Download presentation
Presentation is loading. Please wait.
Published byHugo Allen Fowler Modified over 9 years ago
1
Some Fundamental Insights of Computational Complexity Theory Avi Wigderson IAS, Princeton, NJ Hebrew University, Jerusalem
2
Complexity of Functions ADD MULT PRIME FACTOR
3
Complexity Classes Permanent #P Counting Problems Non-DET [Efficient Verification] Efficient Prob. Time Efficient DET. Time Memory Efficient ALGS Satisfyability NP 3-Coloring Discrete Log Factoring Primality testing RP Verifying polynomial identities Max Flow P Linear Programming Determinant L Graph Connectivity FEASIBLEFEASIBLE
4
COMP Axiom: FACTORING is HARD FORMAL & RIGOROUS theorems COMPUTATIONFEASIBLECANNOT SIMULATE NATURE RANDOMNESS ENTROPY CRYPTOGRAPHY KNOWLEDGE LEARNING PROOFS COMPUTATIONAL IS WEAK NO FEASIBLEOF COMPUTATIONAL HARDNESS EFFICIENT OF SOME NATURAL CONCEPTS IS IMPOSSIBLE ZEROPROOFS FOR EVERY THEOREM EVERY PROBLEM HAS A SECURE PROTOCOL COMPUTATIONALCAN BE DETERMINISTICALLY INCREASED
5
COLORING PLANAR MAPS THM [AH] EVERY PLANAR MAP IS 4-COLORABLE FACT NOT EVERY PLANAR MAP IS 3-COLORABLE 3-COL
6
THM: IF 3-COL IS EASY THEN FACTOR IS EASY NP – EFFICIENTLY VERIFIABLE PROOFS EFFICIENT REDUCTIONS COMPLETENESS TRIVIAL:3-COL, FACTOR TRIVIAL:IS TRANSITIVE! THM[C,L,K,S]: 3-COL is NP-Complete
7
NP - COMPLETENESS P = NP? Among the most important scientific open problems
8
CRYPTOGRAPHY [DH] DIGITAL ENVELOPE [GM] [R] [RSA] ALL PARTIES FEASIBLE COMPUTERS PUBLIC KEY ENCRYPTION DIGITAL SIGNATURES THE MILLIONAIRE’S PROBLEM EVERYTHING! CONTRACT SIGNING PLAYING POKER EASY MULT FACTOR HARD
9
OBLIVIOUS COMPUTATION [Y] ALICEBOB || f(x,y) f(x,y) f(x,y) f(x,y) SMALL BOOLEAN CIRCUIT NO CHEATERS! ab COMPLETE PROBLEM ab a b a b COMPLETE PROBLEM MANY PLAYERS [GMW]
10
THM[CL] Statement Planar Map M Proof 3-COL of M Efficient ALG A 1-1 Alice Alice, Bob PRIVACY vs. FAULT TOLERANCE Alice: Bob: Really?? Convince me! Dr. Alice: Prof. Bob: Really?? Convince me! Zero Knowledge Interactive Proofs [GMR] Convincing Reveal no information THM[GMW] 3-Coloring has a ZK-Proof THM[GMW] Every theorem has a ZK-Proof Corollary: Fault-tolerant protocols
11
METRICS ON PROB. DISTRIBUTIONS Computational Indistinguishability D Pseudo-Random if THM[BM,Y] p.r. D exits with D probability distribution on {0,1} k Statistical test U k uniform distribution Information Theoretic v(D,D’)=MAX|T(D)-T(D’)| Complexity Theoretic [GM,Y] v c (D,D’)=MAX|T(D)-T(D’)| Eff T
12
COMPUTATIONAL ENTROPY EFFICIENT A EASY HARD HARDNESS AMPLIFICATION feasible predicate b [B([B( THM[BM,Y] D 1 =(f(x),b(x)) is pseudorandom THM[BM,Y] D k =(b(f (k) (x)),...b(f(x)),b(x)) is p.r.
13
[BMY] PSEUDO-RANDOM GENERATORS n<<k C(Factor) D k PSEUDO-RANDOM || G(x) EFFICIENT PRIVATE KEY CRYPTOGRAPHY x U n D 0 - Random D 1 – Pseudo- Random D 2 – Pseudo- Random f(x)b(x) f(f(x)) b(f(x)) b(x) f (k+1) (x) b(f (k) (x)) b(x) HHcHc nn n n n n+1 n+2 n+k PSEUDO-RANDOM FUNCTION LEARNING PROOFS OF HARDNESS DERANDOMIZING PROBABILISTIC ALGS
14
HARDNESS vs. RANDOMNESS C(Factor) C(EXP-Time) [NW] a different C(Permanent) pseudo-random generator C(Satisfiability) [Y] Det. Simulation: Enumerate all s {0,1} n A efficient probabilistic alg. for h: input z
15
OPEN PROBLEMS PROVE “Axiom” PROVE Any Lower Bound PROVE PROJECTION REDUCTIONS THM PROVE
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.