Skip to main content

Showing 1–8 of 8 results for author: Gurumukhani, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2504.01856  [pdf, ps, other

    cs.CC cs.CR cs.DC

    Lower Bounds for Leader Election and Collective Coin Flipping, Revisited

    Authors: Eshan Chattopadhyay, Mohit Gurumukhani, Noam Ringach, Rocco Servedio

    Abstract: We study the tasks of collective coin flipping and leader election in the full-information model. We prove new lower bounds for coin flipping protocols, implying lower bounds for leader election protocols. We show that any $k$-round coin flipping protocol, where each of $\ell$ players sends 1 bit per round, can be biased by $O(\ell/\log^{(k)}(\ell))$ bad players. For all $k>1$ this strengthens p… ▽ More

    Submitted 2 April, 2025; originally announced April 2025.

    Comments: 28 pages

    MSC Class: 68Q17 ACM Class: F.0

  2. arXiv:2501.02886  [pdf, ps, other

    cs.CC cs.DS

    Local Enumeration: The Not-All-Equal Case

    Authors: Mohit Gurumukhani, Ramamohan Paturi, Michael Saks, Navid Talebanfard

    Abstract: Gurumukhani et al. (CCC'24) proposed the local enumeration problem Enum(k, t) as an approach to break the Super Strong Exponential Time Hypothesis (SSETH): for a natural number $k$ and a parameter $t$, given an $n$-variate $k$-CNF with no satisfying assignment of Hamming weight less than $t(n)$, enumerate all satisfying assignments of Hamming weight exactly $t(n)$. Furthermore, they gave a randomi… ▽ More

    Submitted 6 January, 2025; originally announced January 2025.

  3. arXiv:2412.20493  [pdf, other

    cs.CC

    On Extremal Properties of k-CNF: Capturing Threshold Functions

    Authors: Mohit Gurumukhani, Marvin Künnemann, Ramamohan Paturi

    Abstract: We consider a basic question on the expressiveness of $k$-CNF formulas: How well can $k$-CNF formulas capture threshold functions? Specifically, what is the largest number of assignments (of Hamming weight $t$) accepted by a $k$-CNF formula that only accepts assignments of weight at least $t$? Among others, we provide the following results: - While an optimal solution is known for $t \leq n/k$,… ▽ More

    Submitted 29 December, 2024; originally announced December 2024.

  4. arXiv:2411.04115  [pdf, ps, other

    cs.CC

    Condensing and Extracting Against Online Adversaries

    Authors: Eshan Chattopadhyay, Mohit Gurumukhani, Noam Ringach, Rocco Servedio

    Abstract: We investigate the tasks of deterministically condensing and extracting randomness from Online Non-Oblivious Symbol Fixing (oNOSF) sources, a natural model of defective random sources for which extraction is impossible in many parameter regimes [AORSV, EUROCRYPT'20]. A $(g,\ell)$-oNOSF source is a sequence of $\ell$ blocks where $g$ of the blocks are good (are independent and have some min-entropy… ▽ More

    Submitted 2 April, 2025; v1 submitted 6 November, 2024; originally announced November 2024.

    MSC Class: 68Q87 ACM Class: F.0

  5. arXiv:2409.04549  [pdf, ps, other

    cs.CC

    Two-Sided Lossless Expanders in the Unbalanced Setting

    Authors: Eshan Chattopadhyay, Mohit Gurumukhani, Noam Ringach, Yunya Zhao

    Abstract: We present the first explicit construction of two-sided lossless expanders in the unbalanced setting (bipartite graphs that have polynomially many more nodes on the left than on the right). Prior to our work, all known explicit constructions in the unbalanced setting achieved only one-sided lossless expansion. Specifically, we show that the one-sided lossless expanders constructed by Kalev and… ▽ More

    Submitted 9 February, 2025; v1 submitted 6 September, 2024; originally announced September 2024.

    Comments: Simplified proofs and added proof of tightness

    ACM Class: G.2.1; G.2.2

  6. arXiv:2403.09134  [pdf, other

    cs.CC

    Local Enumeration and Majority Lower Bounds

    Authors: Mohit Gurumukhani, Ramamohan Paturi, Pavel Pudlák, Michael Saks, Navid Talebanfard

    Abstract: Depth-3 circuit lower bounds and $k$-SAT algorithms are intimately related; the state-of-the-art $Σ^k_3$-circuit lower bound and the $k$-SAT algorithm are based on the same combinatorial theorem. In this paper we define a problem which reveals new interactions between the two. Define Enum($k$, $t$) problem as: given an $n$-variable $k$-CNF and an initial assignment $α$, output all satisfying assig… ▽ More

    Submitted 23 May, 2024; v1 submitted 14 March, 2024; originally announced March 2024.

  7. arXiv:2312.15087  [pdf, ps, other

    cs.CC

    On the Existence of Seedless Condensers: Exploring the Terrain

    Authors: Eshan Chattopadhyay, Mohit Gurumukhani, Noam Ringach

    Abstract: We prove several new results for seedless condensers in the context of three related classes of sources: Non-Oblivious Symbol Fixing (NOSF) sources, online NOSF (oNOSF) sources [AORSV, EUROCRYPT'20], and adversarial Chor-Goldreich (aCG) source [DMOZ, STOC'23]. We think of these sources as a sequence of random variables $\mathbf{X}=\mathbf{X}_1,\dots,\mathbf{X}_\ell$ on $\ell$ symbols where at leas… ▽ More

    Submitted 2 October, 2024; v1 submitted 22 December, 2023; originally announced December 2023.

    Comments: Improvements to our main results and minor revisions to presentation

  8. arXiv:2309.11019  [pdf, ps, other

    cs.CC

    Extractors for Polynomial Sources over $\mathbb{F}_2$

    Authors: Eshan Chattopadhyay, Jesse Goodman, Mohit Gurumukhani

    Abstract: We explicitly construct the first nontrivial extractors for degree $d \ge 2$ polynomial sources over $\mathbb{F}_2^n$. Our extractor requires min-entropy $k\geq n - \tildeΩ(\sqrt{\log n})$. Previously, no constructions were known, even for min-entropy $k\geq n-1$. A key ingredient in our construction is an input reduction lemma, which allows us to assume that any polynomial source with min-entropy… ▽ More

    Submitted 31 January, 2024; v1 submitted 19 September, 2023; originally announced September 2023.