Threshold circuit lower bounds on cryptographic functions
نویسندگان
چکیده
In this work, we are interested in non-trivial upper bounds on the spectral norm of binary matrices M from {−1, 1}N×N . It is known that the distributed Boolean function represented by M is hard to compute in various restricted models of computation if the spectral norm is bounded from above by N1−ε, where ε > 0 denotes a fixed constant. For instance, the size of a two-layer threshold circuit (with polynomially bounded weights for the gates in the hidden layer, but unbounded weights for the output gate) grows exponentially fast with n := log N . We prove sufficient conditions on M that imply small spectral norms (and thus high computational complexity in restricted models). Our general results cover specific cases, where the matrix M represents a bit (the least significant bit or other fixed bits) of fundamental functions. Functions like the discrete multiplication and division, as well as cryptographic functions such as the Diffie–Hellman function (IEEE Trans. Inform. Theory 22(6) (1976) 644–654) and the decryption functions of the Pointcheval (Advances in Cryptology—Proceedings of EUROCRYPT ’99, Lecture Notes in Computer Science, Springer, Berlin, 1999, pp. 239–254) and the El Gamal (Advances in Cryptology—CRYPTO ’84, 1984, pp. 10–18) cryptosystems can be addressed by our technique. In order to obtain our results, we make a detour on exponential sums and on spectral norms of matrices with complex entries. This method might be considered interesting in its own right. © 2005 Elsevier Inc. All rights reserved.
منابع مشابه
Lower bounds on threshold and related circuits via communication complexity
Communication-complexity definitions and arguments are used to derive linear (Q(n)) and almost-linear (Q(n/ log n)) lower bounds on the size of circuits implementing certain functions. The techniques utilize only basic features of the gates used and of the functions implemented hence apply to a large class of gates (including unbounded fan-in AND/OR, threshold, symmetric, and generalized symmet...
متن کاملDetecting Patterns Can Be Hard: Circuit Lower Bounds for the Pattern Matching Problem
Detecting patterns in strings and images is a fundamental and widely studied problem. Motivated by the proliferation of specialized circuits in pattern recognition tasks, we study the circuit complexity of pattern matching under two popular choices of gates: De Morgan and threshold gates. For strings of length n and patterns of length log n k ≤ n− o(n), we prove super polynomial lower bounds fo...
متن کاملDetecting Patterns Can Be Hard: Circuit Lower Bounds for the String Matching Problem
Detecting patterns in strings and images is a fundamental and well studied problem. We study the circuit complexity of the string matching problem under two popular choices of gates: De Morgan and threshold gates. For strings of length n and patterns of length log n k ≤ n− o(n), we prove super polynomial lower bounds for De Morgan circuits of depth 2, and nearly linear lower bounds for depth 2 ...
متن کاملOn the Circuit Complexity of Neural Networks
K. Y. Sill Information Systems Laboratory Stanford University Stanford, CA, 94305 T. Kailath Informat.ion Systems Laboratory Stanford U ni versity Stanford, CA, 94305 '~le introduce a geometric approach for investigating the power of threshold circuits. Viewing n-variable boolean functions as vectors in 'R'2", we invoke tools from linear algebra and linear programming to derive new results on t...
متن کاملAverage-Case Lower Bounds and Satisfiability Algorithms for Small Threshold Circuits
We show average-case lower bounds for explicit Boolean functions against bounded-depth thresh-old circuits with a superlinear number of wires. We show that for each integer d > 1, there isεd > 0 such that Parity has correlation at most 1/nΩ(1) with depth-d threshold circuits whichhave at most n1+εd wires, and the Generalized Andreev Function has correlation at most 1/2nwith ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- J. Comput. Syst. Sci.
دوره 71 شماره
صفحات -
تاریخ انتشار 2005