如何压缩非对称通信

Sivaramakrishnan Natarajan Ramamoorthy, Anup Rao
{"title":"如何压缩非对称通信","authors":"Sivaramakrishnan Natarajan Ramamoorthy, Anup Rao","doi":"10.4230/LIPIcs.CCC.2015.102","DOIUrl":null,"url":null,"abstract":"We study the relationship between communication and information in 2-party communication protocols when the information is asymmetric. If IA denotes the number of bits of information revealed by the first party, IB denotes the information revealed by the second party, and C is the number of bits of communication in the protocol, we show that \n \n• one can simulate the protocol using order [EQUATION] bits of communication, \n \n• one can simulate the protocol using order IA · 2O(IB) bits of communication. \n \nThe first result gives the best known bound on the complexity of a simulation when IA G IB,C3/4. The second gives the best known bound when IB L log C. In addition we show that if a function is computed by a protocol with asymmetric information complexity, then the inputs must have a large, nearly monochromatic rectangle of the right dimensions, a fact that is useful for proving lower bounds on lopsided communication problems.","PeriodicalId":246506,"journal":{"name":"Cybersecurity and Cyberforensics Conference","volume":"40 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":"{\"title\":\"How to Compress Asymmetric Communication\",\"authors\":\"Sivaramakrishnan Natarajan Ramamoorthy, Anup Rao\",\"doi\":\"10.4230/LIPIcs.CCC.2015.102\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We study the relationship between communication and information in 2-party communication protocols when the information is asymmetric. If IA denotes the number of bits of information revealed by the first party, IB denotes the information revealed by the second party, and C is the number of bits of communication in the protocol, we show that \\n \\n• one can simulate the protocol using order [EQUATION] bits of communication, \\n \\n• one can simulate the protocol using order IA · 2O(IB) bits of communication. \\n \\nThe first result gives the best known bound on the complexity of a simulation when IA G IB,C3/4. The second gives the best known bound when IB L log C. In addition we show that if a function is computed by a protocol with asymmetric information complexity, then the inputs must have a large, nearly monochromatic rectangle of the right dimensions, a fact that is useful for proving lower bounds on lopsided communication problems.\",\"PeriodicalId\":246506,\"journal\":{\"name\":\"Cybersecurity and Cyberforensics Conference\",\"volume\":\"40 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-06-17\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"12\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Cybersecurity and Cyberforensics Conference\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.4230/LIPIcs.CCC.2015.102\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Cybersecurity and Cyberforensics Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4230/LIPIcs.CCC.2015.102","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 12

摘要

研究了信息不对称情况下双方通信协议中通信与信息的关系。如果IA表示第一方披露的信息比特数,IB表示第二方披露的信息比特数,C是协议中的通信比特数,我们表明可以使用顺序[等式]通信比特来模拟协议,可以使用顺序IA·20 (IB)通信比特来模拟协议。第一个结果给出了当IA G IB,C3/4时模拟复杂度的已知界。第二种给出了ibllogc时最著名的界。此外,我们表明,如果一个函数是通过具有非对称信息复杂性的协议计算的,那么输入必须具有正确维度的大的、几乎单色的矩形,这一事实对于证明不平衡通信问题的下界很有用。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
How to Compress Asymmetric Communication
We study the relationship between communication and information in 2-party communication protocols when the information is asymmetric. If IA denotes the number of bits of information revealed by the first party, IB denotes the information revealed by the second party, and C is the number of bits of communication in the protocol, we show that • one can simulate the protocol using order [EQUATION] bits of communication, • one can simulate the protocol using order IA · 2O(IB) bits of communication. The first result gives the best known bound on the complexity of a simulation when IA G IB,C3/4. The second gives the best known bound when IB L log C. In addition we show that if a function is computed by a protocol with asymmetric information complexity, then the inputs must have a large, nearly monochromatic rectangle of the right dimensions, a fact that is useful for proving lower bounds on lopsided communication problems.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信