High Entropy Random Selection Protocols

نویسندگان

  • Harry Buhrman
  • Matthias Christandl
  • Michal Koucký
  • Zvi Lotker
  • Boaz Patt-Shamir
  • Nikolai K. Vereshchagin
چکیده

We study the two party problem of randomly selecting a string among all the strings of length n. We want the protocol to have the property that the output distribution has high entropy, even when one of the two parties is dishonest and deviates from the protocol. We develop protocols that achieve high, close to n, entropy. In the literature the randomness guarantee is usually expressed as being close to the uniform distribution or in terms of resiliency. The notion of entropy is not directly comparable to that of resiliency, but we establish a connection between the two that allows us to compare our protocols with the existing ones. We construct an explicit protocol that yields entropy n−O(1) and has 4 log∗ n rounds, improving over the protocol of Goldwasser et al. [3] that also achieves this entropy but needs O(n) rounds. Both these protocols need O(n) bits of communication. Next we reduce the communication in our protocols. We show the existence, non-explicitly, of a protocol that has 6 rounds, 2n+ 8 logn bits of communication and yields entropy n−O(log n) and min-entropy n/2− O(log n). Our protocol achieves the same entropy bound as the recent, also non-explicit, protocol of Gradwohl et al. [4], however achieves much higher min-entropy: n/2−O(log n) versus O(log n). Finally we exhibit very simple explicit protocols. We connect the security parameter of these geometric protocols with the well studied Kakeya problem motivated by harmonic analysis and analytical number theory. We are only able to prove that these protocols have entropy 3n/4 but still n/2−O(logn) min-entropy. Therefore they do not perform as well with respect to the explicit constructions of Gradwohl et al. [4] entropy-wise, but still have much better min-entropy. We conjecture that these simple protocols achieve n − o(n) entropy. Our geometric construction and its relation to the Kakeya problem follows a new and different approach to the random selection problem than any of the previously known protocols. Email: [email protected], partially supported by a NWO VICI grant and EU project QAP Email: [email protected], work done while visiting CWI Email: [email protected], work done while visiting CWI [email protected], work done while visiting CWI Email: [email protected] Email: [email protected], work done while visiting CWI

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Modeling of VANET Technology & Ad-Hoc Routing Protocols Based on High Performance Random Waypoint Models

Today, one of the new technologies in the modern era is Vehicular Ad-hoc Network which has takenenormous attention in the recent years. Because of rapid topology changing and frequent disconnectionmakes it difficult to design an efficient routing protocol for routing data between vehicles, called V2V orvehicle to vehicle communication and vehicle to roadside infrastructure, called V2I. Designin...

متن کامل

Cross Entropy Algorithm for Joint Precoding and Transmit Antenna Selection in Multiuser MIMO Systems with Limited Feedback

This paper considers the joint precoding and transmit antenna selection to reduce the hardware cost such as the radio-frequency (RF) chains associated with antennas in the downlink of multi-user multi-input multi-output (MU-MIMO) systems with limited feedback. The joint precoding and transmit antenna selection algorithm requires an exhaustive search (ES) of all possible combinations and permuta...

متن کامل

Extended MULTIMOORA method based on Shannon entropy weight for materials selection

Selection of appropriate material is a crucial step in engineering design and manufacturing process. Without a systematic technique, many useful engineering materials may be ignored for selection. The category of multiple attribute decision-making (MADM) methods is an effective set of structured techniques. Having uncomplicated assumptions and mathematics, the MULTIMOORA method as an MADM appro...

متن کامل

Internal Compression of Protocols to Entropy

We study internal compression of communication protocols to their internal entropy, which is the entropy of the transcript from the players’ perspective. We provide two internal compression schemes with error. One of a protocol of Feige et al. for finding the first difference between two strings. The second and main one is an internal compression with error ε > 0 of a protocol with internal ent...

متن کامل

Entropy Evaluation for Oscillator-Based True Random Number Generators

True random number generators (TRNGs) are crucial to the implementations of cryptographic algorithms and protocols. The quality of randomness directly influences the security of cryptographic systems. Oscillator-based sampling is popular in the design of TRNGs due to its nice properties of elegant structure and high speed. However, the credibility of randomness generated from high-speed oscilla...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007