Proceedings 17th IEEE Annual Conference on Computational Complexity
DOI: 10.1109/ccc.2002.1004352
|View full text |Cite
|
Sign up to set email alerts
|

Streaming computation of combinatorial objects

Abstract: We prove (mostly tight) space lower bounds for "streaming" (or "on-line") computations of four fundamental combinatorial objects: error-correcting codes, universal hash functions, extractors, and dispersers. Streaming computations for these objects are motivated algorithmically by massive data set applications and complexity-theoretically by pseudorandomness and derandomization for spacebounded probabilistic algorithms.Our results reveal a surprising separation of extractors and dispersers in terms of the spac… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
17
1

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(18 citation statements)
references
References 47 publications
0
17
1
Order By: Relevance
“…Thus, in addition to the usual goals of minimizing d and maximizing m, we also wish to minimize t. Bar-Yossef, Reingold, Shaltiel, and Trevisan [12] studied a related notion of on-line extractors, which are required to be computable in small space in one pass. They show that space approximately m is necessary and sufficient to evaluate extractors with output length m. Since the smallspace requirement is weaker than being locally computable, their lower bound also applies here.…”
Section: Definition 4 ([9]) Ext : {0 1}mentioning
confidence: 99%
“…Thus, in addition to the usual goals of minimizing d and maximizing m, we also wish to minimize t. Bar-Yossef, Reingold, Shaltiel, and Trevisan [12] studied a related notion of on-line extractors, which are required to be computable in small space in one pass. They show that space approximately m is necessary and sufficient to evaluate extractors with output length m. Since the smallspace requirement is weaker than being locally computable, their lower bound also applies here.…”
Section: Definition 4 ([9]) Ext : {0 1}mentioning
confidence: 99%
“…Our SXE (Sample-extract-encrypt) MLE scheme is inspired by locallycomputable extractors [9,36,46] and the sample-then-extract paradigm [39,46]. The idea is to put a random subset of the message bits through an extractor to get a key used to encrypt the rest of the bits, and the only assumption made is a standard, ROR-secure symmetric encryption scheme.…”
Section: Theoretical Contributionsmentioning
confidence: 99%
“…In the first category we analyze existing schemes and new variants, breaking some and justifying others with proofs in the random-oracle-model (ROM) [16]. In the second category we address the challenging question of finding a standard-model MLE scheme, making connections with deterministic public-key encryption [11], correlated-input-secure hash functions [29] and locally-computable extractors [9,36,46] to provide schemes exhibiting different trade-offs between assumptions made and the message distributions for which security is proven. From our treatment MLE emerges as a primitive that combines practical impact with theoretical depth and challenges, making it well worthy of further study and a place in the cryptographic pantheon.…”
Section: Introductionmentioning
confidence: 99%
“…These are generally worst-case bounds, such as the work by [1]. Related to our applications is the work of [4] (see also [3]) on lower bounds for combinatorial objects such as hash functions and linear codes. We note that our model is different in that we give tight bounds for each single matrix A.…”
Section: Definition 12 (Streaming Rank Withmentioning
confidence: 99%