Cookies Policy
The website need some cookies and similar means to function. If you permit us, we will use those means to collect data on your visits for aggregated statistics to improve our service. Find out More
Accept Reject
  • Menu
Publications

Publications by Luís Filipe Antunes

2009

Sophistication Revisited

Authors
Antunes, L; Fortnow, L;

Publication
THEORY OF COMPUTING SYSTEMS

Abstract
Kolmogorov complexity measures the amount of information in a string as the size of the shortest program that computes the string. The Kolmogorov structure function divides the smallest program producing a string in two parts: the useful information present in the string, called sophistication if based on total functions, and the remaining accidental information. We formalize a connection between sophistication (due to Koppel) and a variation of computational depth (intuitively the useful or nonrandom information in a string), prove the existence of strings with maximum sophistication and show that they are the deepest of all strings.

2007

Low-depth witnesses are easy to find

Authors
Antunes, L; Fortnow, L; Pinto, A; Souto, A;

Publication
Twenty-Second Annual IEEE Conference on Computational Complexity, Proceedings

Abstract
Antunes, Fortnow, van Melkebeek and Vinodchandran captured the notion of non-random information by computational depth, the difference between the polynomial-time-bounded Kolmogorov complexity and traditional Kolmogorov complexity. We show unconditionally how to probabilistically find satisfying assignments for formulas that have at least one assignment of logarithmic depth. The converse holds under a standard hardness assumption though fails if BPP = FewP = EXP. We also show that assuming good pseudorandom generators one cannot increase the depth of a string efficiently.

2003

Sophistication revisited

Authors
Antunes, L; Fortnow, L;

Publication
AUTOMATA, LANGUAGES AND PROGRAMMING, PROCEEDINGS

Abstract
The Kolmogorov structure function divides the smallest program producing a string in two parts: the useful information present in the string, called sophistication if based on total functions, and the remaining accidental information. We revisit the notion of sophistication due to Koppel, formalize a connection between sophistication and a variation of computational depth (intuitively the useful or nonrandom information in a string), prove the existence of strings with maximum sophistication and show that they encode solutions of the halting problem, i.e., they are the deepest of all strings.

2009

Commitment and authentication systems

Authors
Pinto, A; Souto, A; Matos, A; Antunes, L;

Publication
DESIGNS CODES AND CRYPTOGRAPHY

Abstract
In the present paper, we answer a question raised in the paper Constructions and Bounds for Unconditionally Secure Non-Interactive Commitment Schemes, by Blundo et al., 2002, showing that there is a close relation between unconditionally secure commitment schemes and unconditionally secure authentication schemes, and that an unconditionally secure commitment scheme can be built from such an authentication scheme and an unconditionally secure cipher system. To investigate the opposite direction, we define optimal commitment systems and show that these must be resolvable design commitment schemes. Then, a proof is given that the resolvable design commitment schemes are a composition of an authentication system and a cipher system and the conclusion follows that this is the case for all optimal commitment systems. We also show how to build optimal schemes from transversal designs that are easy to build and can be more efficiently implemented than the proposal in the previously cited paper.

2003

Using depth to capture average-case complexity

Authors
Antunes, L; Fortnow, L; Vinodchandran, NV;

Publication
FUNDAMENTALS OF COMPUTATION THEORY, PROCEEDINGS

Abstract
We give the first characterization of Turing machines that run in polynomial-time on average. We show that a Turing machine M runs in average polynomial-time if for all inputs x the Turing machine uses time exponential in the computational depth of x, where the computational depth is a measure of the amount of "useful" information in x.

2010

Password sharing and how to reduce it

Authors
Ferreira, A; Correia, R; Chadwick, DW; Santos, H; Gomes, R; Reis, D; Antunes, L;

Publication
Certification and Security in Health-Related Web Applications: Concepts and Solutions

Abstract
Password sharing is a common security problem. Some application domains are more exposed than others and, by dealing with very sensitive information, the healthcare domain is definitely not exempt from this problem. This chapter presents a case study of a cross section of how healthcare professionals actually deal with password authentication in typical real world scenarios. It then compares the professionals' actual practice with what they feel about password sharing and what are the most frequent problems associated with it. Further, this chapter discusses and suggests how to solve or minimize some of these problems using both technological and social cultural mechanisms. © 2011, IGI Global.

  • 13
  • 16