{"@context":"https:\/\/schema.org\/","@type":"ScholarlyArticle","@id":"#article8442","name":"Tight Bounds for Communication-Assisted Agreement Distillation","abstract":"Suppose Alice holds a uniformly random string X in {0,1}^N and Bob holds a noisy version Y of X where each bit of X is flipped independently with probability epsilon in [0,1\/2]. Alice and Bob would like to extract a common random string of min-entropy at least k. In this work, we establish the communication versus success probability trade-off for this problem by giving a protocol and a matching lower bound (under the restriction that the string to be agreed upon is determined by Alice's input X). Specifically, we prove that in order for Alice and Bob to agree on a common string with probability 2^{-gamma k} (gamma k >= 1), the optimal communication (up to o(k) terms, and achievable for large N) is precisely (C *(1-gamma) - 2 * sqrt{ C * (1-C) gamma}) * k, where C := 4 * epsilon * (1-epsilon). In particular, the optimal communication to achieve Omega(1) agreement probability approaches 4 * epsilon * (1-epsilon) * k.\r\n\r\nWe also consider the case when Y is the output of the binary erasure channel on X, where each bit of Y equals the corresponding bit of X with probability 1-epsilon and is otherwise erased (that is, replaced by a \"?\"). In this case, the communication required becomes (epsilon * (1-gamma) - 2 * sqrt{ epsilon * (1-epsilon) * gamma}) * k. In particular, the optimal communication to achieve Omega(1) agreement probability approaches epsilon * k, and with no communication the optimal agreement probability approaches 2^{- (1-sqrt{1-epsilon})\/(1+sqrt{1-epsilon}) * k}.\r\n\r\nOur protocols are based on covering codes and extend the approach of (Bogdanov and Mossel, 2011) for the zero-communication case. Our lower bounds rely on hypercontractive inequalities. For the model of bit-flips, our argument extends the approach of (Bogdanov and Mossel, 2011) by allowing communication; for the erasure model, to the best of our knowledge the needed hypercontractivity statement was not studied before, and it was established (given our application) by (Nair and Wang 2015). We also obtain information complexity lower bounds for these tasks, and together with our protocol, they shed light on the recently popular \"most informative Boolean function\" conjecture of Courtade and Kumar.","keywords":["communication complexity","covering codes","hypercontractivity","information theory","lower bounds","pseudorandomness"],"author":[{"@type":"Person","name":"Guruswami, Venkatesan","givenName":"Venkatesan","familyName":"Guruswami"},{"@type":"Person","name":"Radhakrishnan, Jaikumar","givenName":"Jaikumar","familyName":"Radhakrishnan"}],"position":6,"pageStart":"6:1","pageEnd":"6:17","dateCreated":"2016-05-19","datePublished":"2016-05-19","isAccessibleForFree":true,"license":"https:\/\/creativecommons.org\/licenses\/by\/3.0\/legalcode","copyrightHolder":[{"@type":"Person","name":"Guruswami, Venkatesan","givenName":"Venkatesan","familyName":"Guruswami"},{"@type":"Person","name":"Radhakrishnan, Jaikumar","givenName":"Jaikumar","familyName":"Radhakrishnan"}],"copyrightYear":"2016","accessMode":"textual","accessModeSufficient":"textual","creativeWorkStatus":"Published","inLanguage":"en-US","sameAs":"https:\/\/doi.org\/10.4230\/LIPIcs.CCC.2016.6","publisher":"Schloss Dagstuhl \u2013 Leibniz-Zentrum f\u00fcr Informatik","citation":["http:\/\/dx.doi.org\/10.1109\/Allerton.2013.6736499","http:\/\/arxiv.org\/abs\/1304.6133","http:\/\/dx.doi.org\/10.1109\/ISIT.2014.6875389","http:\/\/dx.doi.org\/10.1145\/2688073.2688099","http:\/\/www.johndcook.com\/normalbounds.pdf","http:\/\/dx.doi.org\/10.1109\/TIT.2014.2326877","http:\/\/dx.doi.org\/10.1109\/18.669153","http:\/\/arxiv.org\/abs\/1506.03167","http:\/\/dx.doi.org\/10.1002\/rsa.20062","http:\/\/www.cambridge.org\/de\/academic\/subjects\/computer-science\/algorithmics-complexity-computer-algebra-and-computational-g\/analysis-boolean-functions","http:\/\/eccc.hpi-web.de\/report\/2015\/084","http:\/\/dx.doi.org\/10.1109\/TIT.1973.1055107","http:\/\/dx.doi.org\/10.1016\/j.tcs.2007.03.007"],"isPartOf":{"@type":"PublicationVolume","@id":"#volume6253","volumeNumber":50,"name":"31st Conference on Computational Complexity (CCC 2016)","dateCreated":"2016-05-19","datePublished":"2016-05-19","editor":{"@type":"Person","name":"Raz, Ran","givenName":"Ran","familyName":"Raz"},"isAccessibleForFree":true,"publisher":"Schloss Dagstuhl \u2013 Leibniz-Zentrum f\u00fcr Informatik","hasPart":"#article8442","isPartOf":{"@type":"Periodical","@id":"#series116","name":"Leibniz International Proceedings in Informatics","issn":"1868-8969","isAccessibleForFree":true,"publisher":"Schloss Dagstuhl \u2013 Leibniz-Zentrum f\u00fcr Informatik","hasPart":"#volume6253"}}}