1 / 14

Private codes or Succinct random codes that are (almost) perfect

Private codes or Succinct random codes that are (almost) perfect. Michael Langberg. California Institute of Technology. Coding theory. A. B. c. w  {0,1} k. Noise. C(w)  {0,1} n. decode. w. Error correcting codes. C: {0,1} k. {0,1} n. Consider: 2 types of channels.

sal
Download Presentation

Private codes or Succinct random codes that are (almost) perfect

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Private codesorSuccinct random codes that are (almost) perfect Michael Langberg California Institute of Technology

  2. Coding theory A B c w  {0,1}k Noise C(w)  {0,1}n decode w Error correcting codes C: {0,1}k {0,1}n

  3. Consider: 2 types of channels • Design of C depends on properties of channel. • BSCp: Binary Symmetric Channel. • Each bit flipped with probability p. • ADVCp: Adversarial Channel. • p-fraction of bits are flipped maliciously. A B Noise

  4. A B BSCp C(w) e C(w)+e What’s known: ? • Thm.[Shannon]: Can construct codes that allow communication over BSCpfor any p<½ with rate k/n~1-H(p). In particular: there exist codes for BSC½-. C: {0,1}k {0,1}n

  5. C(w) e C(w)+e A B ADVCp Can we match these results in presence of ADVCp? Consider for example p=½- : • Need codes of minimum distance = 2pn ~ n. • Do not exist (with constant rate) ! • In general: for p<½ we need codes of minimum distance 2pn and rate k/n~1-H(p). • Such codes are close to being perfect and are known not to exist (asymptotically). No!

  6. This talk • Seen: BSC strictly weaker than ADVC. • Goal: Relax framework as to allow communication over ADVC with parameters of BSC. • Relaxation: Introduce “private randomness”. • Assume that the sender and receiver have a sharedrandom string (hidden from channel). Q: Can we match parameters of BSC ? (e.g. ADVC½-?)

  7. The model: Private codes m random bits r A B Adversary w  {0,1}k c  {0,1}n C: {0,1}k x {0,1}m {0,1}n D(c,r) C(w,r)  {0,1}n w

  8. Private codes m random bits r A B e C(w,r) C(w,r)+e Roughly speaking: Private codes are said to allow communication over ADVCp if for every w and for any adversary: The communication of w will succeed with high probability overtheshared random string r. D w ADV Pr[D( C(w,r)+error, r)=w]=large

  9. Private codes: related work • Private codes have been studied in the past [Shannon,BlackwellBreimanThomasian,Ahlswede]. • Private codes in the presence of adversarial channels have also been studied: • [Lipton]: “Code scrambling”.

  10. Private codes: properties m random bits Do private codes enable communication over ADVC½- ? • Yes!! private codes that allow communication over ADVCp with rate k/n~1-H(p). • Matching parameters in BSCp model. r A B

  11. Our results r m random bits A B • Study framework of private codes. • Match parameters obtainable in BSC model. • [Lipton]: many shared random bits, m ~ nlog(n). • Analyze the amount of shared randomness needed to obtain private codes that match BSC parameters. • We show that a shared random string of size ~ log(n) is necessary and sufficient. Present connection between list decodable codes and private codes.

  12. List decoding vs. Private decoding Thm: List decoding implies (unique) private codes. • Using shared randomness: • Any list decodable code can be used to construct a uniquely decodable private code. • Reduction is efficient and needs only log(n) shared random bits.

  13. Proof technique r A B • Let C be standard code. • Use C to construct private code C*(w,r). • Use C to construct standard codes C*|r. • Define C*|r as a subcode of C. • Desired properties of C*|r: • Ideally - Unique decoding: r B only one codeword in ball of radius pn. • Sufficient cond.: “hide” r + unique decodingon average: Band mostr only one codeword in ball. • C is list decodable: sufficient condition can be obtained efficiently with poly # of subcodes! C X X X X X C*: {0,1}k x {0,1}m {0,1}n Radius pn: List size ≤ L {0,1}n C*|r: {0,1}k {0,1}n

  14. Concluding remarks random bits r A B • Study private codes. • Match param. of BSC model w/ log(n) shared bits. • Shared randomness: enables unique decoding whenever list decoding was possible. • Multiple messages: • Need fresh randomness for each message. • May assume cryptographic private key setting. • Public key setting [MicaliPeikertSudanWilson]. • Thanks.

More Related