300 likes | 310 Vues
Andrej Bogdanov Chinese University of Hong Kong. APPROXIMATE DEGREE AND BOUNDED INDISTINGUISHABILITY. CAALM workshop, Chennai | January 2019.
E N D
Andrej Bogdanov Chinese University of Hong Kong APPROXIMATE DEGREE AND BOUNDED INDISTINGUISHABILITY CAALM workshop, Chennai | January 2019
💰💰 💰💰 💰💰 💰💰 💰 💰💰 💰💰
secure multiparty computation [Yao, Ben Or et al., Chaumet al.]
allows global computation • prevents local leakage Is this reasonable? Is this the best we can do?
Bounded indistinguishability (X1,…, Xn) and (Y1,…, Yn) are k-close if all their projections on size-k subsets are identical Example (X1, X2, X3) uniform s.t.X1 + X2 + X3 = 0 (Y1, Y2, Y3) uniform s.t.Y1 + Y2 + Y3 = 1
When does local closeness imply global closeness? ⨁ AC0 ROF AND NC0
(X1,…, Xn), (Y1,…, Yn) are bit sequences m, n: {0, 1}n→R their p.m.f.s • f = m–n local global f ∑ f(x) p(x) = 0 ∑ f(x) f(x) small for all p of degree ≤ k
∑ f(x) f(x) small ∑ f(x) p(x) = 0 for all p of degree ≤ k • approximate • if there f has • degree ≤ k • exists p: Rn → Rof degree ≤ k such that • |f(x) – p(x)| ≤ e for allxin {0, 1}n
f cannot distinguish any k-close X, Y if • and only if degef≤k
Approximate degree of AND xd xd Td(x) degeAND=Q(√ n log 1/e) [Nisan-Szegedy]
secret sharing scheme secret = or shares = or 1 1 0 0 reconstruction function = AND
How to share g(x) = ES[Pi∈Sxi]2 x ∈{–1, 1}n S |S| ≤ (n –√n)/2 To share bit b, sample x w/p ∝ g(x) | Pxi = b
∑ f(x) AND(x)large ∑ f(x) p(x) = 0 • f = Pi∈Sxi ES[Pi∈Sxi]2/Z for all p of degree ≤ k S • f(1n) = 1/Z • Z = ∑ES[Pi∈Sxi]2 • = Pr[S]
degree ≤ query complexity exact ≤ deterministic approximate ≤ randomized ≤ 2x quantum
Grover: deg≈AND = O(√n) Reichardt: deg≈ ∀ROF = O(√n) open: Is deg≈ ∀ROF = W(√n)?
Composition f … g g ? deg≈f ∘ g ≥ deg≈f deg≈g
Composition deg≈ ∀ROF2 = W(√n) [Sherstov, Bun-Thaler, …] deg≈ ∀ROFd = 2-O(d) √n [Ben-David et al.]
? deg≈ ∃AC0 = W(n) ? deg≈ ∃DNF = W(n) deg≈ ∃AC0d = n1 – 2 -W(d) [Bun-Thaler] deg≈ ∀kDNF = O(n1 – 1/k) [Sherstov]
Imperfect security If X, Yare symmetricand k-close, then they are (K, e-O(k /K))-close for K ≤ n/4. 2 advantage [Williamson] 0 n coalition size k = √n
Classical vs. quantum If f requires k queries, then it requires W(k1/6) quantum queries [Nisan-Szegedy, Bealset al.] If X, Y are (k, 0.01)-close, are they (k1/10, 0.1)-quantum close?
Indistingushability vs. independence Polylog-wise independence fools AC0… [Braverman] …but √-wise indistingushability doesn’t
Indistingushability vs. independence Common use: x = As for linear code A Conjecture: If As and Bs are polylog-close, are they AC0-close?
There are W(n)-close X, Ythat are separated by some AC0 function [B.-Ishai-Viola-Williamson] Alphabet size exponential in n Conjecture: W(n) <n– 1
Ramp secret sharing There are X, Ythat are 49%n-close but AC0-far by any size 51%n coalitions Here gap is necessary
For specific distributions originating in crypto, local closeness sometimes does imply AC0-security. [Ishaiet al., Faust et al., Rothblum]