Jump to content

Proper complexity function: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
BG19bot (talk | contribs)
m WP:CHECKWIKI error fix for #52. Do general fixes if a problem exists. - using AWB
m grammar
Line 3: Line 3:
* there exists a ''k''-string [[Turing machine]] ''M'' such that on any input of length ''n'', ''M'' halts after O(''n'' + ''f''(''n'')) steps, uses O(''f''(''n'')) space, and outputs ''f''(''n'') consecutive blanks.
* there exists a ''k''-string [[Turing machine]] ''M'' such that on any input of length ''n'', ''M'' halts after O(''n'' + ''f''(''n'')) steps, uses O(''f''(''n'')) space, and outputs ''f''(''n'') consecutive blanks.


If ''f'' and ''g'' are two proper complexity functions, then ''f''&nbsp;+&nbsp;''g'', ''fg'', and 2<sup>''f''</sup>, are also proper complexity functions.
If ''f'' and ''g'' are two proper complexity functions, then ''f''&nbsp;+&nbsp;''g'', ''fg'', and 2<sup>''f''</sup> are also proper complexity functions.


Similar notions include honest function, [[space-constructible function]], and [[time-constructible function]].
Similar notions include honest functions, [[space-constructible function]]s, and [[time-constructible function]]s.


<ref>Alexei Myasnikov, Vladimir Shpilrain, Alexander Ushakov. Group-based Cryptography. Birkhäuser Verlag, 2008, p.28</ref>
<ref>Alexei Myasnikov, Vladimir Shpilrain, Alexander Ushakov. Group-based Cryptography. Birkhäuser Verlag, 2008, p.28</ref>

Revision as of 02:40, 6 April 2022

A proper complexity function is a function f mapping a natural number to a natural number such that:

  • f is nondecreasing;
  • there exists a k-string Turing machine M such that on any input of length n, M halts after O(n + f(n)) steps, uses O(f(n)) space, and outputs f(n) consecutive blanks.

If f and g are two proper complexity functions, then f + g, fg, and 2f are also proper complexity functions.

Similar notions include honest functions, space-constructible functions, and time-constructible functions.

[1]

References

  1. ^ Alexei Myasnikov, Vladimir Shpilrain, Alexander Ushakov. Group-based Cryptography. Birkhäuser Verlag, 2008, p.28