We initiate the study of compression that preserves the solution to an instance of a problem rather than preserving the instance itself. Our focus is on the compressibility of NP decision problems. We consider NP problems that have long instances but relatively short witnesses. The question is, can one efficiently compress an instance and store a shorter representation that maintains the information of whether the original input is in the language or not. We want the length of the compressed instance to be polynomial in the length of the witness rather than the length of original input. Such compression enables to succinctly store instances until a future setting will allow solving them, either via a technological or algorithmic breakthroug...
A recurring challenge in the theory of pseudorandomness and circuit complexity is the explicit const...
. We survey the complexity issues related to several algorithmic problems for compressed one- and tw...
In cryptographic protocols, honest parties would prefer that their security is assured even in prese...
We study compression that preserves the solution to an instance of a problem rather than preserving ...
AbstractThe OR-SAT problem asks, given Boolean formulae ϕ1,…,ϕm each of size at most n, whether at l...
Modern cryptography fundamentally relies on the assumption that the adversary trying to break the sc...
Abstract. Compressibility regards the reduction the length of the input, or of some other parameter,...
Many algorithms for Boolean satisfiability (SAT) work within the framework of resolution as a proof ...
Drucker [1] proved the following result: Unless the unlikely complexity-theoretic collapse coNP ⊆ NP...
Can we analyze data without decompressing it? As our data keeps growing, understanding the time comp...
This paper analyzes to what extent it is possible to efficiently reduce the number of clauses in NP-...
A computational secret-sharing scheme is a method that enables a dealer, that has a secret, to distr...
This article analyzes to what extent it is possible to efficiently reduce the number of clauses in N...
We propose a general approach to modelling algorithmic paradigms for the exact solution of NP-hard p...
Thesis (Ph. D.)--University of Rochester. Dept. of Computer Science, 1996. Simultaneously published ...
A recurring challenge in the theory of pseudorandomness and circuit complexity is the explicit const...
. We survey the complexity issues related to several algorithmic problems for compressed one- and tw...
In cryptographic protocols, honest parties would prefer that their security is assured even in prese...
We study compression that preserves the solution to an instance of a problem rather than preserving ...
AbstractThe OR-SAT problem asks, given Boolean formulae ϕ1,…,ϕm each of size at most n, whether at l...
Modern cryptography fundamentally relies on the assumption that the adversary trying to break the sc...
Abstract. Compressibility regards the reduction the length of the input, or of some other parameter,...
Many algorithms for Boolean satisfiability (SAT) work within the framework of resolution as a proof ...
Drucker [1] proved the following result: Unless the unlikely complexity-theoretic collapse coNP ⊆ NP...
Can we analyze data without decompressing it? As our data keeps growing, understanding the time comp...
This paper analyzes to what extent it is possible to efficiently reduce the number of clauses in NP-...
A computational secret-sharing scheme is a method that enables a dealer, that has a secret, to distr...
This article analyzes to what extent it is possible to efficiently reduce the number of clauses in N...
We propose a general approach to modelling algorithmic paradigms for the exact solution of NP-hard p...
Thesis (Ph. D.)--University of Rochester. Dept. of Computer Science, 1996. Simultaneously published ...
A recurring challenge in the theory of pseudorandomness and circuit complexity is the explicit const...
. We survey the complexity issues related to several algorithmic problems for compressed one- and tw...
In cryptographic protocols, honest parties would prefer that their security is assured even in prese...