Knowledge

Balanced Boolean function

Source 📝

248:
The dictatorship function can be evaluated after examining only a single bit of the input, but that bit must always be examined. Benjamini, Schramm, and Wilson describe a more complex example based on
256:
can compute the function exactly while ensuring that the probability of reading any particular input bit is small, roughly inversely proportional to the square root of the number of bits.
223: 311:; Wilson, David Bruce (2005), "Balanced boolean functions that can be evaluated so that every input bit is unlikely to be read", in Gabow, Harold N.; Fagin, Ronald (eds.), 243: 133: 173: 153: 113: 89: 268:, where being balanced is one of "the most important criteria for cryptographically strong Boolean functions". If a function is not balanced, it will have a 375:; Zhang, Xian-Mo; Zheng, Yuliang (1993), "Nonlinearly balanced Boolean functions and their propagation characteristics", in Stinson, Douglas R. (ed.), 377:
Advances in Cryptology – CRYPTO '93, 13th Annual International Cryptology Conference, Santa Barbara, California, USA, August 22–26, 1993, Proceedings
178: 225:
is balanced. The bent functions are exactly the functions for which this is true, for all nonzero choices of
313:
Proceedings of the 37th Annual ACM Symposium on Theory of Computing, Baltimore, MD, USA, May 22–24, 2005
403: 228: 118: 60:, the "dictatorship function" that copies the first bit of its input to the output, and the 44:. This means that for a uniformly random input string of bits, the probability of getting a 41: 8: 253: 316: 277: 249: 158: 138: 98: 74: 57: 380: 372: 352: 326: 269: 29: 21: 304: 379:, Lecture Notes in Computer Science, vol. 773, Springer, pp. 49–60, 356: 397: 273: 92: 384: 330: 308: 265: 65: 61: 17: 321: 343:
Chakrabarty, K.; Hayes, J.P. (1998), "Balanced Boolean functions",
315:, Association for Computing Machinery, pp. 244–250, 303: 231: 181: 161: 141: 121: 101: 77: 345:IEE Proceedings – Computers and Digital Techniques 237: 217: 167: 147: 127: 107: 83: 371: 395: 342: 56:Examples of balanced Boolean functions are the 218:{\displaystyle f(x)\oplus f(x\oplus \alpha )} 320: 264:Balanced Boolean functions are used in 396: 367: 365: 299: 297: 295: 293: 252:with the property that a randomized 13: 362: 290: 155:bits, then the function that maps 14: 415: 336: 259: 212: 200: 191: 185: 1: 283: 32:whose output yields as many 7: 64:function that produces the 51: 10: 420: 135:is any nonzero vector of 26:balanced Boolean function 385:10.1007/3-540-48329-2_5 357:10.1049/ip-cdt:19981769 331:10.1145/1060590.1060627 272:, making it subject to 238:{\displaystyle \alpha } 128:{\displaystyle \alpha } 239: 219: 169: 149: 129: 109: 85: 240: 220: 170: 150: 130: 110: 86: 229: 179: 159: 139: 119: 99: 75: 254:Las Vegas algorithm 68:of the input bits. 278:correlation attack 250:percolation theory 235: 215: 165: 145: 125: 105: 81: 373:Seberry, Jennifer 168:{\displaystyle x} 148:{\displaystyle n} 108:{\displaystyle n} 84:{\displaystyle f} 58:majority function 411: 388: 387: 369: 360: 359: 340: 334: 333: 324: 301: 270:statistical bias 244: 242: 241: 236: 224: 222: 221: 216: 174: 172: 171: 166: 154: 152: 151: 146: 134: 132: 131: 126: 114: 112: 111: 106: 90: 88: 87: 82: 30:Boolean function 22:computer science 419: 418: 414: 413: 412: 410: 409: 408: 404:Boolean algebra 394: 393: 392: 391: 370: 363: 341: 337: 322:math.PR/0410282 305:Benjamini, Itai 302: 291: 286: 262: 230: 227: 226: 180: 177: 176: 160: 157: 156: 140: 137: 136: 120: 117: 116: 100: 97: 96: 76: 73: 72: 54: 12: 11: 5: 417: 407: 406: 390: 389: 361: 335: 288: 287: 285: 282: 261: 258: 234: 214: 211: 208: 205: 202: 199: 196: 193: 190: 187: 184: 164: 144: 124: 104: 80: 53: 50: 9: 6: 4: 3: 2: 416: 405: 402: 401: 399: 386: 382: 378: 374: 368: 366: 358: 354: 350: 346: 339: 332: 328: 323: 318: 314: 310: 309:Schramm, Oded 306: 300: 298: 296: 294: 289: 281: 279: 275: 274:cryptanalysis 271: 267: 257: 255: 251: 246: 232: 209: 206: 203: 197: 194: 188: 182: 162: 142: 122: 102: 94: 93:bent function 78: 69: 67: 63: 59: 49: 47: 43: 39: 35: 31: 27: 23: 19: 376: 348: 344: 338: 312: 276:such as the 266:cryptography 263: 247: 70: 66:exclusive or 62:parity check 55: 45: 37: 33: 25: 15: 260:Application 40:s over its 18:mathematics 284:References 115:bits, and 351:(1): 52, 233:α 210:α 207:⊕ 195:⊕ 123:α 42:input set 398:Category 52:Examples 48:is 1/2. 317:arXiv 91:is a 36:s as 28:is a 24:, a 20:and 381:doi 353:doi 349:145 327:doi 175:to 95:on 71:If 16:In 400:: 364:^ 347:, 325:, 307:; 292:^ 280:. 245:. 383:: 355:: 329:: 319:: 213:) 204:x 201:( 198:f 192:) 189:x 186:( 183:f 163:x 143:n 103:n 79:f 46:1 38:1 34:0

Index

mathematics
computer science
Boolean function
input set
majority function
parity check
exclusive or
bent function
percolation theory
Las Vegas algorithm
cryptography
statistical bias
cryptanalysis
correlation attack




Benjamini, Itai
Schramm, Oded
arXiv
math.PR/0410282
doi
10.1145/1060590.1060627
doi
10.1049/ip-cdt:19981769


Seberry, Jennifer
doi

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.