On differential privacy and adaptive data analysis with bounded space

I Dinur, U Stemmer, DP Woodruff, S Zhou - … International Conference on …, 2023 - Springer
We study the space complexity of the two related fields of differential privacy and adaptive
data analysis. Specifically, Under standard cryptographic assumptions, we show that there …

Memory-sample lower bounds for learning parity with noise

S Garg, PK Kothari, P Liu, R Raz - arxiv preprint arxiv:2107.02320, 2021 - arxiv.org
In this work, we show, for the well-studied problem of learning parity under noise, where a
learner tries to learn $ x=(x_1,\ldots, x_n)\in\{0, 1\}^ n $ from a stream of random linear …

Time-space tradeoffs for distinguishing distributions and applications to security of goldreich's PRG

S Garg, PK Kothari, R Raz - arxiv preprint arxiv:2002.07235, 2020 - arxiv.org
In this work, we establish lower-bounds against memory bounded algorithms for
distinguishing between natural pairs of related distributions from samples that arrive in a …

Memory-tight multi-challenge security of public-key encryption

J Jaeger, A Kumar - International Conference on the Theory and …, 2022 - Springer
We give the first examples of public-key encryption schemes which can be proven to
achieve multi-challenge, multi-user CCA security via reductions that are tight in time …

Hiding in plain sight: memory-tight proofs via randomness programming

A Ghoshal, R Ghosal, J Jaeger, S Tessaro - … International Conference on …, 2022 - Springer
This paper continues the study of memory-tight reductions (Auerbach et al., CRYPTO'17).
These are reductions that only incur minimal memory costs over those of the original …

[КНИГА][B] Tradeoffs in Cryptography

A Ghoshal - 2023 - search.proquest.com
The primary objective of provable security is to characterize, as precisely as possible, the
resources an attacker needs to compromise the security of a cryptographic system. While the …