Affiliation:
1. Stanford University
2. Microsoft Research, New-England
3. Weizmann Institute of Science
Abstract
Consider two parties who wish to communicate in order to execute some interactive protocol π. However, the communication channel between them is noisy: An adversary sees everything that is transmitted over the channel and can change a constant fraction of the bits arbitrarily, thus interrupting the execution of π (which was designed for an error-free channel). If π only contains a single long message, then a good error correcting code would overcome the noise with only a constant overhead in communication. However, this solution is not applicable to
interactive protocols
consisting of many short messages.
Schulman [1992, 1993] introduced the notion of
interactive coding
: A simulator that, given any protocol π, is able to simulate it (i.e., produce its intended transcript) even in the presence of constant rate adversarial channel errors, and with only constant (multiplicative) communication overhead. However, the running time of Schulman's simulator, and of all simulators that followed, has been exponential (or subexponential) in the communication complexity of π (which we denote by
N
).
In this work, we present three efficient simulators, all of which are randomized and have a certain failure probability (over the choice of coins). The first runs in time poly(
N
), has failure probability roughly 2
-
N
, and is resilient to 1/32-fraction of adversarial error. The second runs in time
O
(
N
log
N
), has failure probability roughly 2
-
N
, and is resilient to some constant fraction of adversarial error. The third runs in time
O
(
N
), has failure probability 1/poly(
N
), and is resilient to some constant fraction of adversarial error. (Computational complexity is measured in the RAM model.) The first two simulators can be made
deterministic
if they are a priori given a random string (which may be known to the adversary ahead of time). In particular, the simulators can be made to be nonuniform and deterministic (with equivalent performance).
Funder
Israeli Centers for Research Excellence
Citi Foundation, Citigroup
BSF
Israel Science Foundation
IMOS
Publisher
Association for Computing Machinery (ACM)
Subject
Artificial Intelligence,Hardware and Architecture,Information Systems,Control and Systems Engineering,Software
Reference30 articles.
1. Shweta Agrawal Ran Gelles and Amit Sahai. 2013. Adaptive protocols for interactive communication. CoRR abs/1312.4182. Shweta Agrawal Ran Gelles and Amit Sahai. 2013. Adaptive protocols for interactive communication. CoRR abs/1312.4182.
2. Simple Constructions of Almost k-wise Independent Random Variables
3. Noga Alon and Joel Spencer. 1992. The Probabilistic Method. Wiley. Noga Alon and Joel Spencer. 1992. The Probabilistic Method. Wiley.
4. Manuel Blum William S. Evans Peter Gemmell Sampath Kannan and Moni Naor. 1994. Checking the correctness of memories. Algorithmica 12 2/3 225--244. Manuel Blum William S. Evans Peter Gemmell Sampath Kannan and Moni Naor. 1994. Checking the correctness of memories. Algorithmica 12 2/3 225--244.
Cited by
33 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献