Paper 2009/347

An Efficient Concurrent Repetition Theorem

Douglas Wikström

Abstract

Håstad et al. (2008) prove, using Raz's lemma (STOC '95) thefirst efficient parallel repetition theorem for protocols with anon-constant number of rounds, for a natural generalization ofpublic-coin protocols. They show that a parallel prover thatconvinces a fraction $1-\gamma$ of the embedded verifiers of a$\reps$-wise repeated $\exchanges$-message verifier can be turnedinto a prover with error probability$1-\gamma-O(\exchanges\sqrt{-\logg{\epsilon}/\reps})$. This improvesprevious results of Impagliazzo et al. (Crypto 2007) and Pass andVenkitasubramaniam (STOC 2007) that studies the constant round case. We prove a generalization of Raz's Lemma to random processes thatallows us to improve the analysis of the reduction of Håstad etal. in the public-coin case to$1-\gamma-O(\sqrt{-\logg{\epsilon}/\reps})$, i.e., we remove thedependence on the number rounds completely, and thus the restrictionto settings where $\reps>\exchanges^2$. An important implication of the strengthened parallel repetitiontheorem is the first efficient \emph{concurrent} repetition theoremfor protocols with a non-constant number of rounds. In concurrentrepetition, the verifiers execute completely independently and onlyreport their final decision, i.e., the prover chooses arbitrarily inwhich order it interacts with the individual verifiers. This shouldbe contrasted with parallel repetition where the verifiers aresynchronized in each round.

Note: This is a preliminary version. All comments are most welcome! The cited manuscript of Hastad et al. (2008) should be posted shortly.

Metadata
Available format(s)
PDF
Category
Foundations
Publication info
Published elsewhere. Unknown where it was published
Keywords
parallel repetition
Contact author(s)
dog @ csc kth se
History
2009-07-18: received
Short URL
https://ia.cr/2009/347
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2009/347,
      author = {Douglas Wikström},
      title = {An Efficient Concurrent Repetition Theorem},
      howpublished = {Cryptology {ePrint} Archive, Paper 2009/347},
      year = {2009},
      url = {https://eprint.iacr.org/2009/347}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.