|
lundi 1 décembre
1
|
mardi 2 décembre
2
-
15 h 15 min – 16 h 15 min
Joël Felderhoff, «A Gaussian Leftover Hash Lemma for Modules over Number Fields»
15 h 15 min – 16 h 15 min Joël Felderhoff, «A Gaussian Leftover Hash Lemma for Modules over Number Fields» bât 4 salle séminaire Given a Gaussian matrix X, a Gaussian Leftover Hash Lemma (LHL) states that X*v for a Gaussian v is an essentially independent Gaussian sample. It has seen numerous applications in cryptography for hiding sensitive distributions of v. We generalise the Gaussian LHL initially stated over ZZ by Agrawal, Gentry, Halevi, and Sahai (2013) to modules over number fields. Our results have a sub-linear dependency on the degree of the number field and require only polynomial norm growth: ||v||/||X||. To this end, we also proof when X is surjective (assuming the Generalised Riemann Hypothesis) and give bounds on the smoothing parameter of the kernel of X. We also establish when the resulting distribution is independent of the geometry of X and establish the hardness of the k-SIS and k-LWE problems over modules based on the hardness of SIS and LWE over modules, which was assumed without proof in prior works.
|
mercredi 3 décembre
3
|
jeudi 4 décembre
4
|
vendredi 5 décembre
5
|
samedi 6 décembre
6
|
dimanche 7 décembre
7
|
|
lundi 8 décembre
8
|
mardi 9 décembre
9
-
11 h 45 min
Michael Poss, «Robust Extensible Bin Packing and Revisiting the Convex Knapsack Problem»
11 h 45 min – 11 h 45 min Michael Poss, «Robust Extensible Bin Packing and Revisiting the Convex Knapsack Problem» E3.24 We study a robust extensible bin packing problem with budgeted uncertainty, under a budgeted uncertainty model where item sizes are defined to lie in the intersection of a box with a one-norm ball. We propose a scenario generation algorithm for this problem, which alternates between solving a master robust bin-packing problem with a finite uncertainty set and solving a separation problem. We first show that the separation is strongly NP-hard given solutions to the continuous relaxation of the master problem. Then, focusing on the separation problem for the integer master problem, we show that this problem becomes a special case of the continuous convex knapsack problem, which is known to be weakly NP-hard. Next, we prove that our special case when each of the functions is piecewise linear, having only two pieces, remains NP-hard. We develop a pseudo-polynomial dynamic program (DP) and a fully polynomial-time approximation scheme (FPTAS) for our special case whose running times match those of a binary knapsack FPTAS. Finally, our computational study shows that the DP can be significantly more efficient in practice compared with solving the problem with specially ordered set (SOS) constraints using advanced mixed-integer (MIP) solvers. Our experiments also demonstrate the application of our separation problem method to solving the robust extensible bin packing problem, including the evaluation of deferring the exact solution of the master problem, separating based on approximate master solutions in intermediate iterations. Finally, a case-study, based on real elective surgery data, demonstrates the potential advantage of our model compared with the actual schedule and optimal nominal schedules.
Joint work with Noam Goldberg (Ben-Gurion University of the Negev) and Yariv Marmor (ORT Braude College of Engineering)
-
17 h 00 min – 18 h 00 min
Antoine Leudière, «From elliptic curves to Drinfeld modules»
17 h 00 min – 18 h 00 min Antoine Leudière, «From elliptic curves to Drinfeld modules» Elliptic curves play a critical role in certain practical applications: cryptography, computer algebra. They are one of the main tools in number theory and for the arithmetic of characteristic zero objects like number fields. A class of objects was invented specifically to play the role of elliptic curves in the arithmetic of positive characteristic and function fields: that of Drinfeld modules.
Our goal is to present the main ideas of the theory Drinfeld modules, the analogies with elliptic curves, and to motivate Drinfeld modules as credible alternatives to elliptic curves for certain applications: coding theory and computer algebra.
We illustrate this through the example of a point counting algorithm for Drinfeld modules. It requires techniques (Anderson motives) that are novel in algorithmic context. This is joint work with Xavier Caruso.
Finally, I will touch upon a research program on the algorithms of Drinfeld modules and their applications, as well as integration within the team.
|
mercredi 10 décembre
10
-
10 h 00 min – 11 h 00 min
Bruno Loff, «The natural-proofs barrier against data structure lower bounds»
10 h 00 min – 11 h 00 min Bruno Loff, «The natural-proofs barrier against data structure lower bounds» bât 4 salle séminaire Consider a data structure problem with possible data coming from a set
$\mathcal D$, queries coming from a set $\mathcal Q$, and in the dynamic
case updates coming from a set $\mathcal U$. Then, the current state of
the art in data structure lower bounds is
$t = \tilde\Omega(\log |\mathcal Q|)$ for static data structure
problems, and
$\max(t_{\mathrm q},t_{\mathrm u}) = \tilde\Omega((\log n)^2)$ where
$n = \max(|\mathcal Q|,|\mathcal U|,\log |\mathcal D|)$ for dynamic.
We port Razborov and Rudich’s natural-proofs framework to the setting of
static and dynamic data structures in the cell probe model, in a way
that strongly suggests this state of the art is unlikely to be improved
anytime soon. A similar direction was recently taken also by Korten,
Pitassi and Impagliazzo (FOCS 2025) who look at static data structure
lower bounds in a different regime of parameters. Our contribution is:
– We define notions analogous to pseudorandom functions (PRF). We call
these primitives *local PRFs*, in the context of static data
structures, and *local and locally updatable (LLU) PRFs*, in the
context of dynamic data structures.
– We then formulate cryptographic conjectures, namely, that secure
local PRFs and secure LLU PRFs exist, precisely at the frontier
where we are no longer able to prove static, respectively dynamic,
data structure lower bounds. If these conjectures are true, it
follows that the current state of the art in data structure lower
bounds cannot be improved by a natural proof.
– We show that (almost) every single known data structure lower bound
proof is a natural proof, by surveying all lower bounds in the
literature (known to us). (The only exception is proofs based on
lifting theorems.)
– It follows that, if our cryptographic conjecture is true, then all
known lower bound proof techniques (minus the two exceptions) are
unable to improve upon the state of the art. (We also present
obstacles for the two exceptions.)
– Further, we provide concrete candidate constructions for our two
pseudo-random primitives. We conjecture that our constructions are
secure for parameters just above the state-of-the-art lower bounds.
– We also show that, whether or not they are secure, our candidate
PRFs at least satisfy the natural properties appearing in all (but
one) known proofs.
– So if one is interested in improving upon the state of the art in
static or dynamic data structure lower bounds, one must either find
a non-natural method of proving such lower bounds (no such method
currently exists), or one may as well begin by trying to break our
PRF candidates.
|
jeudi 11 décembre
11
|
vendredi 12 décembre
12
|
samedi 13 décembre
13
|
dimanche 14 décembre
14
|