DOI to the publisher's website. • The final author version and the galley proof are versions of the publication after peer review. • The final published version features the final layout of the paper including the volume, issue and page numbers. Link to publication General rights Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. • Users may download and print one copy of any publication from the public portal for the purpose of private study or research. • You may not further distribute the material or use it for any profit-making activity or commercial gain • You may freely distribute the URL identifying the publication in the public portal. If the publication is distributed under the terms of Article 25fa of the Dutch Copyright Act, indicated by the "Taverne" license above, please follow below link for the End User Agreement:
Razborov (1996) recently proved that polynomial calculus proofs of the pigeonhole principle P HP m n must have degree at least n/2 + 1 over any field. We present a simplified proof of the same result.Furthermore, we show a matching upper bound on polynomial calculus proofs of the pigeonhole principle for any field of sufficiently large characteristic, and an n/2 +1 lower bound for any subset sum problem over the field of reals.We show that these degree lower bounds also translate into lower bounds on the number of monomials in any polynomial calculus proof, and hence on the running time of most implementations of the Gröbner basis algorithm.
The copyright law of the United States (Title 17, United States Code) governs the making of photocopies or other reproductions of copyrighted materials. Under certain conditions specified in the law, libraries and archives are authorized to furnish a photocopy or other reproduction. One of these specified conditions is that the photocopy or reproduction is not to be "used for any purpose other than private study, scholarship, or research". If a user makes a request for, or later uses,a photocopy or reproduction for purposes in excess of "fair use", that user may be liable for copyright infringement. This institution reserves the right to refuse to accept a copying order if, in its judgement, fulfillment of the order would involve violation of copyright law.
Abstract. The notion of traitor tracing was introduced by Chor, Fiat, and Naor [Tracing Traitors, Lecture Notes in Comput. Sci. 839, 1994, pp. 257-270] in order to combat piracy scenarios. Recently, Fiat and Tassa [Tracing Traitors, Lecture Notes in Comput. Sci. 1666, 1999 proposed a dynamic traitor tracing scenario, in which the algorithm adapts dynamically according to the responses of the pirate. Let n be the number of users and p the number of traitors.Our main result is an algorithm which locates p traitors, even if p is unknown, using a watermarking alphabet of size p + 1 and an optimal number of Θ(p 2 + p log n) rounds. This improves the exponential number of rounds achieved by Fiat and Tassa in this case. We also present two algorithms that use a larger alphabet: for an alphabet of size p + c + 1, c ≥ 1, an algorithm that uses O(p 2 /c + p log n) rounds; for an alphabet of size pc + 1, an algorithm that uses O(p log c n) rounds.Our final result is a lower bound of Ω(p 2 /c + p log c+1 n) rounds for any algorithm that uses an alphabet of size p + c, assuming that p is not known in advance.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.