Optimal Short-Circuit Resilient Formulas Ran Gelles Bar-Ilan - - PowerPoint PPT Presentation

optimal short circuit resilient formulas
SMART_READER_LITE
LIVE PREVIEW

Optimal Short-Circuit Resilient Formulas Ran Gelles Bar-Ilan - - PowerPoint PPT Presentation

Optimal Short-Circuit Resilient Formulas Ran Gelles Bar-Ilan University Mark Braverman Klim Efremenko Michael A. Yitayew Princeton University Ben-Gurion Univ. Princeton University 1 Motivation How to construct a circuit that computes


slide-1
SLIDE 1

Optimal Short-Circuit Resilient Formulas

Ran Gelles Bar-Ilan University

1

Mark Braverman Princeton University Michael A. Yitayew Princeton University Klim Efremenko Ben-Gurion Univ.

slide-2
SLIDE 2

Motivation

2

  • How to construct a circuit that computes
  • Assuming AND / OR gates 


(all negations pushed to literals)


  • EASY:

z1 z2 fpzq “ z1 ^ z2

slide-3
SLIDE 3

Motivation

3

slide-4
SLIDE 4

Motivation

4

slide-5
SLIDE 5

Motivation

5

  • How to construct a circuit that computes
  • Assuming AND / OR gates
  • When few of the AND / OR gates were mixed?

fpzq “ z1 ^ z2

slide-6
SLIDE 6

Motivation

6

  • A More General Question:
  • given a boolean function
  • construct an AND / OR circuit for f, that works


even if a constant fraction of the gates are “faulty”

fpzq : t0, 1un Ñ t0, 1u

slide-7
SLIDE 7

Short-Circuit Noise

  • A generalization of the above is a faulty gate with

“short-circuit” noise

  • The shorted input can be 


determined adversarially

  • Equivalent to replacing the 


gate with an arbitrary 
 gate g for which
 g(0…0)=0 and g(1…1)=1

7

1 1

slide-8
SLIDE 8

Short-Circuit Noise

  • This type of noise is very 


common in produced wafers

  • Incomparable to von-Neumann


Noise (every wire flips w.p ε)

8

1 1

slide-9
SLIDE 9

Short-Circuit Noise

  • Main question(s):
  • How to construct an AND/OR circuit 


that is correct with up to k faulty (short-circuited) gates

  • What is the maximal k ? 


What is the maximal fraction of faulty gates?

  • How many extra gates we need to “fortify” a

given circuit?

9

slide-10
SLIDE 10

Prior Work

O(k |C|+klog 3) poly(|F|)

Work Noise level Circuit Size Kleitman-Leighton-Ma (J.Comp.Sys.Sci97) k errors any Kalai-Lewko-Rao (FOCS12) 훅<1/6 fraction
 
 훅<1/10 fraction formula (fan-in>2)
 
 formula (fan-in=2)

  • Resilient Circuits with Von Neuman Noise:


VonNeuman56, Dobrushin-Ortyukov77, Pippenger88, Pippenger89, Feder89, Gál91, Hajek-Weller91, Reischuk-Schmeltz91, Evans-Schulman99, Gács-Gál94, Evans-Pippenger98, Evans-Schulman03, Unger08/10, Mozeika-Saad-Raymond10

(*in-to-out path)

slide-11
SLIDE 11
  • The Attack Plan: [Kalai-Lewko-Rao 2012]

Resilient Formulas

11

[KarchmerWigderson90]

11

훅-resilience 훅/2-resilience

Coding w/ feedback [EGH16]

훅≤1/3

slide-12
SLIDE 12

Resilient Formulas

  • Why do we lose a factor-2 in the resilience?
  • Noise is one-sided:
  • Noise on AND gates can only make 0→1
  • Noise on OR gates can only make 1→0
  • If out=1, noise on AND gates is meaningless!
  • If a circuit is resilient to 훅’-fraction, then 


(1) corrupting 훅’-fraction of ANDs is OK, but also
 (2) corrupting 훅’-fraction of ORs is OK
 ⇒ is resilient to 2훅’, thus 2훅’ ≤ 훅 (since res. comes from protocol)

12

slide-13
SLIDE 13

Resilient Formulas

  • Idea: split the noise to AND and OR gates
  • Def. (α,β)-corruption means corrupting


at most αn AND gates and βn OR gates
 in every in-to-out path (n is depth of circuit)

13

slide-14
SLIDE 14

Result

[KW90]

(α,β)-resilience

(1/5 , 1/5)-resilient
 coding + converse

[KLR12] [EGH16]

14

slide-15
SLIDE 15

Main Result

15

  • Upper Bound (Direct):


Any formula F can be (efficiently) compiled into F’ so that:

  • F’ is correct if up to 


1/5-훆 fraction of the AND-gates, and 1/5-훆 of the OR-gates 
 are faulty in any input-to-output branch

  • F’ has constant fan in (> 2),

  • Lower Bound (Converse) : Resilience of 1/5 is tight.


There exist functions that 1/5 corruption invalidates any F of sub-exponential size

|F 1| “ polyp|F|q

slide-16
SLIDE 16

Techniques:
 Upper Bound

16

(1/5,1/5)-resilient coding scheme w/ feedback

slide-17
SLIDE 17

Coding for Interactive Comm.

r rounds

π

R rounds

π’ π’(x,y) = π(x,y)

17

π(x,y) Many Coding Schemes exist for various settings

[Schulman96, GMS14, BR14, KR13, GH15, Pan13, EGH16, Hau14, BK12, BKN14, FGOS15, BGMO16, BNTTU14, G17, GHKZW18] …

slide-18
SLIDE 18

18

Feedback

  • We define a noisy KW mapping between formulas

and protocols

  • Short Circuit noise == Channel noise


(assuming feedback)

  • The sender learns the received symbol via a

“noiseless feedback “ channel

slide-19
SLIDE 19

Coding Scheme - Overview

  • Assume a noiseless binary protocol π
  • Alice and Bob simulate π message by message.


Each message contains:

  • the “next” bit according to π
  • a link to the previous non-corrupt message sent by

the party (as learnt by feedback)

  • Each received message induces a “chain” of allegedly

correct messages. The next step follows this chain

  • At the end, the longest chain is to be trusted

19

slide-20
SLIDE 20

Coding Scheme

m1 m2 m4 m3 m5

20

X 1 Alice doesn’t know there was an error.. gives wrong info

Aim: simulate the noiseless protocol step-by-step

slide-21
SLIDE 21

m1 m2 m4 m3 m5

21

X 1 Bob knows this is wrong (via feedback) m6 1 This extension ignores m5,
 
 Bob “knows” m5 is based on err

Coding Scheme

slide-22
SLIDE 22

m1 m2 m4 m3 m5

22

X 1 m6 1 m7 1 Alice received m6. based on it she “knows” m4 is an err, and she knows m5 is to be ignored..

Coding Scheme

Output: the transcript implied by the longest chain

slide-23
SLIDE 23

m1 m2 m4 m3 m5

23

X 1 m6 1 m7 1

Coding Scheme

  • Messages are not

alternating order

  • the more noise on

Bob’s messages 
 the less he gets to speak in the future

slide-24
SLIDE 24

Attacks (1)

  • Adversary may try to

build its own chain

  • But with 1/5-fraction

corruptions, his chain will be shorter

24

slide-25
SLIDE 25

Attacks (2)

  • Adversary may

incorrectly extend a correct chain

  • But in order to make

its chain the longest, it must start late

  • by then, the chain’s

already simulated the entire transcript.

25

(all the needed info is here)

slide-26
SLIDE 26

Techniques: Lower Bound

26

slide-27
SLIDE 27

Lower Bound

  • Note, (1/5,1/5)-corruptions cannot fool protocols

with exponential (blowup in) communication:

  • Use Shannon code with relative distance ≈ 1 


to exchange the parties inputs.

  • Withstands noise rate of ≈1/2 per direction of

the channel

27

slide-28
SLIDE 28

Lower Bound

  • Yet, when the blow-up is restricted 


(e.g., communication < size of the input) :

  • By a Pigeon hole principle, we can show a function f and inputs

x,y,x’,y’ for which

  • 1. f(x,y) ≠ f(x’,y) ≠ f(x’,y’)
  • If the computation of f takes r rounds by some protocol, 


then during its first 2r/5 rounds:

  • 2. Alice (wlog) speaks at most half of the times
  • 3. If Alice has x, then the protocol sends exactly the same

messages whether Bob holds y or y’

28

slide-29
SLIDE 29

Lower Bound

  • Create the following confusing transcript:

29

흅(x,y)

2r/5

Rounds 흅(x’,y)

r/5

Bob Speaks 흅(x’,y’)

r/5

흅(x’,y)

(until terminates, if hasn’t already)

  • is a (1/5,1/5)-corruption of 흅(x’,y) and one of {흅(x’,y’), 흅(x,y)}

Alice speaks

≤ r/5

slide-30
SLIDE 30

Lower Bound

  • Example: Assume 흅 terminates before 4-th part

30

흅(x,y) 흅(x’,y) 흅(x’,y’) 흅(x,y) 흅(x’,y) 흅(x’,y’)

(x’,y) (x’,y’) Alice ➜ x

흅(x,y)=흅(x,y’) from (3) of pigeon hole

Alice ➜ x Bob ➜ y Bob ➜ y’ Since f(x’,y) ≠ f(x’,y’) we are done 


(1) of pigeon hole…

slide-31
SLIDE 31

Lower Bound

  • Problem:
  • Need to apply the above on KW-relation, 


rather than on a function.

  • f(x’,y) ≠ f(x’,y’) translates to 


confusing Alice between KW(x’,y) and KW(x’,y’)

  • but maybe both are a correct output of the protocol?!
  • We use KW relation of the parity function par(x1,…,xn) = x1⨁⨁xn , 


chosing inputs so that 
 KWpar(x’,y) ⋂ KWpar(x’,y’) = ∅

31

slide-32
SLIDE 32

Summary

32

slide-33
SLIDE 33

Summary

  • A two-directional “noisy” KW mapping between

protocols and formulas

  • Coding scheme with resilience 1/5-휀 (const alphabet)

➡ Formula resilient to (1/5-휀, 1/5-휀)–noise

  • Impossibility of coding with 1/5 (const rate)


➡ No small formula is resilient to (1/5,1/5)-noise

33

slide-34
SLIDE 34

Open Problems

  • 1. The binary / fan-in2 case?
  • 2. General faults: stuck to 0/1, flip, short-circuit
  • 3. KW connects formulas with 2-party protocols
  • Can we map general circuits with some kind of

communication model?

  • (Branching Programs? multiparty protocols?)

34

slide-35
SLIDE 35

The End…