2012 IEEE 53rd Annual Symposium on Foundations of Computer Science 2012
DOI: 10.1109/focs.2012.69
|View full text |Cite
|
Sign up to set email alerts
|

Formulas Resilient to Short-Circuit Errors

Abstract: We show how to efficiently convert any boolean formula F into a boolean formula E that is resilient to short-circuit errors (as introduced by Kleitman et al. [KLM94]). A gate has a short-circuit error when the value it computes is replaced by the value of one of its inputs.We guarantee that E computes the same function as F , as long as at most (1/10 − ε) of the gates on each path from the output to an input have been corrupted in E. The corruptions may be chosen adversarially, and may depend on the formula E … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

2
35
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
5
1
1

Relationship

2
5

Authors

Journals

citations
Cited by 13 publications
(37 citation statements)
references
References 25 publications
2
35
0
Order By: Relevance
“…Subsequent works of Dobrushin and Ortyukov [12] and Pippenger [31] showed how to construct fault-tolerant circuits in this model with only a logarithmic overhead in the worst case and a constant overhead in the typical case. Other models for fault-tolerant circuits, protecting against a bounded number of adversarial faults, were studied in [28,14,15,22,13,29,8,25,9].…”
Section: Overviewmentioning
confidence: 99%
“…Subsequent works of Dobrushin and Ortyukov [12] and Pippenger [31] showed how to construct fault-tolerant circuits in this model with only a logarithmic overhead in the worst case and a constant overhead in the typical case. Other models for fault-tolerant circuits, protecting against a bounded number of adversarial faults, were studied in [28,14,15,22,13,29,8,25,9].…”
Section: Overviewmentioning
confidence: 99%
“…More specifically, in each run of the circuit we allow the adversary to specify a set of tampering instructions, where each instruction is of the form: Set a wire (or a memory gate) to 0 or 1, or toggle with the value on a wire (or a memory gate). However, in contrast to [37], where the tampering rate achieved is 1/|C|, where |C| is the size of the original circuit, we allow the adversary to tamper with any 1/ poly(k)-fraction of wires and memory gates in the circuit, where k is security parameter and poly(k) is independent of the size of the original circuit. We note that the recent work of [12] gave a construction that is resilient to constant tampering rate.…”
Section: Class Of Tampering Functionsmentioning
confidence: 99%
“…There has been little work on constructing circuits resilient to adversarial faults, while guaranteeing correctness. The main works in this arena are those of Kalai et al [37], Kleitnam et al [40], and Gál and Szegedy [27]. The works of [40] and [37] consider a different model where the only type of faults allowed are short-circuiting gates.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…According to [16], their model was influenced by the work of Brody et al[7] on space-bounded complexity. Moreover, low-memory robust simulation of interactive protocols has applications in robust circuits design [19,20,24], where the details are described in [16].…”
mentioning
confidence: 99%