Skip to main content

Showing 1–13 of 13 results for author: Keller, N

Searching in archive cs. Search in all archives.
.
  1. arXiv:2201.03041  [pdf, ps, other

    cs.DS cs.CR

    Locality-Preserving Hashing for Shifts with Connections to Cryptography

    Authors: Elette Boyle, Itai Dinur, Niv Gilboa, Yuval Ishai, Nathan Keller, Ohad Klein

    Abstract: Can we sense our location in an unfamiliar environment by taking a sublinear-size sample of our surroundings? Can we efficiently encrypt a message that only someone physically close to us can decrypt? To solve this kind of problems, we introduce and study a new type of hash functions for finding shifts in sublinear time. A function $h:\{0,1\}^n\to \mathbb{Z}_n$ is a $(d,δ)$ {\em locality-preservin… ▽ More

    Submitted 9 January, 2022; originally announced January 2022.

    Journal ref: ITCS 2022

  2. arXiv:2111.00486  [pdf, other

    cs.CR cs.CC math.CO

    Fine-Grained Cryptanalysis: Tight Conditional Bounds for Dense k-SUM and k-XOR

    Authors: Itai Dinur, Nathan Keller, Ohad Klein

    Abstract: An average-case variant of the $k$-SUM conjecture asserts that finding $k$ numbers that sum to 0 in a list of $r$ random numbers, each of the order $r^k$, cannot be done in much less than $r^{\lceil k/2 \rceil}$ time. On the other hand, in the dense regime of parameters, where the list contains more numbers and many solutions exist, the complexity of finding one of them can be significantly improv… ▽ More

    Submitted 13 March, 2024; v1 submitted 31 October, 2021; originally announced November 2021.

    Comments: 44 pages, to appear in JACM, abridged version appeared in FOCS'2021

  3. arXiv:2008.03675  [pdf, other

    cs.CG

    Consistent High Dimensional Rounding with Side Information

    Authors: Orr Dunkelman, Zeev Geyzel, Chaya Keller, Nathan Keller, Eyal Ronen, Adi Shamir, Ran J. Tessler

    Abstract: In standard rounding, we want to map each value $X$ in a large continuous space (e.g., $R$) to a nearby point $P$ from a discrete subset (e.g., $Z$). This process seems to be inherently discontinuous in the sense that two consecutive noisy measurements $X_1$ and $X_2$ of the same value may be extremely close to each other and yet they can be rounded to different points $P_1\ne P_2$, which is undes… ▽ More

    Submitted 9 August, 2020; originally announced August 2020.

  4. arXiv:1911.03748   

    cs.CC cs.CR cs.DM math.CO math.PR

    Quantum speedups need structure

    Authors: Nathan Keller, Ohad Klein

    Abstract: We prove the following conjecture, raised by Aaronson and Ambainis in 2008: Let $f:\{-1,1\}^n \rightarrow [-1,1]$ be a multilinear polynomial of degree $d$. Then there exists a variable $x_i$ whose influence on $f$ is at least $\mathrm{poly}(\mathrm{Var}(f)/d)$. As was shown by Aaronson and Ambainis, this result implies the following well-known conjecture on the power of quantum computing, datin… ▽ More

    Submitted 1 December, 2019; v1 submitted 9 November, 2019; originally announced November 2019.

    Comments: Unfortunately, our proof contains a serious flaw. Specifically, Lemma 5.3 does not prove the assertion it claims to prove and this collapses the entire argument. We thank Paata Ivanishvili for pointing out the flaw, and apologize to the community for posting an eventually incorrect proof

    MSC Class: 68Q12; 68Q15; 68Q17; 68Q87; 06E30; 05D40

  5. arXiv:1901.08839  [pdf, ps, other

    math.CO cs.DM

    A structure theorem for almost low-degree functions on the slice

    Authors: Nathan Keller, Ohad Klein

    Abstract: The Fourier-Walsh expansion of a Boolean function $f \colon \{0,1\}^n \rightarrow \{0,1\}$ is its unique representation as a multilinear polynomial. The Kindler-Safra theorem (2002) asserts that if in the expansion of $f$, the total weight on coefficients beyond degree $k$ is very small, then $f$ can be approximated by a Boolean-valued function depending on at most $O(2^k)$ variables. In this pa… ▽ More

    Submitted 25 January, 2019; originally announced January 2019.

    Comments: 30 pages

    MSC Class: 06E30; 05E30; 05D40

  6. arXiv:1710.07429  [pdf, other

    math.CO cs.CC cs.DM math.PR

    Biased halfspaces, noise sensitivity, and local Chernoff inequalities

    Authors: Nathan Keller, Ohad Klein

    Abstract: A halfspace is a function $f\colon\{-1,1\}^n \rightarrow \{0,1\}$ of the form $f(x)=\mathbb{1}(a\cdot x>t)$, where $\sum_i a_i^2=1$. We show that if $f$ is a halfspace with $\mathbb{E}[f]=ε$ and $a'=\max_i |a_i|$, then the degree-1 Fourier weight of $f$ is $W^1(f)=Θ(ε^2 \log(1/ε))$, and the maximal influence of $f$ is $I_{\max}(f)=Θ(ε\min(1,a' \sqrt{\log(1/ε)}))$. These results, which determ… ▽ More

    Submitted 25 September, 2019; v1 submitted 20 October, 2017; originally announced October 2017.

    Comments: Revised version, published in Discrete Analysis. 50 pages

    MSC Class: 05D40; 60C05; 94C10; 06E30; 68R05; 68Q87

  7. arXiv:1704.02659  [pdf, other

    cs.CR

    Tight Bounds on Online Checkpointing Algorithms

    Authors: Achiya Bar-On, Itai Dinur, Orr Dunkelman, Rani Hod, Nathan Keller, Eyal Ronen, Adi Shamir

    Abstract: The problem of online checkpointing is a classical problem with numerous applications which had been studied in various forms for almost 50 years. In the simplest version of this problem, a user has to maintain $k$ memorized checkpoints during a long computation, where the only allowed operation is to move one of the checkpoints from its old time to the current time, and his goal is to keep the ch… ▽ More

    Submitted 19 June, 2019; v1 submitted 9 April, 2017; originally announced April 2017.

    Comments: Appeared at ICALP 2018

  8. arXiv:1703.10116  [pdf, ps, other

    math.CO cs.DM

    Approximation of biased Boolean functions of small total influence by DNF's

    Authors: Nathan Keller, Noam Lifshitz

    Abstract: The influence of the $k$'th coordinate on a Boolean function $f:\{0,1\}^n \rightarrow \{0,1\}$ is the probability that flip** $x_k$ changes the value $f(x)$. The total influence $I(f)$ is the sum of influences of the coordinates. The well-known `Junta Theorem' of Friedgut (1998) asserts that if $I(f) \leq M$, then $f$ can be $ε$-approximated by a function that depends on $O(2^{M/ε})$ coordinates… ▽ More

    Submitted 29 March, 2017; originally announced March 2017.

    Comments: 14 pages

    MSC Class: 05D05

  9. arXiv:1404.3396  [pdf, ps, other

    cs.CC

    On the sum of the L1 influences of bounded functions

    Authors: Yuval Filmus, Hamed Hatami, Nathan Keller, Noam Lifshitz

    Abstract: Let $f\colon \{-1,1\}^n \to [-1,1]$ have degree $d$ as a multilinear polynomial. It is well-known that the total influence of $f$ is at most $d$. Aaronson and Ambainis asked whether the total $L_1$ influence of $f$ can also be bounded as a function of $d$. Bačkurs and Bavarian answered this question in the affirmative, providing a bound of $O(d^3)$ for general functions and $O(d^2)$ for homogeneou… ▽ More

    Submitted 28 March, 2015; v1 submitted 13 April, 2014; originally announced April 2014.

    Comments: 16 pages; accepted for publication in the Israel Journal of Mathematics

  10. arXiv:1105.5129  [pdf, ps, other

    math.CO cs.AI math.PR

    A Quantitative Version of the Gibbard-Satterthwaite Theorem for Three Alternatives

    Authors: Ehud Friedgut, Gil Kalai, Nathan Keller, Noam Nisan

    Abstract: The Gibbard-Satterthwaite theorem states that every non-dictatorial election rule among at least three alternatives can be strategically manipulated. We prove a quantitative version of the Gibbard-Satterthwaite theorem: a random manipulation by a single random voter will succeed with a non-negligible probability for any election rule among three alternatives that is far from being a dictatorship a… ▽ More

    Submitted 25 May, 2011; originally announced May 2011.

    Comments: 27 pages, extended version of a FOCS'08 paper, to appear in SICOMP

    MSC Class: 05D40; 91B14; 68Q87

  11. arXiv:1105.2651  [pdf, ps, other

    math.CO cs.LG

    A Note on the Entropy/Influence Conjecture

    Authors: Nathan Keller, Elchanan Mossel, Tomer Schlank

    Abstract: The entropy/influence conjecture, raised by Friedgut and Kalai in 1996, seeks to relate two different measures of concentration of the Fourier coefficients of a Boolean function. Roughly saying, it claims that if the Fourier spectrum is "smeared out", then the Fourier coefficients are concentrated on "high" levels. In this note we generalize the conjecture to biased product measures on the discret… ▽ More

    Submitted 13 May, 2011; originally announced May 2011.

    Comments: 12 pages

    MSC Class: 05D40; 60C05

  12. arXiv:1003.3956  [pdf, ps, other

    math.CO cs.GT math.PR

    A tight quantitative version of Arrow's impossibility theorem

    Authors: Nathan Keller

    Abstract: The well-known Impossibility Theorem of Arrow asserts that any Generalized Social Welfare Function (GSWF) with at least three alternatives, which satisfies Independence of Irrelevant Alternatives (IIA) and Unanimity and is not a dictatorship, is necessarily non-transitive. In 2002, Kalai asked whether one can obtain the following quantitative version of the theorem: For any $ε>0$, there exists… ▽ More

    Submitted 20 March, 2010; originally announced March 2010.

    Comments: 24 pages

    MSC Class: 05D40; 60C05; 91B14; 39A12

  13. arXiv:cs/0610048  [pdf, ps, other

    cs.CR cs.DM math.CO

    MV3: A new word based stream cipher using rapid mixing and revolving buffers

    Authors: Nathan Keller, Stephen D. Miller, Ilya Mironov, Ramarathnam Venkatesan

    Abstract: MV3 is a new word based stream cipher for encrypting long streams of data. A direct adaptation of a byte based cipher such as RC4 into a 32- or 64-bit word version will obviously need vast amounts of memory. This scaling issue necessitates a look for new components and principles, as well as mathematical analysis to justify their use. Our approach, like RC4's, is based on rapidly mixing random w… ▽ More

    Submitted 9 October, 2006; originally announced October 2006.

    Comments: 27 pages, shortened version will appear in "Topics in Cryptology - CT-RSA 2007"