Average-Case Fine-Grained Hardness Marshall Ball Alon Rosen Manuel - - PowerPoint PPT Presentation

average case fine grained hardness
SMART_READER_LITE
LIVE PREVIEW

Average-Case Fine-Grained Hardness Marshall Ball Alon Rosen Manuel - - PowerPoint PPT Presentation

Average-Case Fine-Grained Hardness Marshall Ball Alon Rosen Manuel Sabin Prashant Nalini Vasudevan Average-Case Fine-Grained Hardness Marshall Ball Alon Rosen Manuel Sabin Prashant Nalini Vasudevan Average-Case Fine-Grained Hardness


slide-1
SLIDE 1

Average-Case Fine-Grained Hardness

Marshall Ball Alon Rosen Manuel Sabin Prashant Nalini Vasudevan

slide-2
SLIDE 2

Average-Case Fine-Grained Hardness

Marshall Ball Alon Rosen Manuel Sabin Prashant Nalini Vasudevan

slide-3
SLIDE 3

Average-Case Fine-Grained Hardness

Marshall Ball Alon Rosen Manuel Sabin Prashant Nalini Vasudevan

Average-Case Fine-Grained Hardness

slide-4
SLIDE 4

Average-Case Fine-Grained Hardness

Marshall Ball Alon Rosen Manuel Sabin Prashant Nalini Vasudevan

Average-Case Fine-Grained Hardness

◮ 3SUM

slide-5
SLIDE 5

Average-Case Fine-Grained Hardness

Marshall Ball Alon Rosen Manuel Sabin Prashant Nalini Vasudevan

Average-Case Fine-Grained Hardness

◮ 3SUM ◮ APSP

slide-6
SLIDE 6

Average-Case Fine-Grained Hardness

Marshall Ball Alon Rosen Manuel Sabin Prashant Nalini Vasudevan

Average-Case Fine-Grained Hardness

◮ 3SUM ◮ APSP ◮ Orthogonal Vectors

slide-7
SLIDE 7

Average-Case Fine-Grained Hardness

Marshall Ball Alon Rosen Manuel Sabin Prashant Nalini Vasudevan

Average-Case Fine-Grained Hardness

◮ 3SUM ◮ APSP ◮ Orthogonal Vectors

Average-Case Fine-Grained Hardness

slide-8
SLIDE 8

Average-Case Fine-Grained Hardness

Marshall Ball Alon Rosen Manuel Sabin Prashant Nalini Vasudevan

Average-Case Fine-Grained Hardness

◮ 3SUM ◮ APSP ◮ Orthogonal Vectors

Average-Case Fine-Grained Hardness Average-Case Fine-Grained Hardness

slide-9
SLIDE 9

Average-Case Fine-Grained Hardness

Marshall Ball Alon Rosen Manuel Sabin Prashant Nalini Vasudevan

Average-Case Fine-Grained Hardness

◮ 3SUM ◮ APSP ◮ Orthogonal Vectors

Average-Case Fine-Grained Hardness Average-Case Fine-Grained Hardness

◮ Natural object of study

slide-10
SLIDE 10

Average-Case Fine-Grained Hardness

Marshall Ball Alon Rosen Manuel Sabin Prashant Nalini Vasudevan

Average-Case Fine-Grained Hardness

◮ 3SUM ◮ APSP ◮ Orthogonal Vectors

Average-Case Fine-Grained Hardness Average-Case Fine-Grained Hardness

◮ Natural object of study ◮ Necessary for cryptography

slide-11
SLIDE 11

Average-Case Fine-Grained Hardness

Marshall Ball Alon Rosen Manuel Sabin Prashant Nalini Vasudevan

Average-Case Fine-Grained Hardness

◮ 3SUM ◮ APSP ◮ Orthogonal Vectors

Average-Case Fine-Grained Hardness Average-Case Fine-Grained Hardness

◮ Natural object of study ◮ Necessary for cryptography ◮ Potential use in algorithm design

slide-12
SLIDE 12

Plan

◮ Introduce problems ◮ Present average-case reduction ◮ Summarise ◮ Present Proof of Work ◮ ??? ◮ Profit.

slide-13
SLIDE 13

Worst-Case: Orthogonal Vectors

U V

slide-14
SLIDE 14

Worst-Case: Orthogonal Vectors

U V

1 0 0 1 1 0 0 1 1 0 1 0 1 0 0 1 1 0 0 0 1 0 0 1 1 0 0

slide-15
SLIDE 15

Worst-Case: Orthogonal Vectors

U V

1 0 0 1 1 0 0 1 1 0 1 0 1 0 0 1 1 0 0 0 1 0 0 1 1 0 0

n d

slide-16
SLIDE 16

Worst-Case: Orthogonal Vectors

U V

1 0 0 1 1 0 0 1 1 0 1 0 1 0 0 1 1 0 0 0 1 0 0 1 1 0 0

n d ∃u ∈ U, v ∈ V : disjoint?

slide-17
SLIDE 17

Worst-Case: Orthogonal Vectors

U V

1 0 0 1 1 0 0 1 1 0 1 0 1 0 0 1 1 0 0 0 1 0 0 1 1 0 0

n d ∃u ∈ U, v ∈ V : disjoint?

Best known worst-case algorithm [AWY15]: O(n2−1/O(log(d/ log n)))

slide-18
SLIDE 18

Worst-Case: Orthogonal Vectors

U V

1 0 0 1 1 0 0 1 1 0 1 0 1 0 0 1 1 0 0 0 1 0 0 1 1 0 0

n d ∃u ∈ U, v ∈ V : disjoint?

Best known worst-case algorithm [AWY15]: O(n2−1/O(log(d/ log n))) OV Conjecture (implied by SETH [Wil05]) If d = ω(log n), OV takes n2−o(1) time.

slide-19
SLIDE 19

Worst-Case: Orthogonal Vectors

U V

1 0 0 1 1 0 0 1 1 0 1 0 1 0 0 1 1 0 0 0 1 0 0 1 1 0 0

n log2 n ∃u ∈ U, v ∈ V : disjoint?

Best known worst-case algorithm [AWY15]: O(n2−1/O(log(d/ log n))) OV Conjecture (implied by SETH [Wil05]) If d = ω(log n), OV takes n2−o(1) time.

slide-20
SLIDE 20

Average-Case: A Polynomial for OV (independently featured in [Wil16])

U V

ui1 ui2 . . . uid i vj1 vj2 . . . vjd j

f                    

slide-21
SLIDE 21

Average-Case: A Polynomial for OV (independently featured in [Wil16])

U V

ui1 ui2 . . . uid i vj1 vj2 . . . vjd j

f                    

(1 − ui1vj1)(1 − ui2vj2) · · · (1 − uidvjd)

slide-22
SLIDE 22

Average-Case: A Polynomial for OV (independently featured in [Wil16])

U V

ui1 ui2 . . . uid i vj1 vj2 . . . vjd j

f                    

(1 − ui1vj1)(1 − ui2vj2) · · · (1 − uidvjd) 1 ⇔ ui, vj disjoint

slide-23
SLIDE 23

Average-Case: A Polynomial for OV (independently featured in [Wil16])

U V

ui1 ui2 . . . uid i vj1 vj2 . . . vjd j

f                    

(1 − ui1vj1)(1 − ui2vj2) · · · (1 − uidvjd) 1 ⇔ ui, vj disjoint =

i∈[n]

  • j∈[n]
slide-24
SLIDE 24

Average-Case: A Polynomial for OV (independently featured in [Wil16])

U V

ui1 ui2 . . . uid i vj1 vj2 . . . vjd j

f                    

(1 − ui1vj1)(1 − ui2vj2) · · · (1 − uidvjd) 1 ⇔ ui, vj disjoint =

i∈[n]

  • j∈[n]

p > n2 f : F2nd

p

→ Fp

slide-25
SLIDE 25

Average-Case: A Polynomial for OV (independently featured in [Wil16])

U V

ui1 ui2 . . . uid i vj1 vj2 . . . vjd j

f                    

(1 − ui1vj1)(1 − ui2vj2) · · · (1 − uidvjd) 1 ⇔ ui, vj disjoint =

i∈[n]

  • j∈[n]

p > n2 f : F2nd

p

→ Fp deg(f ) = 2d d = log2 n

slide-26
SLIDE 26

Worst-Case to Average-Case

Theorem ∃A in time n1+α : Prx←F2nd

p

[A(x) = f (x)] ≥

1 no(1)

⇓ ∃B in time n1+α+o(1) that decides OV

slide-27
SLIDE 27

Worst-Case to Average-Case

Theorem ∃A in time n1+α : Prx←F2nd

p

[A(x) = f (x)] ≥

1 no(1)

⇓ ∃B in time n1+α+o(1) that decides OV Corollary OV takes n2−o(1) ⇒ f takes n2−o(1) on average

slide-28
SLIDE 28

Worst-Case to Average-Case (using ideas from [Lip91, GS92, CPS99])

f : F2nd

p

→ Fp, deg(f ) = 2d

slide-29
SLIDE 29

Worst-Case to Average-Case (using ideas from [Lip91, GS92, CPS99])

f : F2nd

p

→ Fp, deg(f ) = 2d Prx←F2nd

p [A(x) = f (x)] ≥ 0.9

Time: t = n1+α

slide-30
SLIDE 30

Worst-Case to Average-Case (using ideas from [Lip91, GS92, CPS99])

f : F2nd

p

→ Fp, deg(f ) = 2d Prx←F2nd

p [A(x) = f (x)] ≥ 0.9

Time: t = n1+α ∀x : PrB [B(x) = f (x)] ≥ 2

3

Time:

slide-31
SLIDE 31

Worst-Case to Average-Case (using ideas from [Lip91, GS92, CPS99])

f : F2nd

p

→ Fp, deg(f ) = 2d Prx←F2nd

p [A(x) = f (x)] ≥ 0.9

Time: t = n1+α ∀x : PrB [B(x) = f (x)] ≥ 2

3

Time:

F2nd

p

x

slide-32
SLIDE 32

Worst-Case to Average-Case (using ideas from [Lip91, GS92, CPS99])

f : F2nd

p

→ Fp, deg(f ) = 2d Prx←F2nd

p [A(x) = f (x)] ≥ 0.9

Time: t = n1+α ∀x : PrB [B(x) = f (x)] ≥ 2

3

Time:

F2nd

p

x g(t) = f (x + yt) g(0) = f (x), deg(g) ≤ 2d

slide-33
SLIDE 33

Worst-Case to Average-Case (using ideas from [Lip91, GS92, CPS99])

f : F2nd

p

→ Fp, deg(f ) = 2d Prx←F2nd

p [A(x) = f (x)] ≥ 0.9

Time: t = n1+α ∀x : PrB [B(x) = f (x)] ≥ 2

3

Time:

F2nd

p

x x + yt g(t) = f (x + yt) g(0) = f (x), deg(g) ≤ 2d

slide-34
SLIDE 34

Worst-Case to Average-Case (using ideas from [Lip91, GS92, CPS99])

f : F2nd

p

→ Fp, deg(f ) = 2d Prx←F2nd

p [A(x) = f (x)] ≥ 0.9

Time: t = n1+α ∀x : PrB [B(x) = f (x)] ≥ 2

3

Time:

F2nd

p

x x + yt g(t) = f (x + yt) g(0) = f (x), deg(g) ≤ 2d Error-correct from (noisy) g(1), g(2), . . . , g(cd)

slide-35
SLIDE 35

Worst-Case to Average-Case (using ideas from [Lip91, GS92, CPS99])

f : F2nd

p

→ Fp, deg(f ) = 2d Prx←F2nd

p [A(x) = f (x)] ≥ 0.9

Time: t = n1+α ∀x : PrB [B(x) = f (x)] ≥ 2

3

Time:

F2nd

p

x x + yt g(t) = f (x + yt) g(0) = f (x), deg(g) ≤ 2d Error-correct from (noisy) g(1), g(2), . . . , g(cd) Pry [too many t’s : A(x + yt) = g(t)] < 1

3

(Markov Bound)

slide-36
SLIDE 36

Worst-Case to Average-Case (using ideas from [Lip91, GS92, CPS99])

f : F2nd

p

→ Fp, deg(f ) = 2d Prx←F2nd

p [A(x) = f (x)] ≥ 0.9

Time: t = n1+α ∀x : PrB [B(x) = f (x)] ≥ 2

3

Time: O(d · nd + d · t + d3)

F2nd

p

x x + yt g(t) = f (x + yt) g(0) = f (x), deg(g) ≤ 2d Error-correct from (noisy) g(1), g(2), . . . , g(cd) Pry [too many t’s : A(x + yt) = g(t)] < 1

3

(Markov Bound)

slide-37
SLIDE 37

Worst-Case to Average-Case (using ideas from [Lip91, GS92, CPS99])

f : F2nd

p

→ Fp, deg(f ) = 2d Prx←F2nd

p [A(x) = f (x)] ≥ 0.9

Time: t = n1+α ∀x : PrB [B(x) = f (x)] ≥ 2

3

Time: O(d · nd + d · t + d3) f (U, V) =

  • i∈[n]
  • j∈[n]
  • ℓ∈[d]

(1 − uiℓvjℓ)

slide-38
SLIDE 38

Worst-Case to Average-Case (using ideas from [Lip91, GS92, CPS99])

f : F2nd

p

→ Fp, deg(f ) = 2d Prx←F2nd

p [A(x) = f (x)] ≥ 0.9

Time: t = n1+α ∀x : PrB [B(x) = f (x)] ≥ 2

3

Time: O(d · nd + d · t + d3) f (U, V) =

  • i∈[n]
  • j∈[n]
  • ℓ∈[d]

(1 − uiℓvjℓ) =    

  • i ∈ [n/2]

j ∈ [n/2]

+

  • i ∈ [n/2]

j ∈ (n/2, n]

+

  • i ∈ (n/2, n]

j ∈ [n/2]

+

  • i ∈ (n/2, n]

j ∈ (n/2, n]

   

  • ℓ∈[d]

(1 − uiℓvjℓ)

slide-39
SLIDE 39

Worst-Case to Average-Case (using ideas from [Lip91, GS92, CPS99])

f : F2nd

p

→ Fp, deg(f ) = 2d Prx←F2nd

p [A(x) = f (x)] ≥

1 no(1)

Time: t = n1+α ∀x : PrB [B(x) = f (x)] ≥ 2

3

Time: O(d · nd + d · t + d3) f (U, V) =

  • i∈[n]
  • j∈[n]
  • ℓ∈[d]

(1 − uiℓvjℓ) =    

  • i ∈ [n/2]

j ∈ [n/2]

+

  • i ∈ [n/2]

j ∈ (n/2, n]

+

  • i ∈ (n/2, n]

j ∈ [n/2]

+

  • i ∈ (n/2, n]

j ∈ (n/2, n]

   

  • ℓ∈[d]

(1 − uiℓvjℓ)

slide-40
SLIDE 40

Worst-Case to Average-Case (using ideas from [Lip91, GS92, CPS99])

f : F2nd

p

→ Fp, deg(f ) = 2d Prx←F2nd

p [A(x) = f (x)] ≥

1 no(1)

Time: t = n1+α ∀x : PrB [B(x) = f (x)] ≥ 2

3

Time: t1+o(1) f (U, V) =

  • i∈[n]
  • j∈[n]
  • ℓ∈[d]

(1 − uiℓvjℓ) =    

  • i ∈ [n/2]

j ∈ [n/2]

+

  • i ∈ [n/2]

j ∈ (n/2, n]

+

  • i ∈ (n/2, n]

j ∈ [n/2]

+

  • i ∈ (n/2, n]

j ∈ (n/2, n]

   

  • ℓ∈[d]

(1 − uiℓvjℓ)

slide-41
SLIDE 41

Intermediate Summary

We have a worst-to-average case reduction from OV (resp. 3SUM, APSP) to evaluating a polynomial f (other respective polynomials).

slide-42
SLIDE 42

Intermediate Summary

We have a worst-to-average case reduction from OV (resp. 3SUM, APSP) to evaluating a polynomial f (other respective polynomials). In addition,

◮ f has low degree – polylog(n). ◮ f is somewhat efficiently computable –

O(n2).

◮ f is downward self-reducible.

slide-43
SLIDE 43

Intermediate Summary

We have a worst-to-average case reduction from OV (resp. 3SUM, APSP) to evaluating a polynomial f (other respective polynomials). In addition,

◮ f has low degree – polylog(n). ◮ f is somewhat efficiently computable –

O(n2).

◮ f is downward self-reducible.

Theorem [Wil16] There is an MA proof system for proving (f (x) = y) that has:

◮ perfect completeness and negligible soundness. ◮ prover complexity

O(n2).

◮ verifier complexity

O(n).

slide-44
SLIDE 44

Proof of Work

Prover Verifier

slide-45
SLIDE 45

Proof of Work

Prover Verifier

x ← F2nd

p

x

slide-46
SLIDE 46

Proof of Work

Prover Verifier

x ← F2nd

p

x Compute f (x) = z and MA proof π z, π

slide-47
SLIDE 47

Proof of Work

Prover Verifier

x ← F2nd

p

x Compute f (x) = z and MA proof π z, π Verify using π that f (x) = z

slide-48
SLIDE 48

Proof of Work

Prover Verifier

x ← F2nd

p

x Compute f (x) = z and MA proof π z, π Verify using π that f (x) = z

  • O(n)
  • O(n2)
slide-49
SLIDE 49

Proof of Work

Prover Verifier

x ← F2nd

p

x Compute f (x) = z and MA proof π z, π Verify using π that f (x) = z

  • O(n)
  • O(n2)

Pr [Prover can run in n2−ǫ and convince Verifier] ≤

1 nǫ/2

slide-50
SLIDE 50

Proof of Work

Prover Verifier

x ← F2nd

p

x Compute f (x) = z and MA proof π z, π Verify using π that f (x) = z

  • O(n)
  • O(n2)

Pr [Prover can run in n2−ǫ and convince Verifier] ≤

1 nǫ/2

(See [DN92] for generic constructions and applications.)

slide-51
SLIDE 51

What Next?

slide-52
SLIDE 52

What Next?

◮ Average-case complexity of OV, 3SUM, etc.

slide-53
SLIDE 53

What Next?

◮ Average-case complexity of OV, 3SUM, etc. ◮ Fine-grained cryptography

◮ Some prior work under other assumptions [Mer78, Hås87, BGI08, DVV16, ...]. ◮ Fine-grained OWFs from SETH? ◮ Beat Merkle’s key agreement under these assumptions?

slide-54
SLIDE 54

What Next?

◮ Average-case complexity of OV, 3SUM, etc. ◮ Fine-grained cryptography

◮ Some prior work under other assumptions [Mer78, Hås87, BGI08, DVV16, ...]. ◮ Fine-grained OWFs from SETH? ◮ Beat Merkle’s key agreement under these assumptions?

◮ Average-case algorithms

◮ Design algorithms to evaluate polynomials that work on average.

slide-55
SLIDE 55

What Next?

◮ Average-case complexity of OV, 3SUM, etc. ◮ Fine-grained cryptography

◮ Some prior work under other assumptions [Mer78, Hås87, BGI08, DVV16, ...]. ◮ Fine-grained OWFs from SETH? ◮ Beat Merkle’s key agreement under these assumptions?

◮ Average-case algorithms

◮ Design algorithms to evaluate polynomials that work on average.

◮ Beter reductions

◮ Is it actually possible to do beter than guessing at random?

slide-56
SLIDE 56

To be passed in case of an abundance of time.

slide-57
SLIDE 57

k-SAT and SETH

( x1 ∨ x2 ∨ . . . ) ∧ ( . . . ∨ xn ∨ . . . ) ∧ · · · ∧ ( . . . ∨ . . . ∨ . . . ) k

slide-58
SLIDE 58

k-SAT and SETH

( x1 ∨ x2 ∨ . . . ) ∧ ( . . . ∨ xn ∨ . . . ) ∧ · · · ∧ ( . . . ∨ . . . ∨ . . . ) k Best known worst-case algorithm [PPSZ05]: O(2(1−c/k)n)

slide-59
SLIDE 59

k-SAT and SETH

( x1 ∨ x2 ∨ . . . ) ∧ ( . . . ∨ xn ∨ . . . ) ∧ · · · ∧ ( . . . ∨ . . . ∨ . . . ) k Best known worst-case algorithm [PPSZ05]: O(2(1−c/k)n) Strong Exponential Time Hypothesis (SETH) [IPZ98] ∀ǫ ∃k: k-SAT takes Ω(2(1−ǫ)n) time.

slide-60
SLIDE 60

An Efficient MA Protocol for f [Wil16]

(U, V) ∈ F2nd

p

, z ∈ Fp

slide-61
SLIDE 61

An Efficient MA Protocol for f [Wil16]

(U, V) ∈ F2nd

p

, z ∈ Fp φ1, . . . , φd : Fp → Fp ∀i ∈ [n] : φℓ(i) = uiℓ deg(φℓ) ≤ n − 1

slide-62
SLIDE 62

An Efficient MA Protocol for f [Wil16]

(U, V) ∈ F2nd

p

, z ∈ Fp φ1, . . . , φd : Fp → Fp ∀i ∈ [n] : φℓ(i) = uiℓ deg(φℓ) ≤ n − 1 f (U, V) =

  • i∈[n]
  • j∈[n]
  • ℓ∈[d]

(1 − uiℓvjℓ) =

  • i∈[n]

 

j∈[n]

  • ℓ∈[d]

(1 − φℓ(i)vjℓ)   =

  • i∈[n]

r(i)

slide-63
SLIDE 63

An Efficient MA Protocol for f [Wil16]

(U, V) ∈ F2nd

p

, z ∈ Fp φ1, . . . , φd : Fp → Fp ∀i ∈ [n] : φℓ(i) = uiℓ deg(φℓ) ≤ n − 1 f (U, V) =

  • i∈[n]
  • j∈[n]
  • ℓ∈[d]

(1 − uiℓvjℓ) =

  • i∈[n]

 

j∈[n]

  • ℓ∈[d]

(1 − φℓ(i)vjℓ)   =

  • i∈[n]

r(i)

◮ Proof: Coefficients of r. (Interpolation –

O(n2))

slide-64
SLIDE 64

An Efficient MA Protocol for f [Wil16]

(U, V) ∈ F2nd

p

, z ∈ Fp φ1, . . . , φd : Fp → Fp ∀i ∈ [n] : φℓ(i) = uiℓ deg(φℓ) ≤ n − 1 f (U, V) =

  • i∈[n]
  • j∈[n]
  • ℓ∈[d]

(1 − uiℓvjℓ) =

  • i∈[n]

 

j∈[n]

  • ℓ∈[d]

(1 − φℓ(i)vjℓ)   =

  • i∈[n]

r(i)

◮ Proof: Coefficients of r. (Interpolation –

O(n2))

◮ Verification:

◮ Check r at random point. (Computation of φ and correct value –

O(n))

◮ Compute r(i) for i ∈ [n] and sum to get f (U, V). (Batch evaluation –

O(n))

slide-65
SLIDE 65

Amir Abboud, Richard Ryan Williams, and Huacheng Yu. More applications of the polynomial method to algorithm design. In Piotr Indyk, editor, Proceedings of the Twenty-Sixth Annual ACM-SIAM Symposium

  • n Discrete Algorithms, SODA 2015, San Diego, CA, USA, January 4-6, 2015, pages

218–230. SIAM, 2015. Eli Biham, Yaron J. Goren, and Yuval Ishai. Basing weak public-key cryptography on strong one-way functions. In Ran Caneti, editor, Theory of Cryptography, Fifh Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008., volume 4948 of Lecture Notes in Computer Science, pages 55–72. Springer, 2008. Jin-yi Cai, Aduri Pavan, and D. Sivakumar. On the hardness of permanent. In Christoph Meinel and Sophie Tison, editors, STACS 99, 16th Annual Symposium on Theoretical Aspects of Computer Science, Trier, Germany, March 4-6, 1999, Proceedings, volume 1563 of Lecture Notes in Computer Science, pages 90–99. Springer, 1999. Cynthia Dwork and Moni Naor.

slide-66
SLIDE 66

Pricing via processing or combating junk mail. In Advances in Cryptology - CRYPTO ’92, 12th Annual International Cryptology Conference, Santa Barbara, California, USA, August 16-20, 1992, Proceedings, pages 139–147, 1992. Akshay Degwekar, Vinod Vaikuntanathan, and Prashant Nalini Vasudevan. Fine-grained cryptography. In Advances in Cryptology - CRYPTO 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part III, pages 533–562, 2016. Peter Gemmell and Madhu Sudan. Highly resilient correctors for polynomials. Information processing leters, 43(4):169–174, 1992. Johan Håstad. One-way permutations in NC0. Information Processing Leters, 26(3):153–155, 1987. Russell Impagliazzo, Ramamohan Paturi, and Francis Zane.

slide-67
SLIDE 67

Which problems have strongly exponential complexity? In 39th Annual Symposium on Foundations of Computer Science, FOCS ’98, November 8-11, 1998, Palo Alto, California, USA, pages 653–663. IEEE Computer Society, 1998. Richard Lipton. New directions in testing. Distributed Computing and Cryptography, 2:191–202, 1991. Ralph C. Merkle. Secure communications over insecure channels.

  • Commun. ACM, 21(4):294–299, 1978.

Ramamohan Paturi, Pavel Pudlák, Michael E. Saks, and Francis Zane. An improved exponential-time algorithm for k-sat.

  • J. ACM, 52(3):337–364, May 2005.

Ryan Williams. A new algorithm for optimal 2-constraint satisfaction and its implications.

  • Theor. Comput. Sci., 348(2-3):357–365, 2005.

Ryan Williams.

slide-68
SLIDE 68

Strong ETH breaks with merlin and arthur: Short non-interactive proofs of batch evaluation. In 31st Conference on Computational Complexity, CCC 2016, May 29 to June 1, 2016, Tokyo, Japan, pages 2:1–2:17, 2016.