No abstract available.
Reviewers
Statistical Zero-Knowledge Arguments for NP from Any One-Way Function
We show that every language in NP has a statistical zero-knowledge argument system under the (minimal) complexity assumption that one-way functions exist. In such protocols, even a computationally unbounded verifier cannot learn anything other than the ...
Fault-Tolerant Distributed Computing in Full-Information Networks
In this paper, we use random-selection protocols in the full-information model to solve classical problems in distributed computing. Our main results are the following:--An O(log n)-round randomized Byzantine Agreement (BA) protocol in a synchronous ...
Explicit Exclusive Set Systems with Applications to Broadcast Encryption
A family of subsets C of [n]\underline{\underline {def}}{1, . . . , n} is (r, t)- exclusive if for every S \subset[n] of size at least n - r, there exist S_1, . . . , S_t \in C with S = S_1\cupS_2\cup· · · \cupS_t. These families, also known as ...
A simple condition implying rapid mixing of single-site dynamics on spin systems
Spin systems are a general way to describe local interactions between nodes in a graph. In statistical mechanics, spin systems are often used as a model for physical systems. In computer science, they comprise an important class of families of ...
Heat Flow and a Faster Algorithm to Compute the Surface Area of a Convex Body
We draw on the observation that the amount of heat diffusing outside of a heated body in a short period of time is proportional to its surface area, to design a simple algorithm for approximating the surface area of a convex body given by a membership ...
Fast Algorithms for Logconcave Functions: Sampling, Rounding, Integration and Optimization
We prove that the hit-and-run random walk is rapidly mixing for an arbitrary logconcave distribution starting from any point in the support. This extends the work of [26], where this was shown for an important special case, and settles the main ...
A Local Switch Markov Chain on Given Degree Graphs with Application in Connectivity of Peer-to-Peer Networks
We study a switch Markov chain on regular graphs, where switches are allowed only between links that are at distance 2; we call this the Flip. The motivation for studying the Flip Markov chain arises in the context of unstructured peer-to-peer networks, ...
Strategic Network Formation through Peering and Service Agreements
We introduce a game theoretic model of network formation in an effort to understand the complex system of business relationships between various Internet entities (e.g., Autonomous Systems, enterprise networks, residential customers). This system is at ...
Towards Secure and Scalable Computation in Peer-to-Peer Networks
We consider the problems of Byzantine Agreement and Leader Election, where a constant fraction b \le 1/3 of processors are controlled by a malicious adversary. The first problem requires that all uncorrupted processors come to an agreement on a bit ...
Lp metrics on the Heisenberg group and the Goemans-Linial conjecture
We prove that the function d : \mathbb{R}^3\times \mathbb{R}^3\to [0,\infty ) given by d\left( {(x,y,z),(t,u,v)} \right)= \left( {[((t - x)^2+ (u - y)^2 )^2+ (v - z + 2xu - 2yt)^2 ]^{\frac{1} {2}}+ (t - x)^2+ (u - y)^2 } \right)^{\frac{1} {2}} .is a ...
Ramsey partitions and proximity data structures
This paper addresses the non-linear isomorphic Dvoretzky theorem and the design of good approximate distance oracles for large distortion. We introduce and construct optimal Ramsey partitions, and use them to show that for every \varepsilon\in (0, 1), ...
Algorithms on negatively curved spaces
We initiate the study of approximate algorithms on negatively curved spaces. These spaces have recently become of interest in various domains of computer science including networking and vision. The classical example of such a space is the real-...
Beyond Hirsch Conjecture: Walks on Random Polytopes and Smoothed Complexity of the Simplex Method
Spielman and Teng proved that the shadow-vertex simplex method had polynomial smoothed complexity. On a slight random perturbation of arbitrary linear program, the simplex method finds the solution after a walk on the feasible polytope(s) with expected ...
Improved Approximation Algorithms for Large Matrices via Random Projections
Recently several results appeared that show significant reduction in time for matrix multiplication, singular value decomposition as well as linear (\ell_ 2) regression, all based on data dependent random sampling. Our key idea is that low dimensional ...
Worst-case and Smoothed Analysis of the ICP Algorithm, with an Application to the k-means Method
We show a worst-case lower bound and a smoothed upper bound on the number of iterations performed by the Iterative Closest Point (ICP) algorithm. First proposed by Besl and McKay, the algorithm is widely used in computational geometry where it is known ...
The Effectiveness of Lloyd-Type Methods for the k-Means Problem
We investigate variants of Lloyd's heuristic for clustering high dimensional data in an attempt to explain its popularity (a half century after its introduction) among practitioners, and in order to suggest improvements in its application. We propose ...
Better lossless condensers through derandomized curve samplers
Lossless condensers are unbalanced expander graphs, with expansion close to optimal. Equivalently, they may be viewed as functions that use a short random seed to map a source on n bits to a source on many fewer bits while preserving all of the min-...
Approximately List-Decoding Direct Product Codes and Uniform Hardness Amplification
We consider the problem of approximately locally listdecoding direct product codes. For a parameter k, the kwise direct product encoding of an N-bit message msg is an N^{k}-length string over the alphabet {0, 1}^k indexed by ktuples (i_1, . . . , i_k) \...
Index Coding with Side Information
Motivated by a problem of transmitting data over broadcast channels (Birk and Kol, INFOCOM 1998), we study the following coding problem: a sender communicates with n receivers R_1, . . . , R_n. He holds an input x \in {0, 1}^n and wishes to broadcast a ...
Subspace Polynomials and List Decoding of Reed-Solomon Codes
We show combinatorial limitations on efficient list decoding of Reed-Solomon codes beyond the Johnson and Guruswami-Sudan bounds [Joh62, Joh63, GS99]. In particular, we show that for arbitrarily large fields \mathbb{F}_N ,|\mathbb{F}_N| = N, for any \...
SDP gaps and UGC-hardness for MAXCUTGAIN
Given a graph with maximum cut of (fractional) size c, the Goemans-Williamson [GW95] semidefinite programming (SDP) algorithm is guaranteed to find a cut of size .878 · c. However this guarantee becomes trivial when c is near 1/2, since a random cut has ...
Correlated Algebraic-Geometric Codes: Improved List Decoding over Bounded Alphabets
We define a new family of error-correcting codes based on algebraic curves over finite fields, and develop efficient list decoding algorithms for them. Our codes extend the class of algebraic-geometric (AG) codes via a (nonobvious) generalization of the ...
Cryptography from Anonymity
There is a vast body of work on implementing anonymous communication. In this paper, we study the possibility of using anonymous communication as a building block, and show that one can leverage on anonymity in a variety of cryptographic contexts. Our ...
Secure Multiparty Quantum Computation with (Only) a Strict Honest Majority
Secret sharing and multiparty computation (also called "secure function evaluation") are fundamental primitives in modern cryptography, allowing a group of mutually distrustful players to perform correct, distributed computations under the sole ...
Settling the Complexity of Two-Player Nash Equilibrium
We prove that the problem of finding a Nash equilibrium in a two-player game is PPAD-complete.
Minimum Bounded Degree Spanning Trees
We consider the minimum cost spanning tree problem under the restriction that all degrees must be at most a given value k. We show that we can efficiently find a spanning tree of maximum degree at most k+2 whose cost is at most the cost of the optimum ...
Approximate Min-Max Theorems of Steiner Rooted-Orientations of Hypergraphs
Given an undirected hypergraph and a subset of vertices S \subseteqV with a specified root vertex r \in S, the STEINER ROOTED-ORIENTATION problem is to find an orientation of all the hyperedges so that in the resulting directed hypergraph the "...