搜索结果: 1-15 共查到“知识库 T 1-Theorem”相关记录515条 . 查询时间(0.171 秒)
A Round-Collapse Theorem for Computationally-Sound Protocols; or, TFNP is Hard (on Average) in Pessiland
TFNP round-collapse average-case hardness
2019/6/26
This result follows from a more general theory of interactive average-case complexity, and in particular, a novel round-collapse theorem for computationally-sound protocols, analogous to Babai-Moran's...
A Tight Parallel-Repetition Theorem for Random-Terminating Interactive Arguments
parallel repetition interactive argument smooth KL-divergence
2019/4/22
Soundness amplification is a central problem in the study of interactive protocols. While ``natural'' parallel repetition transformation is known to reduce the soundness error of some special cases of...
Privacy Loss Classes: The Central Limit Theorem in Differential Privacy
differential privacy privacy loss
2018/11/19
In recent years, privacy enhancing technologies have gained tremendous momentum and they are expected to keep a sustained importance. Quantifying the degree of privacy offered by any mechanism working...
Constructing Ideal Secret Sharing Schemes based on Chinese Remainder Theorem
Threshold Secret Sharing Chinese Remainder Theorem Polynomial Ring
2018/11/16
Since (t,n)(t,n)-threshold secret sharing (SS) was initially proposed by Shamir and Blakley separately in 1979, it has been widely used in many aspects. Later on, Asmuth and Bloom presented a (t,n)(t,...
Non-interactive zero-knowledge (NIZK) proofs are fundamental to modern cryptography. Numerous NIZK constructions are known in both the random oracle and the common reference string (CRS) models. In th...
In the area of distributed graph algorithms a number of network's entities with local views solve some computational task by exchanging messages with their neighbors. Quite unfortunately, an inherent ...
The Discrete Logarithm Problem over Prime Fields can be transformed to a Linear Multivariable Chinese Remainder Theorem
Discrete logarithm Hensel lift Multivaraible Chinese Remainder theorem
2016/12/10
The Discrete Logarithm Problem over Prime Fields can be transformed to a Linear Multivariable Chinese Remainder Theorem.
The Scope and Generality of Bell's Theorem
Bell's theorem Hidden variable theory Joy Christian
2016/6/15
I present what might seem to be a local, deterministic model of the EPR-Bohm experiment, inspired by recent work by Joy Christian, that appears at first blush to be in tension with Bell-type theorems....
Interpreting the Modal Kochen-Specker Theorem:Possibility and Many Worlds in Quantum Mechanics
Modality Kochen-Specker Theorem Many Worlds Quantum Logic
2016/6/12
In this paper we attempt to physically interpret the Modal Kochen-Specker (MKS) theorem. In order to do so, we analyze the features of the possible properties about quantum systems arising from the el...
Whither All the Scope and Generality of Bell's Theorem?
Bell's theorem EPR Argument Local Realism Local Causality Quantum Mechanics Determinism Topologies of Rotation Groups 3-sphere
2016/6/12
In a recent paper James Owen Weatherall has attempted a simple local-deterministic model for the EPR-Bohm correlation and speculated about why his model fails when my counterexample to Bell's theorem ...
Cryptanalysis of a Theorem: Decomposing the Only Known Solution to the Big APN Problem (Full Version)
Boolean functions APN Butterfly structure
2016/6/2
The existence of Almost Perfect Non-linear (APN) permutations
operating on an even number of bits has been a long standing open
question until Dillon et al., who work for the NSA, provided an exampl...
An impossibility theorem for allocation aggregation
allocation aggregation dictatorship judgment aggregation probability
2016/5/31
In axiomatic approaches to expert opinion aggregation, so-called independence conditions have been ubiquitous. Such conditions dictate that the group value assigned to each decision variable should de...
Refutation of Richard Gill's Argument Against my Disproof of Bell's Theorem
Bell's theorem EPR Argument Local Realism Local Causality Quantum Mechanics
2016/5/30
I identify a number of errors in Richard Gill's purported refutation of my disproof of Bell's theorem. In particular, I point out that his central argument is based, not only on a rather trivial misre...
Optimizing Obfuscation: Avoiding Barrington's Theorem
natural function classes Optimizing Obfuscation
2016/1/23
In this work, we seek to optimize the efficiency of secure general-purpose obfuscation schemes. We focus on the problem of optimizing the obfuscation of Boolean formulas and branching programs – thi...
A Chinese Remainder Theorem Approach to Bit-Parallel GF(2^n) Polynomial Basis Multipliers for Irreducible Trinomials
implementation Irreducible Trinomials
2016/1/5
We show that the step “modulo the degree-n field generating irreducible polynomial” in the classical definition of the GF(2^n) multiplication operation can be avoided. This leads to an alternative rep...