Inference under information constraints II: Communication constraints and shared randomness
A central server needs to perform statistical inference based on samples that are distributed
over multiple users who can each send a message of limited length to the center. We study …
over multiple users who can each send a message of limited length to the center. We study …
Monotone circuit lower bounds from resolution
For any unsatisfiable CNF formula F that is hard to refute in the Resolution proof system, we
show that a gadget-composed version of F is hard to refute in any proof system whose lines …
show that a gadget-composed version of F is hard to refute in any proof system whose lines …
An invariance principle for the multi-slice, with applications
M Braverman, S Khot, N Lifshitz… - 2021 IEEE 62nd Annual …, 2022 - ieeexplore.ieee.org
Given an alphabet size m∈N thought of as a constant, and ⃗k=(k_1,...,k_m) whose entries
sum of up n, the ⃗k-multi-slice is the set of vectors x∈m^n in which each symbol i∈m …
sum of up n, the ⃗k-multi-slice is the set of vectors x∈m^n in which each symbol i∈m …
Communication for generating correlation: A unifying survey
The task of manipulating correlated random variables in a distributed setting has received
attention in the fields of both Information Theory and Computer Science. Often shared …
attention in the fields of both Information Theory and Computer Science. Often shared …
One-Message Secure Reductions: On the Cost of Converting Correlations
Correlated secret randomness is a useful resource for secure computation protocols, often
enabling dramatic speedups compared to protocols in the plain model. This has motivated a …
enabling dramatic speedups compared to protocols in the plain model. This has motivated a …
An algebraic and probabilistic framework for network information theory
SS Pradhan, A Padakandla… - Foundations and Trends …, 2020 - nowpublishers.com
In this monograph, we develop a mathematical framework based on asymptotically good
random structured codes, ie, codes possessing algebraic properties, for network information …
random structured codes, ie, codes possessing algebraic properties, for network information …
Non interactive simulation of correlated distributions is decidable
A basic problem in information theory is the following: Let P=(X, Y) be an arbitrary
distribution where the marginals X and Y are (potentially) correlated. Let Alice and Bob be …
distribution where the marginals X and Y are (potentially) correlated. Let Alice and Bob be …
Secure non-interactive reduction and spectral analysis of correlations
P Agarwal, V Narayanan, S Pathak… - … Conference on the …, 2022 - Springer
Correlated pairs of random variables are a central concept in information-theoretically
secure cryptography. Secure reductions between different correlations have been studied …
secure cryptography. Secure reductions between different correlations have been studied …
Secure non-interactive reducibility is decidable
K Bhushan, AK Misra, V Narayanan… - Theory of Cryptography …, 2022 - Springer
Abstract Secure Non-Interactive Reductions (SNIR) is a recently introduced, but fundamental
cryptographic primitive. The basic question about SNIRs is how to determine if there is an …
cryptographic primitive. The basic question about SNIRs is how to determine if there is an …
Nonlocal games with noisy maximally entangled states are decidable
M Qin, P Yao - SIAM Journal on Computing, 2021 - SIAM
This paper considers a special class of nonlocal games (G,ψ), where G is a two-player one-
round game, and ψ is a bipartite state independent of G. In the game (G,ψ), the players are …
round game, and ψ is a bipartite state independent of G. In the game (G,ψ), the players are …