Detecting and Correcting Computationally Bounded Errors: A Simple Construction Under Minimal Assumptions

Jad Silbak, Daniel Wichs

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

We study error detection and error correction in a computationally bounded world, where errors are introduced by an arbitrary polynomial time adversarial channel. We consider codes where the encoding procedure uses random coins and define two distinct variants: (1) in randomized codes, fresh randomness is chosen during each encoding operation and is unknown a priori, while (2) in self-seeded codes, the randomness of the encoding procedure is fixed once upfront and is known to the adversary. In both cases, the randomness need not be known to the decoding procedure, and there is no trusted common setup between the encoder and decoder. The encoding and decoding algorithms are efficient and run in some fixed polynomial time, independent of the run time of the adversary. The parameters of standard codes for worst-case (inefficient) errors are limited by the Singleton bound: for rate R it is not possible to detect more than a 1 - R fraction of errors, or uniquely correct more than a (1 - R)/2 fraction of errors, and efficient codes matching this bound exist for sufficiently large alphabets. In the computationally bounded setting, we show that going beyond the Singleton bound implies one-way functions in the case of randomized codes and collision-resistant hash functions in the case of self-seeded codes. We construct randomized and self-seeded codes under these respective minimal assumptions with essentially optimal parameters over a constant-sized alphabet: Detection: the codes have a rate R ≈ 1 while detecting a ρ ≈ 1 fraction of errors. Correction: for any ρ < 1/2, the codes uniquely correct a ρ fraction of errors with rate R ≈ 1 - ρ. Codes for computationally bounded errors were studied in several prior works starting with Lipton (STACS’94), but all such works either: (a) need some trusted common setup (e.g., public-key infrastructure, common reference string) between the encoder and decoder, or (b) only handle channels whose complexity is a prior bounded below that of the code.

Original languageEnglish
Title of host publication16th Innovations in Theoretical Computer Science Conference, ITCS 2025
EditorsRaghu Meka
PublisherSchloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing
ISBN (Electronic)9783959773614
DOIs
StatePublished - 11 Feb 2025
Externally publishedYes
Event16th Innovations in Theoretical Computer Science Conference, ITCS 2025 - New York, United States
Duration: 7 Jan 202510 Jan 2025

Publication series

NameLeibniz International Proceedings in Informatics, LIPIcs
Volume325
ISSN (Print)1868-8969

Conference

Conference16th Innovations in Theoretical Computer Science Conference, ITCS 2025
Country/TerritoryUnited States
CityNew York
Period7/01/2510/01/25

Bibliographical note

Publisher Copyright:
© Jad Silbak and Daniel Wichs.

Keywords

  • Collision Resistant Hashing
  • Error Correction
  • One-Way Functions

ASJC Scopus subject areas

  • Software

Fingerprint

Dive into the research topics of 'Detecting and Correcting Computationally Bounded Errors: A Simple Construction Under Minimal Assumptions'. Together they form a unique fingerprint.

Cite this