Abstract
Boolean functions have important applications in molecular regulatory networks, engineering, cryptography, information technology, and computer science. Symmetric Boolean functions have received a lot of attention in several decades. Sensitivity and block sensitivity are important complexity measures of Boolean functions. In this paper, we study the sensitivity of elementary symmetric Boolean functions and obtain many explicit formulas. We also obtain a formula for the block sensitivity of symmetric Boolean functions and discuss its applications in elementary symmetric Boolean functions.
1 Introduction
In 1938, Shannon [28] recognized that symmetric functions had efficient switch network implementation. Since then, a lot of research has been carried out on symmetric or partially symmetric Boolean functions, and detection of symmetry has become important in logic synthesis, technology mapping, binary decision diagram minimization, and testing [1,10,22].
For the applications of symmetric Boolean functions in cryptography, Canteaut and Videau [3] presented an extensive study in 2005, and more results on (totally) symmetric Boolean functions can be found in other papers [2,5,8,17,21,23,27].
It is clear that any symmetric Boolean function can be written as a sum of some elementary symmetric Boolean functions. Hence, it is a fundamental question to have a comprehensive understanding about elementary symmetric Boolean functions. In ref. [8], the authors studied the balancedness of elementary symmetric Boolean functions and they proposed a conjecture which has received a lot of attention [4,5,6,8,9,13,14,31].
In ref. [7], Cook et al. introduced the definition of sensitivity as a combinatorial measure for Boolean functions by providing lower bounds on the time needed by CREW PRAM (Concurrent Read Exclusive Write, Parallel Random Access Machine). The concept was extended by Nisan [24] to block sensitivity. The study of sensitivity and block sensitivity of Boolean functions has been an active research topic for many years [11,12,16,18,19,25,26,29,30,32].
Recently, Huang proved the long standing Sensitivity Conjecture [15]: for any Boolean function
In Section 2 of this paper, we introduce the algebraic normal form (ANF) of Boolean functions and the definition of symmetric Boolean functions. In Section 3, we first recall definitions used in the paper, then obtain many explicit formulas of the sensitivities of elementary symmetric Boolean functions by using some elementary combinatorial results. The main idea of Section 3 is motivated by ref. [8,33]. In Section 4, we prove a formula for the block sensitivity of symmetric Boolean functions. Based on our knowledge, this is the first study about the block sensitivity of symmetric Boolean functions. We apply this formula to elementary symmetric Boolean functions and show that the block sensitivity can be strictly greater than the sensitivity for some elementary symmetric Boolean functions. The conclusion is included in Section 5.
2 Preliminaries
In this section, we introduce the definitions and notations. Let
where each coefficient
The number of non-zeros in
Let
then the function
Let
3 Sensitivity of elementary symmetric Boolean functions
In this section, we calculate the sensitivities of elementary symmetric Boolean functions. More precisely, we present explicit formulas for the sensitivities of
Definition 3.1
For integers
Let
Definition 3.2
[16,26] The sensitivity
In the above definition,
Example 3.3
In Table 1, we list the sensitivities of
Example 3.3,
|
|
|
|
|
|
|
|
|---|---|---|---|---|---|---|
| (0,0,0) | 0 | 3 | 0 | 0 | 0 | 0 |
| (0,0,1) | 1 | 3 | 0 | 2 | 0 | 0 |
| (0,1,0) | 1 | 3 | 0 | 2 | 0 | 0 |
| (0,1,1) | 0 | 3 | 1 | 2 | 0 | 1 |
| (1,0,0) | 1 | 3 | 0 | 2 | 0 | 0 |
| (1,0,1) | 0 | 3 | 1 | 2 | 0 | 1 |
| (1,1,0) | 0 | 3 | 1 | 2 | 0 | 1 |
| (1,1,1) | 1 | 3 | 1 | 0 | 1 | 3 |
Definition 3.4
The function
First, we will calculate the sensitivities and average sensitivities of
Lemma 3.5
For every
Proof
The sufficiency is obvious. We show the necessity in the following.
Since for every word
where
which means that the sensitivity of
From Lemma 3.5, we immediately have
Corollary 3.6
The sensitivity and average sensitivity of
For the sensitivity of
Proposition 3.7
The sensitivity of
Remark 3.8
Function
We need some lemmas to calculate the sensitivities of
Lemma 3.9
[33] Let
Lemma 3.10
If
Proof
Because
Let
Lemma 3.11
[8] Let
Lemma 3.12
(Lucas theorem) Let
From the Lucas theorem, we immediately have
Lemma 3.13
For any prime
Lemma 3.14
[3, 8] For any integer
By Lemmas 3.12 and 3.14, we get the following computing results.
Lemma 3.15
[8] If we write the infinite periodic string
Using Lemma 3.12 for
Lemma 3.16
When
We first consider the sensitivities of
Theorem 3.17
For
Proof
If
and
Hence,
In order to compute the sensitivities of
Lemma 3.18
Let
Proof
We first show that there is no
Let
Case 1
If there exists
then
Case 2
If there exists
then
We show that there is no
On the other hand, let
with
To simplify the notation, sometimes, we write the value vector
Theorem 3.19
For
Proof
By Lemma 3.16, the value vector is the first
Let
When
It is clear that
When
A bound for the sensitivities of elementary symmetric Boolean functions can be received by Lemma 3.18.
Proposition 3.20
For any
Proof
First, we have
By Theorem 3.17,
Remark 3.21
The upper bound in the Proposition 3.20 is tight. In Theorem 3.19, let
To understand and prove more general formulas, we will first calculate the sensitivities of
Lemma 3.22
For
Proof
By Lemma 3.15, the value vector
When
When
Since
When
Since
For
Lemma 3.23
For
Proof
By Lemma 3.15, the value vector
When
When
and
respectively. In any case, we always have
When
Since
For
Lemma 3.24
For
Proof
By Lemma 3.15, the value vector
When
We have
When
Since
It is clear that one can continue to compute the explicit formulas of
Lemma 3.25
Let
Proof
Since
obviously,
Lemma 3.26
For
Proof
By Lemma 3.11, the value vector is
Case 1:
Case 2:
Case 3:
Case 4:
By Lemmas 3.9, 3.10, and 3.18, the formula of the sensitivity is obtained.□
It is clear that one can continue to calculate the explicit sensitivity formulas of
Now we will discuss more properties of the sequence
Proposition 3.27
If
Proof
By Lemma 3.14, if the least period of
We only need to show
For all
and
we have
and
By a direct calculation and Lemma 3.14, we have
Lemma 3.28
For
From Proposition 3.27 and Lemma 3.28, we have
Lemma 3.29
For
Theorem 3.30
For
Proof
By Lemma 3.29, the value vector
When
Since
When
From
Lemma 3.31
If
Proof
First, it is clear that
Let
We are done since the least period of
From Proposition 3.27 and Lemma 3.31, we have
Lemma 3.32
For
Theorem 3.33
Let
If
If
Proof
By Lemma 3.32, the value vector
Let
Case 1
The value vector of
Since
Case 2
Let
When
From
When
The calculation is identical to the case of even
Example 3.34
In Theorem 3.30, if
In Theorem 3.33, if
If
by Proposition 3.27. Hence, the explicit formula of
Let
and
4 The block sensitivities of symmetric Boolean functions
In this section, we will obtain a formula for the block sensitivity of symmetric Boolean function based on its value vector.
Let
Definition 4.1
[24] The block sensitivity
Obviously, we have
Example 4.2
Let
For
For
For
Similarly, one can find
We have
Proposition 4.3
Let
Generally, we have
Theorem 4.4
Let
Proof
If there exists
In the following, we assume
Group 1:
For
For
For
Group 2:
For
For
For
Group
For
For
For
Group
For
For
For
We will first find the maximal sensitivity number in each group.
In Group 1, it is clear that
In Group
Let
Now we consider the real variable function
In Group
Now we put all the maximal numbers or maximal candidates of each group together to form a set
Take the maximal value of this set, we
Since
Theorem 4.5
For odd
Proof
This follows from Theorem 3.17.□
Theorem 4.6
If
Proof
Let
when
when
In either case, we always have
In the following, we see the sensitivity is strictly less than the block sensitivity for some elementary symmetric Boolean functions.
Proposition 4.7
For
Proof
When
Therefore, we have
If
If
If
If
By Theorem 4.4, we have
Let
Then
and
Let
Then
and
In summary, for
When
When
From Lemma 3.23 and Proposition 4.7, we know
After similar calculations, we can obtain the following.
Proposition 4.8
Let
Proposition 4.9
For
It is clear that
5 Conclusion
In this paper, we first improve a proposition of [33] and obtain some properties of the sequence
Acknowledgments
The authors sincerely thank the anonymous referees for their valuable suggestions and comments to improve the presentation quality of our manuscript.
-
Conflict of interest: Authors state no conflict of interest.
References
[1] Arnold RF , Harrison MA . Algebraic properties of symmetric and partially symmetric Boolean functions. IEEE Trans Electronic Comput. 1963;EC-12 (3):244–51. 10.1109/PGEC.1963.263535Search in Google Scholar
[2] Cai J-Y , Green F , Thierauf T. On the correlation of symmetric functions. Math Syst Theory. 1996;29 (3):245–58. 10.1007/BF01201278Search in Google Scholar
[3] Canteaut A , Videau M. Symmetric Boolean functions. IEEE Trans Inf Theory. 2005;51 (8):2791–811. 10.1109/TIT.2005.851743Search in Google Scholar
[4] Castro FN , González OE , Medina LA. A divisibility approach to the open boundary cases of Cusick-Li-Stănicăs conjecture. Cryptogr Commun. 2015;7 (4):379–402. 10.1007/s12095-015-0124-ySearch in Google Scholar
[5] Castro FN , González OE , Medina LA. Diophantine equations with binomial coefficients and perturbation of symmetric Boolean functions. IEEE Trans Inf Theory. 2018;143 64 (2):1347–60. 10.1109/TIT.2017.2750674Search in Google Scholar
[6] Castro FN , Medina LA. Asymptotic behavior of perturbations of symmetric functions. Ann Combin. 2014;18:397–417. 10.1007/s00026-014-0230-0Search in Google Scholar
[7] Cook SA , Dwork C , Reischuk R. Upper and lower time bounds for parallel random access machines without simultaneous writes. SIAM J Comput. 1986;15:87–9. 10.1137/0215006Search in Google Scholar
[8] Cusick TW , Li Y , Stănică P. Balanced symmetric functions over GF(p) . IEEE Trans Inf Theory. 2008;54:1304–7. 10.1109/TIT.2007.915920Search in Google Scholar
[9] Cusick TW , Li Y , Stănică P. On a conjecture for balanced symmetric Boolean functions. J Math Crypt. 2009;3:273–90. 10.1515/JMC.2009.017Search in Google Scholar
[10] Das SR , Sheng CL. On detecting total or partial symmetry of switching functions. IEEE Trans Comput. 1971;C-20 (3):352–5. 10.1109/T-C.1971.223243Search in Google Scholar
[11] Drucker A. Block sensitivity of minterm-transitive functions. Theor Comput Sci. 2011;412:5796–801. 10.1016/j.tcs.2011.06.025Search in Google Scholar
[12] Fredman M , Khachiyan L. On the complexity of dualization of monotone disjunctive normal forms. J Algorithms. 1996;21:618–28. 10.1006/jagm.1996.0062Search in Google Scholar
[13] Gao G-P , Liu W-F , Zhang X-Y. The degree of balanced elementary symmetric Boolean functions of 4k+3 variables. IEEE Trans Inf Theory. 2011;57:4822–5. 10.1109/TIT.2011.2145910Search in Google Scholar
[14] Guo Y , Gao G , Zhao Y. Recent results on balanced symmetric Boolean functions. IEEE Trans Inf Theory. 2016;62:5199–203. 10.1109/TIT.2015.2455052Search in Google Scholar
[15] Huang H. Induced subgraphs of hypercubes and a proof of the sensitivity conjecture. Ann Math. 2019;190 (3):945–55. 10.4007/annals.2019.190.3.6Search in Google Scholar
[16] Kenyon C , Kutin S. Sensitivity, block sensitivity, and l -block sensitivity of Boolean functions. Information and Computation. 2004;189:43–53. 10.1016/j.ic.2002.12.001Search in Google Scholar
[17] Li N , Qi W-F. Symmetric Boolean functions depending on an odd Number of variables with maximum algebraic immunity. IEEE Trans Inf Theory. 2006;52 (5):2271–3 10.1109/TIT.2006.872977Search in Google Scholar
[18] Li Y , Adeyeye JO. Maximal sensitivity of Boolean nested canalizing functions. Theor Comput Sci. 2019;791:116–22. An early version appeared in Arxiv:1209.1597v1 [cs.DM] 7 Sept 2012. 10.1016/j.tcs.2019.04.025Search in Google Scholar
[19] Li Y , Adeyeye JO , Murrugarra D , Aguilar B , Laubenbacher R. Boolean nested canalizing functions: a comprehensive analysis. Theor Comput Sci. 2013;481:24–36. 10.1016/j.tcs.2013.02.020Search in Google Scholar
[20] Lidl R , Niederreiter H. Finite fields, New York: Cambridge University Press; 1977. Search in Google Scholar
[21] Maitra S , Sarker P. Maximum nonlinearity of symmetric Boolean functions on odd number of variables. IEEE Trans Inf Theory. 2002;48 (9):2626–30. 10.1109/TIT.2002.801482Search in Google Scholar
[22] Mishchenko A. Fast computation of symmetries in Boolean function. IEEE Trans Comput-Aided Design Integr Circuits Syst. 2003;22 (11):1588–93. 10.1109/TCAD.2003.818371Search in Google Scholar
[23] Mitchell CJ. Enumerating Boolean functions of cryptographic significance. J Crypto. 1990;2 (3):155–70. 10.1007/BF00190802Search in Google Scholar
[24] Nisan N. CREW PRAMs and decision tree. SIAM J Comput. 1991;20 (6):999–1007. 10.1137/0220062Search in Google Scholar
[25] Qian X-N , Dougherty ER. A comparative study on sensitivities of Boolean networks. 2010 IEEE International Workshop on Genomic Signal Processing and Statistics (GENSIPS). NY: Cold Spring Harbor; 2010 p. 1–4. 10.1109/GENSIPS.2010.5719682Search in Google Scholar
[26] Rubinstein D. Sensitivity VS block sensitivity of Boolean functions. Combinatorica. 1995;15 (2):297–9. 10.1007/BF01200762Search in Google Scholar
[27] Savicky P. On the bent Boolean functions that are symmetric. Europ J Combin. 1994;15:407–10. 10.1006/eujc.1994.1044Search in Google Scholar
[28] Shannon CE. A symbolic analysis of relay and switching circuits. AIEE Trans. 1938;57:713–23. 10.1109/EE.1938.6431064Search in Google Scholar
[29] Shmulevich I. Average sensitivity of typical monotone Boolean functions. arXiv:math/0507030v1 [math.Co] 2005; p. 1. Search in Google Scholar
[30] Shmulevich I , Kauffman SA. Activities and sensitivities in Boolean network models. Phys Rev Lett. 2004;93 (4):048701. 10.1103/PhysRevLett.93.048701Search in Google Scholar PubMed PubMed Central
[31] Su W , Tang X-H , Alexander P. A note on a conjecture for balanced elementary symmetric Boolean functions. IEEE Trans Inf Theory. 2013;59:665–71. 10.1109/TIT.2012.2215576Search in Google Scholar
[32] Sun X. Block sensitivity of weakly symmetric functions. Theor Comput Sci. 2007;384:87–91. 10.1007/11750321_32Search in Google Scholar
[33] Wegener I. The critical complexity of all (monotone) Boolean functions and monotone graph properties. Inf Control. 1985;67:212–22. 10.1007/BFb0028833Search in Google Scholar
© 2021 Jing Zhang et al., published by De Gruyter
This work is licensed under the Creative Commons Attribution 4.0 International License.
Articles in the same Issue
- Regular Articles
- Secret sharing and duality
- On the condition number of the Vandermonde matrix of the nth cyclotomic polynomial
- On the equivalence of authentication codes and robust (2, 2)-threshold schemes
- Pseudo-free families of computational universal algebras
- Lattice Sieving in Three Dimensions for Discrete Log in Medium Characteristic
- Attack on Kayawood protocol: uncloaking private keys
- The circulant hash revisited
- On cryptographic properties of (n + 1)-bit S-boxes constructed by known n-bit S-boxes
- Improved cryptanalysis of a ElGamal Cryptosystem Based on Matrices Over Group Rings
- Remarks on a Tropical Key Exchange System
- A note on secure multiparty computation via higher residue symbols
- Using Inclusion / Exclusion to find Bent and Balanced Monomial Rotation Symmetric Functions
- The Oribatida v1.3 Family of Lightweight Authenticated Encryption Schemes
- Isogenies on twisted Hessian curves
- Quantum algorithms for computing general discrete logarithms and orders with tradeoffs
- Stochastic methods defeat regular RSA exponentiation algorithms with combined blinding methods
- Sensitivities and block sensitivities of elementary symmetric Boolean functions
- Constructing Cycles in Isogeny Graphs of Supersingular Elliptic Curves
- Revocable attribute-based proxy re-encryption
- MathCrypt 2019
- Editor’s Preface for the Second Annual MathCrypt Proceedings Volume
- A trade-off between classical and quantum circuit size for an attack against CSIDH
- Towards Isogeny-Based Password-Authenticated Key Establishment
- Algebraic approaches for solving isogeny problems of prime power degrees
- Discretisation and Product Distributions in Ring-LWE
- Approximate Voronoi cells for lattices, revisited
- (In)Security of Ring-LWE Under Partial Key Exposure
- Towards a Ring Analogue of the Leftover Hash Lemma
- The Eleventh Power Residue Symbol
- Factoring with Hints
- One Bit is All It Takes: A Devastating Timing Attack on BLISS’s Non-Constant Time Sign Flips
- A framework for reducing the overhead of the quantum oracle for use with Grover’s algorithm with applications to cryptanalysis of SIKE
Articles in the same Issue
- Regular Articles
- Secret sharing and duality
- On the condition number of the Vandermonde matrix of the nth cyclotomic polynomial
- On the equivalence of authentication codes and robust (2, 2)-threshold schemes
- Pseudo-free families of computational universal algebras
- Lattice Sieving in Three Dimensions for Discrete Log in Medium Characteristic
- Attack on Kayawood protocol: uncloaking private keys
- The circulant hash revisited
- On cryptographic properties of (n + 1)-bit S-boxes constructed by known n-bit S-boxes
- Improved cryptanalysis of a ElGamal Cryptosystem Based on Matrices Over Group Rings
- Remarks on a Tropical Key Exchange System
- A note on secure multiparty computation via higher residue symbols
- Using Inclusion / Exclusion to find Bent and Balanced Monomial Rotation Symmetric Functions
- The Oribatida v1.3 Family of Lightweight Authenticated Encryption Schemes
- Isogenies on twisted Hessian curves
- Quantum algorithms for computing general discrete logarithms and orders with tradeoffs
- Stochastic methods defeat regular RSA exponentiation algorithms with combined blinding methods
- Sensitivities and block sensitivities of elementary symmetric Boolean functions
- Constructing Cycles in Isogeny Graphs of Supersingular Elliptic Curves
- Revocable attribute-based proxy re-encryption
- MathCrypt 2019
- Editor’s Preface for the Second Annual MathCrypt Proceedings Volume
- A trade-off between classical and quantum circuit size for an attack against CSIDH
- Towards Isogeny-Based Password-Authenticated Key Establishment
- Algebraic approaches for solving isogeny problems of prime power degrees
- Discretisation and Product Distributions in Ring-LWE
- Approximate Voronoi cells for lattices, revisited
- (In)Security of Ring-LWE Under Partial Key Exposure
- Towards a Ring Analogue of the Leftover Hash Lemma
- The Eleventh Power Residue Symbol
- Factoring with Hints
- One Bit is All It Takes: A Devastating Timing Attack on BLISS’s Non-Constant Time Sign Flips
- A framework for reducing the overhead of the quantum oracle for use with Grover’s algorithm with applications to cryptanalysis of SIKE