Non Homomorphic Reductions of Data Structures
نویسندگان
چکیده
In this paper we study diierent kinds of reductions of data types. By reduction we mean applying the higher order function fold to a data structure. An appropriate fold function can be deened for any recursive data type. These reductions have been presented as homomorphisms by several authors 2, 6]. Although many useful functions on data structures can be programmed as instances of fold, there are some that cannot. This is due to the fact that they are not mathematical homomorphisms. We show some examples of these functions. Then, we introduce two generalizations of fold (one for lists and the other for binary trees) in terms of which many non homomorphic mappings can be deened. Some examples are presented. A second problem addressed in the paper is the relationship between the deenitions of some particular reductions in diierent data types. We show that the deenition of a particular reduction, e.g. to insert an element in a data structure, in terms of fold (either the generalized version or the usual one), looks the same for diierent data structures. In many cases, one can be obtained by transforming the other. We deene a hierarchy of data types according to the amount of \structural" information they possess. It is shown how some reductions of a data structure A with more structural information than another one B can be obtained by composing the homomorphism from A to B that \forgets" structural information, with the homomorphism reducing B.
منابع مشابه
On non-abelian homomorphic public-key cryptosystems
An important problem of modern cryptography concerns secret public-key computations in algebraic structures. We construct homomorphic cryptosystems being (secret) epimorphisms f : G → H, where G,H are (publically known) groups and H is finite. A letter of a message to be encrypted is an element h ∈ H, while its encryption g ∈ G is such that f(g) = h. A homomorphic cryptosystem allows one to per...
متن کاملNon-Interactive CryptoComputing For NC1
The area of “computing with encrypted data” has been studied by numerous authors in the past twenty years since it is fundamental to understanding properties of encryption and it has many practical applications. The related fundamental area of “secure function evaluation” has been studied since the mid 80’s. In its basic two-party case, two parties (Alice and Bob) evaluate a known circuit over ...
متن کاملMATHEMATICAL ENGINEERING TECHNICAL REPORTS A Practicable Framework for Tree Reductions under Distributed Memory Environments
Besides intensive research toward matrices or one dimensional arrays, another important data structure, namely trees, are calling for efficient parallel treatments. Parallel tree contractions are fundamental to realize efficient computation over the inherently imbalanced structures. However, we sometimes fail to practically benefit from the techniques under current computer architectures. This ...
متن کاملAdaptively Secure Fully Homomorphic Signatures Based on Lattices
In a homomorphic signature scheme, given the public key and a vector of signaturesσ := (σ1, . . . , σl) over l messages μ := (μ1, . . . , μl), there exists an efficient algorithm to produce a signature σ′ for μ = f(μ). Given the tuple (σ′, μ, f), anyone can then publicly verify the validity of the signature σ′. Inspired by the recent (selectively secure) key-homomorphic functional encryption fo...
متن کاملLimits of Provable Security for Homomorphic Encryption
We show that public-key bit encryption schemes which support weak (i.e., compact) homomorphic evaluation of any sufficiently “sensitive” collection of functions cannot be proved message indistinguishable beyond AM ∩ coAM via general (adaptive) reductions, and beyond statistical zero-knowledge via reductions of constant query complexity. Examples of sensitive collections include parities, majori...
متن کامل