Hyper-Invertible Matrices and Applications
|
|
- Amos Price
- 5 years ago
- Views:
Transcription
1 Hyper-Invertible Matrices and Applications Martin Hirt ETH Zurich Theory and Practice of MPC, Aarhus, June 2012
2 Outline Hyper-Invertible Matrices Motivation Definition & Properties Construction Applications Conclusions
3 How can n parties generate random values? Model n parties, t are bad aim for random shared values (sharing doesn t matter) Approach 1 1. Every P i shares random value x i 2. y = n Only one good sharing from n sharings x i i=1 Approach 2 1. Every P i shares random value x i 2. y 1 = λ 1i x i, y 2 = λ 2i x i,... i i How many good sharings from n sharings? Best we can hope for: n t
4 More Abstractly... Given: n values x 1 x 2 x 3 x 4 x 5... x n where n t values are good (e.g. uniformly random), t values are bad (e.g. chosen by adversary). Goal: Find (the) n t good values Goal : Find y 1,..., y n t which are as good as x 2, x 5,..., x n. y 1 y 2. y n t y n t+1. y n = Hyper-Invertible Matrix x 1 x 2 x 3 x 4 x 5. x n
5 Hyper-Invertible Matrix The Definition Def: M is hyper-invertible : every square sub-matrix M C R λ 11 λ 12 λ 13 λ 1n λ 21 λ 22 λ 23 λ 2n.. λ m1 λ m2 λ m3 λ mn is invertible. Note: Cf. Parity-check matrix of MDS-Codes, Cauchy matrices,...
6 Properties (1/2) Property 1: Given some x j -s and some y i -s (in total n values), one can compute all other x j -s and y i -s. y 1 y 2 y m = M x 1 x 2 x n Lemma 1: Given HIM M, index sets C {1... n}, R {1... m} with ( C = R. Then given x C, ) ( y R one can compute x C, ) y R. Proof: 1. y R = M R x = M C R x C + MR C x C 2. ) 1 ( x C = y R MR C ) x C ( M C R
7 Properties (1/2) Property 1: Given some x j -s and some y i -s (in total n values), one can compute all other x j -s and y i -s. y 1 y 2 y m = M x 1 x 2 x n Lemma 2: Given matrix M. If for all C {1... n}, R {1... m} with C = R one can compute x C from ( x C, y R ), then M is HIM. Proof: Invert M C R as follows: 1. Given y R. Let x C = 0 2. Can compute x C ( MR C ) 1
8 Properties (2/2) Property 2: Fix k values, then there is a bijection from any n k values to any other n k values. y 1 y 2 y m = M x 1 x 2 x n
9 The Construction Idea: Construct mapping (x 1,.., x n ) (y 1,.., y m ) with Property 1. Construction 1. fix values α 1,..., α n, β 1,..., β m in F 2. let polynomial f(z) s.t. f(α j ) = x j j 3. compute y i = f(β i ) i Formally f(z) = n j=1 n k=1 k j z α k α j α k x j y i = f(β i ) = M := [ λ i,j ] n j=1 n β i α k α j α k k=1 k j }{{} λ i,j x j = n j=1 λ i,j x j
10 The Field The Field Size Previous construction requires F n + m. Easy patch: F = n + m 1. Lower Bounds (Conjecture) F = n + m 1 is optimal for F = GF(2 k ) But: is HIM over GF(4) (though m + n 1 = 5)
11 Randomness Extraction Passive Security Model n parties, t are bad (passive only) aim for random shared values given n n hyper-invertible matrix M Protocol 1. Every P i shares random value x i [x i ] 2. ([y 1 ],..., [y n ]) = M([x 1 ],..., [x n ]) 3. Output [y 1 ],..., [y n t ] Analysis Adversary A {1,..., n}, A = t, hence knows [x] A. Prop. 2: Fix A, [x] A, mapping [x] A [y] {1,...,n t} is bijective.
12 Randomness Extraction Active Security Attempt #1 Model n parties, t are bad (active) Protocol Every P i VSSes random value x i [x i ]... Analysis works, but complicated & inefficient
13 Randomness Extraction Active Security Attempt #2 Model n parties, t are bad (active) detectable security (cf player elimination / dispute control) Protocol 1. Every P i passively shares random x i [x i ] 2. ([y 1 ],..., [y n ]) = M([x 1 ],..., [x n ]) 3. Reconstruct and check degree of [y 1 ],..., [y t ] 4. Output [y t+1 ],..., [y n t ] Analysis Adversary A {1,..., n}, A = t; H A, H = n 2t. Prop. 1: Degrees of [x] A and [y] {1,...,t} ok all degrees ok. Prop. 2: Fix A, [x] A, y {1,...,t}, bij. mapping [x] H [y] {t+1,...,n t}.
14 Randomness Extraction Active Security Attempt #3 Protocol 1. Every P i passively shares random x i [x i ] 2. ([y 1 ],..., [y n ]) = M([x 1 ],..., [x n ]) 3. For i = 1,..., 2t, have P i check degree of [y i ] 4. Output [y 2t+1 ],..., [y n ] Analysis Adversary A {1,..., n}, A = t; H A, H = n 2t. Prop. 1: Degrees of [x] A and [y] {1,...,2t} A ok all degrees ok. Prop. 2: Fix A, [x] A, [y] {1,...,2t} A, Efficiency mapping [x] H [y] {2t+1,...,n} is bijective. n passive sharings n 2t good random sharings
15 Enhanced Checks Example: Random Zero-Sharings [0] 1. Every P i passively shares x i = 0 [x i ] 2. ([y 1 ],..., [y n ]) = M([x 1 ],..., [x n ]) 3. For i = 1,..., 2t, have P i check degree of [y i ] and y i? = Output [y 2t+1 ],..., [y n ] Analysis Adversary A {1,..., n}, A = t Prop. 1: If [x] A and [y] {1,...,2t} A have right degree and share 0 all sharings have right degree and share 0.
16 Enhanced Checks More Abstractly Requirements Goodness must be linear: x 1 and x 2 good x 1 + x 2 good. ( ) ( ) Remember: [x]a, [y] {t+1,...,n} = L [x]a, [y] {1,...,t} Badness does not need to be linear. Examples Sharings [x i ] of degree t Sharings [x i ] of degree t and x i = 0 Shared random bits [b i ] over GF(2 k ). Double-sharings [x i ], [y i ] of degrees t, 2t, resp., and x i = y i....
17 Perfect MPC with Active Security Model n parties, t < n/3 actively corrupted secure channels model (w/o broadcast) Achievements O(nκ) bits for multiplying two κ-bit values Tools Use HIM to generate random [x], [y] of degree t,2t and x = y. Mult.: P i compute v i = a i b i y i, reconstruct v, use [x] v for [ab]. Beaver s circuit randomization + Player Elimination
18 Conclusions Hyper-Invertible Matrices easy to construct very good diffusing properties perfect security, no probabilities Applications extract randomness (propagate good properties) check consistency (concentrate bad properties) linear-complexity perfectly-secure MPC, very small overhead many more?
Simple and Efficient Perfectly-Secure Asynchronous MPC
Simple and Efficient Perfectly-Secure Asynchronous MPC Zuzana Beerliová-Trubíniová and Martin Hirt ETH Zurich, Department of Computer Science, CH-8092 Zurich {bzuzana,hirt}@inf.ethz.ch Abstract. Secure
More informationAdaptively Secure Broadcast
Adaptively Secure Broadcast Martin Hirt and Vassilis Zikas Department of Computer Science, ETH Zurich {hirt,vzikas}@inf.ethz.ch Abstract. A broadcast protocol allows a sender to distribute a message through
More informationLecture 9 - Matrix Multiplication Equivalences and Spectral Graph Theory 1
CME 305: Discrete Mathematics and Algorithms Instructor: Professor Aaron Sidford (sidford@stanfordedu) February 6, 2018 Lecture 9 - Matrix Multiplication Equivalences and Spectral Graph Theory 1 In the
More informationScalable Multiparty Computation with Nearly Optimal Work and Resilience
Scalable Multiparty Computation with Nearly Optimal Work and Resilience Ivan Damgård 1, Yuval Ishai 2, Mikkel Krøigaard 1, Jesper Buus Nielsen 1, and Adam Smith 3 1 University of Aarhus, Denmark. Email:
More informationIntroduction to Algorithms
Lecture 1 Introduction to Algorithms 1.1 Overview The purpose of this lecture is to give a brief overview of the topic of Algorithms and the kind of thinking it involves: why we focus on the subjects that
More informationPrivate Information Retrieval from MDS Coded Data in Distributed Storage Systems
Private Information Retrieval from MDS Coded Data in Distributed Storage Systems Razan Tajeddine Salim El Rouayheb ECE Department IIT Chicago Emails: rtajeddi@hawiitedu salim@iitedu arxiv:160201458v1 [csit]
More informationTwo-Dimensional Representation of Cover Free Families and its Applications: Short Signatures and More Shota Yamada The University of Tokyo
Two-Dimensional Representation of Cover Free Families and its Applications: Short Signatures and More Shota Yamada The University of Tokyo Session ID: CRYP-303 Session Classification: Advanced Our Results
More informationFountain Codes Based on Zigzag Decodable Coding
Fountain Codes Based on Zigzag Decodable Coding Takayuki Nozaki Kanagawa University, JAPAN Email: nozaki@kanagawa-u.ac.jp Abstract Fountain codes based on non-binary low-density parity-check (LDPC) codes
More information1. Lecture notes on bipartite matching
Massachusetts Institute of Technology 18.453: Combinatorial Optimization Michel X. Goemans February 5, 2017 1. Lecture notes on bipartite matching Matching problems are among the fundamental problems in
More informationNotes on point set topology, Fall 2010
Notes on point set topology, Fall 2010 Stephan Stolz September 3, 2010 Contents 1 Pointset Topology 1 1.1 Metric spaces and topological spaces...................... 1 1.2 Constructions with topological
More informationCOSC160: Data Structures Hashing Structures. Jeremy Bolton, PhD Assistant Teaching Professor
COSC160: Data Structures Hashing Structures Jeremy Bolton, PhD Assistant Teaching Professor Outline I. Hashing Structures I. Motivation and Review II. Hash Functions III. HashTables I. Implementations
More informationUmans Complexity Theory Lectures
Introduction Umans Complexity Theory Lectures Lecture 5: Boolean Circuits & NP: - Uniformity and Advice, - NC hierarchy Power from an unexpected source? we know P EXP, which implies no polytime algorithm
More informationSCALABLE MPC WITH STATIC ADVERSARY. Mahnush Movahedi, Jared Saia, Valerie King, Varsha Dani University of New Mexico University of Victoria
SCALABLE MPC WITH STATIC ADVERSARY Mahnush Movahedi, Jared Saia, Valerie King, Varsha Dani University of New Mexico University of Victoria November 2013 Multiparty Computation (MPC) 2 n players participate
More informationEnhanced Cryptanalysis of Substitution Cipher Chaining mode (SCC-128)
Enhanced Cryptanalysis of Substitution Cipher Chaining mode (SCC-128) Mohamed Abo El-Fotouh and Klaus Diepold Institute for Data Processing (LDV) Technische Universität München (TUM) 80333 Munich Germany
More informationMATH 423 Linear Algebra II Lecture 17: Reduced row echelon form (continued). Determinant of a matrix.
MATH 423 Linear Algebra II Lecture 17: Reduced row echelon form (continued). Determinant of a matrix. Row echelon form A matrix is said to be in the row echelon form if the leading entries shift to the
More informationCPSC 340: Machine Learning and Data Mining. Principal Component Analysis Fall 2017
CPSC 340: Machine Learning and Data Mining Principal Component Analysis Fall 2017 Assignment 3: 2 late days to hand in tonight. Admin Assignment 4: Due Friday of next week. Last Time: MAP Estimation MAP
More informationSuperexpanders and Markov. cotype in the work of. Mendel and Naor. Keith Ball
Superexpanders and Markov cotype in the work of Mendel and Naor Keith Ball Expanders A graph is an expander if it has small degree but spreads information very fast: in a few steps you can go to most places.
More informationDiffusion Wavelets for Natural Image Analysis
Diffusion Wavelets for Natural Image Analysis Tyrus Berry December 16, 2011 Contents 1 Project Description 2 2 Introduction to Diffusion Wavelets 2 2.1 Diffusion Multiresolution............................
More informationDM545 Linear and Integer Programming. Lecture 2. The Simplex Method. Marco Chiarandini
DM545 Linear and Integer Programming Lecture 2 The Marco Chiarandini Department of Mathematics & Computer Science University of Southern Denmark Outline 1. 2. 3. 4. Standard Form Basic Feasible Solutions
More informationNash Equilibrium Load Balancing
Nash Equilibrium Load Balancing Computer Science Department Collaborators: A. Kothari, C. Toth, Y. Zhou Load Balancing A set of m servers or machines. A set of n clients or jobs. Each job can be run only
More informationContent of this part
UNIVERSITY OF MASSACHUSETTS Dept. of Electrical & Computer Engineering Introduction to Cryptography ECE 597XX/697XX Part 4 The Advanced Encryption Standard (AES) Israel Koren ECE597/697 Koren Part.4.1
More informationOn the Computational Overhead of MPC with Dishonest Majority
On the Computational Overhead of MPC with Dishonest Majority Jesper Buus Nielsen 1 and Samuel Ranellucci 2,3 jbn@cs.au.dk, samuel@umd.edu 1 Department of Computer Science, Aarhus University, Aarhus, Denmark
More informationOnline Learning. Lorenzo Rosasco MIT, L. Rosasco Online Learning
Online Learning Lorenzo Rosasco MIT, 9.520 About this class Goal To introduce theory and algorithms for online learning. Plan Different views on online learning From batch to online least squares Other
More informationChapter 18 out of 37 from Discrete Mathematics for Neophytes: Number Theory, Probability, Algorithms, and Other Stuff by J. M. Cargal.
Chapter 8 out of 7 from Discrete Mathematics for Neophytes: Number Theory, Probability, Algorithms, and Other Stuff by J. M. Cargal 8 Matrices Definitions and Basic Operations Matrix algebra is also known
More informationTruth, Lies, and Random Bits
Truth, Lies, and Random Bits Jared Saia University of New Mexico, Albuquerque, NM, USA January, 2015 The Searchers, 1956 Westerns Wide-open spaces Epic struggles Borrow from many sources Westerns
More informationSecure Multiparty Computation with Minimal Interaction
Secure Multiparty Computation with Minimal Interaction Yuval Ishai 1, Eyal Kushilevitz 2, and Anat Paskin 2 1 Computer Science Department, Technion and UCLA (yuvali@cs.technion.ac.il) 2 Computer Science
More informationParallelizing The Matrix Multiplication. 6/10/2013 LONI Parallel Programming Workshop
Parallelizing The Matrix Multiplication 6/10/2013 LONI Parallel Programming Workshop 2013 1 Serial version 6/10/2013 LONI Parallel Programming Workshop 2013 2 X = A md x B dn = C mn d c i,j = a i,k b k,j
More informationPerformance improvements to peer-to-peer file transfers using network coding
Performance improvements to peer-to-peer file transfers using network coding Aaron Kelley April 29, 2009 Mentor: Dr. David Sturgill Outline Introduction Network Coding Background Contributions Precomputation
More informationChordal deletion is fixed-parameter tractable
Chordal deletion is fixed-parameter tractable Dániel Marx Institut für Informatik, Humboldt-Universität zu Berlin, Unter den Linden 6, 10099 Berlin, Germany. dmarx@informatik.hu-berlin.de Abstract. It
More informationx = 12 x = 12 1x = 16
2.2 - The Inverse of a Matrix We've seen how to add matrices, multiply them by scalars, subtract them, and multiply one matrix by another. The question naturally arises: Can we divide one matrix by another?
More informationComputer-aided proofs for multiparty computation with active security
Computer-aided proofs for multiparty computation with active security Helene Haagh Aleksandr Karbyshev Sabine Oechsner Bas Spitters Pierre-Yves Strub Aarhus University, DK École Polytechnique, F Abstract
More informationComputer Vision I - Algorithms and Applications: Multi-View 3D reconstruction
Computer Vision I - Algorithms and Applications: Multi-View 3D reconstruction Carsten Rother 09/12/2013 Computer Vision I: Multi-View 3D reconstruction Roadmap this lecture Computer Vision I: Multi-View
More informationLecture 6: Arithmetic and Threshold Circuits
IAS/PCMI Summer Session 2000 Clay Mathematics Undergraduate Program Advanced Course on Computational Complexity Lecture 6: Arithmetic and Threshold Circuits David Mix Barrington and Alexis Maciel July
More informationAn End-to-End System for Large Scale P2P MPC-as-a-Service and Low-Bandwidth MPC for Weak Participants
An End-to-End System for Large Scale P2P MPC-as-a-Service and Low-Bandwidth MPC for Weak Participants Assi Barak Martin Hirt Lior Koskas Yehuda Lindell August 20, 2018 Abstract Protocols for secure multiparty
More informationInteger Programming Theory
Integer Programming Theory Laura Galli October 24, 2016 In the following we assume all functions are linear, hence we often drop the term linear. In discrete optimization, we seek to find a solution x
More informationConvexity Theory and Gradient Methods
Convexity Theory and Gradient Methods Angelia Nedić angelia@illinois.edu ISE Department and Coordinated Science Laboratory University of Illinois at Urbana-Champaign Outline Convex Functions Optimality
More informationMulti Party Distributed Private Matching, Set Disjointness and Cardinality Set Intersection with Information Theoretic Security
Multi Party Distributed Private Matching, Set Disjointness and Cardinality Set Intersection with Information Theoretic Security Sathya Narayanan G 1, Aishwarya T 1, Anugrah Agrawal 2, Arpita Patra 3, Ashish
More informationComputing the Minimum Hamming Distance for Z 2 Z 4 -Linear Codes
Computing the Minimum Hamming Distance for Z 2 Z 4 -Linear Codes Marta Pujol and Mercè Villanueva Combinatorics, Coding and Security Group (CCSG) Universitat Autònoma de Barcelona (UAB) VIII JMDA, Almería
More informationMathematical and Algorithmic Foundations Linear Programming and Matchings
Adavnced Algorithms Lectures Mathematical and Algorithmic Foundations Linear Programming and Matchings Paul G. Spirakis Department of Computer Science University of Patras and Liverpool Paul G. Spirakis
More informationPoint-Set Topology 1. TOPOLOGICAL SPACES AND CONTINUOUS FUNCTIONS
Point-Set Topology 1. TOPOLOGICAL SPACES AND CONTINUOUS FUNCTIONS Definition 1.1. Let X be a set and T a subset of the power set P(X) of X. Then T is a topology on X if and only if all of the following
More informationUnlabeled equivalence for matroids representable over finite fields
Unlabeled equivalence for matroids representable over finite fields November 16, 2012 S. R. Kingan Department of Mathematics Brooklyn College, City University of New York 2900 Bedford Avenue Brooklyn,
More informationThe extendability of matchings in strongly regular graphs
The extendability of matchings in strongly regular graphs Sebastian Cioabă Department of Mathematical Sciences University of Delaware Villanova, June 5, 2014 Introduction Matching A set of edges M of a
More informationA graph is finite if its vertex set and edge set are finite. We call a graph with just one vertex trivial and all other graphs nontrivial.
2301-670 Graph theory 1.1 What is a graph? 1 st semester 2550 1 1.1. What is a graph? 1.1.2. Definition. A graph G is a triple (V(G), E(G), ψ G ) consisting of V(G) of vertices, a set E(G), disjoint from
More informationSemistandard Young Tableaux Polytopes. Sara Solhjem Joint work with Jessica Striker. April 9, 2017
Semistandard Young Tableaux Polytopes Sara Solhjem Joint work with Jessica Striker North Dakota State University Graduate Student Combinatorics Conference 217 April 9, 217 Sara Solhjem (NDSU) Semistandard
More informationConvex Algebraic Geometry
, North Carolina State University What is convex algebraic geometry? Convex algebraic geometry is the study of convex semialgebraic objects, especially those arising in optimization and statistics. What
More informationCS473-Algorithms I. Lecture 10. Dynamic Programming. Cevdet Aykanat - Bilkent University Computer Engineering Department
CS473-Algorithms I Lecture 1 Dynamic Programming 1 Introduction An algorithm design paradigm like divide-and-conquer Programming : A tabular method (not writing computer code) Divide-and-Conquer (DAC):
More informationDubna 2018: lines on cubic surfaces
Dubna 2018: lines on cubic surfaces Ivan Cheltsov 20th July 2018 Lecture 1: projective plane Complex plane Definition A line in C 2 is a subset that is given by ax + by + c = 0 for some complex numbers
More information1.3. Conditional expressions To express case distinctions like
Introduction Much of the theory developed in the underlying course Logic II can be implemented in a proof assistant. In the present setting this is interesting, since we can then machine extract from a
More informationSecure Multi-Party Computation of Probabilistic Threat Propagation
Secure Multi-Party Computation of Probabilistic Threat Propagation Emily Shen Nabil Schear, Ellen Vitercik, Arkady Yerukhimovich Graph Exploitation Symposium 216 DISTRIBUTION STATEMENT A. Approved for
More informationYuval Ishai Technion
Winter School on Bar-Ilan University, Israel 30/1/2011-1/2/2011 Bar-Ilan University Yuval Ishai Technion 1 Zero-knowledge proofs for NP [GMR85,GMW86] Bar-Ilan University Computational MPC with no honest
More informationLecture 9: (Semi-)bandits and experts with linear costs (part I)
CMSC 858G: Bandits, Experts and Games 11/03/16 Lecture 9: (Semi-)bandits and experts with linear costs (part I) Instructor: Alex Slivkins Scribed by: Amr Sharaf In this lecture, we will study bandit problems
More informationConstruction of a transitive orientation using B-stable subgraphs
Computer Science Journal of Moldova, vol.23, no.1(67), 2015 Construction of a transitive orientation using B-stable subgraphs Nicolae Grigoriu Abstract A special method for construction of transitive orientations
More informationInverse and Implicit functions
CHAPTER 3 Inverse and Implicit functions. Inverse Functions and Coordinate Changes Let U R d be a domain. Theorem. (Inverse function theorem). If ϕ : U R d is differentiable at a and Dϕ a is invertible,
More informationLecture 17: Continuous Functions
Lecture 17: Continuous Functions 1 Continuous Functions Let (X, T X ) and (Y, T Y ) be topological spaces. Definition 1.1 (Continuous Function). A function f : X Y is said to be continuous if the inverse
More informationLimitations of Algorithmic Solvability In this Chapter we investigate the power of algorithms to solve problems Some can be solved algorithmically and
Computer Language Theory Chapter 4: Decidability 1 Limitations of Algorithmic Solvability In this Chapter we investigate the power of algorithms to solve problems Some can be solved algorithmically and
More informationAlgorithmic Semi-algebraic Geometry and its applications. Saugata Basu School of Mathematics & College of Computing Georgia Institute of Technology.
1 Algorithmic Semi-algebraic Geometry and its applications Saugata Basu School of Mathematics & College of Computing Georgia Institute of Technology. 2 Introduction: Three problems 1. Plan the motion of
More informationStructured System Theory
Appendix C Structured System Theory Linear systems are often studied from an algebraic perspective, based on the rank of certain matrices. While such tests are easy to derive from the mathematical model,
More informationCore Mathematics 1 Indices & Surds
Regent College Maths Department Core Mathematics Indices & Surds Indices September 0 C Note Laws of indices for all rational exponents. The equivalence of We should already know from GCSE, the three Laws
More informationThe Ordered Covering Problem
The Ordered Covering Problem Uriel Feige Yael Hitron November 8, 2016 Abstract We introduce the Ordered Covering (OC) problem. The input is a finite set of n elements X, a color function c : X {0, 1} and
More informationSide-Channel Countermeasures for Hardware: is There a Light at the End of the Tunnel?
Side-Channel Countermeasures for Hardware: is There a Light at the End of the Tunnel? 11. Sep 2013 Ruhr University Bochum Outline Power Analysis Attack Masking Problems in hardware Possible approaches
More informationA Course in Machine Learning
A Course in Machine Learning Hal Daumé III 13 UNSUPERVISED LEARNING If you have access to labeled training data, you know what to do. This is the supervised setting, in which you have a teacher telling
More informationThe Pre-Image Problem in Kernel Methods
The Pre-Image Problem in Kernel Methods James Kwok Ivor Tsang Department of Computer Science Hong Kong University of Science and Technology Hong Kong The Pre-Image Problem in Kernel Methods ICML-2003 1
More information1/p-Secure Multiparty Computation without Honest Majority and the Best of Both Worlds
1/p-Secure Multiparty Computation without Honest Majority and the Best of Both Worlds Amos Beimel 1, Yehuda Lindell 2, Eran Omri 2, and Ilan Orlov 1 1 Dept. of Computer Science, Ben Gurion University 2
More informationChain Matrix Multiplication
Chain Matrix Multiplication Version of November 5, 2014 Version of November 5, 2014 Chain Matrix Multiplication 1 / 27 Outline Outline Review of matrix multiplication. The chain matrix multiplication problem.
More informationFixed Parameter Algorithms
Fixed Parameter Algorithms Dániel Marx Tel Aviv University, Israel Open lectures for PhD students in computer science January 9, 2010, Warsaw, Poland Fixed Parameter Algorithms p.1/41 Parameterized complexity
More informationExact Optimized-cost Repair in Multi-hop Distributed Storage Networks
Exact Optimized-cost Repair in Multi-hop Distributed Storage Networks Majid Gerami, Ming Xiao Communication Theory Lab, Royal Institute of Technology, KTH, Sweden, E-mail: {gerami, mingx@kthse arxiv:14012774v1
More informationLINEAR CODES WITH NON-UNIFORM ERROR CORRECTION CAPABILITY
LINEAR CODES WITH NON-UNIFORM ERROR CORRECTION CAPABILITY By Margaret Ann Bernard The University of the West Indies and Bhu Dev Sharma Xavier University of Louisiana, New Orleans ABSTRACT This paper introduces
More informationConstant-Round Asynchronous Multi-Party Computation Based on One-Way Functions
Constant-Round Asynchronous Multi-Party Computation Based on One-Way Functions Sandro Coretti 1, Juan Garay 2, Martin Hirt 3, and Vassilis Zikas 4 1 New York University, corettis@nyu.edu 2 Yahoo Research,
More informationSecure Multiparty Computation
Secure Multiparty Computation Li Xiong CS573 Data Privacy and Security Outline Secure multiparty computation Problem and security definitions Basic cryptographic tools and general constructions Yao s Millionnare
More informationLecture 9. Semidefinite programming is linear programming where variables are entries in a positive semidefinite matrix.
CSE525: Randomized Algorithms and Probabilistic Analysis Lecture 9 Lecturer: Anna Karlin Scribe: Sonya Alexandrova and Keith Jia 1 Introduction to semidefinite programming Semidefinite programming is linear
More informationChordal graphs MPRI
Chordal graphs MPRI 2017 2018 Michel Habib habib@irif.fr http://www.irif.fr/~habib Sophie Germain, septembre 2017 Schedule Chordal graphs Representation of chordal graphs LBFS and chordal graphs More structural
More informationEnumeration of Tilings and Related Problems
Enumeration of Tilings and Related Problems Tri Lai Institute for Mathematics and its Applications Minneapolis, MN 55455 Discrete Mathematics Seminar University of British Columbia Vancouver February 2016
More informationOn the Computational Complexity of Nash Equilibria for (0, 1) Bimatrix Games
On the Computational Complexity of Nash Equilibria for (0, 1) Bimatrix Games Bruno Codenotti Daniel Štefankovič Abstract The computational complexity of finding a Nash equilibrium in a nonzero sum bimatrix
More informationIntegration of SMT Solvers with ITPs There and Back Again
Integration of SMT Solvers with ITPs There and Back Again Sascha Böhme and University of Sheffield 7 May 2010 1 2 Features: SMT-LIB vs. Yices Translation Techniques Caveats 3 4 Motivation Motivation System
More informationSmall Survey on Perfect Graphs
Small Survey on Perfect Graphs Michele Alberti ENS Lyon December 8, 2010 Abstract This is a small survey on the exciting world of Perfect Graphs. We will see when a graph is perfect and which are families
More informationA note on the number of edges guaranteeing a C 4 in Eulerian bipartite digraphs
A note on the number of edges guaranteeing a C 4 in Eulerian bipartite digraphs Jian Shen Department of Mathematics Southwest Texas State University San Marcos, TX 78666 email: js48@swt.edu Raphael Yuster
More informationpage 1 Introduction to Cryptography Benny Pinkas Lecture 3 November 18, 2008 Introduction to Cryptography, Benny Pinkas
Introduction to Cryptography Lecture 3 Benny Pinkas page 1 1 Pseudo-random generator Pseudo-random generator seed output s G G(s) (random, s =n) Deterministic function of s, publicly known G(s) = 2n Distinguisher
More informationAsynchronous Verifiable Secret Sharing and Proactive Cryptosystems
An extended abstract of this paper appears in Proc. 9th ACM Conference on Computer and Communications Security (CCS-9), Washington DC, USA, 2002. Asynchronous Verifiable Secret Sharing and Proactive Cryptosystems
More information14 Dynamic. Matrix-chain multiplication. P.D. Dr. Alexander Souza. Winter term 11/12
Algorithms Theory 14 Dynamic Programming (2) Matrix-chain multiplication P.D. Dr. Alexander Souza Optimal substructure Dynamic programming is typically applied to optimization problems. An optimal solution
More informationDiscrete Mathematics and Probability Theory Spring 2017 Rao Midterm 2
CS 70 Discrete Mathematics and Probability Theory Spring 2017 Rao Midterm 2 PRINT Your Name:, (last) SIGN Your Name: (first) PRINT Your Student ID: WRITE THE NAME OF your exam room: Name of the person
More informationPredicting Tumour Location by Modelling the Deformation of the Breast using Nonlinear Elasticity
Predicting Tumour Location by Modelling the Deformation of the Breast using Nonlinear Elasticity November 8th, 2006 Outline Motivation Motivation Motivation for Modelling Breast Deformation Mesh Generation
More informationAH Matrices.notebook November 28, 2016
Matrices Numbers are put into arrays to help with multiplication, division etc. A Matrix (matrices pl.) is a rectangular array of numbers arranged in rows and columns. Matrices If there are m rows and
More informationCounting the number of spanning tree. Pied Piper Department of Computer Science and Engineering Shanghai Jiao Tong University
Counting the number of spanning tree Pied Piper Department of Computer Science and Engineering Shanghai Jiao Tong University 目录 Contents 1 Complete Graph 2 Proof of the Lemma 3 Arbitrary Graph 4 Proof
More informationLower and Upper Bound Theory. Prof:Dr. Adnan YAZICI Dept. of Computer Engineering Middle East Technical Univ. Ankara - TURKEY
Lower and Upper Bound Theory Prof:Dr. Adnan YAZICI Dept. of Computer Engineering Middle East Technical Univ. Ankara - TURKEY 1 Lower and Upper Bound Theory How fast can we sort? Lower-Bound Theory can
More informationPartha Sarathi Manal
MA 515: Introduction to Algorithms & MA353 : Design and Analysis of Algorithms [3-0-0-6] Lecture 29 http://www.iitg.ernet.in/psm/indexing_ma353/y09/index.html Partha Sarathi Manal psm@iitg.ernet.in Dept.
More informationOn the construction of nested orthogonal arrays
isid/ms/2010/06 September 10, 2010 http://wwwisidacin/ statmath/eprints On the construction of nested orthogonal arrays Aloke Dey Indian Statistical Institute, Delhi Centre 7, SJSS Marg, New Delhi 110
More informationFairness Versus Guaranteed Output Delivery in Secure Multiparty Computation
Fairness Versus Guaranteed Output Delivery in Secure Multiparty Computation Ran Cohen and Yehuda Lindell Department of Computer Science, Bar-Ilan University, Israel cohenrb@cs.biu.ac.il, lindell@biu.ac.il
More informationApproximation Algorithms
Approximation Algorithms Group Members: 1. Geng Xue (A0095628R) 2. Cai Jingli (A0095623B) 3. Xing Zhe (A0095644W) 4. Zhu Xiaolu (A0109657W) 5. Wang Zixiao (A0095670X) 6. Jiao Qing (A0095637R) 7. Zhang
More informationUsing Error Detection Codes to detect fault attacks on Symmetric Key Ciphers
Using Error Detection Codes to detect fault attacks on Symmetric Key Ciphers Israel Koren Department of Electrical and Computer Engineering Univ. of Massachusetts, Amherst, MA collaborating with Luca Breveglieri,
More informationLecture 14: Linear Programming II
A Theorist s Toolkit (CMU 18-859T, Fall 013) Lecture 14: Linear Programming II October 3, 013 Lecturer: Ryan O Donnell Scribe: Stylianos Despotakis 1 Introduction At a big conference in Wisconsin in 1948
More informationSummary of Raptor Codes
Summary of Raptor Codes Tracey Ho October 29, 2003 1 Introduction This summary gives an overview of Raptor Codes, the latest class of codes proposed for reliable multicast in the Digital Fountain model.
More informationMath 778S Spectral Graph Theory Handout #2: Basic graph theory
Math 778S Spectral Graph Theory Handout #: Basic graph theory Graph theory was founded by the great Swiss mathematician Leonhard Euler (1707-178) after he solved the Königsberg Bridge problem: Is it possible
More informationOrientation of manifolds - definition*
Bulletin of the Manifold Atlas - definition (2013) Orientation of manifolds - definition* MATTHIAS KRECK 1. Zero dimensional manifolds For zero dimensional manifolds an orientation is a map from the manifold
More informationSecure Multi-Party Computation
Secure Multi-Party Computation A Short Tutorial By no means a survey! Manoj Prabhakaran :: University of Illinois at Urbana-Champaign Secure Multi-Party Computation A Short Tutorial Part I Must We Trust?
More informationComputation with No Memory, and Rearrangeable Multicast Networks
Discrete Mathematics and Theoretical Computer Science DMTCS vol. 16:1, 2014, 121 142 Computation with No Memory, and Rearrangeable Multicast Networks Serge Burckel 1 Emeric Gioan 2 Emmanuel Thomé 3 1 ERMIT,
More informationA Game-Theoretic Framework for Congestion Control in General Topology Networks
A Game-Theoretic Framework for Congestion Control in General Topology SYS793 Presentation! By:! Computer Science Department! University of Virginia 1 Outline 2 1 Problem and Motivation! Congestion Control
More informationTrail Making Game. Hyun Sung Jun Jaehoon Kim Sang-il Oum Department of Mathematical Sciences KAIST, Daejeon, , Republic of Korea.
Trail Making Game Hyun Sung Jun Jaehoon Kim Sang-il Oum Department of Mathematical Sciences KAIST, Daejeon, 305-701, Republic of Korea. May 7, 2009 Abstract Trail Making is a game played on a graph with
More informationDynamic Programming II
June 9, 214 DP: Longest common subsequence biologists often need to find out how similar are 2 DNA sequences DNA sequences are strings of bases: A, C, T and G how to define similarity? DP: Longest common
More informationHow to securely perform computations on secret-shared data
U N I V E R S I T Y OF T A R T U Faculty of Mathematics and Computer Science Institute of Computer Science Dan Bogdanov How to securely perform computations on secret-shared data Master s Thesis Supervisor:
More informationx n x n stepnumber k order r error constant C r+1 1/2 5/12 3/8 251/720 abs. stab. interval (α,0) /11-3/10
MATH 573 LECTURE NOTES 77 13.8. Predictor-corrector methods. We consider the Adams methods, obtained from the formula xn+1 xn+1 y(x n+1 y(x n ) = y (x)dx = f(x,y(x))dx x n x n by replacing f by an interpolating
More information