Skip to main content

Showing 1–7 of 7 results for author: Hubáček, P

.
  1. Must the Communication Graph of MPC Protocols be an Expander?

    Authors: Elette Boyle, Ran Cohen, Deepesh Data, Pavel Hubáček

    Abstract: Secure multiparty computation (MPC) on incomplete communication networks has been studied within two primary models: (1) Where a partial network is fixed a priori, and thus corruptions can occur dependent on its structure, and (2) Where edges in the communication graph are determined dynamically as part of the protocol. Whereas a rich literature has succeeded in map** out the feasibility and lim… ▽ More

    Submitted 21 June, 2023; v1 submitted 19 May, 2023; originally announced May 2023.

    Journal ref: Journal of Cryptology 36, 20 (2023)

  2. arXiv:2209.04827  [pdf, ps, other

    cs.CC math.CO

    PPP-Completeness and Extremal Combinatorics

    Authors: Romain Bourneuf, Lukáš Folwarczný, Pavel Hubáček, Alon Rosen, Nikolaj Ignatieff Schwartzbach

    Abstract: Many classical theorems in combinatorics establish the emergence of substructures within sufficiently large collections of objects. Well-known examples are Ramsey's theorem on monochromatic subgraphs and the Erdős-Rado sunflower lemma. Implicit versions of the corresponding total search problems are known to be PWPP-hard; here "implici" means that the collection is represented by a poly-sized circ… ▽ More

    Submitted 11 September, 2022; originally announced September 2022.

  3. arXiv:2107.02617  [pdf, ps, other

    cs.CC cs.CR

    On Search Complexity of Discrete Logarithm

    Authors: Pavel Hubáček, Jan Václavek

    Abstract: In this work, we study the discrete logarithm problem in the context of TFNP - the complexity class of search problems with a syntactically guaranteed existence of a solution for all instances. Our main results establish that suitable variants of the discrete logarithm problem are complete for the complexity class PPP, respectively PWPP, i.e., the subclasses of TFNP capturing total search problems… ▽ More

    Submitted 5 September, 2021; v1 submitted 6 July, 2021; originally announced July 2021.

  4. arXiv:1903.03385  [pdf, other

    cs.CR

    Stronger Lower Bounds for Online ORAM

    Authors: Pavel Hubáček, Michal Koucký, Karel Král, Veronika Slívová

    Abstract: Oblivious RAM (ORAM), introduced in the context of software protection by Goldreich and Ostrovsky [JACM'96], aims at obfuscating the memory access pattern induced by a RAM computation. Ideally, the memory access pattern of an ORAM should be independent of the data being processed. Since the work of Goldreich and Ostrovsky, it was believed that there is an inherent $ Ω(\log n) $ bandwidth overhead… ▽ More

    Submitted 23 September, 2019; v1 submitted 8 March, 2019; originally announced March 2019.

  5. arXiv:1802.07702  [pdf, ps, other

    cs.CC

    ARRIVAL: Next Stop in CLS

    Authors: Bernd Gärtner, Thomas Dueholm Hansen, Pavel Hubáček, Karel Král, Hagar Mosaad, Veronika Slívová

    Abstract: We study the computational complexity of ARRIVAL, a zero-player game on $n$-vertex switch graphs introduced by Dohrau, Gärtner, Kohler, Matoušek, and Welzl. They showed that the problem of deciding termination of this game is contained in $\text{NP} \cap \text{coNP}$. Karthik C. S. recently introduced a search variant of ARRIVAL and showed that it is in the complexity class PLS. In this work, we s… ▽ More

    Submitted 21 February, 2018; originally announced February 2018.

    Comments: 13 pages, 6 figures

    ACM Class: F.1.3; F.2.2; G.2.2

  6. arXiv:1507.01191  [pdf, ps, other

    cs.GT

    When Can Limited Randomness Be Used in Repeated Games?

    Authors: Pavel Hubáček, Moni Naor, Jonathan Ullman

    Abstract: The central result of classical game theory states that every finite normal form game has a Nash equilibrium, provided that players are allowed to use randomized (mixed) strategies. However, in practice, humans are known to be bad at generating random-like sequences, and true random bits may be unavailable. Even if the players have access to enough random bits for a single instance of the game the… ▽ More

    Submitted 5 July, 2015; originally announced July 2015.

  7. arXiv:1411.3747  [pdf, ps, other

    cs.GT

    Cryptographically Blinded Games: Leveraging Players' Limitations for Equilibria and Profit

    Authors: Pavel Hubáček, Sunoo Park

    Abstract: In this work we apply methods from cryptography to enable any number of mutually distrusting players to implement broad classes of mediated equilibria of strategic games without the need for trusted mediation. Our implementation makes use of a (standard) pre-play "cheap talk" phase, in which players engage in free and non-binding communication prior to playing in the original game. In our cheap… ▽ More

    Submitted 13 November, 2014; originally announced November 2014.

    Comments: This is a working paper, of which an extended abstract appeared in the 15th ACM Conference on Economics and Computation (EC 2014)

    ACM Class: F.0; J.4