Proceedings of the Fourteenth Annual ACM-SIAM Symposium on Discrete Algorithms 2020
DOI: 10.1137/1.9781611975994.21
|View full text |Cite
|
Sign up to set email alerts
|

Computational Concentration of Measure: Optimal Bounds, Reductions, and More

Abstract: Product measures of dimension n are known to be "concentrated" under Hamming distance. More precisely, for any set S in the product space of probability Pr[S] ≥ ε, a random point in the space, with probability 1 − δ, has a neighbor in S that is different from the original point in only O( n · ln( 1 /εδ)) coordinates (and this is optimal). In this work, we obtain the tight computational (algorithmic) version of this result, showing how given a random point and access to an S-membership query oracle, we can find… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
2
2

Relationship

3
6

Authors

Journals

citations
Cited by 12 publications
(8 citation statements)
references
References 16 publications
0
8
0
Order By: Relevance
“…There are also previous theoretical works studying instance-targeted poisoning attacks that only use clean labels [Mahloujifar and Mahmoody, 2017, Etesami et al, 2020. The work of Shafahi et al [2018] studied such attacks from a more practical and empirical perspective.…”
Section: Related Workmentioning
confidence: 99%
“…There are also previous theoretical works studying instance-targeted poisoning attacks that only use clean labels [Mahloujifar and Mahmoody, 2017, Etesami et al, 2020. The work of Shafahi et al [2018] studied such attacks from a more practical and empirical perspective.…”
Section: Related Workmentioning
confidence: 99%
“…Tauman Kalai, Komargodski, and Raz [24] fully answered the single-turn case by proving that no singleturn protocol is resilient to Ω( √ n) adaptive corruptions. Lastly, Etesami, Mahloujifar, and Mahmoody [13] presented an efficient and optimal strongly adaptive attack on protocols of certain properties (e.g., public coins). On a related note, Kalai and Komargodski [18] showed that for any ℓ-party n-round coin-flipping protocol there exists a related ℓ-party n-round protocol of the same communication pattern, output distribution and security guarantees, but of message length polylog(ℓ, n).…”
Section: Full-information Coin Flipmentioning
confidence: 99%
“…However, the above o(1) stands for 1/ loglog(ℓ), and it remains an intriguing question whether it can be pushed to 2 −polylog(ℓ) as can be achieved, for instance, when attacking the ℓ-party majority protocol. Such attacks are known for uniform single-bit single-turn protocols (a secondary result of [24]) and for strongly adaptive attackers against single-turn protocols [13].…”
Section: Open Questionsmentioning
confidence: 99%
“…These hardness of computation results for the coin-tossing functionality extend to other general functionalities as well. Furthermore, the research outcomes for this functionality has direct consequences on diverse topics in mathematics and computer science—for example, extremal graph theory [ 3 , 4 , 5 ], extracting randomness from imperfect sources [ 6 , 7 , 8 , 9 ], cryptography [ 10 , 11 , 12 , 13 , 14 , 15 , 16 ], game theory [ 17 , 18 ], circuit representation [ 19 , 20 , 21 ], distributed protocols [ 22 , 23 , 24 ], and poisoning and evasion attacks on learning algorithms [ 25 , 26 , 27 , 28 ].…”
Section: Introductionmentioning
confidence: 99%