Proceedings of the 19th International Conference on Distributed Computing and Networking 2018
DOI: 10.1145/3154273.3154318
|View full text |Cite
|
Sign up to set email alerts
|

Sending a Message with Unknown Noise

Abstract: Alice and Bob are connected via a two-way channel, and Alice wants to send a message of L bits to Bob. An adversary ips an arbitrary but nite number of bits, T , on the channel. This adversary knows our algorithm and Alice's message, but does not know any private random bits generated by Alice or Bob, nor the bits sent over the channel, except when these bits can be predicted by knowledge of Alice's message or our algorithm. We want Bob to receive Alice's message and for both players to terminate, with error p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
4
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 34 publications
0
4
0
Order By: Relevance
“…We review some related work in these areas, but we stress that neither approach can be used in fully-defective networks: Interactive coding must assume some bound on the errors, either per channel or globally, while solutions for networks with Byzantine edges must assume a bound on the number of noisy channels. ADHS18,GI20] for the two-party case and in [ADHS20] for the multiparty case. In a work by Efrmenko, Haramaty, and Kalai [EHK20], the noise model is similar to the one we consider here in the sense that it can corrupt the content of messages but not their existence.…”
Section: Related Workmentioning
confidence: 99%
“…We review some related work in these areas, but we stress that neither approach can be used in fully-defective networks: Interactive coding must assume some bound on the errors, either per channel or globally, while solutions for networks with Byzantine edges must assume a bound on the number of noisy channels. ADHS18,GI20] for the two-party case and in [ADHS20] for the multiparty case. In a work by Efrmenko, Haramaty, and Kalai [EHK20], the noise model is similar to the one we consider here in the sense that it can corrupt the content of messages but not their existence.…”
Section: Related Workmentioning
confidence: 99%
“…Resource competitive analysis has been applied to designing algorithms for: jamming-resistant wireless communication [27,29,36]; attack-resistance on multiple access channels [8], tolerating adversarial channel noise [3,19,20], and efficiently distributing bridges for anonymity networks such as TOR [60]. See [9,28] for detailed surveys.…”
Section: Related Workmentioning
confidence: 99%
“…Such as the public key for a digital signature 3. Just the identities of the neighbors, not any other information such as the internal states of the neighbors is assumed.…”
mentioning
confidence: 99%
“…An AMD code [CDF + 08] is used to fingerprint each transmitted message, allowing the other side to detect corruptions with high probability. Aggrawal et al [ADHS18] use similar techniques to develop a robust protocol for message transfer, assuming bi-directional channel that suffers from an arbitrary (yet finite) and unknown amount of bit flips. Aggarwal et al [ADHS17] extended this setting to the multiparty case, where n parties, rather than two, perform a computation over a noisy network with an arbitrary and unknown amount of noise.…”
Section: Related Workmentioning
confidence: 99%