness) does not mply any form of cryptographc hardness (not even one-way functons). Moreover, even when assumng the exstence of one-way functons, average-case PPAD hardness (and, agan, even SVL hardness) does not mply any publc-key prmtve. Thus, strong cryptographc assumptons (such as obfuscaton-related ones) are not essental for average-case PPAD hardness. Average-case SVL hardness cannot be based ether on standard cryptographc assumptons or on average-case PPAD hardness. In partcular, average-case SVL hardness s not essental for average-case PPAD hardness. Any attempt for basng the average-case hardness of the PPAD-complete problem sourceor-snk on standard cryptographc assumptons must result n nstances wth a nearlyexponental number of solutons. Ths stands n strkng contrast to the obfuscaton-based approach, whch results n nstances havng a unque soluton. Taken together, our results mply that t may stll be possble to base average-case PPAD hardness on standard cryptographc assumptons, but any black-box attempt must sgnfcantly devate from the obfuscaton-based approach: It cannot go through the SVL problem, and t must result n source-or-snk nstances wth a nearly-exponental number of solutons. Ef Araz School of Computer Scence, IDC Herzlya, Israel. Emal: alon.rosen@dc.ac.l. Supported by ISF grant no. 1255/12, NSF-BSF Cyber Securty and Prvacy grant no. 2014/632, and by the ERC under the EU s Seventh Framework Programme (FP/ ) ERC Grant Agreement n School of Computer Scence and Engneerng, Hebrew Unversty of Jerusalem, Jerusalem 91904, Israel. Emal: {segev,do shahaf}@cs.huj.ac.l. Supported by the European Unon s 7th Framework Program (FP7) va a Mare Cure Career Integraton Grant and va an ERC Grant (No ), by the Israel Scence Foundaton (Grant No. 483/13), by the Israel Centers of Research Excellence (I-CORE) Program (Center No. 4/11), by the US-Israel Bnatonal Scence Foundaton (Grant No ), and by a Google Faculty Research Award.

2 Contents 1 Introducton Our Contrbutons Open Problems Overvew of Our Approach Paper Organzaton Prelmnares Complexty Classes and Total Search Problems One-Way Functons and Injectve Trapdoor Functons Key-Agreement Protocols Average-Case SVL Hardness Does Not Imply One-Way Functons Proof Overvew O SVL s a Hard-on-Average SVL Instance Invertng Oracle-Aded Functons Relatve to O SVL Proof of Theorem Average-Case PPAD Hardness Does Not Imply Unque-TFNP Hardness Proof Overvew O PPAD s a Hard-on-Average Source-or-Snk Instance Solvng Oracle-Aded Unque-TFNP Instances Relatve to O PPAD Proof of Theorem One-Way Functons Do Not Imply Bounded-TFNP Hardness Proof Overvew f s a One-Way Functon Solvng Oracle-Aded Bounded-TFNP Instances Relatve to f Proof of Theorem Publc-Key Cryptography Does Not Imply Bounded-TFNP Hardness Proof Overvew O TDF s a Collecton of Injectve Trapdoor Functons Solvng Oracle-Aded Bounded-TFNP Instances Relatve to O TDF Proofs of Clams References 43 A Average-Case SVL Hardness and OWFs Do Not Imply Key Agreement 46 A.1 Proof Overvew A.2 Attackng Key-Agreement Protocols Relatve to f and O SVL

3 1 Introducton In recent years there has been ncreased nterest n the computatonal complexty of fndng a Nash equlbrum. Towards ths end, Papadmtrou defned the complexty class PPAD, whch conssts of all search problems that are polynomal-tme reducble to the source-or-snk problem Pap94. 1 Papadmtrou showed that the problem of fndng a Nash equlbrum s reducble to source-orsnk, and thus belongs to PPAD. He also conjectured that there exsts a reducton n the opposte drecton, and ths was proved by Daskalaks, Goldberg and Papadmtrou DGP09, and by Chen, Deng and Teng CDT09. Thus, to support the belef that fndng a Nash equlbrum may ndeed be computatonally hard, t became suffcent to place a conjectured computatonally-hard problem wthn the class PPAD. Currently, no PPAD-complete problem s known to admt a sub-exponental-tme algorthm. At the same tme, however, we do not know how to generate nstances that defeat known heurstcs for these problems (see HPV89 for explct worst-case hard nstances of computng Brouwer fxed ponts and SvS04 for fndng a Nash equlbrum). Ths leaves us n an ntrgung state of affars, n whch we know of no effcent algorthms wth provable worst-case guarantees, but we are yet to systematcally rule out the possblty that known heurstc algorthms perform well on the average. Post-obfuscaton PPAD hardness. A natural approach for argung hardness on the average would be to reduce from problems that orgnate from cryptography. Workng n the realm of cryptography has at least two advantages. Frst of all, t enables us to rely on well-studed problems that are wdely conjectured to be average-case hard. Secondly, and no less mportantly, cryptography supples us wth frameworks for reasonng about average-case hardness. On the postve drecton, such frameworks are hghly suted for desgnng and analyzng reductons between average-case problems. On the negatve drecton, n some cases t s possble to argue that such natural reductons do not exst Rud88, IR89. Up untl recently not much progress has been made n relatng between cryptography and PPAD hardness. Ths has changed as a result of developments n the study of obfuscaton BGI + 01, GGH + 13, a strong cryptographc noton wth connectons to the hardness of source-or-snk. As shown by Btansky, Paneth and Rosen BPR15 the task of breakng sub-exponentally secure ndstngushablty obfuscaton can be reduced to solvng source-or-snk. Beyond gvng the frst extrnsc evdence of PPAD hardness, the result of Btansky et al. also provded the frst method to sample potentally hard-on-average source-or-snk nstances. Ther result was subsequently strengthened by Garg, Pandey and Srnvasan, who based t on ndstngushablty obfuscaton wth standard (.e., polynomal) hardness GPS16. Pre-obfuscaton PPAD hardness? Indstngushablty obfuscaton has revealed to be an exceptonally powerful prmtve, wth numerous far reachng applcatons. However, ts exstence s far from beng a well-establshed cryptographc assumpton, certanly not nearly as well-establshed as the exstence of one-way functons or publc-key encrypton. Recently, our confdence n exstng ndstngushablty obfuscaton canddates has somewhat been shaken, followng a sequence of devastatng attacks on both canddate obfuscators and on ther underlyng buldng blocks (see, for example, BGH + 15, CGH + 15, CHL + 15, CLR15, HJ15, MF15, CFL + 16, CJL16, MSZ16). It thus became natural to ask: Can average-case PPAD hardness be based on standard cryptographc assumptons? 1 The name end-of-lne s more commonly used n the lterature, however source-or-snk s more accurately descrptve BCE

4 By standard cryptographc assumptons we are n general referrng to pre-obfuscaton type of prmtves, such as the exstence of one-way functons or publc-key cryptography. As mentoned above, such assumptons are currently by far more well-establshed than ndstngushablty obfuscaton, and basng average-case PPAD hardness on them would make a much stronger case. For all we know PPAD hardness may be based on the exstence of one-way functons. However, f t turned out that average-case PPAD hardness mples publc-key encrypton, then ths would ndcate that basng average-case PPAD hardness on one-way functons may be extremely challengng snce we currently do not know how to base publc-key encrypton on one-way functons (and n fact cannot do so usng black-box technques IR89). Smlarly, f t turned out that average-case PPAD hardness mples ndstngushablty obfuscaton, ths ths would ndcate that basng average-case PPAD average on any standard cryptographc assumpton would requre developng radcally new technques. More generally, the stronger the mplcaton of PPAD hardness s, the more dffcult t may be to base PPAD hardness on standard assumptons. Ths leads us to the followng second queston: Does average-case PPAD hardness mply any form of cryptographc hardness? As dscussed above, a negatve answer to the above queston would actually be an encouragng sgn. It would suggest, n partcular, that program obfuscaton s not essental for PPAD hardness, and that there may be hope to base PPAD hardness on standard cryptographc assumptons. 1.1 Our Contrbutons Motvated by the above questons, we nvestgate the nterplay between average-case PPAD hardness and standard cryptographc assumptons. We consder ths nterplay from the perspectve of blackbox reductons, the fundamental approach for capturng natural relatons both among cryptographc prmtves (e.g., Rud88, IR89, Lub96) and among complexty classes (e.g., BCE + 95, CIY97). Average-case PPAD hardness does not mply cryptographc hardness. Our frst result shows that average-case PPAD hardness does not mply any form of cryptographc hardness n a black-box manner (not even a one-way functon). In addton, our second result shows that, even when assumng the exstence of one-way functons, average-case PPAD hardness does not mply any publc-key prmtve (not even key agreement). 2 In fact, we prove the followng more general theorems by consderng the snk-of-verfable-lne (SVL) problem, ntroduced by Abbot et al. AKV04 and further studed by Btansky et al. BPR15 and Garg et al. GPS16: Theorem 1.1. There s no black-box constructon of a one-way functon from a hard-on-average dstrbuton of SVL nstances. Theorem 1.2. There s no black-box constructon of a key-agreement protocol from a one-way functon and a hard-on-average dstrbuton of SVL nstances. Abbot et al. AKV04 and Btansky et al. BPR15 showed that any hard-on-average dstrbuton of SVL nstances can be used n a black-box manner for constructng a hard-on-average dstrbuton of nstances to a PPAD-complete problem (specfcally, nstances of the source-or-snk problem). Thus, Theorem 1.1 mples, n partcular, that there s no black-box constructon of a one-way functon from a hard-on-average dstrbuton of nstances to a PPAD-complete problem. Smlarly, 2 Recall that although ndstngushablty obfuscaton does not uncondtonally mply the exstence of one-way functons BGI + 12, t does mply publc-key cryptography when assumng the exstence of one-way functons SW14. 2

5 Theorem 1.2 mples, n partcular, that there s no black-box constructon of a key-agreement protocol from a one-way functon and a hard-on-average dstrbuton of nstances to a PPAD-complete problem. As dscussed n the prevous secton, the fact that average-case PPAD hardness does not naturally mply any form of cryptographc hardness s an encouragng sgn n the pursut of basng average-case PPAD hardness on standard cryptographc assumptons. For example, f average-case PPAD hardness would have mpled program obfuscaton, ths would have ndcated that extremely strong cryptographc assumptons are lkely to be essental for average-case PPAD hardness. Smlarly, f average-case PPAD hardness would have mpled publc-key cryptography, ths would have ndcated that well-structured cryptographc assumptons are essental for average-case PPAD hardness. The fact that average-case PPAD hardness does not naturally mply any form of cryptographc hardness hnts that t may be possble to base average-case PPAD hardness even on the mnmal (and unstructured) assumpton that one-way functons exst. PPAD hardness vs. SVL hardness. The SVL problem played a central role n the recent breakthrough of Btansky et al. BPR15 and Garg et al. GPS16 n constructng a hard-on-average dstrbuton of nstances to a PPAD-complete problem based on ndstngushablty obfuscaton. Specfcally, they constructed a hard-on-average dstrbuton of SVL nstances, and then reduced t to a hard-on-average dstrbuton of source-or-snk nstances AKV04, BPR15. We show, however, that the SVL problem s n fact far from representng PPAD hardness: Whereas Abbot et al. AKV04 and Btansky et al. BPR15 showed that the SVL problem can be effcently reduced to the source-or-snk problem (even n the worst case), we show that there s no such reducton n the opposte drecton (not even an average-case one). We prove the followng theorem: Theorem 1.3. There s no black-box constructon of a hard-on-average dstrbuton of SVL nstances from a hard-on-average dstrbuton of source-or-snk nstances. Moreover, ths holds even f the underlyng source-or-snk nstances always have a unque soluton. On basng average-case PPAD hardness on standard assumptons. Theorem 1.1 encouragngly shows that t may stll be possble to base average-case PPAD hardness on standard cryptographc assumptons, but Theorem 1.3 shows that the obfuscaton-based approach (whch goes through the SVL problem) may not be the most effectve one. Now, we show that n fact any attempt for basng average-case PPAD hardness on standard cryptographc assumptons (e.g., on one-way functons, publc-key encrypton, and even on njectve trapdoor functons) n a black-box manner must sgnfcantly devate from the obfuscaton-based approach. Specfcally, the source-or-snk nstances resultng from that approach have exactly one soluton 3, and we show that when relyng on njectve trapdoor functons n a black-box manner t s essental to have a nearly-exponental number of solutons. We prove the followng theorem: Theorem 1.4. There s no black-box constructon of a hard-on-average dstrbuton of source-orsnk nstances over {0, 1} n wth 2 no(1) solutons from njectve trapdoor functons. In partcular, snce Abbot et al. AKV04 and Btansky et al. BPR15 showed that hard-onaverage SVL nstances lead to hard-on-average source-or-snk nstances havng a unque soluton, Theorem 1.4 mples the followng corollary whch, when combned wth Theorem 1.1, shows that average-case SVL hardness s essentally ncomparable to standard cryptographc assumptons. 3 Unless, of course, one allows for artfcal manpulatons of the nstances to generate multple (strongly related) solutons. 3

6 Corollary 1.5. There s no black-box constructon of hard-on-average dstrbuton of SVL nstances from njectve trapdoor functons. More generally, although Theorem 1.4 and Corollary 1.5 focus on njectve trapdoor functons, our mpossblty result holds for a rcher and larger class of buldng blocks. Specfcally, t holds for any prmtve that exsts relatve to a random njectve trapdoor functon oracle. Thus, Theorem 1.4 and Corollary 1.5 hold, for example, also for collson-resstant hash functons (whch are not mpled by one-way functons or njectve trapdoor functons n a black-box manner Sm98, HHR + 15). Taken together, our results mply that t may be possble to base average-case PPAD hardness on standard cryptographc assumptons, but any black-box attempt must sgnfcantly devate from the obfuscaton-based approach: It cannot go through the SVL problem, and t must result n sourceor-snk nstances wth a nearly-exponental number of solutons. See Fgure 1 for an llustraton of our results. A wder perspectve: From Rudch s mpossblty to structured buldng blocks and bounded-tfnp hardness. Our results apply to a wde class of search problems, and not only to the specfc source-or-snk and SVL problems. We consder the noton of TFNP nstances wth a guaranteed (non-trval) upper bound on ther number of exstng solutons, to whch we refer as bounded-tfnp nstances. Ths captures, n partcular, source-or-snk nstances and (vald) SVL nstances, and provdes a more general and useful perspectve for studyng cryptographc lmtatons n constructng hard nstances of search problems. Equpped wth such a wde perspectve, our approach and proof technques buld upon, and sgnfcantly extend, Rudch s classc proof for rulng out black-box constructons of one-way permutatons based on one-way functons Rud88. We extend Rudch s approach from ts somewhat restrcted context of one-way functons (as buldng blocks) and one-way permutatons (as target objects) to provde a rcher framework that consders: (1) sgnfcantly more structured buldng blocks, and (2) sgnfcantly less restrcted target objects. Specfcally, we bound the lmtatons of hard-onaverage source-or-snk and SVL nstances as buldng blocks (nstead of one-way functons), and we rule out bounded-tfnp nstances as target objects (nstead of one-way permutatons). One-Way Functons Thm. 1.2 Key Agreement Injectve Trapdoor Functons Thm. 1.1 Hard-on-Average Snk-of-Verfable-Lne Instances AKV04,BPR15 Thm. 1.3 Hard-on-Average Source-or-Snk Instances wth 2 no(1) Solutons Hard-on-Average Source-or-Snk Instances Fgure 1: An llustraton of our results. Dashed arrows correspond to known mplcatons, and sold arrows correspond to our separatons. 4

7 1.2 Open Problems Several nterestng open problems arse drectly from our results, and here we pont out some of them. The strong structural barrer put forward n Theorem 1.4 stands n stark contrast to the approach of Btansky et al. BPR15 and Garg et al. GPS16. Thus, an ntrgung open problem s ether to extend our mpossblty result to rule out constructons wth any number of solutons, or to crcumvent our mpossblty result by desgnng nstances wth an nearlyexponental number of solutons based on standard cryptographc assumptons. More generally, the queston of crcumventng black-box mpossblty results by utlzng nonblack-box technques s always fascnatng. In our specfc context, already the obfuscatonbased constructons of Btansky et al. BPR15 and Garg et al. GPS16 nvolve non-black-box technques (e.g., they apply an ndstngushablty obfuscator to a crcut that uses a pseudorandom functon). However, as recently shown by Asharov and Segev AS15, AS16, as long as the ndstngushablty obfuscator tself s used n a black-box manner, such technques can n fact be captured by refnng the exstng frameworks for black-box separatons (specfcally, the framework of Asharov and Segev captures the obfuscaton-based constructons of Btansky et al. BPR15 and Garg et al. GPS16). Thus, an exctng open problem s to crcumvent our results by utlzng non-black-box technques whle relyng on standard cryptographc assumptons. Our mpossblty results n Theorem 1.4 and Corollary 1.5 apply to any buldng block that exsts relatve to a random njectve trapdoor functon oracle (e.g., a collson-resstent hash functon). It s not clear, however, whether smlar mpossblty results may apply to one-way permutatons. Thus, an ntrgung open problem s ether to extend our mpossblty results to rule out constructons based on one-way permutatons, or to crcumvent our mpossblty results by desgnng hard-on-average nstances based on one-way permutatons. We note that by relyng on one-way permutatons t s rather trval to construct some arbtrary hard-onaverage TFNP dstrbuton (even one wth unque solutons), but t s not known how to construct less arbtrary forms of hardness, such as average-case PPAD or SVL hardness. The recent work of Hubácek, Naor, and Yogev HNY16 proposes two elegant approaches for constructng hard-on-average TFNP nstances. Ther frst approach s based on any hard-onaverage NP relaton (the exstence of whch s mpled, for example, by any one-way functon) n a black-box manner, and results n TFNP nstances wth a possbly exponental number of solutons. Ther second approach s based on any njectve one-way functon and a nonnteractve wtness-ndstngushable proof system for NP (whch can be constructed based on trapdoor permutatons), and results n TFNP nstances havng at most two solutons. An nterestng queston s whether ther approaches mply not only average-case TFNP hardness for the partcular problems defned by ther underlyng one-way functon and proof system, but also more specfc forms of TFNP hardness, such as average-case PPAD or SVL hardness. 1.3 Overvew of Our Approach In ths secton we provde a hgh-level overvew of the man deas underlyng our results. Each of our results s of the form the exstence of P does not mply the exstence of Q n a black-box manner, where each of P and Q s ether a cryptographc prmtve (e.g., a one-way functon) or a hard-onaverage search problem (e.g., the source-or-snk problem). Intutvely, such a statement s proved by constructng a dstrbuton over oracles relatve to whch there exsts an mplementaton of P, 5

8 but any mplementaton of Q can be effcently broken. Our formal proofs properly formalze ths ntuton va the standard framework of black-box reductons (e.g., IR89, Lub96, Gol00, RTV04). Average-case SVL hardness does not mply OWFs. Theorem 1.1 s proved by presentng a dstrbuton of oracles relatve to whch there exsts a hard-on-average dstrbuton of SVL nstances, but there are no one-way functons. An SVL nstance s of the form {(S n, V n, L(n))} n N, where for every n N t holds that S n : {0, 1} n {0, 1} n, V n : {0, 1} n 2 n {0, 1}, and L(n) 2 n. Such an nstance s vald f for every n N, x {0, 1} n, and 2 n, t holds that V n (x, ) = 1 f and only f x = S n(0 n ). Intutvely, the crcut S n can be vewed as mplementng the successor functon of a drected graph over {0, 1} n that conssts of a sngle lne startng at 0 n, and the crcut V n enables to effcently test whether a gven node x s of dstance from 0 n on the lne. The goal s to fnd the node of dstance L(n) from 0 n (see Secton 2.1 for the formal defnton of the SVL problem). We consder an oracle that s a vald SVL nstance O SVL correspondng to a graph wth a sngle lne 0 n x 1 x L(n) of length L(n) = 2 n/2. The lne s chosen unformly among all lnes n {0, 1} n of length L(n) startng at 0 n (and all nodes outsde the lne have self loops and are essentally rrelevant). Frst, we show that the oracle O SVL s ndeed a hard-on-average SVL nstance. Ths s based on the followng, rather ntutve, observaton: Snce the lne 0 n x 1 x L(n) s sparse and unformly sampled, then any algorthm performng q = q(n) oracle queres should not be able to query O SVL wth any element on the lne beyond the frst q elements 0 n, x 1,..., x q 1. In partcular, for our choce of parameters, any algorthm performng at most, say, 2 n/4 queres, has only an exponentally-small probablty of reachng x L(n) (where the probablty s taken over the choce of the oracle O SVL ). Then, we show that any oracle-aded functon F O SVL( ) can be nverted (wth hgh probablty over the choce of the oracle O SVL ) by an algorthm whose query complexty s polynomally-related to that of the functon F O SVL( ). The proof s based on the followng approach. Consder a value y = F O SVL(x) that we would lke to nvert. If F performs at most q = q(n) oracle queres, the above-mentoned observaton mples that the computaton F O SVL(x) should not query O SVL wth any elements on the lne 0 n x 1 x L(n) except for the frst q elements x 0, x 1,..., x q 1. Ths observaton gves rse to the followng nverter A: Frst perform q queres to O SVL for dscoverng x 1,..., x q, and then nvert y = F O SVL(x) relatve to the oracle Õ SVL defned va the followng successor functon S: { x+1 f α = x S(α) = for some {0,..., q 1} α otherwse The formal proof s n fact more subtle, and requres a sgnfcant amount of cauton when nvertng y = F O SVL(x) relatve to the oracle Õ SVL. Specfcally, the nverter A should fnd an nput x such that the computatons F ÕSVL( x) and F O SVL( x) do not query the oracles Õ SVL and O SVL, respectvely, wth any of x q,..., x L(n). In ths case, we show that ndeed F O SVL( x) = y and the nverter s successful. We refer the reader to Secton 3 for more detals and for the formal proof. Average-case SVL hardness and OWFs do not mply key agreement. Theorem 1.2 s proved by showng that n any black-box constructon of a key-agreement protocol based on a oneway functon and a hard-on-average dstrbuton of SVL nstances, we can elmnate the protocol s need for usng the SVL nstances. Ths leads to a black-box constructon of key-agreement protocol based on a one-way functon, whch we can then rule out by nvokng the classc result of Impaglazzo and Rudch IR89 and ts refnement by Barak and Mahmoody-Ghdary BM09. Specfcally, consder a key-agreement protocol (A f,o SVL, B f,o SVL) n whch the partes have oracle access to a random functon f and to the oracle O SVL used for provng Theorem 1.1. Then, f A and B perform at most q = q(n) oracle queres, the observaton underlyng the proof of Theorem 1.1 mples 6.

9 that, durng an executon (A f,o SVL, B f,o SVL) of the protocol, the partes should not query O SVL wth any elements on the lne 0 n x 1 x L(n) except for the frst q elements x 0, x 1,..., x q 1. Ths observaton gves rse to a key-agreement protocol (Ãf, B f ) that does not requre access to the oracle O SVL : Frst, Ã samples a sequence x 1,..., x q of q values, and sends these values to B. Then, Ã and B run the protocol (A f,o SVL, B f,o SVL) by usng the values x 1,..., x q nstead of accessng O SVL. That s, Ã and B run the underlyng protocol relatve to the gven oracle f and to the oracle Õ SVL defned va the followng successor functon S (whch each party can compute on ts own): { x+1 f α = x S(α) = for some {0,..., q 1} α otherwse. The formal proof s aganst rather subtle, and we refer the reader to Appendx A for more detals and for the formal proof. Average-case PPAD hardness does not mply unque-tfnp hardness. Theorem 1.3 s proved by presentng a dstrbuton of oracles relatve to whch there exsts a hard-on-average dstrbuton of nstances of a PPAD-complete problem (specfcally, we consder the source-or-snk problem), but there are no hard TFNP nstances havng unque solutons. A TFNP nstance wth a unque soluton, denoted a unque-tfnp nstance, s of the form {C n } n N, where for every n N t holds that C n : {0, 1} n {0, 1} and there s a unque x {0, 1} n such that C(x) = 1. Note that any vald SVL nstance yelds a TFNP nstance that has a unque soluton. Therefore, relatve to our dstrbuton over oracles any vald SVL nstance can be effcently solved. A source-or-snk nstance s of the form {(S n, P n )} n N, where for every n N t holds that S n : {0, 1} n {0, 1} n and P n : {0, 1} n {0, 1} n. Intutvely, the crcuts S n and P n can be vewed as mplementng the successor and predecessor functons of a drected graph over {0, 1} n, where the n-degree and out-degree of every node s at most one, and the n-degree of 0 n s 0 (.e., t s a source). The goal s to fnd any node, other than 0 n, wth ether no ncomng edge and no outgong edge. We agan refer the reader to Secton 2.1 for the formal defntons. We consder an oracle that s a source-or-snk nstance O PPAD whch s based on the same sparse structure used to defne the oracle O SVL : It corresponds to a graph wth a sngle lne 0 n x 1 x L(n) of length L(n) = 2 n/2. The lne s chosen unformly among all lnes n {0, 1} n of length L(n) startng at 0 n (and all nodes outsde the lne have self loops). The fact that the oracle O PPAD s a hard-on-average source-or-snk nstance follows qute easly from the above-mentoned observaton on ts sparse and unform structure: Any algorthm performng q = q(n) oracle queres should not be able to query O PPAD wth any element on the lne beyond the frst q elements x 0, x 1,..., x q 1. In partcular, for our choce of parameters, any such algorthm should have only an exponentally-small probablty of reachng x L(n). Solvng any oracle-aded unque-tfnp nstance relatve to O PPAD, however, turns out to be a completely dfferent challenge. One mght be tempted to follow a same approach based on the oracle s sparse and unform structure. Specfcally, let C n be a unque-tfnp nstance, and consder the unque value x {0, 1} n for whch C O PPAD n (x ) = 1. Then, f C n ssues at most q = q(n) oracle queres, the computaton C O PPAD n (x ) should essentally not be able to query O PPAD wth any elements on the lne 0 n x 1 x L(n) except for the frst q elements 0 n, x 1,..., x q 1. Therefore, one can defne a fake oracle Õ PPAD whose successor and predecessor functons agree wth O PPAD on 0 n, x 1,..., x q (and are defned as the dentty functons for all other nputs), and then fnd the unque x such that CÕPPAD n ( x) = 1. Ths approach, however, completely fals snce the soluton x tself may depend on O PPAD n an arbtrary manner, provdng the computaton 7

10 C O PPAD n (x ) wth suffcent nformaton for queryng O PPAD wth an nput x that s located further along the lne (.e., q L(n)). As dscussed n Secton 1.1, our proof s obtaned by sgnfcantly extendng Rudch s classc proof for rulng out black-box constructons of one-way permutatons based on one-way functons Rud88. In fact, Rudch s proof already generalzes, perhaps somewhat mplctly, from from rulng out constructons of one-way permutatons to rulng out constructons of any hard-on-average dstrbuton of unque-tfnp nstances. Here, we show, that hs approach provdes a rch framework that allows to bound not only the lmtatons of one-way functons as a buldng block, but even the lmtatons of sgnfcantly more structured prmtves as buldng blocks. Specfcally, our proof of Theorem 1.3 extends Rudch s technque for boundng the lmtatons of hard-on-average source-or-snk nstances. We refer the reader to Secton 4 for more detals and for the formal proof. Injectve trapdoor functons do not mply bounded-tfnp hardness. Theorem 1.4 and Corollary 1.5 are proved by presentng a dstrbuton of oracles relatve to whch there exsts a collecton of njectve trapdoor functons, but there are no hard TFNP nstances havng a bounded number of solutons (specfcally, our result wll apply to a sub-exponental number of solutons). A TFNP nstance wth bounded number k( ) of solutons, denoted a k-bounded TFNP nstance, s of the form {C n } n N, where for every n N t holds that C : {0, 1} n {0, 1}, and there s at least one and at most k(n) dstnct nputs x {0, 1} n such that C(x) = 1 (any one of these x s s a soluton). In partcular, as dscussed above, any vald SVL nstance yelds a 1-bounded TFNP nstance (.e., a unque-tfnp nstance), and therefore our result rules out black-box constructons of a hard-on-average dstrbuton of SVL nstances from njectve trapdoor functons. Smlarly, any source-or-snk nstance whch conssts of at most (k + 1)/2 dsjont lnes yelds a k-bounded TFNP nstance, and therefore our result rules out black-box constructons of a hard-on-average dstrbuton of source-or-snk nstances wth a bounded number of dsjont lnes from njectve trapdoor functons. For emphaszng the man deas underlyng our proof, n Secton 5 we frst prove our result for constructons that are based on one-way functons, and then n Secton 6 we generalze the proof to constructons that are based on njectve trapdoor functons. Each of these two parts requres ntroducng new deas and technques, and such a level of modularty s useful n pontng them out. When consderng constructons that are based on one-way functons, our proof s obtaned va an addtonal generalzaton of Rudch s proof technque Rud88. As dscussed above, Rudch s approach already generalzes, perhaps somewhat mplctly, from rulng out constructons of oneway permutatons based on one-way functons to rulng out constructons of any hard-on-average dstrbuton of unque-tfnp nstances based on one-way functons. We show, by extendng and refnng Rudch s proof technque once agan, that we can rule out not only constructons of unque- TFNP nstances, but even constructons of bounded-tfnp nstances. Ths requre a substantal generalzaton of Rudch s attacker, and we refer reader to Secton 5 for more detals and for the formal proof. Then, when consderng constructons that are based on njectve trapdoor functons, we show that our proof from Secton 5 can be generalzed from constructons of bounded-tfnp nstances based on one-way functons to constructons of bounded-tfnp nstances based on njectve trapdoor functons. Combned wth our the proof of Theorem 1.3, ths extends Rudch s approach from ts somewhat restrcted context of one-way functons (as buldng blocks) and one-way permutatons (as target objects) to provde a rcher framework that consders: (1) sgnfcantly more structured buldng blocks, and (2) sgnfcantly less restrcted target objects. We refer reader to Secton 6 for more detals and for the formal proof. 8

11 1.4 Paper Organzaton The remander of ths paper s organzed as follows. In Secton 2 we ntroduce our notaton as well as the search problems and the cryptographc prmtves that we consder n ths paper. In Secton 3 we show that average-case SVL hardness does not mply one-way functons n a black-box manner (provng Theorem 1.1). In Secton 4 we show that average-case PPAD hardness does not mply unque-tfnp hardness n a black-box manner (provng Theorem 1.3). In Secton 5 we show that one-way functons do not mply bounded-tfnp hardness n a black-box manner, and n Secton 6 we generalze ths result, showng that even njectve trapdoor functons do not mply bounded-tfnp hardness n a black-box manner (provng Theorem 1.4 and Corollary 1.5). Fnally, n Appendx A we extend our approach from Secton 3 and show that average-case SVL hardness does not mply key agreement even when assumng the exstence of one-way functons. 2 Prelmnares In ths secton we present the notaton and basc defntons that are used n ths work. For a dstrbuton X we denote by x X the process of samplng a value x from the dstrbuton X. Smlarly, for a set X we denote by x X the process of samplng a value x from the unform dstrbuton over X. For an nteger n N we denote by n the set {1,..., n}. A q-query algorthm s an oracle-aded algorthm A such that for any oracle O and nput x {0, 1}, the computaton A O (x) conssts of at most q( x ) oracle calls to O. 2.1 Complexty Classes and Total Search Problems An effcently-verfable search problem s descrbed va a par (I, R), where I {0, 1} s an effcently-recognzable set of nstances, and R s an effcently-computable bnary relaton. Such a search problem s total f for every nstance z I there exsts a wtness w of length polynomal n the length z such that R(z, w) = 1. The class TFNP conssts of all effcently-verfable search problem that are total, and ts subclass PPAD conssts of all such problems that are polynomal-tme reducble to the source-or-snk problem Pap94, defned as follows. Defnton 2.1 (The source-or-snk problem). A source-or-snk nstance conssts of a par of crcuts S, P : {0, 1} n {0, 1} n such that P(0 n ) = 0 n S(0 n ). The goal s to fnd an element w {0, 1} n such that P(S(w)) w or S(P(w)) w 0 n. Intutvely, the crcuts S and P can be vewed as mplementng the successor and predecessor functons of a drected graph over {0, 1} n, where for each par of nodes x and y there exsts an edge from x to y f and only f S(x) = y and P(y) = x (note that the n-degree and out-degree of every node n ths graph s at most one, and the n-degree of 0 n s 0). The goal s to fnd any node, other than 0 n, wth ether no ncomng edge or no outgong edge. Such a node must always exst by a party argument. The snk-of-verfable-lne (SVL) problem s a search problem ntroduced by Abbot et al. AKV04 and further studed by Btansky et al. BPR15 and Garg et al. GPS16. It s defned as follows: Defnton 2.2 (The snk-of-verfable-lne (SVL) problem). An SVL nstance conssts of a trplet (S, V, T ), where T 2 n, and S : {0, 1} n {0, 1} n and V : {0, 1} n 2 n {0, 1} are two crcuts wth the guarantee that for every x {0, 1} n and 2 n t holds that V(x, ) = 1 f and only f x = S (0 n ). The goal s to fnd an element w {0, 1} n such that V(w, T ) = 1. 9

12 Intutvely, the crcut S can be vewed as mplementng the successor functon of a drected graph over {0, 1} n that conssts of a sngle lne startng at 0 n. The crcut V enables to effcently test whether a gven node x s of dstance from 0 n on the lne, and the goal s to fnd the node of dstance T from 0 n. Note that not any trplet (S, V, T ) s a vald SVL nstance (moreover, there may not be an effcent algorthm for verfyng whether a trplet (S, V, T ) s a vald nstance). Oracle-aded nstances wth prvate randomness. When consderng source-or-snk and SVL nstances that are descrbed by oracle-aded crcuts, we would lke to allow these crcuts to share an oracle-dependent state that may be generated va prvate randomness (ths clearly strengthen the class of problems that we consder, and n partcular, capture those constructed by BPR15, GPS16 usng ndstngushablty obfuscaton). For ths purpose, we equp the nstances wth an oracle-aded randomzed ndex-generaton algorthm, denoted Gen, that produces a publc ndex σ whch s then provded to all crcuts of the nstance (and to any algorthm that attempts to solve the nstance). Specfcally, we consder source-or-snk nstances of the form {(Gen n, S n, P n )} n N, where for every n N and for every ndex σ produced by Gen n t holds that S n (σ, ) : {0, 1} n {0, 1} n and P n (σ, ) : {0, 1} n {0, 1} n. Smlarly, we consder SVL nstances of the form {(Gen n, S n, V n, T (n))} n N, where for every n N and for every ndex σ produced by Gen n t holds that S n (σ, ) : {0, 1} n {0, 1} n, V n (σ,, ) : {0, 1} n 2 n {0, 1}, and T (n) 2 n. We say that an SVL nstance s vald f for every n N, σ produced by Gen n, x {0, 1} n, and 2 n, t holds that V n (σ, x, ) = 1 f and only f x = S n(σ, 0 n ). Bounded TFNP nstances. As dscussed n Secton 1.1, we prove our results usng the noton of bounded-tfnp nstances, naturally generalzng source-or-snk nstances (and vald SVL nstances) by consderng TFNP nstances wth a guaranteed upper bound on the number of solutons. Defnton 2.3. A k-bounded TFNP nstance s of the form {Gen n, C n } n N, where for every n N and for every ndex σ produced by Gen n t holds that C n (σ, ) : {0, 1} n {0, 1}, and there s at least one and at most k(n) dstnct nputs x {0, 1} n such that C n (σ, x) = 1 (any one of these x s s a soluton). Note that any vald SVL nstance yelds a 1-bounded TFNP nstance (to whch we refer as a unque-tfnp nstance), and any source-or-snk nstance whch conssts of at most (k + 1)/2 dsjont lnes yelds a k-bounded TFNP nstance. The followng defnton formalzes the standard noton of average-case hardness n the specfc context of k-bounded TFNP nstances. Ths noton then serves as the bass of our defntons of black-box constructons. Defnton 2.4. Let k = k(n), t = t(n) and ɛ = ɛ(n) be functons of the securty parameter n N. A k-bounded TFNP nstance {Gen n, C n } n N s (t, ɛ)-hard f for any algorthm A that runs n tme t(n) t holds that Pr A (1 n, σ) = x s.t. C n (σ, x) = 1 ɛ(n) for nfntely many values of n N, where the probablty s taken over the choce of σ Gen n () and over the nternal randomness of A, 2.2 One-Way Functons and Injectve Trapdoor Functons We rely on the standard (parameterzed) notons of a one-way functon and njectve trapdoor functons Gol01. Defnton 2.5. An effcently-computable functon f : {0, 1} {0, 1} s (t( ), ɛ( ))-one-way f for any probablstc algorthm A that runs n tme t(n) t holds that Pr A (f(x)) f 1 (f(x)) ɛ(n) 10

13 for all suffcently large n N, where the probablty s taken over the choce of x {0, 1} n and over the nternal randomness of A. A collecton of njectve trapdoor functons s a trplet (KG, F, F 1 ) of polynomal-tme algorthms. The key-generaton algorthm KG s a probablstc algorthm that on nput the securty parameter 1 n outputs a par (pk, td), where pk s a publc key and td s a correspondng trapdoor. For any n N and for any par (pk, td) that s produced by KG(1 n ), the evaluaton algorthm F computes an njectve functon F(pk, ) : {0, 1} n {0, 1} l(n), and the nverson algorthm F 1 (td, ) : {0, 1} l(n) {0, 1} n { } computes ts nverse whenever an nverse exsts (.e., t outputs on all values y that are not n the mage of the functon F(pk, )). The securty requrement of njectve trapdoor functons s formalzed as follows: Defnton 2.6. A collecton of njectve trapdoor functons (KG, F, F 1 ) s (t( ), ɛ( ))-secure f for any probablstc algorthm A that runs n tme t(n) t holds that Pr A (pk, F(pk, x)) = x ɛ(n) for all suffcently large n N, where the probablty s taken over the choce of (pk, td) KG(1 n ), x {0, 1} n, and over the nternal randomness of A. 2.3 Key-Agreement Protocols We rely on the standard (parameterzed) noton of a key-agreement protocol. For our purposes n ths paper t suffces to consder key-agreement protocols n whch the partes agree on a sngle bt, and we refer to such protocols as bt-agreement protocols. A bt-agreement protocol conssts of a par (A, B) of probablstc polynomal-tme algorthms. We denote by (k A, k B, Trans) A(1 n ; r A ), B(1 n ; r B ) the random process of executng the protocol, where r A and r B are the random tapes of A and B, respectvely, k A and k B are the output bts of A and B, respectvely, and Trans s the transcrpt of the protocol (.e., the messages exchanged by the partes). Defnton 2.7. A par Π = (A, B) of probablstc polynomal-tme algorthms s a (t( ), ɛ( ))-secure bt-agreement protocol wth correctness ρ( ) f the followng two condtons hold: Correctness. For any n N t holds that Pr r A,r B k A = k B (k A, k B, Trans) A(1 n ; r A ), B(1 n ; r B ) ρ(n). Securty. For any probablstc algorthm E that runs n tme t(n) t holds that Adv KA Π,E(n) def = Pr Exp KA Π,E(n) = ɛ(n) for all suffcently large n N, where the random varable Exp KA Π,E (n) s defned va the followng experment: 1. (k A, k B, Trans) A(1 n ), B(1 n ). 2. k E(1 n, Trans). 3. If k = k A then output 1, and otherwse output 0. 11

14 3 Average-Case SVL Hardness Does Not Imply One-Way Functons In ths secton we prove that there s no fully black-box constructon of a one-way functon from a hard-on-average dstrbuton of SVL nstances 4 (provng Theorem 1.1). Our result s obtaned by presentng a dstrbuton of oracles relatve to whch the followng two propertes hold: 1. There exsts a hard-on-average dstrbuton of SVL nstances. 2. There are no one-way functons. Recall that an SVL nstance s of the form {(Gen n, S n, V n, L(n))} n N, where for every n N and for every ndex σ produced by Gen n t holds that S n (σ, ) : {0, 1} n {0, 1} n, V n (σ,, ) : {0, 1} n 2 n {0, 1}, and L(n) 2 n. We say that an SVL nstance s vald f for every n N, σ produced by Gen n, x {0, 1} n, and 2 n, t holds that V n (σ, x, ) = 1 f and only f x = S n(σ, 0 n ). The followng defnton talors the standard noton of a fully black-box constructon (based, for example, on Lub96, Gol00, RTV04) to the specfc prmtves under consderaton. Defnton 3.1. A fully black-box constructon of a one-way functon from a hard-on-average dstrbuton of SVL nstances conssts of an oracle-aded polynomal-tme algorthm F, an oracle-aded algorthm M that runs n tme T M ( ), and functons ɛ M,1 ( ) and ɛ M,2 ( ), such that the followng condtons hold: Correctness: There exsts a polynomal l( ) such that for any vald SVL nstance O SVL and for any x {0, 1} t holds that F O SVL(x) {0, 1} l( x ). Black-box proof of securty: For any vald SVL nstance O SVL = {(Gen n, S n, V n, L(n))} n N, for any oracle-aded algorthm A that runs n tme T A = T A (n), and for any functon ɛ A ( ), f Pr A O ( SVL F O SVL (x) ) ( F O ) 1 ( SVL F O SVL (x) ) ɛ A (n) for nfntely many values of n N, where the probablty s taken over the choce of x {0, 1} n and over the nternal randomness of A, then Pr M A,O SVL (1 n, σ) solves (S n (σ, ), V n (σ, ), L(n)) ɛ M,1 (T A (n)/ɛ A (n)) ɛ M,2 (n) for nfntely many values of n N, where the probablty s taken over the choce of σ Gen n () and over the nternal randomness of M. Followng Asharov and Segev AS15, AS16, we splt the securty loss n the above defnton to an adversary-dependent securty loss and an adversary-ndependent securty loss, as ths allows us to capture constructons where one of these losses s super-polynomal whereas the other s polynomal (e.g., BPR15, BPW16). In addton, we note that the correctness requrement n the above defnton may seem somewhat trval snce the fact that the output length of F O SVL( ) s polynomal follows drectly from the requrement that F runs n polynomal tme. However, for avodng rather trval techncal complcatons n the proofs of ths secton, for smplcty (and wthout loss of generalty) we nevertheless ask explctly that the output length s some fxed polynomal l(n) for any nput length n (clearly, l(n) may depend on the runnng tme of F, and shorter outputs can always be padded). Equpped wth the above defnton we prove the followng theorem: 4 Recall that any hard-on-average dstrbuton of SVL nstances can be used n a black-box manner to construct a hard-on-average dstrbuton of nstances of a PPAD-complete problem AKV04, BPR15. Thus, our result mples (n partcular) that average-case PPAD hardness does not mply one-way functons n a black-box manner. 12

15 Theorem 3.2. Let (F, M, T M, ɛ M,1, ɛ M,2 ) be a fully black-box constructon of a one-way functon from a hard-on-average SVL nstance. Then, at least one of the followng propertes holds: 1. T M (n) 2 ζn for some constant ζ > 0 (.e., the reducton runs n exponental tme). 2. ɛ M,1 (n c ) ɛ M,2 (n) 2 n/10 for some constant c > 1 (.e., the securty loss s exponental). In partcular, Theorem 3.2 rules out standard polynomal-tme polynomal-loss reductons. More generally, the theorem mples that f the runnng tme T M ( ) of the reducton s sub-exponental and the adversary-dependent securty loss ɛ M,1 ( ) s polynomal (as expected), then the adversaryndependent securty loss ɛ M,2 ( ) must be exponental (thus even rulng out constructons based on SVL nstances wth sub-exponental average-case hardness). 3.1 Proof Overvew In what follows we frst descrbe the oracle, denoted O SVL, on whch we rely for provng Theorem 3.2. Then, we descrbe the structure of the proof, showng that relatve to the oracle O SVL there exsts a hard-on-average dstrbuton of SVL nstances, but there are no one-way functons. For the remander of ths secton we remnd the reader that a q-query algorthm s an oracle-aded algorthm A such that for any oracle O and nput x {0, 1}, the computaton A O (x) conssts of at most q( x ) oracle calls to O. The oracle O SVL. The oracle O SVL s a vald SVL nstance {(S n, V n, L(n))} n N that s sampled va the followng process for every n N: Let L(n) = 2 n/2, x 0 = 0 n, and unformly sample dstnct elements x 1,..., x L(n) {0, 1} n \ {0 n }. The successor functon S n : {0, 1} n {0, 1} n s defned as { x+1 f x = x S n (x) = for some {0,..., L(n) 1} x otherwse. The verfcaton functon V n : {0, 1} n 2 n {0, 1} s defned n a manner that s consstent wth S n (.e., V n s defned such that the nstance s vald). Part I: O SVL s a hard-on-average SVL nstance. We show that the oracle O SVL tself s a hardon-average SVL nstance, whch mples n partcular that relatve to the oracle O SVL there exsts a hard-on-average dstrbuton of SVL nstances. We prove the followng clam statng that, n fact, the oracle O SVL s an exponentally hard-on-average SVL nstance (even wthout an ndex-generaton algorthm): Clam 3.3. For every q(n)-query algorthm M, where q(n) L(n) 1, t holds that Pr M O SVL (1 n ) solves (S n, V n, L(n)) (q(n) + 1) L(n) 2 n q(n) 1 for all suffcently large n N, where the probablty s taken over the choce of the oracle O SVL = {(S n, V n, L(n))} n N as descrbed above. The proof of the clam, whch s provded n Secton 3.2, s based on the followng, rather ntutve, observaton: Snce the lne 0 n x 1 x L(n) s sparse and unformly sampled, then any algorthm performng q = q(n) oracle queres should not be able to query O SVL wth any element 13

16 on the lne beyond the frst q elements 0 n, x 1,..., x q 1. In partcular, for our choce of parameters, any such algorthm should have only an exponentally-small probablty of reachng x L(n). Part II: Invertng oracle-aded functons relatve to O SVL. We show that any oracle-aded functon F O SVL( ) computable n tme t(n) can be nverted wth hgh probablty by an nverter that ssues roughly t(n) 4 oracle queres. We prove the followng clam: Clam 3.4. For every determnstc oracle-aded functon F that s computable n tme t(n) there exsts a q(n)-query algorthm A, where q(n) = O(t(n) 4 ), such that Pr A O ( SVL F O SVL (x) ) ( F O ) 1 ( SVL F O SVL (x) ) 1 2 for all suffcently large n N and for every x {0, 1} n, where the probablty s taken over the choce of the oracle O SVL = {(S n, V n, L(n))} n N as descrbed above. Moreover, the algorthm A can be mplemented n tme polynomal n q(n) gven access to a PSPACE-complete oracle. The proof of the clam, whch s provded n Secton 3.3, s based on the followng approach. Consder the value y = F O SVL(x) that s gven as nput to the nverter A. Snce F s computable n tme t = t(n), t can ssue at most t oracle queres and therefore the observaton used for provng Clam 3.3 mples that the computaton F O SVL(x) should not query O SVL wth any elements on the lne 0 n x 1 x L(n) except for the frst t elements x 0, x 1,..., x t 1. In ths case, any S n -query α n the computaton F O SVL(x) can be answered as follows: If α = x for some {0,..., t 1} then the answer s x +1, and otherwse the answer s α. Smlarly, any V n -query (α, j) n the computaton F O SVL(x) can be answered as follows: If (α, j) = (x, ) for some {0,..., t 1} then the answer s 1, and otherwse the answer s 0. Ths observaton gves rse to the followng nverter A: Frst perform t queres to S n for dscoverng x 1,..., x t, and then nvert y = F O SVL(x) relatve to the oracle Õ SVL defned va the followng successor functon S n : { x+1 f α = x S n (α) = for some {0,..., t 1} α otherwse The formal proof s n fact more subtle, and requres a sgnfcant amount of cauton when nvertng y = F O SVL(x) relatve to the oracle Õ SVL. Specfcally, the nverter A should fnd an nput x such that the computatons F ÕSVL( x) and F O SVL( x) do not query the oracles Õ SVL and O SVL, respectvely, wth any of x t,..., x L(n). In ths case, we show that ndeed F O SVL( x) = y and the nverter s successful. 3.2 O SVL s a Hard-on-Average SVL Instance The proof of Clam 3.3 reles on the fact that the lne 0 n x 1 x L(n) s sparse and unformly sampled. Ths ntutvely mples that any algorthm performng q oracle queres should not be able to query O SVL wth any element on the lne beyond the frst q elements 0 n, x 1,..., x q 1, except wth an exponentally-small probablty. Gven an oracle O SVL = {(S n, V n, L(n))} n N, sampled as descrbed n Secton 3.1, and gven a q- query algorthm M, for every n N and q we denote by α the random varable correspondng to M s th oracle query f ths s an S n -query, and we denote by (α, k ) the random varable correspondng to M s th oracle query f ths s a V n -query. We denote by HIT O SVL the event n whch there exst ndces j q and L(n) for whch α j = x but x 1 / {α 1,..., α j 1 }. That. s, ths s the event n whch M queres O SVL wth one of the x s before queryng on x 1. In partcular, note that f the event HIT O SVL does not occur, then M does not query O SVL wth x for {q,..., L(n)}. The followng clam bounds the probablty of event HIT O SVL. 14

Notes on Frequency Estimation in Data Streams

Notes on Frequency Estimation in Data Streams Notes on Frequency Estmaton n Data Streams In (one of) the data streamng model(s), the data s a sequence of arrvals a 1, a 2,..., a m of the form a j = (, v) where s the dentty of the tem and belongs to

More information

3.1 Expectation of Functions of Several Random Variables. )' be a k-dimensional discrete or continuous random vector, with joint PMF p (, E X E X1 E X

3.1 Expectation of Functions of Several Random Variables. )' be a k-dimensional discrete or continuous random vector, with joint PMF p (, E X E X1 E X Statstcs 1: Probablty Theory II 37 3 EPECTATION OF SEVERAL RANDOM VARIABLES As n Probablty Theory I, the nterest n most stuatons les not on the actual dstrbuton of a random vector, but rather on a number

More information

Finding Primitive Roots Pseudo-Deterministically

Finding Primitive Roots Pseudo-Deterministically Electronc Colloquum on Computatonal Complexty, Report No 207 (205) Fndng Prmtve Roots Pseudo-Determnstcally Ofer Grossman December 22, 205 Abstract Pseudo-determnstc algorthms are randomzed search algorthms

More information

Provable Security Signatures

Provable Security Signatures Provable Securty Sgnatures UCL - Louvan-la-Neuve Wednesday, July 10th, 2002 LIENS-CNRS Ecole normale supéreure Summary Introducton Sgnature FD PSS Forkng Lemma Generc Model Concluson Provable Securty -

More information

Problem Set 9 Solutions

Problem Set 9 Solutions Desgn and Analyss of Algorthms May 4, 2015 Massachusetts Insttute of Technology 6.046J/18.410J Profs. Erk Demane, Srn Devadas, and Nancy Lynch Problem Set 9 Solutons Problem Set 9 Solutons Ths problem

More information

The Order Relation and Trace Inequalities for. Hermitian Operators

The Order Relation and Trace Inequalities for. Hermitian Operators Internatonal Mathematcal Forum, Vol 3, 08, no, 507-57 HIKARI Ltd, wwwm-hkarcom https://doorg/0988/mf088055 The Order Relaton and Trace Inequaltes for Hermtan Operators Y Huang School of Informaton Scence

More information

Maximizing the number of nonnegative subsets

Maximizing the number of nonnegative subsets Maxmzng the number of nonnegatve subsets Noga Alon Hao Huang December 1, 213 Abstract Gven a set of n real numbers, f the sum of elements of every subset of sze larger than k s negatve, what s the maxmum

More information

a b a In case b 0, a being divisible by b is the same as to say that

a b a In case b 0, a being divisible by b is the same as to say that Secton 6.2 Dvsblty among the ntegers An nteger a ε s dvsble by b ε f there s an nteger c ε such that a = bc. Note that s dvsble by any nteger b, snce = b. On the other hand, a s dvsble by only f a = :

More information

Stanford University CS254: Computational Complexity Notes 7 Luca Trevisan January 29, Notes for Lecture 7

Stanford University CS254: Computational Complexity Notes 7 Luca Trevisan January 29, Notes for Lecture 7 Stanford Unversty CS54: Computatonal Complexty Notes 7 Luca Trevsan January 9, 014 Notes for Lecture 7 1 Approxmate Countng wt an N oracle We complete te proof of te followng result: Teorem 1 For every

More information

Difference Equations

Difference Equations Dfference Equatons c Jan Vrbk 1 Bascs Suppose a sequence of numbers, say a 0,a 1,a,a 3,... s defned by a certan general relatonshp between, say, three consecutve values of the sequence, e.g. a + +3a +1

More information

Lecture Space-Bounded Derandomization

Lecture Space-Bounded Derandomization Notes on Complexty Theory Last updated: October, 2008 Jonathan Katz Lecture Space-Bounded Derandomzaton 1 Space-Bounded Derandomzaton We now dscuss derandomzaton of space-bounded algorthms. Here non-trval

More information

G /G Advanced Cryptography 12/9/2009. Lecture 14

G /G Advanced Cryptography 12/9/2009. Lecture 14 G22.3220-001/G63.2180 Advanced Cryptography 12/9/2009 Lecturer: Yevgeny Dods Lecture 14 Scrbe: Arsteds Tentes In ths lecture we covered the Ideal/Real paradgm and the noton of UC securty. Moreover, we

More information

Structure and Drive Paul A. Jensen Copyright July 20, 2003

Structure and Drive Paul A. Jensen Copyright July 20, 2003 Structure and Drve Paul A. Jensen Copyrght July 20, 2003 A system s made up of several operatons wth flow passng between them. The structure of the system descrbes the flow paths from nputs to outputs.

More information

Lecture 4: Universal Hash Functions/Streaming Cont d

Lecture 4: Universal Hash Functions/Streaming Cont d CSE 5: Desgn and Analyss of Algorthms I Sprng 06 Lecture 4: Unversal Hash Functons/Streamng Cont d Lecturer: Shayan Oves Gharan Aprl 6th Scrbe: Jacob Schreber Dsclamer: These notes have not been subjected

More information

Introductory Cardinality Theory Alan Kaylor Cline

Introductory Cardinality Theory Alan Kaylor Cline Introductory Cardnalty Theory lan Kaylor Clne lthough by name the theory of set cardnalty may seem to be an offshoot of combnatorcs, the central nterest s actually nfnte sets. Combnatorcs deals wth fnte

More information

Lecture 4. Instructor: Haipeng Luo

Lecture 4. Instructor: Haipeng Luo Lecture 4 Instructor: Hapeng Luo In the followng lectures, we focus on the expert problem and study more adaptve algorthms. Although Hedge s proven to be worst-case optmal, one may wonder how well t would

More information

Remarks on the Properties of a Quasi-Fibonacci-like Polynomial Sequence

Remarks on the Properties of a Quasi-Fibonacci-like Polynomial Sequence Remarks on the Propertes of a Quas-Fbonacc-lke Polynomal Sequence Brce Merwne LIU Brooklyn Ilan Wenschelbaum Wesleyan Unversty Abstract Consder the Quas-Fbonacc-lke Polynomal Sequence gven by F 0 = 1,

More information

U.C. Berkeley CS294: Spectral Methods and Expanders Handout 8 Luca Trevisan February 17, 2016

U.C. Berkeley CS294: Spectral Methods and Expanders Handout 8 Luca Trevisan February 17, 2016 U.C. Berkeley CS94: Spectral Methods and Expanders Handout 8 Luca Trevsan February 7, 06 Lecture 8: Spectral Algorthms Wrap-up In whch we talk about even more generalzatons of Cheeger s nequaltes, and

More information

COS 521: Advanced Algorithms Game Theory and Linear Programming

COS 521: Advanced Algorithms Game Theory and Linear Programming COS 521: Advanced Algorthms Game Theory and Lnear Programmng Moses Charkar February 27, 2013 In these notes, we ntroduce some basc concepts n game theory and lnear programmng (LP). We show a connecton

More information

Finding Dense Subgraphs in G(n, 1/2)

Finding Dense Subgraphs in G(n, 1/2) Fndng Dense Subgraphs n Gn, 1/ Atsh Das Sarma 1, Amt Deshpande, and Rav Kannan 1 Georga Insttute of Technology,atsh@cc.gatech.edu Mcrosoft Research-Bangalore,amtdesh,annan@mcrosoft.com Abstract. Fndng

More information

find (x): given element x, return the canonical element of the set containing x;

find (x): given element x, return the canonical element of the set containing x; COS 43 Sprng, 009 Dsjont Set Unon Problem: Mantan a collecton of dsjont sets. Two operatons: fnd the set contanng a gven element; unte two sets nto one (destructvely). Approach: Canoncal element method:

More information

Stanford University CS359G: Graph Partitioning and Expanders Handout 4 Luca Trevisan January 13, 2011

Stanford University CS359G: Graph Partitioning and Expanders Handout 4 Luca Trevisan January 13, 2011 Stanford Unversty CS359G: Graph Parttonng and Expanders Handout 4 Luca Trevsan January 3, 0 Lecture 4 In whch we prove the dffcult drecton of Cheeger s nequalty. As n the past lectures, consder an undrected

More information

ANSWERS. Problem 1. and the moment generating function (mgf) by. defined for any real t. Use this to show that E( U) var( U)

ANSWERS. Problem 1. and the moment generating function (mgf) by. defined for any real t. Use this to show that E( U) var( U) Econ 413 Exam 13 H ANSWERS Settet er nndelt 9 deloppgaver, A,B,C, som alle anbefales å telle lkt for å gøre det ltt lettere å stå. Svar er gtt . Unfortunately, there s a prntng error n the hnt of

More information

Beyond Zudilin s Conjectured q-analog of Schmidt s problem

Beyond Zudilin s Conjectured q-analog of Schmidt s problem Beyond Zudln s Conectured q-analog of Schmdt s problem Thotsaporn Ae Thanatpanonda thotsaporn@gmalcom Mathematcs Subect Classfcaton: 11B65 33B99 Abstract Usng the methodology of (rgorous expermental mathematcs

More information

4 Analysis of Variance (ANOVA) 5 ANOVA. 5.1 Introduction. 5.2 Fixed Effects ANOVA

4 Analysis of Variance (ANOVA) 5 ANOVA. 5.1 Introduction. 5.2 Fixed Effects ANOVA 4 Analyss of Varance (ANOVA) 5 ANOVA 51 Introducton ANOVA ANOVA s a way to estmate and test the means of multple populatons We wll start wth one-way ANOVA If the populatons ncluded n the study are selected

More information

Min Cut, Fast Cut, Polynomial Identities

Min Cut, Fast Cut, Polynomial Identities Randomzed Algorthms, Summer 016 Mn Cut, Fast Cut, Polynomal Identtes Instructor: Thomas Kesselhem and Kurt Mehlhorn 1 Mn Cuts n Graphs Lecture (5 pages) Throughout ths secton, G = (V, E) s a mult-graph.

More information

Lectures - Week 4 Matrix norms, Conditioning, Vector Spaces, Linear Independence, Spanning sets and Basis, Null space and Range of a Matrix

Lectures - Week 4 Matrix norms, Conditioning, Vector Spaces, Linear Independence, Spanning sets and Basis, Null space and Range of a Matrix Lectures - Week 4 Matrx norms, Condtonng, Vector Spaces, Lnear Independence, Spannng sets and Bass, Null space and Range of a Matrx Matrx Norms Now we turn to assocatng a number to each matrx. We could

More information

Grover s Algorithm + Quantum Zeno Effect + Vaidman

Grover s Algorithm + Quantum Zeno Effect + Vaidman Grover s Algorthm + Quantum Zeno Effect + Vadman CS 294-2 Bomb 10/12/04 Fall 2004 Lecture 11 Grover s algorthm Recall that Grover s algorthm for searchng over a space of sze wors as follows: consder the

More information

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module 3 LOSSY IMAGE COMPRESSION SYSTEMS Verson ECE IIT, Kharagpur Lesson 6 Theory of Quantzaton Verson ECE IIT, Kharagpur Instructonal Objectves At the end of ths lesson, the students should be able to:

More information

6.842 Randomness and Computation February 18, Lecture 4

6.842 Randomness and Computation February 18, Lecture 4 6.842 Randomness and Computaton February 18, 2014 Lecture 4 Lecturer: Rontt Rubnfeld Scrbe: Amartya Shankha Bswas Topcs 2-Pont Samplng Interactve Proofs Publc cons vs Prvate cons 1 Two Pont Samplng 1.1

More information

20. Mon, Oct. 13 What we have done so far corresponds roughly to Chapters 2 & 3 of Lee. Now we turn to Chapter 4. The first idea is connectedness.

20. Mon, Oct. 13 What we have done so far corresponds roughly to Chapters 2 & 3 of Lee. Now we turn to Chapter 4. The first idea is connectedness. 20. Mon, Oct. 13 What we have done so far corresponds roughly to Chapters 2 & 3 of Lee. Now we turn to Chapter 4. The frst dea s connectedness. Essentally, we want to say that a space cannot be decomposed

More information

Affine transformations and convexity

Affine transformations and convexity Affne transformatons and convexty The purpose of ths document s to prove some basc propertes of affne transformatons nvolvng convex sets. Here are a few onlne references for background nformaton: http://math.ucr.edu/

More information

Speeding up Computation of Scalar Multiplication in Elliptic Curve Cryptosystem

Speeding up Computation of Scalar Multiplication in Elliptic Curve Cryptosystem H.K. Pathak et. al. / (IJCSE) Internatonal Journal on Computer Scence and Engneerng Speedng up Computaton of Scalar Multplcaton n Ellptc Curve Cryptosystem H. K. Pathak Manju Sangh S.o.S n Computer scence

More information

Lecture 5 September 17, 2015

Lecture 5 September 17, 2015 CS 229r: Algorthms for Bg Data Fall 205 Prof. Jelan Nelson Lecture 5 September 7, 205 Scrbe: Yakr Reshef Recap and overvew Last tme we dscussed the problem of norm estmaton for p-norms wth p > 2. We had

More information

Module 9. Lecture 6. Duality in Assignment Problems

Module 9. Lecture 6. Duality in Assignment Problems Module 9 1 Lecture 6 Dualty n Assgnment Problems In ths lecture we attempt to answer few other mportant questons posed n earler lecture for (AP) and see how some of them can be explaned through the concept

More information

Some Consequences. Example of Extended Euclidean Algorithm. The Fundamental Theorem of Arithmetic, II. Characterizing the GCD and LCM

Some Consequences. Example of Extended Euclidean Algorithm. The Fundamental Theorem of Arithmetic, II. Characterizing the GCD and LCM Example of Extended Eucldean Algorthm Recall that gcd(84, 33) = gcd(33, 18) = gcd(18, 15) = gcd(15, 3) = gcd(3, 0) = 3 We work backwards to wrte 3 as a lnear combnaton of 84 and 33: 3 = 18 15 [Now 3 s

More information

College of Computer & Information Science Fall 2009 Northeastern University 20 October 2009

College of Computer & Information Science Fall 2009 Northeastern University 20 October 2009 College of Computer & Informaton Scence Fall 2009 Northeastern Unversty 20 October 2009 CS7880: Algorthmc Power Tools Scrbe: Jan Wen and Laura Poplawsk Lecture Outlne: Prmal-dual schema Network Desgn:

More information

U.C. Berkeley CS278: Computational Complexity Professor Luca Trevisan 2/21/2008. Notes for Lecture 8

U.C. Berkeley CS278: Computational Complexity Professor Luca Trevisan 2/21/2008. Notes for Lecture 8 U.C. Berkeley CS278: Computatonal Complexty Handout N8 Professor Luca Trevsan 2/21/2008 Notes for Lecture 8 1 Undrected Connectvty In the undrected s t connectvty problem (abbrevated ST-UCONN) we are gven

More information

The Minimum Universal Cost Flow in an Infeasible Flow Network

The Minimum Universal Cost Flow in an Infeasible Flow Network Journal of Scences, Islamc Republc of Iran 17(2): 175-180 (2006) Unversty of Tehran, ISSN 1016-1104 http://jscencesutacr The Mnmum Unversal Cost Flow n an Infeasble Flow Network H Saleh Fathabad * M Bagheran

More information

18.1 Introduction and Recap

18.1 Introduction and Recap CS787: Advanced Algorthms Scrbe: Pryananda Shenoy and Shjn Kong Lecturer: Shuch Chawla Topc: Streamng Algorthmscontnued) Date: 0/26/2007 We contnue talng about streamng algorthms n ths lecture, ncludng

More information

The Second Anti-Mathima on Game Theory

The Second Anti-Mathima on Game Theory The Second Ant-Mathma on Game Theory Ath. Kehagas December 1 2006 1 Introducton In ths note we wll examne the noton of game equlbrum for three types of games 1. 2-player 2-acton zero-sum games 2. 2-player

More information

Assortment Optimization under MNL

Assortment Optimization under MNL Assortment Optmzaton under MNL Haotan Song Aprl 30, 2017 1 Introducton The assortment optmzaton problem ams to fnd the revenue-maxmzng assortment of products to offer when the prces of products are fxed.

More information

2E Pattern Recognition Solutions to Introduction to Pattern Recognition, Chapter 2: Bayesian pattern classification

2E Pattern Recognition Solutions to Introduction to Pattern Recognition, Chapter 2: Bayesian pattern classification E395 - Pattern Recognton Solutons to Introducton to Pattern Recognton, Chapter : Bayesan pattern classfcaton Preface Ths document s a soluton manual for selected exercses from Introducton to Pattern Recognton

More information

Lecture 2: Gram-Schmidt Vectors and the LLL Algorithm

Lecture 2: Gram-Schmidt Vectors and the LLL Algorithm NYU, Fall 2016 Lattces Mn Course Lecture 2: Gram-Schmdt Vectors and the LLL Algorthm Lecturer: Noah Stephens-Davdowtz 2.1 The Shortest Vector Problem In our last lecture, we consdered short solutons to

More information

More metrics on cartesian products

More metrics on cartesian products More metrcs on cartesan products If (X, d ) are metrc spaces for 1 n, then n Secton II4 of the lecture notes we defned three metrcs on X whose underlyng topologes are the product topology The purpose of

More information

arxiv: v1 [quant-ph] 6 Sep 2007

arxiv: v1 [quant-ph] 6 Sep 2007 An Explct Constructon of Quantum Expanders Avraham Ben-Aroya Oded Schwartz Amnon Ta-Shma arxv:0709.0911v1 [quant-ph] 6 Sep 2007 Abstract Quantum expanders are a natural generalzaton of classcal expanders.

More information

Basic Regular Expressions. Introduction. Introduction to Computability. Theory. Motivation. Lecture4: Regular Expressions

Basic Regular Expressions. Introduction. Introduction to Computability. Theory. Motivation. Lecture4: Regular Expressions Introducton to Computablty Theory Lecture: egular Expressons Prof Amos Israel Motvaton If one wants to descrbe a regular language, La, she can use the a DFA, Dor an NFA N, such L ( D = La that that Ths

More information

Graph Reconstruction by Permutations

Graph Reconstruction by Permutations Graph Reconstructon by Permutatons Perre Ille and Wllam Kocay* Insttut de Mathémathques de Lumny CNRS UMR 6206 163 avenue de Lumny, Case 907 13288 Marselle Cedex 9, France e-mal: lle@ml.unv-mrs.fr Computer

More information

Psychology 282 Lecture #24 Outline Regression Diagnostics: Outliers

Psychology 282 Lecture #24 Outline Regression Diagnostics: Outliers Psychology 282 Lecture #24 Outlne Regresson Dagnostcs: Outlers In an earler lecture we studed the statstcal assumptons underlyng the regresson model, ncludng the followng ponts: Formal statement of assumptons.

More information

Edge Isoperimetric Inequalities

Edge Isoperimetric Inequalities November 7, 2005 Ross M. Rchardson Edge Isopermetrc Inequaltes 1 Four Questons Recall that n the last lecture we looked at the problem of sopermetrc nequaltes n the hypercube, Q n. Our noton of boundary

More information

Computationally Private Randomizing Polynomials and Their Applications

Computationally Private Randomizing Polynomials and Their Applications Computatonally Prvate Randomzng Polynomals and Ther Applcatons Benny Applebaum Yuval Isha Eyal Kushlevtz Computer Scence Department, Technon {abenny,yuval,eyalk}@cs.technon.ac.l March 5, 2006 Abstract

More information

NP-Completeness : Proofs

NP-Completeness : Proofs NP-Completeness : Proofs Proof Methods A method to show a decson problem Π NP-complete s as follows. (1) Show Π NP. (2) Choose an NP-complete problem Π. (3) Show Π Π. A method to show an optmzaton problem

More information

n ). This is tight for all admissible values of t, k and n. k t + + n t

n ). This is tight for all admissible values of t, k and n. k t + + n t MAXIMIZING THE NUMBER OF NONNEGATIVE SUBSETS NOGA ALON, HAROUT AYDINIAN, AND HAO HUANG Abstract. Gven a set of n real numbers, f the sum of elements of every subset of sze larger than k s negatve, what

More information

Randomness and Computation

Randomness and Computation Randomness and Computaton or, Randomzed Algorthms Mary Cryan School of Informatcs Unversty of Ednburgh RC 208/9) Lecture 0 slde Balls n Bns m balls, n bns, and balls thrown unformly at random nto bns usually

More information

arxiv: v1 [math.ho] 18 May 2008

arxiv: v1 [math.ho] 18 May 2008 Recurrence Formulas for Fbonacc Sums Adlson J. V. Brandão, João L. Martns 2 arxv:0805.2707v [math.ho] 8 May 2008 Abstract. In ths artcle we present a new recurrence formula for a fnte sum nvolvng the Fbonacc

More information

Power law and dimension of the maximum value for belief distribution with the max Deng entropy

Power law and dimension of the maximum value for belief distribution with the max Deng entropy Power law and dmenson of the maxmum value for belef dstrbuton wth the max Deng entropy Bngy Kang a, a College of Informaton Engneerng, Northwest A&F Unversty, Yanglng, Shaanx, 712100, Chna. Abstract Deng

More information

Section 8.3 Polar Form of Complex Numbers

Section 8.3 Polar Form of Complex Numbers 80 Chapter 8 Secton 8 Polar Form of Complex Numbers From prevous classes, you may have encountered magnary numbers the square roots of negatve numbers and, more generally, complex numbers whch are the

More information

Errors for Linear Systems

Errors for Linear Systems Errors for Lnear Systems When we solve a lnear system Ax b we often do not know A and b exactly, but have only approxmatons  and ˆb avalable. Then the best thng we can do s to solve ˆx ˆb exactly whch

More information

Calculation of time complexity (3%)

Calculation of time complexity (3%) Problem 1. (30%) Calculaton of tme complexty (3%) Gven n ctes, usng exhaust search to see every result takes O(n!). Calculaton of tme needed to solve the problem (2%) 40 ctes:40! dfferent tours 40 add

More information

arxiv: v1 [cs.gt] 14 Mar 2019

arxiv: v1 [cs.gt] 14 Mar 2019 Stable Roommates wth Narcssstc, Sngle-Peaked, and Sngle-Crossng Preferences Robert Bredereck 1, Jehua Chen 2, Ugo Paavo Fnnendahl 1, and Rolf Nedermeer 1 arxv:1903.05975v1 [cs.gt] 14 Mar 2019 1 TU Berln,

More information

Message modification, neutral bits and boomerangs

Message modification, neutral bits and boomerangs Message modfcaton, neutral bts and boomerangs From whch round should we start countng n SHA? Antone Joux DGA and Unversty of Versalles St-Quentn-en-Yvelnes France Jont work wth Thomas Peyrn 1 Dfferental

More information

Lecture 5 Decoding Binary BCH Codes

Lecture 5 Decoding Binary BCH Codes Lecture 5 Decodng Bnary BCH Codes In ths class, we wll ntroduce dfferent methods for decodng BCH codes 51 Decodng the [15, 7, 5] 2 -BCH Code Consder the [15, 7, 5] 2 -code C we ntroduced n the last lecture

More information

princeton univ. F 17 cos 521: Advanced Algorithm Design Lecture 7: LP Duality Lecturer: Matt Weinberg

princeton univ. F 17 cos 521: Advanced Algorithm Design Lecture 7: LP Duality Lecturer: Matt Weinberg prnceton unv. F 17 cos 521: Advanced Algorthm Desgn Lecture 7: LP Dualty Lecturer: Matt Wenberg Scrbe: LP Dualty s an extremely useful tool for analyzng structural propertes of lnear programs. Whle there

More information

Lecture 10: May 6, 2013

Lecture 10: May 6, 2013 TTIC/CMSC 31150 Mathematcal Toolkt Sprng 013 Madhur Tulsan Lecture 10: May 6, 013 Scrbe: Wenje Luo In today s lecture, we manly talked about random walk on graphs and ntroduce the concept of graph expander,

More information

The Multiple Classical Linear Regression Model (CLRM): Specification and Assumptions. 1. Introduction

The Multiple Classical Linear Regression Model (CLRM): Specification and Assumptions. 1. Introduction ECONOMICS 5* -- NOTE (Summary) ECON 5* -- NOTE The Multple Classcal Lnear Regresson Model (CLRM): Specfcaton and Assumptons. Introducton CLRM stands for the Classcal Lnear Regresson Model. The CLRM s also

More information

Feature Selection: Part 1

Feature Selection: Part 1 CSE 546: Machne Learnng Lecture 5 Feature Selecton: Part 1 Instructor: Sham Kakade 1 Regresson n the hgh dmensonal settng How do we learn when the number of features d s greater than the sample sze n?

More information

Subset Topological Spaces and Kakutani s Theorem

Subset Topological Spaces and Kakutani s Theorem MOD Natural Neutrosophc Subset Topologcal Spaces and Kakutan s Theorem W. B. Vasantha Kandasamy lanthenral K Florentn Smarandache 1 Copyrght 1 by EuropaNova ASBL and the Authors Ths book can be ordered

More information

Generalized Linear Methods

Generalized Linear Methods Generalzed Lnear Methods 1 Introducton In the Ensemble Methods the general dea s that usng a combnaton of several weak learner one could make a better learner. More formally, assume that we have a set

More information

FREQUENCY DISTRIBUTIONS Page 1 of The idea of a frequency distribution for sets of observations will be introduced,

FREQUENCY DISTRIBUTIONS Page 1 of The idea of a frequency distribution for sets of observations will be introduced, FREQUENCY DISTRIBUTIONS Page 1 of 6 I. Introducton 1. The dea of a frequency dstrbuton for sets of observatons wll be ntroduced, together wth some of the mechancs for constructng dstrbutons of data. Then

More information

11 Tail Inequalities Markov s Inequality. Lecture 11: Tail Inequalities [Fa 13]

11 Tail Inequalities Markov s Inequality. Lecture 11: Tail Inequalities [Fa 13] Algorthms Lecture 11: Tal Inequaltes [Fa 13] If you hold a cat by the tal you learn thngs you cannot learn any other way. Mark Twan 11 Tal Inequaltes The smple recursve structure of skp lsts made t relatvely

More information

On the Instantiability of Hash-and-Sign RSA Signatures

On the Instantiability of Hash-and-Sign RSA Signatures On the Instantablty of Hash-and-Sgn RSA Sgnatures Yevgeny Dods Iftach Hatner Ars Tentes December 29, 2011 Abstract The hash-and-sgn RSA sgnature s one of the most elegant and well known sgnatures schemes,

More information

Ensemble Methods: Boosting

Ensemble Methods: Boosting Ensemble Methods: Boostng Ncholas Ruozz Unversty of Texas at Dallas Based on the sldes of Vbhav Gogate and Rob Schapre Last Tme Varance reducton va baggng Generate new tranng data sets by samplng wth replacement

More information

Case A. P k = Ni ( 2L i k 1 ) + (# big cells) 10d 2 P k.

Case A. P k = Ni ( 2L i k 1 ) + (# big cells) 10d 2 P k. THE CELLULAR METHOD In ths lecture, we ntroduce the cellular method as an approach to ncdence geometry theorems lke the Szemeréd-Trotter theorem. The method was ntroduced n the paper Combnatoral complexty

More information

Lecture 3. Ax x i a i. i i

Lecture 3. Ax x i a i. i i 18.409 The Behavor of Algorthms n Practce 2/14/2 Lecturer: Dan Spelman Lecture 3 Scrbe: Arvnd Sankar 1 Largest sngular value In order to bound the condton number, we need an upper bound on the largest

More information

CHAPTER 4. Vector Spaces

CHAPTER 4. Vector Spaces man 2007/2/16 page 234 CHAPTER 4 Vector Spaces To crtcze mathematcs for ts abstracton s to mss the pont entrel. Abstracton s what makes mathematcs work. Ian Stewart The man am of ths tet s to stud lnear

More information

On a direct solver for linear least squares problems

On a direct solver for linear least squares problems ISSN 2066-6594 Ann. Acad. Rom. Sc. Ser. Math. Appl. Vol. 8, No. 2/2016 On a drect solver for lnear least squares problems Constantn Popa Abstract The Null Space (NS) algorthm s a drect solver for lnear

More information

Lecture 17 : Stochastic Processes II

Lecture 17 : Stochastic Processes II : Stochastc Processes II 1 Contnuous-tme stochastc process So far we have studed dscrete-tme stochastc processes. We studed the concept of Makov chans and martngales, tme seres analyss, and regresson analyss

More information

Volume 18 Figure 1. Notation 1. Notation 2. Observation 1. Remark 1. Remark 2. Remark 3. Remark 4. Remark 5. Remark 6. Theorem A [2]. Theorem B [2].

Volume 18 Figure 1. Notation 1. Notation 2. Observation 1. Remark 1. Remark 2. Remark 3. Remark 4. Remark 5. Remark 6. Theorem A [2]. Theorem B [2]. Bulletn of Mathematcal Scences and Applcatons Submtted: 016-04-07 ISSN: 78-9634, Vol. 18, pp 1-10 Revsed: 016-09-08 do:10.1805/www.scpress.com/bmsa.18.1 Accepted: 016-10-13 017 ScPress Ltd., Swtzerland

More information

Hash functions : MAC / HMAC

Hash functions : MAC / HMAC Hash functons : MAC / HMAC Outlne Message Authentcaton Codes Keyed hash famly Uncondtonally Secure MACs Ref: D Stnson: Cryprography Theory and Practce (3 rd ed), Chap 4. Unversal hash famly Notatons: X

More information

5 The Rational Canonical Form

5 The Rational Canonical Form 5 The Ratonal Canoncal Form Here p s a monc rreducble factor of the mnmum polynomal m T and s not necessarly of degree one Let F p denote the feld constructed earler n the course, consstng of all matrces

More information

Lecture 3: Probability Distributions

Lecture 3: Probability Distributions Lecture 3: Probablty Dstrbutons Random Varables Let us begn by defnng a sample space as a set of outcomes from an experment. We denote ths by S. A random varable s a functon whch maps outcomes nto the

More information

Simultaneous Optimization of Berth Allocation, Quay Crane Assignment and Quay Crane Scheduling Problems in Container Terminals

Simultaneous Optimization of Berth Allocation, Quay Crane Assignment and Quay Crane Scheduling Problems in Container Terminals Smultaneous Optmzaton of Berth Allocaton, Quay Crane Assgnment and Quay Crane Schedulng Problems n Contaner Termnals Necat Aras, Yavuz Türkoğulları, Z. Caner Taşkın, Kuban Altınel Abstract In ths work,

More information

Vapnik-Chervonenkis theory

Vapnik-Chervonenkis theory Vapnk-Chervonenks theory Rs Kondor June 13, 2008 For the purposes of ths lecture, we restrct ourselves to the bnary supervsed batch learnng settng. We assume that we have an nput space X, and an unknown

More information

COMPLEX NUMBERS AND QUADRATIC EQUATIONS

COMPLEX NUMBERS AND QUADRATIC EQUATIONS COMPLEX NUMBERS AND QUADRATIC EQUATIONS INTRODUCTION We know that x 0 for all x R e the square of a real number (whether postve, negatve or ero) s non-negatve Hence the equatons x, x, x + 7 0 etc are not

More information

EPR Paradox and the Physical Meaning of an Experiment in Quantum Mechanics. Vesselin C. Noninski

EPR Paradox and the Physical Meaning of an Experiment in Quantum Mechanics. Vesselin C. Noninski EPR Paradox and the Physcal Meanng of an Experment n Quantum Mechancs Vesseln C Nonnsk vesselnnonnsk@verzonnet Abstract It s shown that there s one purely determnstc outcome when measurement s made on

More information

Chapter 13: Multiple Regression

Chapter 13: Multiple Regression Chapter 13: Multple Regresson 13.1 Developng the multple-regresson Model The general model can be descrbed as: It smplfes for two ndependent varables: The sample ft parameter b 0, b 1, and b are used to

More information

BOUNDEDNESS OF THE RIESZ TRANSFORM WITH MATRIX A 2 WEIGHTS

BOUNDEDNESS OF THE RIESZ TRANSFORM WITH MATRIX A 2 WEIGHTS BOUNDEDNESS OF THE IESZ TANSFOM WITH MATIX A WEIGHTS Introducton Let L = L ( n, be the functon space wth norm (ˆ f L = f(x C dx d < For a d d matrx valued functon W : wth W (x postve sem-defnte for all

More information

Foundations of Arithmetic

Foundations of Arithmetic Foundatons of Arthmetc Notaton We shall denote the sum and product of numbers n the usual notaton as a 2 + a 2 + a 3 + + a = a, a 1 a 2 a 3 a = a The notaton a b means a dvdes b,.e. ac = b where c s an

More information

THE SUMMATION NOTATION Ʃ

THE SUMMATION NOTATION Ʃ Sngle Subscrpt otaton THE SUMMATIO OTATIO Ʃ Most of the calculatons we perform n statstcs are repettve operatons on lsts of numbers. For example, we compute the sum of a set of numbers, or the sum of the

More information

Distribution of subgraphs of random regular graphs

Distribution of subgraphs of random regular graphs Dstrbuton of subgraphs of random regular graphs Zhcheng Gao Faculty of Busness Admnstraton Unversty of Macau Macau Chna zcgao@umac.mo N. C. Wormald Department of Combnatorcs and Optmzaton Unversty of Waterloo

More information

Numerical Heat and Mass Transfer

Numerical Heat and Mass Transfer Master degree n Mechancal Engneerng Numercal Heat and Mass Transfer 06-Fnte-Dfference Method (One-dmensonal, steady state heat conducton) Fausto Arpno f.arpno@uncas.t Introducton Why we use models and

More information

9 Characteristic classes

9 Characteristic classes THEODORE VORONOV DIFFERENTIAL GEOMETRY. Sprng 2009 [under constructon] 9 Characterstc classes 9.1 The frst Chern class of a lne bundle Consder a complex vector bundle E B of rank p. We shall construct

More information

E Tail Inequalities. E.1 Markov s Inequality. Non-Lecture E: Tail Inequalities

E Tail Inequalities. E.1 Markov s Inequality. Non-Lecture E: Tail Inequalities Algorthms Non-Lecture E: Tal Inequaltes If you hold a cat by the tal you learn thngs you cannot learn any other way. Mar Twan E Tal Inequaltes The smple recursve structure of sp lsts made t relatvely easy

More information

Real-Time Systems. Multiprocessor scheduling. Multiprocessor scheduling. Multiprocessor scheduling

Real-Time Systems. Multiprocessor scheduling. Multiprocessor scheduling. Multiprocessor scheduling Real-Tme Systems Multprocessor schedulng Specfcaton Implementaton Verfcaton Multprocessor schedulng -- -- Global schedulng How are tasks assgned to processors? Statc assgnment The processor(s) used for

More information

Supplement: Proofs and Technical Details for The Solution Path of the Generalized Lasso

Supplement: Proofs and Technical Details for The Solution Path of the Generalized Lasso Supplement: Proofs and Techncal Detals for The Soluton Path of the Generalzed Lasso Ryan J. Tbshran Jonathan Taylor In ths document we gve supplementary detals to the paper The Soluton Path of the Generalzed

More information

Exercises of Chapter 2

Exercises of Chapter 2 Exercses of Chapter Chuang-Cheh Ln Department of Computer Scence and Informaton Engneerng, Natonal Chung Cheng Unversty, Mng-Hsung, Chay 61, Tawan. Exercse.6. Suppose that we ndependently roll two standard

More information

Fundamental loop-current method using virtual voltage sources technique for special cases

Fundamental loop-current method using virtual voltage sources technique for special cases Fundamental loop-current method usng vrtual voltage sources technque for specal cases George E. Chatzaraks, 1 Marna D. Tortorel 1 and Anastasos D. Tzolas 1 Electrcal and Electroncs Engneerng Departments,

More information

Global Sensitivity. Tuesday 20 th February, 2018

Global Sensitivity. Tuesday 20 th February, 2018 Global Senstvty Tuesday 2 th February, 28 ) Local Senstvty Most senstvty analyses [] are based on local estmates of senstvty, typcally by expandng the response n a Taylor seres about some specfc values

More information

Week3, Chapter 4. Position and Displacement. Motion in Two Dimensions. Instantaneous Velocity. Average Velocity

Week3, Chapter 4. Position and Displacement. Motion in Two Dimensions. Instantaneous Velocity. Average Velocity Week3, Chapter 4 Moton n Two Dmensons Lecture Quz A partcle confned to moton along the x axs moves wth constant acceleraton from x =.0 m to x = 8.0 m durng a 1-s tme nterval. The velocty of the partcle

More information

HMMT February 2016 February 20, 2016

HMMT February 2016 February 20, 2016 HMMT February 016 February 0, 016 Combnatorcs 1. For postve ntegers n, let S n be the set of ntegers x such that n dstnct lnes, no three concurrent, can dvde a plane nto x regons (for example, S = {3,

More information