Computer Science & Discrete Mathematics (CSDM)

Computer Science & Discrete Mathematics (CSDM) Seminar

A weekly seminar on topics in theoretical computer science and discrete mathematics

Time: Every Monday 11:00 AM-12:00 PM, and Tuesday 10:30 AM-12:30 PM,   Place: Simonyi 101

Information about CSDM

Upcoming Talk

Informal Talk on the Quantum Soundness of the Low (individual) Degree Test: Part II

Speaker: Michael Chapman, Institute for Advanced Study
When: Tuesday, May 12, 2026 | 10:30 AM EDT
Where: Simonyi 101 and Remote Access

Abstract

A common tool in the construction of probabilistically checkable proofs is low degree encodings. Babai, Fortnow and Lund proved the local testability of the individual low degree code, and used it to provide a multi-prover interactive proof (MIP) protocol for every non-deterministic exponential time (NEXP) language. In 2019, Ji, Natarajan, Vidick, Wright and Yuen settled the analogous quantum question, showing that there is a quantum MIP protocol (MIP*) for every recursively enumerable (RE) language. Arguably, the most technical part in their argument is the quantum local testability of the individual low degree code. I aim to present both the classical and quantum local testability results with some detail.

Add to calendar 05/12/2026 10:3005/12/2026 12:30America/New_YorkComputer Science/Discrete Mathematics Seminar IIuse-titleTopic: Informal Talk on the Quantum Soundness of the Low (individual) Degree Test: Part II Speakers: Michael Chapman, Institute for Advanced Study More: https://www.ias.edu/math/events/computer-sciencediscrete-mathematics-seminar-ii-622 A common tool in the construction of probabilistically checkable proofs is low degree encodings. Babai, Fortnow and Lund proved the local testability of the individual low degree code, and used it to provide a multi-prover interactive proof (MIP) protocol for every non-deterministic exponential time (NEXP) language. In 2019, Ji, Natarajan, Vidick, Wright and Yuen settled the analogous quantum question, showing that there is a quantum MIP protocol (MIP*) for every recursively enumerable (RE) language. Arguably, the most technical part in their argument is the quantum local testability of the individual low degree code. I aim to present both the classical and quantum local testability results with some detail. Simonyi 101 and Remote Accessa7a99c3d46944b65a08073518d638c23

Upcoming Schedule

Monday, May 18, 2026 | 11:00am
Nir Bitansky, New York University
Shuffling is Universal: Statistical Additive Randomized Encodings for All Functions
Abstract

The shuffle model is a widely used abstraction for non-interactive anonymous communication. It allows $n$ parties holding private inputs $x_1,\dots,x_n$ to simultaneously send messages to an evaluator, so that the messages are received in a random order. The evaluator can then compute a joint function $f(x_1,\dots,x_n)$, ideally while learning nothing else about the private inputs. The model has become increasingly popular both in cryptography, as an alternative to non-interactive secure computation in trusted setup models, and even more so in differential privacy, as an intermediate between the high-privacy, little-utility {\em local model} and the little-privacy, high-utility {\em central curator model}.

The main open question in this context is which functions $f$ can be computed in the shuffle model with {\em statistical security.} While general feasibility results were obtained using public-key cryptography, the question of statistical security has remained elusive. The common conjecture has been that even relatively simple functions cannot be computed with statistical security in the shuffle model.

We refute this conjecture, showing that {\em all} functions can be computed in the shuffle model with statistical security. In particular, any differentially private mechanism in the central curator model can also be realized in the shuffle model with essentially the same utility, and while the evaluator learns nothing beyond the central model result.

This feasibility result is obtained by constructing a statistically secure {\em additive randomized encoding} (ARE) for any function. An ARE randomly maps individual inputs to group elements whose sum only reveals the function output.
Similarly to other types of randomized encoding of functions,  our statistical ARE is efficient for functions in $NC^1$ or $NL$. Alternatively, we get computationally secure ARE for all polynomial-time functions using a one-way function. More generally, we can convert any (information-theoretic or computational) ``garbling scheme'' to an ARE with a constant-factor size overhead.

Joint work with Saroja Erabelli, Rachit Garg, and Yuval Ishai.

Add to calendar Monday, 2026-05-18 11:00Monday, 2026-05-18 12:00America/New_YorkComputer Science/Discrete Mathematics Seminar Iuse-titleTopic: Shuffling is Universal: Statistical Additive Randomized Encodings for All Functions Speakers: Nir Bitansky, New York University More: https://www.ias.edu/math/events/computer-sciencediscrete-mathematics-seminar-i-626 The shuffle model is a widely used abstraction for non-interactive anonymous communication. It allows $n$ parties holding private inputs $x_1,\dots,x_n$ to simultaneously send messages to an evaluator, so that the messages are received in a random order. The evaluator can then compute a joint function $f(x_1,\dots,x_n)$, ideally while learning nothing else about the private inputs. The model has become increasingly popular both in cryptography, as an alternative to non-interactive secure computation in trusted setup models, and even more so in differential privacy, as an intermediate between the high-privacy, little-utility {\em local model} and the little-privacy, high-utility {\em central curator model}. The main open question in this context is which functions $f$ can be computed in the shuffle model with {\em statistical security.} While general feasibility results were obtained using public-key cryptography, the question of statistical security has remained elusive. The common conjecture has been that even relatively simple functions cannot be computed with statistical security in the shuffle model. We refute this conjecture, showing that {\em all} functions can be computed in the shuffle model with statistical security. In particular, any differentially private mechanism in the central curator model can also be realized in the shuffle model with essentially the same utility, and while the evaluator learns nothing beyond the central model result. This feasibility result is obtained by constructing a statistically secure {\em additive randomized encoding} (ARE) for any function. An ARE randomly maps individual inputs to group elements whose sum only reveals the function output. Similarly to other types of randomized encoding of functions,  our statistical ARE is…West Lecture Hall and Remote Accessa7a99c3d46944b65a08073518d638c23
Monday, Jun 01, 2026 | 11:00am
Jarosław Błasiok, Bocconi University
Expanders Meet Reed-Muller: Easy Instances of Noisy k-XOR
Abstract
Add to calendar Monday, 2026-06-01 11:00Monday, 2026-06-01 12:00America/New_YorkComputer Science/Discrete Mathematics Seminar Iuse-titleTopic: Expanders Meet Reed-Muller: Easy Instances of Noisy k-XOR Speakers: Jarosław Błasiok, Bocconi University More: https://www.ias.edu/math/events/computer-sciencediscrete-mathematics-seminar-i-627 Simonyi Hall 101 and Remote Accessa7a99c3d46944b65a08073518d638c23
Tuesday, Jun 02, 2026 | 10:30am
Itzhak Tamo, Tel-Aviv University
Computer Science/Discrete Mathematics Seminar II
Abstract
Add to calendar Tuesday, 2026-06-02 10:30Tuesday, 2026-06-02 12:30America/New_YorkComputer Science/Discrete Mathematics Seminar IIuse-titleSpeakers: Itzhak Tamo, Tel-Aviv University More: https://www.ias.edu/math/events/computer-sciencediscrete-mathematics-seminar-ii-621 Simonyi 101 and Remote Accessa7a99c3d46944b65a08073518d638c23

Past Seminars Archive

Past Seminars Archive