Computing Boolean Functions from Multiple Faulty Copies of Input Bits

نویسندگان

  • Mario Szegedy
  • Xiaomin Chen
چکیده

Suppose we want to compute a Boolean function f, but instead of receiving the input, we only get l -faulty copies of each input bit. A typical solution in this case is to take the majority value of the faulty bits for each individual input bit and apply f on the majority values. We call this the trivial construction. We show that if f : {0; 1}n → {0; 1} and are known, the best function construction, F , is often not the trivial one. In particular, in many cases the best F cannot be written as a composition of f with some functions, and in addition it is better to use a randomized F than a deterministic one. We also prove that the trivial construction is optimal in some rough sense: if we denote by l(f) the number of 1 10 -biased copies we need from each input to reliably compute f using the best (randomized) recovery function F , and we denote by ltriv(f) the analogous number for the trivial construction, then ltriv(f)= (l(f)). Moreover, both quantities are in (log S(f)), where S(f) is the sensitivity of f. A quantity related to l(f) is D stat; (f) = min ∑n i=1 li, where li is the number of 1 10 -biased copies of xi such that the above number of readings is su7cient to recover f with high probability. This quantity was 8rst introduced by Reischuk and Schmeltz [14] in order to provide lower bounds for the noisy circuit size of f. In this article we give a complete characterization of D stat; (f) through a combinatorial lemma that can be interesting on its own right. c © 2004 Elsevier B.V. All rights reserved.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On Boolean Decision Trees with Faulty Nodes

We consider the problem of computing with faulty components in the context of the Boolean decision tree model, in which cost is measured by the number of input bits queried and the responses to queries are faulty with a xed probability. We show that if f can be represented in k-DNF form and in j-CNF form, then O(n log(min(k; j)=q)) queries suuce to compute f with error probability less than q, ...

متن کامل

Generalization of Higher Order SAC to Vector Output Boolean Functions

S-boxes (vector output Boolean functions) should satisfy cryptographic criteria even if some input bits (say, k bits) are kept constant. However, this kind of security has been studied only for scalar output Boolean functions. SAC(k) is a criterion for scalar output Boolean functions of this type. This paper studies a generalization of SAC(k) to vector output Boolean functions as the rst step t...

متن کامل

Multiplicative complexity of vector valued Boolean functions

We consider the multiplicative complexity of Boolean functions with multiple bits of output, studying how large a multiplicative complexity is necessary and sufficient to provide a desired nonlinearity. For so-called ΣΠΣ circuits, we show that there is a tight connection between error correcting codes and circuits computing functions with high nonlinearity. Combining this with known coding theo...

متن کامل

Constant communication complexity protocols for multiparty accumulative boolean functions

Generalizing a boolean function from Cleve and Buhrman [3], we consider the class of accumulative boolean functions of the form fB(X1, X2, . . . , Xm) = ⊕n i=1 tB(x 1 i x 2 i . . . x m i ), where Xj = (x j 1 , x 2 , . . . , xn), 1 ≤ j ≤ m and tB(x 1 i x 2 i . . . x m i ) = 1 for input m-tuples x 1 ix 2 i ...x m i ∈ B ⊆ A ⊆ {0, 1}, and 0, otherwise. Here the set A is the promise set for function...

متن کامل

Evaluating Encrypted Boolean Functions on Encrypted Bits: Secure Decision-making on the Black side

We present a novel approach for secure evaluation of encrypted Boolean functions on encrypted bits. Building upon Barrington’s work to transform circuits to group programs and the Feige-Kilian-Naor cryptographic protocol, our novel Fixed Structure Group Program construction for secure evaluation eliminates the need for an expensive Universal Circuit to hide the function. Elements on the Black s...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Theor. Comput. Sci.

دوره 321  شماره 

صفحات  -

تاریخ انتشار 2002