Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Interleaved Group Products

Published: 01 January 2019 Publication History

Abstract

Let $G$ be the special linear group ${SL}(2,q)$. We show that if $(a_1,\ldots,a_t)$ and $(b_1,\ldots,b_t)$ are sampled uniformly from large subsets $A$ and $B$ of $G^t$, then their interleaved product $a_1 b_1 a_2 b_2 \cdots a_t b_t$ is nearly uniform over $G$. This extends a result of the first author [W. T. Gowers, Combin. Probab. Comput., 17 (2008), pp. 363--387], which corresponds to the independent case where $A$ and $B$ are product sets. We obtain a number of other results. For example, we show that if $X$ is a probability distribution on $G^m$ such that any two coordinates are uniform in $G^2$, then a pointwise product of $s$ independent copies of $X$ is nearly uniform in $G^m$, where $s$ depends on $m$ only. Extensions to other groups are also discussed. We obtain closely related results in communication complexity, which is the setting where some of these questions were first asked by Miles and Viola [Shielding circuits with groups, in ACM Symposium on the Theory of Computing (STOC), ACM, New York, 2013, pp. 251--260]. For example, suppose party $A_i$ of $k$ parties $A_1,\dots,A_k$ receives on its forehead a $t$-tuple $(a_{i1},\dots,a_{it})$ of elements from $G$. The parties are promised that the interleaved product $a_{11}\dots a_{k1}a_{12}\dots a_{k2}\dots a_{1t}\dots a_{kt}$ is equal either to the identity $e$ or to some other fixed element $g\in G$, and their goal is to determine which of the two the product is equal to. We show that for all fixed $k$ and all sufficiently large $t$ the communication is $\Omega(t \log |G|)$, which is tight. Even for $k=2$ the previous best lower bound was $\Omega(t)$. As an application, we establish the security of the leakage-resilient circuits studied by Miles and Viola [Shielding circuits with groups, in ACM Symposium on the Theory of Computing (STOC), ACM, New York, 2013, pp. 251--260] in the “only computation leaks” model.

References

[1]
A. Ada, A. Chattopadhyay, O. Fawzi, and P. Nguyen, The NOF multiparty communication complexity of composed functions, in Automata, Languages, and Programming. Part I, Lecture Notes in Comput. Sci. 7391, Springer, Heidelberg, 2012, pp. 13--24.
[2]
A. Ambainis, Upper bounds on multiparty communication complexity of shifts, in Symposium on Theoretical Aspects of Computer Science (STACS), Lecture Notes in Comput. Sci. 1046, Springer, Berlin, 1996, pp. 631--642.
[3]
A. Ambainis and S. V. Lokam, Improved upper bounds on the simultaneous messages complexity of the generalized addressing function, in Latin American Symposium on Theoretical Informatics (LATIN), 2000, pp. 207--216.
[4]
B. Applebaum, Y. Ishai, and E. Kushilevitz, Cryptography in NC$^0$, SIAM J. Comput., 36 (2006), pp. 845--888, https://doi.org/10.1137/S0097539705446950.
[5]
L. Babai, Random oracles separate PSPACE from the polynomial-time hierarchy, Inform. Process. Lett., 26 (1987), pp. 51--53.
[6]
L. Babai, A. Gál, P. G. Kimmel, and S. V. Lokam, Communication complexity of simultaneous messages, SIAM J. Comput., 33 (2003), pp. 137--166, https://doi.org/10.1137/S0097539700375944.
[7]
L. Babai, N. Nikolov, and L. Pyber, Product growth and mixing in finite groups, in Proceedings of the Nineteenth Annual ACM-SIAM Symposium on Discrete Algorithms (SODA), 2008, pp. 248--257.
[8]
L. Babai, N. Nisan, and M. Szegedy, Multiparty protocols, pseudorandom generators for logspace, and time-space trade-offs, J. Comput. System Sci., 45 (1992), pp. 204--232.
[9]
D. A. Mix Barrington, Bounded-width polynomial-size branching programs recognize exactly those languages in NC$^1$, J. Comput. System Sci., 38 (1989), pp. 150--164.
[10]
M. Ben-Or and R. Cleve, Computing algebraic formulas using a constant number of registers, SIAM J. Comput., 21 (1992), pp. 54--58, https://doi.org/10.1137/0221006.
[11]
A. K. Chandra, M. L. Furst, and R. J. Lipton, Multi-party protocols, in 15th ACM Symposium on the Theory of Computing (STOC), 1983, pp. 94--99.
[12]
A. Chattopadhyay and M. E. Saks, The power of super-logarithmic number of players, in Workshop on Randomization and Computation (RANDOM), Leibniz-Zent. Inform., Wadern, 2014, pp. 596--603.
[13]
B. Chor and O. Goldreich, Unbiased bits from sources of weak randomness and probabilistic communication complexity, SIAM J. Comput., 17 (1988), pp. 230--261, https://doi.org/10.1137/0217015.
[14]
F. R. K. Chung and P. Tetali, Communication complexity and quasi randomness, SIAM J. Discrete Math., 6 (1993), pp. 110--123, https://doi.org/10.1137/0406009.
[15]
S. A. Cook and P. McKenzie, Problems complete for deterministic logarithmic space, J. Algorithms, 8 (1987), pp. 385--394.
[16]
L. Dornhoff, Group Representation Theory. Part A: Ordinary Representation Theory, Pure and Applied Mathematics 7, Marcel Dekker, New York, 1971.
[17]
S. Faust, T. Rabin, L. Reyzin, E. Tromer, and V. Vaikuntanathan, Protecting circuits from leakage: The computationally-bounded and noisy cases, in International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2010, pp. 135--156.
[18]
U. Feige, J. Kilian, and M. Naor, A minimal model for secure computation (extended abstract), in ACM Symposium on the Theory of Computing (STOC), 1994, pp. 554--563.
[19]
S. Goldwasser, D. Gutfreund, A. Healy, T. Kaufman, and G. Rothblum, A (de)constructive approach to program checking, in Proceedings of the 40th ACM Symposium on Theory of Computing (STOC), 2008, pp. 143--152.
[20]
S. Goldwasser and G. N. Rothblum, How to compute in the presence of leakage, SIAM J. Comput., 44 (2015), pp. 1480--1549.
[21]
W. T. Gowers, Quasirandom groups, Combin. Probab. Comput., 17 (2008), pp. 363--387.
[22]
W. T. Gowers and E. Viola, The multiparty communication complexity of interleaved group products, in Proceedings of the 57th Annual Symposium on Foundations of Computer Science, New Brunswick, New Jersey, IEEE, Piscataway, NJ, 2016, pp. 289--294.
[23]
W. T. Gowers and E. Viola, The communication complexity of interleaved group products, in ACM Symposium on the Theory of Computing (STOC), 2015.
[24]
V. Grolmusz, The BNS lower bound for multi-party protocols in nearly optimal, Inform. and Comput., 112 (1994), pp. 51--54.
[25]
N. Immerman and S. Landau, The complexity of iterated multiplication, Inform. and Comput., 116 (1995), pp. 103--116.
[26]
Y. Ishai, A. Sahai, and D. Wagner, Private circuits: Securing hardware against probing attacks, in International Cryptology Conference (CRYPTO), 2003, pp. 463--481.
[27]
J. Kilian, Founding cryptography on oblivious transfer, in ACM Symposium on the Theory of Computing (STOC), 1988, pp. 20--31.
[28]
K. Krohn, W. D. Maurer, and J. Rhodes, Realizing complex Boolean functions with simple groups, Information and Control, 9 (1966), pp. 190--195.
[29]
E. Kushilevitz and N. Nisan, Communication Complexity, Cambridge University Press, Cambridge, UK, 1997.
[30]
S. Lang and A. Weil, Number of points of varieties in finite fields, Amer. J. Math., 76 (1954), pp. 819--827.
[31]
S. Micali and L. Reyzin, Physically observable cryptography, in Theory of Cryptography Conference (TCC), 2004, pp. 278--296.
[32]
E. Miles, Iterated group products and leakage resilience against $NC^1$, in Proceedings of the 5th Conference on Innovations in Theoretical Computer Science Conference (ITCS), 2014, pp. 261--268.
[33]
E. Miles and E. Viola, Shielding circuits with groups, in ACM Symposium on the Theory of Computing (STOC), ACM, New York, 2013, pp. 251--260.
[34]
P. Pudlák, V. Rödl, and J. Sgall, Boolean circuits, tensor ranks, and communication complexity, SIAM J. Comput., 26 (1997), pp. 605--633, https://doi.org/10.1137/S0097539794264809.
[35]
R. Raz, The BNS-Chung criterion for multi-party communication complexity, Comput. Complexity, 9 (2000), pp. 113--122.
[36]
W. Schmidt, Equations Over Finite Fields: An Elementary Approach, Kendrick Press, Heber City, UT, 2004.
[37]
A. Shalev, Mixing and generation in simple groups, J. Algebra, 319 (2008), pp. 3075--3086.
[38]
A. Shalev, Mixing, communication complexity and conjectures of Gowers and Viola, Combin. Probab. Comput., 26 (2017), pp. 628--640.
[39]
E. Viola and A. Wigderson, Norms, XOR lemmas, and lower bounds for polynomials and protocols, Theory Comput, 4 (2008), pp. 137--168.
[40]
A. Chi-Chih Yao, Some complexity questions related to distributive computing, in Proceedings of the 11th ACM Symposium on the Theory of Computing (STOC), 1979, pp. 209--213.

Index Terms

  1. Interleaved Group Products
      Index terms have been assigned to the content through auto-classification.

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image SIAM Journal on Computing
      SIAM Journal on Computing  Volume 48, Issue 2
      DOI:10.1137/smjcat.48.2
      Issue’s Table of Contents

      Publisher

      Society for Industrial and Applied Mathematics

      United States

      Publication History

      Published: 01 January 2019

      Author Tags

      1. iterated group products
      2. communication complexity
      3. mixing
      4. interleaved group product
      5. special linear group
      6. conjugacy class
      7. representation theory
      8. quasi-random group

      Author Tags

      1. 05D05
      2. 20C15
      3. 68Q17

      Qualifiers

      • Research-article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • 0
        Total Citations
      • 0
        Total Downloads
      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 16 Oct 2024

      Other Metrics

      Citations

      View Options

      View options

      Get Access

      Login options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media