A deterministic pseudorandom perturbation scheme for arbitrary polynomial predicates
نویسندگان
چکیده
We present a symbolic perturbation scheme for arbitrary polynomial geometric predicates which combines the benefits of Emiris and Canny’s simple randomized linear perturbation scheme with Yap’s multiple infinitesimal scheme for general predicates. Like the randomized scheme, our method accepts black box polynomial functions as input. For nonmaliciously chosen predicates, our method is as fast as the linear scheme, scaling reasonably with the degree of the polynomial even for fully degenerate input. Like Yap’s scheme, the computed sign is deterministic, never requiring an algorithmic restart (assuming a high quality pseudorandom generator), and works for arbitrary predicates with no knowledge of their structure. We also apply our technique to exactly or nearly exactly rounded constructions that work correctly for degenerate input, using l’Hôpital’s rule to compute the necessary singular limits. We provide an open source prototype implementation including example algorithms for Delaunay triangulation and Boolean operations on polygons and circular arcs in the plane.
منابع مشابه
Verifiable and Delegatable Constrained Pseudorandom Functions for Unconstrained Inputs
Constrained pseudorandom functions (CPRF) are a fundamental extension of the notion of traditional pseudorandom functions (PRF). A CPRF enables a master PRF key holder to issue constrained keys corresponding to specific constraint predicates over the input domain. A constrained key can be used to evaluate the PRF only on those inputs which are accepted by the associated constraint predicate. Ho...
متن کاملReducing Multilinear Map Levels in Constrained Pseudorandom Functions and Attribute-based Encryption
The candidate construction of multilinear maps by Garg, Gentry, and Halevi (Eurocrypt 2013) has lead to an explosion of new cryptographic constructions ranging from attribute-based encryption (ABE) for arbitrary polynomial size circuits, to program obfuscation, and to constrained pseudorandom functions (PRFs). Many of these constructions require κ-linear maps for large κ. In this work, we focus...
متن کاملReducing Depth in Constrained PRFs: From Bit-Fixing to NC1∗
The candidate construction of multilinear maps by Garg, Gentry, and Halevi (Eurocrypt 2013) has lead to an explosion of new cryptographic constructions ranging from attribute-based encryption (ABE) for arbitrary polynomial size circuits, to program obfuscation, and to constrained pseudorandom functions (PRFs). Many of these constructions require κ-linear maps for large κ. In this work, we focus...
متن کاملSymbolic Encryption with Pseudorandom Keys
We give an efficient decision procedure that, on input two (acyclic) cryptographic expressions making arbitrary use of an encryption scheme and a (length doubling) pseudorandom generator, determines (in polynomial time) if the two expressions produce computationally indistinguishable distributions for any pseudorandom generator and encryption scheme satisfying the standard security notions of p...
متن کاملPolynomial versus Matrix Methods for Leap-ahead in Shift-register Type Pseudorandom Number Generators
We compare the cost of polynomial and matrix methods for leaping ahead an arbitrary amount in the period of shift-register based pseudorandom number generators. It is well known that both methods are applicable in the binary shiftregister case. However, for modular shift-registers with moduli other than 2, only the matrix method had been proposed. We present both methods for shift-registers wit...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/1308.1986 شماره
صفحات -
تاریخ انتشار 2013