Skip to main content

Cryptographic Hardness of Learning

  • Reference work entry
  • First Online:
Encyclopedia of Algorithms
  • 227 Accesses

Years and Authors of Summarized Original Work

1994; Kearns, Valiant

Problem Definition

This entry deals with proving negative results for distribution-free PAC learning. The crux of the problem is proving that a polynomial-time algorithm for learning various concept classes in the PAC model implies that several well-known cryptosystems are insecure. Thus, if we assume a particular cryptosystem is secure, we can conclude that it is impossible to efficiently learn a corresponding set of concept classes.

PAC Learning

We recall here the PAC learning model. Let C be a concept class (a set of functions over n variables), and let D be a distribution over the input space {0, 1}n. With C we associate a size function size that measures the complexity of each c ∈ C. For example, if C is a class of Boolean circuits, then size(c) is equal to the number of gates in c. Let A be a randomized algorithm that has access to an oracle which returns labeled examples (x, c(x)) for some unknown c ∈ C; the...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Recommended Reading

  1. Alekhnovich M, Braverman M, Feldman V, Klivans AR, Pitassi T (2004) Learnability and automatizability. In: Proceedings of the 45th symposium on foundations of computer science, Rome

    Google Scholar 

  2. Angluin D, Kharitonov M (1995) When won’t membership queries help? J Comput Syst Sci 50(2):336-355

    Article  MathSciNet  MATH  Google Scholar 

  3. Goldreich O (2001) Foundations of cryptography: basic tools. Cambridge University Press, Cambridge/New York

    Book  MATH  Google Scholar 

  4. Kearns M, Valiant L (1994) Cryptographic limitations on learning boolean formulae and finite automata. J ACM 41(1):67–95

    Article  MathSciNet  MATH  Google Scholar 

  5. Kearns M, Vazirani U (1994) An introduction to computational learning theory. MIT, Cambridge

    Google Scholar 

  6. Kharitonov M (1993) Cryptographic hardness of distribution-specific learning. In: Proceedings of the twenty-fifth annual symposium on theory of computing, San Diego, pp 372–381

    MATH  Google Scholar 

  7. Klivans A, Sherstov AA (2006) Cryptographic hardness for learning intersections of halfspaces. In: Proceedings of the 47th symposium on foundations of computer science, Berkeley

    Google Scholar 

  8. Klivans A, Servedio R (2001) Learning DNF in time \(2^{\bar{O}(n^{1/3}) }\). In: Proceedings of the 33rd annual symposium on theory of computing, Heraklion

    Google Scholar 

  9. Regev O (2004) New lattice-based cryptographic constructions. J ACM 51:899–942

    Article  MathSciNet  MATH  Google Scholar 

  10. Valiant L (1984) A theory of the learnable. Commun ACM 27(11):1134–1142

    Article  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Adam Klivans .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer Science+Business Media New York

About this entry

Cite this entry

Klivans, A. (2016). Cryptographic Hardness of Learning. In: Kao, MY. (eds) Encyclopedia of Algorithms. Springer, New York, NY. https://doi.org/10.1007/978-1-4939-2864-4_96

Download citation

Publish with us

Policies and ethics