- Sponsor:
- sigact
No abstract available.
Proceeding Downloads
Multiparty protocols and logspace-hard pseudorandom sequences
Let ƒ(x1, ···· xk) be a Boolean function that k parties wish to collaboratively evaluate. The i'th party knows each input argument except xi; and each party has unlimited computational power. They share a blackboard, viewed by all parties, where they ...
Pseudo-random generation from one-way functions
We show that the existence of one-way functions is necessary and sufficient for the existence of pseudo-random generators in the following sense. Let ƒ be an easily computable function such that when x is chosen randomly: (1) from ƒ(x) it is hard to ...
A hard-core predicate for all one-way functions
A central tool in constructing pseudorandom generators, secure encryption functions, and in other areas are “hard-core” predicates b of functions (permutations) ƒ, discovered in [Blum Micali 82]. Such b(x) cannot be efficiently guessed (substantially ...
Universal one-way hash functions and their cryptographic applications
We define a Universal One-Way Hash Function family, a new primitive which enables the compression of elements in the function domain. The main property of this primitive is that given an element x. We prove constructively that universal one-way hash ...
Limits on the provable consequences of one-way permutations
We present strong evidence that the implication, “if one-way permutations exist, then secure secret key agreement is possible”, is not provable by standard techniques. Since both sides of this implication are widely believed true in real life, to show ...
A zero-one law for Boolean privacy
A Boolean function ƒ: A1 X A2 X … X An → {0,1} is t - private if there exists a protocol for computing ƒ so that no coalition of size ≤ t can infer any additional information from the execution, other than the value of the function. We show that ƒ is ⌈n/...
Verifiable secret sharing and multiparty protocols with honest majority
Under the assumption that each participant can broadcast a message to all other participants and that each pair of participants can communicate secretly, we present a verifiable secret sharing protocol, and show that any multiparty protocol, or game ...
Designing programs that check their work
A program correctness checker is an algorithm for checking the output of a computation. This paper defines the concept of a program checker. It designs program checkers for a few specific and carefully chosen problems in the class P of problems solvable ...
Provably fast integer factoring with quasi-uniform small quadratic residues
Finding small quadratic residues modulo n, when n is a large composite number of unknown factorisation is almost certainly a computationally hard problem. This problem arises in a natural way when factoring n by the use of congruences of squares. We ...
Expressiveness of restricted recursive queries
We study the effect of various syntactic restrictions on the expressive power of database logic programs. We find natural examples of programs which
require recursively defined predicates of arbitrarily large width,
require rules with arbitrarily many ...
On Ω-automata and temporal logic
We study here the use of different representation for infinitary regular languages in extended temporal logic. We focus on three different kinds of acceptance conditions for finite automata on infinite words, due to Büchi, Streett, and Emerson and Lei (...
Quantifier elimination in the theory of an algebraically-closed field
In this paper we develop a fast parallel procedure for deciding when a set of multivariate polynomials with coefficients in an arbitrary field K have a common algebraic solution. Moreover, since the proposed algorithm is algebraic, it easily yields a ...
Probabilistic computation and linear time
In this paper, we give an oracle under which BPP is equal to probabilistic linear time, an unusual collapse of a complexity time hierarchy. In addition, we also give oracles where ΔP2 is contained in probabilistic linear time and where BPP has linear ...
The ismorphism conjecture fails relative to a random oracle
Berman and Hartmanis [BH77] conjectured that there is a polynomial-time computable isomorphism between any two languages m-complete (“Karp” complete) for NP. Joseph and Young [JY85] discovered a structurally defined class of NP-complete sets and ...
On the extended direct sum conjecture
We consider the quadratic complexity of certain sets of quadratic forms. We study a classes of direct sums of quadratic forms. For these classes of problems we show that the complexity of one direct sum is the sum of the complexity of the summands and ...
Circuits and local computation
This paper contains two parts. In Part I, we show that polynomial-size monotone threshold circuits of depth k form a proper hierarchy in parameter k. This implies in particular that monotone TC0 is properly contained in NC1. In Part II, we introduce a ...
A general sequential time-space tradeoff for finding unique elements
An optimal Ω(n2) lower bound is shown for the time-space product of any R-way branching program that determines those values which occur exactly once in a list of n integers in the range [1, R] where R ≥ n. This Ω(n2) tradeoff also applies to the ...
On the theory of average case complexity
This paper takes the next step in developing the theory of average case complexity initiated by Leonid A. Levin. Previous works [Levin 84, Gurevich 87, Venkatesan and Levin 88] have focused on the existence of complete problems. We widen the scope to ...
Tradeoffs between communication and space
This paper initiates the study of communication complexity when the processors have limited work space. The following tradeoffs between number C of communications steps and space S are proved:
For multiplying two n × n matrices in the arithmetic model ...
Work-preserving emulations of fixed-connection networks
In this paper, we study the problem of emulating TG steps of an NG-node guest network on an NH-node host network. We call an emulation work-preserving if the time required by the host, TH, is Ο(TGNG/NH) because then both the guest and host networks ...
An O(logN) deterministic packet routing scheme
We present a deterministic Ο(log N) time algorithm for the problem of routing an arbitrary permutation on an N-processor bounded-degree network with bounded buffers.
Unlike all previous deterministic solutions to this problem, our routing scheme does not ...
Fast computation using faulty hypercubes
We consider the computational power of a hypercube containing a potentially large number of randomly located faulty components. We describe a randomized algorithm which embeds an N-node hypercube in an N-node hypercube with faulty processors. Provided ...
Optimal size integer division circuits
Division is a fundamental problem for arithmetic and algebraic computation. This paper describes Boolean circuits (of bounded fan-in) for integer division (finding reciprocals) that have size Ο(M(n)) and depth Ο(lognlog logn), where M(n) is the size ...
On the complexity of radio communication
A radio network is a synchronous network of processors that communicate by transmitting messages to their neighbors. A processor receives a message in a given step if and only if it is silent then and precisely one of its neighbors transmits. This ...
Local reorientation, global order, and planar topology
Almost every problem on digraphs requires computing strongly connected components and directed spanning trees in one form or another. It has long been an open problem whether polylog time and linear processors are enough to find the strongly connected ...
Parallel depth-first search in general directed graphs
A directed cycle separator of an n-vertex directed graph is a simple directed cycle such that when the vertices of the cycle are deleted, the resulting graph has no strongly connected component with more than n/2 vertices. This paper shows that the ...
Optimal separations between concurrent-write parallel machines
We obtain tight bounds on the relative powers of the Priority and Common models of parallel random-access machines (PRAMs). Specifically we prove that:
The Element Distinctness function of n integers, though solvable in constant time on a Priority PRAM ...
Cited By
-
Singh P (2020). Considering Dispositional Moral Realism, Perspectives, 10.2478/pipjp-2018-0002, 8:1, (14-22), Online publication date: 1-Jan-2018., Online publication date: 1-Jan-2018.
- Mahmoody M, Maji H and Prabhakaran M Limits of random oracles in secure computation Proceedings of the 5th conference on Innovations in theoretical computer science, (23-34)
- Starkie B, Coste F and van Zaanen M (2018). Progressing the state-of-the-art in grammatical inference by competition, AI Communications, 18:2, (93-115), Online publication date: 1-Apr-2005.
Index Terms
- Proceedings of the twenty-first annual ACM symposium on Theory of computing
Recommendations
Acceptance Rates
Year | Submitted | Accepted | Rate |
---|---|---|---|
STOC '15 | 347 | 93 | 27% |
STOC '14 | 319 | 91 | 29% |
STOC '13 | 360 | 100 | 28% |
STOC '11 | 304 | 84 | 28% |
STOC '08 | 325 | 80 | 25% |
STOC '03 | 270 | 80 | 30% |
STOC '02 | 287 | 91 | 32% |
STOC '01 | 230 | 83 | 36% |
STOC '00 | 182 | 85 | 47% |
STOC '98 | 169 | 75 | 44% |
STOC '97 | 211 | 75 | 36% |
STOC '96 | 201 | 74 | 37% |
STOC '89 | 196 | 56 | 29% |
STOC '88 | 192 | 53 | 28% |
STOC '87 | 165 | 50 | 30% |
STOC '80 | 125 | 47 | 38% |
STOC '79 | 111 | 37 | 33% |
STOC '78 | 120 | 38 | 32% |
STOC '77 | 87 | 31 | 36% |
STOC '76 | 83 | 30 | 36% |
STOC '75 | 87 | 31 | 36% |
STOC '74 | 95 | 35 | 37% |
STOC '71 | 50 | 23 | 46% |
STOC '70 | 70 | 27 | 39% |
Overall | 4,586 | 1,469 | 32% |