Computer Science & Discrete Mathematics (CSDM)

Computer Science & Discrete Mathematics (CSDM) Seminar

A weekly seminar on topics in theoretical computer science and discrete mathematics

Time: Every Monday 11:00 AM-12:00 PM, and Tuesday 10:30 AM-12:30 PM,   Place: Simonyi 101

Information about CSDM

Upcoming Talk

Arguments for Bounded-Space Computations from One-Way Functions

Speaker: Guy Rothblum, Apple & Weizmann Institute of Science
When: Monday, April 20, 2026 | 1:30 PM EDT
Where: West Lecture Hall and Remote Access

Abstract

We construct very efficient argument systems for proving the correctness of bounded-space computations, based on the existence of one-way functions. Our argument system applies to general computations running in time T and space S. The communication and verification time are poly-logarithmic in T and linear in S. The honest prover's running time is polynomial in T, so the protocol is doubly-efficient. All complexities are polynomial in the security parameter of the one-way function, and verification is also linear in the input length.

Prior to this work, doubly-efficient argument systems with poly-logarithmic dependence on T required assuming (at least) the existence of collision-resistant hash functions [Kilian, STOC 1992]. For unconditionally sound doubly-efficient protocols, the RRR protocol for bounded-space computations [Reingold, Rothblum and Rothblum, STOC 2016] has communication and verification complexities that grow with an arbitrarily small constant power of T.

 

Add to calendar 04/20/2026 13:3004/20/2026 14:30America/New_YorkComputer Science/Discrete Mathematics Seminar Iuse-titleTopic: Arguments for Bounded-Space Computations from One-Way Functions Speakers: Guy Rothblum, Apple & Weizmann Institute of Science More: https://www.ias.edu/math/events/computer-sciencediscrete-mathematics-seminar-i-624 We construct very efficient argument systems for proving the correctness of bounded-space computations, based on the existence of one-way functions. Our argument system applies to general computations running in time T and space S. The communication and verification time are poly-logarithmic in T and linear in S. The honest prover's running time is polynomial in T, so the protocol is doubly-efficient. All complexities are polynomial in the security parameter of the one-way function, and verification is also linear in the input length. Prior to this work, doubly-efficient argument systems with poly-logarithmic dependence on T required assuming (at least) the existence of collision-resistant hash functions [Kilian, STOC 1992]. For unconditionally sound doubly-efficient protocols, the RRR protocol for bounded-space computations [Reingold, Rothblum and Rothblum, STOC 2016] has communication and verification complexities that grow with an arbitrarily small constant power of T.   West Lecture Hall and Remote Accessa7a99c3d46944b65a08073518d638c23

Upcoming Schedule

Tuesday, Apr 21, 2026 | 10:30am
Zander Kelley, Institute for Advanced Study
A More Efficient Sifting Lemma and a Stronger 3-Player Communication Lower Bound
Abstract

A central goal in complexity theory is to prove separations between randomized and deterministic models of computation. In communication complexity, a key challenge is to establish lower bounds for multiparty protocols in the number-on-forehead (NOF) model. Recent work by Kelley, Lovett, and Meka provided a separation for an explicit 3-player function, proving a deterministic lower bound of Ω(n^{1/3}) for a function with an efficient randomized protocol.

The proof of this lower bound involved showing that the ‘yes’ instances of a function cannot be efficiently covered by small "cylinder intersections" -- the basic unit of NOF communication. This analysis hinges on a sifting lemma for bipartite graphs, which guarantees that any graph with a large "grid norm" must contain a smaller, much denser induced subgraph. In this talk, based on joint work with Xin Lyu, I will discuss a new, more efficient version of this sifting lemma. This strengthening of the core technical tool allows us to improve the 3-player lower bound to Ω(n^{1/2}), achieving a stronger separation.

Specifically, we prove a new structural result about small cylinder intersections: that they can be covered by a few reasonably small "slice functions". I will explain how this result can be productively compared with Szemerédi's Triangle Removal Lemma for graphs, which also gives a way to cover small cylinder intersections by something simpler.

Add to calendar Tuesday, 2026-04-21 10:30Tuesday, 2026-04-21 12:30America/New_YorkComputer Science/Discrete Mathematics Seminar IIuse-titleTopic: A More Efficient Sifting Lemma and a Stronger 3-Player Communication Lower Bound Speakers: Zander Kelley, Institute for Advanced Study More: https://www.ias.edu/math/events/computer-sciencediscrete-mathematics-seminar-ii-619 A central goal in complexity theory is to prove separations between randomized and deterministic models of computation. In communication complexity, a key challenge is to establish lower bounds for multiparty protocols in the number-on-forehead (NOF) model. Recent work by Kelley, Lovett, and Meka provided a separation for an explicit 3-player function, proving a deterministic lower bound of Ω(n^{1/3}) for a function with an efficient randomized protocol. The proof of this lower bound involved showing that the ‘yes’ instances of a function cannot be efficiently covered by small "cylinder intersections" -- the basic unit of NOF communication. This analysis hinges on a sifting lemma for bipartite graphs, which guarantees that any graph with a large "grid norm" must contain a smaller, much denser induced subgraph. In this talk, based on joint work with Xin Lyu, I will discuss a new, more efficient version of this sifting lemma. This strengthening of the core technical tool allows us to improve the 3-player lower bound to Ω(n^{1/2}), achieving a stronger separation. Specifically, we prove a new structural result about small cylinder intersections: that they can be covered by a few reasonably small "slice functions". I will explain how this result can be productively compared with Szemerédi's Triangle Removal Lemma for graphs, which also gives a way to cover small cylinder intersections by something simpler. Simonyi 101 and Remote Accessa7a99c3d46944b65a08073518d638c23
Monday, Apr 27, 2026 | 11:00am
Zeev Dvir, Princeton University
Locally Decodable Codes and Representations of Finite Groups
Abstract

Locally Decodable Codes (LDCs) are a special type of error correcting codes which are constructed from finite point sets that support many small linear dependencies (e.g. many collinear triples). Despite their importance, there are still huge gaps between the known LDC constructions and lower bounds. In 2008 , Efremenko showed a framework for constructing LDCs from representations of finite groups. We strengthen Efremenko's reduction and use this strengthening, together with known bounds on LDCs, to derive new results on representations. In particular we show that if rho is an n-dimensional irreducible representation of G and rho(g) is not the identity, then it must be n/log|G| far from the identity in rank metric (this bound is the best possible in general). 

Add to calendar Monday, 2026-04-27 11:00Monday, 2026-04-27 12:00America/New_YorkComputer Science/Discrete Mathematics Seminar Iuse-titleTopic: Locally Decodable Codes and Representations of Finite Groups Speakers: Zeev Dvir, Princeton University More: https://www.ias.edu/math/events/computer-sciencediscrete-mathematics-seminar-i-622 Locally Decodable Codes (LDCs) are a special type of error correcting codes which are constructed from finite point sets that support many small linear dependencies (e.g. many collinear triples). Despite their importance, there are still huge gaps between the known LDC constructions and lower bounds. In 2008 , Efremenko showed a framework for constructing LDCs from representations of finite groups. We strengthen Efremenko's reduction and use this strengthening, together with known bounds on LDCs, to derive new results on representations. In particular we show that if rho is an n-dimensional irreducible representation of G and rho(g) is not the identity, then it must be n/log|G| far from the identity in rank metric (this bound is the best possible in general).  Simonyi Hall 101 and Remote Accessa7a99c3d46944b65a08073518d638c23
Tuesday, Apr 28, 2026 | 10:30am
Pravesh Kothari, Princeton University
Computer Science/Discrete Mathematics Seminar II
Abstract
Add to calendar Tuesday, 2026-04-28 10:30Tuesday, 2026-04-28 12:30America/New_YorkComputer Science/Discrete Mathematics Seminar IIuse-titleSpeakers: Pravesh Kothari, Princeton University More: https://www.ias.edu/math/events/computer-sciencediscrete-mathematics-seminar-ii-618 Simonyi 101 and Remote Accessa7a99c3d46944b65a08073518d638c23

Past Seminars Archive

Past Seminars Archive