Misplaced Pages

Parity learning

Article snapshot taken from Wikipedia with creative commons attribution-sharealike license. Give it a read and then ask your questions in the chat. We can research this topic together.

Parity learning is a problem in machine learning. An algorithm that solves this problem must find a function ƒ, given some samples (xƒ(x)) and the assurance that ƒ computes the parity of bits at some fixed locations. The samples are generated using some distribution over the input. The problem is easy to solve using Gaussian elimination provided that a sufficient number of samples (from a distribution which is not too skewed) are provided to the algorithm.

Noisy version ("Learning Parity with Noise")

In Learning Parity with Noise (LPN), the samples may contain some error. Instead of samples (xƒ(x)), the algorithm is provided with (xy), where for random boolean b { 0 , 1 } {\displaystyle b\in \{0,1\}}

y = { f ( x ) , if  b 1 f ( x ) , otherwise {\displaystyle y={\begin{cases}f(x),&{\text{if }}b\\1-f(x),&{\text{otherwise}}\end{cases}}}

The noisy version of the parity learning problem is conjectured to be hard and is widely used in cryptography.

See also

References

  1. Wasserman, Hal; Kalai, Adam; Blum, Avrim (2000-10-15). "Noise-Tolerant Learning, the Parity Problem, and the Statistical Query Model". arXiv:cs/0010022.
  2. Pietrzak, Krzysztof (2012). "Cryptography from learning parity with noise" (PDF). International Conference on Current Trends in Theory and Practice of Computer Science: 99--114. doi:10.1007/978-3-642-27660-6_9.
  • Avrim Blum, Adam Kalai, and Hal Wasserman, “Noise-tolerant learning, the parity problem, and the statistical query model,” J. ACM 50, no. 4 (2003): 506–519.
  • Adam Tauman Kalai, Yishay Mansour, and Elad Verbin, “On agnostic boosting and parity learning,” in Proceedings of the 40th annual ACM symposium on Theory of computing (Victoria, British Columbia, Canada: ACM, 2008), 629–638, http://portal.acm.org/citation.cfm?id=1374466.
  • Oded Regev, “On lattices, learning with errors, random linear codes, and cryptography,” in Proceedings of the thirty-seventh annual ACM symposium on Theory of computing (Baltimore, MD, USA: ACM, 2005), 84–93, http://portal.acm.org/citation.cfm?id=1060590.1060603.


Stub icon

This applied mathematics–related article is a stub. You can help Misplaced Pages by expanding it.

Categories: