Universal Communication Brendan Juba (MIT) With: Madhu Sudan (MIT)

Slides:



Advertisements
Similar presentations
Completeness and Expressiveness
Advertisements

Foundations of Cryptography Lecture 3 Lecturer: Moni Naor.
Foundations of Cryptography Lecture 2: One-way functions are essential for identification. Amplification: from weak to strong one-way function Lecturer:
Universal Semantic Communication Brendan Juba (Harvard and MIT) with Madhu Sudan (MSR and MIT) & Oded Goldreich (Weizmann)
Quantum Information and the PCP Theorem Ran Raz Weizmann Institute.
1 Identity-Based Zero-Knowledge Jonathan Katz Rafail Ostrovsky Michael Rabin U. Maryland U.C.L.A. Harvard U.
Semantic Communication Madhu Sudan (based on joint work with Brendan Juba (MIT); and upcoming work with Oded Goldreich (Weizmann) & J. )
Gillat Kol joint work with Ran Raz Competing Provers Protocols for Circuit Evaluation.
Complexity class NP Is the class of languages that can be verified by a polynomial-time algorithm. L = { x in {0,1}* | there exists a certificate y with.
Foundations of Cryptography Lecture 5 Lecturer: Moni Naor.
Dana Moshkovitz. Back to NP L  NP iff members have short, efficiently checkable, certificates of membership. Is  satisfiable?  x 1 = truex 11 = true.
Foundations of Cryptography Lecture 4 Lecturer: Moni Naor.
Derandomized parallel repetition theorems for free games Ronen Shaltiel, University of Haifa.
1 Vipul Goyal Abhishek Jain Rafail Ostrovsky Silas Richelson Ivan Visconti Microsoft Research India MIT and BU UCLA University of Salerno, Italy Constant.
Nathan Brunelle Department of Computer Science University of Virginia Theory of Computation CS3102 – Spring 2014 A tale.
1 Undecidability Andreas Klappenecker [based on slides by Prof. Welch]
Complexity 26-1 Complexity Andrei Bulatov Interactive Proofs.
Complexity 18-1 Complexity Andrei Bulatov Probabilistic Algorithms.
Computability and Complexity 13-1 Computability and Complexity Andrei Bulatov The Class NP.
1 Introduction to Computability Theory Lecture15: Reductions Prof. Amos Israeli.
1 Introduction to Computability Theory Lecture12: Reductions Prof. Amos Israeli.
CPSC 411, Fall 2008: Set 12 1 CPSC 411 Design and Analysis of Algorithms Set 12: Undecidability Prof. Jennifer Welch Fall 2008.
1 Undecidability Andreas Klappenecker [based on slides by Prof. Welch]
Derandomization: New Results and Applications Emanuele Viola Harvard University March 2006.
1 Lecture 7 Halting Problem –Fundamental program behavior problem –A specific unsolvable problem –Diagonalization technique revisited Proof more complex.
The Theory of NP-Completeness
1 Lecture 7 Halting Problem –Fundamental program behavior problem –A specific unsolvable problem –Diagonalization technique revisited Proof more complex.
Introduction to Modern Cryptography, Lecture 7/6/07 Zero Knowledge and Applications.
CS151 Complexity Theory Lecture 13 May 11, CS151 Lecture 132 Outline Natural complete problems for PH and PSPACE proof systems interactive proofs.
Theory of Computing Lecture 22 MAS 714 Hartmut Klauck.
Efficient Semantic Communication via Compatible Beliefs Brendan Juba (MIT CSAIL & Harvard) with Madhu Sudan (MSR & MIT)
Foundations of Cryptography Lecture 2 Lecturer: Moni Naor.
Of 33 March 1, 2011 Semantic UCLA1 Universal Semantic Communication Madhu Sudan Microsoft Research + MIT Joint with Oded Goldreich (Weizmann)
Of 28 Probabilistically Checkable Proofs Madhu Sudan Microsoft Research June 11, 2015TIFR: Probabilistically Checkable Proofs1.
8-1Network Security Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message integrity, authentication.
Limits of Local Algorithms in Random Graphs
Universal Semantic Communication Madhu Sudan MIT CSAIL Joint work with Brendan Juba (MIT).
Preference elicitation Communicational Burden by Nisan, Segal, Lahaie and Parkes October 27th, 2004 Jella Pfeiffer.
CS151 Complexity Theory Lecture 13 May 11, Outline proof systems interactive proofs and their power Arthur-Merlin games.
Presented by: Suparita Parakarn Kinzang Wangdi Research Report Presentation Computer Network Security.
Introduction to Quantum Key Distribution
Communication vs. Computation S Venkatesh Univ. Victoria Presentation by Piotr Indyk (MIT) Kobbi Nissim Microsoft SVC Prahladh Harsha MIT Joe Kilian NEC.
Interactive proof systems Section 10.4 Giorgi Japaridze Theory of Computability.
Umans Complexity Theory Lectures Lecture 1a: Problems and Languages.
4/17/2008Semantic Communication1 Universal Semantic Communication Madhu Sudan MIT CSAIL Joint work with Brendan Juba (MIT CSAIL).
Probabilistic verification Mario Szegedy, Rutgers www/cs.rutgers.edu/~szegedy/07540 Lecture 1.
10/14/2008Semantic Communication1 Universal Semantic Communication Madhu Sudan MIT CSAIL Joint work with Brendan Juba (MIT CSAIL).
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Universal Semantic Communication Madhu Sudan MIT CSAIL Joint work with Brendan Juba (MIT CSAIL).
Complexity 24-1 Complexity Andrei Bulatov Interactive Proofs.
1 Undecidability Andreas Klappenecker [based on slides by Prof. Welch]
Of 17 Limits of Local Algorithms in Random Graphs Madhu Sudan MSR Joint work with David Gamarnik (MIT) 7/11/2013Local Algorithms on Random Graphs1.
Complexity 27-1 Complexity Andrei Bulatov Interactive Proofs (continued)
Theory of Computational Complexity Probability and Computing Chapter Hikaru Inada Iwama and Ito lab M1.
Universal Semantic Communication
Probabilistic Algorithms
HIERARCHY THEOREMS Hu Rui Prof. Takahashi laboratory
Universal Semantic Communication
Universal Semantic Communication
NP-Completeness Yin Tat Lee
CSCE 411 Design and Analysis of Algorithms
How to Delegate Computations: The Power of No-Signaling Proofs
Uncertain Compression
NP-completeness The Chinese University of Hong Kong Fall 2008
Imperfectly Shared Randomness
Universal Semantic Communication
Universal Semantic Communication
Universal Semantic Communication
Universal Semantic Communication
Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Lecture 17 (2005) Richard Cleve DC 3524
Presentation transcript:

Universal Communication Brendan Juba (MIT) With: Madhu Sudan (MIT)

Setting WHAT IS BOB GAINING FROM THIS INTERACTION??

WHY WOULD YOU TALK TO AN ALIEN? TO SEE IF THEY ARE INTELLIGENT? TO OBTAIN WISDOM? TO ASK THEM TO STOP BOMBARDING US WITH DANGEROUS RADIATION??

Motivation WHAT CAN BOB LEARN FROM ALICE?

Setting Fix a set S and a string x Bob wishes to learn “x  S?” WANT: protocol that terminates with a verdict that is CORRECT (whp) Also: efficient in length of x

Outline 1.Definition: Universal protocol 2.Analysis of communicating wisdom 3.Generalizing goals

We want a theorem of the form “Here is a Bob s.t. for every alien language and every instance x, Bob efficiently learns if x  S” ???

Language??? Grammar? Terms? Strings with interpretations X STRONG ASSUMPTIONS!

Observation Some Alices are unhelpful. I COULD HELP, IF I WANTED.

Solution Require Alice be helpful in some language. x  S?xSxS

Observation Some Alices are still unhelpful. WHAT’S THE x? xSxS HELLO?? I’M NOT TALKING TO YOU ANYMORE.

Revision Require that some B’ can efficiently decide “x  S?” with Alice’s assistance, independent of prior message history Henceforth, such Alices will be called S-helpful

Definition: S-Universal Bob is S-Universal if  S-helpful A  polynomial p  x (of length n) whp Bob decides “x  S?” when conversing with A, within p(n) steps in expectation

Outline Definition: Universal protocol 2.Analysis of communicating wisdom 3.Generalizing goals

MAIN IDEA #1 We can efficiently enumerate and run all efficient protocols If A is S-Helpful, she helps an efficient protocol B’ that appears in the enumeration

MAIN IDEA #2 If we can get a proof of either x  S or x  S, we can guarantee correctness If S  IP, such proofs exist If S is PSPACE-complete, we can reduce proving (non)membership to other instances of S

Theorem For any PSPACE-complete S, there is a S-Universal protocol

For how large a class of sets can we exhibit a universal protocol?

Limitation 1: main observation Suppose that for some x, some malicious alien Alice can mislead Bob (whp) We can convert Alice into a “helpful” A’ who still misleads Bob: pad the useful queries Recall: a S-Universal Bob should not be misled by a S-Helpful Alice!

Limitation 1: finishing up Thus: a S-Universal Bob satisfies a strong soundness condition In PSPACE we can find the messages that maximize the probability that Bob halts quickly Since Bob is sound, his verdict on these messages decide S

First limitation If an S-Universal protocol exists, S  PSPACE

Second limitation (Assuming BPP ≠ PSPACE) For any PSPACE-complete S, if Alice helps a protocol of length l the running time of a S-Universal Bob must include a constant factor that is exponential in l

Outline Definition: Universal protocol Analysis of communicating wisdom 3.Generalizing goals

What about efficiency? Our construction obtained wisdom from an Alice who could decide PSPACE We obtain analogous results with efficient Alices: limit resources used by our interpreter Depending on resources used to verify, may only be meaningful in an online sense: “Bob converges to a non-trivial interpreter”

General setting 1.SOME interactions are successful, others are NOT. 2.We seek a protocol that tells us how to engage in successful interactions (whp)

Define: “goal” Efficiently verifiable sufficient conditions on Bob’s view of interaction E.g., effective, efficient protocols! Easy generalization of our definitions and universal protocol for the computational goal to any such goal

(technical) CONCLUSION UNIVERSAL COMMUNICATION is (only) possible for VERIFIABLE GOALS.

Practical motivation Designing protocols for individual devices. (cf. sets, pairs, etc.) Simpler, more robust networks

Practical technical challenges 1.Design suitable “goals” (think: “program checking”) 2.Find a restricted class of protocols that permits “length-efficient” setup

Thank you! Questions?