Universal Semantic Communication Brendan Juba (Harvard and MIT) with Madhu Sudan (MSR and MIT) & Oded Goldreich (Weizmann)

Slides:



Advertisements
Similar presentations
1+eps-Approximate Sparse Recovery Eric Price MIT David Woodruff IBM Almaden.
Advertisements

The Complexity of Agreement A 100% Quantum-Free Talk Scott Aaronson MIT.
When Qubits Go Analog A Relatively Easy Problem in Quantum Information Theory Scott Aaronson (MIT)
Automated Theorem Proving Lecture 1. Program verification is undecidable! Given program P and specification S, does P satisfy S?
On the (Im)Possibility of Arthur-Merlin Witness Hiding Protocols Iftach Haitner, Alon Rosen and Ronen Shaltiel 1.
Reductions Complexity ©D.Moshkovitz.
Lower Bounds for Non-Black-Box Zero Knowledge Boaz Barak (IAS*) Yehuda Lindell (IBM) Salil Vadhan (Harvard) *Work done while in Weizmann Institute. Short.
Are PCPs Inherent in Efficient Arguments? Guy Rothblum, MIT ) MSR-SVC ) IAS Salil Vadhan, Harvard University.
Ulams Game and Universal Communications Using Feedback Ofer Shayevitz June 2006.
Strict Polynomial-Time in Simulation and Extraction Boaz Barak & Yehuda Lindell.
Complexity Theory Lecture 6
Of 12 12/04/2013CSOI: Communication as Coordination1 Communication as Coordination Madhu Sudan Microsoft, Cambridge, USA -
The Contest between Simplicity and Efficiency in Asynchronous Byzantine Agreement Allison Lewko The University of Texas at Austin TexPoint fonts used in.
Of 19 03/21/2012CISS: Beliefs in Communication1 Efficient Semantic Communication & Compatible Beliefs Madhu Sudan Microsoft, New England Based on joint.
Semantic communication with simple goals is equivalent to on-line learning Brendan Juba (MIT CSAIL & Harvard) with Santosh Vempala (Georgia Tech) Full.
Foundations of Cryptography Lecture 2: One-way functions are essential for identification. Amplification: from weak to strong one-way function Lecturer:
February Semantic CMU1 Semantic Goal-Oriented Communication Madhu Sudan Microsoft Research + MIT Joint with Oded Goldreich (Weizmann)
Foundations of Cryptography Lecture 10 Lecturer: Moni Naor.
JAYASRI JETTI CHINMAYA KRISHNA SURYADEVARA
1 Nondeterministic Space is Closed Under Complement Presented by Jing Zhang and Yingbo Wang Theory of Computation II Professor: Geoffrey Smith.
Foundations of Cryptography Lecture 11 Lecturer: Moni Naor.
Semantic Communication Madhu Sudan (based on joint work with Brendan Juba (MIT); and upcoming work with Oded Goldreich (Weizmann) & J. )
Universal Communication Brendan Juba (MIT) With: Madhu Sudan (MIT)
Dana Moshkovitz. Back to NP L  NP iff members have short, efficiently checkable, certificates of membership. Is  satisfiable?  x 1 = truex 11 = true.
Derandomized parallel repetition theorems for free games Ronen Shaltiel, University of Haifa.
Complexity 26-1 Complexity Andrei Bulatov Interactive Proofs.
Complexity 18-1 Complexity Andrei Bulatov Probabilistic Algorithms.
1 Slides by Roel Apfelbaum & Eti Ezra. Enhanced by Amit Kagan. Adapted from Oded Goldreich’s course lecture notes.
1 Adapted from Oded Goldreich’s course lecture notes.
Correctness. Until now We’ve seen how to define dataflow analyses How do we know our analyses are correct? We could reason about each individual analysis.
CSE115/ENGR160 Discrete Mathematics 03/03/11 Ming-Hsuan Yang UC Merced 1.
RELATIVIZATION CSE860 Vaishali Athale. Overview Introduction Idea behind “Relativization” Concept of “Oracle” Review of Diagonalization Proof Limits of.
CS151 Complexity Theory Lecture 13 May 11, CS151 Lecture 132 Outline Natural complete problems for PH and PSPACE proof systems interactive proofs.
Cramer-Shoup is Plaintext Aware in the Standard Model Alexander W. Dent Information Security Group Royal Holloway, University of London.
Efficient Semantic Communication via Compatible Beliefs Brendan Juba (MIT CSAIL & Harvard) with Madhu Sudan (MSR & MIT)
Foundations of Cryptography Lecture 8 Lecturer: Moni Naor.
Foundations of Cryptography Lecture 2 Lecturer: Moni Naor.
Of 33 March 1, 2011 Semantic UCLA1 Universal Semantic Communication Madhu Sudan Microsoft Research + MIT Joint with Oded Goldreich (Weizmann)
Of 35 05/16/2012CTW: Communication and Computation1 Communication amid Uncertainty Madhu Sudan Microsoft, Cambridge, USA Based on: Universal Semantic Communication.
Of 28 Probabilistically Checkable Proofs Madhu Sudan Microsoft Research June 11, 2015TIFR: Probabilistically Checkable Proofs1.
1 Network Security Lecture 6 Public Key Algorithms Waleed Ejaz
Introduction to Modern Cryptography Sharif University Spring 2015 Data and Network Security Lab Sharif University of Technology Department of Computer.
CS151 Complexity Theory Lecture 13 May 11, Outline proof systems interactive proofs and their power Arthur-Merlin games.
2/2/2009Semantic Communication: MIT TOC Colloquium1 Semantic Goal-Oriented Communication Madhu Sudan Microsoft Research + MIT Joint with Oded Goldreich.
1 Information Security – Theory vs. Reality , Winter Lecture 10: Garbled circuits and obfuscation Eran Tromer Slides credit: Boaz.
Communication vs. Computation S Venkatesh Univ. Victoria Presentation by Piotr Indyk (MIT) Kobbi Nissim Microsoft SVC Prahladh Harsha MIT Joe Kilian NEC.
Probabilistic verification Mario Szegedy, Rutgers www/cs.rutgers.edu/~szegedy/07540 Lecture 1.
10/14/2008Semantic Communication1 Universal Semantic Communication Madhu Sudan MIT CSAIL Joint work with Brendan Juba (MIT CSAIL).
Algorithms for hard problems WQO theory and applications to parameterized complexity Juris Viksna, 2015.
Complexity 24-1 Complexity Andrei Bulatov Interactive Proofs.
1 Introduction to Quantum Information Processing QIC 710 / CS 667 / PH 767 / CO 681 / AM 871 Richard Cleve DC 2117 Lectures
Theory of Computational Complexity TA : Junichi Teruyama Iwama lab. D3
Topic 36: Zero-Knowledge Proofs
Universal Semantic Communication
On the Size of Pairing-based Non-interactive Arguments
HIERARCHY THEOREMS Hu Rui Prof. Takahashi laboratory
Universal Semantic Communication
Universal Semantic Communication
Interactive Proofs Adapted from Oded Goldreich’s course lecture notes.
Universal Semantic Communication
Universal Semantic Communication
Interactive Proofs Adapted from Oded Goldreich’s course lecture notes.
Universal Semantic Communication
Richard Cleve DC 2117 Introduction to Quantum Information Processing CS 667 / PH 767 / CO 681 / AM 871 Lecture 18 (2009) Richard.
Interactive Proofs Adapted from Oded Goldreich’s course lecture notes.
Universal Semantic Communication
Reductions Complexity ©D.Moshkovitz.
Reductions Complexity ©D.Moshkovitz.
9. Complexity Theory : The Frontier
Interactive Proofs Adapted from Oded Goldreich’s course lecture notes.
Presentation transcript:

Universal Semantic Communication Brendan Juba (Harvard and MIT) with Madhu Sudan (MSR and MIT) & Oded Goldreich (Weizmann)

HOW DO WE DEFINE THE “MEANING OF THE COMMUNICTATION? ??” TO BE CONTINUED…

MAN, WHAT THE EFF?? A FAILURE TO COMMUNICA TE!

I.Model of communication II.Theory of finite communication III.Example: computation IV.Model for infinite communication Outline

“Meaning” = Usage ENVIRONME NT =

Printer Printing, formally Printer driver Printer firmware ENVIRONME NT INTERFACE FIXED IN ADVANCE! GOAL OF COMMUNICATION

“USE R” “SERVE R” ENVIRONMEN T BEHAVIOR DEFINED WITH GOAL Abstract goals of communication “G = (ENV,R)” FINITE GOAL OF COMMUNICATION: “USER ACHIEVES GOAL” IF USER “HALTS” WHEN R = 1 R:  {0,1} environment internal state σu2σu2 σu1σu1 σs2σs2 σs1σs1 U: Ω u × {0,1} *  Ω u × {0,1} * dist. over S: Ω s × {0,1} *  Ω s × {0,1} * dist. over

Goal of computation (function f) ENVIRONMEN T x x f(x) R = “user message = f(x)?”

1.Goal of Communication 1.Universal user 2.Sensing function 3.Helpful server Key Concepts

Bob’s problem ? ? I DON’T KNOW WHICH ONE! P BOB WANTS TO PRINT SUCCESSFULLY, REGARDLESS OF WHICH PRINTER HE IS USING

Universal user NOTE: WE SHOULD SUCCEED FROM ANY STATE ENVIRONMEN T P -Universal user for printing P

ENVIRONME NT ENVIRONME NT I’M THROUGH WITH YOU THAT’S ALL I NEEDED TO HEAR! FROM ANY STATE?? I SURE BLEW THAT…

Summary: universal user Definition. A universal user for a goal G = (ENV,R) and a class of servers S is a user strategy s.t. for every server S in S and every initial state of S and ENV, the user achieves G. That is, halts when R = 1 (w.h.p.) WE WILL SAY THAT THE UNIVERSAL USER IS “EFFICIENT” IF, WITH EACH SERVER S IN S, THE USER RUNS IN SOME POLYNOMIAL TIME DEPENDING ON S, WITH THE GOAL- SPECIFIC SIZE PARAMETER DEPENDING ON ENV.

I.Model of communication II.Theory of finite communication III.Example: computation IV.Model for infinite communication Outline

IT’S ALL ABOUT THE FEEDBACK!!

1.Goal of Communication 1.Universal user 2.Sensing function 3.Helpful server Key Concepts

ENVIRONMEN T I CAN STOP! Sensing functions: “safety” SENSING FUNCTION: V : user’s view  {0,1} “ V IS SAFE”: V = 1  R = 1 (w.h.p.) RECALL, REFEREE: R : environment’s view  {0,1}

Sensing functions: “viability” ENVIRONMEN T I CAN STOP! “ V IS VIABLE” IF THERE EXISTS SOME USER STRATEGY THAT RELIABLY OBTAINS V = 1

Theorem 1. If there is an efficiently computable S -safe and S -viable sensing function for a goal, then there is an efficient S -Universal user for that goal. ENUMERATE ALL USER ALGORITHMS, RUN EACH WITH CONSTANT FACTOR OVERHEAD: SAFE & VIABLE SENSING FUNCTION INDICATES WHEN TO HALT Achieving Universal Communication Each algorithm of length l gets ≈ 1/ l 2 2 l - share of the total running time

Theorem 2. There is a natural class of 2 l servers S s.t. a S -Universal user for any goal that requires the server to act experiences an overhead of Ω(2 l ) rounds. IT TAKES ≈ 2 l ROUNDS TO SEND ALL 2 l PASSWORDS OF LENGTH l ! NOTE: QUALITATIVELY OPTIMAL IN TERMS OF PROGRAM LENGTHS! Theorem 2. There is a natural class of 2 l servers S s.t. a S -Universal user for any goal that requires the server to act experiences an overhead of Ω(2 l ) rounds. Might still consider restricted classes where we can be efficient…

So what is Theorem 1 good for?? CHARACTERIZATION IN TERMS OF SENSING FUNCTIONS CAN BE USEFUL

Helpful servers ENVIRONMEN T “ S IS HELPFUL” IF THERE EXISTS SOME USER STRATEGY THAT RELIABLY SUCCEEDS AT G KEY DEF. #4…

SGSG

S G -Universal user for G ENVIRONMEN T SGSG N O C OMMON K NOWLEDGE N ECESSARY !

Theorem 3. If there is an efficient S -Universal user for a goal, then there is an efficiently computable S -safe and S -viable sensing function for that goal. THE FUNCTION THAT TELLS A UNIVERSAL USER WHEN TO HALT IS A SAFE & VIABLE SENSING FUNCTION

Main Theorem. There is an efficient S -Universal user for a goal if and only if there is an efficiently computable S -safe and S -viable sensing function for the goal. MORAL: SAFE & VIABLE SENSING FUNCTIONS ARE PRECISELY THE FUNCTIONS THAT TELL UNIVERSAL USERS WHEN TO HALT!

Theorem 4. If a sensing function is S G -safe for a goal G, then it is safe for G with all servers, even malicious and unhelpful ones. CAN CONSTRUCT A HELPFUL SERVER THAT BREAKS SAFETY WHENEVER SOME ADVERSARY CAN

SGSG SGSG Proof sketch: Theorem 4 ENVIRONMEN T I CAN STOP! NOT S G -SAFE FOR G

RECAP: 1. Sensing is necessary and sufficient 2. Sensing with helpful servers must also be safe with all servers We’ll see a more concrete interpretation of these theorems next…

I.Model of communication II.Theory of finite communication III.Example: computation IV.Model for infinite communication Outline

Goal of computation (function f) ENVIRONMEN T x x f(x) R = “user message = f(x)?”

For which problems can solutions be communicated without common knowledge?

S Competitive Proof Systems (Bellare-Goldwasser ‘94) “x  S” SOUNDNE SS (STANDAR D) PROVE IT! YOU AREN’T FOOLING ANYONE! COMPLETENESS (“COMPETITIVE PROVER”) WELL, I’M CONVINCED! EFFICIENT, GIVEN ORACLE FOR S

Theorem 5. Let G be the goal of deciding membership in a set S. Then there is a S G -universal user for G iff there are competitive proof systems for both S and S c. Corollary. If there is a S G -universal user for G then S is in PSPACE.

ENVIRONMEN T S Theorem 5: obtaining a competitive proof system from a universal user SGSG SGSG x x S(x) “x  S” NOT FOOLED: THEOREMS 3&4 TIME’S UP…

Theorem 5: obtaining a universal user from a competitive proof system S “x  S” x x HELPFUL SERVER I WON’T BE FOOLED!

Computational problems with universal users Any PSPACE-complete problem [Shamir’92] Any #P-complete problem [LFKN’92] Graph Isomorphism [GMW’91] Total functions in NP (solvable by Levin’s universal search algorithm [Levin’73]) – Integer Factoring – Discrete Logarithm – many more…

I.Model of communication II.Theory of finite communication III.Example: computation IV.Model for infinite communication Outline

REPEATING FINITE COMMUNICATION STRATEGY: PROBABILITY p OF FAILURE EACH SESSION… Multi-session goals EN V SESSION 1 … SESSION 2 SESSION 3 INFINITE SESSION STRATEGY: ZERO ERRORS AFTER FINITE NUMBER OF ROUNDS

Sensing for infinite goals SESSION 1 … SESSION 2 SESSION 3 EN V I’D BETTER TRY SOMETHING ELSE!! SAFETY: ERRORS DETECTED WITHIN FINITE # OF ROUNDS VIABILITY: FAILURES CEASE WITHIN FINITE # OF ROUNDS FOR AN APPROPRIATE COMMUNICATION STRATEGY

This weaker version of sensing suffices to construct universal users for infinite goals. But is it necessary??

An impossible finite goal ENVIRONMEN T I WONDER IF IT PRINTED… RECALL: WE SHOULD STOP IN FINITE TIME

A possible infinite goal ENVIRONMEN T PASSWORD FOUND IN FINITE # OF ROUNDS MORAL: FEEDBACK IS UNNECESSARY!

We saw a model for capturing problems of misunderstanding in communications systems. We also saw some limits of “strong” solutions to this problem.

THERE EXISTS SOME USER STRATEGY THAT RELIABLY SUCCEEDS AT G 1.Goal of Communication 1.Helpful server 2.Universal user 3.Sensing function Key Concepts G = (ENV,R:  {0,1}) environment internal state FOR EVERY SERVER S IN S AND EVERY INITIAL STATE OF S AND ENV, THE USER ACHIEVES G V : user’s view  {0,1} SAFETY: ERRORS DETECTED WITHIN FINITE # OF ROUNDS SAFETY: V = 1  R = 1 VIABILITY: FAILURES CEASE WITHIN FINITE # OF ROUNDS FOR AN APPROPRIATE COMMUNICATION STRATEGY VIABILITY: THERE EXISTS SOME USER STRATEGY THAT RELIABLY OBTAINS V = 1

“Meaning” is relevant I DON’T THINK SO. RIDICULOUS! I ONLY NEED MY PRINTER TO RECEIVE THE SAME BITS I SENT, RIGHT?? IF ONLY, BOB…

Choose your own counterexample Map is infinite Printer is black-box Different messages may have same effect Verifiable? NOTE: NOT A “REAL” PROBLEM!

Password-protected servers ENVIRONMEN T 11110

PW ( )

Theorem 2. A PW( S ) -Universal user for a goal that requires the server to act must run for Ω(2 l ) rounds with servers with passwords of length l. IT TAKES ≈ 2 l ROUNDS TO SEND ALL 2 l PASSWORDS OF LENGTH l ! NOTE: QUALITATIVELY OPTIMAL IN TERMS OF PROGRAM LENGTHS!

FINITE vs. INFINITE Strong short-term guarantee Strong sensing necessary NO short term guarantee Strong long-term guarantee Sensing seems unnecessary

Open problem Find an “interesting” class of servers for which a universal user can be more efficient than a trial-and-error search. IDEALLY, “BOUNDED-OPTIMAL” SEARCH…

1.Goal of Communication 1.Helpful server 2.Universal user 3.Sensing function