Fundamental Limits of Distributed Encoding Nastaran Abadi Khooshemehr Mohammad Ali Maddah-Ali Sharif University of Technology International Symposium on Information Theory (ISIT) 2020 June 2020
Classical Coding Source Channel Hamming approach Shannon approach Adversarial errors Probabilistic errors 2
Some fundamental lim limit its on the parameters of codes Singleton bound If ๐ต ๐ (๐, ๐) is the maximum number of possible codewords in a ๐ -ary block code of length ๐ and minimum Gilbert โ Varshamov bound distance ๐ , then ๐ต ๐ ๐, ๐ โค ๐ ๐โ๐+1 . Hamming approach If ๐ต ๐ (๐, ๐) is the maximum number of Adversarial errors possible codewords in a ๐ -ary block code of length ๐ and minimum distance ๐ , then ๐ ๐ ๐ต ๐ ๐, ๐ โฅ ๐โ1 ๐ . ๐โ1 ๐ ฯ ๐=0 ๐ Griesmer bound If ๐(๐, ๐) is the minimum length of a binary code of dimension ๐ and and minimum ๐ ๐โ1 distance ๐ , then ๐ ๐, ๐ โฅ ฯ ๐=0 2 ๐ . and many more โฆ 3
Letโs focus on the 4
A closer look at encoder Source Channel In some applications, the encoder can be distributed. 5
Example of applications with distributed data sources IoT Blockchain Shard 1 Shard 2 Shard 3 โฎ In these systems, the encoding is distributed as well as the data production. 6
Distributed encoding Encoder Source node 1 Source node 2 Source node 3 7 distributed source nodes
Distributed encoding Source node 1 Decoder connects to some encoding nodes. Source Decoder node 2 Source node 3 8
Distributed encoding with adversaries Source node 1 Source node 2 Source node 3 9
Just one adversarial source node can undermine the system. Source node 1 More variables than equations Source node 2 Impossible to decode Source node 3 10
We study distributed encoding system, where some source nodes are controlled by an adversary. An adversarial node sends up to a finite number of different messages to the encoding nodes. We characterize the fundamental limit of this system. 11
Why do we assume an upper limit for the number of adversarial messages? The adversary cannot inject too many different messages into the system. There are methods to restrain the adversaries in distributed systems. 12
Objective in an adversarial distributed encoding system Decoding the messages of the honest nodes correctly. We do not care about the messages of the adversaries in decoding! 13
Distributed encoding system with adversaries No information about and . Source No information about the adversaries node 1 and their behavior. Source Decoder node 2 We need the decoder to decode the messages of the honest nodes correctly. Source node 3 We donโt care about the messages of adversaries. 14
System Parameters ๐ = 5 # of encoding nodes ๐ฟ = 3 # of source nodes ๐ณ : the number of source nodes ๐พ = 1 # of adversaries ๐ถ : the number of encoding nodes ๐ค = 3 # of adversarial messages ๐ธ : the number of adversaries ๐ : the maximum number of the messages of one adversarial source node ๐ : the number of encoding nodes that decoder needs to connect to. 15
The problem What is the fundamental limit of ๐ข in an (๐, ๐ฟ, ๐พ, ๐ค) distributed encoding system? (Informally, at least how many encoding nodes does the decoder need?) ๐ข โ : fundamental limit of ๐ข 16
Fundamental limit of ๐ข Theorem In an ๐, ๐ฟ, ๐พ, ๐ค distributed encoding system, โข if ๐ โฅ ๐ฟ + ๐พ ๐ค โ 1 + 1 ๐ข โ = ๐ฟ + ๐พ ๐ค โ 1 + 1 โข If ๐ฟ โค ๐ โค ๐ฟ + ๐พ ๐ค โ 1 ๐ข โ = ๐ Recall 17
Proof Achievability There is a coding scheme where โข the decoder can connect to any ๐ข โ encoding nodes, โข and generate an estimate for the input messages where the messages of the honest nodes are correctly decoded. For achievability, we need a code, decoding process, and correctness proof. Converse There is no coding scheme in which โข the decoder connects to less than ๐ข โ encoding nodes, โข and estimates the messages of the honest nodes correctly. 18
Achievability-code We use this nonlinear code to achieve ๐ข โ . nice structure ๐ฟ ๐ฆ ๐1 โฆ ๐ฆ ๐๐ฟ ๐ ๐ ๐ฆ ๐1 , โฆ , ๐ฆ ๐๐ฟ = เท ๐ฝ ๐๐ , 1 โค ๐ โค ๐ ๐ฆ ๐๐ ๐=1 ๐ฝ ๐1 , โฆ , ๐ฝ ๐๐ฟ : chosen independently and uniformly at random from the field Using nonlinear code โข Hard for the adversary to evaluate the contribution of its messages in the encoded symbols โข Hard for the adversary to cause confusion in the decoder 19 โข Having a set of nonlinear equations with possibly many solutions
Achievability-code ๐ฟ ๐ฆ ๐1 โฆ ๐ฆ ๐๐ฟ ๐ข โ = ๐ฟ + ๐พ ๐ค โ 1 + 1 ๐ ๐ ๐ฆ ๐1 , โฆ , ๐ฆ ๐๐ฟ = เท ๐ฝ ๐๐ , 1 โค ๐ โค ๐ ๐ฆ ๐๐ ๐=1 ๐ฟ โ ๐พ + ๐พ๐ค is the number of the variables in the system. With connecting to just one more encoding node and using the equation of that node, decoder can be successful. 20
Achievability-decoding Decoder considers every possible scenario and finds feasible solutions. 21
Achievability- correctness We prove every feasible solution satisfies correctness. We consider a partitioning for the encoding nodes. all options for the messages of source nodes We form a set of nonlinear equations. In some steps, we transform it to another set of feasible and undesirable solutions nonlinear equations. We use Bezout theorem to bound the number of the feasible and undesirable solutions. 22
Converse For any code, if the decoder connects to less than ๐ข โ nodes, there is a way that adversary can mislead the decoder. The decoder does not know the adversaries and their behavior. Decoder would be confused between two contradicting feasible solutions. 23
Could we achieve ๐ข โ with a linear code? 24
Fundamental limit of ๐ข - linear regime Theorem (linear code) In an ๐, ๐ฟ, ๐พ, ๐ค distributed encoding system where ๐ 1 , โฆ , ๐ ๐ are linear functions, โข if ๐ โฅ ๐ฟ + 2๐พ ๐ค โ 1 โ ๐ข linear = ๐ฟ + 2๐พ ๐ค โ 1 โข If ๐ฟ โค ๐ โค ๐ฟ + 2๐พ ๐ค โ 1 โ 1 โ ๐ข linear = ๐ Theorem (general code) In an ๐, ๐ฟ, ๐พ, ๐ค distributed encoding system, Linear code is not good enough! โข if ๐ โฅ ๐ฟ + ๐พ ๐ค โ 1 + 1 ๐ข โ = ๐ฟ + ๐พ ๐ค โ 1 + 1 โข If ๐ฟ โค ๐ โค ๐ฟ + ๐พ ๐ค โ 1 ๐ข โ = ๐ 25
Conclusion โข We introduced the problem of distributed encoding. โข We assumed that some of the source nodes are adversaries and send inconsistent messages to the encoding nodes. โข We characterized the fundamental limit of the distributed encoding system. โข We established matching achievability and converse. โข We introduced nonlinear coding in order to achieve the fundamental limit. โข There are many more problems to solve โข How to optimize the decoding complexity? โข What if some of encoding nodes are adversaries as well? โข What is the fundamental limit if encoding nodes use a particular coding? โข โฆ 26
Thank you 27
Recommend
More recommend