List Decoding - Applications in Complexity Theory and Cryptography

Applications in Complexity Theory and Cryptography

Algorithms developed for list decoding of several interesting code families have found interesting applications in computational complexity and the field of cryptography. Following is a sample list of applications outside of coding theory:

  • Construction of hard-core predicates from one-way permutations.
  • Predicting witnesses for NP-search problems.
  • Amplifying hardness of Boolean functions.
  • Average case hardness of permanent of random matrices.
  • Extractors and Pseudorandom generators.
  • Efficient traitor tracing.

Read more about this topic:  List Decoding

Famous quotes containing the words complexity and/or theory:

    It is not only their own need to mother that takes some women by surprise; there is also the shock of discovering the complexity of alternative child-care arrangements that have been made to sound so simple. Those for whom the intended solution is equal parenting have found that some parents are more equal than others.
    Elaine Heffner (20th century)

    Freud was a hero. He descended to the “Underworld” and met there stark terrors. He carried with him his theory as a Medusa’s head which turned these terrors to stone.
    —R.D. (Ronald David)