ABSTRACT
The problem of constructing error-resilient interactive protocols was introduced in the seminal works of Schulman (FOCS 1992, STOC 1993). These works show how to convert any two-party interactive protocol into one that is resilient to constant-fraction of adversarial error, while blowing up the communication by only a constant factor.
In this work we extend the work of Schulman to the multi-party setting. We show how to convert any (non-adaptive) $n$-party protocol into one that is resilient to Θ(1/n)-fraction of adversarial error, while blowing up the communication by only a constant factor.
One might hope to get resilience to constant-fraction of errors, by restricting the adversary's error distribution, and allowing him to make at most a constant-fraction of errors per party. We present a black-box lower bound, showing that we cannot be resilient to such adversarial errors, even if we increase the communication by an arbitrary polynomial factor, assuming the error-resilient protocol has a fixed (non-adaptive) speaking order.
- Shweta Agrawal, Ran Gelles, and Amit Sahai. Adaptive protocols for interactive communication. CoRR, abs/1312.4182, 2013.Google Scholar
- Mark Braverman and Klim Efremenko. List and unique coding for interactive communication in the presence of adversarial noise. In FOCS, 2014. Google ScholarDigital Library
- Zvika Brakerski and Yael Tauman Kalai. Efficient interactive coding against adversarial noise. In FOCS, pages 160--166, 2012. Google ScholarDigital Library
- Zvika Brakerski and Moni Naor. Fast algorithms for interactive coding. In SODA, pages 443--456, 2013. Google ScholarDigital Library
- Mark Braverman and Anup Rao. Towards coding for maximum errors in interactive communication. In STOC, pages 159--166, 2011. Google ScholarDigital Library
- Mark Braverman. Towards deterministic tree code constructions. In ITCS, pages 161--167, 2012. Google ScholarDigital Library
- Kai-Min Chung, Rafael Pass, and Siddartha Telang. Knowledge-preserving interactive coding. In FOCS, 2013. Google ScholarDigital Library
- Mohsen Ghaffari and Bernhard Haeupler. Optimal error rates for interactive coding ii: Efficiency and list decoding. In FOCS, 2014. Google ScholarDigital Library
- Mohsen Gharffari, Bernhard Haeupler, and Madhu Sudan. Optimal error rates for interactive coding i: Adaptivity and other settings. In STOC, 2014. Google ScholarDigital Library
- Ran Gelles, Ankur Moitra, and Amit Sahai. Efficient and explicit coding for interactive communication. In FOCS, pages 768--777, 2011. Google ScholarDigital Library
- Bernhard Haeupler. Interactive channel capacity revisited. In FOCS, 2014. Google ScholarDigital Library
- William Hoza. personal communication, 2014.Google Scholar
- Gillat Kol and Ran Raz. Interactive channel capacity. In STOC, pages 715--724, 2013. Google ScholarDigital Library
- Cristopher Moore and Leonard J. Schulman. Tree codes and a conjecture on exponential sums. CoRR, abs/1308.6007, 2013. Google ScholarDigital Library
- Sridhar Rajagopalan and Leonard J. Schulman. A coding theorem for distributed computation. In STOC, pages 790--799, 1994. Google ScholarDigital Library
- Leonard J. Schulman. Communication on noisy channels: A coding theorem for computation. In FOCS, pages 724--733, 1992. Google ScholarDigital Library
- Leonard J. Schulman. Deterministic coding for interactive communication. In STOC, pages 747--756, 1993. Google ScholarDigital Library
- Leonard J. Schulman. Coding for interactive communication. IEEE Transactions on Information Theory, 42(6):1745--1756, 1996. Google ScholarDigital Library
- Claude E. Shannon. A mathematical theory of communication. The Bell System Technical Journal, 27:379--423, 623--656, 1948.Google ScholarCross Ref
Index Terms
- Interactive Coding for Multiparty Protocols
Recommendations
Protocols for Multiparty Coin Toss with a Dishonest Majority
Coin-tossing protocols are protocols that generate a random bit with uniform distribution, although some corrupted parties might try to bias the output. These protocols are used as a building block in many cryptographic protocols. Cleve (Proc. of the ...
From Fairness to Full Security in Multiparty Computation
AbstractIn the setting of secure multiparty computation (MPC), a set of mutually distrusting parties wish to jointly compute a function, while guaranteeing the privacy of their inputs and the correctness of the output. An MPC protocol is called fully ...
Asynchronous Secure Multiparty Computation in Constant Time
Proceedings, Part II, of the 19th IACR International Conference on Public-Key Cryptography --- PKC 2016 - Volume 9615In the setting of secure multiparty computation, a set of mutually distrusting parties wish to securely compute a joint function. It is well known that if the communication model is asynchronous, meaning that messages can be arbitrarily delayed by an ...
Comments