Oded Goldreich Weizmann Institute of Science

Slides:



Advertisements
Similar presentations
1+eps-Approximate Sparse Recovery Eric Price MIT David Woodruff IBM Almaden.
Advertisements

Numerical Linear Algebra in the Streaming Model Ken Clarkson - IBM David Woodruff - IBM.
Xiaoming Sun Tsinghua University David Woodruff MIT
Tight Lower Bounds for the Distinct Elements Problem David Woodruff MIT Joint work with Piotr Indyk.
On the Amortized Complexity of Zero-Knowledge Proofs Ronald Cramer, CWI Ivan Damgård, Århus University.
Foundations of Cryptography Lecture 10 Lecturer: Moni Naor.
Implementing Oblivious Transfer Using a Collection of Dense Trapdoor Permutations Iftach Haitner WEIZMANN INSTITUTE.
Analysis of Algorithms
Semi-Honest to Malicious Oblivious-Transfer The Black-box Way Iftach Haitner Weizmann Institute of Science.
General Cryptographic Protocols (aka secure multi-party computation) Oded Goldreich Weizmann Institute of Science.
Some Thoughts regarding Unconditional Derandomization Oded Goldreich Weizmann Institute of Science RANDOM 2010.
1 Algorithms for Large Data Sets Ziv Bar-Yossef Lecture 8 May 4, 2005
Co-operative Private Equality Test(CPET) Ronghua Li and Chuan-Kun Wu (received June 21, 2005; revised and accepted July 4, 2005) International Journal.
On Proximity Oblivious Testing Oded Goldreich - Weizmann Institute of Science Dana Ron – Tel Aviv University.
1 Algorithmic Aspects in Property Testing of Dense Graphs Oded Goldreich – Weizmann Institute Dana Ron - Tel-Aviv University.
Zero Knowledge Proofs. Interactive proof An Interactive Proof System for a language L is a two-party game between a verifier and a prover that interact.
On Testing Computability by small Width OBDDs Oded Goldreich Weizmann Institute of Science.
In a World of BPP=P Oded Goldreich Weizmann Institute of Science.
1 A New Interactive Hashing Theorem Iftach Haitner and Omer Reingold WEIZMANN INSTITUTE OF SCIENCE.
Tight Bounds for Graph Problems in Insertion Streams Xiaoming Sun and David P. Woodruff Chinese Academy of Sciences and IBM Research-Almaden.
A Property Testing Double-Feature of Short Talks Oded Goldreich Weizmann Institute of Science Talk at Technion, June 2013.
Quantum Computing MAS 725 Hartmut Klauck NTU TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: A A A A.
A Linear Lower Bound on the Communication Complexity of Single-Server PIR Weizmann Institute of Science Israel Iftach HaitnerJonathan HochGil Segev.
Improved Non-Committing Encryption with Application to Adaptively Secure Protocols joint work with Dana Dachman-Soled (Columbia Univ.), Tal Malkin (Columbia.
Introduction to Modern Cryptography Sharif University Spring 2015 Data and Network Security Lab Sharif University of Technology Department of Computer.
Secure Computation (Lecture 5) Arpita Patra. Recap >> Scope of MPC > models of computation > network models > modelling distrust (centralized/decentralized.
Great Theoretical Ideas in Computer Science.
The Cost of Fault Tolerance in Multi-Party Communication Complexity Binbin Chen Advanced Digital Sciences Center Haifeng Yu National University of Singapore.
A Membrane Algorithm for the Min Storage problem Dipartimento di Informatica, Sistemistica e Comunicazione Università degli Studi di Milano – Bicocca WMC.
Eric Allender Rutgers University Graph Automorphism & Circuit Size Joint work with Joshua A. Grochow and Cristopher Moore (SFI) Simons Workshop, September.
Umans Complexity Theory Lectures Lecture 7b: Randomization in Communication Complexity.
Data Stream Algorithms Lower Bounds Graham Cormode
Communication Complexity Guy Feigenblat Based on lecture by Dr. Ely Porat Some slides where adapted from various sources Complexity course Computer science.
Private Information Retrieval Based on the talk by Yuval Ishai, Eyal Kushilevitz, Tal Malkin.
Complexity Classes.
P & NP.
Carmit Hazay (Bar-Ilan University, Israel)
Probabilistic Algorithms
Information Complexity Lower Bounds
Derandomization & Cryptography
Randomness and Computation
New Characterizations in Turnstile Streams with Applications
On Testing Dynamic Environments
Foundations of Secure Computation
MPC and Verifiable Computation on Committed Data
Finding Cycles and Trees in Sublinear Time
Randomized Algorithms
Hash functions Open addressing
Digital Signature Schemes and the Random Oracle Model
Branching Programs Part 3
Background: Lattices and the Learning-with-Errors problem
CS 154, Lecture 6: Communication Complexity
Turnstile Streaming Algorithms Might as Well Be Linear Sketches
Four-Round Secure Computation without Setup
Alternating Bit Protocol
Pseudo-derandomizing learning and approximation
Richard Anderson Lecture 25 NP-Completeness
Randomized Algorithms
Interactive Proofs Adapted from Oded Goldreich’s course lecture notes.
Oded Goldreich Weizmann Institute of Science
Imperfectly Shared Randomness
Fiat-Shamir for Highly Sound Protocols is Instantiable
Interactive Proofs Adapted from Oded Goldreich’s course lecture notes.
Communication Amid Uncertainty
Interactive Proofs Adapted from Oded Goldreich’s course lecture notes.
The Subgraph Testing Model
Every set in P is strongly testable under a suitable encoding
CS21 Decidability and Tractability
Lecture 17 Making New Codes from Old Codes (Section 4.6)
Interactive Proofs Adapted from Oded Goldreich’s course lecture notes.
Presentation transcript:

Oded Goldreich Weizmann Institute of Science Demystifying the Master Thesis and Research in General: The Story of Some Master Theses Oded Goldreich Weizmann Institute of Science

My own thesis (1981) :                A permutation group over D is represented by a set of generators S. The group is denoted <S>. <S> = {g1○g2 ○ ∙ ∙ ∙ ○gt : g1,g2,…,gtS} Given S and a permutation π, does p belong to <S>? Given S, π, and t, can π be expressed by a sequence of up to t elements of S?

My first MSc student: Ronen Vainish (1988) Background: A general construction of secure multi-party protocols by reduction to the two-party case. Suffices to compute the inner product mod 2 of two input vectors held by the two parties. 1st 2nd Inputs: x1,…,xn y1,…,yn Outputs: r r+∑ixiyi Study it 1st 2nd Inputs: x,z y Outputs: - z+xy The $i$th invocation uses inputs $(x_i,r_i)$ and $y_i$, where $r_i\rnd\bitset$. The final output is the sum of $r_i$’s and sum of $r_i+x_iy_i$’s. Sender Receiver Inputs: s0,s1 c Outputs: - sc

Eyal Kushilevitz (1989) Background: Few sets known to have perfect zero-knowledge proof systems. E.g., Graph-Iso, Quad-Res. Can we provide stronger evidence to PZK not in BPP? Solve it YES: A promise problem based on DLP.

Ran Canetti (1992) Invent your own... (inspired by a course) Background: communication complexity, gap between the complexity of randomized and deterministic protocols. Is there a randomness-communication trade-off? YES: Presents a trade-off. The ID function: two parties, each holds an n-bit long string. Deterministic lower bound: need n bits of communication. Randomized protocols: (1) via error-correcting codes: send a random position. (2) via the CRT: send integer modulo a random prime

Iftach Haitner (2004) Sender Receiver Inputs: s0,s1 c Outputs: - sc Background: assuming a collection of TDP {fi:Di→Di} Sender Receiver Inputs: s0,s1 c desired outputs: - sc selects an index i yc=fi(xc) , y1-c find the fi-preimages of both: z0 , z1 b(z0)+s0 , b(z1)+s1 The problem: what is assumed about sampling Di? Can we relax?

Lidor Avigad (2009) Background: property testing, the dense graph model, lowest level of query complexity. Specifically, c-CC is in that low level. Extend this result The work: Testing Graph blow-up in minimum query complexity (i.e., linear in 1/proximity, non-adaptively)

The End The slides of this talk are available at http://www.wisdom.weizmann.ac.il/~oded/T/de-mysti.ppt