UT-ORNL 15 March 2005 CSIIR Workshop 1 Trusted Computing Amidst Untrustworthy Intermediaries Mike Langston Department of Computer Science University of.

Slides:



Advertisements
Similar presentations
Problems and Their Classes
Advertisements

Bart Jansen 1.  Problem definition  Instance: Connected graph G, positive integer k  Question: Is there a spanning tree for G with at least k leaves?
Introduction to Kernel Lower Bounds Daniel Lokshtanov.
Bart Jansen, Utrecht University. 2  Max Leaf  Instance: Connected graph G, positive integer k  Question: Is there a spanning tree for G with at least.
Approximative Kernelization: On the Trade-off between Fidelity and Kernel Size joint with Michael Fellows and Frances Rosamond Charles Darwin University.
The Theory of NP-Completeness
Lecture 12: Revision Lecture Dr John Levine Algorithms and Complexity March 27th 2006.
Introduction to Approximation Algorithms Lecture 12: Mar 1.
Computability and Complexity 13-1 Computability and Complexity Andrei Bulatov The Class NP.
Computational problems, algorithms, runtime, hardness
Hardness Results for Problems P: Class of “easy to solve” problems Absolute hardness results Relative hardness results –Reduction technique.
1 Polynomial Church-Turing thesis A decision problem can be solved in polynomial time by using a reasonable sequential model of computation if and only.
NP-complete and NP-hard problems Transitivity of polynomial-time many-one reductions Definition of complexity class NP –Nondeterministic computation –Problems.
1 Optimization problems such as MAXSAT, MIN NODE COVER, MAX INDEPENDENT SET, MAX CLIQUE, MIN SET COVER, TSP, KNAPSACK, BINPACKING do not have a polynomial.
NP-Complete Problems Reading Material: Chapter 10 Sections 1, 2, 3, and 4 only.
An Efficient Fixed Parameter Algorithm for 3-Hitting Set
The Theory of NP-Completeness
Exact Algorithms for Hard Problems An introduction.
NP-complete and NP-hard problems
Analysis of Algorithms CS 477/677
Computational Complexity, Physical Mapping III + Perl CIS 667 March 4, 2004.
NP-complete examples CSC3130 Tutorial 11 Xiao Linfu Department of Computer Science & Engineering Fall 2009.
CSE 421 Algorithms Richard Anderson Lecture 27 NP Completeness.
Chapter 11: Limitations of Algorithmic Power
Ref: Pfleeger96, Ch.31 NP-Complete Problems Reference: Pfleeger, Charles P., Security in Computing, 2nd Edition, Prentice Hall, 1996.
Hardness Results for Problems P: Class of “easy to solve” problems Absolute hardness results Relative hardness results –Reduction technique.
1 Refined Search Tree Technique for Dominating Set on Planar Graphs Jochen Alber, Hongbing Fan, Michael R. Fellows, Henning Fernau, Rolf Niedermeier, Fran.
Hardness Results for Problems
Data reduction lower bounds: Problems without polynomial kernels Hans L. Bodlaender Joint work with Downey, Fellows, Hermelin, Thomasse, Yeo.
Part I: Introductory Materials Introduction to Graph Theory Dr. Nagiza F. Samatova Department of Computer Science North Carolina State University and Computer.
Complexity Classes Kang Yu 1. NP NP : nondeterministic polynomial time NP-complete : 1.In NP (can be verified in polynomial time) 2.Every problem in NP.
MCS312: NP-completeness and Approximation Algorithms
Fixed Parameter Complexity Algorithms and Networks.
1 The Theory of NP-Completeness 2012/11/6 P: the class of problems which can be solved by a deterministic polynomial algorithm. NP : the class of decision.
Kernel Bounds for Structural Parameterizations of Pathwidth Bart M. P. Jansen Joint work with Hans L. Bodlaender & Stefan Kratsch July 6th 2012, SWAT 2012,
Lecture 30. P, NP and NP Complete Problems 1. Recap Data compression is a technique to compress the data represented either in text, audio or image form.
CS 345: Chapter 10 Parallelism, Concurrency, and Alternative Models Or, Getting Lots of Stuff Done at Once.
CSC 172 P, NP, Etc. “Computer Science is a science of abstraction – creating the right model for thinking about a problem and devising the appropriate.
CSCI 2670 Introduction to Theory of Computing December 1, 2004.
P, NP, and Exponential Problems Should have had all this in CS 252 – Quick review Many problems have an exponential number of possibilities and we can.
CSCI 3160 Design and Analysis of Algorithms Tutorial 10 Chengyu Lin.
1 The Theory of NP-Completeness 2 Cook ’ s Theorem (1971) Prof. Cook Toronto U. Receiving Turing Award (1982) Discussing difficult problems: worst case.
§1.4 Algorithms and complexity For a given (optimization) problem, Questions: 1)how hard is the problem. 2)does there exist an efficient solution algorithm?
NP-Complete Problems. Running Time v.s. Input Size Concern with problems whose complexity may be described by exponential functions. Tractable problems.
1 Chapter 34: NP-Completeness. 2 About this Tutorial What is NP ? How to check if a problem is in NP ? Cook-Levin Theorem Showing one of the most difficult.
NP-COMPLETE PROBLEMS. Admin  Two more assignments…  No office hours on tomorrow.
The Dominating Set and its Parametric Dual  the Dominated Set  Lan Lin prepared for theory group meeting on June 11, 2003.
CS 3343: Analysis of Algorithms Lecture 25: P and NP Some slides courtesy of Carola Wenk.
2101INT – Principles of Intelligence Systems Lecture 3.
CPS Computational problems, algorithms, runtime, hardness (a ridiculously brief introduction to theoretical computer science) Vincent Conitzer.
Data Reduction for Graph Coloring Problems Bart M. P. Jansen Joint work with Stefan Kratsch August 22 nd 2011, Oslo.
1 CPSC 320: Intermediate Algorithm Design and Analysis July 30, 2014.
Algorithms for hard problems Parameterized complexity – definitions, sample algorithms Juris Viksna, 2015.
Introduction to NP-Completeness Tahir Azim. The Downside of Computers Many problems can be solved in linear time or polynomial time But there are also.
Lecture. Today Problem set 9 out (due next Thursday) Topics: –Complexity Theory –Optimization versus Decision Problems –P and NP –Efficient Verification.
1 The Theory of NP-Completeness 2 Review: Finding lower bound by problem transformation Problem X reduces to problem Y (X  Y ) iff X can be solved by.
The NP class. NP-completeness Lecture2. The NP-class The NP class is a class that contains all the problems that can be decided by a Non-Deterministic.
Great Theoretical Ideas in Computer Science.
CSE 332: NP Completeness, Part II Richard Anderson Spring 2016.
Fixed Parameter Tractability for Graph Drawing Sue Whitesides Computer Science Department.
The NP class. NP-completeness
P & NP.
Constrained Bipartite Vertex Cover: The Easy Kernel is Essentially Tight Bart M. P. Jansen June 4th, WORKER 2015, Nordfjordeid, Norway.
Parameterised Complexity
Bin Fu Department of Computer Science
Bart M. P. Jansen June 3rd 2016, Algorithms for Optimization Problems
Fixed Parameter Tractability
Graphs and Algorithms (2MMD30)
Complexity Theory in Practice
15th Scandinavian Workshop on Algorithm Theory
Presentation transcript:

UT-ORNL 15 March 2005 CSIIR Workshop 1 Trusted Computing Amidst Untrustworthy Intermediaries Mike Langston Department of Computer Science University of Tennessee currently on leave to Computer Science and Mathematics Division Oak Ridge National Laboratory USA

UT-ORNL 15 March 2005 CSIIR Workshop 2 Overview Programs Data Highly Parallel Scalable Network Variable Topology Internet Like But Untrusted!

UT-ORNL 15 March 2005 CSIIR Workshop 3 Possible Solutions Accept faulty results. Uh, no thanks. Authenticate/verify by central authority. Unrealistic, does not scale. Exploit complexity and checkability. Problems in NP can be hard to solve -- but they are always easy to check! No need for centralized control, ownership, or verification.

UT-ORNL 15 March 2005 CSIIR Workshop 4 A Little Complexity Theory The Classic View: P NP PSPACE Σ 2 P …… “easy”

UT-ORNL 15 March 2005 CSIIR Workshop 5 A Little Complexity Theory The Classic View: P NP PSPACE Σ 2 P …… “easy” “hard” NP-complete

UT-ORNL 15 March 2005 CSIIR Workshop 6 A Little Complexity Theory The Classic View: P NP PSPACE Σ 2 P …… “easy” “hard” “fuggettaboutit”

UT-ORNL 15 March 2005 CSIIR Workshop 7 Parameter Sensitivity: Instance(n,k) Suppose our problem is, say, NP-complete. Consider an algorithm with a time bound such as O(2 k+n ). And now one with a time bound more like O(2 k +n).

UT-ORNL 15 March 2005 CSIIR Workshop 8 Parameter Sensitivity: Instance(n,k) Suppose our problem is, say, NP-complete. Consider an algorithm with a time bound such as O(2 k+n ). And now one with a time bound more like O(2 k +n). Both are exponential in parameter value(s).

UT-ORNL 15 March 2005 CSIIR Workshop 9 Parameter Sensitivity: Instance(n,k) Suppose our problem is, say, NP-complete. Consider an algorithm with a time bound such as O(2 k+n ). And now one with a time bound more like O(2 k +n). Both are exponential in parameter value(s). But what happens when k is fixed?

UT-ORNL 15 March 2005 CSIIR Workshop 10 Parameter Sensitivity: Instance(n,k) Suppose our problem is, say, NP-complete. Consider an algorithm with a time bound such as O(2 k+n ). And now one with a time bound more like O(2 k +n). Both are exponential in parameter value(s). But what happens when k is fixed? Fixed Parameter Tractability: confines superpolynomial behavior to the parameter.

UT-ORNL 15 March 2005 CSIIR Workshop 11 Complexity Theory, Revised Hence, the Parameterized View: FPT … … W[1] W[2]XP “solvable (even if NP-complete)”

UT-ORNL 15 March 2005 CSIIR Workshop 12 Complexity Theory, Revised The Parameterized View: FPT … … W[1] W[2]XP “solvable (even if NP-hard!)” “heuristics only”

UT-ORNL 15 March 2005 CSIIR Workshop 13 Complexity Theory, Revised The Parameterized View: FPT … … W[1] W[2]XP “solvable (even if NP-hard!)” “heuristics only” “ I said fuggettaboutit! ”

UT-ORNL 15 March 2005 CSIIR Workshop 14 Target Problems Not membership in P (assuming P≠NP)  hard to compute

UT-ORNL 15 March 2005 CSIIR Workshop 15 Target Problems Not membership in P (assuming P≠NP)  hard to compute Membership in NP  easy to check

UT-ORNL 15 March 2005 CSIIR Workshop 16 Target Problems NP-complete FPT Not membership in P (assuming P≠NP)  hard to compute Membership in NP  easy to check Fixed Parameter Tractable  use kernelization and branching

UT-ORNL 15 March 2005 CSIIR Workshop 17 Kernelization Consider Clique and Vertex Cover High Degree Rule(s) Low Degree Rule(s) LP, Crown Reductions –kernel of linear size, and extreme density –the “hard part” of the problem instance

UT-ORNL 15 March 2005 CSIIR Workshop 18 Branching Let’s stay with Clique and Vertex Cover Bounded tree search Depth at most k With this technique, we can now solve vertex cover in O(1.28 k +n) time Easily parallelizable No processor sees another’s work, nor the original graph

UT-ORNL 15 March 2005 CSIIR Workshop Untrusted intermediaries cannot deduce data Data decomposition Nor can they spoof answers Answer check (NP certificate). Branching as A Form of Cyber Security

UT-ORNL 15 March 2005 CSIIR Workshop 20 Overall Appeal Verifiability –easy to check answers: a faulty or malicious processor cannot invalidate or subvert computations

UT-ORNL 15 March 2005 CSIIR Workshop 21 Overall Appeal Verifiability –easy to check answers: a faulty or malicious processor cannot invalidate or subvert computations Security –damage from intrusion contained: strong concealment of the total problem is a natural part of this method

UT-ORNL 15 March 2005 CSIIR Workshop 22 Overall Appeal Verifiability –easy to check answers: a faulty or malicious processor cannot invalidate or subvert computations Security –damage from intrusion contained: strong concealment of the total problem is a natural part of this method Scalability –branching translates into partitioning: no a priori bounds on the degree of parallelism

UT-ORNL 15 March 2005 CSIIR Workshop 23 Overall Appeal Verifiability –easy to check answers: a faulty or malicious processor cannot invalidate or subvert computations Security –damage from intrusion contained: strong concealment of the total problem is a natural part of this method Scalability –branching translates into partitioning: no a priori bounds on the degree of parallelism Robustness –subtrees are compartmentalized: processes can be reassigned at will

UT-ORNL 15 March 2005 CSIIR Workshop 24 Research Thrusts Range of amenable problems? –FPT –non FPT Ubiquity of untrustworthy processors? –grid computing –unbrokered resource sharing Relationship to traditional forms of security? –internet-style lightweight security –no heavyweight authentication needed