Interactive Proofs Lecture 16 What the all-powerful can convince - - PowerPoint PPT Presentation

interactive proofs
SMART_READER_LITE
LIVE PREVIEW

Interactive Proofs Lecture 16 What the all-powerful can convince - - PowerPoint PPT Presentation

Interactive Proofs Lecture 16 What the all-powerful can convince mere mortals of 1 Recap 2 Recap Non-deterministic Computation 2 Recap Non-deterministic Computation Polynomial Hierarchy 2 Recap Non-deterministic Computation


slide-1
SLIDE 1

Interactive Proofs

Lecture 16 What the all-powerful can convince mere mortals of

1

slide-2
SLIDE 2

Recap

2

slide-3
SLIDE 3

Recap

Non-deterministic Computation

2

slide-4
SLIDE 4

Recap

Non-deterministic Computation Polynomial Hierarchy

2

slide-5
SLIDE 5

Recap

Non-deterministic Computation Polynomial Hierarchy Non-determinism on steroids!

2

slide-6
SLIDE 6

Recap

Non-deterministic Computation Polynomial Hierarchy Non-determinism on steroids! Non-uniform computation

2

slide-7
SLIDE 7

Recap

Non-deterministic Computation Polynomial Hierarchy Non-determinism on steroids! Non-uniform computation Probabilistic Computation

2

slide-8
SLIDE 8

Recap

Non-deterministic Computation Polynomial Hierarchy Non-determinism on steroids! Non-uniform computation Probabilistic Computation Today: Interactive Proofs

2

slide-9
SLIDE 9

Recap

Non-deterministic Computation Polynomial Hierarchy Non-determinism on steroids! Non-uniform computation Probabilistic Computation Today: Interactive Proofs Non-determinism and Probabilistic computation on steroids!

2

slide-10
SLIDE 10

Interactive Proofs

3

slide-11
SLIDE 11

Prover wants to convince verifier that x has some property

Interactive Proofs

3

slide-12
SLIDE 12

Prover wants to convince verifier that x has some property i.e. x is in language L

Interactive Proofs

3

slide-13
SLIDE 13

Prover wants to convince verifier that x has some property i.e. x is in language L

Interactive Proofs

3

slide-14
SLIDE 14

x ∈ L

Prover wants to convince verifier that x has some property i.e. x is in language L

Interactive Proofs

3

slide-15
SLIDE 15

x ∈ L

Prover wants to convince verifier that x has some property i.e. x is in language L

Interactive Proofs

Prove to me!

3

slide-16
SLIDE 16

x ∈ L

Prover wants to convince verifier that x has some property i.e. x is in language L

Interactive Proofs

Prove to me!

3

slide-17
SLIDE 17

x ∈ L

Prover wants to convince verifier that x has some property i.e. x is in language L

Interactive Proofs

Prove to me! YES!

3

slide-18
SLIDE 18

x ∈ L

Prover wants to convince verifier that x has some property i.e. x is in language L All powerful prover, computationally bounded verifier

Interactive Proofs

Prove to me! YES!

3

slide-19
SLIDE 19

x ∈ L

Prover wants to convince verifier that x has some property i.e. x is in language L All powerful prover, computationally bounded verifier Verifier doesn’t trust prover

Interactive Proofs

Prove to me! YES!

3

slide-20
SLIDE 20

x ∈ L

Prover wants to convince verifier that x has some property i.e. x is in language L All powerful prover, computationally bounded verifier Verifier doesn’t trust prover Limits the power

Interactive Proofs

Prove to me! YES!

3

slide-21
SLIDE 21

Interactive Proofs

4

slide-22
SLIDE 22

Interactive Proofs

Completeness

4

slide-23
SLIDE 23

Interactive Proofs

Completeness If x in L, honest Prover should convince honest Verifier

4

slide-24
SLIDE 24

Interactive Proofs

Completeness If x in L, honest Prover should convince honest Verifier Soundness

4

slide-25
SLIDE 25

Interactive Proofs

Completeness If x in L, honest Prover should convince honest Verifier Soundness If x not in L, honest Verifier won’t accept any purported proof

4

slide-26
SLIDE 26

Interactive Proofs

Completeness If x in L, honest Prover should convince honest Verifier Soundness If x not in L, honest Verifier won’t accept any purported proof

4

slide-27
SLIDE 27

Interactive Proofs

Completeness If x in L, honest Prover should convince honest Verifier Soundness If x not in L, honest Verifier won’t accept any purported proof

x ∈ L

4

slide-28
SLIDE 28

Interactive Proofs

Completeness If x in L, honest Prover should convince honest Verifier Soundness If x not in L, honest Verifier won’t accept any purported proof

x ∈ L

yeah right!

4

slide-29
SLIDE 29

Interactive Proofs

Completeness If x in L, honest Prover should convince honest Verifier Soundness If x not in L, honest Verifier won’t accept any purported proof

x ∈ L

yeah right!

4

slide-30
SLIDE 30

Interactive Proofs

Completeness If x in L, honest Prover should convince honest Verifier Soundness If x not in L, honest Verifier won’t accept any purported proof

x ∈ L

yeah right! NO!

4

slide-31
SLIDE 31

An Example

5

slide-32
SLIDE 32

Coke in bottle or can

An Example

5

slide-33
SLIDE 33

Coke in bottle or can Prover claims: coke in bottle and coke in can are different

An Example

5

slide-34
SLIDE 34

Coke in bottle or can Prover claims: coke in bottle and coke in can are different IP protocol:

An Example

5

slide-35
SLIDE 35

Coke in bottle or can Prover claims: coke in bottle and coke in can are different IP protocol:

An Example

5

slide-36
SLIDE 36

Coke in bottle or can Prover claims: coke in bottle and coke in can are different IP protocol:

An Example

Pour into from can or bottle

5

slide-37
SLIDE 37

Coke in bottle or can Prover claims: coke in bottle and coke in can are different IP protocol:

An Example

Pour into from can or bottle

5

slide-38
SLIDE 38

Coke in bottle or can Prover claims: coke in bottle and coke in can are different IP protocol: prover tells whether cup was filled from can or bottle

An Example

Pour into from can or bottle

can/bottle

5

slide-39
SLIDE 39

Coke in bottle or can Prover claims: coke in bottle and coke in can are different IP protocol: prover tells whether cup was filled from can or bottle repeat till verifier is convinced

An Example

Pour into from can or bottle

can/bottle

5

slide-40
SLIDE 40

An Example

6

slide-41
SLIDE 41

Graph non-isomorphism (GNI)

An Example

6

slide-42
SLIDE 42

Graph non-isomorphism (GNI) Prover claims: G0 not isomorphic to G1

An Example

6

slide-43
SLIDE 43

Graph non-isomorphism (GNI) Prover claims: G0 not isomorphic to G1 IP protocol:

An Example

6

slide-44
SLIDE 44

Graph non-isomorphism (GNI) Prover claims: G0 not isomorphic to G1 IP protocol:

An Example

6

slide-45
SLIDE 45

Graph non-isomorphism (GNI) Prover claims: G0 not isomorphic to G1 IP protocol:

An Example

Set G* to be π(G0) or π(G1) (π a random permutation)

6

slide-46
SLIDE 46

Graph non-isomorphism (GNI) Prover claims: G0 not isomorphic to G1 IP protocol:

An Example

Set G* to be π(G0) or π(G1) (π a random permutation)

G*

6

slide-47
SLIDE 47

Graph non-isomorphism (GNI) Prover claims: G0 not isomorphic to G1 IP protocol: prover tells whether G* came from G0 or G1

An Example

Set G* to be π(G0) or π(G1) (π a random permutation)

G0/G1 G*

6

slide-48
SLIDE 48

Graph non-isomorphism (GNI) Prover claims: G0 not isomorphic to G1 IP protocol: prover tells whether G* came from G0 or G1 repeat till verifier is convinced

An Example

Set G* to be π(G0) or π(G1) (π a random permutation)

G0/G1 G*

6

slide-49
SLIDE 49

Interactive Proofs

7

slide-50
SLIDE 50

Interactive Proofs

Completeness

7

slide-51
SLIDE 51

Interactive Proofs

Completeness If x in L, honest Prover will convince honest Verifier

7

slide-52
SLIDE 52

Interactive Proofs

Completeness If x in L, honest Prover will convince honest Verifier With probability at least 2/3

7

slide-53
SLIDE 53

Interactive Proofs

Completeness If x in L, honest Prover will convince honest Verifier With probability at least 2/3 Soundness

7

slide-54
SLIDE 54

Interactive Proofs

Completeness If x in L, honest Prover will convince honest Verifier With probability at least 2/3 Soundness If x not in L, honest Verifier won’t accept any purported proof

7

slide-55
SLIDE 55

Interactive Proofs

Completeness If x in L, honest Prover will convince honest Verifier With probability at least 2/3 Soundness If x not in L, honest Verifier won’t accept any purported proof Except with probability at most 1/3

7

slide-56
SLIDE 56

Deterministic IP?

8

slide-57
SLIDE 57

Deterministic Verifier IP

Deterministic IP?

8

slide-58
SLIDE 58

Deterministic Verifier IP Prover can construct the entire transcript, which verifier can verify deterministically

Deterministic IP?

8

slide-59
SLIDE 59

Deterministic Verifier IP Prover can construct the entire transcript, which verifier can verify deterministically NP certificate

Deterministic IP?

8

slide-60
SLIDE 60

Deterministic Verifier IP Prover can construct the entire transcript, which verifier can verify deterministically NP certificate Deterministic Verifier IP = NP

Deterministic IP?

8

slide-61
SLIDE 61

Deterministic Verifier IP Prover can construct the entire transcript, which verifier can verify deterministically NP certificate Deterministic Verifier IP = NP Deterministic Prover IP = IP

Deterministic IP?

8

slide-62
SLIDE 62

Deterministic Verifier IP Prover can construct the entire transcript, which verifier can verify deterministically NP certificate Deterministic Verifier IP = NP Deterministic Prover IP = IP For each input prover can choose the random tape which maximizes Pr[yes] (probability over honest verifier’ s randomness)

Deterministic IP?

8

slide-63
SLIDE 63

Public and Private Coins

9

slide-64
SLIDE 64

Public and Private Coins

Public coins: Prover sees verifier’ s coin tosses

9

slide-65
SLIDE 65

Public and Private Coins

Public coins: Prover sees verifier’ s coin tosses Verifier might as well send nothing but the coins to the prover

9

slide-66
SLIDE 66

Public and Private Coins

Public coins: Prover sees verifier’ s coin tosses Verifier might as well send nothing but the coins to the prover Private coins: Verifier does not send everything about the coins

9

slide-67
SLIDE 67

Public and Private Coins

Public coins: Prover sees verifier’ s coin tosses Verifier might as well send nothing but the coins to the prover Private coins: Verifier does not send everything about the coins e.g. GNI protocol: verifier keeps coin tosses hidden; uses it to create challenge

9

slide-68
SLIDE 68

Arthur Merlin Proofs

10

slide-69
SLIDE 69

Arthur Merlin Proofs

Arthur-Merlin proof-systems

10

slide-70
SLIDE 70

Arthur Merlin Proofs

Arthur-Merlin proof-systems Arthur: polynomial time verifier

10

slide-71
SLIDE 71

Arthur Merlin Proofs

Arthur-Merlin proof-systems Arthur: polynomial time verifier

10

slide-72
SLIDE 72

Arthur Merlin Proofs

Arthur-Merlin proof-systems Arthur: polynomial time verifier Merlin: unbounded prover

10

slide-73
SLIDE 73

Arthur Merlin Proofs

Arthur-Merlin proof-systems Arthur: polynomial time verifier Merlin: unbounded prover

10

slide-74
SLIDE 74

Arthur Merlin Proofs

Arthur-Merlin proof-systems Arthur: polynomial time verifier Merlin: unbounded prover Random coins come from a beacon

10

slide-75
SLIDE 75

Arthur Merlin Proofs

Arthur-Merlin proof-systems Arthur: polynomial time verifier Merlin: unbounded prover Random coins come from a beacon

10

slide-76
SLIDE 76

Arthur Merlin Proofs

Arthur-Merlin proof-systems Arthur: polynomial time verifier Merlin: unbounded prover Random coins come from a beacon Public coin proof-system

10

slide-77
SLIDE 77

Arthur Merlin Proofs

Arthur-Merlin proof-systems Arthur: polynomial time verifier Merlin: unbounded prover Random coins come from a beacon Public coin proof-system Arthur sends no messages nor flips any coins

10

slide-78
SLIDE 78

Arthur Merlin Proofs

Arthur-Merlin proof-systems Arthur: polynomial time verifier Merlin: unbounded prover Random coins come from a beacon Public coin proof-system Arthur sends no messages nor flips any coins

10

slide-79
SLIDE 79

Arthur Merlin Proofs

Arthur-Merlin proof-systems Arthur: polynomial time verifier Merlin: unbounded prover Random coins come from a beacon Public coin proof-system Arthur sends no messages nor flips any coins

10

slide-80
SLIDE 80

Arthur Merlin Proofs

Arthur-Merlin proof-systems Arthur: polynomial time verifier Merlin: unbounded prover Random coins come from a beacon Public coin proof-system Arthur sends no messages nor flips any coins

10

slide-81
SLIDE 81

Arthur Merlin Proofs

Arthur-Merlin proof-systems Arthur: polynomial time verifier Merlin: unbounded prover Random coins come from a beacon Public coin proof-system Arthur sends no messages nor flips any coins

10

slide-82
SLIDE 82

Arthur Merlin Proofs

Arthur-Merlin proof-systems Arthur: polynomial time verifier Merlin: unbounded prover Random coins come from a beacon Public coin proof-system Arthur sends no messages nor flips any coins

10

slide-83
SLIDE 83

MA and AM

11

slide-84
SLIDE 84

MA and AM

Class of languages with two message Arthur-Merlin protocols

11

slide-85
SLIDE 85

MA and AM

Class of languages with two message Arthur-Merlin protocols AM (or AM[2]): One message from beacon, followed by one message from Merlin

11

slide-86
SLIDE 86

MA and AM

Class of languages with two message Arthur-Merlin protocols AM (or AM[2]): One message from beacon, followed by one message from Merlin MA (or MA[2]): One message from Merlin followed by one message from beacon

11

slide-87
SLIDE 87

MA and AM

Class of languages with two message Arthur-Merlin protocols AM (or AM[2]): One message from beacon, followed by one message from Merlin MA (or MA[2]): One message from Merlin followed by one message from beacon Contain NP and BPP

11

slide-88
SLIDE 88

Multiple-message proofs

12

slide-89
SLIDE 89

Multiple-message proofs

AM[k], MA[k], IP[k]: k(n) messages

12

slide-90
SLIDE 90

Multiple-message proofs

AM[k], MA[k], IP[k]: k(n) messages Turns out IP[k] ⊆ AM[k+2]!

12

slide-91
SLIDE 91

Multiple-message proofs

AM[k], MA[k], IP[k]: k(n) messages Turns out IP[k] ⊆ AM[k+2]! Turns out IP[const] = AM[const] = AM[2]!

12

slide-92
SLIDE 92

Multiple-message proofs

AM[k], MA[k], IP[k]: k(n) messages Turns out IP[k] ⊆ AM[k+2]! Turns out IP[const] = AM[const] = AM[2]! Called AM

12

slide-93
SLIDE 93

Multiple-message proofs

AM[k], MA[k], IP[k]: k(n) messages Turns out IP[k] ⊆ AM[k+2]! Turns out IP[const] = AM[const] = AM[2]! Called AM Turns out IP[poly] = AM[poly] = PSPACE!

12

slide-94
SLIDE 94

Multiple-message proofs

AM[k], MA[k], IP[k]: k(n) messages Turns out IP[k] ⊆ AM[k+2]! Turns out IP[const] = AM[const] = AM[2]! Called AM Turns out IP[poly] = AM[poly] = PSPACE! Called IP (= PSPACE)

12

slide-95
SLIDE 95

Multiple-message proofs

AM[k], MA[k], IP[k]: k(n) messages Turns out IP[k] ⊆ AM[k+2]! Turns out IP[const] = AM[const] = AM[2]! Called AM Turns out IP[poly] = AM[poly] = PSPACE! Called IP (= PSPACE) Later.

12

slide-96
SLIDE 96

How can private coins be avoided?

13

slide-97
SLIDE 97

How can private coins be avoided?

Example: GNI

13

slide-98
SLIDE 98

How can private coins be avoided?

Example: GNI Recall GNI protocol used private coins

13

slide-99
SLIDE 99

How can private coins be avoided?

Example: GNI Recall GNI protocol used private coins An alternate view of GNI

13

slide-100
SLIDE 100

How can private coins be avoided?

Example: GNI Recall GNI protocol used private coins An alternate view of GNI Each of G0 and G1 has n! isomorphic graphs

13

slide-101
SLIDE 101

How can private coins be avoided?

Example: GNI Recall GNI protocol used private coins An alternate view of GNI Each of G0 and G1 has n! isomorphic graphs (Assuming no automorphisms)

13

slide-102
SLIDE 102

How can private coins be avoided?

Example: GNI Recall GNI protocol used private coins An alternate view of GNI Each of G0 and G1 has n! isomorphic graphs (Assuming no automorphisms) If G0 and G1 isomorphic, same set of n! isomorphic graphs

13

slide-103
SLIDE 103

How can private coins be avoided?

Example: GNI Recall GNI protocol used private coins An alternate view of GNI Each of G0 and G1 has n! isomorphic graphs (Assuming no automorphisms) If G0 and G1 isomorphic, same set of n! isomorphic graphs Else 2(n!) isomorphic graphs

13

slide-104
SLIDE 104

How can private coins be avoided?

Example: GNI Recall GNI protocol used private coins An alternate view of GNI Each of G0 and G1 has n! isomorphic graphs (Assuming no automorphisms) If G0 and G1 isomorphic, same set of n! isomorphic graphs Else 2(n!) isomorphic graphs Prover to prove that |{H: H ≡ G0 or H ≡ G1}| > n!

13

slide-105
SLIDE 105

Set Lower-bound

14

slide-106
SLIDE 106

Set Lower-bound

Prover wants to prove that |S| > K, for a set S such that |S| ≥ 2K

14

slide-107
SLIDE 107

Set Lower-bound

Prover wants to prove that |S| > K, for a set S such that |S| ≥ 2K S ⊆ U, a sampleable universe, membership in S certifiable

14

slide-108
SLIDE 108

Set Lower-bound

Prover wants to prove that |S| > K, for a set S such that |S| ≥ 2K S ⊆ U, a sampleable universe, membership in S certifiable Suppose K large (say K=|U|/3). Then simple protocol:

14

slide-109
SLIDE 109

Set Lower-bound

Prover wants to prove that |S| > K, for a set S such that |S| ≥ 2K S ⊆ U, a sampleable universe, membership in S certifiable Suppose K large (say K=|U|/3). Then simple protocol: Verifier picks a random element x∈U

14

slide-110
SLIDE 110

Set Lower-bound

Prover wants to prove that |S| > K, for a set S such that |S| ≥ 2K S ⊆ U, a sampleable universe, membership in S certifiable Suppose K large (say K=|U|/3). Then simple protocol: Verifier picks a random element x∈U If x∈S, prover returns certificate

14

slide-111
SLIDE 111

Set Lower-bound

Prover wants to prove that |S| > K, for a set S such that |S| ≥ 2K S ⊆ U, a sampleable universe, membership in S certifiable Suppose K large (say K=|U|/3). Then simple protocol: Verifier picks a random element x∈U If x∈S, prover returns certificate If certificate valid, verifier accepts

14

slide-112
SLIDE 112

Set Lower-bound

Prover wants to prove that |S| > K, for a set S such that |S| ≥ 2K S ⊆ U, a sampleable universe, membership in S certifiable Suppose K large (say K=|U|/3). Then simple protocol: Verifier picks a random element x∈U If x∈S, prover returns certificate If certificate valid, verifier accepts If |S| > 2K, Pr[yes] > 2/3. If |S| ≤ K, Pr[yes] ≤ 1/3

14

slide-113
SLIDE 113

Set Lower-bound

Prover wants to prove that |S| > K, for a set S such that |S| ≥ 2K S ⊆ U, a sampleable universe, membership in S certifiable Suppose K large (say K=|U|/3). Then simple protocol: Verifier picks a random element x∈U If x∈S, prover returns certificate If certificate valid, verifier accepts If |S| > 2K, Pr[yes] > 2/3. If |S| ≤ K, Pr[yes] ≤ 1/3 But what if K/|U| is exponentially small?

14

slide-114
SLIDE 114

Set Lower-bound

15

slide-115
SLIDE 115

Set Lower-bound

Prover wants to prove that |S| > K, for a set S such that |S| ≥ 2K

15

slide-116
SLIDE 116

Set Lower-bound

Prover wants to prove that |S| > K, for a set S such that |S| ≥ 2K But K can be very small (say |U|=2n, K=2n/2)

15

slide-117
SLIDE 117

Set Lower-bound

Prover wants to prove that |S| > K, for a set S such that |S| ≥ 2K But K can be very small (say |U|=2n, K=2n/2) Idea: First “hash down” U to almost size 2K, so that small sets (like S) do not shrink much (and of course, do not grow)

15

slide-118
SLIDE 118

Set Lower-bound

Prover wants to prove that |S| > K, for a set S such that |S| ≥ 2K But K can be very small (say |U|=2n, K=2n/2) Idea: First “hash down” U to almost size 2K, so that small sets (like S) do not shrink much (and of course, do not grow) Verifier picks a random element y∈H(U)

15

slide-119
SLIDE 119

Set Lower-bound

Prover wants to prove that |S| > K, for a set S such that |S| ≥ 2K But K can be very small (say |U|=2n, K=2n/2) Idea: First “hash down” U to almost size 2K, so that small sets (like S) do not shrink much (and of course, do not grow) Verifier picks a random element y∈H(U) If y∈H(S), prover returns certificate: x∈S (+cert.), y=H(x)

15

slide-120
SLIDE 120

Set Lower-bound

Prover wants to prove that |S| > K, for a set S such that |S| ≥ 2K But K can be very small (say |U|=2n, K=2n/2) Idea: First “hash down” U to almost size 2K, so that small sets (like S) do not shrink much (and of course, do not grow) Verifier picks a random element y∈H(U) If y∈H(S), prover returns certificate: x∈S (+cert.), y=H(x) If certificate valid, verifier accepts

15

slide-121
SLIDE 121

Set Lower-bound

Prover wants to prove that |S| > K, for a set S such that |S| ≥ 2K But K can be very small (say |U|=2n, K=2n/2) Idea: First “hash down” U to almost size 2K, so that small sets (like S) do not shrink much (and of course, do not grow) Verifier picks a random element y∈H(U) If y∈H(S), prover returns certificate: x∈S (+cert.), y=H(x) If certificate valid, verifier accepts Is there such a hash function for all small sets S?

15

slide-122
SLIDE 122

Set Lower-bound

Prover wants to prove that |S| > K, for a set S such that |S| ≥ 2K But K can be very small (say |U|=2n, K=2n/2) Idea: First “hash down” U to almost size 2K, so that small sets (like S) do not shrink much (and of course, do not grow) Verifier picks a random element y∈H(U) If y∈H(S), prover returns certificate: x∈S (+cert.), y=H(x) If certificate valid, verifier accepts Is there such a hash function for all small sets S? Clearly no single function for all S!

15

slide-123
SLIDE 123

Hash Function Family

16

slide-124
SLIDE 124

Hash Function Family

A family of hash functions

16

slide-125
SLIDE 125

Hash Function Family

A family of hash functions Given any small subset S, a random function h from the family will not shrink it much (say by 3/4) with high probability

16

slide-126
SLIDE 126

Hash Function Family

A family of hash functions Given any small subset S, a random function h from the family will not shrink it much (say by 3/4) with high probability (Though every h shrinks some small sets)

16

slide-127
SLIDE 127

Hash Function Family

A family of hash functions Given any small subset S, a random function h from the family will not shrink it much (say by 3/4) with high probability (Though every h shrinks some small sets) Relate shrinking to “hash collision probability”

16

slide-128
SLIDE 128

Hash Function Family

A family of hash functions Given any small subset S, a random function h from the family will not shrink it much (say by 3/4) with high probability (Though every h shrinks some small sets) Relate shrinking to “hash collision probability” Prh[h(x)=h(x’)] (max over x≠x’)

16

slide-129
SLIDE 129

Hash Function Family

A family of hash functions Given any small subset S, a random function h from the family will not shrink it much (say by 3/4) with high probability (Though every h shrinks some small sets) Relate shrinking to “hash collision probability” Prh[h(x)=h(x’)] (max over x≠x’) Exercise!

16

slide-130
SLIDE 130

2-Universal Hash Family

17

slide-131
SLIDE 131

2-Universal Hash Family

(a.k.a pairwise-independent hashing)

17

slide-132
SLIDE 132

2-Universal Hash Family

(a.k.a pairwise-independent hashing) Family of functions h: U → R

17

slide-133
SLIDE 133

2-Universal Hash Family

(a.k.a pairwise-independent hashing) Family of functions h: U → R Prh[h(x)=y] = 1/|R| for all x∈U and y∈R

17

slide-134
SLIDE 134

2-Universal Hash Family

(a.k.a pairwise-independent hashing) Family of functions h: U → R Prh[h(x)=y] = 1/|R| for all x∈U and y∈R Prh[h(x)=y & h(x’)=y’] = 1/|R|2 for all x≠x’ ∈ U and y, y’∈ R

17

slide-135
SLIDE 135

2-Universal Hash Family

(a.k.a pairwise-independent hashing) Family of functions h: U → R Prh[h(x)=y] = 1/|R| for all x∈U and y∈R Prh[h(x)=y & h(x’)=y’] = 1/|R|2 for all x≠x’ ∈ U and y, y’∈ R E.g. in exercise

17

slide-136
SLIDE 136

2-Universal Hash Family

(a.k.a pairwise-independent hashing) Family of functions h: U → R Prh[h(x)=y] = 1/|R| for all x∈U and y∈R Prh[h(x)=y & h(x’)=y’] = 1/|R|2 for all x≠x’ ∈ U and y, y’∈ R E.g. in exercise Hash collision probability = 1/|R|

17

slide-137
SLIDE 137

Public-coin protocol for Set lower-bound

18

slide-138
SLIDE 138

Public-coin protocol for Set lower-bound

Given a description of S and size K, to prove |S|>K (if |S|>2K)

18

slide-139
SLIDE 139

Public-coin protocol for Set lower-bound

Given a description of S and size K, to prove |S|>K (if |S|>2K) Verifier picks a random hash function h from a 2UHF family from U to R, with |R| = 8K (say), and a random element y in R

18

slide-140
SLIDE 140

Public-coin protocol for Set lower-bound

Given a description of S and size K, to prove |S|>K (if |S|>2K) Verifier picks a random hash function h from a 2UHF family from U to R, with |R| = 8K (say), and a random element y in R Prover sends back (if possible) x∈S s.t. h(x)=y, with a certificate for x∈S

18

slide-141
SLIDE 141

Public-coin protocol for Set lower-bound

Given a description of S and size K, to prove |S|>K (if |S|>2K) Verifier picks a random hash function h from a 2UHF family from U to R, with |R| = 8K (say), and a random element y in R Prover sends back (if possible) x∈S s.t. h(x)=y, with a certificate for x∈S Verifier verifies x∈S and h(x)=y and outputs YES

18

slide-142
SLIDE 142

Public-coin protocol for Set lower-bound

Given a description of S and size K, to prove |S|>K (if |S|>2K) Verifier picks a random hash function h from a 2UHF family from U to R, with |R| = 8K (say), and a random element y in R Prover sends back (if possible) x∈S s.t. h(x)=y, with a certificate for x∈S Verifier verifies x∈S and h(x)=y and outputs YES Pr[Yes] has a constant gap between |S| > 2K and |S| < K [Exercise]

18