Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
139 tokens/sec
GPT-4o
8 tokens/sec
Gemini 2.5 Pro Pro
47 tokens/sec
o3 Pro
5 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

On Non-Interactive Simulation of Distributed Sources with Finite Alphabets (2403.00989v1)

Published 1 Mar 2024 in cs.IT, cs.CR, eess.SP, math.IT, and math.PR

Abstract: This work presents a Fourier analysis framework for the non-interactive source simulation (NISS) problem. Two distributed agents observe a pair of sequences $Xd$ and $Yd$ drawn according to a joint distribution $P_{XdYd}$. The agents aim to generate outputs $U=f_d(Xd)$ and $V=g_d(Yd)$ with a joint distribution sufficiently close in total variation to a target distribution $Q_{UV}$. Existing works have shown that the NISS problem with finite-alphabet outputs is decidable. For the binary-output NISS, an upper-bound to the input complexity was derived which is $O(\exp\operatorname{poly}(\frac{1}{\epsilon}))$. In this work, the input complexity and algorithm design are addressed in several classes of NISS scenarios. For binary-output NISS scenarios with doubly-symmetric binary inputs, it is shown that the input complexity is $\Theta(\log{\frac{1}{\epsilon}})$, thus providing a super-exponential improvement in input complexity. An explicit characterization of the simulating pair of functions is provided. For general finite-input scenarios, a constructive algorithm is introduced that explicitly finds the simulating functions $(f_d(Xd),g_d(Yd))$. The approach relies on a novel Fourier analysis framework. Various numerical simulations of NISS scenarios with IID inputs are provided. Furthermore, to illustrate the general applicability of the Fourier framework, several examples with non-IID inputs, including entanglement-assisted NISS and NISS with Markovian inputs are provided.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (57)
  1. Michael O Rabin. Randomized byzantine generals. In 24th annual symposium on foundations of computer science (sfcs 1983), pages 403–409. IEEE, 1983.
  2. On extracting common random bits from correlated sources. IEEE Transactions on information theory, 57(10):6351–6355, 2011.
  3. Hans S Witsenhausen. On sequences of pairs of dependent random variables. SIAM Journal on Applied Mathematics, 28(1):100–113, 1975.
  4. Hermann O Hirschfeld. A connection between correlation and contingency. In Mathematical Proceedings of the Cambridge Philosophical Society, volume 31, pages 520–524. Cambridge University Press, 1935.
  5. Hans Gebelein. Das statistische problem der korrelation als variations-und eigenwertproblem und sein zusammenhang mit der ausgleichsrechnung. ZAMM-Journal of Applied Mathematics and Mechanics/Zeitschrift für Angewandte Mathematik und Mechanik, 21(6):364–379, 1941.
  6. Alfréd Rényi. On measures of dependence. Acta mathematica hungarica, 10(3-4):441–451, 1959.
  7. Ueli M Maurer. Secret key agreement by public discussion from common information. IEEE transactions on information theory, 39(3):733–742, 1993.
  8. Common randomness and distributed control: A counterexample. Systems & control letters, 56(7-8):568–572, 2007.
  9. On non-interactive simulation of joint distributions. IEEE Transactions on Information Theory, 62(6):3419–3435, 2016.
  10. Michael A Nielsen. Conditions for a class of entanglement transformations. Physical Review Letters, 83(2):436, 1999.
  11. Boolean functions: noise stability, non-interactive correlation distillation, and mutual information. IEEE Transactions on Information Theory, 67(2):778–789, 2020.
  12. C Cachin and V Shoup. Random oracles in constantinople: Practical asynchronous byzantine agreement using. In Proceedings of the 19th ACM Symposium on Principles of Distributed Computing, no, pages 1–26, 2000.
  13. Snow white: Provably secure proofs of stake. IACR Cryptol. ePrint Arch., 2016(919), 2016.
  14. Algorand: Scaling byzantine agreements for cryptocurrencies. In Proceedings of the 26th symposium on operating systems principles, pages 51–68, 2017.
  15. Yoda: Enabling computationally intensive contracts on blockchains with byzantine and selfish nodes. arXiv preprint arXiv:1811.03265, 2018.
  16. Herbivore: A scalable and efficient protocol for anonymous communication. Technical report, Cornell University, 2003.
  17. Tor: The second-generation onion router. Technical report, Naval Research Lab Washington DC, 2004.
  18. On bitcoin as a public randomness source. Cryptology ePrint Archive, 2015.
  19. Trap me if you can–million dollar curve. Cryptology ePrint Archive, 2015.
  20. Randchain: Practical scalable decentralized randomness attested by blockchain. In 2020 IEEE International Conference on Blockchain (Blockchain), pages 442–449. IEEE, 2020.
  21. Common information is far less than mutual information. Problems of Control and Information Theory, 2(2):149–162, 1973.
  22. Decidability of non-interactive simulation of joint distributions. In 2016 IEEE 57th Annual Symposium on Foundations of Computer Science (FOCS), pages 545–554. IEEE, 2016.
  23. Dimension reduction for polynomials over gaussian space and applications. arXiv preprint arXiv:1708.03808, 2017.
  24. On the correlation between boolean functions of sequences of random variables. In 2017 IEEE International Symposium on Information Theory (ISIT), pages 1301–1305, 2017.
  25. Boolean functions with biased inputs: Approximation and noise sensitivity. In Proc. IEEE Int. Symp. Information Theory (ISIT), pages 1192–1196, July 2019.
  26. Common information, noise stability, and their extensions. Foundations and Trends® in Communications and Information Theory, 19(2):107–389, 2022.
  27. Secure non-interactive reducibility is decidable. In Theory of Cryptography: 20th International Conference, TCC 2022, Chicago, IL, USA, November 7–10, 2022, Proceedings, Part II, pages 408–437. Springer, 2023.
  28. Communication for generating correlation: A unifying survey. IEEE Transactions on Information Theory, 66(1):5–37, 2019.
  29. On non-interactive source simulation via fourier transform. In 2023 IEEE Information Theory Workshop (ITW), pages 371–376. IEEE, 2023.
  30. Non interactive simulation of correlated distributions is decidable. In Proceedings of the Twenty-Ninth Annual ACM-SIAM Symposium on Discrete Algorithms, pages 2728–2746. SIAM, 2018.
  31. On non-interactive simulation of binary random variables. IEEE Transactions on Information Theory, 67(4):2528–2538, 2021.
  32. Aaron Wyner. The common information of two dependent random variables. IEEE Transactions on Information Theory, 21(2):163–179, 1975.
  33. Theory of Cryptography 20th International Conference, TCC 2022, Chicago, il, USA, November 7-10, 2022, Proceedings, Part II. Springer, 2023.
  34. Decidability of secure non-interactive simulation of doubly symmetric binary source. Cryptology ePrint Archive, Paper 2021/190, 2021. https://eprint.iacr.org/2021/190.
  35. Secure non-interactive reduction and spectral analysis of correlations. In Annual International Conference on the Theory and Applications of Cryptographic Techniques, pages 797–827. Springer, 2022.
  36. Learning functions of k𝑘kitalic_k relevant variables. J. Comput. Syst. Sci, 69(3):421–434, 2004.
  37. Which Boolean functions maximize mutual information on noisy inputs? IEEE Trans. Inf. Theory, 60(8):4515–4525, 2014.
  38. On the sub-optimality of single-letter coding over networks. IEEE Transactions on Information Theory, 65(10):6115–6135, 2019.
  39. Ryan O’Donnell. Analysis of boolean functions. Cambridge University Press, 2014.
  40. Ronald de Wolf. A Brief Introduction to Fourier Analysis on the Boolean Cube. Number 1 in Graduate Surveys. Theory of Computing Library, 2008.
  41. John Von Neumann. 13. various techniques used in connection with random digits. Appl. Math Ser, 12(36-38):3, 1951.
  42. Checking local optimality in constrained quadratic programming is np-hard. Operations Research Letters, 7(1):33–35, 1988.
  43. Proposed experiment to test local hidden-variable theories. Physical review letters, 23(15):880, 1969.
  44. Boris S Cirel’son. Quantum generalizations of bell’s inequality. Letters in Mathematical Physics, 4:93–100, 1980.
  45. Quantum computation and quantum information. Phys. Today, 54(2):60, 2001.
  46. William Slofstra. The set of quantum correlations is not closed. In Forum of Mathematics, Pi, volume 7, page e1. Cambridge University Press, 2019.
  47. Mip*= re. Communications of the ACM, 64(11):131–138, 2021.
  48. A path following algorithm for the graph matching problem. IEEE Transactions on Pattern Analysis and Machine Intelligence, 31(12):2227–2242, 2008.
  49. A new bound for the quadratic assignment problem based on convex quadratic programming. Mathematical programming, 89:341–357, 2001.
  50. Visual reconstruction. MIT press, 1987.
  51. An algorithm for quadratic programming. Naval research logistics quarterly, 3(1-2):95–110, 1956.
  52. Constrained minimization methods. USSR Computational mathematics and mathematical physics, 6(5):1–50, 1966.
  53. Dimitri P Bertsekas. Nonlinear programming. Journal of the Operational Research Society, 48(3):334–334, 1997.
  54. Barry C Arnold. Majorization and the Lorenz order: A brief introduction, volume 43. Springer Science & Business Media, 2012.
  55. Peter Elias. The efficient construction of an unbiased random sequence. The Annals of Mathematical Statistics, 43(3):865–870, jun 1972.
  56. Donald Knuth. The complexity of nonuniform random number generation. Algorithms and Complexity, New Directions and Results, pages 357–428, 1976.
  57. Elements of Information Theory. John Wiley & Sons, Inc., Hoboken, NJ, USA, 2006.

Summary

We haven't generated a summary for this paper yet.