TY - GEN
T1 - Solving hidden number problem with one bit oracle and advice
AU - Akavia, Adi
PY - 2009
Y1 - 2009
N2 - In the Hidden Number Problem (HNP), the goal is to find a hidden number s, when given p, g and access to an oracle that on query a returns the k most significant bits of . We present an algorithm solving HNP, when given an advice depending only on p and g; the running time and advice length are polynomial in logp. This algorithm improves over prior HNP algorithms in achieving: (1) optimal number of bits k ≥ 1 (compared with k ≥ Ω(loglogp)); (2) robustness to random noise; and (3) handling a wide family of predicates on top of the most significant bit. As a central tool we present an algorithm that, given oracle access to a function f over ℤN, outputs all the significant Fourier coefficients of f (i.e., those occupying, say, at least 1% of the energy). This algorithm improves over prior works in being: Local. Its running time is polynomial in logN and L1(f̂) (for L 1(f̂) the sum of f's Fourier coefficients, in absolute value). Universal. For any N, t, the same oracle queries are asked for all functions f over ℤN s.t. L1(f̂) ≤ t. Robust. The algorithm succeeds with high probability even if the oracle to f is corrupted by random noise.
AB - In the Hidden Number Problem (HNP), the goal is to find a hidden number s, when given p, g and access to an oracle that on query a returns the k most significant bits of . We present an algorithm solving HNP, when given an advice depending only on p and g; the running time and advice length are polynomial in logp. This algorithm improves over prior HNP algorithms in achieving: (1) optimal number of bits k ≥ 1 (compared with k ≥ Ω(loglogp)); (2) robustness to random noise; and (3) handling a wide family of predicates on top of the most significant bit. As a central tool we present an algorithm that, given oracle access to a function f over ℤN, outputs all the significant Fourier coefficients of f (i.e., those occupying, say, at least 1% of the energy). This algorithm improves over prior works in being: Local. Its running time is polynomial in logN and L1(f̂) (for L 1(f̂) the sum of f's Fourier coefficients, in absolute value). Universal. For any N, t, the same oracle queries are asked for all functions f over ℤN s.t. L1(f̂) ≤ t. Robust. The algorithm succeeds with high probability even if the oracle to f is corrupted by random noise.
UR - http://www.scopus.com/inward/record.url?scp=70350340320&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-03356-8_20
DO - 10.1007/978-3-642-03356-8_20
M3 - Conference contribution
AN - SCOPUS:70350340320
SN - 3642033555
SN - 9783642033551
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 337
EP - 354
BT - Advances in Cryptology - CRYPTO 2009 - 29th Annual International Cryptology Conference, Proceedings
T2 - 29th Annual International Cryptology Conference, CRYPTO 2009
Y2 - 16 August 2009 through 20 August 2009
ER -