Newman’s theorem states that we can take any public-coin communication protocol and convert it into one that uses only private randomness with but a little increase in communication complexity. We consider a reversed scenario in the context of information complexity: can we take a protocol that uses private randomness and convert it into one that only uses public randomness while preserving the information revealed to each player? We prove that the answer is yes, at least for protocols that use a bounded number of rounds. As an application, we prove new direct-sum theorems through the compression of interactive communication in the bounded-round setting. To obtain this application, we prove a new one-shot variant of the Slepian–Wolf coding ...
We study internal compression of communication protocols to their internal entropy, which is the ent...
We study the randomness complexity of interactive proofs and zero-knowledge proofs. In particular, w...
We study the relationship between communication and information in 2-party communication protocols w...
Newman’s theorem states that we can take any public-coin communication protocol and convert it into ...
Newman’s theorem states that we can take any public-coin communication protocol and convert it into ...
Newman’s theorem states that we can take any public-coin communication protocol and convert it into ...
Newman’s theorem states that we can take any public-coin communication proto-col and convert it into...
Newman's theorem states that we can take any public-coin communication protocol and convert it into ...
We prove lower bounds for the direct sum problemfor two-party bounded error randomisedmultipleround ...
We introduce the new measure of Public Information Complexity (PIC), as a tool for the study of mult...
The weak interactive compression conjecture asserts that any two-party communication protocol with c...
We show how to efficiently simulate the sending of a single message M to a receiver who has partial ...
A simulation of an interactive protocol entails the use of interactive communication to produce the ...
We present several results regarding randomized oneround communication complexity. These include a c...
International audienceWe consider multiparty information-theoretic private protocols, and specifical...
We study internal compression of communication protocols to their internal entropy, which is the ent...
We study the randomness complexity of interactive proofs and zero-knowledge proofs. In particular, w...
We study the relationship between communication and information in 2-party communication protocols w...
Newman’s theorem states that we can take any public-coin communication protocol and convert it into ...
Newman’s theorem states that we can take any public-coin communication protocol and convert it into ...
Newman’s theorem states that we can take any public-coin communication protocol and convert it into ...
Newman’s theorem states that we can take any public-coin communication proto-col and convert it into...
Newman's theorem states that we can take any public-coin communication protocol and convert it into ...
We prove lower bounds for the direct sum problemfor two-party bounded error randomisedmultipleround ...
We introduce the new measure of Public Information Complexity (PIC), as a tool for the study of mult...
The weak interactive compression conjecture asserts that any two-party communication protocol with c...
We show how to efficiently simulate the sending of a single message M to a receiver who has partial ...
A simulation of an interactive protocol entails the use of interactive communication to produce the ...
We present several results regarding randomized oneround communication complexity. These include a c...
International audienceWe consider multiparty information-theoretic private protocols, and specifical...
We study internal compression of communication protocols to their internal entropy, which is the ent...
We study the randomness complexity of interactive proofs and zero-knowledge proofs. In particular, w...
We study the relationship between communication and information in 2-party communication protocols w...