Skip to main content

Cryptographic Hardness of Learning

1994; Kearns, Valiant

  • Reference work entry
Encyclopedia of Algorithms
  • 169 Accesses

Keywords and Synonyms

Representation-independent hardness for learning        

Problem Definition

This paper deals with proving negative results for distribution‐free PAC learning. The crux of the problem is proving that a polynomial-time algorithm for learning various concept classes in the PAC model implies that several well-known cryptosystems are insecure. Thus, if we assume a particular cryptosystem is secure we can conclude that it is impossible to efficiently learn a corresponding set of concept classes.

PAC Learning

We recall here the PAC learning model. Let C be a concept class (a set of functions over n variables), and let D be a distribution over the input space \( { \{0,1\}^{n} } \). With C we associate a size function size that measures the complexity of each \( { c \in C } \). For example if C is a class of Boolean circuits then size(c) is equal to the number of gates in c. Let A be a randomized algorithm that has access to an oracle which returns labeled examples \( { (x,c(x)) }...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 399.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Recommended Reading

  1. Alekhnovich, M., Braverman, M., Feldman, V., Klivans, A. R., Pitassi, T.: Learnability and automatizability. In: Proceedings of the 45th Symposium on Foundations of Computer Science, 2004

    Chapter  Google Scholar 

  2. Angluin, D., Kharitonov, M.: When Won't Membership Queries Help? J. Comput. Syst. Sci. 50, (1995)

    Google Scholar 

  3. Goldreich, O.: Foundations of Cryptography: Basic Tools. Cambridge University Press (2001)

    Google Scholar 

  4. Kearns, M., Valiant, L.: Cryptographic limitations on learning Boolean formulae and finite automata. J. ACM 41(1), 67–95 (1994)

    Article  MathSciNet  MATH  Google Scholar 

  5. Kearns, M., Vazirani, U.: An introduction to computational learning theory. MIT Press, Cambridge (1994)

    Google Scholar 

  6. Kharitonov, M.: Cryptographic hardness of distribution‐specific learning. In: Proceedings of the Twenty-Fifth Annual Symposium on Theory of Computing, 1993, pp. 372–381

    Google Scholar 

  7. Klivans, A. , Sherstov, A. A.: Cryptographic Hardness for Learning Intersections of Halfspaces. In: Proceedings of the 47th Symposium on Foundations of Computer Science, 2006

    Google Scholar 

  8. Klivans, A., Servedio, R.: Learning DNF in time \( { 2^{\tilde{O}(n^{1/3})} } \). In: Proceedings of the 33rd Annual Symposium on Theory of Computing, 2001

    Google Scholar 

  9. Regev, O.: New Lattice-Based Cryptographic Constructions. J. ACM 51, 899–942 (2004)

    Article  MathSciNet  MATH  Google Scholar 

  10. Valiant, L.: A theory of the learnable. Commun. ACM 27(11), 1134–1142 (1984)

    Article  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag

About this entry

Cite this entry

Klivans, A. (2008). Cryptographic Hardness of Learning. In: Kao, MY. (eds) Encyclopedia of Algorithms. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-30162-4_96

Download citation

Publish with us

Policies and ethics