Channel Capacity for Adversaries with Computationally Bounded Observations

02/07/2022
by   Eric Ruzomberka, et al.
0

We study reliable communication over point-to-point adversarial channels in which the adversary can observe the codeword via some function that takes the n-bit codeword as input and computes an rn-bit output. We consider the scenario where the rn-bit observation is computationally bounded – the adversary is free to choose an arbitrary observation function as long as the function can be computed using a polynomial amount of computational resources. This observation-based restriction differs from conventional channel-based computational limitations, where in the later case, the resource limitation applies to the computation of the channel error. For some number r^* ∈ [0,1] and for r ∈ [0,r^*], we characterize the capacity of the above channel. For this range of r, we find that the capacity is identical to the completely obvious setting (r=0). This result can be viewed as a generalization of known results on myopic adversaries and channels with active eavesdroppers for which the observation process depends on a fixed distribution and fixed-linear structure, respectively, that cannot be chosen arbitrarily by the adversary.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/07/2021

Compound Arbitrarily Varying Channels

We propose a communication model, that we call compound arbitrarily vary...
research
05/23/2023

Adversarial Channels with O(1)-Bit Partial Feedback

We consider point-to-point communication over q-ary adversarial channels...
research
01/10/2020

Authentication Against a Myopic Adversary

We consider keyless authentication for point-to-point communication in t...
research
04/15/2021

Stochastic-Adversarial Channels : Online Adversaries With Feedback Snooping

The growing need for reliable communication over untrusted networks has ...
research
12/22/2020

The Value of Information and Efficient Switching in Channel Selection

We consider a collection of statistically identical two-state continuous...
research
09/11/2018

The ε-error Capacity of Symmetric PIR with Byzantine Adversaries

The capacity of symmetric private information retrieval with K messages,...
research
07/06/2023

On Distribution-Preserving Mitigation Strategies for Communication under Cognitive Adversaries

In wireless security, cognitive adversaries are known to inject jamming ...

Please sign up or login with your details

Forgot password? Click here to reset