On the role of private coins in unbounded-round Information Complexity
نویسنده
چکیده
Information Complexity Alexander Koza hinsky∗ ∗Mos ow State University, Fa ulty of Me hani s and Mathemati s kozla h mail.ru 2014 Abstra t We prove a version of "Reversed Newman Theorem" in ontext of information omplexity: every privateoin ommuni ation proto ol with information omplexity I and ommuni ation omplexity C an be repla ed by publi oin proto ol with the same behavior so that it's information omplexity does not ex eed O (√IC). This result holds for unboundedround ommuni ation whereas previous results in this area dealt with one-way proto ols. As an appli ation it gives an undire t way to prove a best-known ompression theorem in Information Complexity. 1 Introdu tion Information omplexity of ommuni ation proto ol π, denoted by ICμ(π), is the amount of information Ali e and Bob reveal about their inputs while omputing π in a assumption that input are distributed a ording μ. Information omplexity is useful foremost in ontext of a Dire t-Sum problem in Communi ation omplexity. Let us rstly des ribe the substan e of this problem. Fix a small onstant ǫ. Suppose that you are given an arbitrary fun tion f : X ×Y → {0, 1} and probability distribution μ on the set X × Y, (here X is orresponded to Ali e and Y is orresponded to Bob). De ne D ǫ (f) as follows: D ǫ (f) = inf π CC(π), where in mum ranges over all deterministi ommuni ation proto ols π whi h output 1 bit π(x, y), su h that μ {(x, y) |π(x, y) 6= f(x, y)} ≤ ǫ. Imagine then, that you task is to ompute n opies of f in parallel. Consider fun tion f : (X × Y) → {0, 1}n and probability distribution μ on the set (X × Y)n, whi h are de ned as follows: f ((x1, y1), . . . , (xn, yn)) = (f(x1, y1), . . . , f(xn, yn)) , 1
منابع مشابه
Learning with Limited Rounds of Adaptivity: Coin Tossing, Multi-Armed Bandits, and Ranking from Pairwise Comparisons
In many learning settings, active/adaptive querying is possible, but the number of rounds of adaptivity is limited. We study the relationship between query complexity and adaptivity in identifying the k most biased coins among a set of n coins with unknown biases. This problem is a common abstraction of many well-studied problems, including the problem of identifying the k best arms in a stocha...
متن کاملPrivate Coins versus Public Coins in Zero-Knowledge Proof Systems
Goldreich-Krawczyk (Siam J of Comp’96) showed that only languages in BPP have constant-round public-coin black-box zero-knowledge protocols. We extend their lower bound to “fully black-box” privatecoin protocols based on one-way functions. More precisely, we show that only languages in BPP—where Sam is a “collision-finding” oracle in analogy with Simon (Eurocrypt’98) and Haitner et. al (FOCS’07...
متن کاملPublic vs Private Coin in Bounded-Round Information
We precisely characterize the role of private randomness in the ability of Alice to send a message to Bob while minimizing the amount of information revealed to him. We show that if using private randomness a message can be transmitted while revealing I bits of information, the transmission can be simulated without private coins using I + log I +O(1) bits of information. Moreover, we give an ex...
متن کاملImproved direct sum theorem in classical communication complexity
For a function f : X ×Y → Z , the m-fold direct sum is the function f : X × Y → Z, defined by f(〈x1, . . . , xm〉, 〈y1, . . . , ym〉) ∆ = 〈f(x1, y1), . . . , f(xm, ym)〉. We show the following direct sum theorem for classical communication protocols, R(f) = Ω( m k R(f)) where R(f) is the the k-round private coins communication complexity of f and R(f) is the k-round public coin complexity of f . I...
متن کاملCryptanalysis of some first round CAESAR candidates
ΑΕS _ CMCCv₁, ΑVΑLΑNCHEv₁, CLΟCv₁, and SILCv₁ are four candidates of the first round of CAESAR. CLΟCv₁ is presented in FSE 2014 and SILCv₁ is designed upon it with the aim of optimizing the hardware implementation cost. In this paper, structural weaknesses of these candidates are studied. We present distinguishing attacks against ΑES _ CMCCv₁ with the complexity of two queries and the success ...
متن کاملA new method for accelerating impossible differential cryptanalysis and its application on LBlock
Impossible differential cryptanalysis, the extension of differential cryptanalysis, is one of the most efficient attacks against block ciphers. This cryptanalysis method has been applied to most of the block ciphers and has shown significant results. Using structures, key schedule considerations, early abort, and pre-computation are some common methods to reduce complexities of this attack. In ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Electronic Colloquium on Computational Complexity (ECCC)
دوره 21 شماره
صفحات -
تاریخ انتشار 2014