noisy connections: a survey of interactive coding and its borders with other topics allison bishop...

30
Noisy Connections: A Survey of Interactive Coding and its Borders with Other Topics Allison Bishop Lewko Columbia University featuring works by Schulman, Haeupler, Brakerski, Kalai, Jain, Rao, Vitercik, Dodis, Chung, Pass, Telang

Upload: brett-black

Post on 03-Jan-2016

220 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Noisy Connections: A Survey of Interactive Coding and its Borders with Other Topics Allison Bishop Lewko Columbia University featuring works by Schulman,

Noisy Connections: A Survey of Interactive Coding and its

Borders with Other TopicsAllison Bishop LewkoColumbia University

featuring works by Schulman, Haeupler, Brakerski, Kalai, Jain, Rao, Vitercik, Dodis, Chung, Pass, Telang

Page 2: Noisy Connections: A Survey of Interactive Coding and its Borders with Other Topics Allison Bishop Lewko Columbia University featuring works by Schulman,

Two-Party Computation with Communication Errors

Bob Alice

011

1

*Sender does not know an error occurred,Rest of the computation is wrong!

We consider strong adversary who can corrupta constant fraction of all bits (fixed communication length).

00

Input x Input y

Page 3: Noisy Connections: A Survey of Interactive Coding and its Borders with Other Topics Allison Bishop Lewko Columbia University featuring works by Schulman,

What Makes Interactive Coding Distinct from Error-Correcting Codes?

Interactive coding problem for 2 parties:

• As first formulated and studied by Schulman (1992)

• For m rounds of interaction, just using error-correcting codes can only achieve error rate < 1/m

• Goal is to get constant relative error rate, and constant (multiplicative) overhead in communication

Page 4: Noisy Connections: A Survey of Interactive Coding and its Borders with Other Topics Allison Bishop Lewko Columbia University featuring works by Schulman,

Expressing the Protocol as a Tree

Bob speaks(function of input x)

Alice speaks(function of input y)

Page 5: Noisy Connections: A Survey of Interactive Coding and its Borders with Other Topics Allison Bishop Lewko Columbia University featuring works by Schulman,

Execution of the Protocol with No Errors

0101

Path in tree = transcript of communication

Page 6: Noisy Connections: A Survey of Interactive Coding and its Borders with Other Topics Allison Bishop Lewko Columbia University featuring works by Schulman,

Simulating the Protocol Tree Path Under Errors

01

- Errors cause Bob and Alice to have differing views of simulated transcript

Approach:1. Provide mechanism to detect disagreement2. Provide mechanism to move back toward agreement3. Once re-synched, try again to proceed down protocol tree

Page 7: Noisy Connections: A Survey of Interactive Coding and its Borders with Other Topics Allison Bishop Lewko Columbia University featuring works by Schulman,

Communicating “Pebble” Movements

• Each party has a “pebble” it moves around the protocol tree

• We can use 4 symbol alphabet for “Down Left”, “Down Right,” “Back Up”, “Hold” to describe pebbles that move along one branch of the tree at a time (or stay put)

• Goal is to communicate the sequence of pebble moves so each party can know where the other party’s pebble is.

• We want to encode a dynamic string of characters L, R, B, H so that it is decoded properly at moments in time when there are not too many past errors.

Page 8: Noisy Connections: A Survey of Interactive Coding and its Borders with Other Topics Allison Bishop Lewko Columbia University featuring works by Schulman,

Encoding Movements via Tree Codes [Schulman 92]

Tree code: • Edges labeled by symbols from Constant-size alphabet

• Any two paths have constant-fractionof symbols differing from lowest common ancestor onwards

Example with alphabet {1,2,3,4,5}

4

4

225

3

2

3

11 5

4

4 22 3 32 5

551 1 13 34 4 1 1Example: Strings 1, 2, 5 and 3, 2, 4differ in 2 out of 3 symbols.

Page 9: Noisy Connections: A Survey of Interactive Coding and its Borders with Other Topics Allison Bishop Lewko Columbia University featuring works by Schulman,

Interactive Coding from Tree Codes

Suppose we have a 4-ary tree code:

• Encode a sequence of moves “L, R, B, H, …” by the labels of corresponding edges in the tree code one symbol = one edge down the tree code

• Decode by finding path in tree code of right length and closest Hamming distance

One technicality: don’t want final pebble moves to change simulated transcript, So can’t hold when we reach bottom of the protocol tree. Need to pad with dummy layers at the bottom (easy enough to do).

Page 10: Noisy Connections: A Survey of Interactive Coding and its Borders with Other Topics Allison Bishop Lewko Columbia University featuring works by Schulman,

Intuition for Why This Works

• Define a good event as both parties correctly decode and knowwhere the other party’s pebble is.

• When this happens, “progress” is made (either in moving forward, or gettingcloser to syncing up)

• Bad event is a decoding error. Only a bounded amount of damage done,as pebbles only move one edge at a time.

Time

Decoding error of depth L

Interval lengthcL with constantfraction of errors

Bad intervals canCover only boundedFraction of time

Page 11: Noisy Connections: A Survey of Interactive Coding and its Borders with Other Topics Allison Bishop Lewko Columbia University featuring works by Schulman,

Now That You Think Tree Codes are Cool…

Some bad news: We don’t know how to efficiently construct them.

Some progress on this: [B12, MS14]

but still no unconditional, poly-time deterministic construction.

Randomized constructions are known, but we still want efficient decoding too

Page 12: Noisy Connections: A Survey of Interactive Coding and its Borders with Other Topics Allison Bishop Lewko Columbia University featuring works by Schulman,

Efficient Solution: (tiny) TCs + Hashing [BK12]

1. Provide mechanism to detect disagreement2. Provide mechanism to move back toward agreement3. Once re-synched, try again to proceed down protocol tree

Let’s revisit the higher level approach:

Observation: - We can build short tree codes by brute force in poly time - Naïve concatenation: use TC1 for awhile, then use TC2, etc.

Problem: lose ability to detect/correct errors in the more distant past

Solution: Hash entire simulated transcript to detect any lingering disagreement

Page 13: Noisy Connections: A Survey of Interactive Coding and its Borders with Other Topics Allison Bishop Lewko Columbia University featuring works by Schulman,

[BK12] Protocol Overview

25

2 3

51

25

2 3

51

Chunk

Hash Check

Chunk

Hash Check

• Divide original protocol into smallishchunks – use short tree code within each

• Hash entire simulated transcript so far+ chunk number to detect disagreement

• Back up when disagreement found

Note: hash length long enough to avoid collisions whp,and chunk length should be similar to avoid communication blowup from the hash phases.

Short tree code

Short tree code

Page 14: Noisy Connections: A Survey of Interactive Coding and its Borders with Other Topics Allison Bishop Lewko Columbia University featuring works by Schulman,

Even Simpler Efficient Solution – no TCs! [H14]

Observation: Hash collisions aren’t really so bad! If they happen at a constant rate, can really handle them like errors.

• We can make the chunks and hashes constant length now we don’t even need short TCs to get constant error rate with constant communication overhead.

• Independent hash keys are picked each time, so we can use a Chernoff bound to suitably control overall effect of hash collisions on simulation progress.

Page 15: Noisy Connections: A Survey of Interactive Coding and its Borders with Other Topics Allison Bishop Lewko Columbia University featuring works by Schulman,

Simplest Protocol Overview

Chunk

Hash Check

Chunk

Hash Check

• Divide original protocol into constant sizechunks

• Hash entire simulated transcript so far+ chunk number to detect disagreement

• Back up when disagreement found

Note: chunk length should be similar to hash lengthto avoid communication blowup from the hash phases.Hash collisions happen at bounded constant frequency whp.

*Simulated In the clear

Page 16: Noisy Connections: A Survey of Interactive Coding and its Borders with Other Topics Allison Bishop Lewko Columbia University featuring works by Schulman,

Applications/Extensions:1. Interactive Coding Meets Cryptography

What happens when we apply interactive coding in situations where we want to preserve more than just correctness and (roughly) communication complexity?

Example: “Knowledge preserving” interactive coding [CPT13]

Question: Can we ensure that parties don’t learn anything more about the other’s input than they would learn in the error free setting?

Answer: No! (at least not with a good error-rate).

Main intuition is that errors will force a “back track” so that some unnecessary Function of an input will be computed and sent.

Page 17: Noisy Connections: A Survey of Interactive Coding and its Borders with Other Topics Allison Bishop Lewko Columbia University featuring works by Schulman,

IP = PSPACE over Adversarial Channels [DL]It turns out:Correctness and Soundness can be preserved over adversarial channel errors!

Verifier Prover

A natural concern: Can cheating prover use guise of channel errors to avoid answering tough challenges?

challenge

response

. . .

What?Channel errors!Let’s go back.

Main idea:Verifier can pick fresh Randomness after going backAmplification used to preventPoly tries from helping provertoo much

Page 18: Noisy Connections: A Survey of Interactive Coding and its Borders with Other Topics Allison Bishop Lewko Columbia University featuring works by Schulman,

Applications/Extensions2. Multi-party Protocols

Interactive coding for multi-party protocols [RS94, GMS11, JKL15]

• Network of n parties, can communicate via pairwise channels

• Goal is to compute a joint function of inputs over channels

• Many models: synchronous vs. asynchronous, noisy vs. adversarial, etc.

• Many measures: communication complexity, computation, rounds, links, etc.

Page 19: Noisy Connections: A Survey of Interactive Coding and its Borders with Other Topics Allison Bishop Lewko Columbia University featuring works by Schulman,

𝑃1

𝑃2

𝑃3

𝑃4

𝑃5

𝑃6

1. communication links

2. Need to synchronize

Problems:

Basic Idea: Reduce to 2-party case

Page 20: Noisy Connections: A Survey of Interactive Coding and its Borders with Other Topics Allison Bishop Lewko Columbia University featuring works by Schulman,

Efficiency preserving

𝑃2

𝑃1

𝑃3𝑃4

𝑃𝑛

Resilient to constant fraction of adversarial error

Constant blowup in communication

constant𝑛

Properties:

ongoingwork

Assumptions: 1. Protocol is semi-adaptive 2. There exists one party connected to all the rest

One Approach [JKL15]

Page 22: Noisy Connections: A Survey of Interactive Coding and its Borders with Other Topics Allison Bishop Lewko Columbia University featuring works by Schulman,

Passing the Burden of Being P* [LV]

Challenge: P* maintains a view of each pairwise transcript to check consistency – can’t pass these all to a new P* without lots of communication overhead!

Idea: Replace Hash(Transcript so far) with an iterated hash.

Let , be chunks of transcript.

Compute hash to check agreement as Hash(Hash(, Hash()))

*Now we can pass short hashes intead of long transcripts to a new P*to maintain ability to detect prior disagreements.

Page 23: Noisy Connections: A Survey of Interactive Coding and its Borders with Other Topics Allison Bishop Lewko Columbia University featuring works by Schulman,

3. A More Speculative Connection

Recently, King and Saia [KS13] presented an expected poly-timeByzantine Agreement algorithm against a computationally unbounded, adaptive asynchronous adversary

[LL13] presented an impossibility result for a kind of “mobile” adversarywho can corrupt a changing set of players and reset their memories upon releasing them to corrupt others.

Intriguing Question:Adversarial network channels can be defined to model each of these adversaries,so can we classify a “worst-case” adversarial network against whichByzantine Agreement is possible?

Page 24: Noisy Connections: A Survey of Interactive Coding and its Borders with Other Topics Allison Bishop Lewko Columbia University featuring works by Schulman,

4. Connection Between Formulas and Communication [KW88]

Boolean f unction f : f0;1gn ! f0;1g

Bob Alice

x s:t: f (x) = 1 y s:t: f (y) = 0

i s:t: xi 6= yii s:t: xi 6= yi

0

0

11

How many bitsneed to be sentin the worst case?

Page 25: Noisy Connections: A Survey of Interactive Coding and its Borders with Other Topics Allison Bishop Lewko Columbia University featuring works by Schulman,

Communication Complexity = Formula Depth [KW88]

AND

OROR

AND AND AND AND

AliceBob

x1 x2 x1 x3 x4 x3 x5 x2

y1 y2 y1 y3 y4 y3 y5 y2

10

0

Right

1

Left

0

Left

i = 4i = 4

Page 26: Noisy Connections: A Survey of Interactive Coding and its Borders with Other Topics Allison Bishop Lewko Columbia University featuring works by Schulman,

Carrying Error-Resilience through the Karchmer-Wigderson Connection [KLR12]

We want:

Error-resilientcomputation

Error-freecomputation

Compiler

Error-free communication

[KW88]

Error-resilientcommunication

Compiler

We know:We build:

Page 27: Noisy Connections: A Survey of Interactive Coding and its Borders with Other Topics Allison Bishop Lewko Columbia University featuring works by Schulman,

Communication with Errors: An Easier Model (Sender Feedback)

Bob Alice

011

1

*Sender knows error occurred

Oops!0

\ Redo"011

Page 28: Noisy Connections: A Survey of Interactive Coding and its Borders with Other Topics Allison Bishop Lewko Columbia University featuring works by Schulman,

Short-Circuit Errors

AND

OROR

AND AND AND AND

01 00 11 11

0 1 0 1

1 1

10 True output of gatereplaced by valuefrom one of its inputs

Page 29: Noisy Connections: A Survey of Interactive Coding and its Borders with Other Topics Allison Bishop Lewko Columbia University featuring works by Schulman,

Recovery from Non-Fatal Short-Circuits

Result: can allow a fixed constant fraction of errors per path

Example: allow one error per path

Efficiency: formula depth multiplied by a constant

Page 30: Noisy Connections: A Survey of Interactive Coding and its Borders with Other Topics Allison Bishop Lewko Columbia University featuring works by Schulman,

Some Further Directions

• What other kinds of circuit errors can we correct?

• What kinds of bounds on size of error-resilient circuits can we prove?

• What other properties of 2 or multi-party computations can/can’t be preserved under channel errors?

• What are the “right” network adversarial models for various applications?

• How can we unify this with distributed computing theory where correctness is relaxed and not a fixed function of the inputs?