fundamental limits of distributed encoding
play

Fundamental Limits of Distributed Encoding Nastaran Abadi - PowerPoint PPT Presentation

Fundamental Limits of Distributed Encoding Nastaran Abadi Khooshemehr Mohammad Ali Maddah-Ali Sharif University of Technology International Symposium on Information Theory (ISIT) 2020 June 2020 Classical Coding Source Channel Hamming


  1. Fundamental Limits of Distributed Encoding Nastaran Abadi Khooshemehr Mohammad Ali Maddah-Ali Sharif University of Technology International Symposium on Information Theory (ISIT) 2020 June 2020

  2. Classical Coding Source Channel Hamming approach Shannon approach Adversarial errors Probabilistic errors 2

  3. Some fundamental lim limit its on the parameters of codes Singleton bound If ๐ต ๐‘Ÿ (๐‘œ, ๐‘’) is the maximum number of possible codewords in a ๐‘Ÿ -ary block code of length ๐‘œ and minimum Gilbert โ€“ Varshamov bound distance ๐‘’ , then ๐ต ๐‘Ÿ ๐‘œ, ๐‘’ โ‰ค ๐‘Ÿ ๐‘œโˆ’๐‘’+1 . Hamming approach If ๐ต ๐‘Ÿ (๐‘œ, ๐‘’) is the maximum number of Adversarial errors possible codewords in a ๐‘Ÿ -ary block code of length ๐‘œ and minimum distance ๐‘’ , then ๐‘Ÿ ๐‘œ ๐ต ๐‘Ÿ ๐‘œ, ๐‘’ โ‰ฅ ๐‘Ÿโˆ’1 ๐‘˜ . ๐‘’โˆ’1 ๐‘œ ฯƒ ๐‘˜=0 ๐‘˜ Griesmer bound If ๐‘‚(๐‘™, ๐‘’) is the minimum length of a binary code of dimension ๐‘™ and and minimum ๐‘’ ๐‘™โˆ’1 distance ๐‘’ , then ๐‘‚ ๐‘™, ๐‘’ โ‰ฅ ฯƒ ๐‘—=0 2 ๐‘— . and many more โ€ฆ 3

  4. Letโ€™s focus on the 4

  5. A closer look at encoder Source Channel In some applications, the encoder can be distributed. 5

  6. Example of applications with distributed data sources IoT Blockchain Shard 1 Shard 2 Shard 3 โ‹ฎ In these systems, the encoding is distributed as well as the data production. 6

  7. Distributed encoding Encoder Source node 1 Source node 2 Source node 3 7 distributed source nodes

  8. Distributed encoding Source node 1 Decoder connects to some encoding nodes. Source Decoder node 2 Source node 3 8

  9. Distributed encoding with adversaries Source node 1 Source node 2 Source node 3 9

  10. Just one adversarial source node can undermine the system. Source node 1 More variables than equations Source node 2 Impossible to decode Source node 3 10

  11. We study distributed encoding system, where some source nodes are controlled by an adversary. An adversarial node sends up to a finite number of different messages to the encoding nodes. We characterize the fundamental limit of this system. 11

  12. Why do we assume an upper limit for the number of adversarial messages? The adversary cannot inject too many different messages into the system. There are methods to restrain the adversaries in distributed systems. 12

  13. Objective in an adversarial distributed encoding system Decoding the messages of the honest nodes correctly. We do not care about the messages of the adversaries in decoding! 13

  14. Distributed encoding system with adversaries No information about and . Source No information about the adversaries node 1 and their behavior. Source Decoder node 2 We need the decoder to decode the messages of the honest nodes correctly. Source node 3 We donโ€™t care about the messages of adversaries. 14

  15. System Parameters ๐‘‚ = 5 # of encoding nodes ๐ฟ = 3 # of source nodes ๐‘ณ : the number of source nodes ๐›พ = 1 # of adversaries ๐‘ถ : the number of encoding nodes ๐‘ค = 3 # of adversarial messages ๐œธ : the number of adversaries ๐’˜ : the maximum number of the messages of one adversarial source node ๐’– : the number of encoding nodes that decoder needs to connect to. 15

  16. The problem What is the fundamental limit of ๐‘ข in an (๐‘‚, ๐ฟ, ๐›พ, ๐‘ค) distributed encoding system? (Informally, at least how many encoding nodes does the decoder need?) ๐‘ข โˆ— : fundamental limit of ๐‘ข 16

  17. Fundamental limit of ๐‘ข Theorem In an ๐‘‚, ๐ฟ, ๐›พ, ๐‘ค distributed encoding system, โ€ข if ๐‘‚ โ‰ฅ ๐ฟ + ๐›พ ๐‘ค โˆ’ 1 + 1 ๐‘ข โˆ— = ๐ฟ + ๐›พ ๐‘ค โˆ’ 1 + 1 โ€ข If ๐ฟ โ‰ค ๐‘‚ โ‰ค ๐ฟ + ๐›พ ๐‘ค โˆ’ 1 ๐‘ข โˆ— = ๐‘‚ Recall 17

  18. Proof Achievability There is a coding scheme where โ€ข the decoder can connect to any ๐‘ข โˆ— encoding nodes, โ€ข and generate an estimate for the input messages where the messages of the honest nodes are correctly decoded. For achievability, we need a code, decoding process, and correctness proof. Converse There is no coding scheme in which โ€ข the decoder connects to less than ๐‘ข โˆ— encoding nodes, โ€ข and estimates the messages of the honest nodes correctly. 18

  19. Achievability-code We use this nonlinear code to achieve ๐‘ข โˆ— . nice structure ๐ฟ ๐‘ฆ ๐‘œ1 โ€ฆ ๐‘ฆ ๐‘œ๐ฟ ๐‘” ๐‘œ ๐‘ฆ ๐‘œ1 , โ€ฆ , ๐‘ฆ ๐‘œ๐ฟ = เท ๐›ฝ ๐‘œ๐‘™ , 1 โ‰ค ๐‘œ โ‰ค ๐‘‚ ๐‘ฆ ๐‘œ๐‘™ ๐‘™=1 ๐›ฝ ๐‘œ1 , โ€ฆ , ๐›ฝ ๐‘œ๐ฟ : chosen independently and uniformly at random from the field Using nonlinear code โ€ข Hard for the adversary to evaluate the contribution of its messages in the encoded symbols โ€ข Hard for the adversary to cause confusion in the decoder 19 โ€ข Having a set of nonlinear equations with possibly many solutions

  20. Achievability-code ๐ฟ ๐‘ฆ ๐‘œ1 โ€ฆ ๐‘ฆ ๐‘œ๐ฟ ๐‘ข โˆ— = ๐ฟ + ๐›พ ๐‘ค โˆ’ 1 + 1 ๐‘” ๐‘œ ๐‘ฆ ๐‘œ1 , โ€ฆ , ๐‘ฆ ๐‘œ๐ฟ = เท ๐›ฝ ๐‘œ๐‘™ , 1 โ‰ค ๐‘œ โ‰ค ๐‘‚ ๐‘ฆ ๐‘œ๐‘™ ๐‘™=1 ๐ฟ โˆ’ ๐›พ + ๐›พ๐‘ค is the number of the variables in the system. With connecting to just one more encoding node and using the equation of that node, decoder can be successful. 20

  21. Achievability-decoding Decoder considers every possible scenario and finds feasible solutions. 21

  22. Achievability- correctness We prove every feasible solution satisfies correctness. We consider a partitioning for the encoding nodes. all options for the messages of source nodes We form a set of nonlinear equations. In some steps, we transform it to another set of feasible and undesirable solutions nonlinear equations. We use Bezout theorem to bound the number of the feasible and undesirable solutions. 22

  23. Converse For any code, if the decoder connects to less than ๐‘ข โˆ— nodes, there is a way that adversary can mislead the decoder. The decoder does not know the adversaries and their behavior. Decoder would be confused between two contradicting feasible solutions. 23

  24. Could we achieve ๐‘ข โˆ— with a linear code? 24

  25. Fundamental limit of ๐‘ข - linear regime Theorem (linear code) In an ๐‘‚, ๐ฟ, ๐›พ, ๐‘ค distributed encoding system where ๐‘” 1 , โ€ฆ , ๐‘” ๐‘‚ are linear functions, โ€ข if ๐‘‚ โ‰ฅ ๐ฟ + 2๐›พ ๐‘ค โˆ’ 1 โˆ— ๐‘ข linear = ๐ฟ + 2๐›พ ๐‘ค โˆ’ 1 โ€ข If ๐ฟ โ‰ค ๐‘‚ โ‰ค ๐ฟ + 2๐›พ ๐‘ค โˆ’ 1 โˆ’ 1 โˆ— ๐‘ข linear = ๐‘‚ Theorem (general code) In an ๐‘‚, ๐ฟ, ๐›พ, ๐‘ค distributed encoding system, Linear code is not good enough! โ€ข if ๐‘‚ โ‰ฅ ๐ฟ + ๐›พ ๐‘ค โˆ’ 1 + 1 ๐‘ข โˆ— = ๐ฟ + ๐›พ ๐‘ค โˆ’ 1 + 1 โ€ข If ๐ฟ โ‰ค ๐‘‚ โ‰ค ๐ฟ + ๐›พ ๐‘ค โˆ’ 1 ๐‘ข โˆ— = ๐‘‚ 25

  26. Conclusion โ€ข We introduced the problem of distributed encoding. โ€ข We assumed that some of the source nodes are adversaries and send inconsistent messages to the encoding nodes. โ€ข We characterized the fundamental limit of the distributed encoding system. โ€ข We established matching achievability and converse. โ€ข We introduced nonlinear coding in order to achieve the fundamental limit. โ€ข There are many more problems to solve โ€ข How to optimize the decoding complexity? โ€ข What if some of encoding nodes are adversaries as well? โ€ข What is the fundamental limit if encoding nodes use a particular coding? โ€ข โ€ฆ 26

  27. Thank you 27

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend