Award Abstract # 1845349
CAREER: Pseudorandom Objects and their Applications in Computer Science

NSF Org: CCF
Division of Computing and Communication Foundations
Awardee: JOHNS HOPKINS UNIVERSITY, THE
Initial Amendment Date: February 1, 2019
Latest Amendment Date: September 21, 2021
Award Number: 1845349
Award Instrument: Continuing Grant
Program Manager: A. Funda Ergun
fergun@nsf.gov
 (703)292-2216
CCF
 Division of Computing and Communication Foundations
CSE
 Direct For Computer & Info Scie & Enginr
Start Date: July 1, 2019
End Date: June 30, 2024 (Estimated)
Total Intended Award Amount: $500,000.00
Total Awarded Amount to Date: $412,312.00
Funds Obligated to Date: FY 2019 = $108,719.00
FY 2020 = $106,546.00

FY 2021 = $197,047.00
History of Investigator:
  • Xin  Li (Principal Investigator)
    lixints@cs.jhu.edu
Awardee Sponsored Research Office: Johns Hopkins University
1101 E 33rd St
Baltimore
MD  US  21218-2686
(443)997-1898
Sponsor Congressional District: 07
Primary Place of Performance: Johns Hopkins University
Baltimore
MD  US  21218-2608
Primary Place of Performance
Congressional District:
07
DUNS ID: 001910777
Parent DUNS ID: 001910777
NSF Program(s): Algorithmic Foundations
Primary Program Source: 040100 NSF RESEARCH & RELATED ACTIVIT
040100 NSF RESEARCH & RELATED ACTIVIT

040100 NSF RESEARCH & RELATED ACTIVIT
Program Reference Code(s): 1045, 7927
Program Element Code(s): 7796
Award Agency Code: 4900
Fund Agency Code: 4900
Assistance Listing Number(s): 47.070

ABSTRACT

One of the most successful paradigms in computer science since the 1970s is the use of random bits (coin flips) in computation, which can be demonstrated from several broad aspects. For example, many simple randomized algorithms perform better than sophisticated deterministic algorithms, and random bits are widely used in modern cryptography to ensure security. Moreover, in certain applications regarding designing combinatorial objects (such as highly connected sparse networks), simply choosing a random object often achieves the best parameters. However, the use of random bits comes at a price: in practice high quality random bits are often too costly to obtain, and many applications such as the example of designing a sparse network require deterministic constructions rather than randomized ones. The overarching goal of this project is to understand the fundamental question of when and how one can replace the use of random bits or randomized objects by pseudorandom objects, which are objects that are deterministically constructed but behave like random ones. This will lead to a deeper understanding of the nature of random bits in computation, as well as more efficient and secure solutions to important questions both in theory and in practice. Examples of benefits include faster algorithms for handling large data sets, more robust networks, and more reliable communications in hostile environments. The project also involves plans for mentoring PhD students, integration of the research topics into courses and books that appeal to students from a variety of different backgrounds, and support of under-represented groups of students in computer science.

The project contains three sets of specific goals. The first set of goals seeks to understand how to reduce the quantity or quality of random bits in computation generally, using two kinds of pseudorandom objects known as pseudorandom generators and randomness extractors. A pseudorandom generator is a function that stretches a short random seed into a long string that looks random to certain functions, and it can be used to reduce the quantity of random bits required. A randomness extractor is a function that transforms imperfect random sources into high quality random bits. The second set of goals investigates the connections of these pseudorandom objects to computational complexity theory. Specifically, the goal is to use the random-like property of these objects to give new constructions of deterministic objects that circumvent barriers in long-standing open problems, such as the question of sequential computation versus parallel computation. The third set of goals involves development of new techniques for constructions of error-correcting codes, which can be used both to protect against various tampering attacks from adversaries, and to achieve privacy or security in cryptographic systems. The study of these topics is based on techniques from several related areas such as probability theory, information theory, cryptography, combinatorics, and harmonic analysis, and will further foster the interactions among these areas towards breakthroughs.

This award reflects NSF's statutory mission and has been deemed worthy of support through evaluation using the Foundation's intellectual merit and broader impacts review criteria.

PUBLICATIONS PRODUCED AS A RESULT OF THIS RESEARCH

Note:  When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

Cheng, Kuan and Li, Xin "Efficient document exchange and error correcting codes with asymmetric information" SODA '21: Proceedings of the Thirty-Second Annual ACM-SIAM Symposium on Discrete Algorithms , 2021 https://doi.org/10.1137/1.9781611976465.144 Citation Details
Cheng, Kuan and Guruswami, Venkatesan and Haeupler, Bernhard and Li, Xin "Efficient Linear and Affine Codes for Correcting Insertions/Deletions" SODA21: Proceedings of the 2021 ACM-SIAM Symposium on Discrete Algorithms , 2021 https://doi.org/10.1137/1.9781611976465.1 Citation Details
Chattopadhyay, Eshan and Li, Xin "Non-malleable Codes, Extractors and Secret Sharing for Interleaved Tampering and Composition of Tampering" Pass R., Pietrzak K. (eds) Theory of Cryptography. TCC 2020. Lecture Notes in Computer Science, vol 12552. Springer, Cham , 2020 https://doi.org/10.1007/978-3-030-64381-2_21 Citation Details
Chattopadhyay, Eshan and Goodman, Jesse and Goyal, Vipul and Kumar, Ashutosh and Li, Xin and Meka, Raghu and Zuckerman, David "Extractors and Secret Sharing Against Bounded Collusion Protocols" 2020 IEEE 61st Annual Symposium on Foundations of Computer Science (FOCS) , 2020 https://doi.org/10.1109/FOCS46700.2020.00117 Citation Details
Li, Xin and Ma, Fermi and Quach, Willy and Wichs, Daniel "Leakage-Resilient Key Exchange and Two-Seed Extractors" Micciancio D., Ristenpart T. (eds) Advances in Cryptology – CRYPTO 2020. CRYPTO 2020. Lecture Notes in Computer Science, vol 12170. Springer, Cham , 2020 https://doi.org/10.1007/978-3-030-56784-2_14 Citation Details
Chattopadhyay, Eshan and Goodman, Jesse and Goyal, Vipul and Li, Xin "Extractors for adversarial sources via extremal hypergraphs" STOC '20: 52nd Annual ACM SIGACT Symposium on Theory of Computing , 2020 https://doi.org/10.1145/3357713.3384339 Citation Details
Cheng, Kuan and Jin, Zhengzhong and Li, Xin and Wu, Ke "Block Edit Errors with Transpositions: Deterministic Document Exchange Protocols and Almost Optimal Binary Codes" Leibniz international proceedings in informatics , 2019 Citation Details

Please report errors in award information by writing to: awardsearch@nsf.gov.

Print this page

Back to Top of page