Skip to main content

Showing 1–4 of 4 results for author: Malkin, T

Searching in archive cs. Search in all archives.
.
  1. arXiv:1904.04828  [pdf, ps, other

    cs.DS cs.CR

    Lower Bounds for Oblivious Near-Neighbor Search

    Authors: Kasper Green Larsen, Tal Malkin, Omri Weinstein, Kevin Yeo

    Abstract: We prove an $Ω(d \lg n/ (\lg\lg n)^2)$ lower bound on the dynamic cell-probe complexity of statistically $\mathit{oblivious}$ approximate-near-neighbor search ($\mathsf{ANN}$) over the $d$-dimensional Hamming cube. For the natural setting of $d = Θ(\log n)$, our result implies an $\tildeΩ(\lg^2 n)$ lower bound, which is a quadratic improvement over the highest (non-oblivious) cell-probe lower boun… ▽ More

    Submitted 9 April, 2019; originally announced April 2019.

    Comments: 28 pages

  2. arXiv:1811.04065  [pdf, other

    cs.DS

    Two Party Distribution Testing: Communication and Security

    Authors: Alexandr Andoni, Tal Malkin, Negev Shekel Nosatzki

    Abstract: We study the problem of discrete distribution testing in the two-party setting. For example, in the standard closeness testing problem, Alice and Bob each have $t$ samples from, respectively, distributions $a$ and $b$ over $[n]$, and they need to test whether $a=b$ or $a,b$ are $ε$-far for some fixed $ε>0$. This is in contrast to the well-studied one-party case, where the tester has unrestricted a… ▽ More

    Submitted 9 November, 2018; originally announced November 2018.

  3. arXiv:1802.07673  [pdf, ps, other

    cs.CC cs.CR cs.IT

    Non-Malleable Codes for Small-Depth Circuits

    Authors: Marshall Ball, Dana Dachman-Soled, Siyao Guo, Tal Malkin, Li-Yang Tan

    Abstract: We construct efficient, unconditional non-malleable codes that are secure against tampering functions computed by small-depth circuits. For constant-depth circuits of polynomial size (i.e. $\mathsf{AC^0}$ tampering functions), our codes have codeword length $n = k^{1+o(1)}$ for a $k$-bit message. This is an exponential improvement of the previous best construction due to Chattopadhyay and Li (STOC… ▽ More

    Submitted 21 February, 2018; originally announced February 2018.

    Comments: 26 pages, 4 figures

  4. arXiv:1607.06141  [pdf, other

    cs.CR cs.DS

    Strong Hardness of Privacy from Weak Traitor Tracing

    Authors: Lucas Kowalczyk, Tal Malkin, Jonathan Ullman, Mark Zhandry

    Abstract: Despite much study, the computational complexity of differential privacy remains poorly understood. In this paper we consider the computational complexity of accurately answering a family $Q$ of statistical queries over a data universe $X$ under differential privacy. A statistical query on a dataset $D \in X^n$ asks "what fraction of the elements of $D$ satisfy a given predicate $p$ on $X$?" Dwork… ▽ More

    Submitted 20 July, 2016; originally announced July 2016.