Error Correction by Structural Simplicity: Correcting Samplable Additive Errors

This paper explores the possibilities and limitations of error correction by the structural simplicity of error mechanisms. Specifically, we consider channel models, called \emph{samplable additive channels}, in which (a) errors are efficiently sampled without the knowledge of the coding scheme or the transmitted codeword; (b) the entropy of the error distribution is bounded; and (c) the number of errors introduced by the channel is unbounded. For the channels, several negative and positive results are provided. Assuming the existence of one-way functions, there are samplable additive errors of entropy $n^{\epsilon}$ for $\epsilon \in (0,1)$ that are pseudorandom, and thus not correctable by efficient coding schemes. It is shown that there is an oracle algorithm that induces a samplable distribution over $\{0,1\}^n$ of entropy $m = \omega( \log n)$ that is not pseudorandom, but is uncorrectable by efficient schemes of rate less than $1 - m/n - o(1)$. The results indicate that restricting error mechanisms to be efficiently samplable and not pseudorandom is insufficient for error correction. As positive results, some conditions are provided under which efficient error correction is possible.

[1]  Richard J. Lipton,et al.  A New Approach To Information Theory , 1994, STACS.

[2]  Lance Fortnow,et al.  Innovations in Computer Science - ICS 2010 , 2010 .

[3]  Morris Plotkin,et al.  Binary codes with specified minimum distance , 1960, IRE Trans. Inf. Theory.

[4]  Leonid A. Levin,et al.  A Pseudorandom Generator from any One-way Function , 1999, SIAM J. Comput..

[5]  Venkatesan Guruswami,et al.  Optimal Rate Code Constructions for Computationally Simple Channels , 2016, J. ACM.

[6]  Imre Csiszár,et al.  Capacity and decoding rules for classes of arbitrarily varying channels , 1989, IEEE Trans. Inf. Theory.

[7]  Imre Csiszár,et al.  Arbitrarily varying channels with constrained inputs and states , 1988, IEEE Trans. Inf. Theory.

[8]  Silvio Micali,et al.  Optimal Error Correction for Computationally Bounded Noise , 2010, IEEE Transactions on Information Theory.

[9]  Hiroki Koga,et al.  Information-Spectrum Methods in Information Theory , 2002 .

[10]  Hoeteck Wee On pseudoentropy versus compressibility , 2004, Proceedings. 19th IEEE Annual Conference on Computational Complexity, 2004..

[11]  Feng-Hao Liu,et al.  Tamper and Leakage Resilience in the Split-State Model , 2012, IACR Cryptol. ePrint Arch..

[12]  Andrew V. Goldberg,et al.  Compression and ranking , 1985, STOC '85.

[13]  Shachar Lovett,et al.  Non-malleable codes from additive combinatorics , 2014, STOC.

[14]  Jacobus H. van Lint,et al.  Introduction to Coding Theory , 1982 .

[15]  Michael Langberg,et al.  Oblivious Communication Channels and Their Capacity , 2008, IEEE Transactions on Information Theory.

[16]  Yevgeniy Dodis,et al.  Randomness Condensers for Efficiently Samplable, Seed-Dependent Sources , 2012, TCC.

[17]  Stefan Dziembowski,et al.  Leakage-Resilient Cryptography , 2008, 2008 49th Annual IEEE Symposium on Foundations of Computer Science.

[18]  Yuan Zhou Introduction to Coding Theory , 2010 .

[19]  Larry Carter,et al.  Universal Classes of Hash Functions , 1979, J. Comput. Syst. Sci..

[20]  Anindya De,et al.  Extractors and Lower Bounds for Locally Samplable Sources , 2011, TOCT.

[21]  Venkatesan Guruswami,et al.  Non-malleable Coding Against Bit-Wise and Split-State Tampering , 2013, Journal of Cryptology.

[22]  Sang Joon Kim,et al.  A Mathematical Theory of Communication , 2006 .

[23]  S. Verdú,et al.  Noiseless Data Compression with Low-Density Parity-Check Codes , 2003, Advances in Network Information Theory.

[24]  Ronald Cramer Theory of cryptography : 9th theory of cryptography conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012 : proceedings , 2012 .

[25]  Emanuele Viola,et al.  Extractors for Circuit Sources , 2011, 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science.

[26]  Jørn Justesen,et al.  Class of constructive asymptotically good algebraic codes , 1972, IEEE Trans. Inf. Theory.

[27]  Ron M. Roth,et al.  Introduction to Coding Theory , 2019, Discrete Mathematics.

[28]  Sergio Verdú,et al.  A general formula for channel capacity , 1994, IEEE Trans. Inf. Theory.

[29]  Luca Trevisan,et al.  Extracting randomness from samplable distributions , 2000, Proceedings 41st Annual Symposium on Foundations of Computer Science.

[30]  Ronen Shaltiel,et al.  Explicit List-Decodable Codes with Optimal Rate for Computationally Bounded Channels , 2016, APPROX-RANDOM.

[31]  Masahito Hayashi,et al.  Dual Universality of Hash Functions and Its Applications to Quantum Cryptography , 2010, IEEE Transactions on Information Theory.

[32]  Russell Impagliazzo,et al.  One-way functions are essential for complexity based cryptography , 1989, 30th Annual Symposium on Foundations of Computer Science.

[33]  O. Antoine,et al.  Theory of Error-correcting Codes , 2022 .

[34]  B. Abdolmaleki Non-Malleable Codes , 2017 .

[35]  Sanjeev Arora,et al.  Computational Complexity: A Modern Approach , 2009 .

[36]  Mahdi Cheraghchi Capacity achieving codes From randomness conductors , 2009, 2009 IEEE International Symposium on Information Theory.

[37]  Kenji Yasunaga Error-Correcting Codes Against Chosen-Codeword Attacks , 2016, ICITS.

[38]  Luca Trevisan,et al.  Compression of Samplable Sources , 2004, Proceedings. 19th IEEE Annual Conference on Computational Complexity, 2004..