scholarly journals Periodic Fourier representation of Boolean functions

2019 ◽  
Vol 19 (5&6) ◽  
pp. 392-412
Author(s):  
Ryuhei Mori

In this work, we consider a new type of Fourier-like representation of Boolean function f\colon\{+1,-1\}^n\to\{+1,-1\}: f(x) = \cos(\pi\sum_{S\subseteq[n]}\phi_S \prod_{i\in S} x_i). This representation, which we call the periodic Fourier representation, of Boolean function is closely related to a certain type of multipartite Bell inequalities and non-adaptive measurement-based quantum computation with linear side-processing NMQCp. The minimum number of non-zero coefficients in the above representation, which we call the periodic Fourier sparsity, is equal to the required number of qubits for the exact computation of f by \NMQCp. Periodic Fourier representations are not unique, and can be directly obtained both from the Fourier representation and the F_2-polynomial representation. In this work, we first show that Boolean functions related to ZZZZ-polynomial have small periodic Fourier sparsities. Second, we show that the periodic Fourier sparsity is at least 2^{\deg_{\mathbb{F}_2}(f)}-1, which means that NMQCp efficiently computes a Boolean function $f$ if and only if F_2-degree of f is small. Furthermore, we show that any symmetric Boolean function, e.g., AND_n, Mod^3_n, Maj_n, etc, can be exactly computed by depth-2 NMQCp using a polynomial number of qubits, that implies exponential gaps between NMQCp and depth-2 NMQCp.

2016 ◽  
Vol 12 (1) ◽  
pp. 5-24
Author(s):  
L. Haviarová ◽  
E. Toman

Abstract In the present paper we consider symmetric Boolean functions with special property. We study properties of the maximal intervals of these functions. Later we show characteristics of corresponding interval graphs and simplified interval graphs. Specifically we prove, that these two graphs are isomorphic for symmetric Boolean function. Then we obtain the vertex degree of these graphs. We discuss also disjunctive normal forms.


1999 ◽  
Vol 10 (04) ◽  
pp. 535-542
Author(s):  
RICHARD BEIGEL ◽  
ANNA BERNASCONI

We investigate the representation of Boolean functions as polynomials over the field GF(2), and prove an interesting characteriztion theorem: the degree of a Boolean function over GF(2) is equal to the size of its largest subfunction that takes the value 1 on an odd number of input strings. We then present some properties of odd functions, i.e., functions that take the value 1 on an odd number of strings, and analyze the connections between the problem of the existence of odd functions with very low maximal sensitivity and the long standing open problem of the relationship between the maximal sensitivity and the block sensitivity of Boolean functions.


2015 ◽  
Vol 7 (2) ◽  
pp. 187 ◽  
Author(s):  
Hongli Liu

The conceptions of $\chi$-value and K-rotation symmetric Boolean functions are introduced by Cusick. K-rotation symmetric Boolean functions are a special rotation symmetric functions, which are invariant under the $k-th$ power of $\rho$.In this paper, we discuss cubic 2-value 2-rotation symmetric Boolean function with $2n$ variables, which denoted by $F^{2n}(x^{2n})$. We give the recursive formula of weight of $F^{2n}(x^{2n})$, and prove that the weight of $F^{2n}(x^{2n})$ is the same as its nonlinearity.


2020 ◽  
Vol Accepted manuscript ◽  
Author(s):  
Mathias Hopp ◽  
Pål Ellingsen ◽  
Constanza Riera ◽  
Pantelimon Stănică

This paper explores the distribution of algebraic thickness of Boolean functions (that is, the minimum number of terms in the ANF of the functions in the orbit of a Boolean function, through all affine transformations), in four and five variables, and the complete distribution is presented. Additionally, a complete analysis of some complexity properties (e.g., nonlinearity, balancedness, etc.) of all relevant orbits of Boolean functions is presented. Some properties of our notion of rigid function (which enabled us to reduce significantly the computation) are shown and some open questions are proposed, providing some further explanation of one of these questions.


2017 ◽  
Vol 27 (2) ◽  
Author(s):  
Stanislav V. Smyshlyaev

AbstractThe paper is concerned with relations between the correlation-immunity (stability) and the perfectly balancedness of Boolean functions. It is shown that an arbitrary perfectly balanced Boolean function fails to satisfy a certain property that is weaker than the 1-stability. This result refutes some assertions by Markus Dichtl. On the other hand, we present new results on barriers of perfectly balanced Boolean functions which show that any perfectly balanced function such that the sum of the lengths of barriers is smaller than the length of variables, is 1-stable.


2016 ◽  
Vol 26 (01) ◽  
pp. 1650004 ◽  
Author(s):  
Benny Applebaum ◽  
Dariusz R. Kowalski ◽  
Boaz Patt-Shamir ◽  
Adi Rosén

We consider a message passing model with n nodes, each connected to all other nodes by a link that can deliver a message of B bits in a time unit (typically, B = O(log n)). We assume that each node has an input of size L bits (typically, L = O(n log n)) and the nodes cooperate in order to compute some function (i.e., perform a distributed task). We are interested in the number of rounds required to compute the function. We give two results regarding this model. First, we show that most boolean functions require ‸ L/B ‹ − 1 rounds to compute deterministically, and that even if we consider randomized protocols that are allowed to err, the expected running time remains [Formula: see text] for most boolean function. Second, trying to find explicit functions that require superconstant time, we consider the pointer chasing problem. In this problem, each node i is given an array Ai of length n whose entries are in [n], and the task is to find, for any [Formula: see text], the value of [Formula: see text]. We give a deterministic O(log n/ log log n) round protocol for this function using message size B = O(log n), a slight but non-trivial improvement over the O(log n) bound provided by standard “pointer doubling.” The question of an explicit function (or functionality) that requires super constant number of rounds in this setting remains, however, open.


2020 ◽  
Vol 30 (2) ◽  
pp. 103-116 ◽  
Author(s):  
Kirill A. Popkov

AbstractWe prove that, for n ⩾ 2, any n-place Boolean function may be implemented by a two-pole contact circuit which is irredundant and allows a diagnostic test with length not exceeding n + k(n − 2) under at most k contact breaks. It is shown that with k = k(n) ⩽ 2n−4, for almost all n-place Boolean functions, the least possible length of such a test is at most 2k + 2.


2015 ◽  
pp. 435-452
Author(s):  
Andris Ambainis ◽  
Jozef Gruska ◽  
Shenggen Zheng

It has been proved that almost all n-bit Boolean functions have exact classical query complexity n. However, the situation seemed to be very different when we deal with exact quantum query complexity. In this paper, we prove that almost all n-bit Boolean functions can be computed by an exact quantum algorithm with less than n queries. More exactly, we prove that ANDn is the only n-bit Boolean function, up to isomorphism, that requires n queries.


2021 ◽  
Vol 16 (1) ◽  
pp. 1-13
Author(s):  
Yu Zhou ◽  
Jianyong Hu ◽  
Xudong Miao ◽  
Yu Han ◽  
Fuzhong Zhang

Abstract The notion of the confusion coefficient is a property that attempts to characterize confusion property of cryptographic algorithms against differential power analysis. In this article, we establish a relationship between the confusion coefficient and the autocorrelation function for any Boolean function and give a tight upper bound and a tight lower bound on the confusion coefficient for any (balanced) Boolean function. We also deduce some deep relationships between the sum-of-squares of the confusion coefficient and other cryptographic indicators (the sum-of-squares indicator, hamming weight, algebraic immunity and correlation immunity), respectively. Moreover, we obtain some trade-offs among the sum-of-squares of the confusion coefficient, the signal-to-noise ratio and the redefined transparency order for a Boolean function.


2017 ◽  
Author(s):  
Sankhanil Dey ◽  
Ranjan Ghosh

US defence sponsored the DES program in 1974 and released it in 1977. It remained as a well-known and well accepted block cipher until 1998. Thirty-two 4-bit DES S-Boxes are grouped in eight each with four and are put in public domain without any mention of their design methodology. S-Boxes, 4-bit, 8-bit or 32-bit, find a permanent seat in all future block ciphers. In this paper, while looking into the design methodology of DES S-Boxes, we find that S-Boxes have 128 balanced and non-linear Boolean Functions, of which 102 used once, while 13 used twice and 92 of 102 satisfy the Boolean Function-level Strict Avalanche Criterion. All the S-Boxes satisfy the Bit Independence Criterion. Their Differential Cryptanalysis exhibits better results than the Linear Cryptanalysis. However, no S-Boxes satisfy the S-Box-level SAC analyses. It seems that the designer emphasized satisfaction of Boolean-Function-level SAC and S-Box-level BIC and DC, not the S-Box-level LC and SAC.


Sign in / Sign up

Export Citation Format

Share Document