메뉴 건너뛰기




Volumn 77, Issue 1, 2011, Pages 91-106

Infeasibility of instance compression and succinct PCPs for NP

Author keywords

Computational complexity; Instance complexity; Kernalization; Probabilistically checkable proof systems

Indexed keywords

BOOLEAN ALGEBRA; COMPUTATIONAL COMPLEXITY; FORMAL LOGIC; HASH FUNCTIONS; POLYNOMIAL APPROXIMATION;

EID: 78349307386     PISSN: 00220000     EISSN: 10902724     Source Type: Journal    
DOI: 10.1016/j.jcss.2010.06.007     Document Type: Article
Times cited : (223)

References (33)
  • 2
    • 0032058198 scopus 로고    scopus 로고
    • Proof verification and the hardness of approximation problems
    • Sanjeev Arora, Carsten Lund, Rajeev Motwani, Madhu Sudan, and Mario Szegedy Proof verification and the hardness of approximation problems J. ACM 45 3 1998 501 555
    • (1998) J. ACM , vol.45 , Issue.3 , pp. 501-555
    • Arora, S.1    Lund, C.2    Motwani, R.3    Sudan, M.4    Szegedy, M.5
  • 3
    • 84957084138 scopus 로고    scopus 로고
    • Information theoretically secure communication in the limited storage space model
    • Yonatan Aumann, Michael Rabin, Information theoretically secure communication in the limited storage space model, in: Proceedings of CRYPTO '99, 1999, pp. 65-79.
    • (1999) Proceedings of CRYPTO '99 , pp. 65-79
    • Aumann, Y.1    Rabin, M.2
  • 4
    • 0031651077 scopus 로고    scopus 로고
    • Probabilistic checking of proofs: A new characterization of NP
    • Sanjeev Arora, and Shmuel Safra Probabilistic checking of proofs: A new characterization of NP J. ACM 45 1 1998 70 122
    • (1998) J. ACM , vol.45 , Issue.1 , pp. 70-122
    • Arora, S.1    Safra, S.2
  • 8
    • 0031555827 scopus 로고    scopus 로고
    • Advice classes of parameterized tractability
    • Liming Cai, Jianer Chen, Rodney Downey, and Michael Fellows Advice classes of parameterized tractability Ann. Pure Appl. Logic 84 1 1997 119 138
    • (1997) Ann. Pure Appl. Logic , vol.84 , Issue.1 , pp. 119-138
    • Cai, L.1    Chen, J.2    Downey, R.3    Fellows, M.4
  • 9
    • 76249096645 scopus 로고    scopus 로고
    • Lower bounds for kernelizations and other preprocessing procedures
    • Lecture Notes in Comput. Sci., Springer-Verlag, 2009, in press
    • Yijia Chen, Jörg Flum, Moritz Müller, Lower bounds for kernelizations and other preprocessing procedures, in: Proceedings of Computability in Europe 2009, in: Lecture Notes in Comput. Sci., Springer-Verlag, 2009, in press.
    • Proceedings of Computability in Europe 2009
    • Yijia Chen, J.1
  • 13
    • 34250354807 scopus 로고    scopus 로고
    • The PCP theorem by gap amplification
    • Irit Dinur The PCP theorem by gap amplification J. ACM 54 3 2007
    • (2007) J. ACM , vol.54 , Issue.3
    • Dinur, I.1
  • 18
    • 37149054237 scopus 로고    scopus 로고
    • Invitation to data reduction and problem kernelization
    • Jiong Guo, and Rolf Niedermeier Invitation to data reduction and problem kernelization ACM SIGACT News 38 1 2007 31 45
    • (2007) ACM SIGACT News , vol.38 , Issue.1 , pp. 31-45
    • Guo, J.1    Niedermeier, R.2
  • 19
    • 33746364208 scopus 로고    scopus 로고
    • On everlasting security in the hybrid bounded storage model
    • Languages and Programming
    • Danny Harnik, Moni Naor, On everlasting security in the hybrid bounded storage model, in: Proceedings of the 33rd International Colloquium on Automata, Languages and Programming, 2006, pp. 192-203.
    • (2006) Proceedings of the 33rd International Colloquium on Automata , pp. 192-203
    • Harnik, D.1    Naor, M.2
  • 21
    • 0030706544 scopus 로고    scopus 로고
    • Russell Impagliazzo, Avi Wigderson, P = BPP if e requires exponential circuits: Derandomizing the XOR lemma
    • Russell Impagliazzo, Avi Wigderson, P = BPP if E requires exponential circuits: Derandomizing the XOR lemma, in: Proceedings of the 29th Annual ACM Symposium on the Theory of Computing, 1997 pp. 220-229.
    • (1997) Proceedings of the 29th Annual ACM Symposium on the Theory of Computing , pp. 220-229
  • 22
    • 0000517449 scopus 로고
    • Turing machines that take advice
    • Richard Karp, and Richard Lipton Turing machines that take advice Enseign. Math. 28 2 1982 191 209
    • (1982) Enseign. Math. , vol.28 , Issue.2 , pp. 191-209
    • Karp, R.1    Lipton, R.2
  • 24
    • 0036588881 scopus 로고    scopus 로고
    • Graph nonisomorphism has subexponential size proofs unless the polynomial hierarchy collapses
    • Adam Klivans, and Dieter van Melkebeek Graph nonisomorphism has subexponential size proofs unless the polynomial hierarchy collapses SIAM J. Comput. 31 5 2002 1501 1526
    • (2002) SIAM J. Comput. , vol.31 , Issue.5 , pp. 1501-1526
    • Klivans, A.1    Van Melkebeek, D.2
  • 25
    • 0000359018 scopus 로고
    • Sparse complete sets for NP: Solution of a conjecture of Berman and Hartmanis
    • Stephen Mahaney Sparse complete sets for NP: Solution of a conjecture of Berman and Hartmanis J. Comput. System Sci. 25 2 1982 130 143
    • (1982) J. Comput. System Sci. , vol.25 , Issue.2 , pp. 130-143
    • Mahaney, S.1
  • 26
    • 78349311391 scopus 로고    scopus 로고
    • Parameterized complexity and approximation algorithms
    • in press
    • Daniel Márx, Parameterized complexity and approximation algorithms, The Computer Journal (2006), in press.
    • (2006) The Computer Journal
    • Márx, D.1
  • 27
    • 0026698501 scopus 로고
    • Conditionally-perfect secrecy and a provably-secure randomized cipher
    • Ueli Maurer Conditionally-perfect secrecy and a provably-secure randomized cipher J. Cryptology 5 1 1992 53 66
    • (1992) J. Cryptology , vol.5 , Issue.1 , pp. 53-66
    • Maurer, U.1
  • 29
    • 84957690790 scopus 로고    scopus 로고
    • Finding collisions on a one-way street: Can secure hash functions be based on general assumptions?
    • Advances in cryptology EUROCRYPT 1998
    • Daniel Simon Finding collisions on a one-way street: Can secure hash functions be based on general assumptions? Advances in Cryptology EUROCRYPT 1998 Lecture Notes in Comput. Sci. vol. 1403 1998 334 345
    • (1998) Lecture Notes in Comput. Sci. , vol.1403 , pp. 334-345
    • Simon, D.1
  • 31
    • 4344628859 scopus 로고    scopus 로고
    • Constructing locally computable extractors and cryptosystems in the bounded storage model
    • Salil Vadhan Constructing locally computable extractors and cryptosystems in the bounded storage model J. Cryptology 17 1 2004 43 77
    • (2004) J. Cryptology , vol.17 , Issue.1 , pp. 43-77
    • Vadhan, S.1
  • 32
    • 78349308316 scopus 로고    scopus 로고
    • Personal communication
    • Dieter van Melkebeek, Personal communication, 2009.
    • (2009)
    • Van Melkebeek, D.1
  • 33
    • 0000205276 scopus 로고
    • Some consequences of non-uniform conditions on uniform classes
    • Chee-Keng Yap Some consequences of non-uniform conditions on uniform classes Theoret. Comput. Sci. 26 1983 287 300
    • (1983) Theoret. Comput. Sci. , vol.26 , pp. 287-300
    • Yap, C.-K.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.