Centralized vs decentralized multi-agent guesswork

We study a notion of guesswork, where multiple agents intend to launch a coordinated brute-force attack to find a single binary secret string, and each agent has access to side information generated through either a BEC or a BSC. The average number of trials required to find the secret string grows exponentially with the length of the string, and the rate of the growth is called the guesswork exponent. We compute the guesswork exponent for several multi-agent attacks. We show that a multi-agent attack reduces the guesswork exponent compared to a single agent, even when the agents do not exchange information to coordinate their attack, and try to individually guess the secret string using a predetermined scheme in a decentralized fashion. Further, we show that the guesswork exponent of two agents who do coordinate their attack is strictly smaller than that of any finite number of agents individually performing decentralized guesswork.

[1]  David Malone,et al.  Guesswork and entropy , 2004, IEEE Transactions on Information Theory.

[2]  Neri Merhav,et al.  Guessing Subject to Distortion , 1998, IEEE Trans. Inf. Theory.

[3]  Faramarz Fekri,et al.  Fundamental limits of universal lossless one-to-one compression of parametric sources , 2014, 2014 IEEE Information Theory Workshop (ITW 2014).

[4]  J. Massey Guessing and entropy , 1994, Proceedings of 1994 IEEE International Symposium on Information Theory.

[5]  Oliver Kosut,et al.  Asymptotics and Non-Asymptotics for Universal Fixed-to-Variable Source Coding , 2014, IEEE Transactions on Information Theory.

[6]  Erdal Arikan An inequality on guessing and its application to sequential decoding , 1996, IEEE Trans. Inf. Theory.

[7]  A. Robert Calderbank,et al.  A geometric perspective on guesswork , 2015, 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[8]  Ken R. Duffy,et al.  Guessing a password over a wireless channel (on the effect of noise non-uniformity) , 2013, 2013 Asilomar Conference on Signals, Systems and Computers.

[9]  Rajesh Sundaresan,et al.  Guessing Under Source Uncertainty , 2006, IEEE Transactions on Information Theory.

[10]  C. E. Pfister,et al.  Renyi entropy, guesswork moments, and large deviations , 2004, IEEE Transactions on Information Theory.

[11]  Neri Merhav,et al.  List Decoding—Random Coding Exponents and Expurgated Exponents , 2013, IEEE Transactions on Information Theory.

[12]  A. Robert Calderbank,et al.  Quantifying computational security subject to source constraints, guesswork and inscrutability , 2015, 2015 IEEE International Symposium on Information Theory (ISIT).

[13]  Ken R. Duffy,et al.  Multi-User Guesswork and Brute Force Security , 2015, IEEE Transactions on Information Theory.

[14]  Ken R. Duffy,et al.  Guesswork, Large Deviations, and Shannon Entropy , 2012, IEEE Transactions on Information Theory.

[15]  Ken R. Duffy,et al.  Brute force searching, the typical set and Guesswork , 2013, 2013 IEEE International Symposium on Information Theory.