Anindya De
University of California, Berkeley
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Anindya De.
SIAM Journal on Computing | 2012
Anindya De; Christopher Portmann; Thomas Vidick; Renato Renner
Randomness extraction involves the processing of purely classical information and is therefore usually studied with in the framework of classical probability theory. However, such a classical treatment is generally too restrictive for applications where side information about the values taken by classical random variables may be represented by the state of a quantum system. This is particularly relevant in the context of cryptography, where an adversary may make use of quantum devices. Here, we show that the well-known construction paradigm for extractors proposed by Trevisan is sound in the presence of quantum side information. We exploit the modularity of this paradigm to give several concrete extractor constructions, which, e.g., extract all the conditional (smooth) min-entropy of the source using a seed of length polylogarithmic in the input, or only require the seed to be weakly random.
symposium on the theory of computing | 2008
Anindya De; Piyush P. Kurur; Chandan Saha; Ramprasad Saptharishi
We give an O(N • log N • 2O(log*N)) algorithm for multiplying two N-bit integers that improves the O(N • log N • log log N) algorithm by Schönhage-Strassen. Both these algorithms use modular arithmetic. Recently, Fürer gave an O(N • log N • 2O(log*N)) algorithm which however uses arithmetic over complex numbers as opposed to modular arithmetic. In this paper, we use multivariate polynomial multiplication along with ideas from Fürers algorithm to achieve this improvement in the modular setting. Our algorithm can also be viewed as a p-adic version of Fürers algorithm. Thus, we show that the two seemingly different approaches to integer multiplication, modular and complex arithmetic, are similar.
symposium on the theory of computing | 2010
Anindya De; Thomas Vidick
We show that Trevisans extractor and its variants [22,19] are secure against bounded quantum storage adversaries. One instantiation gives the first such extractor to achieve an output length Θ(K-b), where K is the sources entropy and b the adversarys storage, together with a poly-logarithmic seed length. Another instantiation achieves a logarithmic key length, with a slightly smaller output length Θ((K-b)/Kγ) for any γ>0. In contrast, the previous best construction [21] could only extract (K/b)1/15 bits. Some of our constructions have the additional advantage that every bit of the output is a function of only a polylogarithmic number of bits from the source, which is crucial for some cryptographic applications. Our argument is based on bounds for a generalization of quantum random access codes, which we call quantum functional access codes. This is crucial as it lets us avoid the local list-decoding algorithm central to the approach in [21], which was the source of the multiplicative overhead.
SIAM Journal on Computing | 2013
Anindya De; Piyush P. Kurur; Chandan Saha; Ramprasad Saptharishi
We give an
symposium on the theory of computing | 2016
Constantinos Daskalakis; Anindya De; Gautam Kamath; Christos Tzamos
N\cdot \log N\cdot 2^{O(\log^*N)}
IEEE Transactions on Power Delivery | 2007
Rajeev Kumar Gajbhiye; Anindya De; S. A. Soman
time algorithm to multiply two
foundations of computer science | 2015
Anindya De
N
symposium on the theory of computing | 2014
Anindya De; Rocco A. Servedio
-bit integers that uses modular arithmetic for intermediate computations instead of arithmetic over complex numbers as in Furers algorithm, which also has the same and so far the best known complexity. The previous best algorithm using modular arithmetic (by Schonhage and Strassen) has complexity
SIAM Journal on Discrete Mathematics | 2016
Anindya De; Ilias Diakonikolas; Rocco A. Servedio
O(N \cdot \log N \cdot \log\log N)
symposium on discrete algorithms | 2014
Constantinos Daskalakis; Anindya De; Ilias Diakonikolas; Ankur Moitra; Rocco A. Servedio
. The advantage of using modular arithmetic as opposed to complex number arithmetic is that we can completely evade the task of bounding the truncation error due to finite approximations of complex numbers, which makes the analysis relatively simple. Our algorithm is based upon Furers algorithm, but uses fast Fourier transform over multivariate polynomials along with an estimate of the least prime in an arithmetic progression to achieve this improvement in the modular setting. It can also be viewed as a