Optimal Communication Rates and Combinatorial Properties for Common Randomness Generation

We study the distributed simulation problem where $n$ players aim to generate \emph{same} sequences of random coin flips where some subsets of the players share an independent common coin which can be tossed multiple times, and there is a publicly seen blackboard through which the players communicate with each other. We provide a tight representation of the optimal communication rates via linear programming, and more importantly, propose explicit algorithms for the optimal distributed simulation for a wide class of hypergraphs. In particular, the optimal communication rate in complete hypergraphs is still achievable in sparser hypergraphs containing a path-connected cycle-free cluster of topologically connected components. Some key steps in analyzing the upper bounds rely on two different definitions of connectivity in hypergraphs, which may be of independent interest.

[1]  Ilan Newman,et al.  Private vs. Common Random Bits in Communication Complexity , 1991, Inf. Process. Lett..

[2]  Rodney A. Kennedy,et al.  Determining Optimal Rates for Communication for Omniscience , 2018, IEEE Transactions on Information Theory.

[3]  Peter W. Shor,et al.  Entanglement-assisted capacity of a quantum channel and the reverse Shannon theorem , 2001, IEEE Trans. Inf. Theory.

[4]  Andrew Chi-Chih Yao,et al.  The complexity of nonuniform random number generation , 1976 .

[5]  Andrew Chi-Chih Yao,et al.  Some complexity questions related to distributive computing(Preliminary Report) , 1979, STOC.

[6]  Art M. Duval,et al.  Simplicial matrix-tree theorems , 2008, 0802.2576.

[7]  Yanjun Han,et al.  Geometric Lower Bounds for Distributed Parameter Estimation Under Communication Constraints , 2018, IEEE Transactions on Information Theory.

[8]  Matthias Krause,et al.  Geometric arguments yield better bounds for threshold circuits and distributed computing , 1991, [1991] Proceedings of the Sixth Annual Structure in Complexity Theory Conference.

[9]  Richard J. Lipton,et al.  Multi-party protocols , 1983, STOC.

[10]  Imre Csiszár,et al.  Common randomness and secret key generation with a helper , 2000, IEEE Trans. Inf. Theory.

[11]  R. Ahlswede Elimination of correlation in random codes for arbitrarily varying channels , 1978 .

[12]  Gowtham R. Kurri,et al.  Optimal Communication Rates and Combinatorial Properties for Distributed Simulation. , 2019 .

[13]  Chung Chan,et al.  On the Optimality of Secret Key Agreement via Omniscience , 2018, IEEE Transactions on Information Theory.

[14]  Prakash Narayan,et al.  Perfect Omniscience, Perfect Secrecy, and Steiner Tree Packing , 2010, IEEE Transactions on Information Theory.

[15]  Himanshu Tyagi,et al.  Domain Compression and its Application to Randomness-Optimal Distributed Goodness-of-Fit , 2019, Electron. Colloquium Comput. Complex..

[16]  Aaron D. Wyner,et al.  The common information of two dependent random variables , 1975, IEEE Trans. Inf. Theory.

[17]  Thomas A. Courtade,et al.  Coded Cooperative Data Exchange for a Secret Key , 2014, IEEE Transactions on Information Theory.

[18]  T. S. Jayram,et al.  Resource-Efficient Common Randomness and Secret-Key Schemes , 2017, SODA.

[19]  Himanshu Tyagi,et al.  Distributed Simulation and Distributed Inference , 2018, Electron. Colloquium Comput. Complex..

[20]  Chung Chan,et al.  Mutual dependence for secret key agreement , 2010, 2010 44th Annual Conference on Information Sciences and Systems (CISS).

[21]  U. Maurer,et al.  Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.

[22]  Himanshu Tyagi,et al.  Inference Under Information Constraints I: Lower Bounds From Chi-Square Contraction , 2018, IEEE Transactions on Information Theory.

[23]  Kurt Mehlhorn,et al.  Las Vegas is better than determinism in VLSI and distributed computing (Extended Abstract) , 1982, STOC '82.

[24]  Venkat Anantharam,et al.  The common randomness capacity of a network of discrete memoryless channels , 2000, IEEE Trans. Inf. Theory.

[25]  Mihalis Yannakakis,et al.  Expressing combinatorial optimization problems by linear programs , 1991, STOC '88.

[26]  Chung Chan,et al.  Secret Key Generation for Minimally Connected Hypergraphical Sources , 2018, IEEE Transactions on Information Theory.

[27]  Lei Zhao,et al.  The efficiency of common randomness generation , 2011, 2011 49th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[28]  Alexander Sprintson,et al.  On coding for cooperative data exchange , 2010, 2010 IEEE Information Theory Workshop on Information Theory (ITW 2010, Cairo).

[29]  A new matrix-tree theorem , 2001, math/0109104.

[30]  Paul W. Cuff,et al.  Distributed Channel Synthesis , 2012, IEEE Transactions on Information Theory.

[31]  E. Scheinerman,et al.  Fractional Graph Theory: A Rational Approach to the Theory of Graphs , 1997 .

[32]  Navin Kashyap,et al.  On the Public Communication Needed to Achieve SK Capacity in the Multiterminal Source Model , 2015, IEEE Transactions on Information Theory.

[33]  Eli Upfal,et al.  Probability and Computing: Randomized Algorithms and Probabilistic Analysis , 2005 .

[34]  Alex Reznik,et al.  Group Secret Key Generation Algorithms , 2007, 2007 IEEE International Symposium on Information Theory.

[35]  Rudolf Ahlswede,et al.  Common Randomness in Information Theory and Cryptography - Part II: CR Capacity , 1998, IEEE Trans. Inf. Theory.

[36]  Sergio Verdú,et al.  Secret Key Generation With Limited Interaction , 2016, IEEE Transactions on Information Theory.

[37]  Andrew C. Yao,et al.  Lower bounds by probabilistic arguments , 1983, 24th Annual Symposium on Foundations of Computer Science (sfcs 1983).

[38]  Alexander Barg,et al.  Secret Key Generation for a Pairwise Independent Network Model , 2008, IEEE Transactions on Information Theory.

[39]  Vivek S. Borkar,et al.  Common randomness and distributed control: A counterexample , 2007, Systems & control letters (Print).

[40]  Eyal Kushilevitz,et al.  Fractional covers and communication complexity , 1992, [1992] Proceedings of the Seventh Annual Structure in Complexity Theory Conference.

[41]  Chung Chan,et al.  Upper Bounds via Lamination on the Constrained Secrecy Capacity of Hypergraphical Sources , 2019, IEEE Transactions on Information Theory.

[42]  Gil Kalai,et al.  Enumeration ofQ-acyclic simplicial complexes , 1983 .

[43]  A. Razborov Communication Complexity , 2011 .

[44]  Anna de Mier,et al.  Spanning trees of 3-uniform hypergraphs , 2010, Adv. Appl. Math..

[45]  David P. Woodruff,et al.  Communication lower bounds for statistical estimation problems via a distributed data processing inequality , 2015, STOC.

[46]  Martin J. Wainwright,et al.  Information-theoretic lower bounds for distributed statistical estimation with communication constraints , 2013, NIPS.

[47]  Imre Csiszár,et al.  The capacity of the arbitrarily varying channel revisited: Positivity, constraints , 1988, IEEE Trans. Inf. Theory.

[48]  Chung Chan Secret key agreement for hypergraphical sources with limited total discussion , 2019, ArXiv.

[49]  Rudolf Ahlswede,et al.  Common randomness in information theory and cryptography - I: Secret sharing , 1993, IEEE Trans. Inf. Theory.

[50]  Imre Csiszár,et al.  Secrecy capacities for multiple terminals , 2004, IEEE Transactions on Information Theory.

[51]  Robert Kohl,et al.  An Introduction To Algebraic Topology , 2016 .

[52]  Chung Chan,et al.  Multivariate Mutual Information Inspired by Secret-Key Agreement , 2015, Proceedings of the IEEE.

[53]  Himanshu Tyagi,et al.  Common Information and Secret Key Capacity , 2013, IEEE Transactions on Information Theory.