Fast Interactive Coding against Adversarial Noise

被引:36
作者
Brakerski, Zvika [1 ,3 ]
Kalai, Yael Tauman [2 ]
Naor, Moni [3 ]
机构
[1] Stanford Univ, Stanford, CA 94305 USA
[2] Microsoft Res, Philadelphia, PA USA
[3] Weizmann Inst Sci, Dept Comp Sci & Appl Math, IL-76100 Rehovot, Israel
基金
以色列科学基金会;
关键词
Design; Algorithms; Theory; Interactive coding; AUTHENTICATION; CONSTRUCTIONS;
D O I
10.1145/2661628
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Consider two parties who wish to communicate in order to execute some interactive protocol pi. However, the communication channel between them is noisy: An adversary sees everything that is transmitted over the channel and can change a constant fraction of the bits arbitrarily, thus interrupting the execution of (which was designed for an error-free channel). If pi only contains a single long message, then a good error correcting code would overcome the noise with only a constant overhead in communication. However, this solution is not applicable to interactive protocols consisting of many short messages. Schulman [1992, 1993] introduced the notion of interactive coding: A simulator that, given any protocol pi, is able to simulate it (i.e., produce its intended transcript) even in the presence of constant rate adversarial channel errors, and with only constant (multiplicative) communication overhead. However, the running time of Schulman's simulator, and of all simulators that followed, has been exponential (or subexponential) in the communication complexity of pi (which we denote by N). In this work, we present three efficient simulators, all of which are randomized and have a certain failure probability (over the choice of coins). The first runs in time poly(N), has failure probability roughly 2(-N), and is resilient to 1/32-fraction of adversarial error. The second runs in time 0(N log N), has failure probability roughly 2-N, and is resilient to some constant fraction of adversarial error. The third runs in time 0(N), has failure probability 1/poly(N), and is resilient to some constant fraction of adversarial error. (Computational complexity is measured in the RAM model.) The first two simulators can be made deterministic if they are a priori given a random string (which may be known to the adversary ahead of time). In particular, the simulators can be made to be nonuniform and deterministic (with equivalent performance). Categories and Subject Descriptors: E.4 [Coding and Information Theory]: Error control codes; F.2 [Analysis of Algorithms and Problem Complexity]
引用
收藏
页码:1 / 30
页数:30
相关论文
共 30 条
[1]  
Agrawal Shweta, 2013, ABS13124182 CORR
[2]   SIMPLE CONSTRUCTIONS OF ALMOST K-WISE INDEPENDENT RANDOM-VARIABLES [J].
ALON, N ;
GOLDREICH, O ;
HASTAD, J ;
PERALTA, R .
RANDOM STRUCTURES & ALGORITHMS, 1992, 3 (03) :289-304
[3]  
Alon Noga, 1992, The Probabilistic Method
[4]  
Bellare M., 1994, Advances in Cryptology - CRYPTO '94. 14th Annual International Cryptology Conference. Proceedings, P216
[5]   CHECKING THE CORRECTNESS OF MEMORIES [J].
BLUM, M ;
EVANS, W ;
GEMMELL, P ;
KANNAN, S ;
NAOR, M .
ALGORITHMICA, 1994, 12 (2-3) :225-244
[6]  
Braverman M, 2011, ACM S THEORY COMPUT, P159
[7]  
Braverman Mark, 2012, Innovations in Theoretical Computer Science Conference ITCS, P161
[8]   Knowledge-Preserving Interactive Coding [J].
Chung, Kai-Min ;
Pass, Rafael ;
Telang, Sidharth .
2013 IEEE 54TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS), 2013, :449-458
[9]  
Gelles R., 2014, Proceedings of the 5th Conference on Innovations in Theoretical Computer Science, ITCS '14, P135
[10]   Efficient and Explicit Coding for Interactive Communication [J].
Gelles, Ran ;
Moitra, Ankur ;
Sahai, Amit .
2011 IEEE 52ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS 2011), 2011, :768-777