Random-Self-Reducibility of Complete Sets
Abstract
MSC codes
Keywords
Get full access to this article
View all available purchase options and get full access to this article.
References
Information & Authors
Information
Published In
Copyright
History
MSC codes
Keywords
Authors
Metrics & Citations
Metrics
Citations
If you have the appropriate software installed, you can download article citation data to the citation manager of your choice. Simply select your manager software from the list below and click Download.
Cited By
- On Building Fine-Grained One-Way Functions from Strong Average-Case HardnessJournal of Cryptology, Vol. 38, No. 1 | 4 December 2024
- Planted Clique Conjectures Are EquivalentProceedings of the 56th Annual ACM Symposium on Theory of Computing | 11 June 2024
- Non-Black-Box Worst-Case to Average-Case Reductions Within \(\mathsf{NP}\)SIAM Journal on Computing, Vol. 52, No. 6 | 15 December 2023
- The Power of Natural Properties as Oraclescomputational complexity, Vol. 32, No. 2 | 6 July 2023
- SAT Reduces to the Minimum Circuit Size Problem with a Random Oracle2023 IEEE 64th Annual Symposium on Foundations of Computer Science (FOCS) | 6 Nov 2023
- Capturing One-Way Functions via NP-Hardness of Meta-ComplexityProceedings of the 55th Annual ACM Symposium on Theory of Computing | 2 June 2023
- NP-Hardness of Approximating Meta-Complexity: A Cryptographic ApproachProceedings of the 55th Annual ACM Symposium on Theory of Computing | 2 June 2023
- When Arthur Has Neither Random Coins Nor Time to Spare: Superfast Derandomization of Proof SystemsProceedings of the 55th Annual ACM Symposium on Theory of Computing | 2 June 2023
- Is it possible to improve Yao’s XOR lemma using reductions that exploit the efficiency of their oracle?computational complexity, Vol. 32, No. 1 | 23 May 2023
- New Approach for Sine and Cosine in Secure Fixed-Point ArithmeticCyber Security, Cryptology, and Machine Learning | 21 June 2023
- NP-Hardness of Learning Programs and Partial MCSP2022 IEEE 63rd Annual Symposium on Foundations of Computer Science (FOCS) | 1 Oct 2022
- Worst-case to average-case reductions via additive combinatoricsProceedings of the 54th Annual ACM SIGACT Symposium on Theory of Computing | 10 June 2022
- Computational barriers to estimation from low-degree polynomialsThe Annals of Statistics, Vol. 50, No. 3 | 1 Jun 2022
- On Worst-Case Learning in Relativized Heuristica2021 IEEE 62nd Annual Symposium on Foundations of Computer Science (FOCS) | 1 Feb 2022
- On Building Fine-Grained One-Way Functions from Strong Average-Case HardnessAdvances in Cryptology – EUROCRYPT 2022 | 25 May 2022
- The Average-Case Complexity of Counting Cliques in Erdös--Rényi HypergraphsSIAM Journal on Computing, Vol. 0, No. 0 | 14 September 2021
- Average-case hardness of NP from exponential worst-case hardness assumptionsProceedings of the 53rd Annual ACM SIGACT Symposium on Theory of Computing | 15 June 2021
- Guest ColumnACM SIGACT News, Vol. 52, No. 1 | 16 March 2021
- Characterizing Average-Case Complexity of PH by Worst-Case Meta-Complexity2020 IEEE 61st Annual Symposium on Foundations of Computer Science (FOCS) | 1 Nov 2020
- Is it Easier to Prove Theorems that are Guaranteed to be True?2020 IEEE 61st Annual Symposium on Foundations of Computer Science (FOCS) | 1 Nov 2020
- On Basing One-way Permutations on NP-hard Problems under Quantum ReductionsQuantum, Vol. 4 | 27 August 2020
- On Nonadaptive Reductions to the Set of Random Strings and Its Dense SubsetsComplexity and Approximation | 21 February 2020
- Worst-Case to Average-Case Reductions for Subclasses of PComputational Complexity and Property Testing | 4 April 2020
- The Average-Case Complexity of Counting Cliques in Erdős-Rényi Hypergraphs2019 IEEE 60th Annual Symposium on Foundations of Computer Science (FOCS) | 1 Nov 2019
- Broadcast Congested CliqueProceedings of the 2019 ACM Symposium on Principles of Distributed Computing | 16 July 2019
- A Nearly Tight Sum-of-Squares Lower Bound for the Planted Clique ProblemSIAM Journal on Computing, Vol. 48, No. 2 | 30 April 2019
- Circuit Complexity, Proof Complexity, and Polynomial Identity TestingJournal of the ACM, Vol. 65, No. 6 | 26 November 2018
- Counting t-Cliques: Worst-Case to Average-Case Reductions and Direct Interactive Proof Systems2018 IEEE 59th Annual Symposium on Foundations of Computer Science (FOCS) | 1 Oct 2018
- Non-Black-Box Worst-Case to Average-Case Reductions within NP2018 IEEE 59th Annual Symposium on Foundations of Computer Science (FOCS) | 1 Oct 2018
- Algebraic generalization of Diffie–Hellman key exchangeJournal of Mathematical Cryptology, Vol. 12, No. 1 | 28 November 2017
- Proofs of Work From Worst-Case AssumptionsAdvances in Cryptology – CRYPTO 2018 | 25 July 2018
- Probabilistic rank and matrix rigidityProceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing | 19 June 2017
- Can We Locally Compute Sparse Connected Subgraphs?Computer Science – Theory and Applications | 6 May 2017
- A Nearly Tight Sum-of-Squares Lower Bound for the Planted Clique Problem2016 IEEE 57th Annual Symposium on Foundations of Computer Science (FOCS) | 1 Oct 2016
- Unprovable Security of Perfect NIZK and Non-interactive Non-malleable Commitmentscomputational complexity, Vol. 25, No. 3 | 19 April 2016
- Average-Case Complexity Versus Approximate Simulation of Commuting Quantum ComputationsPhysical Review Letters, Vol. 117, No. 8 | 18 August 2016
- Towards Non-Black-Box Separations of Public Key Encryption and One Way FunctionTheory of Cryptography | 21 October 2016
- Max 2-SAT with up to 108 qubitsNew Journal of Physics, Vol. 16, No. 4 | 8 April 2014
- Lower Bounds on the Query Complexity of Non-uniform and Adaptive Reductions Showing Hardness Amplificationcomputational complexity, Vol. 23, No. 1 | 26 January 2013
- A Protocol for Generating Random Elements with Their ProbabilitiesComputing and Combinatorics | 1 Jan 2014
- A New View on Worst-Case to Average-Case Reductions for NP ProblemsComputing and Combinatorics | 1 Jan 2014
- On the power of nonuniformity in proofs of securityProceedings of the 4th conference on Innovations in Theoretical Computer Science | 9 January 2013
- Unprovable Security of Perfect NIZK and Non-interactive Non-malleable CommitmentsTheory of Cryptography | 1 Jan 2013
- Limits of Provable Security for Homomorphic EncryptionAdvances in Cryptology – CRYPTO 2013 | 1 Jan 2013
- Translation-Randomizable Distributions via Random WalksProvable Security | 1 Jan 2013
- On the Length-Decreasing Self-Reducibility and the Many-One-Like Reducibilities for Partial Multivalued FunctionsIEICE Transactions on Information and Systems, Vol. E96.D, No. 3 | 1 Jan 2013
- Relativized Worlds without Worst-Case to Average-Case Reductions for NPACM Transactions on Computation Theory, Vol. 4, No. 3 | 1 September 2012
- On beating the hybrid argumentProceedings of the 3rd Innovations in Theoretical Computer Science Conference | 8 January 2012
- On Efficient Zero-Knowledge PCPsTheory of Cryptography | 1 Jan 2012
- Limits of provable security from standard assumptionsProceedings of the forty-third annual ACM symposium on Theory of computing | 6 June 2011
- Relativized Separations of Worst-Case and Average-Case Complexities for NP2011 IEEE 26th Annual Conference on Computational Complexity | 1 Jun 2011
- Lower Bounds on the Query Complexity of Non-uniform and Adaptive Reductions Showing Hardness AmplificationApproximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques | 1 Jan 2011
- On the Power of Randomized Reductions and the Checkability of SAT2010 IEEE 25th Annual Conference on Computational Complexity | 1 Jun 2010
- A New Sampling Protocol and Applications to Basing Cryptographic Primitives on the Hardness of NP2010 IEEE 25th Annual Conference on Computational Complexity | 1 Jun 2010
- On the Autoreducibility of FunctionsTheory of Computing Systems, Vol. 46, No. 2 | 16 July 2008
- Relativized Worlds without Worst-Case to Average-Case Reductions for NPApproximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques | 1 Jan 2010
- Circuit Lower Bounds for Merlin–Arthur ClassesSIAM Journal on Computing, Vol. 39, No. 3 | 2 September 2009
- On the (Im)Possibility of Arthur-Merlin Witness Hiding ProtocolsTheory of Cryptography | 1 Jan 2009
- Pseudorandom Generators and Typically-Correct DerandomizationApproximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques | 1 Jan 2009
- Locally Decodable Codes with Two Queries and Polynomial Identity Testing for Depth 3 CircuitsSIAM Journal on Computing, Vol. 36, No. 5 | 26 January 2007
- On Best-Possible ObfuscationTheory of Cryptography | 1 Jan 2007
- Worst-Case to Average-Case Reductions RevisitedApproximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques | 1 Jan 2007
- On basing one-way functions on NP-hardnessProceedings of the thirty-eighth annual ACM symposium on Theory of Computing | 21 May 2006
- Power from Random StringsSIAM Journal on Computing, Vol. 35, No. 6 | 27 July 2006
- On Worst‐Case to Average‐Case Reductions for NP ProblemsSIAM Journal on Computing, Vol. 36, No. 4 | 15 December 2006
- Using Nondeterminism to Amplify HardnessSIAM Journal on Computing, Vol. 35, No. 4 | 27 July 2006
- Worst-Case Vs. Algorithmic Average-Case Complexity in the Polynomial-Time HierarchyApproximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques | 1 Jan 2006
- Distinguishing SAT from Polynomial-Size Circuits, through Black-Box Queries21st Annual IEEE Conference on Computational Complexity (CCC'06) | 1 Jan 2006
- Making Hard Problems Harder21st Annual IEEE Conference on Computational Complexity (CCC'06) | 1 Jan 2006
- Locally decodable codes with 2 queries and polynomial identity testing for depth 3 circuitsProceedings of the thirty-seventh annual ACM symposium on Theory of computing | 22 May 2005
- If NP Languages are Hard on the Worst-Case Then It is Easy to Find Their Hard Instances20th Annual IEEE Conference on Computational Complexity (CCC'05) | 1 Jan 2005
- On Constructing Parallel Pseudorandom Generators from One-Way Functions20th Annual IEEE Conference on Computational Complexity (CCC'05) | 1 Jan 2005
- Exponential lower bound for 2-query locally decodable codes via a quantum argumentJournal of Computer and System Sciences, Vol. 69, No. 3 | 1 Nov 2004
- Using nondeterminism to amplify hardnessProceedings of the thirty-sixth annual ACM symposium on Theory of computing | 13 June 2004
- Average-case intractability vs. worst-case intractabilityInformation and Computation, Vol. 190, No. 1 | 1 Apr 2004
- Notions of Reducibility between Cryptographic PrimitivesTheory of Cryptography | 1 Jan 2004
- Exponential lower bound for 2-query locally decodable codes via a quantum argumentProceedings of the thirty-fifth annual ACM symposium on Theory of computing | 9 June 2003
- Nearly Bounded Error Probabilistic SetsAlgorithms and Complexity | 13 May 2003
- Moderately Hard Functions: From Complexity to Spam FightingFST TCS 2003: Foundations of Software Technology and Theoretical Computer Science | 1 Jan 2003
- On worst-case to average-case reductions for NP problems44th Annual IEEE Symposium on Foundations of Computer Science, 2003. Proceedings. | 1 Jan 2003
- Power from random stringsThe 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002. Proceedings. | 1 Jan 2002
- Pseudorandom Generators without the XOR LemmaJournal of Computer and System Sciences, Vol. 62, No. 2 | 1 Mar 2001
- On the efficiency of local decoding procedures for error-correcting codesProceedings of the thirty-second annual ACM symposium on Theory of computing | 1 May 2000
- Separating Complexity Classes Using AutoreducibilitySIAM Journal on Computing, Vol. 29, No. 5 | 27 July 2006
- Pseudorandom generators without the XOR Lemma (extended abstract)Proceedings of the thirty-first annual ACM symposium on Theory of Computing | 1 May 1999
- On the Robustness of Functional EquationsSIAM Journal on Computing, Vol. 28, No. 6 | 28 July 2006
- Stronger separations for random-self-reducibility, rounds, and adviceProceedings. Fourteenth Annual IEEE Conference on Computational Complexity (Formerly: Structure in Complexity Theory Conference) (Cat.No.99CB36317) | 1 Jan 1999
- On algorithmic applications of the immersion orderDiscrete Mathematics, Vol. 182, No. 1-3 | 1 Mar 1998
- Average-case intractability vs. worst-case intractabilityMathematical Foundations of Computer Science 1998 | 28 May 2006
- Proofs of membership vs. proofs of knowledgeProceedings. Thirteenth Annual IEEE Conference on Computational Complexity (Formerly: Structure in Complexity Theory Conference) (Cat. No.98CB36247) | 1 Jan 1998
- Using hard problems to derandomize algorithms: An incomplete surveyRandomization and Approximation Techniques in Computer Science | 7 June 2005
- An information-theoretic treatment of random-self-reducibilitySTACS 97 | 10 June 2005
- On coherence, random-self-reducibility, and self-correctionProceedings of Computational Complexity (Formerly Structure in Complexity Theory) | 1 Jan 1996
- Using autoreducibility to separate complexity classesProceedings of IEEE 36th Annual Foundations of Computer Science | 1 Jan 1995
- The power of adaptiveness and additional queries in random-self-reductionsComputational Complexity, Vol. 4, No. 2 | 1 Jun 1994
- Program result checking: A new approach to making programs more reliableAutomata, Languages and Programming | 28 May 2005
View Options
- Access via your Institution
- Questions about how to access this content? Contact SIAM at [email protected].