ALOHA 2: An Enhanced Low-Cost Hardware for Bimanual Teleoperation
Authors:
ALOHA 2 Team,
Jorge Aldaco,
Travis Armstrong,
Robert Baruch,
Jeff Bingham,
Sanky Chan,
Kenneth Draper,
Debidatta Dwibedi,
Chelsea Finn,
Pete Florence,
Spencer Goodrich,
Wayne Gramlich,
Torr Hage,
Alexander Herzog,
Jonathan Hoech,
Thinh Nguyen,
Ian Storz,
Baruch Tabanpour,
Leila Takayama,
Jonathan Tompson,
Ayzaan Wahid,
Ted Wahrburg,
Sichun Xu,
Sergey Yaroshenko,
Kevin Zakka
, et al. (1 additional authors not shown)
Abstract:
Diverse demonstration datasets have powered significant advances in robot learning, but the dexterity and scale of such data can be limited by the hardware cost, the hardware robustness, and the ease of teleoperation. We introduce ALOHA 2, an enhanced version of ALOHA that has greater performance, ergonomics, and robustness compared to the original design. To accelerate research in large-scale bim…
▽ More
Diverse demonstration datasets have powered significant advances in robot learning, but the dexterity and scale of such data can be limited by the hardware cost, the hardware robustness, and the ease of teleoperation. We introduce ALOHA 2, an enhanced version of ALOHA that has greater performance, ergonomics, and robustness compared to the original design. To accelerate research in large-scale bimanual manipulation, we open source all hardware designs of ALOHA 2 with a detailed tutorial, together with a MuJoCo model of ALOHA 2 with system identification. See the project website at aloha-2.github.io.
△ Less
Submitted 7 February, 2024;
originally announced May 2024.
Finding Collisions in Interactive Protocols -- Tight Lower Bounds on the Round and Communication Complexities of Statistically Hiding Commitments
Authors:
Iftach Haitner,
Jonathan J. Hoch,
Omer Reingold,
Gil Segev
Abstract:
We study the round and communication complexities of various cryptographic protocols. We give tight lower bounds on the round and communication complexities of any fully black-box reduction of a statistically hiding commitment scheme from one-way permutations, and from trapdoor permutations. As a corollary, we derive similar tight lower bounds for several other cryptographic protocols, such as sin…
▽ More
We study the round and communication complexities of various cryptographic protocols. We give tight lower bounds on the round and communication complexities of any fully black-box reduction of a statistically hiding commitment scheme from one-way permutations, and from trapdoor permutations. As a corollary, we derive similar tight lower bounds for several other cryptographic protocols, such as single-server private information retrieval, interactive hashing, and oblivious transfer that guarantees statistical security for one of the parties. Our techniques extend the collision-finding oracle due to Simon (EUROCRYPT '98) to the setting of interactive protocols and the reconstruction paradigm of Gennaro and Trevisan (FOCS '00).
△ Less
Submitted 4 May, 2021;
originally announced May 2021.