{"title":"如何压缩非对称通信","authors":"Sivaramakrishnan Natarajan Ramamoorthy, Anup Rao","doi":"10.4230/LIPIcs.CCC.2015.102","DOIUrl":null,"url":null,"abstract":"We study the relationship between communication and information in 2-party communication protocols when the information is asymmetric. If IA denotes the number of bits of information revealed by the first party, IB denotes the information revealed by the second party, and C is the number of bits of communication in the protocol, we show that \n \n• one can simulate the protocol using order [EQUATION] bits of communication, \n \n• one can simulate the protocol using order IA · 2O(IB) bits of communication. \n \nThe first result gives the best known bound on the complexity of a simulation when IA G IB,C3/4. The second gives the best known bound when IB L log C. In addition we show that if a function is computed by a protocol with asymmetric information complexity, then the inputs must have a large, nearly monochromatic rectangle of the right dimensions, a fact that is useful for proving lower bounds on lopsided communication problems.","PeriodicalId":246506,"journal":{"name":"Cybersecurity and Cyberforensics Conference","volume":"40 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":"{\"title\":\"How to Compress Asymmetric Communication\",\"authors\":\"Sivaramakrishnan Natarajan Ramamoorthy, Anup Rao\",\"doi\":\"10.4230/LIPIcs.CCC.2015.102\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We study the relationship between communication and information in 2-party communication protocols when the information is asymmetric. If IA denotes the number of bits of information revealed by the first party, IB denotes the information revealed by the second party, and C is the number of bits of communication in the protocol, we show that \\n \\n• one can simulate the protocol using order [EQUATION] bits of communication, \\n \\n• one can simulate the protocol using order IA · 2O(IB) bits of communication. \\n \\nThe first result gives the best known bound on the complexity of a simulation when IA G IB,C3/4. The second gives the best known bound when IB L log C. In addition we show that if a function is computed by a protocol with asymmetric information complexity, then the inputs must have a large, nearly monochromatic rectangle of the right dimensions, a fact that is useful for proving lower bounds on lopsided communication problems.\",\"PeriodicalId\":246506,\"journal\":{\"name\":\"Cybersecurity and Cyberforensics Conference\",\"volume\":\"40 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-06-17\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"12\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Cybersecurity and Cyberforensics Conference\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.4230/LIPIcs.CCC.2015.102\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Cybersecurity and Cyberforensics Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4230/LIPIcs.CCC.2015.102","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 12
摘要
研究了信息不对称情况下双方通信协议中通信与信息的关系。如果IA表示第一方披露的信息比特数,IB表示第二方披露的信息比特数,C是协议中的通信比特数,我们表明可以使用顺序[等式]通信比特来模拟协议,可以使用顺序IA·20 (IB)通信比特来模拟协议。第一个结果给出了当IA G IB,C3/4时模拟复杂度的已知界。第二种给出了ibllogc时最著名的界。此外,我们表明,如果一个函数是通过具有非对称信息复杂性的协议计算的,那么输入必须具有正确维度的大的、几乎单色的矩形,这一事实对于证明不平衡通信问题的下界很有用。
We study the relationship between communication and information in 2-party communication protocols when the information is asymmetric. If IA denotes the number of bits of information revealed by the first party, IB denotes the information revealed by the second party, and C is the number of bits of communication in the protocol, we show that
• one can simulate the protocol using order [EQUATION] bits of communication,
• one can simulate the protocol using order IA · 2O(IB) bits of communication.
The first result gives the best known bound on the complexity of a simulation when IA G IB,C3/4. The second gives the best known bound when IB L log C. In addition we show that if a function is computed by a protocol with asymmetric information complexity, then the inputs must have a large, nearly monochromatic rectangle of the right dimensions, a fact that is useful for proving lower bounds on lopsided communication problems.