×

Worst-case to average case reductions for the distance to a code. (English) Zbl 1441.68035

Servedio, Rocco A. (ed.), 33rd computational complexity conference, CCC 2018, June 22–24, 2018, San Diego, California, USA. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 102, Article 24, 23 p. (2018).
Summary: Algebraic proof systems reduce computational problems to problems about estimating the distance of a sequence of functions \(\vec{u}=(u_1,\dots, u_k)\), given as oracles, from a linear error correcting code \(V\). The soundness of such systems relies on methods that act “locally” on \(\vec{u}\) and map it to a single function \(u^*\) that is, roughly, as far from \(V\) as are \(u_1,\dots,u_k\).
Motivated by these applications to efficient proof systems, we study a natural worst-case to average-case reduction of distance for linear spaces, and show several general cases in which the following statement holds: If some member of a linear space \(U=\mathsf{span}(u_1,\dots,u_k)\) is \(\delta\)-far from (all elements) of \(V\) in relative Hamming distance, then nearly all elements of \(U\) are \((1-\epsilon)\delta\)-far from \(V\); the value of \(\epsilon\) depends only on the distance of the code \(V\) and approaches 0 as that distance approaches 1. Our results improve on the previous state-of-the-art which showed that nearly all elements of \(U\) are \(\frac{1}{2}\delta\)-far from \(V\) [G. N. Rothblum et al., in: Proceedings of the 45th annual ACM symposium on theory of computing, STOC ’13. New York, NY: Association for Computing Machinery (ACM). 793–802 (2013; Zbl 1293.68250)].
When \(V\) is a Reed-Solomon (RS) code, as is often the case for algebraic proof systems, we show how to boost distance via a new “local” transformation that may be useful elsewhere. Relying on the affine-invariance of \(V\), we map a vector \(u\) to a random linear combination of affine transformations of \(u\), and show this process amplifies distance from \(V\). Assuming \(V\) is an RS code with sufficiently large distance, this amplification process converts a function \(u\) that is somewhat far from \(V\) to one that is \((1-\epsilon)\)-far from \(V\); as above, \(\epsilon\) depends only on the distance of \(V\) and approaches 0 as the distance of \(V\) approaches 1.
We give two concrete application of these techniques. First, we revisit the axis-parallel low-degree test for bivariate polynomials of A. Polishchuk and D. A. Spielman [in: Proceedings of the 26th annual ACM symposium on theory of computing, STOC ’94, Montreal, Canada, May 23–25, 1994. New York, NY: Association for Computing Machinery (ACM). 194–203 (1994; Zbl 1345.68180)] and prove a “list-decoding” type result for it, when the degree of one axis is extremely small. This result is similar to the recent list-decoding-regime result of A. Chiesa et al. [“On axis-parallel tests for tensor product codes”, LIPIcs – Leibniz Int. Proc. Inform. 81, Article 39, 22 p. (2017; doi:10.4230/LIPIcs.APPROX-RANDOM.2017.39)] but is proved using different techniques, and allows the degree in one axis to be arbitrarily large. Second, we improve the soundness analysis of the recent RS proximity testing protocol of E. Ben-Sasson et al. [“Fast Reed-Solomon interactive oracle proofs of proximity”, LIPIcs – Leibniz Int. Proc. Inform. 107, Article 14, 17 p. (2018; doi:10.4230/LIPIcs.ICALP.2018.14)] and extend it to the “list-decoding” regime, bringing it closer to the Johnson bound.
For the entire collection see [Zbl 1390.68026].

MSC:

68P30 Coding and information theory (compaction, compression, models of communication, encoding schemes, etc.) (aspects in computer science)
94B05 Linear codes (general theory)

Software:

Ligero
Full Text: DOI

References:

[1] Scott Ames, Carmit Hazay, Yuval Ishai, and Muthuramakrishnan Venkitasubramaniam. Ligero: Lightweight sublinear arguments without a trusted setup. In {\it Proceedings of the} {\it 24th ACM Conference on Computer and Communications Security}, October 2017.
[2] Sanjeev Arora, Carsten Lund, Rajeev Motwani, Madhu Sudan, and Mario Szegedy. Proof verification and the hardness of approximation problems. {\it Journal of the ACM}, 45(3):501- 555, 1998. Preliminary version in FOCS ’92. · Zbl 1065.68570
[3] Sanjeev Arora and Shmuel Safra. Probabilistic checking of proofs: a new characterization of NP. {\it Journal of the ACM}, 45(1):70-122, 1998. Preliminary version in FOCS ’92. · Zbl 0903.68076
[4] Sanjeev Arora and Madhu Sudan. Improved low-degree testing and its applications. {\it Com-} {\it binatorica}, 23(3):365-426, 2003. Preliminary version appeared in STOC ’97. · Zbl 1101.68572
[5] László Babai, Lance Fortnow, Leonid A. Levin, and Mario Szegedy. Checking computations in polylogarithmic time. In {\it Proceedings of the 23rd Annual ACM Symposium on Theory of} {\it Computing}, STOC ’91, pages 21-32, 1991.
[6] László Babai, Lance Fortnow, and Carsten Lund. Nondeterministic exponential time has two-prover interactive protocols. In {\it Proceedings of the 31st Annual Symposium on Found-} {\it ations of Computer Science}, SFCS ’90, pages 16-25, 1990.
[7] László Babai and Shlomo Moran. Arthur-merlin games: A randomized proof system, and a hierarchy of complexity classes. {\it J. Comput. Syst. Sci.}, 36(2):254-276, 1988. doi:10.1016/ 0022-0000(88)90028-1. · Zbl 0652.03029
[8] Eli Ben-Sasson, Iddo Bentov, Yinon Horesh, and Michael Riabzev. Scalable, transparent, and post-quantum secure computational integrity. Cryptology ePrint Archive, Report 2018/046, 2018. Available at https://eprint.iacr.org/2018/046.
[9] Eli Ben-Sasson, Iddo Bentov, Ynon Horesh, and Michael Riabzev. Fast Reed-Solomon Interactive Oracle Proofs of Proximity. In {\it Proceedings of the 45th International Colloquium on} {\it Automata, Languages, and Programming (ICALP)}, 2018. URL: https://eccc.weizmann. ac.il/report/2017/134. · Zbl 1499.68141
[10] Eli Ben-Sasson, Alessandro Chiesa, Michael A. Forbes, Ariel Gabizon, Michael Riabzev, and Nicholas Spooner. On probabilistic checking in perfect zero knowledge. {\it Electronic} {\it Colloquium on Computational Complexity (ECCC)}, 23:156, 2016.URL: http://eccc. hpi-web.de/report/2016/156.
[11] Eli Ben-Sasson, Alessandro Chiesa, Ariel Gabizon, and Madars Virza. Quasilinear-size zero knowledge from linear-algebraic PCPs. In {\it Proceedings of the 13th Theory of Cryptography} {\it Conference}, TCC ’16, pages 33-64, 2016. · Zbl 1375.94101
[12] Eli Ben-Sasson, Alessandro Chiesa, and Nicholas Spooner. Interactive oracle proofs. In Martin Hirt and Adam D. Smith, editors, {\it Theory of Cryptography - 14th International} {\it Conference, TCC 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings,} {\it Part II}, volume 9986 of {\it Lecture Notes in Computer Science}, pages 31-60, 2016.doi: 10.1007/978-3-662-53644-5_2. · Zbl 1397.94048
[13] Alessandro Chiesa, Peter Manohar, and Igor Shinkar. On axis-parallel tests for tensor product codes. In Klaus Jansen, José D. P. Rolim, David Williamson, and Santosh Srinivas Vempala, editors, {\it Approximation, Randomization, and Combinatorial Optimization. Al-} {\it gorithms and Techniques, APPROX/RANDOM 2017, August 16-18, 2017, Berkeley, CA,} {\it USA}, volume 81 of {\it LIPIcs}, pages 39:1-39:22. Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, 2017. doi:10.4230/LIPIcs.APPROX-RANDOM.2017.39. · Zbl 1467.68211
[14] Shafi Goldwasser, Silvio Micali, and Charles Rackoff. The knowledge complexity of interactive proof systems. {\it SIAM Journal on Computing}, 18(1):186-208, 1989. Preliminary version appeared in STOC ’85. · Zbl 0677.68062
[15] Venkatesan Guruswami. Algorithmic results in list decoding. {\it Foundations and Trends in} {\it Theoretical Computer Science}, 2(2), 2006. doi:10.1561/0400000007.
[16] Prahladh Harsha and Madhu Sudan. Small PCPs with low query complexity. {\it Computa-} {\it tional Complexity}, 9(3-4):157-201, Dec 2000. Preliminary version in STACS ’01. · Zbl 0986.68134
[17] Carsten Lund, Lance Fortnow, Howard J. Karloff, and Noam Nisan. Algebraic methods for interactive proof systems. {\it Journal of the ACM}, 39(4):859-868, 1992. · Zbl 0799.68097
[18] Alexander Polishchuk and Daniel A. Spielman. Nearly-linear size holographic proofs. In {\it Proceedings of the 26th Annual ACM Symposium on Theory of Computing}, STOC ’94, pages 194-203, 1994. · Zbl 1345.68180
[19] Guy N. Rothblum, Salil Vadhan, and Avi Wigderson.Interactive proofs of proximity: delegating computation in sublinear time. In {\it Proceedings of the forty-fifth annual ACM} {\it symposium on Theory of computing}, pages 793-802. ACM, 2013. · Zbl 1293.68250
[20] :23
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.