Hyper-Invertible Matrices and Applications

Size: px
Start display at page:

Download "Hyper-Invertible Matrices and Applications"

Transcription

1 Hyper-Invertible Matrices and Applications Martin Hirt ETH Zurich Theory and Practice of MPC, Aarhus, June 2012

2 Outline Hyper-Invertible Matrices Motivation Definition & Properties Construction Applications Conclusions

3 How can n parties generate random values? Model n parties, t are bad aim for random shared values (sharing doesn t matter) Approach 1 1. Every P i shares random value x i 2. y = n Only one good sharing from n sharings x i i=1 Approach 2 1. Every P i shares random value x i 2. y 1 = λ 1i x i, y 2 = λ 2i x i,... i i How many good sharings from n sharings? Best we can hope for: n t

4 More Abstractly... Given: n values x 1 x 2 x 3 x 4 x 5... x n where n t values are good (e.g. uniformly random), t values are bad (e.g. chosen by adversary). Goal: Find (the) n t good values Goal : Find y 1,..., y n t which are as good as x 2, x 5,..., x n. y 1 y 2. y n t y n t+1. y n = Hyper-Invertible Matrix x 1 x 2 x 3 x 4 x 5. x n

5 Hyper-Invertible Matrix The Definition Def: M is hyper-invertible : every square sub-matrix M C R λ 11 λ 12 λ 13 λ 1n λ 21 λ 22 λ 23 λ 2n.. λ m1 λ m2 λ m3 λ mn is invertible. Note: Cf. Parity-check matrix of MDS-Codes, Cauchy matrices,...

6 Properties (1/2) Property 1: Given some x j -s and some y i -s (in total n values), one can compute all other x j -s and y i -s. y 1 y 2 y m = M x 1 x 2 x n Lemma 1: Given HIM M, index sets C {1... n}, R {1... m} with ( C = R. Then given x C, ) ( y R one can compute x C, ) y R. Proof: 1. y R = M R x = M C R x C + MR C x C 2. ) 1 ( x C = y R MR C ) x C ( M C R

7 Properties (1/2) Property 1: Given some x j -s and some y i -s (in total n values), one can compute all other x j -s and y i -s. y 1 y 2 y m = M x 1 x 2 x n Lemma 2: Given matrix M. If for all C {1... n}, R {1... m} with C = R one can compute x C from ( x C, y R ), then M is HIM. Proof: Invert M C R as follows: 1. Given y R. Let x C = 0 2. Can compute x C ( MR C ) 1

8 Properties (2/2) Property 2: Fix k values, then there is a bijection from any n k values to any other n k values. y 1 y 2 y m = M x 1 x 2 x n

9 The Construction Idea: Construct mapping (x 1,.., x n ) (y 1,.., y m ) with Property 1. Construction 1. fix values α 1,..., α n, β 1,..., β m in F 2. let polynomial f(z) s.t. f(α j ) = x j j 3. compute y i = f(β i ) i Formally f(z) = n j=1 n k=1 k j z α k α j α k x j y i = f(β i ) = M := [ λ i,j ] n j=1 n β i α k α j α k k=1 k j }{{} λ i,j x j = n j=1 λ i,j x j

10 The Field The Field Size Previous construction requires F n + m. Easy patch: F = n + m 1. Lower Bounds (Conjecture) F = n + m 1 is optimal for F = GF(2 k ) But: is HIM over GF(4) (though m + n 1 = 5)

11 Randomness Extraction Passive Security Model n parties, t are bad (passive only) aim for random shared values given n n hyper-invertible matrix M Protocol 1. Every P i shares random value x i [x i ] 2. ([y 1 ],..., [y n ]) = M([x 1 ],..., [x n ]) 3. Output [y 1 ],..., [y n t ] Analysis Adversary A {1,..., n}, A = t, hence knows [x] A. Prop. 2: Fix A, [x] A, mapping [x] A [y] {1,...,n t} is bijective.

12 Randomness Extraction Active Security Attempt #1 Model n parties, t are bad (active) Protocol Every P i VSSes random value x i [x i ]... Analysis works, but complicated & inefficient

13 Randomness Extraction Active Security Attempt #2 Model n parties, t are bad (active) detectable security (cf player elimination / dispute control) Protocol 1. Every P i passively shares random x i [x i ] 2. ([y 1 ],..., [y n ]) = M([x 1 ],..., [x n ]) 3. Reconstruct and check degree of [y 1 ],..., [y t ] 4. Output [y t+1 ],..., [y n t ] Analysis Adversary A {1,..., n}, A = t; H A, H = n 2t. Prop. 1: Degrees of [x] A and [y] {1,...,t} ok all degrees ok. Prop. 2: Fix A, [x] A, y {1,...,t}, bij. mapping [x] H [y] {t+1,...,n t}.

14 Randomness Extraction Active Security Attempt #3 Protocol 1. Every P i passively shares random x i [x i ] 2. ([y 1 ],..., [y n ]) = M([x 1 ],..., [x n ]) 3. For i = 1,..., 2t, have P i check degree of [y i ] 4. Output [y 2t+1 ],..., [y n ] Analysis Adversary A {1,..., n}, A = t; H A, H = n 2t. Prop. 1: Degrees of [x] A and [y] {1,...,2t} A ok all degrees ok. Prop. 2: Fix A, [x] A, [y] {1,...,2t} A, Efficiency mapping [x] H [y] {2t+1,...,n} is bijective. n passive sharings n 2t good random sharings

15 Enhanced Checks Example: Random Zero-Sharings [0] 1. Every P i passively shares x i = 0 [x i ] 2. ([y 1 ],..., [y n ]) = M([x 1 ],..., [x n ]) 3. For i = 1,..., 2t, have P i check degree of [y i ] and y i? = Output [y 2t+1 ],..., [y n ] Analysis Adversary A {1,..., n}, A = t Prop. 1: If [x] A and [y] {1,...,2t} A have right degree and share 0 all sharings have right degree and share 0.

16 Enhanced Checks More Abstractly Requirements Goodness must be linear: x 1 and x 2 good x 1 + x 2 good. ( ) ( ) Remember: [x]a, [y] {t+1,...,n} = L [x]a, [y] {1,...,t} Badness does not need to be linear. Examples Sharings [x i ] of degree t Sharings [x i ] of degree t and x i = 0 Shared random bits [b i ] over GF(2 k ). Double-sharings [x i ], [y i ] of degrees t, 2t, resp., and x i = y i....

17 Perfect MPC with Active Security Model n parties, t < n/3 actively corrupted secure channels model (w/o broadcast) Achievements O(nκ) bits for multiplying two κ-bit values Tools Use HIM to generate random [x], [y] of degree t,2t and x = y. Mult.: P i compute v i = a i b i y i, reconstruct v, use [x] v for [ab]. Beaver s circuit randomization + Player Elimination

18 Conclusions Hyper-Invertible Matrices easy to construct very good diffusing properties perfect security, no probabilities Applications extract randomness (propagate good properties) check consistency (concentrate bad properties) linear-complexity perfectly-secure MPC, very small overhead many more?

Simple and Efficient Perfectly-Secure Asynchronous MPC

Simple and Efficient Perfectly-Secure Asynchronous MPC Simple and Efficient Perfectly-Secure Asynchronous MPC Zuzana Beerliová-Trubíniová and Martin Hirt ETH Zurich, Department of Computer Science, CH-8092 Zurich {bzuzana,hirt}@inf.ethz.ch Abstract. Secure

More information

Adaptively Secure Broadcast

Adaptively Secure Broadcast Adaptively Secure Broadcast Martin Hirt and Vassilis Zikas Department of Computer Science, ETH Zurich {hirt,vzikas}@inf.ethz.ch Abstract. A broadcast protocol allows a sender to distribute a message through

More information

Lecture 9 - Matrix Multiplication Equivalences and Spectral Graph Theory 1

Lecture 9 - Matrix Multiplication Equivalences and Spectral Graph Theory 1 CME 305: Discrete Mathematics and Algorithms Instructor: Professor Aaron Sidford (sidford@stanfordedu) February 6, 2018 Lecture 9 - Matrix Multiplication Equivalences and Spectral Graph Theory 1 In the

More information

Scalable Multiparty Computation with Nearly Optimal Work and Resilience

Scalable Multiparty Computation with Nearly Optimal Work and Resilience Scalable Multiparty Computation with Nearly Optimal Work and Resilience Ivan Damgård 1, Yuval Ishai 2, Mikkel Krøigaard 1, Jesper Buus Nielsen 1, and Adam Smith 3 1 University of Aarhus, Denmark. Email:

More information

Introduction to Algorithms

Introduction to Algorithms Lecture 1 Introduction to Algorithms 1.1 Overview The purpose of this lecture is to give a brief overview of the topic of Algorithms and the kind of thinking it involves: why we focus on the subjects that

More information

Private Information Retrieval from MDS Coded Data in Distributed Storage Systems

Private Information Retrieval from MDS Coded Data in Distributed Storage Systems Private Information Retrieval from MDS Coded Data in Distributed Storage Systems Razan Tajeddine Salim El Rouayheb ECE Department IIT Chicago Emails: rtajeddi@hawiitedu salim@iitedu arxiv:160201458v1 [csit]

More information

Two-Dimensional Representation of Cover Free Families and its Applications: Short Signatures and More Shota Yamada The University of Tokyo

Two-Dimensional Representation of Cover Free Families and its Applications: Short Signatures and More Shota Yamada The University of Tokyo Two-Dimensional Representation of Cover Free Families and its Applications: Short Signatures and More Shota Yamada The University of Tokyo Session ID: CRYP-303 Session Classification: Advanced Our Results

More information

Fountain Codes Based on Zigzag Decodable Coding

Fountain Codes Based on Zigzag Decodable Coding Fountain Codes Based on Zigzag Decodable Coding Takayuki Nozaki Kanagawa University, JAPAN Email: nozaki@kanagawa-u.ac.jp Abstract Fountain codes based on non-binary low-density parity-check (LDPC) codes

More information

1. Lecture notes on bipartite matching

1. Lecture notes on bipartite matching Massachusetts Institute of Technology 18.453: Combinatorial Optimization Michel X. Goemans February 5, 2017 1. Lecture notes on bipartite matching Matching problems are among the fundamental problems in

More information

Notes on point set topology, Fall 2010

Notes on point set topology, Fall 2010 Notes on point set topology, Fall 2010 Stephan Stolz September 3, 2010 Contents 1 Pointset Topology 1 1.1 Metric spaces and topological spaces...................... 1 1.2 Constructions with topological

More information

COSC160: Data Structures Hashing Structures. Jeremy Bolton, PhD Assistant Teaching Professor

COSC160: Data Structures Hashing Structures. Jeremy Bolton, PhD Assistant Teaching Professor COSC160: Data Structures Hashing Structures Jeremy Bolton, PhD Assistant Teaching Professor Outline I. Hashing Structures I. Motivation and Review II. Hash Functions III. HashTables I. Implementations

More information

Umans Complexity Theory Lectures

Umans Complexity Theory Lectures Introduction Umans Complexity Theory Lectures Lecture 5: Boolean Circuits & NP: - Uniformity and Advice, - NC hierarchy Power from an unexpected source? we know P EXP, which implies no polytime algorithm

More information

SCALABLE MPC WITH STATIC ADVERSARY. Mahnush Movahedi, Jared Saia, Valerie King, Varsha Dani University of New Mexico University of Victoria

SCALABLE MPC WITH STATIC ADVERSARY. Mahnush Movahedi, Jared Saia, Valerie King, Varsha Dani University of New Mexico University of Victoria SCALABLE MPC WITH STATIC ADVERSARY Mahnush Movahedi, Jared Saia, Valerie King, Varsha Dani University of New Mexico University of Victoria November 2013 Multiparty Computation (MPC) 2 n players participate

More information

Enhanced Cryptanalysis of Substitution Cipher Chaining mode (SCC-128)

Enhanced Cryptanalysis of Substitution Cipher Chaining mode (SCC-128) Enhanced Cryptanalysis of Substitution Cipher Chaining mode (SCC-128) Mohamed Abo El-Fotouh and Klaus Diepold Institute for Data Processing (LDV) Technische Universität München (TUM) 80333 Munich Germany

More information

MATH 423 Linear Algebra II Lecture 17: Reduced row echelon form (continued). Determinant of a matrix.

MATH 423 Linear Algebra II Lecture 17: Reduced row echelon form (continued). Determinant of a matrix. MATH 423 Linear Algebra II Lecture 17: Reduced row echelon form (continued). Determinant of a matrix. Row echelon form A matrix is said to be in the row echelon form if the leading entries shift to the

More information

CPSC 340: Machine Learning and Data Mining. Principal Component Analysis Fall 2017

CPSC 340: Machine Learning and Data Mining. Principal Component Analysis Fall 2017 CPSC 340: Machine Learning and Data Mining Principal Component Analysis Fall 2017 Assignment 3: 2 late days to hand in tonight. Admin Assignment 4: Due Friday of next week. Last Time: MAP Estimation MAP

More information

Superexpanders and Markov. cotype in the work of. Mendel and Naor. Keith Ball

Superexpanders and Markov. cotype in the work of. Mendel and Naor. Keith Ball Superexpanders and Markov cotype in the work of Mendel and Naor Keith Ball Expanders A graph is an expander if it has small degree but spreads information very fast: in a few steps you can go to most places.

More information

Diffusion Wavelets for Natural Image Analysis

Diffusion Wavelets for Natural Image Analysis Diffusion Wavelets for Natural Image Analysis Tyrus Berry December 16, 2011 Contents 1 Project Description 2 2 Introduction to Diffusion Wavelets 2 2.1 Diffusion Multiresolution............................

More information

DM545 Linear and Integer Programming. Lecture 2. The Simplex Method. Marco Chiarandini

DM545 Linear and Integer Programming. Lecture 2. The Simplex Method. Marco Chiarandini DM545 Linear and Integer Programming Lecture 2 The Marco Chiarandini Department of Mathematics & Computer Science University of Southern Denmark Outline 1. 2. 3. 4. Standard Form Basic Feasible Solutions

More information

Nash Equilibrium Load Balancing

Nash Equilibrium Load Balancing Nash Equilibrium Load Balancing Computer Science Department Collaborators: A. Kothari, C. Toth, Y. Zhou Load Balancing A set of m servers or machines. A set of n clients or jobs. Each job can be run only

More information

Content of this part

Content of this part UNIVERSITY OF MASSACHUSETTS Dept. of Electrical & Computer Engineering Introduction to Cryptography ECE 597XX/697XX Part 4 The Advanced Encryption Standard (AES) Israel Koren ECE597/697 Koren Part.4.1

More information

On the Computational Overhead of MPC with Dishonest Majority

On the Computational Overhead of MPC with Dishonest Majority On the Computational Overhead of MPC with Dishonest Majority Jesper Buus Nielsen 1 and Samuel Ranellucci 2,3 jbn@cs.au.dk, samuel@umd.edu 1 Department of Computer Science, Aarhus University, Aarhus, Denmark

More information

Online Learning. Lorenzo Rosasco MIT, L. Rosasco Online Learning

Online Learning. Lorenzo Rosasco MIT, L. Rosasco Online Learning Online Learning Lorenzo Rosasco MIT, 9.520 About this class Goal To introduce theory and algorithms for online learning. Plan Different views on online learning From batch to online least squares Other

More information

Chapter 18 out of 37 from Discrete Mathematics for Neophytes: Number Theory, Probability, Algorithms, and Other Stuff by J. M. Cargal.

Chapter 18 out of 37 from Discrete Mathematics for Neophytes: Number Theory, Probability, Algorithms, and Other Stuff by J. M. Cargal. Chapter 8 out of 7 from Discrete Mathematics for Neophytes: Number Theory, Probability, Algorithms, and Other Stuff by J. M. Cargal 8 Matrices Definitions and Basic Operations Matrix algebra is also known

More information

Truth, Lies, and Random Bits

Truth, Lies, and Random Bits Truth, Lies, and Random Bits Jared Saia University of New Mexico, Albuquerque, NM, USA January, 2015 The Searchers, 1956 Westerns Wide-open spaces Epic struggles Borrow from many sources Westerns

More information

Secure Multiparty Computation with Minimal Interaction

Secure Multiparty Computation with Minimal Interaction Secure Multiparty Computation with Minimal Interaction Yuval Ishai 1, Eyal Kushilevitz 2, and Anat Paskin 2 1 Computer Science Department, Technion and UCLA (yuvali@cs.technion.ac.il) 2 Computer Science

More information

Parallelizing The Matrix Multiplication. 6/10/2013 LONI Parallel Programming Workshop

Parallelizing The Matrix Multiplication. 6/10/2013 LONI Parallel Programming Workshop Parallelizing The Matrix Multiplication 6/10/2013 LONI Parallel Programming Workshop 2013 1 Serial version 6/10/2013 LONI Parallel Programming Workshop 2013 2 X = A md x B dn = C mn d c i,j = a i,k b k,j

More information

Performance improvements to peer-to-peer file transfers using network coding

Performance improvements to peer-to-peer file transfers using network coding Performance improvements to peer-to-peer file transfers using network coding Aaron Kelley April 29, 2009 Mentor: Dr. David Sturgill Outline Introduction Network Coding Background Contributions Precomputation

More information

Chordal deletion is fixed-parameter tractable

Chordal deletion is fixed-parameter tractable Chordal deletion is fixed-parameter tractable Dániel Marx Institut für Informatik, Humboldt-Universität zu Berlin, Unter den Linden 6, 10099 Berlin, Germany. dmarx@informatik.hu-berlin.de Abstract. It

More information

x = 12 x = 12 1x = 16

x = 12 x = 12 1x = 16 2.2 - The Inverse of a Matrix We've seen how to add matrices, multiply them by scalars, subtract them, and multiply one matrix by another. The question naturally arises: Can we divide one matrix by another?

More information

Computer-aided proofs for multiparty computation with active security

Computer-aided proofs for multiparty computation with active security Computer-aided proofs for multiparty computation with active security Helene Haagh Aleksandr Karbyshev Sabine Oechsner Bas Spitters Pierre-Yves Strub Aarhus University, DK École Polytechnique, F Abstract

More information

Computer Vision I - Algorithms and Applications: Multi-View 3D reconstruction

Computer Vision I - Algorithms and Applications: Multi-View 3D reconstruction Computer Vision I - Algorithms and Applications: Multi-View 3D reconstruction Carsten Rother 09/12/2013 Computer Vision I: Multi-View 3D reconstruction Roadmap this lecture Computer Vision I: Multi-View

More information

Lecture 6: Arithmetic and Threshold Circuits

Lecture 6: Arithmetic and Threshold Circuits IAS/PCMI Summer Session 2000 Clay Mathematics Undergraduate Program Advanced Course on Computational Complexity Lecture 6: Arithmetic and Threshold Circuits David Mix Barrington and Alexis Maciel July

More information

An End-to-End System for Large Scale P2P MPC-as-a-Service and Low-Bandwidth MPC for Weak Participants

An End-to-End System for Large Scale P2P MPC-as-a-Service and Low-Bandwidth MPC for Weak Participants An End-to-End System for Large Scale P2P MPC-as-a-Service and Low-Bandwidth MPC for Weak Participants Assi Barak Martin Hirt Lior Koskas Yehuda Lindell August 20, 2018 Abstract Protocols for secure multiparty

More information

Integer Programming Theory

Integer Programming Theory Integer Programming Theory Laura Galli October 24, 2016 In the following we assume all functions are linear, hence we often drop the term linear. In discrete optimization, we seek to find a solution x

More information

Convexity Theory and Gradient Methods

Convexity Theory and Gradient Methods Convexity Theory and Gradient Methods Angelia Nedić angelia@illinois.edu ISE Department and Coordinated Science Laboratory University of Illinois at Urbana-Champaign Outline Convex Functions Optimality

More information

Multi Party Distributed Private Matching, Set Disjointness and Cardinality Set Intersection with Information Theoretic Security

Multi Party Distributed Private Matching, Set Disjointness and Cardinality Set Intersection with Information Theoretic Security Multi Party Distributed Private Matching, Set Disjointness and Cardinality Set Intersection with Information Theoretic Security Sathya Narayanan G 1, Aishwarya T 1, Anugrah Agrawal 2, Arpita Patra 3, Ashish

More information

Computing the Minimum Hamming Distance for Z 2 Z 4 -Linear Codes

Computing the Minimum Hamming Distance for Z 2 Z 4 -Linear Codes Computing the Minimum Hamming Distance for Z 2 Z 4 -Linear Codes Marta Pujol and Mercè Villanueva Combinatorics, Coding and Security Group (CCSG) Universitat Autònoma de Barcelona (UAB) VIII JMDA, Almería

More information

Mathematical and Algorithmic Foundations Linear Programming and Matchings

Mathematical and Algorithmic Foundations Linear Programming and Matchings Adavnced Algorithms Lectures Mathematical and Algorithmic Foundations Linear Programming and Matchings Paul G. Spirakis Department of Computer Science University of Patras and Liverpool Paul G. Spirakis

More information

Point-Set Topology 1. TOPOLOGICAL SPACES AND CONTINUOUS FUNCTIONS

Point-Set Topology 1. TOPOLOGICAL SPACES AND CONTINUOUS FUNCTIONS Point-Set Topology 1. TOPOLOGICAL SPACES AND CONTINUOUS FUNCTIONS Definition 1.1. Let X be a set and T a subset of the power set P(X) of X. Then T is a topology on X if and only if all of the following

More information

Unlabeled equivalence for matroids representable over finite fields

Unlabeled equivalence for matroids representable over finite fields Unlabeled equivalence for matroids representable over finite fields November 16, 2012 S. R. Kingan Department of Mathematics Brooklyn College, City University of New York 2900 Bedford Avenue Brooklyn,

More information

The extendability of matchings in strongly regular graphs

The extendability of matchings in strongly regular graphs The extendability of matchings in strongly regular graphs Sebastian Cioabă Department of Mathematical Sciences University of Delaware Villanova, June 5, 2014 Introduction Matching A set of edges M of a

More information

A graph is finite if its vertex set and edge set are finite. We call a graph with just one vertex trivial and all other graphs nontrivial.

A graph is finite if its vertex set and edge set are finite. We call a graph with just one vertex trivial and all other graphs nontrivial. 2301-670 Graph theory 1.1 What is a graph? 1 st semester 2550 1 1.1. What is a graph? 1.1.2. Definition. A graph G is a triple (V(G), E(G), ψ G ) consisting of V(G) of vertices, a set E(G), disjoint from

More information

Semistandard Young Tableaux Polytopes. Sara Solhjem Joint work with Jessica Striker. April 9, 2017

Semistandard Young Tableaux Polytopes. Sara Solhjem Joint work with Jessica Striker. April 9, 2017 Semistandard Young Tableaux Polytopes Sara Solhjem Joint work with Jessica Striker North Dakota State University Graduate Student Combinatorics Conference 217 April 9, 217 Sara Solhjem (NDSU) Semistandard

More information

Convex Algebraic Geometry

Convex Algebraic Geometry , North Carolina State University What is convex algebraic geometry? Convex algebraic geometry is the study of convex semialgebraic objects, especially those arising in optimization and statistics. What

More information

CS473-Algorithms I. Lecture 10. Dynamic Programming. Cevdet Aykanat - Bilkent University Computer Engineering Department

CS473-Algorithms I. Lecture 10. Dynamic Programming. Cevdet Aykanat - Bilkent University Computer Engineering Department CS473-Algorithms I Lecture 1 Dynamic Programming 1 Introduction An algorithm design paradigm like divide-and-conquer Programming : A tabular method (not writing computer code) Divide-and-Conquer (DAC):

More information

Dubna 2018: lines on cubic surfaces

Dubna 2018: lines on cubic surfaces Dubna 2018: lines on cubic surfaces Ivan Cheltsov 20th July 2018 Lecture 1: projective plane Complex plane Definition A line in C 2 is a subset that is given by ax + by + c = 0 for some complex numbers

More information

1.3. Conditional expressions To express case distinctions like

1.3. Conditional expressions To express case distinctions like Introduction Much of the theory developed in the underlying course Logic II can be implemented in a proof assistant. In the present setting this is interesting, since we can then machine extract from a

More information

Secure Multi-Party Computation of Probabilistic Threat Propagation

Secure Multi-Party Computation of Probabilistic Threat Propagation Secure Multi-Party Computation of Probabilistic Threat Propagation Emily Shen Nabil Schear, Ellen Vitercik, Arkady Yerukhimovich Graph Exploitation Symposium 216 DISTRIBUTION STATEMENT A. Approved for

More information

Yuval Ishai Technion

Yuval Ishai Technion Winter School on Bar-Ilan University, Israel 30/1/2011-1/2/2011 Bar-Ilan University Yuval Ishai Technion 1 Zero-knowledge proofs for NP [GMR85,GMW86] Bar-Ilan University Computational MPC with no honest

More information

Lecture 9: (Semi-)bandits and experts with linear costs (part I)

Lecture 9: (Semi-)bandits and experts with linear costs (part I) CMSC 858G: Bandits, Experts and Games 11/03/16 Lecture 9: (Semi-)bandits and experts with linear costs (part I) Instructor: Alex Slivkins Scribed by: Amr Sharaf In this lecture, we will study bandit problems

More information

Construction of a transitive orientation using B-stable subgraphs

Construction of a transitive orientation using B-stable subgraphs Computer Science Journal of Moldova, vol.23, no.1(67), 2015 Construction of a transitive orientation using B-stable subgraphs Nicolae Grigoriu Abstract A special method for construction of transitive orientations

More information

Inverse and Implicit functions

Inverse and Implicit functions CHAPTER 3 Inverse and Implicit functions. Inverse Functions and Coordinate Changes Let U R d be a domain. Theorem. (Inverse function theorem). If ϕ : U R d is differentiable at a and Dϕ a is invertible,

More information

Lecture 17: Continuous Functions

Lecture 17: Continuous Functions Lecture 17: Continuous Functions 1 Continuous Functions Let (X, T X ) and (Y, T Y ) be topological spaces. Definition 1.1 (Continuous Function). A function f : X Y is said to be continuous if the inverse

More information

Limitations of Algorithmic Solvability In this Chapter we investigate the power of algorithms to solve problems Some can be solved algorithmically and

Limitations of Algorithmic Solvability In this Chapter we investigate the power of algorithms to solve problems Some can be solved algorithmically and Computer Language Theory Chapter 4: Decidability 1 Limitations of Algorithmic Solvability In this Chapter we investigate the power of algorithms to solve problems Some can be solved algorithmically and

More information

Algorithmic Semi-algebraic Geometry and its applications. Saugata Basu School of Mathematics & College of Computing Georgia Institute of Technology.

Algorithmic Semi-algebraic Geometry and its applications. Saugata Basu School of Mathematics & College of Computing Georgia Institute of Technology. 1 Algorithmic Semi-algebraic Geometry and its applications Saugata Basu School of Mathematics & College of Computing Georgia Institute of Technology. 2 Introduction: Three problems 1. Plan the motion of

More information

Structured System Theory

Structured System Theory Appendix C Structured System Theory Linear systems are often studied from an algebraic perspective, based on the rank of certain matrices. While such tests are easy to derive from the mathematical model,

More information

Core Mathematics 1 Indices & Surds

Core Mathematics 1 Indices & Surds Regent College Maths Department Core Mathematics Indices & Surds Indices September 0 C Note Laws of indices for all rational exponents. The equivalence of We should already know from GCSE, the three Laws

More information

The Ordered Covering Problem

The Ordered Covering Problem The Ordered Covering Problem Uriel Feige Yael Hitron November 8, 2016 Abstract We introduce the Ordered Covering (OC) problem. The input is a finite set of n elements X, a color function c : X {0, 1} and

More information

Side-Channel Countermeasures for Hardware: is There a Light at the End of the Tunnel?

Side-Channel Countermeasures for Hardware: is There a Light at the End of the Tunnel? Side-Channel Countermeasures for Hardware: is There a Light at the End of the Tunnel? 11. Sep 2013 Ruhr University Bochum Outline Power Analysis Attack Masking Problems in hardware Possible approaches

More information

A Course in Machine Learning

A Course in Machine Learning A Course in Machine Learning Hal Daumé III 13 UNSUPERVISED LEARNING If you have access to labeled training data, you know what to do. This is the supervised setting, in which you have a teacher telling

More information

The Pre-Image Problem in Kernel Methods

The Pre-Image Problem in Kernel Methods The Pre-Image Problem in Kernel Methods James Kwok Ivor Tsang Department of Computer Science Hong Kong University of Science and Technology Hong Kong The Pre-Image Problem in Kernel Methods ICML-2003 1

More information

1/p-Secure Multiparty Computation without Honest Majority and the Best of Both Worlds

1/p-Secure Multiparty Computation without Honest Majority and the Best of Both Worlds 1/p-Secure Multiparty Computation without Honest Majority and the Best of Both Worlds Amos Beimel 1, Yehuda Lindell 2, Eran Omri 2, and Ilan Orlov 1 1 Dept. of Computer Science, Ben Gurion University 2

More information

Chain Matrix Multiplication

Chain Matrix Multiplication Chain Matrix Multiplication Version of November 5, 2014 Version of November 5, 2014 Chain Matrix Multiplication 1 / 27 Outline Outline Review of matrix multiplication. The chain matrix multiplication problem.

More information

Fixed Parameter Algorithms

Fixed Parameter Algorithms Fixed Parameter Algorithms Dániel Marx Tel Aviv University, Israel Open lectures for PhD students in computer science January 9, 2010, Warsaw, Poland Fixed Parameter Algorithms p.1/41 Parameterized complexity

More information

Exact Optimized-cost Repair in Multi-hop Distributed Storage Networks

Exact Optimized-cost Repair in Multi-hop Distributed Storage Networks Exact Optimized-cost Repair in Multi-hop Distributed Storage Networks Majid Gerami, Ming Xiao Communication Theory Lab, Royal Institute of Technology, KTH, Sweden, E-mail: {gerami, mingx@kthse arxiv:14012774v1

More information

LINEAR CODES WITH NON-UNIFORM ERROR CORRECTION CAPABILITY

LINEAR CODES WITH NON-UNIFORM ERROR CORRECTION CAPABILITY LINEAR CODES WITH NON-UNIFORM ERROR CORRECTION CAPABILITY By Margaret Ann Bernard The University of the West Indies and Bhu Dev Sharma Xavier University of Louisiana, New Orleans ABSTRACT This paper introduces

More information

Constant-Round Asynchronous Multi-Party Computation Based on One-Way Functions

Constant-Round Asynchronous Multi-Party Computation Based on One-Way Functions Constant-Round Asynchronous Multi-Party Computation Based on One-Way Functions Sandro Coretti 1, Juan Garay 2, Martin Hirt 3, and Vassilis Zikas 4 1 New York University, corettis@nyu.edu 2 Yahoo Research,

More information

Secure Multiparty Computation

Secure Multiparty Computation Secure Multiparty Computation Li Xiong CS573 Data Privacy and Security Outline Secure multiparty computation Problem and security definitions Basic cryptographic tools and general constructions Yao s Millionnare

More information

Lecture 9. Semidefinite programming is linear programming where variables are entries in a positive semidefinite matrix.

Lecture 9. Semidefinite programming is linear programming where variables are entries in a positive semidefinite matrix. CSE525: Randomized Algorithms and Probabilistic Analysis Lecture 9 Lecturer: Anna Karlin Scribe: Sonya Alexandrova and Keith Jia 1 Introduction to semidefinite programming Semidefinite programming is linear

More information

Chordal graphs MPRI

Chordal graphs MPRI Chordal graphs MPRI 2017 2018 Michel Habib habib@irif.fr http://www.irif.fr/~habib Sophie Germain, septembre 2017 Schedule Chordal graphs Representation of chordal graphs LBFS and chordal graphs More structural

More information

Enumeration of Tilings and Related Problems

Enumeration of Tilings and Related Problems Enumeration of Tilings and Related Problems Tri Lai Institute for Mathematics and its Applications Minneapolis, MN 55455 Discrete Mathematics Seminar University of British Columbia Vancouver February 2016

More information

On the Computational Complexity of Nash Equilibria for (0, 1) Bimatrix Games

On the Computational Complexity of Nash Equilibria for (0, 1) Bimatrix Games On the Computational Complexity of Nash Equilibria for (0, 1) Bimatrix Games Bruno Codenotti Daniel Štefankovič Abstract The computational complexity of finding a Nash equilibrium in a nonzero sum bimatrix

More information

Integration of SMT Solvers with ITPs There and Back Again

Integration of SMT Solvers with ITPs There and Back Again Integration of SMT Solvers with ITPs There and Back Again Sascha Böhme and University of Sheffield 7 May 2010 1 2 Features: SMT-LIB vs. Yices Translation Techniques Caveats 3 4 Motivation Motivation System

More information

Small Survey on Perfect Graphs

Small Survey on Perfect Graphs Small Survey on Perfect Graphs Michele Alberti ENS Lyon December 8, 2010 Abstract This is a small survey on the exciting world of Perfect Graphs. We will see when a graph is perfect and which are families

More information

A note on the number of edges guaranteeing a C 4 in Eulerian bipartite digraphs

A note on the number of edges guaranteeing a C 4 in Eulerian bipartite digraphs A note on the number of edges guaranteeing a C 4 in Eulerian bipartite digraphs Jian Shen Department of Mathematics Southwest Texas State University San Marcos, TX 78666 email: js48@swt.edu Raphael Yuster

More information

page 1 Introduction to Cryptography Benny Pinkas Lecture 3 November 18, 2008 Introduction to Cryptography, Benny Pinkas

page 1 Introduction to Cryptography Benny Pinkas Lecture 3 November 18, 2008 Introduction to Cryptography, Benny Pinkas Introduction to Cryptography Lecture 3 Benny Pinkas page 1 1 Pseudo-random generator Pseudo-random generator seed output s G G(s) (random, s =n) Deterministic function of s, publicly known G(s) = 2n Distinguisher

More information

Asynchronous Verifiable Secret Sharing and Proactive Cryptosystems

Asynchronous Verifiable Secret Sharing and Proactive Cryptosystems An extended abstract of this paper appears in Proc. 9th ACM Conference on Computer and Communications Security (CCS-9), Washington DC, USA, 2002. Asynchronous Verifiable Secret Sharing and Proactive Cryptosystems

More information

14 Dynamic. Matrix-chain multiplication. P.D. Dr. Alexander Souza. Winter term 11/12

14 Dynamic. Matrix-chain multiplication. P.D. Dr. Alexander Souza. Winter term 11/12 Algorithms Theory 14 Dynamic Programming (2) Matrix-chain multiplication P.D. Dr. Alexander Souza Optimal substructure Dynamic programming is typically applied to optimization problems. An optimal solution

More information

Discrete Mathematics and Probability Theory Spring 2017 Rao Midterm 2

Discrete Mathematics and Probability Theory Spring 2017 Rao Midterm 2 CS 70 Discrete Mathematics and Probability Theory Spring 2017 Rao Midterm 2 PRINT Your Name:, (last) SIGN Your Name: (first) PRINT Your Student ID: WRITE THE NAME OF your exam room: Name of the person

More information

Predicting Tumour Location by Modelling the Deformation of the Breast using Nonlinear Elasticity

Predicting Tumour Location by Modelling the Deformation of the Breast using Nonlinear Elasticity Predicting Tumour Location by Modelling the Deformation of the Breast using Nonlinear Elasticity November 8th, 2006 Outline Motivation Motivation Motivation for Modelling Breast Deformation Mesh Generation

More information

AH Matrices.notebook November 28, 2016

AH Matrices.notebook November 28, 2016 Matrices Numbers are put into arrays to help with multiplication, division etc. A Matrix (matrices pl.) is a rectangular array of numbers arranged in rows and columns. Matrices If there are m rows and

More information

Counting the number of spanning tree. Pied Piper Department of Computer Science and Engineering Shanghai Jiao Tong University

Counting the number of spanning tree. Pied Piper Department of Computer Science and Engineering Shanghai Jiao Tong University Counting the number of spanning tree Pied Piper Department of Computer Science and Engineering Shanghai Jiao Tong University 目录 Contents 1 Complete Graph 2 Proof of the Lemma 3 Arbitrary Graph 4 Proof

More information

Lower and Upper Bound Theory. Prof:Dr. Adnan YAZICI Dept. of Computer Engineering Middle East Technical Univ. Ankara - TURKEY

Lower and Upper Bound Theory. Prof:Dr. Adnan YAZICI Dept. of Computer Engineering Middle East Technical Univ. Ankara - TURKEY Lower and Upper Bound Theory Prof:Dr. Adnan YAZICI Dept. of Computer Engineering Middle East Technical Univ. Ankara - TURKEY 1 Lower and Upper Bound Theory How fast can we sort? Lower-Bound Theory can

More information

Partha Sarathi Manal

Partha Sarathi Manal MA 515: Introduction to Algorithms & MA353 : Design and Analysis of Algorithms [3-0-0-6] Lecture 29 http://www.iitg.ernet.in/psm/indexing_ma353/y09/index.html Partha Sarathi Manal psm@iitg.ernet.in Dept.

More information

On the construction of nested orthogonal arrays

On the construction of nested orthogonal arrays isid/ms/2010/06 September 10, 2010 http://wwwisidacin/ statmath/eprints On the construction of nested orthogonal arrays Aloke Dey Indian Statistical Institute, Delhi Centre 7, SJSS Marg, New Delhi 110

More information

Fairness Versus Guaranteed Output Delivery in Secure Multiparty Computation

Fairness Versus Guaranteed Output Delivery in Secure Multiparty Computation Fairness Versus Guaranteed Output Delivery in Secure Multiparty Computation Ran Cohen and Yehuda Lindell Department of Computer Science, Bar-Ilan University, Israel cohenrb@cs.biu.ac.il, lindell@biu.ac.il

More information

Approximation Algorithms

Approximation Algorithms Approximation Algorithms Group Members: 1. Geng Xue (A0095628R) 2. Cai Jingli (A0095623B) 3. Xing Zhe (A0095644W) 4. Zhu Xiaolu (A0109657W) 5. Wang Zixiao (A0095670X) 6. Jiao Qing (A0095637R) 7. Zhang

More information

Using Error Detection Codes to detect fault attacks on Symmetric Key Ciphers

Using Error Detection Codes to detect fault attacks on Symmetric Key Ciphers Using Error Detection Codes to detect fault attacks on Symmetric Key Ciphers Israel Koren Department of Electrical and Computer Engineering Univ. of Massachusetts, Amherst, MA collaborating with Luca Breveglieri,

More information

Lecture 14: Linear Programming II

Lecture 14: Linear Programming II A Theorist s Toolkit (CMU 18-859T, Fall 013) Lecture 14: Linear Programming II October 3, 013 Lecturer: Ryan O Donnell Scribe: Stylianos Despotakis 1 Introduction At a big conference in Wisconsin in 1948

More information

Summary of Raptor Codes

Summary of Raptor Codes Summary of Raptor Codes Tracey Ho October 29, 2003 1 Introduction This summary gives an overview of Raptor Codes, the latest class of codes proposed for reliable multicast in the Digital Fountain model.

More information

Math 778S Spectral Graph Theory Handout #2: Basic graph theory

Math 778S Spectral Graph Theory Handout #2: Basic graph theory Math 778S Spectral Graph Theory Handout #: Basic graph theory Graph theory was founded by the great Swiss mathematician Leonhard Euler (1707-178) after he solved the Königsberg Bridge problem: Is it possible

More information

Orientation of manifolds - definition*

Orientation of manifolds - definition* Bulletin of the Manifold Atlas - definition (2013) Orientation of manifolds - definition* MATTHIAS KRECK 1. Zero dimensional manifolds For zero dimensional manifolds an orientation is a map from the manifold

More information

Secure Multi-Party Computation

Secure Multi-Party Computation Secure Multi-Party Computation A Short Tutorial By no means a survey! Manoj Prabhakaran :: University of Illinois at Urbana-Champaign Secure Multi-Party Computation A Short Tutorial Part I Must We Trust?

More information

Computation with No Memory, and Rearrangeable Multicast Networks

Computation with No Memory, and Rearrangeable Multicast Networks Discrete Mathematics and Theoretical Computer Science DMTCS vol. 16:1, 2014, 121 142 Computation with No Memory, and Rearrangeable Multicast Networks Serge Burckel 1 Emeric Gioan 2 Emmanuel Thomé 3 1 ERMIT,

More information

A Game-Theoretic Framework for Congestion Control in General Topology Networks

A Game-Theoretic Framework for Congestion Control in General Topology Networks A Game-Theoretic Framework for Congestion Control in General Topology SYS793 Presentation! By:! Computer Science Department! University of Virginia 1 Outline 2 1 Problem and Motivation! Congestion Control

More information

Trail Making Game. Hyun Sung Jun Jaehoon Kim Sang-il Oum Department of Mathematical Sciences KAIST, Daejeon, , Republic of Korea.

Trail Making Game. Hyun Sung Jun Jaehoon Kim Sang-il Oum Department of Mathematical Sciences KAIST, Daejeon, , Republic of Korea. Trail Making Game Hyun Sung Jun Jaehoon Kim Sang-il Oum Department of Mathematical Sciences KAIST, Daejeon, 305-701, Republic of Korea. May 7, 2009 Abstract Trail Making is a game played on a graph with

More information

Dynamic Programming II

Dynamic Programming II June 9, 214 DP: Longest common subsequence biologists often need to find out how similar are 2 DNA sequences DNA sequences are strings of bases: A, C, T and G how to define similarity? DP: Longest common

More information

How to securely perform computations on secret-shared data

How to securely perform computations on secret-shared data U N I V E R S I T Y OF T A R T U Faculty of Mathematics and Computer Science Institute of Computer Science Dan Bogdanov How to securely perform computations on secret-shared data Master s Thesis Supervisor:

More information

x n x n stepnumber k order r error constant C r+1 1/2 5/12 3/8 251/720 abs. stab. interval (α,0) /11-3/10

x n x n stepnumber k order r error constant C r+1 1/2 5/12 3/8 251/720 abs. stab. interval (α,0) /11-3/10 MATH 573 LECTURE NOTES 77 13.8. Predictor-corrector methods. We consider the Adams methods, obtained from the formula xn+1 xn+1 y(x n+1 y(x n ) = y (x)dx = f(x,y(x))dx x n x n by replacing f by an interpolating

More information