High Entropy Random Selection Protocols

作者: Harry Buhrman , Matthias Christandl , Michal Koucký , Zvi Lotker , Boaz Patt-Shamir

DOI: 10.1007/978-3-540-74208-1_27

关键词:

摘要: We study the two party problem of randomly selecting a string among all strings length n. want protocol to have property that output distribution has high entropy, even when one parties is dishonest and deviates from protocol. develop protocols achieve high, close n, entropy. In literature randomness guarantee usually expressed as being uniform or in terms resiliency. The notion entropy not directly comparable resiliency, but we establish connection between allows us compare our with existing ones. We construct an explicit yields ni¾? O(1) 4log*nrounds, improving over Goldreich et al. [3] also achieves this needs O(n) rounds. Both these need O(n2) bits communication. Next reduce communication protocols. show existence, non-explicitly, 6 rounds, 2n+ 8lognbits O(logn) min-entropy n/2 i¾? O(logn). Our same bound recent, non-explicit, Gradwohl [4], however much higher min-entropy: versus O(logn). Finally exhibit very simple connect security parameter geometric well studied Kakeya motivated by harmonic analysis analytical number theory. are only able prove 3n/4 still min-entropy. Therefore they do perform respect constructions [4] entropy-wise, better conjecture o(n) entropy. construction its relation follows new different approach random selection than any previously known

参考文章(12)
An. Muchnik, N. Vereshchagin, Shannon Entropy vs. Kolmogorov Complexity Computer Science – Theory and Applications. pp. 281- 291 ,(2006) , 10.1007/11753728_29
Ronen Gradwohl, Salil Vadhan, David Zuckerman, Random Selection with an Adversarial Majority Lecture Notes in Computer Science. pp. 409- 426 ,(2006) , 10.1007/11818175_25
Zeev Dvir, On the size of Kakeya sets in finite fields Journal of the American Mathematical Society. ,vol. 22, pp. 1093- 1097 ,(2008) , 10.1090/S0894-0347-08-00607-3
Terence Tao, Gerd Mockenhaupt, Restriction and Kakeya phenomena for finite fields Duke Mathematical Journal. ,vol. 121, pp. 35- 74 ,(2004) , 10.1215/S0012-7094-04-12112-8
Saurabh Sanghvi, Salil Vadhan, The round complexity of two-party random selection Proceedings of the thirty-seventh annual ACM symposium on Theory of computing - STOC '05. pp. 338- 347 ,(2005) , 10.1145/1060590.1060641
Joel Spencer, The Probabilistic Method ,(1991)
Oded Goldreich, Shafi Goldwasser, Nathan Linial, Fault-tolerant Computation in the Full Information Model SIAM Journal on Computing. ,vol. 27, pp. 506- 544 ,(1998) , 10.1137/S0097539793246689
A. Ambainis, Y. Dodis, H. Buhrman, H. Rohrig, Multiparty quantum coin flipping conference on computational complexity. ,vol. 19, pp. 250- 259 ,(2004) , 10.1109/CCC.2004.19
Zeev Dvir, Avi Wigderson, Kakeya Sets, New Mergers and Old Extractors foundations of computer science. pp. 625- 633 ,(2008) , 10.1109/FOCS.2008.23