Some Fundamental Insights of Computational Complexity Theory Avi Wigderson IAS, Princeton, NJ Hebrew University, Jerusalem.

Slides:



Advertisements
Similar presentations
Unconditional Weak derandomization of weak algorithms Explicit versions of Yao s lemma Ronen Shaltiel, University of Haifa :
Advertisements

Low-End Uniform Hardness vs. Randomness Tradeoffs for Arthur-Merlin Games. Ronen Shaltiel, University of Haifa Chris Umans, Caltech.
Lower Bounds for Non-Black-Box Zero Knowledge Boaz Barak (IAS*) Yehuda Lindell (IBM) Salil Vadhan (Harvard) *Work done while in Weizmann Institute. Short.
Linear-Degree Extractors and the Inapproximability of Max Clique and Chromatic Number David Zuckerman University of Texas at Austin.
Complexity Theory Lecture 6
Extracting Randomness From Few Independent Sources Boaz Barak, IAS Russell Impagliazzo, UCSD Avi Wigderson, IAS.
Efficiency vs. Assumptions in Secure Computation Yuval Ishai Technion & UCLA.
Wonders of the Digital Envelope
Statistical Zero-Knowledge Arguments for NP from Any One-Way Function Salil Vadhan Minh Nguyen Shien Jin Ong Harvard University.
Derandomization & Cryptography Boaz Barak, Weizmann Shien Jin Ong, MIT Salil Vadhan, Harvard.
Approximate List- Decoding and Hardness Amplification Valentine Kabanets (SFU) joint work with Russell Impagliazzo and Ragesh Jaiswal (UCSD)
Foundations of Cryptography Lecture 2: One-way functions are essential for identification. Amplification: from weak to strong one-way function Lecturer:
Uniform Hardness vs. Randomness Tradeoffs for Arthur-Merlin Games. Danny Gutfreund, Hebrew U. Ronen Shaltiel, Weizmann Inst. Amnon Ta-Shma, Tel-Aviv U.
The Complexity of Zero-Knowledge Proofs Salil Vadhan Harvard University.
Efficient Zero-Knowledge Proof Systems Jens Groth University College London.
CS555Topic 241 Cryptography CS 555 Topic 24: Secure Function Evaluation.
Theory of Computing Lecture 16 MAS 714 Hartmut Klauck.
Introduction to Modern Cryptography, Lecture 12 Secure Multi-Party Computation.
A survey on derandomizing BPP and AM Danny Gutfreund, Hebrew U. Ronen Shaltiel, Weizmann Inst. Amnon Ta-Shma, Tel-Aviv U.
Short course on quantum computing Andris Ambainis University of Latvia.
Proof, Computation, & Randomness Kurt Gödel John von Neumann and Theoretical Computer Science Avi Wigderson School of Mathematics Institute for Advanced.
The Bright Side of Hardness Relating Computational Complexity and Cryptography Oded Goldreich Weizmann Institute of Science.
Complexity and Cryptography
Oblivious Transfer based on the McEliece Assumptions
Digital Envelopes, Zero Knowledge, and other wonders of modern cryptography (How computational complexity enables digital security & privacy) Guy Rothblum.
CS470, A.SelcukPublic Key Cryptography1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Princeton University COS 433 Cryptography Fall 2005 Boaz Barak COS 433: Cryptography Princeton University Fall 2005 Boaz Barak Lecture 3: Computational.
Introduction to Modern Cryptography, Lecture 7/6/07 Zero Knowledge and Applications.
Sedgewick & Wayne (2004); Chazelle (2005) Sedgewick & Wayne (2004); Chazelle (2005)
Zero Knowledge Proofs. Interactive proof An Interactive Proof System for a language L is a two-party game between a verifier and a prover that interact.
Theory I Algorithm Design and Analysis (9 – Randomized algorithms) Prof. Dr. Th. Ottmann.
The Power of Randomness in Computation 呂及人中研院資訊所.
Lecture 20: April 12 Introduction to Randomized Algorithms and the Probabilistic Method.
Introduction to Modern Cryptography, Lecture 9 More about Digital Signatures and Identification.
1 On the Power of the Randomized Iterate Iftach Haitner, Danny Harnik, Omer Reingold.
Foundations of Cryptography Lecture 8 Lecturer: Moni Naor.
Foundations of Cryptography Lecture 2 Lecturer: Moni Naor.
Foundations of Cryptography Rahul Jain CS6209, Jan – April 2011
Lecture 6: Public Key Cryptography
ElGamal Public Key Cryptography CS 303 Alg. Number Theory & Cryptography Jeremy Johnson Taher ElGamal, "A Public-Key Cryptosystem and a Signature Scheme.
Randomness – A computational complexity view Avi Wigderson Institute for Advanced Study.
Oblivious Signature-Based Envelope Ninghui Li, Stanford University Wenliang (Kevin) Du, Syracuse University Dan Boneh, Stanford University.
Completeness in Two-Party Secure Computation Revisited Danny Harnik Moni Naor Omer Reingold Alon Rosen Weizmann Institute of Science AT&T IAS.
Wonders of the Digital Envelope Avi Wigderson Institute for Advanced Study.
The Power and Weakness of Randomness (when you are short on time) Avi Wigderson School of Mathematics Institute for Advanced Study.
DISTRIBUTED CRYPTOSYSTEMS Moti Yung. Distributed Trust-- traditionally  Secret sharing: –Linear sharing over a group (Sum sharing) gives n out of n sharing.
1 Concurrency and Zero-Knowledge Protocols Amit Sahai MIT Laboratory for Computer Science.
15-499Page :Algorithms and Applications Cryptography I – Introduction – Terminology – Some primitives – Some protocols.
Umans Complexity Theory Lectures Lecture 1a: Problems and Languages.
Umans Complexity Theory Lectures Lecture 7b: Randomization in Communication Complexity.
My Favorite Ten Complexity Theorems of the Past Decade II Lance Fortnow University of Chicago.
CRYPTOGRAPHY AND NP-HARDNESS Andrej Bogdanov Chinese University of Hong Kong MACS Foundations of Cryptography| January 2016.
CRYPTOGRAPHIC HARDNESS OTHER FUNCTIONALITIES Andrej Bogdanov Chinese University of Hong Kong MACS Foundations of Cryptography| January 2016.
Happy 60 th B’day Noga. Elementary problems encoding computational hardness Avi Wigderson IAS, Princeton or Some problems Noga never solved.
Pseudo-random generators Talk for Amnon ’ s seminar.
 5.1 Zero-Knowledge Proofs  5.2 Zero-Knowledge Proofs of Identity  5.3 Identity-Based Public-Key Cryptography  5.4 Oblivious Transfer  5.5 Oblivious.
Almost SL=L, and Near-Perfect Derandomization Oded Goldreich The Weizmann Institute Avi Wigderson IAS, Princeton Hebrew University.
David Evans CS588: Security and Privacy University of Virginia Computer Science Lecture 15: From Here to Oblivion.
Complexity Theory and Explicit Constructions of Ramsey Graphs Rahul Santhanam University of Edinburgh.
Zero Knowledge r Two parties:  All powerful prover P  Polynomially bounded verifier V r P wants to prove a statement to V with the following properties:
Topic 36: Zero-Knowledge Proofs
Information Complexity Lower Bounds
Cryptography and Pseudorandomness
Introduction to Randomized Algorithms and the Probabilistic Method
Zero Knowledge Anupam Datta CMU Fall 2017
CS154, Lecture 18:.
Pseudorandomness when the odds are against you
Background: Lattices and the Learning-with-Errors problem
Presentation transcript:

Some Fundamental Insights of Computational Complexity Theory Avi Wigderson IAS, Princeton, NJ Hebrew University, Jerusalem

Complexity of Functions ADD MULT PRIME FACTOR

Complexity Classes Permanent #P Counting Problems Non-DET [Efficient Verification] Efficient Prob. Time Efficient DET. Time Memory Efficient ALGS Satisfyability NP 3-Coloring Discrete Log Factoring Primality testing RP Verifying polynomial identities Max Flow P Linear Programming Determinant L Graph Connectivity FEASIBLEFEASIBLE

COMP Axiom: FACTORING is HARD  FORMAL & RIGOROUS theorems COMPUTATIONFEASIBLECANNOT SIMULATE NATURE RANDOMNESS ENTROPY CRYPTOGRAPHY KNOWLEDGE LEARNING PROOFS COMPUTATIONAL IS WEAK NO FEASIBLEOF COMPUTATIONAL HARDNESS EFFICIENT OF SOME NATURAL CONCEPTS IS IMPOSSIBLE ZEROPROOFS FOR EVERY THEOREM EVERY PROBLEM HAS A SECURE PROTOCOL COMPUTATIONALCAN BE DETERMINISTICALLY INCREASED

COLORING PLANAR MAPS THM [AH] EVERY PLANAR MAP IS 4-COLORABLE FACT NOT EVERY PLANAR MAP IS 3-COLORABLE 3-COL

THM: IF 3-COL IS EASY THEN FACTOR IS EASY NP – EFFICIENTLY VERIFIABLE PROOFS EFFICIENT REDUCTIONS COMPLETENESS TRIVIAL:3-COL, FACTOR TRIVIAL:IS TRANSITIVE! THM[C,L,K,S]: 3-COL is NP-Complete

NP - COMPLETENESS P = NP? Among the most important scientific open problems

CRYPTOGRAPHY [DH] DIGITAL ENVELOPE [GM] [R] [RSA] ALL PARTIES FEASIBLE COMPUTERS PUBLIC KEY ENCRYPTION DIGITAL SIGNATURES THE MILLIONAIRE’S PROBLEM EVERYTHING! CONTRACT SIGNING PLAYING POKER EASY MULT FACTOR HARD

OBLIVIOUS COMPUTATION [Y] ALICEBOB ||       f(x,y) f(x,y) f(x,y) f(x,y) SMALL BOOLEAN CIRCUIT  NO CHEATERS!  ab  COMPLETE PROBLEM  ab a b a b  COMPLETE PROBLEM  MANY PLAYERS [GMW]

THM[CL] Statement Planar Map M Proof 3-COL of M Efficient ALG A 1-1 Alice Alice, Bob PRIVACY vs. FAULT TOLERANCE Alice: Bob: Really?? Convince me! Dr. Alice: Prof. Bob: Really?? Convince me! Zero Knowledge Interactive Proofs [GMR] Convincing Reveal no information THM[GMW] 3-Coloring has a ZK-Proof THM[GMW] Every theorem has a ZK-Proof Corollary: Fault-tolerant protocols

METRICS ON PROB. DISTRIBUTIONS Computational Indistinguishability D Pseudo-Random if THM[BM,Y] p.r. D exits with D probability distribution on {0,1} k Statistical test U k uniform distribution Information Theoretic v(D,D’)=MAX|T(D)-T(D’)| Complexity Theoretic [GM,Y] v c (D,D’)=MAX|T(D)-T(D’)| Eff T

COMPUTATIONAL ENTROPY   EFFICIENT A EASY HARD HARDNESS AMPLIFICATION feasible predicate b [B([B( THM[BM,Y] D 1 =(f(x),b(x)) is pseudorandom THM[BM,Y] D k =(b(f (k) (x)),...b(f(x)),b(x)) is p.r.

[BMY] PSEUDO-RANDOM GENERATORS n<<k  C(Factor) D k PSEUDO-RANDOM || G(x) EFFICIENT PRIVATE KEY CRYPTOGRAPHY x  U n D 0 - Random D 1 – Pseudo- Random D 2 – Pseudo- Random f(x)b(x) f(f(x)) b(f(x)) b(x) f (k+1) (x) b(f (k) (x)) b(x) HHcHc nn n n n n+1 n+2 n+k PSEUDO-RANDOM FUNCTION LEARNING PROOFS OF HARDNESS DERANDOMIZING PROBABILISTIC ALGS

HARDNESS vs. RANDOMNESS C(Factor) C(EXP-Time) [NW] a different C(Permanent) pseudo-random generator C(Satisfiability) [Y] Det. Simulation: Enumerate all s  {0,1} n A efficient probabilistic alg. for h:  input z

OPEN PROBLEMS PROVE “Axiom” PROVE Any Lower Bound PROVE PROJECTION REDUCTIONS THM PROVE