Award Abstract # 1845349
CAREER: Pseudorandom Objects and their Applications in Computer Science
| NSF Org: |
CCF
Division of Computing and Communication Foundations
|
| Awardee: |
JOHNS HOPKINS UNIVERSITY, THE
|
| Initial Amendment Date: |
February 1, 2019 |
| Latest Amendment Date: |
September 21, 2021 |
| Award Number: |
1845349 |
| Award Instrument: |
Continuing Grant |
| Program Manager: |
A. Funda Ergun
fergun@nsf.gov
(703)292-2216
CCF
Division of Computing and Communication Foundations
CSE
Direct For Computer & Info Scie & Enginr
|
| Start Date: |
July 1, 2019 |
| End Date: |
June 30, 2024 (Estimated) |
| Total Intended Award Amount: |
$500,000.00 |
| Total Awarded Amount to Date: |
$412,312.00 |
| Funds Obligated to Date: |
FY 2019 = $108,719.00
FY 2020 = $106,546.00
FY 2021 = $197,047.00
|
| History of Investigator: |
-
Xin
Li
(Principal Investigator)
lixints@cs.jhu.edu
|
| Awardee Sponsored Research Office: |
Johns Hopkins University
1101 E 33rd St
Baltimore
MD
US
21218-2686
(443)997-1898
|
| Sponsor Congressional District: |
07
|
| Primary Place of Performance: |
Johns Hopkins University
Baltimore
MD
US
21218-2608
|
Primary Place of Performance Congressional District: |
07
|
| DUNS ID: |
001910777
|
| Parent DUNS ID: |
001910777
|
| NSF Program(s): |
Algorithmic Foundations
|
| Primary Program Source: |
040100 NSF RESEARCH & RELATED ACTIVIT
040100 NSF RESEARCH & RELATED ACTIVIT
040100 NSF RESEARCH & RELATED ACTIVIT
|
| Program Reference Code(s): |
1045,
7927
|
| Program Element Code(s): |
7796
|
| Award Agency Code: |
4900
|
| Fund Agency Code: |
4900
|
| Assistance Listing Number(s): |
47.070
|
ABSTRACT

One of the most successful paradigms in computer science since the 1970s is the use of random bits (coin flips) in computation, which can be demonstrated from several broad aspects. For example, many simple randomized algorithms perform better than sophisticated deterministic algorithms, and random bits are widely used in modern cryptography to ensure security. Moreover, in certain applications regarding designing combinatorial objects (such as highly connected sparse networks), simply choosing a random object often achieves the best parameters. However, the use of random bits comes at a price: in practice high quality random bits are often too costly to obtain, and many applications such as the example of designing a sparse network require deterministic constructions rather than randomized ones. The overarching goal of this project is to understand the fundamental question of when and how one can replace the use of random bits or randomized objects by pseudorandom objects, which are objects that are deterministically constructed but behave like random ones. This will lead to a deeper understanding of the nature of random bits in computation, as well as more efficient and secure solutions to important questions both in theory and in practice. Examples of benefits include faster algorithms for handling large data sets, more robust networks, and more reliable communications in hostile environments. The project also involves plans for mentoring PhD students, integration of the research topics into courses and books that appeal to students from a variety of different backgrounds, and support of under-represented groups of students in computer science.
The project contains three sets of specific goals. The first set of goals seeks to understand how to reduce the quantity or quality of random bits in computation generally, using two kinds of pseudorandom objects known as pseudorandom generators and randomness extractors. A pseudorandom generator is a function that stretches a short random seed into a long string that looks random to certain functions, and it can be used to reduce the quantity of random bits required. A randomness extractor is a function that transforms imperfect random sources into high quality random bits. The second set of goals investigates the connections of these pseudorandom objects to computational complexity theory. Specifically, the goal is to use the random-like property of these objects to give new constructions of deterministic objects that circumvent barriers in long-standing open problems, such as the question of sequential computation versus parallel computation. The third set of goals involves development of new techniques for constructions of error-correcting codes, which can be used both to protect against various tampering attacks from adversaries, and to achieve privacy or security in cryptographic systems. The study of these topics is based on techniques from several related areas such as probability theory, information theory, cryptography, combinatorics, and harmonic analysis, and will further foster the interactions among these areas towards breakthroughs.
This award reflects NSF's statutory mission and has been deemed worthy of support through evaluation using the Foundation's intellectual merit and broader impacts review criteria.
PUBLICATIONS PRODUCED AS A RESULT OF THIS RESEARCH

Note:
When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).
Some links on this page may take you to non-federal websites. Their policies may differ from this site.
Chattopadhyay, Eshan and Li, Xin
"Non-malleable Codes, Extractors and Secret Sharing for Interleaved Tampering and Composition of Tampering"
Pass R., Pietrzak K. (eds) Theory of Cryptography. TCC 2020. Lecture Notes in Computer Science, vol 12552. Springer, Cham
, 2020
https://doi.org/10.1007/978-3-030-64381-2_21
Citation Details
Chattopadhyay, Eshan and Goodman, Jesse and Goyal, Vipul and Kumar, Ashutosh and Li, Xin and Meka, Raghu and Zuckerman, David
"Extractors and Secret Sharing Against Bounded Collusion Protocols"
2020 IEEE 61st Annual Symposium on Foundations of Computer Science (FOCS)
, 2020
https://doi.org/10.1109/FOCS46700.2020.00117
Citation Details
Li, Xin and Ma, Fermi and Quach, Willy and Wichs, Daniel
"Leakage-Resilient Key Exchange and Two-Seed Extractors"
Micciancio D., Ristenpart T. (eds) Advances in Cryptology – CRYPTO 2020. CRYPTO 2020. Lecture Notes in Computer Science, vol 12170. Springer, Cham
, 2020
https://doi.org/10.1007/978-3-030-56784-2_14
Citation Details
Cheng, Kuan and Jin, Zhengzhong and Li, Xin and Wu, Ke
"Block Edit Errors with Transpositions: Deterministic Document Exchange Protocols and Almost Optimal Binary Codes"
Leibniz international proceedings in informatics
, 2019
Citation Details
Please report errors in award information by writing to: awardsearch@nsf.gov.