Proof complexity and SAT solving

S Buss, J Nordström - Handbook of Satisfiability, 2021 - ebooks.iospress.nl
This chapter gives an overview of proof complexity and connections to SAT solving, focusing
on proof systems such as resolution, Nullstellensatz, polynomial calculus, and cutting planes …

Query-to-communication lifting for BPP

M Göös, T Pitassi, T Watson - 2017 IEEE 58th Annual …, 2017 - ieeexplore.ieee.org
For any n-bit boolean function f, we show that the randomized communication complexity of
the composed function fog n, where g is an index gadget, is characterized by the …

Conditional disclosure of secrets via non-linear reconstruction

T Liu, V Vaikuntanathan, H Wee - Annual International Cryptology …, 2017 - Springer
We present new protocols for conditional disclosure of secrets (CDS), where two parties
want to disclose a secret to a third party if and only if their respective inputs satisfy some …

Better secret sharing via robust conditional disclosure of secrets

B Applebaum, A Beimel, O Nir, N Peter - Proceedings of the 52nd Annual …, 2020 - dl.acm.org
A secret-sharing scheme allows to distribute a secret s among n parties such that only some
predefined “authorized” sets of parties can reconstruct the secret, and all other …

Adventures in monotone complexity and TFNP

M Göös, P Kamath, R Robere… - 10th Innovations in …, 2019 - drops.dagstuhl.de
Separations: We introduce a monotone variant of Xor-Sat and show it has exponential
monotone circuit complexity. Since Xor-Sat is in NC^ 2, this improves qualitatively on the …

Lifting nullstellensatz to monotone span programs over any field

T Pitassi, R Robere - Proceedings of the 50th Annual ACM SIGACT …, 2018 - dl.acm.org
We characterize the size of monotone span programs computing certain “structured”
boolean functions by the Nullstellensatz degree of a related unsatisfiable Boolean formula …

Be adaptive, avoid overcommitting

Z Jafargholi, C Kamath, K Klein, I Komargodski… - Annual International …, 2017 - Springer
For many cryptographic primitives, it is relatively easy to achieve selective security (where
the adversary commits a-priori to some of the choices to be made later in the attack) but …

[PDF][PDF] Proof complexity

J Krajıcek - Encyclopedia of Mathematics and its Applications, 2019 - karlin.mff.cuni.cz
This note, based on my 4ECM lecture, exposes few basic points of proof complexity in a way
accessible to any mathematician. In many parts of mathematics one finds statements …

Upslices, Downslices, and Secret-Sharing with Complexity of

B Applebaum, O Nir - Advances in Cryptology–CRYPTO 2021: 41st …, 2021 - Springer
A secret-sharing scheme allows to distribute a secret s among n parties such that only some
predefined “authorized” sets of parties can reconstruct the secret, and all other …

Towards breaking the exponential barrier for general secret sharing

T Liu, V Vaikuntanathan, H Wee - … on the Theory and Applications of …, 2018 - Springer
A secret-sharing scheme for a monotone Boolean (access) function F:{0, 1\}^ n → {0, 1\} is a
randomized algorithm that on input a secret, outputs n shares s_1, ..., s_n such that for any …