Fundamental Limits of Distributed Encoding Nastaran Abadi - - PowerPoint PPT Presentation

โ–ถ
fundamental limits of distributed encoding
SMART_READER_LITE
LIVE PREVIEW

Fundamental Limits of Distributed Encoding Nastaran Abadi - - PowerPoint PPT Presentation

Fundamental Limits of Distributed Encoding Nastaran Abadi Khooshemehr Mohammad Ali Maddah-Ali Sharif University of Technology International Symposium on Information Theory (ISIT) 2020 June 2020 Classical Coding Source Channel Hamming


slide-1
SLIDE 1

Fundamental Limits of Distributed Encoding

Nastaran Abadi Khooshemehr Mohammad Ali Maddah-Ali

Sharif University of Technology International Symposium on Information Theory (ISIT) 2020 June 2020

slide-2
SLIDE 2

Classical Coding

Channel

Shannon approach

Probabilistic errors

Hamming approach

Adversarial errors 2 Source

slide-3
SLIDE 3

Some fundamental lim limit its on the parameters of codes

Hamming approach

Adversarial errors Singleton bound If ๐ต๐‘Ÿ(๐‘œ, ๐‘’) is the maximum number

  • f possible codewords in a ๐‘Ÿ-ary block

code of length ๐‘œ and minimum distance ๐‘’, then ๐ต๐‘Ÿ ๐‘œ, ๐‘’ โ‰ค ๐‘Ÿ๐‘œโˆ’๐‘’+1. Gilbertโ€“Varshamov bound If ๐ต๐‘Ÿ(๐‘œ, ๐‘’) is the maximum number of possible codewords in a ๐‘Ÿ-ary block code

  • f length ๐‘œ and minimum distance ๐‘’, then

๐ต๐‘Ÿ ๐‘œ, ๐‘’ โ‰ฅ

๐‘Ÿ๐‘œ ฯƒ๐‘˜=0

๐‘’โˆ’1 ๐‘œ ๐‘˜

๐‘Ÿโˆ’1 ๐‘˜ .

Griesmer bound If ๐‘‚(๐‘™, ๐‘’) is the minimum length of a binary code of dimension ๐‘™ and and minimum distance ๐‘’, then ๐‘‚ ๐‘™, ๐‘’ โ‰ฅ ฯƒ๐‘—=0

๐‘™โˆ’1 ๐‘’ 2๐‘— .

and many more โ€ฆ 3

slide-4
SLIDE 4

Letโ€™s focus on the

4

slide-5
SLIDE 5

A closer look at encoder

Channel

In some applications, the encoder can be distributed.

5 Source

slide-6
SLIDE 6

Example of applications with distributed data sources

Shard 1 Shard 2 Shard 3

โ‹ฎ

IoT Blockchain In these systems, the encoding is distributed as well as the data production.

6

slide-7
SLIDE 7

Source node 1 Source node 2 Source node 3

Encoder

Distributed encoding

distributed source nodes 7

slide-8
SLIDE 8

Source node 1 Source node 2 Source node 3

Distributed encoding

Decoder Decoder connects to some encoding nodes. 8

slide-9
SLIDE 9

Distributed encoding with adversaries

Source node 1 Source node 2 Source node 3 9

slide-10
SLIDE 10

Just one adversarial source node can undermine the system.

Source node 1 Source node 2 Source node 3

More variables than equations

10

Impossible to decode

slide-11
SLIDE 11

11

We study distributed encoding system, where some source nodes are controlled by an adversary. An adversarial node sends up to a finite number of different messages to the encoding nodes.

We characterize the fundamental limit of this system.

slide-12
SLIDE 12

There are methods to restrain the adversaries in distributed systems.

The adversary cannot inject too many different messages into the system.

12

Why do we assume an upper limit for the number of adversarial messages?

slide-13
SLIDE 13

Objective in an adversarial distributed encoding system

Decoding the messages of the honest nodes correctly.

13

We do not care about the messages of the adversaries in decoding!

slide-14
SLIDE 14

Distributed encoding system with adversaries

Source node 1 Source node 2 Source node 3 Decoder

We need the decoder to decode the messages of the honest nodes correctly.

14 No information about the adversaries and their behavior. No information about and .

We donโ€™t care about the messages of adversaries.

slide-15
SLIDE 15

System Parameters

๐œธ: the number of adversaries ๐‘ณ: the number of source nodes ๐’˜: the maximum number of the messages of one adversarial source node ๐‘ถ: the number of encoding nodes ๐’–: the number of encoding nodes that decoder needs to connect to. ๐ฟ = 3 ๐‘‚ = 5 ๐›พ = 1 ๐‘ค = 3 15 # of adversaries # of adversarial messages # of source nodes # of encoding nodes

slide-16
SLIDE 16

The problem

What is the fundamental limit of ๐‘ข in an (๐‘‚, ๐ฟ, ๐›พ, ๐‘ค) distributed encoding system? ๐‘ขโˆ—: fundamental limit of ๐‘ข

(Informally, at least how many encoding nodes does the decoder need?)

16

slide-17
SLIDE 17

Fundamental limit of ๐‘ข

In an ๐‘‚, ๐ฟ, ๐›พ, ๐‘ค distributed encoding system,

  • if ๐‘‚ โ‰ฅ ๐ฟ + ๐›พ ๐‘ค โˆ’ 1 + 1

๐‘ขโˆ— = ๐ฟ + ๐›พ ๐‘ค โˆ’ 1 + 1

  • If ๐ฟ โ‰ค ๐‘‚ โ‰ค ๐ฟ + ๐›พ ๐‘ค โˆ’ 1

๐‘ขโˆ— = ๐‘‚

Theorem

Recall 17

slide-18
SLIDE 18

Proof

Achievability There is a coding scheme where

  • the decoder can connect to any ๐‘ขโˆ— encoding nodes,
  • and generate an estimate for the input messages where the messages of

the honest nodes are correctly decoded. For achievability, we need a code, decoding process, and correctness proof. Converse There is no coding scheme in which

  • the decoder connects to less than ๐‘ขโˆ— encoding nodes,
  • and estimates the messages of the honest nodes correctly.

18

slide-19
SLIDE 19

Achievability-code

We use this nonlinear code to achieve ๐‘ขโˆ—.

19

๐‘”

๐‘œ ๐‘ฆ๐‘œ1, โ€ฆ , ๐‘ฆ๐‘œ๐ฟ = เท ๐‘™=1 ๐ฟ

๐›ฝ๐‘œ๐‘™ ๐‘ฆ๐‘œ1 โ€ฆ ๐‘ฆ๐‘œ๐ฟ ๐‘ฆ๐‘œ๐‘™ , 1 โ‰ค ๐‘œ โ‰ค ๐‘‚

๐›ฝ๐‘œ1, โ€ฆ , ๐›ฝ๐‘œ๐ฟ: chosen independently and uniformly at random from the field

Using nonlinear code

  • Hard for the adversary to evaluate the contribution of its messages in the encoded symbols
  • Hard for the adversary to cause confusion in the decoder
  • Having a set of nonlinear equations with possibly many solutions

nice structure

slide-20
SLIDE 20

Achievability-code

๐ฟ โˆ’ ๐›พ + ๐›พ๐‘ค is the number of the variables in the system. With connecting to just one more encoding node and using the equation of that node, decoder can be successful.

20

๐‘”

๐‘œ ๐‘ฆ๐‘œ1, โ€ฆ , ๐‘ฆ๐‘œ๐ฟ = เท ๐‘™=1 ๐ฟ

๐›ฝ๐‘œ๐‘™ ๐‘ฆ๐‘œ1 โ€ฆ ๐‘ฆ๐‘œ๐ฟ ๐‘ฆ๐‘œ๐‘™ , 1 โ‰ค ๐‘œ โ‰ค ๐‘‚

๐‘ขโˆ— = ๐ฟ + ๐›พ ๐‘ค โˆ’ 1 + 1

slide-21
SLIDE 21

Achievability-decoding

Decoder considers every possible scenario and finds feasible solutions.

21

slide-22
SLIDE 22

Achievability- correctness

22 We consider a partitioning for the encoding nodes. We form a set of nonlinear equations. In some steps, we transform it to another set of nonlinear equations. We use Bezout theorem to bound the number

  • f the feasible and undesirable solutions.

all options for the messages

  • f source nodes

feasible and undesirable solutions

We prove every feasible solution satisfies correctness.

slide-23
SLIDE 23

Converse

23

For any code, if the decoder connects to less than ๐‘ขโˆ— nodes, there is a way that adversary can mislead the decoder.

The decoder does not know the adversaries and their behavior. Decoder would be confused between two contradicting feasible solutions.

slide-24
SLIDE 24

Could we achieve ๐‘ขโˆ— with a linear code?

24

slide-25
SLIDE 25

Fundamental limit of ๐‘ข- linear regime

In an ๐‘‚, ๐ฟ, ๐›พ, ๐‘ค distributed encoding system where ๐‘”

1, โ€ฆ , ๐‘” ๐‘‚ are

linear functions,

  • if ๐‘‚ โ‰ฅ ๐ฟ + 2๐›พ ๐‘ค โˆ’ 1

๐‘ขlinear

โˆ—

= ๐ฟ + 2๐›พ ๐‘ค โˆ’ 1

  • If ๐ฟ โ‰ค ๐‘‚ โ‰ค ๐ฟ + 2๐›พ ๐‘ค โˆ’ 1 โˆ’ 1

๐‘ขlinear

โˆ—

= ๐‘‚

Theorem (linear code)

25

In an ๐‘‚, ๐ฟ, ๐›พ, ๐‘ค distributed encoding system,

  • if ๐‘‚ โ‰ฅ ๐ฟ + ๐›พ ๐‘ค โˆ’ 1 + 1

๐‘ขโˆ— = ๐ฟ + ๐›พ ๐‘ค โˆ’ 1 + 1

  • If ๐ฟ โ‰ค ๐‘‚ โ‰ค ๐ฟ + ๐›พ ๐‘ค โˆ’ 1

๐‘ขโˆ— = ๐‘‚

Theorem (general code) Linear code is not good enough!

slide-26
SLIDE 26

Conclusion

  • We introduced the problem of distributed encoding.
  • We assumed that some of the source nodes are adversaries and send inconsistent

messages to the encoding nodes.

  • We characterized the fundamental limit of the distributed encoding system.
  • We established matching achievability and converse.
  • We introduced nonlinear coding in order to achieve the fundamental limit.
  • There are many more problems to solve
  • How to optimize the decoding complexity?
  • What if some of encoding nodes are adversaries as well?
  • What is the fundamental limit if encoding nodes use a particular coding?
  • โ€ฆ

26

slide-27
SLIDE 27

Thank you

27