Algorithms and complexity
Tuesday December 19, 2023, 11AM, Salle 3052
Arthur Braida (Atos) Tight Lieb-Robinson Bound for approximation ratio in Quantum Annealing
Algorithms and complexity
Wednesday December 13, 2023, 4PM, Salle 3052
Ainesh Bakshi (MIT) Learning quantum Hamiltonians at any temperature in polynomial time
Based on joint work with Allen Liu, Ankur Moitra and Ewin Tang.
online talk
Algorithms and complexity
Tuesday December 12, 2023, 11AM, Salle 3052
Deeksha Adil (ETH Zurich) Dynamically Computing Approximate Eigenvectors
This is based on a very recent work with Thatchaphol Sararunak.
Algorithms and complexity
Tuesday December 5, 2023, 11AM, Salle 3052
Marc-Olivier Renou (INRIA Saclay) Causal and No Signalling-LOCAL models as the largest generalization of synchronous quantum distributed computing
Finding lower bounds on the maximal speed at which QIT can solve a task is tricky. To circumvent this difficulty, several proofs based on the No-Signalling (NS) Principle (which states that an event A can influence an event B only if some signal can physically be sent from A to B) were proposed and a new NS-LOCAL model of distributed computing was proposed.
I’ll re-interpret this NS-LOCAL model based on the theoretical physics formalism of light cones in circuits. I will justify that the NS-LOCAL model is the “largest reasonable model with a pre-shared resource between the nodes”. Then, I’ll introduce a weaker Causal-LOCAL model, the “largest reasonable model without pre-shared resource between the nodes”.
All this will be illustrated with easy to understand examples. I was recently told by Vaclav Rozhon: We computer scientists are very scared of the word “quantum”. Note that I’ll almost not talk about quantum theory, hence no need to be scared.
Algorithms and complexity
Wednesday November 22, 2023, 11AM, Salle 4052 (PCQC)
Sébastien Designolle (Zuse Institut Berlin) Frank-Wolfe algorithms for Bell nonlocality
Algorithms and complexity
Wednesday November 22, 2023, 3PM, Salle 3052
Sourav Chakraborty (ISI Kolkata) Distinct Elements in Streams and the Klee's Measure Problem
“Sourav Chakraborty, N. V. Vinodchandran, and Kuldeep S. Meel have recently proposed an interesting algorithm for the following problem: A stream of elements (a1, a2,…,am) is input, one at a time, and we want to know how many of them are distinct. In other words, if A = {a1, a2,…,am} is the set of elements in the stream, with multiplicities ignored, we want to know |A|, the size of that set. But we don’t have much memory; in fact, |A| is probably a lot larger than the number of elements that we can hold in memory at any one time. What is a good strategy for computing an unbiased estimate of |A|?
Their algorithm is not only interesting, it is extremely simple. Furthermore, it’s wonderfully suited to teaching students who are learning the basics of computer science. (Indeed, ever since I saw it, a few days ago, I’ve been unable to resist trying to explain the ideas to just about everybody I meet.) Therefore I’m pretty sure that something like this will eventually become a standard textbook topic. This note is an initial approximation to what I might write about it if I were preparing a textbook about data streams.”
This simple algorithm comes out of the first ever “efficient” streaming algorithm (from PODS 21) for the Klee's Measure problem, which was a big open problem in the world of streaming for many years.
This work is based on joint works with N. V. Vinodchandran, and Kuldeep S. Meel across multiple articles, notable the following: Estimating the Size of Union of Sets in Streaming Models. PODS 2021; Estimation of the Size of Union of Delphic Sets: Achieving Independence from Stream Size. PODS 2022; Distinct Elements in Streams: An Algorithm for the (Text) Book. ESA 2022.
Algorithms and complexity
Tuesday November 21, 2023, 11AM, Salle 3052
Jessica Bavaresco (University of Geneva) Quantum information processing from the approach of higher-order operations
In this talk, we will discuss the basics of the formalism of higher-order operations, and how their often simple mathematical characterization can be exploited to efficiently optimize over quantum strategies for different information-theoretic tasks. We will discuss its applications to channel discrimination, quantum circuit optimization, and its connection to indefinite causal order—a phenomenon that naturally emerges from the higher-order formalism. In particular, we will discuss potential advantages of indefinite causal order, and the cost, in terms of the necessary number of calls of an arbitrary quantum operation, of simulating it with standard quantum circuits.
Algorithms and complexity
Tuesday November 21, 2023, 3PM, Salle 4052 (PCQC)
Sourav Chakraborty (ISI Kolkata) Testing correctness of samplers using property testing: from theory to practice and back again
This problem can be framed as a problem in property testing. Property testing is a subject that deals with these challenges. It tries to design sub-linear algorithms for testing various properties of inputs. The key lies in the way the data is accessed by the algorithm.
One of the central problems in property testing and many other related subjects is testing if a distribution has a certain property - say whether a distribution on a finite set is uniform. The conventional way of accessing the distributions is by drawing samples according to the distributions. Unfortunately, in this setting the number of samples that are necessary for testing properties of distribution (for most natural properties) is polynomial in the size of support of the distribution. Thus when the support is relatively big the algorithms become impractical in real life applications.
We introduced a new way of accessing the distribution using ``conditional-sampling oracle“. This oracle can be used to design much faster algorithms for testing properties of distribution and thus makes the algorithm useful in practical scenarios.
We show that the conditional oracle can be implemented in many real life problems and we have been able to show the usefulness of this model and our algorithms in practical purposes and in other areas of research - like testing of probabilistic verification. This model also throws a number of interesting theoretical questions.
The talk will be based on the following works: On the Power of Conditional Samples in Distribution Testing with Eldar Fischer, Arie MAtsliah and Yonatan Goldhrish (SICOMP 2016); Property Testing of Joint Distributions using Conditional Samples with Rishiraj Bhattacharyya (ToCT 2018); On Testing of Uniform Samplers with Kuldeep Meel (AAAI2019); On Testing of Samplers with Kuldeep Meel and Yash Pote (NeuRIPS 2020); Designing Samplers is Easy: The Boon of Testers with Kuldeep Meel, Priyanka Golia and Mate Soos (FMCAD22); On Quantitative Testing of Samplers with Kuldeep Meel, Priyanka Golia and Mate Soos (CP22); Testing of Horn Samplers with Ansuman Banerjee, Shayak Chakraborty, Sayantan Sen, Uddalok Sarkar and Kuldeep Meel (AISTAT 2023); Tight Lower Bound on Equivalence Testing in Conditional Sampling Model with Diptarka Chakraborty and Gunjan Kumar (SODA 2024).
Algorithms and complexity
Wednesday November 15, 2023, 11AM, Salle 1007
Jinge Bao (CQT, Singapore) On the quantum time complexity of divide and conquer
Algorithms and complexity
Tuesday November 14, 2023, 11AM, Salle 3052
Aaron Sidford (Stanford University) Efficiently Minimizing the Maximum Loss
This talk will include joint work with Hilal Asi, Yair Carmon, Arun Jambulapati, and Yujia Jin including https://arxiv.org/abs/2105.01778 and https://arxiv.org/abs/2106.09481.
Algorithms and complexity
Wednesday November 8, 2023, 2PM, Salle 3052
Marco Túlio Quintino (LIP6) Simulating qubit correlations with classical communication
Then, we apply our methods to Bell scenarios, which extends the well-known Toner and Bacon protocol. In particular, two bits of communication are enough to simulate all quantum correlations associated to arbitrary local POVMs applied to any entangled two-qubit state. For the case of projective measurements, we provide explicit protocols that simulate perfectly the statistics of all local projective measurements on any pair of entangled qubits by communicating one classical trit. If the state is weakly entangled, already a single bit is sufficient and the expected amount of communication approaches zero in the limit where the degree of entanglement approaches zero.
This talk is mainly based on https://arxiv.org/abs/2207.02244 and will also discuss some results from https://arxiv.org/abs/2207.12457.
Algorithms and complexity
Tuesday November 7, 2023, 2PM, Salle 4052 (PCQC)
Casper Gyurik (Leiden University) On provable learning separations between classical and quantum learners
Algorithms and complexity
Tuesday October 24, 2023, 11AM, Salle 3052
Michele Orrù (LIP6) Elastic SNARKs for Diverse Environments
We construct an elastic SNARK for rank-1 constraint satisfiability (R1CS). In a time-efficient configuration, the prover uses a linear number of cryptographic operations and a linear amount of memory. In a space-efficient configuration, the prover uses streaming algorithms and a quasilinear number of cryptographic operations with a logarithmic amount of memory. A key component of our construction is an elastic probabilistic proof. Along the way, we also formulate a streaming framework for R1CS that we deem of independent interest.
We additionally contribute Gemini, a Rust implementation of our protocol. Our benchmarks show that Gemini, on a single machine, supports R1CS instances with tens of billions of constraints.
Joint work with Jonathan Bootle (IBM Zurich), Alessandro Chiesa (EPFL), and Yuncong Hu (Shanghai Jiao Tong University).
Article link: https://ia.cr/2022/420
Algorithms and complexity
Tuesday October 10, 2023, 11AM, Salle 3052
Asad Raza (LIP6) MA-hardness of Geometrically Local Stoquastic Hamiltonians
Algorithms and complexity
Tuesday October 3, 2023, 11AM, Salle 3052
Marcos Kiwi (Universidad de Chile) Label propagation on binomial random graphs
Initially, given a network, each vertex starts with a random label in the interval [0,1]. Then, in each round of the algorithm, every vertex switches its label to the majority label in its neighborhood (including its own label). At the first round, ties are broken towards smaller labels, while at each of the next rounds, ties are broken uniformly at random.
We investigate the performance of this algorithm on the binomial random graph G(n,p). Via a technically delicate analysis, we show that for np>n^(5/8+epsilon), the algorithm terminates with a single label a.a.s. Moreover, we show that if np = omega(n^(2/3)), a.a.s., this label is the smallest one, whereas if n^(5/8+epsilon) < np = o(n^(2/3)), the surviving label is, a.a.s., not the smallest one.
Joint work with Lyuben Lichev (Univ. Jean Monnet), Dieter Mitsche (Univ. Jean Monnet & Pontifícia Univ. Católica de Chile), and Pawel Pralat (Toronto Metropolitan Univ.).
Joint seminar with Distributed
Algorithms and complexity
Wednesday September 27, 2023, 11AM, Salle 3052
Oded Regev (NYU Courant) An Efficient Quantum Factoring Algorithm
No background in quantum computation will be assumed.
Based on the recent arXiv preprint: https://arxiv.org/abs/2308.06572
Algorithms and complexity
Wednesday September 13, 2023, 11AM, Salle 147 (Olympe de Gouges)
Sanjeev Khanna (University of Pennsylvania) Sublinear Algorithms for Hierarchical Clustering
Specifically, we will present sublinear algorithms for hierarchical clustering in the streaming model (space), in the query model (time), and in the MPC model (communication). At the core of our algorithmic results is a connection between hierarchical clustering and a suitably relaxed notion of cut sparsifiers of graphs that lends itself to efficient sublinear algorithms. We complement our algorithmic results by establishing nearly matching lower bounds that rule out algorithms with better performance guarantees in each of these models.
This is joint work with Arpit Agarwal, Huan Li, and Prathamesh Patil.
Algorithms and complexity
Tuesday September 5, 2023, 11AM, Salle 147 (Olympe de Gouges)
Felix Rohrbach (Technische Universität Darmstadt) Searching for ELFs in the Cryptographic Forest
One open question is to determine the minimal assumption needed to instantiate ELFs. While all constructions of ELFs depend on some form of exponentially-secure public-key primitive, it was conjectured that exponentially-secure secret-key primitives, such as one-way functions, hash functions or one-way product functions, might be sufficient to build ELFs.
In this talk I will present our result which answers this conjecture mostly negatively: We show that no primitive, which can be derived from a random oracle (which includes all secret-key primitives mentioned above), is enough to construct even moderately lossy functions in a black-box manner. However, we also show that (extremely) lossy functions themselves do not imply public-key cryptography, leaving open the option to build ELFs from some intermediate primitive between the classical categories of secret-key and public-key cryptography.
Algorithms and complexity
Wednesday July 12, 2023, 11AM, Salle 147 (Olympe de Gouges)
Anindya De (University of Pennsylvania) Testing Noisy Linear Equations for Sparsity
In this talk, we look at this question from the vantage point of property testing and study the decision variant of the following question – namely, what is the complexity of deciding if the unknown vector w is k-sparse (or at least say 0.01 far from k-sparse in \ell_2 distance). We show that the decision version of the problem can be solved with samples which are independent of n as long as the background distribution D is i.i.d. and the components are not Gaussian. We further show that weakening any of the conditions in this result necessarily makes the complexity scale as log n (thus showing our results are tight).
Algorithms and complexity
Tuesday July 11, 2023, 11AM, Salle 147 (Olympe de Gouges)
Naman Kumar (IRIF) Private Information Retrieval with Guaranteed Output
In this talk, I will describe the construction of the first 3-server PIR scheme where the client is guaranteed to obtain the output even in the presence of 1 malicious server. The protocol is concretely efficient and enjoys several attractive properties: 1) The client performs no cryptographic operations; 2) All cryptographic operations performed by the servers can be done in an offline pre-processing phase without the involvement of the client; 3) It is based on symmetric key cryptographic primitives. I will further talk about where this fits in the PIR landscape and its immediate applications.
Algorithms and complexity
Tuesday July 4, 2023, 11AM, Salle 165 (Olympe de Gouges)
Pawel Gawrychowski (University of Wrocław) How to exploit periodicity
Algorithms and complexity
Tuesday June 27, 2023, 11AM, Salle 147 (Olympe de Gouges)
Rajat Mittal (IIT Kanpur) Composition of randomized query for outer functions with full complexity
It is known that the measure composes if one assumes various properties of the outer function (or inner function). In this talk we extend the class of outer functions for which randomized query composes. Specifically, we show that when the randomized query complexity of outer function is its arity (full), composition holds true for any inner function. Such a result was known for approximate degree composition but not for randomized query complexity.
Algorithms and complexity
Tuesday June 20, 2023, 2PM, Salle 147 (Olympe de Gouges)
Samuel Bouaziz-Ermann (LIP6) Quantum Security of Subset Cover Problems
Recently, Yuan, Tibouchi and Abe (2022) introduced a variant to the subset cover problem, called restricted subset cover, and proposed a quantum algorithm for this problem. In this work, we prove that any quantum algorithm needs to make $\Omega\left((k+1)^{-\frac{2^{k}}{2^{k+1}-1}}\cdot N^{\frac{2^{k}-1}{2^{k+1}-1}}\right)$ queries to the underlying hash functions with codomain size $N$ to solve the restricted subset cover problem, which essentially matches the query complexity of the algorithm proposed by Yuan, Tibouchi and Abe.
We also analyze the security of the general $(r,k)$–subset cover problem, which is the underlying problem that implies the unforgeability of HORS under a $r$-chosen message attack (for $r \geq 1$). We prove that a generic quantum algorithm needs to make $\Omega\left(N^{k/5}\right)$ queries to the underlying hash functions to find a $(1,k)$–subset cover. We also propose a quantum algorithm that finds a $(r,k)$–subset cover making $O\left(N^{k/(2+2r)}\right)$ queries to the $k$ hash functions.
Algorithms and complexity
Monday June 12, 2023, 11AM, Salle 147 (Olympe de Gouges)
Themistoklis Melissourgos (University of Essex) Strong Inapproximability Results on Pizza-Sharing
Joint work with Argyrios Deligkas and John Fearnley.
Joint seminar with Verification
Algorithms and complexity
Tuesday June 6, 2023, 11AM, Salle 147 (Olympe de Gouges)
Galina Pass (QuSoft, University of Amsterdam) (No) Quantum space-time tradeoff for USTCON
Algorithms and complexity
Tuesday May 16, 2023, 11AM, Salle 146 (Olympe de Gouges)
Isabella Ziccardi (University of L'Aquila) Distributed Self-Stabilizing MIS with Few States and Weak Communication
Algorithms and complexity
Wednesday May 3, 2023, 11AM, Salle 147 (Olympe de Gouges)
Balthazar Bauer (IRIF) Beyond Uber: Instantiating Generic Groups via PGGs
We introduce a standard model definition called pseudo-generic group (PGG). The definition we obtain generalizes the Uber assumptions. Our other results focus on applications of PGGs. We first show that PGGs are a generalization of Uber, and then present a number of applications. Some of our implications use a new type of hash function, which we call linear dependency destroyers (LDDs) and which we use to relate PGGs to UCE hash functions (which are the analog of PGGs for hash functions).
Algorithms and complexity
Tuesday April 25, 2023, 11AM, Salle 3052
Marcel Dall'Agnol (University of Warwick) Complexity separations in quantum property testing
In the property-testing setting, which models super-efficient algorithms that only probe a minuscule portion of their input, decision/verification and quantum/classical separations exist: positive answers to the first two questions have been known for some time. However, the property-testing analogue of QMA (“quantum NP”) has not heretofore been systematically explored. Our paper fills this gap by initiating its study: we formalise super-efficient quantum verifiers and study their power and limitations. Among other results, we prove all of the possible separations among QMA, MA and BQP in the property-testing setting.
Joint work with Tom Gur, Subhayan Roy Moulik and Justin Thaler.
Algorithms and complexity
Tuesday April 18, 2023, 11AM, Salle 3052
Dung Bui (IRIF) Private Set Intersection (PSI) and its Applications
This joint work with Geoffroy Couteau was published at PKC 2023. Available here: ia.cr/2022/334
Algorithms and complexity
Tuesday April 18, 2023, 2PM, Salle 3052
Deeksha Adil (ETH Zurich) Fast Algorithms for Regression Problems
Algorithms and complexity
Wednesday April 12, 2023, 11AM, Salle 3052
Harold Nieuwboer (University of Amsterdam and Ruhr University Bochum) Interior-point methods on manifolds: theory and applications
Joint work with Hiroshi Hirai and Michael Walter, based on https://arxiv.org/abs/2212.10981 and https://arxiv.org/abs/2303.04771.
Algorithms and complexity
Thursday April 6, 2023, 11AM, Salle 3052
Yuval Ishai (Technion) Cryptography from One-Way Noisy Communication
We show how to circumvent information-theoretic impossibility results by settling for computational security and using the power of cryptographic obfuscation. In particular, under plausible assumptions, we obtain a positive answer to the first question whenever Alice's channel to Bob is not a degradation of the channel to Eve, and a positive answer to the second question over simple channels such as a binary symmetric channel or a binary erasure channel.
The first part of the talk is based on joint work with Alexis Korb, Paul Lou, and Amit Sahai. The second part is based on joint work with Shweta Agrawal, Eyal Kushilevitz, Varun Narayanan, Manoj Prabhakaran, Vinod M. Prabhakaran, and Alon Rosen.
Algorithms and complexity
Monday April 3, 2023, 2PM, Salle 3052
Gabriel Le Bouder (LIP6) Memory-Optimization for Self-Stabilizing Distributed Algorithms
One way to address these problems is to aim at reducing the size of the messages exchanged between the nodes of the network. This thesis focuses on the memory optimization of the communication for self-stabilizing distributed algorithms. We will present a negative results, proving the impossibility to solve some problems under a certain limit on the size of the exchanged messages, and a particularly efficient algorithms in terms of memory for one fundamental problem in distributed systems: the token circulation.
Joint seminar with Distributed
Algorithms and complexity
Tuesday March 21, 2023, 11AM, Salle 3052
Xavier Coiteux-Roy (TUM) Any physical theory of nature must be boundlessly multipartite nonlocal
Algorithms and complexity
Tuesday March 14, 2023, 11AM, Salle 3052
Aleksandros Sobczyk (IBM Research Zurich) Approximate Euclidean lengths and distances beyond Johnson-Lindenstrauss
Algorithms and complexity
Tuesday March 14, 2023, 2PM, Salle 3052
Thomas Peters (UCLouvain) Traceable Receipt-Free Encryption
Work published at Asiacrypt'22. Available here: https://ia.cr/2022/822.
Short Bio: Thomas Peters is a Professor and an FNRS research associate at UCLouvain, Belgium. He got a Master degree in pure mathematics and a Ph.D. in cryptography before joining ENS as a postdoc. His interests range from modeling security and building cryptographic primitives to the design of efficient public- and secret-key encryption schemes as well as advanced signature schemes with privacy-preserving features, and to zero-knowledge proofs.
Algorithms and complexity
Wednesday March 8, 2023, 11AM, Salle 3052
Alexander Koch (IRIF) An Introduction to Card-Based Cryptography
In this area of cryptography, researchers aim to construct protocols using a minimal number of cards – and to prove them optimal in this sense. Depending on the requirements posed to running time (finite vs. finite only in expectation) and to the practicability of the used shuffles, one can derive different lower bounds for the necessary number of cards. For the necessary structural insights to these lower bound results, I will present “state diagrams”, a graph-based representation of all possible protocol runs, which allow for direct reading of correctness and security from the diagram. With this method, proofs of lower bounds with respect to the number of cards become proofs that certain protocol states are not reachable in the associated combinatorial graph structure. Using this, one can even formalize the respective notions of card-based cryptography as a C program and prove the run-minimality of a card-minimal AND protocol using a Software Bounded Model Checking approach. If there is time, I will also briefly cover the case of secure multiparty computation that additionally protects the *function to be computed* for Turing machines.
The talk is meant as an accessible overview talk on the topic.
Algorithms and complexity
Tuesday February 28, 2023, 11AM, Salle 3052
Arne Heimendahl (University of Cologne) Low distortion embeddings of flat tori
In this talk, I will consider embeddings of flat tori R^n/L, where L is an n-dimensional lattice. I will show how the least distortion embedding of a flat torus can be computed by an infinite-dimensional semidefinite program. Analysing the semidefinite program, I will derive some interesting results about the structure of least distortion embeddings. Additionally, I will discuss (potential) approaches to tackle the closest vector problem, by making use of the embedding of the torus R^n/L.
Based on joint work with Moritz Lücke, Frank Vallentin and Marc Zimmermann.
Algorithms and complexity
Tuesday February 28, 2023, 10AM, Salle 3052
Hamoon Mousavi (Columbia University) Non-commutativity for combinatorial optimization
Algorithms and complexity
Wednesday February 22, 2023, 11AM, Salle 3052
Omri Weinstein (Columbia University) Approximate Matrix Multiplication via Spherical Convolutions
This algorithm involves unexpected connections to additive combinatorics, sparse Fourier transforms, and spherical harmonics. In particular, optimizing the polynomial's coefficients leads to a (non-convex) low-rank SDP problem generalizing Spherical Codes. Meanwhile, our experiments demonstrate that, when using SGD to optimize these coefficients in DNNs, Polyform provides a major speedup on state-of-art DL models with minor accuracy loss. This suggests replacing matrix multiplication with (variants of) polynomial multiplication in large-scale deep neural networks.
Algorithms and complexity
Tuesday February 21, 2023, 11AM, Salle 3052
Pihla Karanko (Aalto University) Introduction to garbling (with penguin illustrations!)
Garbling to the rescue!
Garbling is a cryptographic technique that allows B to compute the output of A's circuit using B's data, without B learning anything about the circuit (other than the output) and without A learning B's data. In this talk, I show how A can “encrypt” each gate in the circuit and thus obtain a garbled circuit that B can evaluate, without learning what the gates are.
Additionally, I talk about the limitations on what types of circuits we can garble, in particular, what kind of security you can achieve, if you want to garble cryptographic circuits.
Algorithms and complexity
Wednesday February 15, 2023, 11AM, Salle 3052
Ansis Rosmanis (Nagoya University) Non-trivial quantum lower bound for 3-coloring the ring using non-signaling arguments
In a recent joint work with François Le Gall, we showed the first non-trivial quantum lower bound for 3-coloring by using the observation that the probabilistic output of the network must be non-signaling, thus effectively sidestepping the difficulty of characterizing the power of quantum entanglement.
In this talk, I will present our results, observations that led to them, and potential directions for future work.
Algorithms and complexity
Tuesday February 14, 2023, 11AM, Salle 3052
Benoît Valiron (LMF, CentraleSupélec) Complete Equational Theories for Linear Optical and Quantum Circuits
We shall first present our proposed equational theory for linear optical circuits. We shall then discuss how the semantics of both kind of circuits differ, and how to relate them using controlled-gates. The discussion will drive is to the completeness result for quantum circuits, based on the one for linear optical circuits.
Joint seminar with PPS
Algorithms and complexity
Tuesday February 7, 2023, 11AM, Salle 3052
Pierre Meyer (IRIF / Reichman University) On Low-End Obfuscation and Learning
No specialised knowledge of cryptography or computational complexity is required, and the talk is aimed at a general TCS audience. For completeness however, we provide below a more technical description of our results.
Most recent works on cryptographic obfuscation focus on the high-end regime of obfuscating general circuits while guaranteeing computational indistinguishability between functionally equivalent circuits. Motivated by the goals of simplicity and efficiency, we initiate a systematic study of “low-end” obfuscation, focusing on simpler representation models and information-theoretic notions of security. We obtain the following results. 1) Positive results via “white-box” learning. We present a general technique for obtaining perfect indistinguishability obfuscation from exact learning algorithms that are given restricted access to the representation of the input function. We demonstrate the usefulness of this approach by obtaining simple obfuscation for decision trees and multilinear read-k arithmetic formulas. 2) Negative results via PAC learning. A proper obfuscation scheme obfuscates programs from a class C by programs from the same class. Assuming the existence of one-way functions, we show that there is no proper indistinguishability obfuscation scheme for k-CNF formulas for any constant k ≥ 3; in fact, even obfuscating 3-CNF by k-CNF is impossible. This result applies even to computationally secure obfuscation, and makes an unexpected use of PAC learning in the context of negative results for obfuscation. 3) Separations. We study the relations between different information-theoretic notions of indistinguishability obfuscation, giving cryptographic evidence for separations between them.
This is joint work with Elette Boyle, Yuval Ishai, Robert Robere, and Gal Yehuda, which was presented at ITCS 2023.
Algorithms and complexity
Wednesday February 1, 2023, 2PM, Salle 3052
Vincent Cohen-Addad (Google Research) Recent Progress on Correlation Clustering: The Power of Sherali-Adams and New Practical insights
We will first present a new result showing that a constant number of rounds of the Sherali-Adams hierarchy yields a strict improvement over the natural LP: we present the first better-than-two approximation for the problem, improving upon the previous approximation of 2.06 of Chawla, Makarychev, Schramm, Yaroslavtsev based on rounding the natural LP (which is known to have an integrality gap of 2). We will then review several recent ideas which have led to practical constant factor approximations to Correlation Clustering in various setups: distributed and parallel environments, differentially-private algorithms, dynamic algorithms, or sublinear time algorithms.
This is a combination of joint works with Euiwoong Lee, Alantha Newman, Silvio Lattanzi, Slobodan Mitrovic, Ashkan Norouzi-Fard, Nikos Parotsidis, Jakub Tarnawski, Chenglin Fan and Andreas Maggiori.
Algorithms and complexity
Monday January 30, 2023, 11AM, Salle 3052
Samson Wang (Imperial College London) Qubit-Efficient Randomized Quantum Algorithms for Linear Algebra
Algorithms and complexity
Wednesday January 25, 2023, 10AM, Salle 3052
Francisco Escudero Gutiérrez (CWI, Amsterdam) Aaronson and Ambainis conjecture: a route towards the need for structure in quantum speedups
Nevertheless, it might not be necessary to prove the exact statement proposed by Aaronson and Ambainis to show that quantum speedups need structure. This is because in 2017 Arunachalam, Briet and Palazuelos showed that the output of quantum query algorithms are not only bounded, but also completely bounded. Given that being completely bounded is much more restrictive than being bounded, it might be easier to prove the Aaronson and Ambainis conjecture for this smaller family of polynomials. We explore this line of research and prove a new particular case of the Aaronson and Ambainis conjecture. To do show, we use the technique used by Varopoulos to rule out a trilinear von Neumann's inequality.
Algorithms and complexity
Wednesday January 25, 2023, 11AM, Salle 3052
Anupa Sunny (IRIF) Certificate Games
We show that the public coin model is bounded above by randomized query and certificate complexities, while the non-signaling model, which is the weakest model we consider, is bounded below by fractional certificate complexity. The quantum measure highlights an interesting and surprising difference between classical and quantum query models. While public coin certificate game complexity is bounded above by randomized query complexity, quantum certificate game complexity can be quadratically larger than quantum query complexity.
This is a joint work with Sourav Chakraborty, Anna Gal, Sophie Laplante and Rajat Mittal.
Algorithms and complexity
Tuesday January 24, 2023, 11AM, Salle 3052
Sebastian Zur (CWI, Amsterdam) Multidimensional Quantum Walks
In this work, we generalise the electric network framework – the most general of quantum walk frameworks, into a new framework that we call the multidimensional quantum walk framework, which no longer suffers from the aforementioned drawback, while still maintaining the original classical walk intuition. We then apply this framework to the k-distinctness problem, to obtain a time complexity that matches the currently best known query complexity by Belovs(2012), as well as to the welded trees problem, where we can solve the problem in a linear number of queries.
This talk will focus on the application to welded trees.
Joint work with Stacey Jeffery (2208.13492)
Algorithms and complexity
Wednesday January 18, 2023, 11AM, Salle 3052
Nicholas Spooner (University of Warwick) How to Rewind a Quantum Computer
In this talk, I will present a new, general quantum rewinding technique that transforms a “one-time” quantum computation into a “many-time” computation. This opens the door to quantum security for many tasks. One key application is to prove that Kilian’s four-message succinct argument system for NP is secure against quantum attack (assuming the post-quantum hardness of the Learning with Errors problem).
Based on joint work with Alessandro Chiesa, Fermi Ma, Alex Lombardi, and Mark Zhandry.
online talk
Algorithms and complexity
Tuesday January 17, 2023, 2PM, Salle 3052
Krystal Guo (KdVI, University of Amsterdam) Algebraic graph theory and quantum walks
A system of interacting quantum qubits can be modelled by a quantum process on an underlying graph and is, in some sense, a quantum analogue of random walk. This gives rise to a rich connection between graph theory, linear algebra and quantum computing. In this talk, I will give an overview of applications of algebraic graph theory in quantum walks, as well as various recent results.
In a recent paper with V. Schmeits, we show that the evolution of a general discrete-time quantum walk that consists of two reflections satisfies a Chebyshev recurrence, under a projection. We apply this to a model of discrete-time quantum walk proposed by H. Zhan [J. Algebraic Combin. 53(4):1187-1213, 2020], whose transition matrix is given by two reflections, using the face and vertex incidence relations of a graph embedded in an orientable surface. For the vertex-face walk, we prove theorems about perfect state transfer and periodicity and give infinite families of examples where these occur.
Joint seminar with Graphs
Algorithms and complexity
Tuesday January 17, 2023, 11AM, Salle 3052
Tamara Kohler (mathQI, Universidad Complutense de Madrid) Clique Homology is QMA1-hard
Algorithms and complexity
Tuesday January 10, 2023, 11AM, Salle 3052
Christoph Egger (IRIF) Separating Distributional Collision Resistance from (Plain) Collision Resistance
While hash functions are commonly considered to be part of symmetric cryptography, their existence cannot be based on one-way functions in a black box manner (Simon'98), a result that directly extends to the distributional relaxation. Yet, we are able to show that distributional collision resistance cannot be boosted to (full) collision resistance. Formally, we show the existence of an oracle relative to which distributional collision resistant hash functions exist but (full) collision resistant hash functions do not.
Algorithms and complexity
Tuesday January 10, 2023, 10AM, Salle 3052
Sacha Servan-Schreiber (MIT) Private Access Control for Function Secret Sharing
In this talk, I will present a model and constructions for access control in FSS. We consider a setting where evaluators need to ensure that the dealer is authorized to share the provided function. We show how, for a function family F and an access control list defined over the family, the evaluators receiving the shares of f (from the family F) can efficiently check that the dealer knows the corresponding access key in the access control list.
We show that this model enables new applications of FSS, such as: – anonymous authentication in a multi-party setting, – access control in private databases, and – authentication and spam prevention in anonymous communication systems.
Our definitions and constructions abstract and improve the concrete efficiency of several recent systems that implement ad-hoc mechanisms for access control over FSS.
Speaker bio: Sacha is a 4th year PhD student at MIT CSAIL working on privacy-preserving systems and applied cryptography.