Privacy-aware and security-enhanced efficient matchmaking encryption

J Sun, G Xu, T Zhang, X Yang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Data sharing technologies enable users to outsource data and privately share information
with arbitrary recipients without geographic barriers. However, existing efforts for secure …

Fredman's Trick Meets Dominance Product: Fine-Grained Complexity of Unweighted APSP, 3SUM Counting, and More

TM Chan, V Vassilevska Williams, Y Xu - Proceedings of the 55th …, 2023 - dl.acm.org
In this paper we carefully combine Fredman's trick [SICOMP'76] and Matoušek's approach
for dominance product [IPL'91] to obtain powerful results in fine-grained complexity. Under …

k-SUM in the Sparse Regime: Complexity and Applications

S Agrawal, S Saha, NI Schwartzbach… - Annual International …, 2024 - Springer
In the average-case k-SUM problem, given r integers chosen uniformly at random from {0,⋯,
M-1}, the objective is to find a “solution” set of k numbers that sum to 0 modulo M. In the …

New techniques for proving fine-grained average-case hardness

M Dalirrooyfard, A Lincoln… - 2020 IEEE 61st Annual …, 2020 - ieeexplore.ieee.org
The recent emergence of fine-grained cryptography strongly motivates develo** an
average-case analogue of Fine-Grained Complexity (FGC). Prior work [Goldreich-Rothblum …

Cryptography from sublinear-time average-case hardness of time-bounded Kolmogorov complexity

Y Liu, R Pass - Proceedings of the 53rd Annual ACM SIGACT …, 2021 - dl.acm.org
Let MK t P [s] be the set of strings x such that K t (x)≤ s (| x|), where K t (x) denotes the t-
bounded Kolmogorov complexity of the truthtable described by x. Our main theorem shows …

The fine-grained complexity of CFL reachability

P Koutris, S Deep - Proceedings of the ACM on Programming …, 2023 - dl.acm.org
Many problems in static program analysis can be modeled as the context-free language
(CFL) reachability problem on directed labeled graphs. The CFL reachability problem can …

Fine-Grained Non-interactive Key-Exchange Without Idealized Assumptions

Y Wang, C Su, J Pan - Annual International Cryptology Conference, 2024 - Springer
In this paper, we study multi-party non-interactive key exchange (NIKE) in the fine-grained
setting. More precisely, we propose three multi-party NIKE schemes in three computation …

Dynamic Dynamic Time War**

K Bringmann, N Fischer, I van der Hoog… - Proceedings of the 2024 …, 2024 - SIAM
Abstract The Dynamic Time War** (DTW) distance is a popular similarity measure for
polygonal curves (ie, sequences of points). It finds many theoretical and practical …

Worst-case to average-case reductions via additive combinatorics

VR Asadi, A Golovnev, T Gur, I Shinkar - Proceedings of the 54th Annual …, 2022 - dl.acm.org
We present a new framework for designing worst-case to average-case reductions. For a
large class of problems, it provides an explicit transformation of algorithms running in time T …

Improved Merlin–Arthur protocols for central problems in fine-grained complexity

S Akmal, L Chen, C **, M Raj, R Williams - Algorithmica, 2023 - Springer
Abstract In a Merlin–Arthur proof system, the proof verifier (Arthur) accepts valid proofs (from
Merlin) with probability 1, and rejects invalid proofs with probability arbitrarily close to 1. The …