Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

A Parallel Repetition Theorem for Any Interactive Argument

Published: 01 January 2013 Publication History

Abstract

A fundamental question in the study of protocols is characterizing the effect parallel repetition has on the soundness error. While parallel repetition reduces the soundness error in interactive proofs and in special cases of interactive arguments (e.g., three-message protocols [M. Bellare, R. Impagliazzo, and M. Naor, in Proceedings of the 37th Annual Symposium on Foundations of Computer Science, IEEE, Washington, DC, 2007, p. 374], and public-coin protocols [J. Hästad et al., Proceedings of the 7th Theory of Cryptography Conference, Zurich, Switzerland, 2010, pp. 1--18]), Bellare, Impagliazzo, and Naor gave an example of an interactive argument for which parallel repetition does not reduce the soundness error at all. We show that by slightly modifying any interactive argument, in a way that preserves its completeness and only slightly deteriorates its soundness, we get a protocol for which parallel repetition does reduce the error (at a weakly exponential rate). In this modified version, the verifier flips at the beginning of each round an $(1 - \frac1{2m},\frac1{2m})$ biased coin (i.e., 1 is tossed with probability $1/{2m}$), where $m$ is the round complexity of the (original) protocol. If the outcome is one, the verifier halts the interaction and accepts. Otherwise, it sends the same message that the original verifier would. At the end of the protocol (if reached), the verifier accepts if and only if the original verifier does.

References

[1]
L. Babai and S. Moran, Arthur-Merlin games: A randomized proof system and a hierarchy of complexity classes, J. Comput. System Sci., 36 (1988), pp. 254--276.
[2]
M. Bellare, R. Impagliazzo, and M. Naor, Does parallel repetition lower the error in computationally sound protocols?, in Proceedings of the 37th Annual Symposium on Foundations of Computer Science (FOCS), IEEE, Washington, DC, 1997, p. 374.
[3]
R. Canetti, S. Halevi, and M. Steiner, Hardness amplification of weakly verifiable puzzles, in Proceedings of the 2nd Theory of Cryptography Conference (TCC), Cambridge, MA, 2005, pp. 17--33.
[4]
K.-M. Chung and F.-H. Liu, Parallel repetition theorems for interactive arguments, in Proceedings of the 7th Theory of Cryptography Conference (TCC), Zurich, Switzerland, 2010, pp. 19--36.
[5]
I. B. Damgärd and B. Pfitzmann, Sequential iteration arguments and an efficient zero-knowledge argument for NP, in Proceedings of ICALP: Annual International Colloquium on Automata, Languages and Programming, Aalborg, Denmark, 1998, pp. 772--783.
[6]
U. Feige and J. Kilian, Two prover protocols: Low error at affordable rates, in Proceedings of the 26th Annual ACM Symposium on Theory of Computing (STOC), ACM, New York, 1994, pp. 172--183.
[7]
O. Goldreich, Modern Cryptography, Probabilistic Proofs and Pseudorandomness, Springer, New York, 1999.
[8]
I. Haitner, A parallel repetition theorem for any interactive argument, in Proceedings of the 50th Annual Symposium on Foundations of Computer Science (FOCS), IEEE, Washington, DC, 2009, pp. 241--250.
[9]
I. Haitner, O. Reingold, S. Vadhan, and H. Wee, Inaccessible entropy, in Proceedings of the 41st Annual ACM Symposium on Theory of Computing (STOC), ACM, New York, 2009, pp. 611--620.
[10]
J. Hästad, R. Pass, K. Pietrzak, and D. Wikström, An Efficient Parallel Repetition Theorem, unpublished manuscript, 2008.
[11]
J. Hästad, R. Pass, K. Pietrzak, and D. Wikström, An efficient parallel repetition theorem, in Proceedings of the 7th Theory of Cryptography Conference (TCC), Zurich, Switzerland, 2010, pp. 1--18.
[12]
T. Holenstein, Parallel repetition: Simplifications and the no-signaling case, Theory of Computing, 5 (2009), pp. 141--172.
[13]
R. Impagliazzo, R. Jaiswal, and R. Kabanets, Approximately list-decoding direct product codes and uniform hardness amplification, in Proceedings of the 46th Annual Symposium on Foundations of Computer Science (FOCS), IEEE, Washington, DC, 2006, pp. 187--196.
[14]
R. Pass and M. Venkitasubramaniam, An efficient parallel repetition theorem for Arthur-Merlin games, in Proceedings of the 39th Annual ACM Symposium on Theory of Computing (STOC), ACM, New York, 2007, pp. 411--419.
[15]
K. Pietrzak and D. Wikström, Parallel repetition of computationally sound protocols revisited, in Proceedings of the 4th Theory of Cryptography Conference (TCC), Amsterdam, The Netherlands, 2007, pp. 86--102.
[16]
R. Raz, A parallel repetition theorem, J. ACM, 27 (1998), pp. 763--803.

Cited By

View all
  • (2020)A Tight Parallel Repetition Theorem for Partially Simulatable Interactive Arguments via Smooth KL-DivergenceAdvances in Cryptology – CRYPTO 202010.1007/978-3-030-56877-1_19(544-573)Online publication date: 17-Aug-2020
  • (2019)Channels of Small Log-Ratio Leakage and Characterization of Two-Party Differentially Private ComputationTheory of Cryptography10.1007/978-3-030-36030-6_21(531-560)Online publication date: 1-Dec-2019

Recommendations

Comments

Information & Contributors

Information

Published In

cover image SIAM Journal on Computing
SIAM Journal on Computing  Volume 42, Issue 6
Special Section on the Fiftieth Annual IEEE Symposium on Foundations of Computer Science (FOCS 2009)
2013
463 pages
ISSN:0097-5397
DOI:10.1137/smjcat.42.6
Issue’s Table of Contents

Publisher

Society for Industrial and Applied Mathematics

United States

Publication History

Published: 01 January 2013

Author Tags

  1. hardness amplification
  2. interactive arguments
  3. computationally sound proofs
  4. parallel repetition

Author Tag

  1. 68Q01

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 26 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2020)A Tight Parallel Repetition Theorem for Partially Simulatable Interactive Arguments via Smooth KL-DivergenceAdvances in Cryptology – CRYPTO 202010.1007/978-3-030-56877-1_19(544-573)Online publication date: 17-Aug-2020
  • (2019)Channels of Small Log-Ratio Leakage and Characterization of Two-Party Differentially Private ComputationTheory of Cryptography10.1007/978-3-030-36030-6_21(531-560)Online publication date: 1-Dec-2019

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media