Linear Programming Relaxations for Goldreich's Generators over Non-Binary Alphabets

نویسندگان

  • Ryuhei Mori
  • Takeshi Koshiba
  • Osamu Watanabe
  • Masaki Yamamoto
چکیده

Goldreich suggested candidates of one-way functions and pseudorandom generators included in NC. It is known that randomly generated Goldreich’s generator using (r−1)-wise independent predicates with n input variables and m = Cn output variables is not pseudorandom generator with high probability for sufficiently large constant C. Most of the previous works assume that the alphabet is binary and use techniques available only for the binary alphabet. In this paper, we deal with non-binary generalization of Goldreich’s generator and derives the tight threshold for linear programming relaxation attack using local marginal polytope for randomly generated Goldreich’s generators. We assume that u(n) ∈ ω(1) ∩ o(n) input variables are known. In that case, we show that when r ≥ 3, there is an exact threshold μc(k, r) := ( k r ) −1 (r−2) r(r−1)r−1 such that for m = μ n r−1 u(n)r−2 , the LP relaxation can determine linearly many input variables of Goldreich’s generator if μ > μc(k, r), and that the LP relaxation cannot determine 1 r−2 u(n) input variables of Goldreich’s generator if μ < μc(k, r). This paper uses characterization of LP solutions by combinatorial structures called stopping sets on a bipartite graph, which is related to a simple algorithm called peeling algorithm.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Second-Order Cone Relaxations for Binary Quadratic Polynomial Programs

Several types of relaxations for binary quadratic polynomial programs can be obtained using linear, secondorder cone, or semidefinite techniques. In this paper, we propose a general framework to construct conic relaxations for binary quadratic polynomial programs based on polynomial programming. Using our framework, we re-derive previous relaxation schemes and provide new ones. In particular, w...

متن کامل

Some Results on Reversible Gate Classes Over Non-Binary Alphabets

We present a collection of results concerning the structure of reversible gate classes over non-binary alphabets, including (1) a reversible gate class over non-binary alphabets that is not finitely generated (2) an explicit set of generators for the class of all gates, the class of all conservative gates, and a class of generalizations of the two (3) an embedding of the poset of reversible gat...

متن کامل

Positive polynomials on unbounded equality-constrained domains

Certificates of non-negativity are fundamental tools in optimization. A “certificate” is generally understood as an expression that makes the non-negativity of the function in question evident. Some classical certificates of non-negativity are Farkas Lemma and the S-lemma. The lift-and-project procedure can be seen as a certificate of non-negativity for affine functions over the union of two po...

متن کامل

An exact solution method for binary equilibrium problems with compensation and the power market uplift problem

We propose a novel method to find Nash equilibria in games with binary decision variables by including compensation payments and incentive-compatibility constraints from non-cooperative game theory directly into an optimization framework in lieu of using first order conditions of a linearization, or relaxation of integrality conditions. The reformulation offers a new approach to obtain and inte...

متن کامل

On the Capacity of Wireless 1-Hop Intersession Network Coding — A Broadcast Packet Erasure Channel Approach

Motivated by practical wireless network protocols, this paper answers the following questions: Exactly (or at most) how much throughput improvement one can expect from intersession network coding (INC) in a 1-hop neighborhood over non-coding solutions; and how to achieve (or approach) the capacity. Focusing on a two-stage setting, this work first provides a capacity outer bound for any number o...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1406.0373  شماره 

صفحات  -

تاریخ انتشار 2014