Codes Against Online Adversaries: Large Alphabets

In this paper, we consider the communication of information in the presence of an online adversarial jammer. In the setting under study, a sender wishes to communicate a message to a receiver by transmitting a codeword <b>x</b>=(<i>x</i><sub>1</sub>,...,<i>x</i><sub>n</sub>) symbol-by-symbol over a communication channel. The adversarial jammer can view the transmitted symbols <i>x</i><sub>i</sub> one at a time and can change up to a <i>p</i>-fraction of them. However, for each symbol <i>x</i><sub>i</sub>, the jammer's decision on whether to corrupt it or not (and on how to change it) must depend only on <i>x</i><sub>j</sub> for <i>j</i> ≤ <i>i</i>. This is in contrast to the “classical” adversarial jammer which may base its decisions on its complete knowledge of <b>x</b>. More generally, for a delay parameter δ ∈ (0,1), we study the scenario in which the jammer's decision on the corruption of <i>x</i><sub>i</sub> must depend solely on <i>x</i><sub>j</sub> for <i>j</i> ≤ <i>i</i>-δ<i>n</i>. In this study, the transmitted symbols are assumed to be over a sufficiently large field F. The sender and receiver do not share resources such as common randomness (though the sender is allowed to use stochastic encoding). We present a tight characterization of the amount of information one can transmit in both the 0-delay and, more generally, the δ-delay online setting. We show that for 0-delay adversaries, the achievable rate asymptotically equals that of the classical adversarial model. For positive values of δ, we consider two types of jamming: additive and overwrite. We also extend our results to a jam-or-listen online model, where the online adversary can either jam a symbol or eavesdrop on it. We present computationally efficient achievability schemes even against computationally unrestricted jammers.

[1]  Anand D. Sarwate,et al.  Robust and adaptive communication under uncertain interference , 2008 .

[2]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[3]  Thomas M. Cover,et al.  Elements of information theory (2. ed.) , 2006 .

[4]  Anand D. Sarwate,et al.  Improved upper bounds on the capacity of binary channels with causal adversaries , 2012, ISIT.

[5]  D. Blackwell,et al.  The Capacities of Certain Channel Classes Under Random Coding , 1960 .

[6]  O. Antoine,et al.  Theory of Error-correcting Codes , 2022 .

[7]  Prakash Narayan,et al.  Reliable Communication Under Channel Uncertainty , 1998, IEEE Trans. Inf. Theory.

[8]  Michael Langberg,et al.  Codes against online adversaries , 2008, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[9]  Elwyn R. Berlekamp,et al.  Algebraic coding theory , 1984, McGraw-Hill series in systems science.

[10]  Feller William,et al.  An Introduction To Probability Theory And Its Applications , 1950 .

[11]  Imre Csiszár,et al.  Information Theory - Coding Theorems for Discrete Memoryless Systems, Second Edition , 2011 .

[12]  Muriel Médard,et al.  On Jamming in the Wideband Regime , 2006, 2006 IEEE International Symposium on Information Theory.

[13]  Carles Padró,et al.  Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors , 2008, EUROCRYPT.

[14]  Anand D. Sarwate,et al.  Coding against delayed adversaries , 2010, 2010 IEEE International Symposium on Information Theory.

[15]  Michael Langberg,et al.  Binary causal-adversary channels , 2009, 2009 IEEE International Symposium on Information Theory.

[16]  Michael Alekhnovich Linear diophantine equations over polynomials and soft decoding of Reed-Solomon codes , 2005, IEEE Transactions on Information Theory.

[17]  Tracey Ho,et al.  Correction of adversarial errors in networks , 2005, Proceedings. International Symposium on Information Theory, 2005. ISIT 2005..

[18]  Kenneth W. Shum,et al.  A low-complexity algorithm for the construction of algebraic-geometric codes better than the Gilbert-Varshamov bound , 2001, IEEE Trans. Inf. Theory.

[19]  Michael Langberg,et al.  Adversarial models and resilient schemes for network coding , 2008, 2008 IEEE International Symposium on Information Theory.

[20]  Eli Upfal,et al.  Probability and Computing: Randomized Algorithms and Probabilistic Analysis , 2005 .

[21]  Anant Sahai,et al.  The Necessity and Sufficiency of Anytime Capacity for Stabilization of a Linear System Over a Noisy Communication Link—Part I: Scalar Systems , 2006, IEEE Transactions on Information Theory.

[22]  W. W. Peterson,et al.  Encoding and error-correction procedures for the Bose-Chaudhuri codes , 1960, IRE Trans. Inf. Theory.

[23]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .