For any unsatisfiable CNF formula F that is hard to refute in the Resolution proof system, we show that a gadget-composed version of F is hard to refute in any proof system whose lines …
M Braverman, S Khot, N Lifshitz… - 2021 IEEE 62nd Annual …, 2022 - ieeexplore.ieee.org
Given an alphabet size m∈N thought of as a constant, and ⃗k=(k_1,...,k_m) whose entries sum of up n, the ⃗k-multi-slice is the set of vectors x∈m^n in which each symbol i∈m …
The task of manipulating correlated random variables in a distributed setting has received attention in the fields of both Information Theory and Computer Science. Often shared …
Correlated secret randomness is a useful resource for secure computation protocols, often enabling dramatic speedups compared to protocols in the plain model. This has motivated a …
In this monograph, we develop a mathematical framework based on asymptotically good random structured codes, ie, codes possessing algebraic properties, for network information …
A De, E Mossel, J Neeman - Proceedings of the Twenty-Ninth Annual ACM …, 2018 - SIAM
A basic problem in information theory is the following: Let P=(X, Y) be an arbitrary distribution where the marginals X and Y are (potentially) correlated. Let Alice and Bob be …
Correlated pairs of random variables are a central concept in information-theoretically secure cryptography. Secure reductions between different correlations have been studied …
K Bhushan, AK Misra, V Narayanan… - Theory of Cryptography …, 2022 - Springer
Abstract Secure Non-Interactive Reductions (SNIR) is a recently introduced, but fundamental cryptographic primitive. The basic question about SNIRs is how to determine if there is an …
M Qin, P Yao - SIAM Journal on Computing, 2021 - SIAM
This paper considers a special class of nonlocal games (G,ψ), where G is a two-player one- round game, and ψ is a bipartite state independent of G. In the game (G,ψ), the players are …