Efficient Communication Using Partial Information

نویسندگان

  • Mark Braverman
  • Anup Rao
چکیده

We show how to efficiently simulate the sending of a message M to a receiver who has partial information about the message, so that the expected number of bits communicated in the simulation is close to the amount of additional information that the message reveals to the receiver. We use our simulation method to obtain several results in communication complexity. • We prove a new direct sum theorem for bounded round communication protocols. For every k, if the two party communication complexity of computing a function f is C > k, then the complexity of computing n copies of f using a k round protocol is at least Ω(n(C − O(k + √ Ck))). This is true in the distributional setting under any distribution on inputs, and also in the setting of worst case randomized computation. • We prove that the internal information cost (namely the information revealed to the parties) involved in computing any functionality using a two party interactive protocol on any input distribution is exactly equal to the amortized communication complexity of computing independent copies of the same functionality. Here by amortized communication complexity we mean the average per copy communication in the best protocol for computing multiple copies of a functionality, with a fixed error in each copy of the functionality. • Finally, we show that the only way to prove a strong direct sum theorem for communication complexity is by solving a particular variant of the pointer jumping problem that we define. If this problem has a cheap communication protocol, then a strong direct sum theorem must hold. On the other hand, if it does not, then the problem itself gives a counterexample for the direct sum question. In the process we show that a strong direct sum theorem for communication complexity holds if and only if efficient compression of communication protocols is possible. Microsoft Research New England, [email protected]. Computer Science and Engineering, University of Washington, [email protected].

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Improving Quality of Service Routing in Mobile Ad Hoc Networks Using OLSR

Mobile ad hoc networks (MANET) are constructed by mobile nodes without access point. Since MANET has certain constraints, including power shortages, an unstable wireless environment and node mobility, more power-efficient and reliable routing protocols are needed. The OLSR protocol is an optimization of the classical link state algorithm. OLSR introduces an interesting concept, the multipoint r...

متن کامل

A new method for accelerating impossible differential cryptanalysis and its application on LBlock

Impossible differential cryptanalysis, the extension of differential cryptanalysis, is one of the most efficient attacks against block ciphers. This cryptanalysis method has been applied to most of the block ciphers and has shown significant results. Using structures, key schedule considerations, early abort, and pre-computation are some common methods to reduce complexities of this attack. In ...

متن کامل

Partial Unit Memory Coding and Physical Layer Security

Cryptography and coding techniques are combined to implement most of the secure communication system. In order to use coding technique, secure communication linked by the physical layer is designed with efficient coding, which provides less security gaps. In order to design such an efficient security in the physical layer, partial unit memory code (PUM) code, is investigated with few popular co...

متن کامل

An Efficient Scheme for PAPR Reduction of OFDM based on Selected Mapping without Side Information

Orthogonal frequency division multiplexing (OFDM) has become a promising method for many wireless communication applications. However, one main drawback of OFDM systems is the high peak-to-average power ratio (PAPR). Selected mapping (SLM) is a well-known technique to decrease the problem of high PAPR in OFDM systems. In this method, transmitter is obliged to send some bits named side informati...

متن کامل

Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC

Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Electronic Colloquium on Computational Complexity (ECCC)

دوره 17  شماره 

صفحات  -

تاریخ انتشار 2010