polynomial time reduction
Recently Published Documents


TOTAL DOCUMENTS

10
(FIVE YEARS 2)

H-INDEX

3
(FIVE YEARS 0)

2021 ◽  
Author(s):  
Alessandro Artale ◽  
Andrea Mazzullo ◽  
Ana Ozaki ◽  
Frank Wolter

Definite descriptions are phrases of the form ‘the x such that φ’, used to refer to single entities in a context. They are often more meaningful to users than individual names alone, in particular when modelling or querying data over ontologies. We investigate free description logics with both individual names and definite descriptions as terms of the language, while also accounting for their possible lack of denotation. We focus on the extensions of ALC and, respectively, EL with nominals, the universal role, and definite descriptions. We show that standard reasoning in these extensions is not harder than in the original languages, and we characterise the expressive power of concepts relative to first-order formulas using a suitable notion of bisimulation. Moreover, we lay the foundations for automated support for definite descriptions generation by studying the complexity of deciding the existence of definite descriptions for an individual under an ontology. Finally, we provide a polynomial-time reduction of reasoning in other free description logic languages based on dual-domain semantics to the case of partial interpretations.


Symmetry ◽  
2018 ◽  
Vol 10 (11) ◽  
pp. 571 ◽  
Author(s):  
Eligijus Sakalauskas ◽  
Aleksejus Mihalkovich

This paper is a continuation of our previous publication of enhanced matrix power function (MPF) as a conjectured one-way function. We are considering a problem introduced in our previous paper and prove that tis problem is NP-Complete. The proof is based on the dual interpretation of well known multivariate quadratic (MQ) problem defined over the binary field as a system of MQ equations, and as a general satisfiability (GSAT) problem. Due to this interpretation the necessary constraints to MPF function for cryptographic protocols construction can be added to initial GSAT problem. Then it is proved that obtained GSAT problem is NP-Complete using Schaefer dichotomy theorem. Referencing to this result, GSAT problem by polynomial-time reduction is reduced to the sub-problem of enhanced MPF, hence the latter is NP-Complete as well.


2018 ◽  
Vol 0 (0) ◽  
Author(s):  
Mikhail Anokhin

Abstract Let {\mathbb{G}_{n}} be the subgroup of elements of odd order in the group {\mathbb{Z}^{\star}_{n}} , and let {\mathcal{U}(\mathbb{G}_{n})} be the uniform probability distribution on {\mathbb{G}_{n}} . In this paper, we establish a probabilistic polynomial-time reduction from finding a nontrivial divisor of a composite number n to finding a nontrivial relation between l elements chosen independently and uniformly at random from {\mathbb{G}_{n}} , where {l\geq 1} is given in unary as a part of the input. Assume that finding a nontrivial divisor of a random number in some set N of composite numbers (for a given security parameter) is a computationally hard problem. Then, using the above-mentioned reduction, we prove that the family {((\mathbb{G}_{n},\mathcal{U}(\mathbb{G}_{n}))\mid n\in N)} of computational abelian groups is weakly pseudo-free. The disadvantage of this result is that the probability ensemble {(\mathcal{U}(\mathbb{G}_{n})\mid n\in N)} is not polynomial-time samplable. To overcome this disadvantage, we construct a polynomial-time computable function {\nu\colon D\to N} (where {D\subseteq\{0,1\}^{*}} ) and a polynomial-time samplable probability ensemble {(\mathcal{G}_{d}\mid d\in D)} (where {\mathcal{G}_{d}} is a distribution on {\mathbb{G}_{\nu(d)}} for each {d\in D} ) such that the family {((\mathbb{G}_{\nu(d)},\mathcal{G}_{d})\mid d\in D)} of computational abelian groups is weakly pseudo-free.


2012 ◽  
Vol 53 (1) ◽  
pp. 1-20
Author(s):  
Peter Adamček ◽  
Marek Loderer ◽  
Pavol Zajac

ABSTRACT Local reduction methods can be used to assess the resistance of cryptosystems against algebraic attacks. The assessment is based on the separation of the attack into polynomial-time reduction algorithm, and exponential time guessing and backtracking. This approach is similar to that employed by the DPLL algorithm that is used as a core of various modern SAT-solvers. In the article we show the application of this method to evaluate the strength of (reduced versions of) two chosen SHA-3 candidates: JH, and Keccak, respectively. We compare the complexity estimates with the behavior of the full search algorithm. We also compare the results based on the local reduction with the attack based on the use of SAT-solvers PrecoSAT, and CryptoMiniSAT, respectively.


Algorithms ◽  
2012 ◽  
Vol 5 (2) ◽  
pp. 261-272 ◽  
Author(s):  
Chuzo Iwamoto ◽  
Kento Sasaki ◽  
Kenichi Morita

2011 ◽  
Vol 76 (4) ◽  
pp. 1381-1402 ◽  
Author(s):  
Sam Buss ◽  
Yijia Chen ◽  
Jörg Flum ◽  
Sy-David Friedman ◽  
Moritz Müller

AbstractWe give the first systematic study of strong isomorphism reductions, a notion of reduction more appropriate than polynomial time reduction when, for example, comparing the computational complexity of the isomorphim problem for different classes of structures. We show that the partial ordering of its degrees is quite rich. We analyze its relationship to a further type of reduction between classes of structures based on purely comparing for every n the number of nonisomorphic structures of cardinality at most n in both classes. Furthermore, in a more general setting we address the question of the existence of a maximal element in the partial ordering of the degrees.


2011 ◽  
Vol 8 (3) ◽  
pp. 502-512 ◽  
Author(s):  
Sivan Altinakar ◽  
Gilles Caporossi ◽  
Alain Hertz

2009 ◽  
Vol 322 (3) ◽  
pp. 613-637 ◽  
Author(s):  
Jon F. Carlson ◽  
Max Neunhöffer ◽  
Colva M. Roney-Dougal

Sign in / Sign up

Export Citation Format

Share Document