Noise-tolerant learning, the parity problem, and the statistical query model

From MaRDI portal
Publication:5899519

DOI10.1145/792538.792543zbMath1325.68114OpenAlexW2065151783MaRDI QIDQ5899519

Hal Wasserman, Adam Tauman Kalai, Avrim L. Blum

Publication date: 12 November 2015

Published in: Journal of the ACM (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1145/792538.792543




Related Items

Shortest vectors in lattices of Bai-Galbraith's embedding attack on the LWR problemCryptography from Learning Parity with NoiseBoolean ring cryptographic equation solvingOn the Power of Learning from k-Wise QueriesGarbling XOR gates ``for free in the standard modelCoded-BKW: Solving LWE Using Lattice CodesAn Improved BKW Algorithm for LWE with Applications to Cryptography and LatticesQuantum Algorithms to Solve the Hidden Shift Problem for Quadratics and for Functions of Large Gowers NormOn a dual/hybrid approach to small secret LWE. A dual/enumeration technique for learning with errors and application to security estimates of FHE schemesFiat-Shamir and correlation intractability from strong KDM-secure encryptionAdventures in crypto dark matter: attacks, fixes and analysis for weak pseudorandom functionsExtracting Computational Entropy and Learning Noisy Linear FunctionsA Ring-LWE-based digital signature inspired by Lindner-Peikert scheme\(\mathsf{Rubato}\): noisy ciphers for approximate homomorphic encryptionAsymptotically efficient lattice-based digital signaturesKey-recovery attacks on \(\mathsf{ASASA}\)Predicting the concrete security of LWE against the dual attack using binary searchFaster Dual Lattice Attacks for Solving LWE with Applications to CRYSTALSQuantum learning Boolean linear functions w.r.t. product distributionsOn the hardness of module learning with errors with short distributionsPolynomial‐time universality and limitations of deep learningA subexponential-time, polynomial quantum space algorithm for inverting the CM group actionOn the asymptotic complexity of solving LWESample-size-reduction of quantum states for the noisy linear problemFaster Fully Homomorphic Encryption: Bootstrapping in Less Than 0.1 SecondsNon-interactive secure computation of inner-product from LPN and LWEModeling and simulating the sample complexity of solving LWE using BKW-style algorithmsStatistically sender-private OT from LPN and derandomizationEfficient authentication from hard learning problemsHow to Encrypt with the LPN ProblemExplicit correlation amplifiers for finding outlier correlations in deterministic subquadratic timeAlgorithms for the approximate common divisor problemBKW meets Fourier new algorithms for LPN with sparse paritiesA complete characterization of statistical query learning with applications to evolvabilityA method of evaluating the security of Snow 2.0-like ciphers against correlation attacks over the finite extensions of two element fieldSecurity estimates of a ring-LWE symmetric cryptosystem against chosen plaintext attackSolving the learning parity with noise's open questionAgnostic Learning from Tolerant Natural ProofsOn the Complexity of Learning a Class Ratio from Unlabeled DataA new birthday-type algorithm for attacking the fresh re-keying countermeasureCPA/CCA2-secure PKE with squared-exponential DFR from low-noise LPNNew Algorithms for Learning in Presence of ErrorsOn the complexity of the BKW algorithm on LWEImproved Algorithms for the Approximate k-List Problem in Euclidean NormSome Recent Results on Local Testing of Sparse Linear CodesParallel and Concurrent Security of the HB and HB +  ProtocolsHomomorphic Evaluation Requires DepthFinding Correlations in Subquadratic Time, with Applications to Learning Parities and the Closest Pair ProblemImproved learning of \(k\)-paritiesAn improved algorithm for learning sparse parities in the presence of noiseParallel and concurrent security of the HB and \(HB^{+}\) protocolsBetter Key Sizes (and Attacks) for LWE-Based EncryptionQuantum algorithms for algebraic problemsSolving LPN using covering codesTFHE: fast fully homomorphic encryption over the torusBreaking the circuit size barrier for secure computation under quasi-polynomial LPNGeneralized Learning Problems and Applications to Non-commutative CryptographyAdventures in crypto dark matter: attacks and fixes for weak pseudorandom functionsHow (Not) to Instantiate Ring-LWECryptography with Auxiliary Input and Trapdoor from Constant-Noise LPNCryptography with constant input localityQuantum Hardness of Learning Shallow Classical CircuitsAlgebraic Aspects of Solving Ring-LWE, Including Ring-Based Improvements in the Blum--Kalai--Wasserman AlgorithmHardness of learning problems over Burnside groups of exponent 3Notes on computational hardness of hypothesis testing: predictions using the low-degree likelihood ratioThe Complexity of Public-Key CryptographyPseudorandom Functions: Three Decades LaterOptimal merging in quantum \(k\)-xor and \(k\)-sum algorithms




This page was built for publication: Noise-tolerant learning, the parity problem, and the statistical query model