
210 C Cryptographic Hardness of Learning
Minimum Geometric Spanning Trees
Minimum k-Connected Geometric Networks
Randomized Broadcasting in Radio Networks
Randomized Gossiping in Radio Networks
Recommended Reading
1. Cartigny, J., Ingelrest, F., Simplot-Ryl, D., Stojmenovic, I.: Local-
ized LMST and RNG based minimum-energy broadcast proto-
colsinadhocnetworks.AdHocNetw.3(1), 1–16 (2004)
2. Dette, H., Henze, N.: The limit distribution of the largest near-
est-neighbour link in the unit d-cube. J. Appl. Probab. 26, 67–
80 (1989)
3. Kozma, G., Lotker, Z., Sharir, M., Stupp, G.: Geometrically aware
communication in random wireless networks. In: Proceedings
of the twenty-third annual ACM symposium on Principles of
distributed computing, 25–28 July 2004, pp. 310–319
4. Kumar, S., Lai, T.H., Balogh, J.: On k-coverage in a mostly sleep-
ing sensor network. In: Proceedings of the 10th Annual Inter-
national Conference on Mobile Computing and Networking
(MobiCom’04), 26 Sept–1 Oct 2004
5. Li, N., Hou, J.C., Sha, L.: Design and analysis of a MST-based dis-
tributed topology control algorithm for wireless ad-hoc net-
works. In: 22nd AnnualJoint Conference Of The IEEE Computer
And Communications Societies (INFOCOM 2003), vol. 3, 1–3
April 2003, pp. 1702–1712
6. Penrose, M.: The longest edge of the random minimal span-
ning tree. Ann. Appl. Probab. 7(2), 340–361 (1997)
7. Penrose, M.: On k-connectivity for a geometric random graph.
Random. Struct. Algorithms 15(2), 145–164 (1999)
8. Penrose, M.: Random Geometric Graphs. Oxford University
Press, Oxford (2003)
9. Wan, P.-J., Yi, C.-W.: Asymptotic critical transmission ranges for
connectivity in wireless ad hoc networks with Bernoulli nodes.
In: IEEE Wireless Communications and Networking Conference
(WCNC 2005), 13–17 March 2005
10. Wan, P.-J., Yi, C.-W.: Coverage by randomly deployed wireless
sensor networks. In: Proceedings of the 4th IEEE International
Symposium on Network Computing and Applications (NCA
2005), 27–29 July 2005
11. Wan, P.-J., Yi, C.-W.: On the longest edge of Gabriel graphs in
wireless ad hoc networks. Trans. Parallel Distrib. Syst. 18(1), 1–
16 (2007)
12. Wan, P.-J., Yi, C.-W., Yao, F., Jia, X.: Asymptotic critical trans-
mission radius for greedy forward routing in wireless ad hoc
networks. In: Proceedings of the 7th ACM International Sym-
posium on Mobile Ad Hoc Networking and Computing, 22–25
May 2006, pp. 25–36
13. Wang, Y., Li, X.-Y.: Localized construction of bounded degree
and planar spanner for wireless ad hoc networks, In: Proceed-
ings of the 2003 joint workshop on Foundations of mobile
computing (DIALM-POMC’03), 19 Sept 2003, pp. 59–68
14. Yi, C.-W., Wan, P.-J., Li, X.-Y., Frieder, O.: Asymptotic distribu-
tion of the number of isolated nodes in wireless ad hoc net-
works with Bernoulli nodes. In: IEEE Wireless Communications
and Networking Conference (WCNC 2003), March 2003
15. Yi,C.-W.,Wan,P.-J.,Lin,K.-W.,Huang,C.-H.:Asymptoticdistri-
bution of the Number of isolated nodes in wireless ad hoc net-
works with unreliable nodes and links. In: the 49th Annual IEEE
GLOBECOM Technical Conference (GLOBECOM 2006), 27 Nov–
1 Dec 2006
16. Zhang, H., Hou, J.: On deriving the upper bound of ˛-lifetime
for large sensor networks. In: Proceedings of the 5th ACM In-
ternational Symposium on Mobile Ad Hoc Networking & Com-
puting (MobiHoc 2004), 24–26 March 2004
Cryptographic Hardness of Learning
1994; Kearns, Valiant
ADAM KLIVANS
Department of Computer Science, University of Texas
at Austin, Austin, TX, USA
Keywords and Synonyms
Representation-independent hardness for learning
Problem Definition
This paper deals with proving negative results for distribu-
tion-free PAC learning. The crux of the problem is prov-
ing that a polynomial-time algorithm for learning various
concept classes in the PAC model implies that several well-
known cryptosystems are insecure. Thus, if we assume
a particular cryptosystem is secure we can conclude that
it is impossible to efficiently learn a corresponding set of
concept classes.
PAC Learning
We recall here the PAC learning model. Let C be a concept
class (a set of functions over n variables), and let D be a dis-
tribution over the input space f0; 1g
n
.WithC we associate
a size function size that measures the complexity of each
c 2 C.ForexampleifC is a class of Boolean circuits then
size(c) is equal to the number of gates in c.LetA be a ran-
domized algorithm that has access to an oracle which re-
turns labeled examples (x; c(x)) for some unknown c 2 C;
the examples x are drawn according to D.AlgorithmA
PAC-learns concept class C by hypothesis class H if for
any c 2 C, for any distribution D over the input space, and
any ; ı > 0, A runs in time pol y(n; 1/; 1/ı; size(c)) and
produces a hypothesis h 2 H such that with probability
at least (1 ı), Pr
D
[c(x) ¤ h(x)] <. This probability is
taken over the random coin tosses of A as well as over the
random labeled examples seen from distribution D.When
H = C (the hypothesis must be some concept in C)then
Aisaproper PAC learning algorithm. In this article is not
assumed H = C, i. e. hardness results for representation-
independent learning algorithms are discussed. The only