910,777 research outputs found

    Information complexity of the AND function in the two-Party, and multiparty settings

    Full text link
    In a recent breakthrough paper [M. Braverman, A. Garg, D. Pankratov, and O. Weinstein, From information to exact communication, STOC'13] Braverman et al. developed a local characterization for the zero-error information complexity in the two party model, and used it to compute the exact internal and external information complexity of the 2-bit AND function, which was then applied to determine the exact asymptotic of randomized communication complexity of the set disjointness problem. In this article, we extend their results on AND function to the multi-party number-in-hand model by proving that the generalization of their protocol has optimal internal and external information cost for certain distributions. Our proof has new components, and in particular it fixes some minor gaps in the proof of Braverman et al

    Lying About What you Know or About What you Do? (replaces CentER DP 2010-033)

    Get PDF
    We compare communication about private information to communication about actions in a one- shot 2-person public good game with private information. The informed player, who knows the exact return from contributing and whose contribution is unobserved, can send a message about the return or her contribution. Theoretically, messages can elicit the uninformed player's contribution, and allow the informed player to free-ride. The exact language used is not expected to matter. Experimentally, however, we find that free-riding depends on the language: the informed player free-rides less, and thereby lies less frequently, when she talks about her contribution than when she talks about the return. Further experimental evidence indicates that it is the promise component in messages about the contribution that leads to less free-riding and less lying.Information transmission;lying;communication;experiment

    LYING ABOUT WHAT YOU KNOW OR ABOUT WHAT YOU DO?

    Get PDF
    We compare communication about private information to communication about actions in a one-shot 2-person public good game with private information. The informed player, who knows the exact return from contributing and whose contribution is unobserved, can send a message about the return or her contribution. Theoretically, messages can elicit the uninformed player's contribution, and allow the informed player to free-ride. The exact language used is not expected to matter. Experimentally, however, we find that free-ride depends on the language: the informed player free-rides less-and thereby lies less frequently-when she talks about her contribution than when she talks about the return. Further experimental evidence indicates that it is the promise component in messages about the contribution that leads to less free-ride and less lying. © 2013 by the European Economic Association

    Experimental Realization of 1→21 \to 2 Asymmetric Phase-Covariant Quantum Cloning

    Get PDF
    While exact cloning of an unknown quantum state is prohibited by the linearity of quantum mechanics, approximate cloning is possible and has been used, e.g., to derive limits on the security of quantum communication protocols. In the case of asymmetric cloning, the information from the input state is distributed asymmetrically between the different output states. Here, we consider asymmetric phase-covariant cloning, where the goal is to optimally transfer the phase information from a single input qubit to different output qubits. We construct an optimal quantum cloning machine for two qubits that does not require ancilla qubits and implement it on an NMR quantum information processor.Comment: 6 pages, 5 figure

    Oblivious remote state preparation

    Get PDF
    We consider remote state preparation protocols for a set of pure states whose projectors form a basis for operators acting on the input Hilbert space. If a protocol (1) uses only forward communication and entanglement, (2) deterministically prepares an exact copy of the state, and (3) does so obliviously -- without leaking further information about the state to the receiver -- then the protocol can be modified to require from the sender only a single specimen of the state. Furthermore, the original protocol and the modified protocol use the same amount of classical communication. Thus, under the three conditions stated, remote state preparation requires at least as much classical communication as teleportation, as Lo has conjectured [PRA 62 (2000) 012313], which is twice the expected classical communication cost of some existing nonoblivious protocols

    Unreduced Dynamic Complexity: Towards the Unified Science of Intelligent Communication Networks and Software

    Get PDF
    Operation of autonomic communication networks with complicated user-oriented functions should be described as unreduced many-body interaction process. The latter gives rise to complex-dynamic behaviour including fractally structured hierarchy of chaotically changing realisations. We recall the main results of the universal science of complexity (http://cogprints.org/4471/) based on the unreduced interaction problem solution and its application to various real systems, from nanobiosystems (http://cogprints.org/4527/) and quantum devices to intelligent networks (http://cogprints.org/4114/) and emerging consciousness (http://cogprints.org/3857/). We concentrate then on applications to autonomic communication leading to fundamentally substantiated, exact science of intelligent communication and software. It aims at unification of the whole diversity of complex information system behaviour, similar to the conventional, "Newtonian" science order for sequential, regular models of system dynamics. Basic principles and first applications of the unified science of complex-dynamic communication networks and software are outlined to demonstrate its advantages and emerging practical perspectives

    A Rate-Distortion Based Secrecy System with Side Information at the Decoders

    Full text link
    A secrecy system with side information at the decoders is studied in the context of lossy source compression over a noiseless broadcast channel. The decoders have access to different side information sequences that are correlated with the source. The fidelity of the communication to the legitimate receiver is measured by a distortion metric, as is traditionally done in the Wyner-Ziv problem. The secrecy performance of the system is also evaluated under a distortion metric. An achievable rate-distortion region is derived for the general case of arbitrarily correlated side information. Exact bounds are obtained for several special cases in which the side information satisfies certain constraints. An example is considered in which the side information sequences come from a binary erasure channel and a binary symmetric channel.Comment: 8 pages. Allerton 201

    Achieving SK Capacity in the Source Model: When Must All Terminals Talk?

    Full text link
    In this paper, we address the problem of characterizing the instances of the multiterminal source model of Csisz\'ar and Narayan in which communication from all terminals is needed for establishing a secret key of maximum rate. We give an information-theoretic sufficient condition for identifying such instances. We believe that our sufficient condition is in fact an exact characterization, but we are only able to prove this in the case of the three-terminal source model. We also give a relatively simple criterion for determining whether or not our condition holds for a given multiterminal source model.Comment: A 5-page version of this paper was submitted to the 2014 IEEE International Symposium on Information Theory (ISIT 2014
    • …
    corecore