On Non-Interactive Simulation of Distributed Sources with Finite Alphabets (2403.00989v1)
Abstract: This work presents a Fourier analysis framework for the non-interactive source simulation (NISS) problem. Two distributed agents observe a pair of sequences $Xd$ and $Yd$ drawn according to a joint distribution $P_{XdYd}$. The agents aim to generate outputs $U=f_d(Xd)$ and $V=g_d(Yd)$ with a joint distribution sufficiently close in total variation to a target distribution $Q_{UV}$. Existing works have shown that the NISS problem with finite-alphabet outputs is decidable. For the binary-output NISS, an upper-bound to the input complexity was derived which is $O(\exp\operatorname{poly}(\frac{1}{\epsilon}))$. In this work, the input complexity and algorithm design are addressed in several classes of NISS scenarios. For binary-output NISS scenarios with doubly-symmetric binary inputs, it is shown that the input complexity is $\Theta(\log{\frac{1}{\epsilon}})$, thus providing a super-exponential improvement in input complexity. An explicit characterization of the simulating pair of functions is provided. For general finite-input scenarios, a constructive algorithm is introduced that explicitly finds the simulating functions $(f_d(Xd),g_d(Yd))$. The approach relies on a novel Fourier analysis framework. Various numerical simulations of NISS scenarios with IID inputs are provided. Furthermore, to illustrate the general applicability of the Fourier framework, several examples with non-IID inputs, including entanglement-assisted NISS and NISS with Markovian inputs are provided.
- Michael O Rabin. Randomized byzantine generals. In 24th annual symposium on foundations of computer science (sfcs 1983), pages 403–409. IEEE, 1983.
- On extracting common random bits from correlated sources. IEEE Transactions on information theory, 57(10):6351–6355, 2011.
- Hans S Witsenhausen. On sequences of pairs of dependent random variables. SIAM Journal on Applied Mathematics, 28(1):100–113, 1975.
- Hermann O Hirschfeld. A connection between correlation and contingency. In Mathematical Proceedings of the Cambridge Philosophical Society, volume 31, pages 520–524. Cambridge University Press, 1935.
- Hans Gebelein. Das statistische problem der korrelation als variations-und eigenwertproblem und sein zusammenhang mit der ausgleichsrechnung. ZAMM-Journal of Applied Mathematics and Mechanics/Zeitschrift für Angewandte Mathematik und Mechanik, 21(6):364–379, 1941.
- Alfréd Rényi. On measures of dependence. Acta mathematica hungarica, 10(3-4):441–451, 1959.
- Ueli M Maurer. Secret key agreement by public discussion from common information. IEEE transactions on information theory, 39(3):733–742, 1993.
- Common randomness and distributed control: A counterexample. Systems & control letters, 56(7-8):568–572, 2007.
- On non-interactive simulation of joint distributions. IEEE Transactions on Information Theory, 62(6):3419–3435, 2016.
- Michael A Nielsen. Conditions for a class of entanglement transformations. Physical Review Letters, 83(2):436, 1999.
- Boolean functions: noise stability, non-interactive correlation distillation, and mutual information. IEEE Transactions on Information Theory, 67(2):778–789, 2020.
- C Cachin and V Shoup. Random oracles in constantinople: Practical asynchronous byzantine agreement using. In Proceedings of the 19th ACM Symposium on Principles of Distributed Computing, no, pages 1–26, 2000.
- Snow white: Provably secure proofs of stake. IACR Cryptol. ePrint Arch., 2016(919), 2016.
- Algorand: Scaling byzantine agreements for cryptocurrencies. In Proceedings of the 26th symposium on operating systems principles, pages 51–68, 2017.
- Yoda: Enabling computationally intensive contracts on blockchains with byzantine and selfish nodes. arXiv preprint arXiv:1811.03265, 2018.
- Herbivore: A scalable and efficient protocol for anonymous communication. Technical report, Cornell University, 2003.
- Tor: The second-generation onion router. Technical report, Naval Research Lab Washington DC, 2004.
- On bitcoin as a public randomness source. Cryptology ePrint Archive, 2015.
- Trap me if you can–million dollar curve. Cryptology ePrint Archive, 2015.
- Randchain: Practical scalable decentralized randomness attested by blockchain. In 2020 IEEE International Conference on Blockchain (Blockchain), pages 442–449. IEEE, 2020.
- Common information is far less than mutual information. Problems of Control and Information Theory, 2(2):149–162, 1973.
- Decidability of non-interactive simulation of joint distributions. In 2016 IEEE 57th Annual Symposium on Foundations of Computer Science (FOCS), pages 545–554. IEEE, 2016.
- Dimension reduction for polynomials over gaussian space and applications. arXiv preprint arXiv:1708.03808, 2017.
- On the correlation between boolean functions of sequences of random variables. In 2017 IEEE International Symposium on Information Theory (ISIT), pages 1301–1305, 2017.
- Boolean functions with biased inputs: Approximation and noise sensitivity. In Proc. IEEE Int. Symp. Information Theory (ISIT), pages 1192–1196, July 2019.
- Common information, noise stability, and their extensions. Foundations and Trends® in Communications and Information Theory, 19(2):107–389, 2022.
- Secure non-interactive reducibility is decidable. In Theory of Cryptography: 20th International Conference, TCC 2022, Chicago, IL, USA, November 7–10, 2022, Proceedings, Part II, pages 408–437. Springer, 2023.
- Communication for generating correlation: A unifying survey. IEEE Transactions on Information Theory, 66(1):5–37, 2019.
- On non-interactive source simulation via fourier transform. In 2023 IEEE Information Theory Workshop (ITW), pages 371–376. IEEE, 2023.
- Non interactive simulation of correlated distributions is decidable. In Proceedings of the Twenty-Ninth Annual ACM-SIAM Symposium on Discrete Algorithms, pages 2728–2746. SIAM, 2018.
- On non-interactive simulation of binary random variables. IEEE Transactions on Information Theory, 67(4):2528–2538, 2021.
- Aaron Wyner. The common information of two dependent random variables. IEEE Transactions on Information Theory, 21(2):163–179, 1975.
- Theory of Cryptography 20th International Conference, TCC 2022, Chicago, il, USA, November 7-10, 2022, Proceedings, Part II. Springer, 2023.
- Decidability of secure non-interactive simulation of doubly symmetric binary source. Cryptology ePrint Archive, Paper 2021/190, 2021. https://eprint.iacr.org/2021/190.
- Secure non-interactive reduction and spectral analysis of correlations. In Annual International Conference on the Theory and Applications of Cryptographic Techniques, pages 797–827. Springer, 2022.
- Learning functions of k𝑘kitalic_k relevant variables. J. Comput. Syst. Sci, 69(3):421–434, 2004.
- Which Boolean functions maximize mutual information on noisy inputs? IEEE Trans. Inf. Theory, 60(8):4515–4525, 2014.
- On the sub-optimality of single-letter coding over networks. IEEE Transactions on Information Theory, 65(10):6115–6135, 2019.
- Ryan O’Donnell. Analysis of boolean functions. Cambridge University Press, 2014.
- Ronald de Wolf. A Brief Introduction to Fourier Analysis on the Boolean Cube. Number 1 in Graduate Surveys. Theory of Computing Library, 2008.
- John Von Neumann. 13. various techniques used in connection with random digits. Appl. Math Ser, 12(36-38):3, 1951.
- Checking local optimality in constrained quadratic programming is np-hard. Operations Research Letters, 7(1):33–35, 1988.
- Proposed experiment to test local hidden-variable theories. Physical review letters, 23(15):880, 1969.
- Boris S Cirel’son. Quantum generalizations of bell’s inequality. Letters in Mathematical Physics, 4:93–100, 1980.
- Quantum computation and quantum information. Phys. Today, 54(2):60, 2001.
- William Slofstra. The set of quantum correlations is not closed. In Forum of Mathematics, Pi, volume 7, page e1. Cambridge University Press, 2019.
- Mip*= re. Communications of the ACM, 64(11):131–138, 2021.
- A path following algorithm for the graph matching problem. IEEE Transactions on Pattern Analysis and Machine Intelligence, 31(12):2227–2242, 2008.
- A new bound for the quadratic assignment problem based on convex quadratic programming. Mathematical programming, 89:341–357, 2001.
- Visual reconstruction. MIT press, 1987.
- An algorithm for quadratic programming. Naval research logistics quarterly, 3(1-2):95–110, 1956.
- Constrained minimization methods. USSR Computational mathematics and mathematical physics, 6(5):1–50, 1966.
- Dimitri P Bertsekas. Nonlinear programming. Journal of the Operational Research Society, 48(3):334–334, 1997.
- Barry C Arnold. Majorization and the Lorenz order: A brief introduction, volume 43. Springer Science & Business Media, 2012.
- Peter Elias. The efficient construction of an unbiased random sequence. The Annals of Mathematical Statistics, 43(3):865–870, jun 1972.
- Donald Knuth. The complexity of nonuniform random number generation. Algorithms and Complexity, New Directions and Results, pages 357–428, 1976.
- Elements of Information Theory. John Wiley & Sons, Inc., Hoboken, NJ, USA, 2006.