On the role of private coins in unbounded-round Information Complexity

نویسنده

  • Alexander Kozachinsky
چکیده

Information Complexity Alexander Koza hinsky∗ ∗Mos ow State University, Fa ulty of Me hani s and Mathemati s kozla h mail.ru 2014 Abstra t We prove a version of "Reversed Newman Theorem" in ontext of information omplexity: every privateoin ommuni ation proto ol with information omplexity I and ommuni ation omplexity C an be repla ed by publi oin proto ol with the same behavior so that it's information omplexity does not ex eed O (√IC). This result holds for unboundedround ommuni ation whereas previous results in this area dealt with one-way proto ols. As an appli ation it gives an undire t way to prove a best-known ompression theorem in Information Complexity. 1 Introdu tion Information omplexity of ommuni ation proto ol π, denoted by ICμ(π), is the amount of information Ali e and Bob reveal about their inputs while omputing π in a assumption that input are distributed a ording μ. Information omplexity is useful foremost in ontext of a Dire t-Sum problem in Communi ation omplexity. Let us rstly des ribe the substan e of this problem. Fix a small onstant ǫ. Suppose that you are given an arbitrary fun tion f : X ×Y → {0, 1} and probability distribution μ on the set X × Y, (here X is orresponded to Ali e and Y is orresponded to Bob). De ne D ǫ (f) as follows: D ǫ (f) = inf π CC(π), where in mum ranges over all deterministi ommuni ation proto ols π whi h output 1 bit π(x, y), su h that μ {(x, y) |π(x, y) 6= f(x, y)} ≤ ǫ. Imagine then, that you task is to ompute n opies of f in parallel. Consider fun tion f : (X × Y) → {0, 1}n and probability distribution μ on the set (X × Y)n, whi h are de ned as follows: f ((x1, y1), . . . , (xn, yn)) = (f(x1, y1), . . . , f(xn, yn)) , 1

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Learning with Limited Rounds of Adaptivity: Coin Tossing, Multi-Armed Bandits, and Ranking from Pairwise Comparisons

In many learning settings, active/adaptive querying is possible, but the number of rounds of adaptivity is limited. We study the relationship between query complexity and adaptivity in identifying the k most biased coins among a set of n coins with unknown biases. This problem is a common abstraction of many well-studied problems, including the problem of identifying the k best arms in a stocha...

متن کامل

Private Coins versus Public Coins in Zero-Knowledge Proof Systems

Goldreich-Krawczyk (Siam J of Comp’96) showed that only languages in BPP have constant-round public-coin black-box zero-knowledge protocols. We extend their lower bound to “fully black-box” privatecoin protocols based on one-way functions. More precisely, we show that only languages in BPP—where Sam is a “collision-finding” oracle in analogy with Simon (Eurocrypt’98) and Haitner et. al (FOCS’07...

متن کامل

Public vs Private Coin in Bounded-Round Information

We precisely characterize the role of private randomness in the ability of Alice to send a message to Bob while minimizing the amount of information revealed to him. We show that if using private randomness a message can be transmitted while revealing I bits of information, the transmission can be simulated without private coins using I + log I +O(1) bits of information. Moreover, we give an ex...

متن کامل

Improved direct sum theorem in classical communication complexity

For a function f : X ×Y → Z , the m-fold direct sum is the function f : X × Y → Z, defined by f(〈x1, . . . , xm〉, 〈y1, . . . , ym〉) ∆ = 〈f(x1, y1), . . . , f(xm, ym)〉. We show the following direct sum theorem for classical communication protocols, R(f) = Ω( m k R(f)) where R(f) is the the k-round private coins communication complexity of f and R(f) is the k-round public coin complexity of f . I...

متن کامل

Cryptanalysis of some first round CAESAR candidates

ΑΕS _ CMCCv₁, ΑVΑLΑNCHEv₁, CLΟCv₁, and SILCv₁ are four candidates of the first round of CAESAR. CLΟCv₁ is presented in FSE 2014 and SILCv₁ is designed upon it with the aim of optimizing the hardware implementation cost. In this paper, structural weaknesses of these candidates are studied. We present distinguishing attacks against ΑES  _ CMCCv₁ with the complexity of two queries and the success ...

متن کامل

A new method for accelerating impossible differential cryptanalysis and its application on LBlock

Impossible differential cryptanalysis, the extension of differential cryptanalysis, is one of the most efficient attacks against block ciphers. This cryptanalysis method has been applied to most of the block ciphers and has shown significant results. Using structures, key schedule considerations, early abort, and pre-computation are some common methods to reduce complexities of this attack. In ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Electronic Colloquium on Computational Complexity (ECCC)

دوره 21  شماره 

صفحات  -

تاریخ انتشار 2014