A deterministic pseudorandom perturbation scheme for arbitrary polynomial predicates

نویسندگان

  • Geoffrey Irving
  • Forrest Green
چکیده

We present a symbolic perturbation scheme for arbitrary polynomial geometric predicates which combines the benefits of Emiris and Canny’s simple randomized linear perturbation scheme with Yap’s multiple infinitesimal scheme for general predicates. Like the randomized scheme, our method accepts black box polynomial functions as input. For nonmaliciously chosen predicates, our method is as fast as the linear scheme, scaling reasonably with the degree of the polynomial even for fully degenerate input. Like Yap’s scheme, the computed sign is deterministic, never requiring an algorithmic restart (assuming a high quality pseudorandom generator), and works for arbitrary predicates with no knowledge of their structure. We also apply our technique to exactly or nearly exactly rounded constructions that work correctly for degenerate input, using l’Hôpital’s rule to compute the necessary singular limits. We provide an open source prototype implementation including example algorithms for Delaunay triangulation and Boolean operations on polygons and circular arcs in the plane.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Verifiable and Delegatable Constrained Pseudorandom Functions for Unconstrained Inputs

Constrained pseudorandom functions (CPRF) are a fundamental extension of the notion of traditional pseudorandom functions (PRF). A CPRF enables a master PRF key holder to issue constrained keys corresponding to specific constraint predicates over the input domain. A constrained key can be used to evaluate the PRF only on those inputs which are accepted by the associated constraint predicate. Ho...

متن کامل

Reducing Multilinear Map Levels in Constrained Pseudorandom Functions and Attribute-based Encryption

The candidate construction of multilinear maps by Garg, Gentry, and Halevi (Eurocrypt 2013) has lead to an explosion of new cryptographic constructions ranging from attribute-based encryption (ABE) for arbitrary polynomial size circuits, to program obfuscation, and to constrained pseudorandom functions (PRFs). Many of these constructions require κ-linear maps for large κ. In this work, we focus...

متن کامل

Reducing Depth in Constrained PRFs: From Bit-Fixing to NC1∗

The candidate construction of multilinear maps by Garg, Gentry, and Halevi (Eurocrypt 2013) has lead to an explosion of new cryptographic constructions ranging from attribute-based encryption (ABE) for arbitrary polynomial size circuits, to program obfuscation, and to constrained pseudorandom functions (PRFs). Many of these constructions require κ-linear maps for large κ. In this work, we focus...

متن کامل

Symbolic Encryption with Pseudorandom Keys

We give an efficient decision procedure that, on input two (acyclic) cryptographic expressions making arbitrary use of an encryption scheme and a (length doubling) pseudorandom generator, determines (in polynomial time) if the two expressions produce computationally indistinguishable distributions for any pseudorandom generator and encryption scheme satisfying the standard security notions of p...

متن کامل

Polynomial versus Matrix Methods for Leap-ahead in Shift-register Type Pseudorandom Number Generators

We compare the cost of polynomial and matrix methods for leaping ahead an arbitrary amount in the period of shift-register based pseudorandom number generators. It is well known that both methods are applicable in the binary shiftregister case. However, for modular shift-registers with moduli other than 2, only the matrix method had been proposed. We present both methods for shift-registers wit...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • CoRR

دوره abs/1308.1986  شماره 

صفحات  -

تاریخ انتشار 2013