Tales of Obfuscation in Bounded Arithmetic, Metacomplexity, and Differential Privacy
Rahul Ilango (MIT) https://simons.berkeley.edu/talks/rahul-ilango-mit-2023-05-03 Minimal Complexity Assumptions for Cryptography In this talk, I will discus...
About this video
Rahul Ilango (MIT)
https://simons.berkeley.edu/talks/rahul-ilango-mit-2023-05-03
Minimal Complexity Assumptions for Cryptography
In this talk, I will discuss three recent results that use obfuscation to answer open questions in various areas of theoretical computer science, including bounded arithmetic, derandomization, metacomplexity, average-case complexity, and differential privacy. This talk will focus on giving a brief overview of these results and connections, emphasizing intuition and ideas. Below is a short description of each result.
The first work is about Circuit Range Avoidance (Avoid), a problem where the goal is to output a string outside the range of a given length-expanding circuit. While there is a simple randomized algorithm for Avoid (output a random string), the existence of an efficient deterministic algorithm for Avoid was a tantalizing open question with many applications, including explicit constructions of highly rigid matrices. We show there is *no* efficient deterministic algorithm for Avoid assuming indistinguishability obfuscation (iO) and that NP does not equal coNP. Building on this, we answer an open question in bounded arithmetic. Specifically, we give the first separation of Cook's theory PV1 from Jeřábek's theory APC1 under plausible assumptions.
The second work studies a problem in metacomplexity: the task of computing conditional time-bounded Kolmogorov complexity. Recently, Hirahara showed that proving this problem is NP-hard in the "superlinear regime" would eliminate Heuristica (where SAT average-case easy but worst-case hard). This naturally leads to the question: should we expect this problem to be NP-hard? We show that if iO exists, then this problem is indeed NP-hard under *black-box* polynomial-time reductions. Furthermore, we use constructions in the generic multilinear map model to show *unconditionally* near-optimal NP-hardness of approximation in the "sublinear" regime.
The last work focuses on differential privacy. Differential privacy is usually studied with an all-powerful adversary. A longstanding open question is whether, by relaxing the adversary to be computational instead of statistical, one can accomplish tasks (in the usual client-server setting) that were previously impossible. We give the first construction of such a task under any plausible assumption. Specifically, our assumptions involve the existence of differing inputs obfuscation and keyless collision-resistant hash functions. Previously, even a candidate for such a task was unknown.
This talk is based on joint works with Badih Ghazi, Yizhi Huang, Pritish Kamath, Ravi Kumar, Jiatu Li, Pasin Manurangsi, Hanlin Ren, and Ryan Williams.
Tags and Topics
This video is tagged with the following topics. Click any tag to explore more related content and discover similar videos:
#Simons Institute #theoretical computer science #UC Berkeley #Computer Science #Theory of Computation #Theory of Computing #Minimal Complexity Assumptions for Cryptography #Rahul Ilango
Tags help categorize content and make it easier to find related videos. Browse our collection to discover more content in these categories.
Video Information
Views
381
Total views since publication
Likes
6
User likes and reactions
Duration
47:31
Video length
Published
May 4, 2023
Release date
Quality
hd
Video definition
Captions
Available
Subtitles enabled
About the Channel
Related Trending Topics
LIVE TRENDSThis video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!
THIS VIDEO IS TRENDING!
This video is currently trending in Sweden under the topic 'me'.