Communication Complexity

Size: px
Start display at page:

Download "Communication Complexity"

Transcription

1 Communication Complexity Jie Ren Adaptive Signal Processing and Information Theory Group Nov 3 rd, 2014 Jie Ren (Drexel ASPITRG) CC Nov 3 rd, / 77

2 1 E. Kushilevitz and N. Nisan, Communication Complexity, Cambridge University Press, L. Lovasz, Communication Complexity: A Survey, in Paths, Flows, and VLSI Layout, B. H. Korte, Ed., Springer Verlag: Berlin T. Lee and A. Shraibman, Lower Bounds in Communication Complexity: A Survey, Now Publishers Inc., A. C. Yao, Some Complexity Questions Related to Distributed Computing, Proc. of 11th ACM Symposium on Theory of Computing, 1981, P. Beame and J. Lawry, Randomized versus Nondeterministic Communication Complexity, Proc. of 24th ACM Symposium on Theory of Computing, 1992, A. K. Chandra, M. L. Furst and R. J. Lipton, Multi-party Protocols, Proc. of 15th ACM Symposium on Theory of Computing, 1983, P. B. Miltersen, N. Nisan, S. Safra and A. Wigderson, On Data Structures and Asymmetric Communication Complexity, Proc. of 27th ACM Symposium on Theory of Computing, 1995, Jie Ren (Drexel ASPITRG) CC Nov 3 rd, / 77

3 Deterministic Communication Complexity Outline 1 Deterministic Communication Complexity Problem Setup Protocol Tree Combinatorial Rectangles Fooling Sets Rectangle Rank 2 Nondeterministic CC & Randomized CC Nondeterministic Communication Complexity: Motivation Nondeterministic Communication Complexity: definitions Randomized Communication Complexity Distributional Complexity and Discrepancy 3 Some Analysis Jie Ren (Drexel ASPITRG) CC Nov 3 rd, / 77

4 Deterministic Communication Complexity Problem Setup Outline 1 Deterministic Communication Complexity Problem Setup Protocol Tree Combinatorial Rectangles Fooling Sets Rectangle Rank 2 Nondeterministic CC & Randomized CC Nondeterministic Communication Complexity: Motivation Nondeterministic Communication Complexity: definitions Randomized Communication Complexity Distributional Complexity and Discrepancy 3 Some Analysis Jie Ren (Drexel ASPITRG) CC Nov 3 rd, / 77

5 Deterministic Communication Complexity Problem Setup Problem Setup Alice x X 0/1 0/1 f(x, y) Bob y Y f(x, y) {0, 1} Two party communication Each knows an input x X /y Y Let one/both sides compute a function f with no error Only care about communication cost Jie Ren (Drexel ASPITRG) CC Nov 3 rd, / 77

6 Deterministic Communication Complexity Problem Setup Problem Setup Alice x X 0/1 0/1 f(x, y) Bob y Y f(x, y) {0, 1} Sending binary messages f usually binary Deterministic protocol P: who to talk/what to send Communication cost: sum of total bits/rounds CC(P) Jie Ren (Drexel ASPITRG) CC Nov 3 rd, / 77

7 Deterministic Communication Complexity Problem Setup Deterministic Communication Complexity Alice x X 0/1 0/1 f(x, y) Bob y Y f(x, y) {0, 1} D(f ) = min P max (x,y) X Y CC(P) (1) Jie Ren (Drexel ASPITRG) CC Nov 3 rd, / 77

8 Deterministic Communication Complexity Problem Setup A Naive Upper Bound Proposition (naive upper bound): For every function f : X Y Z D(f ) log 2 X + log 2 Z (2) Jie Ren (Drexel ASPITRG) CC Nov 3 rd, / 77

9 Deterministic Communication Complexity Problem Setup A Naive Upper Bound Example: MAX of the union Alice and Bob hold subsets x, y {1,..., n} respectively, and they with to compute MAX (x, y). D(MAX ) 2 log 2 n (3) Jie Ren (Drexel ASPITRG) CC Nov 3 rd, / 77

10 Deterministic Communication Complexity Protocol Tree Outline 1 Deterministic Communication Complexity Problem Setup Protocol Tree Combinatorial Rectangles Fooling Sets Rectangle Rank 2 Nondeterministic CC & Randomized CC Nondeterministic Communication Complexity: Motivation Nondeterministic Communication Complexity: definitions Randomized Communication Complexity Distributional Complexity and Discrepancy 3 Some Analysis Jie Ren (Drexel ASPITRG) CC Nov 3 rd, / 77

11 Deterministic Communication Complexity Protocol Tree Definition: Protocol Tree Definition : A protocol P over domain X Y with range Z is a binary tree where each internal node v is labeled either by a function a v : X {0, 1} or by a function b v : Y {0, 1}, and each leaf is labeled with an element z Z. The communication cost CC(P) will be the depth of the protocol tree. Jie Ren (Drexel ASPITRG) CC Nov 3 rd, / 77

12 Deterministic Communication Complexity Protocol Tree Example: Protocol Tree a 1 (x = 1, 2) = 0 a 1 (x = 3) = 1 b 2 (y = 1, 2) = 0 b 2 (y = 3) = 1 1 b 3 (y = 1) = 1 b 3 (y = 2, 3) = a 4 (x = 1) = 0 a 4 (x = 2, 3) = 1 f(x, y) = { 1 x y 0 OTH 0 1 x {1, 2, 3} y {1, 2, 3} Jie Ren (Drexel ASPITRG) CC Nov 3 rd, / 77

13 Deterministic Communication Complexity Protocol Tree Why Binary Message? Entropy not involved - simple? No block coding (compute a single function) Worst case - always exists p = 1/2 s.t. h 2 (p) = 1 Jie Ren (Drexel ASPITRG) CC Nov 3 rd, / 77

14 Deterministic Communication Complexity Protocol Tree One Side Compute f Vs. Both Sides Compute f Equivalent setup Need one more bit if f is binary Second last round: one side must know f (x, y) Some Lower Bounds of Communication Complexity D(f ) : unknown for general f Interested in lower bounds Jie Ren (Drexel ASPITRG) CC Nov 3 rd, / 77

15 Deterministic Communication Complexity Combinatorial Rectangles Outline 1 Deterministic Communication Complexity Problem Setup Protocol Tree Combinatorial Rectangles Fooling Sets Rectangle Rank 2 Nondeterministic CC & Randomized CC Nondeterministic Communication Complexity: Motivation Nondeterministic Communication Complexity: definitions Randomized Communication Complexity Distributional Complexity and Discrepancy 3 Some Analysis Jie Ren (Drexel ASPITRG) CC Nov 3 rd, / 77

16 Deterministic Communication Complexity Combinatorial Rectangles Combinatorial Rectangles Definition: Let P be a protocol and v be a node of the protocol tree. R v is the set of inputs (x, y) that reach node v. Proposition: If L is the set of leaves of a protocol P, then {R l, l L} is a partition of X Y. Definition: A combinatorial rectangle is a subset R X Y such that R = A B for some A X and B Y. Jie Ren (Drexel ASPITRG) CC Nov 3 rd, / 77

17 Deterministic Communication Complexity Combinatorial Rectangles Proposition: R X Y is a rectangle iff (x 1, y 1 ) R & (x 2, y 2 ) R (x 1, y 2 ) R. (4) Proposition: For every protocol P and leaf l, R l is a rectangle Jie Ren (Drexel ASPITRG) CC Nov 3 rd, / 77

18 Deterministic Communication Complexity Combinatorial Rectangles a 1 (x = 1, 2) = 0 a 1 (x = 3) = 1 b 2 (y = 1, 2) = 0 b 2 (y = 3) = 1 1 b 3 (y = 1) = 1 b 3 (y = 2, 3) = 0 0 y=1 y=2 y=3 1 a 4 (x = 1) = 0 a 4 (x = 2, 3) = 1 x= x= x= Jie Ren (Drexel ASPITRG) CC Nov 3 rd, / 77

19 Deterministic Communication Complexity Combinatorial Rectangles Rectangle lower bound Definition: A subset R X Y is called f -monochromatic if f is fixed on R. Theorem 1.17 (Kushilevitz & Nisan): If any partition of X Y into f -monochromatic rectangles requires at least t rectangles, then log 2 t D(f ) (5) P partitions X Y into monochromatic rectangles Depth of its protocol tree: log 2 t Jie Ren (Drexel ASPITRG) CC Nov 3 rd, / 77

20 Deterministic Communication Complexity Combinatorial Rectangles y=1 y=2 y=3 x= x= x= D(f) log 2 5 D(f) = 3 Jie Ren (Drexel ASPITRG) CC Nov 3 rd, / 77

21 Deterministic Communication Complexity Fooling Sets Outline 1 Deterministic Communication Complexity Problem Setup Protocol Tree Combinatorial Rectangles Fooling Sets Rectangle Rank 2 Nondeterministic CC & Randomized CC Nondeterministic Communication Complexity: Motivation Nondeterministic Communication Complexity: definitions Randomized Communication Complexity Distributional Complexity and Discrepancy 3 Some Analysis Jie Ren (Drexel ASPITRG) CC Nov 3 rd, / 77

22 Deterministic Communication Complexity Fooling Sets Motivation: If we exhibit a large set of input pairs such that no two of them can be in a single monochromatic rectangle, then the number of partitions of P must be large y1 y2 x1 z? x2? z Jie Ren (Drexel ASPITRG) CC Nov 3 rd, / 77

23 Deterministic Communication Complexity Fooling Sets Definition : Let f : X Y {0, 1}. A set S X Y is called a fooling set if there exits a value z {0, 1} such that For every (x, y) S, f (x, y) = z For every two distinct pairs (x 1, y 1 ) and (x 2, y 2 ) in S, either f (x 1, y 2 ) z or f (x 2, y 1 ) z y1 y2 x1 z? x2? z Jie Ren (Drexel ASPITRG) CC Nov 3 rd, / 77

24 Deterministic Communication Complexity Fooling Sets Fooling set lower bound Theorem 1.20 (Kushilevitz & Nisan) : If f has a fooling set S of size t, then log 2 t D(f ) (6) Proof : No monochromatic rectangle contains more than one element of S Jie Ren (Drexel ASPITRG) CC Nov 3 rd, / 77

25 Deterministic Communication Complexity Fooling Sets Example: Alice and Bob each hold an n-bit integer 0 x, y < 2 n. The greater than or equal to function, GTE(x, y), is defined to be 1 iff x y. D(GT ) = n + 1 (7) y=0 y=1 y=2 y=3 x= x= x= x= Jie Ren (Drexel ASPITRG) CC Nov 3 rd, / 77

26 Deterministic Communication Complexity Fooling Sets Example: Alice and Bob each hold an n-bit integer 0 x, y < 2 n. The greater than or equal to function, GTE(x, y), is defined to be 1 iff x y. D(GT ) = n + 1 (8) y=0 y=1 y=2 y=3 x= x= x= x= Jie Ren (Drexel ASPITRG) CC Nov 3 rd, / 77

27 Deterministic Communication Complexity Rectangle Rank Outline 1 Deterministic Communication Complexity Problem Setup Protocol Tree Combinatorial Rectangles Fooling Sets Rectangle Rank 2 Nondeterministic CC & Randomized CC Nondeterministic Communication Complexity: Motivation Nondeterministic Communication Complexity: definitions Randomized Communication Complexity Distributional Complexity and Discrepancy 3 Some Analysis Jie Ren (Drexel ASPITRG) CC Nov 3 rd, / 77

28 Deterministic Communication Complexity Rectangle Rank Motivation: Give communication complexity lower bound in an algebraic way Definition: Associate with every function f : X Y {0, 1} a matrix M f of dimensions X Y. The rows/columns of M f are indexed by the elements of X /Y. Then rank(f ) is the linear rank of M f over the field of reals. y=0 y=1 y=2 y=3 x= x= x= x= Jie Ren (Drexel ASPITRG) CC Nov 3 rd, / 77

29 Deterministic Communication Complexity Rectangle Rank Rank lower bound Theorem 1.28 (Kushilevitz & Nisan): For any function f : X Y {0, 1} log 2 rank(f ) D(f ) (9) y=0 y=1 y=2 y=3 x= x= x= x= Jie Ren (Drexel ASPITRG) CC Nov 3 rd, / 77

30 Deterministic Communication Complexity Rectangle Rank Proof: Let L 1 be the set of leaves in which the output is 1. For each l L 1, { 1 if (x, y) Rl M l (x, y) = 0 otherwise (10) M f = l L 1 M l (11) and rank(m f ) l L 1 rank(m l ) L 1 L (12) Jie Ren (Drexel ASPITRG) CC Nov 3 rd, / 77

31 Deterministic Communication Complexity Rectangle Rank Rank lower bound Theorem 1.28 (Kushilevitz & Nisan): For any function f : X Y {0, 1} log 2 rank(f ) D(f ) (13) y=0 y=1 y=2 y=3 x= x= x= x= Jie Ren (Drexel ASPITRG) CC Nov 3 rd, / 77

32 Deterministic Communication Complexity Rectangle Rank Rank upper bound Proposition 2.3 (Lovasz 1990): For any function f : X Y {0, 1} D(f ) rank(f ) (14) Proof: We know that row rank = column rank = rank(f ), and we can form the row vector space with dimension rank(f ). We then claim that there are at most 2 rank(f ) distinct row vectors, the reason is because, although the coefficients for the polynomials that represent the row vectors can be real, the entries of the matrix M(f ) can only be 0 or 1. Hence we can build a protocol as follows: Alice merge the repeated rows of M(f ) on the table to have M (f ), and then sends the index of row in M (f ) that contains x. Bob compute f (x, y) based on what he received. Jie Ren (Drexel ASPITRG) CC Nov 3 rd, / 77

33 Deterministic Communication Complexity Rectangle Rank Summary Concept: protocol tree, combinatorial rectangles, fooling sets, rank Naive upper bound: log 2 X + 1 Rectangle lower bound: log 2 t r Fooling set lower bound: log 2 t f Rank lower bound: log 2 rank(f ) Rank upper bound: rank(f ) Jie Ren (Drexel ASPITRG) CC Nov 3 rd, / 77

34 Nondeterministic CC & Randomized CC Outline 1 Deterministic Communication Complexity Problem Setup Protocol Tree Combinatorial Rectangles Fooling Sets Rectangle Rank 2 Nondeterministic CC & Randomized CC Nondeterministic Communication Complexity: Motivation Nondeterministic Communication Complexity: definitions Randomized Communication Complexity Distributional Complexity and Discrepancy 3 Some Analysis Jie Ren (Drexel ASPITRG) CC Nov 3 rd, / 77

35 Nondeterministic CC & Randomized CC Nondeterministic Communication Complexity: Motivation Outline 1 Deterministic Communication Complexity Problem Setup Protocol Tree Combinatorial Rectangles Fooling Sets Rectangle Rank 2 Nondeterministic CC & Randomized CC Nondeterministic Communication Complexity: Motivation Nondeterministic Communication Complexity: definitions Randomized Communication Complexity Distributional Complexity and Discrepancy 3 Some Analysis Jie Ren (Drexel ASPITRG) CC Nov 3 rd, / 77

36 Nondeterministic CC & Randomized CC Nondeterministic Communication Complexity: Motivation Motivation How good are the rectangle lower bounds? Relaxing the need to partition by allowing covering of the same space y=0 y=1 y=2 y=3 y=0 y=1 y=2 y=3 x= x= x= x= x= x= x= x= Jie Ren (Drexel ASPITRG) CC Nov 3 rd, / 77

37 Nondeterministic CC & Randomized CC Nondeterministic Communication Complexity: Motivation Motivation: Alice has a n-bit string x {0, 1} n, Bob has a n-bit string y {0, 1} n, either side wants NEQ(x, y). D(NEQ) = n (15) Now assume a third person knows everything: x,y and NEQ(x, y) and want to convince Alice and Bob, Alice and Bob need to check the correctness Sends the index of the first bit differs Jie Ren (Drexel ASPITRG) CC Nov 3 rd, / 77

38 Nondeterministic CC & Randomized CC Nondeterministic Communication Complexity: Motivation Setup: A prover, who sees both x and y, is trying to convince Alice and Bob that f (x, y) = 1. If f (x, y) 1, then Alice and Bob must be able to detect the proof is wrong. f (x, y) = 1 z P(x, y, z) = 1 (16) f (x, y) = 0 z P(x, y, z) = 0 (17) Two-stage nondeterministic protocol P N 1 Alice and Bob receive a message z from the third person. 2 Alice and Bob run a deterministic protocol P D,z based on z. The interesting cost in this protocol is the maximum length of z plus the number of bits exchanged over all x, y. Jie Ren (Drexel ASPITRG) CC Nov 3 rd, / 77

39 Nondeterministic CC & Randomized CC Nondeterministic Communication Complexity: Motivation Alternative Setup: Let f : X Y {0, 1} be a function. Let L = {(x, y) : f (x, y) = 1}. A successful nondeterministic protocol for f consists of functions f A : X {0, 1} k {0, 1} and f B : Y {0, 1} k {0, 1} such that 1 (x, y) L, z {0, 1} k s.t. f A (x, z) f B (y, z) = 1 2 (x, y) L, z {0, 1} k, f A (x, z) f B (y, z) = 0 One stage nondeterministic protocol 1 Alice and Bob receive a message z and compute f (x, y) successfully. The interesting cost in this protocol is the length of z only. Jie Ren (Drexel ASPITRG) CC Nov 3 rd, / 77

40 Nondeterministic CC & Randomized CC Nondeterministic Communication Complexity: Motivation Two-stage One-stage: Given a two-stage nondeterministic protocol with k bits first stage cost and d bits second stage cost, we can always build a one-stage nondeterministic protocol by adding the d bits deterministic communication to the witness z with each party accepting if the message agrees with what Alice and Bob would have said in the protocol. Jie Ren (Drexel ASPITRG) CC Nov 3 rd, / 77

41 Nondeterministic CC & Randomized CC Nondeterministic Communication Complexity: Motivation In the language of Rectangles : A prover, who sees both x and y, is trying to convince Alice and Bob that f (x, y) = 1 by broadcasting a 1-monochromatic rectangle that cover (x, y). By Nondeterministic we mean: this 1-monochromatic rectangle may not be unique y=0 y=1 y=2 y=3 x= x= x= x= Jie Ren (Drexel ASPITRG) CC Nov 3 rd, / 77

42 Nondeterministic CC & Randomized CC Nondeterministic Communication Complexity: definitions Outline 1 Deterministic Communication Complexity Problem Setup Protocol Tree Combinatorial Rectangles Fooling Sets Rectangle Rank 2 Nondeterministic CC & Randomized CC Nondeterministic Communication Complexity: Motivation Nondeterministic Communication Complexity: definitions Randomized Communication Complexity Distributional Complexity and Discrepancy 3 Some Analysis Jie Ren (Drexel ASPITRG) CC Nov 3 rd, / 77

43 Nondeterministic CC & Randomized CC Nondeterministic Communication Complexity: definitions Definitions: Let f : X Y {0, 1} be a binary function. C P (f ): the smallest number of leaves in a protocol P C D (f ): the smallest number of monochromatic rectangles that partition X Y C(f ): the smallest number of monochromatic rectangles needed to cover X Y C z (f ): the smallest number of monochromatic rectangles needed to cover the z-inputs Jie Ren (Drexel ASPITRG) CC Nov 3 rd, / 77

44 Nondeterministic CC & Randomized CC Nondeterministic Communication Complexity: definitions Proposition 2.2 (Kushilevitz & Nisan): For all f : X Y {0, 1}, ( log 2 C 0 (f ) + C 1 (f ) ) log 2 C D (f ) log 2 C P (f ) D(f ) (18) Theorem 29 (Lee & Shraibman): Let f : X Y {0, 1} be a function, N 1 (f ) = log 2 C 1 (f ) (19) Jie Ren (Drexel ASPITRG) CC Nov 3 rd, / 77

45 Nondeterministic CC & Randomized CC Nondeterministic Communication Complexity: definitions Proof: N 1 (f ) log 2 C 1 (f ) : Let {R l } be a cover. If f (x, y) = 1, the players receive the index l that (x, y) R l N 1 (f ) log 2 C 1 (f ) : Let k = N 1 (f ), and let f A : X {0, 1} k {0, 1}, f B : Y {0, 1} k {0, 1} be functions in the one-stage nondeterministic protocol. Define R z = {(x, y) : f A (x, z) f B (y, z) = 1}, R z is a rectangle. We claim {R z, z {0, 1} k } is a cover of the 1s. This is because by the definition of nondeterministic protocol: (x, y) pairs that f (x, y) = 1, there must exists some z s.t. (x, y) R z. (x, y) pairs that f (x, y) = 0, (x, y) R z for all z. Jie Ren (Drexel ASPITRG) CC Nov 3 rd, / 77

46 Nondeterministic CC & Randomized CC Nondeterministic Communication Complexity: definitions Definition (Lee & Shraibman): N 1 (f ) = log 2 C 1 (f ) (20) N 0 (f ) = log 2 C 0 (f ) (21) N(f ) = max(n 1 (f ), N 0 (f )) (22) Definition (Kushilevitz & Nisan): N 1 (f ) = log 2 C 1 (f ) (23) N 0 (f ) = log 2 C 0 (f ) (24) ( N(f ) = log 2 C 0 (f ) + C 1 (f ) ) (25) Jie Ren (Drexel ASPITRG) CC Nov 3 rd, / 77

47 Nondeterministic CC & Randomized CC Randomized Communication Complexity Outline 1 Deterministic Communication Complexity Problem Setup Protocol Tree Combinatorial Rectangles Fooling Sets Rectangle Rank 2 Nondeterministic CC & Randomized CC Nondeterministic Communication Complexity: Motivation Nondeterministic Communication Complexity: definitions Randomized Communication Complexity Distributional Complexity and Discrepancy 3 Some Analysis Jie Ren (Drexel ASPITRG) CC Nov 3 rd, / 77

48 Nondeterministic CC & Randomized CC Randomized Communication Complexity Motivation: Introduce randomness in the protocol r A and r B : flip coins Allow protocols that may have error Jie Ren (Drexel ASPITRG) CC Nov 3 rd, / 77

49 Nondeterministic CC & Randomized CC Randomized Communication Complexity Randomized Protocol Tree Definition : A randomized protocol P over domain X Y with range Z is a binary tree where each internal node v is labeled either by a function a v : X R A {0, 1} or by a function b v : Y R B {0, 1}, and each leaf is labeled with an element z Z. Jie Ren (Drexel ASPITRG) CC Nov 3 rd, / 77

50 Nondeterministic CC & Randomized CC Randomized Communication Complexity Definition: Let P be a randomized protocol. All the probabilities below are over random choices of r A and r B. P computes a function f with zero error P computes a function f with ɛ error if for all (x, y) P[P(x, y) = f (x, y)] 1 ɛ (26) P computes a function f with one-sided ɛ error if for all (x, y) such that f (x, y) = 0 P[P(x, y) = 0] = 1, (27) and for all (x, y) such that f (x, y) = 1, P[P(x, y) = 1] 1 ɛ (28) Jie Ren (Drexel ASPITRG) CC Nov 3 rd, / 77

51 Nondeterministic CC & Randomized CC Randomized Communication Complexity Definition: Let f : X Y {0, 1} be a binary function. We consider the following complexity measure for f R 0 (f ) is the minimum average case cost of a randomized protocol that computes f with zero error R ɛ (f ) is the minimum worst case cost of a randomized protocol that computes f with error ɛ. We typically use ɛ = 1/3 R 1 ɛ (f ) is the minimum worst case cost of a randomized protocol that computes f with one-sided error ɛ. Jie Ren (Drexel ASPITRG) CC Nov 3 rd, / 77

52 Nondeterministic CC & Randomized CC Randomized Communication Complexity Why we care these measures: worst case zero error = deterministic for all average case ɛ error, there exists a worst case problem that can convert to Jie Ren (Drexel ASPITRG) CC Nov 3 rd, / 77

53 Nondeterministic CC & Randomized CC Randomized Communication Complexity Proposition: Given a protocol P that makes an error ɛ/2 and the average number of bits exchanged is t, it can always be modified as follows: execute P as long as at most 2t/ɛ bits are exchanged, if the protocol finishes, use its output, otherwise output 0. This gives a worst case cost 2t/ɛ with error upper bounded by ɛ. Proof: t = cc p(r a, r b, x, y) Hence, r a,r b,x,y = cc 2t/ɛ cc>2t/ɛ cc p(r a, r b, x, y) + cc>2t/ɛ cc p(r a, r b, x, y) cc p(r a, r b, x, y) 2t Pr[cc > 2t/ɛ] ɛ (29) Pr[err] ɛ Pr[P ends] + 1 Pr[P not ends] 2 ɛ 2 + t 2t/ɛ = ɛ (30) Jie Ren (Drexel ASPITRG) CC Nov 3 rd, / 77

54 Nondeterministic CC & Randomized CC Randomized Communication Complexity 1 For all 0 < ɛ ɛ < 1/2, R ɛ (f ) O(log ɛ ɛ R ɛ (f )) (31) 2 For all 0 < ɛ 1/2, R ɛ (f ) Rɛ 1 (f ) O(log ɛ 1 R 0 (f )) (32) 3 For all 0 < ɛ 1/2, R 0 (f ) = Θ(max[Rɛ 1 (f ), Rɛ 1 (not(f ))]) (33) Jie Ren (Drexel ASPITRG) CC Nov 3 rd, / 77

55 Nondeterministic CC & Randomized CC Randomized Communication Complexity Proof of Property 1: We first prove a similar result for the 1-sided error problem: for all 0 < ɛ ɛ < 1/2, Rɛ 1 (f ) O(log ɛ ɛ R 1 (f )) (34) ɛ Jie Ren (Drexel ASPITRG) CC Nov 3 rd, / 77

56 Nondeterministic CC & Randomized CC Randomized Communication Complexity Proof of Property 1: Given a randomized protocol P with worst case cost T bits and one-sided error no greater than ɛ < 1/2, we can build a new protocol P with worst case cost nt bits by simply running P n times. In the new protocol, Alice and Bob will claim f (x, y) = 1 if and only if there exists at least one time among the n repeating protocols that they will output 1. Now we bound the error for the new protocol P : P[err f (x, y) = 0] = 0 (35) P[err f (x, y) = 1] = P[all n trails output 0 f (x, y) = 1] = (ɛ ) n (36) Therefore, if we repeat P log ɛ ɛ times, we can guarantee to reduce the one-sided error to ɛ. Jie Ren (Drexel ASPITRG) CC Nov 3 rd, / 77

57 Nondeterministic CC & Randomized CC Randomized Communication Complexity Proof of Property 1: Now we prove property 1. We still run P n times, each gives an output X i, i {1,..., n}. In the new protocol, Alice and Bob will claim f (x, y) = 1 if and only if 1 n X i > 1 2 Now we bound the error for the new protocol P : n ( n P[err f (x, y) = 0] i P[err f (x, y) = 1] i ) (ɛ ) i (1 ɛ ) n i (37) i= n/2 (38) (ɛ ) n n ( ) n (ɛ ) i (1 ɛ ) n i i i= n/2 (39) (ɛ ) n Therefore, if we repeat P log ɛ ɛ times, we can also guarantee to reduce the two-sided error to ɛ. Jie Ren (Drexel ASPITRG) CC Nov 3 rd, / 77

58 Nondeterministic CC & Randomized CC Distributional Complexity and Discrepancy Outline 1 Deterministic Communication Complexity Problem Setup Protocol Tree Combinatorial Rectangles Fooling Sets Rectangle Rank 2 Nondeterministic CC & Randomized CC Nondeterministic Communication Complexity: Motivation Nondeterministic Communication Complexity: definitions Randomized Communication Complexity Distributional Complexity and Discrepancy 3 Some Analysis Jie Ren (Drexel ASPITRG) CC Nov 3 rd, / 77

59 Nondeterministic CC & Randomized CC Distributional Complexity and Discrepancy Distributional Complexity Motivation: Consider probability distributions over the inputs Definition: Let µ be a probability distribution on X Y. The (µ, ɛ)-distributional communication complexity of f, D µ ɛ (f ), is the cost of the best deterministic protocol that gives the correct answer for f with a probability at least 1 ɛ. Jie Ren (Drexel ASPITRG) CC Nov 3 rd, / 77

60 Nondeterministic CC & Randomized CC Distributional Complexity and Discrepancy Discrepancy Motivation: Allow those rectangles that partition the support to be almost f -monochromatic. Definition: Let f : X Y {0, 1} be a function, R be any rectangle, and µ be a probability distribution on X Y, Denote Disc µ (R, f ) = P µ [f (x, y) = 0 & (x, y) R] P µ [f (x, y) = 1 & (x, y) R] The discrepancy of f according to µ is, (40) Disc µ (f ) = max R Disc µ(r, f ) (41) Jie Ren (Drexel ASPITRG) CC Nov 3 rd, / 77

61 Nondeterministic CC & Randomized CC Distributional Complexity and Discrepancy Discrepancy Proposition 3.28 (Kushilevitz & Nisan): For every function f : X Y {0, 1}, every probability distribution µ on X Y, and every ɛ 0, D µ 1/2 ɛ (f ) log 2(2ɛ/Disc µ (f )) (42) Jie Ren (Drexel ASPITRG) CC Nov 3 rd, / 77

62 Nondeterministic CC & Randomized CC Distributional Complexity and Discrepancy Discrepancy Proof: Given any P with c bits to compute f, we have 2ɛ P[P(x, y) = f (x, y)] P[P(x, y) f (x, y)] = (P[P(x, y) = f (x, y)&(x, y) R l ] l P[P(x, y) f (x, y)&(x, y) R l ]) P [f (x, y) = 0 & (x, y) R l ] P [f (x, y) = 1 & (x, y) R l ] µ µ l 2 c Disc µ (f ) (43) Jie Ren (Drexel ASPITRG) CC Nov 3 rd, / 77

63 Some Analysis Outline 1 Deterministic Communication Complexity Problem Setup Protocol Tree Combinatorial Rectangles Fooling Sets Rectangle Rank 2 Nondeterministic CC & Randomized CC Nondeterministic Communication Complexity: Motivation Nondeterministic Communication Complexity: definitions Randomized Communication Complexity Distributional Complexity and Discrepancy 3 Some Analysis Jie Ren (Drexel ASPITRG) CC Nov 3 rd, / 77

64 Some Analysis Recall Definitions: Let f : X Y {0, 1} be a binary function. C P (f ): the smallest number of leaves in a protocol P C D (f ): the smallest number of monochromatic rectangles that partition X Y C(f ): the smallest number of monochromatic rectangles needed to cover X Y C z (f ): the smallest number of monochromatic rectangles needed to cover the z-inputs Jie Ren (Drexel ASPITRG) CC Nov 3 rd, / 77

65 Some Analysis Recall Proposition: For all f : X Y {0, 1}, log 2 C(f ) log 2 C D (f ) log 2 C P (f ) D(f ) (44) C(f ) = C 0 (f ) + C 1 (f ) (45) Definition: The nondeterministic communication complexity, N 1 (f ) = log 2 C 1 (f ) (46) N 0 (f ) = log 2 C 0 (f ) (47) N(f ) = log 2 C(f ) (48) Jie Ren (Drexel ASPITRG) CC Nov 3 rd, / 77

66 Some Analysis Protocol partition number Theorem 2.8 (Kushilevitz and Nisan): The protocol partition number of a function determines the deterministic communication complexity. log 2 C P (f ) D(f ) 2 log 3/2 C P (f ) (49) Proof: Given any protocol P with t number of leaves, it can be converted into a balanced protocol. Jie Ren (Drexel ASPITRG) CC Nov 3 rd, / 77

67 Some Analysis Protocol partition number Proof: Given any protocol P with t number of leaves, there must exist an internal node v such that t/3 < t v 2t/3 (50) We build a new protocol based on this internal node: 1 Alice and Bob determine whether or not (x, y) R v 2 If (x, y) R v, Alice and Bob recursively solve f in the rectangle R v. 3 If (x, y) R v, Alice and Bob recursively solve f on X Y where f (x 1, y 1 ) = { f (x1, y 1 ) if (x 1, y 1 ) R v 0 otherwise (51) Jie Ren (Drexel ASPITRG) CC Nov 3 rd, / 77

68 Some Analysis Protocol partition number Analysis: Step 1 Requires 2 bits In Step 3, we take P and replace Tree(v) by a 0-leaf, we get a protocol for f with t t v + 1 leaves, hence D(t) 2 + D(2t/3) (52) Jie Ren (Drexel ASPITRG) CC Nov 3 rd, / 77

69 Some Analysis Recall Proposition: For all f : X Y {0, 1}, log 2 C(f ) log 2 C D (f ) log 2 C P (f ) D(f ) 2 log 3/2 C P (f ) (53) Definition: The nondeterministic communication complexity, N 1 (f ) = log 2 C 1 (f ) (54) N 0 (f ) = log 2 C 0 (f ) (55) N(f ) = log 2 C(f ) (56) Jie Ren (Drexel ASPITRG) CC Nov 3 rd, / 77

70 Some Analysis Deterministic CC Vs. Nondeterministic CC How good is the rectangle lower bound? D(f )? = O(log C D (f )) (57) Jie Ren (Drexel ASPITRG) CC Nov 3 rd, / 77

71 Some Analysis Deterministic CC Vs. Nondeterministic CC Theorem 2.11 (Kushilevitz & Nisan): For every function f : X Y {0, 1}, D(f ) = O(N 0 (f )N 1 (f )) (58) Jie Ren (Drexel ASPITRG) CC Nov 3 rd, / 77

72 Some Analysis Deterministic CC Vs. Nondeterministic CC Property: Let R = S T be a 0-monochromatic rectangle, and let R = S T be a 1-monochromatic rectangle, then either S S = or T T =. Jie Ren (Drexel ASPITRG) CC Nov 3 rd, / 77

73 Some Analysis Deterministic CC Vs. Nondeterministic CC Proof of Theorem 2.11 (Kushilevitz & Nisan): We give a protocol P as follows, Alice and Bob search for a 0-rectangle that contains the input (x, y), and they conclude f (x, y) = 1 if they fail. In each round, Alice and Bob exchange log 2 C 1 (f ) + 1 bits and reduce the number of alive 0-rectangles by a factor of 2. There will be no more than log 2 C 0 (f ) rounds, hence D(f ) CC(P) = O(log 2 C 0 (f )(log 2 C 1 (f ) + 1)) = O(N 0 (f )N 1 (f )) (59) Jie Ren (Drexel ASPITRG) CC Nov 3 rd, / 77

74 Some Analysis Deterministic CC Vs. Nondeterministic CC Proof of Theorem 2.11 (Kushilevitz & Nisan): In each round, the players do the following: 1 Alice outputs f (x, y) = 0 if no 0-rectangles are alive. Otherwise, Alice looks for a 1-rectangle that contains row x and intersects in rows with at most half of the alive 0-rectangles and send the name of this 1-rectangle. 2 Bob looks for a 1-rectangle that contains column y and intersects in columns with at most half of the alive 0-rectangles and send the name of this 1-rectangle. Otherwise, Bob outputs f (x, y) = 0 Jie Ren (Drexel ASPITRG) CC Nov 3 rd, / 77

75 Some Analysis Deterministic CC Vs. Nondeterministic CC Protocol Analysis: If f (x, y) = 0, it must belong to some 0-rectangle R, then R remains alive during the protocol. Therefore, if no 0-rectangle is alive, f (x, y) must be 1 If neither Alice nor Bob can find a 1-rectangle to announce (which means both of them output f (x, y) = 1), we claim this output must be correct by the property. Jie Ren (Drexel ASPITRG) CC Nov 3 rd, / 77

76 Some Analysis Public coin Theorem (Theo. 3 in Newman 1991, Theo in K & N): Let f : {0, 1} n {0, 1} n {0, 1} be a function. For every δ > 0 and every ɛ > 0, we have R δ+ɛ (f ) R pub ɛ (f ) + O(logn + logδ 1 ) (60) a set of t(δ, n) = O(n/δ 2 ) public coin protocols with error ɛ + δ Alice tells Bob which protocol to use log 2 t = O(log n + log δ 1 ) Jie Ren (Drexel ASPITRG) CC Nov 3 rd, / 77

77 Some Analysis Randomized CC Vs. Distributional CC Theorem (Theo. 3 in Yao 1979, Theo in K & N): Rɛ pub (f ) = max µ Dµ ɛ (f ) (61) The randomized protocol is correct for every distribution µ with probability 1 ɛ Use min-max theorem of zero-sum game Jie Ren (Drexel ASPITRG) CC Nov 3 rd, / 77

Partitions and Covers

Partitions and Covers University of California, Los Angeles CS 289A Communication Complexity Instructor: Alexander Sherstov Scribe: Dong Wang Date: January 2, 2012 LECTURE 4 Partitions and Covers In previous lectures, we saw

More information

Nondeterminism LECTURE Nondeterminism as a proof system. University of California, Los Angeles CS 289A Communication Complexity

Nondeterminism LECTURE Nondeterminism as a proof system. University of California, Los Angeles CS 289A Communication Complexity University of California, Los Angeles CS 289A Communication Complexity Instructor: Alexander Sherstov Scribe: Matt Brown Date: January 25, 2012 LECTURE 5 Nondeterminism In this lecture, we introduce nondeterministic

More information

CS Communication Complexity: Applications and New Directions

CS Communication Complexity: Applications and New Directions CS 2429 - Communication Complexity: Applications and New Directions Lecturer: Toniann Pitassi 1 Introduction In this course we will define the basic two-party model of communication, as introduced in the

More information

Lecture 16: Communication Complexity

Lecture 16: Communication Complexity CSE 531: Computational Complexity I Winter 2016 Lecture 16: Communication Complexity Mar 2, 2016 Lecturer: Paul Beame Scribe: Paul Beame 1 Communication Complexity In (two-party) communication complexity

More information

Matrix Rank in Communication Complexity

Matrix Rank in Communication Complexity University of California, Los Angeles CS 289A Communication Complexity Instructor: Alexander Sherstov Scribe: Mohan Yang Date: January 18, 2012 LECTURE 3 Matrix Rank in Communication Complexity This lecture

More information

Lecture 20: Lower Bounds for Inner Product & Indexing

Lecture 20: Lower Bounds for Inner Product & Indexing 15-859: Information Theory and Applications in TCS CMU: Spring 201 Lecture 20: Lower Bounds for Inner Product & Indexing April 9, 201 Lecturer: Venkatesan Guruswami Scribe: Albert Gu 1 Recap Last class

More information

Course Introduction. 1.1 Overview. Lecture 1. Scribe: Tore Frederiksen

Course Introduction. 1.1 Overview. Lecture 1. Scribe: Tore Frederiksen Lecture 1 Course Introduction Scribe: Tore Frederiksen 1.1 Overview Assume we are in a situation where several people need to work together in order to solve a problem they cannot solve on their own. The

More information

Communication is bounded by root of rank

Communication is bounded by root of rank Electronic Colloquium on Computational Complexity, Report No. 84 (2013) Communication is bounded by root of rank Shachar Lovett June 7, 2013 Abstract We prove that any total boolean function of rank r

More information

Asymmetric Communication Complexity and Data Structure Lower Bounds

Asymmetric Communication Complexity and Data Structure Lower Bounds Asymmetric Communication Complexity and Data Structure Lower Bounds Yuanhao Wei 11 November 2014 1 Introduction This lecture will be mostly based off of Miltersen s paper Cell Probe Complexity - a Survey

More information

CS Introduction to Complexity Theory. Lecture #11: Dec 8th, 2015

CS Introduction to Complexity Theory. Lecture #11: Dec 8th, 2015 CS 2401 - Introduction to Complexity Theory Lecture #11: Dec 8th, 2015 Lecturer: Toniann Pitassi Scribe Notes by: Xu Zhao 1 Communication Complexity Applications Communication Complexity (CC) has many

More information

Approximation norms and duality for communication complexity lower bounds

Approximation norms and duality for communication complexity lower bounds Approximation norms and duality for communication complexity lower bounds Troy Lee Columbia University Adi Shraibman Weizmann Institute From min to max The cost of a best algorithm is naturally phrased

More information

15-251: Great Theoretical Ideas In Computer Science Recitation 9 : Randomized Algorithms and Communication Complexity Solutions

15-251: Great Theoretical Ideas In Computer Science Recitation 9 : Randomized Algorithms and Communication Complexity Solutions 15-251: Great Theoretical Ideas In Computer Science Recitation 9 : Randomized Algorithms and Communication Complexity Solutions Definitions We say a (deterministic) protocol P computes f if (x, y) {0,

More information

Classes of Boolean Functions

Classes of Boolean Functions Classes of Boolean Functions Nader H. Bshouty Eyal Kushilevitz Abstract Here we give classes of Boolean functions that considered in COLT. Classes of Functions Here we introduce the basic classes of functions

More information

Breaking the Rectangle Bound Barrier against Formula Size Lower Bounds

Breaking the Rectangle Bound Barrier against Formula Size Lower Bounds Breaking the Rectangle Bound Barrier against Formula Size Lower Bounds Kenya Ueno The Young Researcher Development Center and Graduate School of Informatics, Kyoto University kenya@kuis.kyoto-u.ac.jp Abstract.

More information

Separating Deterministic from Nondeterministic NOF Multiparty Communication Complexity

Separating Deterministic from Nondeterministic NOF Multiparty Communication Complexity Separating Deterministic from Nondeterministic NOF Multiparty Communication Complexity (Extended Abstract) Paul Beame 1,, Matei David 2,, Toniann Pitassi 2,, and Philipp Woelfel 2, 1 University of Washington

More information

On the P versus NP intersected with co-np question in communication complexity

On the P versus NP intersected with co-np question in communication complexity On the P versus NP intersected with co-np question in communication complexity Stasys Jukna Abstract We consider the analog of the P versus NP co-np question for the classical two-party communication protocols

More information

There are no zero-hard problems in multiparty communication complexity

There are no zero-hard problems in multiparty communication complexity There are no zero-hard problems in multiparty communication complexity László Babai and Denis Pankratov University of Chicago DRAFT: 2015-04-29 7:00pm Abstract We study the feasibility of generalizing

More information

14. Direct Sum (Part 1) - Introduction

14. Direct Sum (Part 1) - Introduction Communication Complexity 14 Oct, 2011 (@ IMSc) 14. Direct Sum (Part 1) - Introduction Lecturer: Prahladh Harsha Scribe: Abhishek Dang 14.1 Introduction The Direct Sum problem asks how the difficulty in

More information

Lecture 19: Interactive Proofs and the PCP Theorem

Lecture 19: Interactive Proofs and the PCP Theorem Lecture 19: Interactive Proofs and the PCP Theorem Valentine Kabanets November 29, 2016 1 Interactive Proofs In this model, we have an all-powerful Prover (with unlimited computational prover) and a polytime

More information

Randomized Simultaneous Messages: Solution of a Problem of Yao in Communication Complexity

Randomized Simultaneous Messages: Solution of a Problem of Yao in Communication Complexity Randomized Simultaneous Messages: Solution of a Problem of Yao in Communication Complexity László Babai Peter G. Kimmel Department of Computer Science The University of Chicago 1100 East 58th Street Chicago,

More information

Hadamard Tensors and Lower Bounds on Multiparty Communication Complexity

Hadamard Tensors and Lower Bounds on Multiparty Communication Complexity Hadamard Tensors and Lower Bounds on Multiparty Communication Complexity Jeff Ford and Anna Gál Dept. of Computer Science, University of Texas at Austin, Austin, TX 78712-1188, USA {jeffford, panni}@cs.utexas.edu

More information

Communication Complexity

Communication Complexity Communication Complexity Thesis Written by: Dömötör Pálvölgyi Supervisor: Zoltán Király Eötvös Loránd University Faculty of Sciences 2005 Contents 0.1 The Organization of This Paper........................

More information

Non-deterministic Communication Complexity with Few Witnesses

Non-deterministic Communication Complexity with Few Witnesses Non-deterministic Communication Complexity with Few Witnesses Mauricio Karchmer Ilan Newman Mike Saks Avi Wigderson February 11, 2003 Abstract We study non-deterministic communication protocols in which

More information

1 Randomized Computation

1 Randomized Computation CS 6743 Lecture 17 1 Fall 2007 1 Randomized Computation Why is randomness useful? Imagine you have a stack of bank notes, with very few counterfeit ones. You want to choose a genuine bank note to pay at

More information

Coding for Computing. ASPITRG, Drexel University. Jie Ren 2012/11/14

Coding for Computing. ASPITRG, Drexel University. Jie Ren 2012/11/14 Coding for Computing ASPITRG, Drexel University Jie Ren 2012/11/14 Outline Background and definitions Main Results Examples and Analysis Proofs Background and definitions Problem Setup Graph Entropy Conditional

More information

Cell-Probe Proofs and Nondeterministic Cell-Probe Complexity

Cell-Probe Proofs and Nondeterministic Cell-Probe Complexity Cell-obe oofs and Nondeterministic Cell-obe Complexity Yitong Yin Department of Computer Science, Yale University yitong.yin@yale.edu. Abstract. We study the nondeterministic cell-probe complexity of static

More information

A Lower Bound Technique for Nondeterministic Graph-Driven Read-Once-Branching Programs and its Applications

A Lower Bound Technique for Nondeterministic Graph-Driven Read-Once-Branching Programs and its Applications A Lower Bound Technique for Nondeterministic Graph-Driven Read-Once-Branching Programs and its Applications Beate Bollig and Philipp Woelfel FB Informatik, LS2, Univ. Dortmund, 44221 Dortmund, Germany

More information

An Information Complexity Approach to the Inner Product Problem

An Information Complexity Approach to the Inner Product Problem An Information Complexity Approach to the Inner Product Problem William Henderson-Frost Advisor: Amit Chakrabarti Senior Honors Thesis Submitted to the faculty in partial fulfillment of the requirements

More information

CS Foundations of Communication Complexity

CS Foundations of Communication Complexity CS 49 - Foundations of Communication Complexity Lecturer: Toniann Pitassi 1 The Discrepancy Method Cont d In the previous lecture we ve outlined the discrepancy method, which is a method for getting lower

More information

Notes on Zero Knowledge

Notes on Zero Knowledge U.C. Berkeley CS172: Automata, Computability and Complexity Handout 9 Professor Luca Trevisan 4/21/2015 Notes on Zero Knowledge These notes on zero knowledge protocols for quadratic residuosity are based

More information

Efficient communication for the list problem

Efficient communication for the list problem Efficient communication for the list problem Joran van Apeldoorn July 18, 014 Bachelorthesis Main Supervisor: Supervisors: prof. dr. Harry Buhrman dr. Leen Torenvliet prof. dr. Hans Maassen Korteweg-de

More information

A Review of Some Approximate Privacy Measures of Multi-Agent Communication Protocols

A Review of Some Approximate Privacy Measures of Multi-Agent Communication Protocols Chapter 10 A Review of Some Approximate Privacy Measures of Multi-Agent Communication Protocols Bhaskar DasGupta and Venkatakumar Srinivasan Abstract Privacy preserving computational models have become

More information

Quantum Communication Complexity

Quantum Communication Complexity Quantum Communication Complexity Ronald de Wolf Communication complexity has been studied extensively in the area of theoretical computer science and has deep connections with seemingly unrelated areas,

More information

PRGs for space-bounded computation: INW, Nisan

PRGs for space-bounded computation: INW, Nisan 0368-4283: Space-Bounded Computation 15/5/2018 Lecture 9 PRGs for space-bounded computation: INW, Nisan Amnon Ta-Shma and Dean Doron 1 PRGs Definition 1. Let C be a collection of functions C : Σ n {0,

More information

Clique vs. Independent Set

Clique vs. Independent Set Lower Bounds for Clique vs. Independent Set Mika Göös University of Toronto Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 / 4 On page 6... Mika Göös (Univ. of Toronto) Clique vs.

More information

Cell-Probe Lower Bounds for the Partial Match Problem

Cell-Probe Lower Bounds for the Partial Match Problem Cell-Probe Lower Bounds for the Partial Match Problem T.S. Jayram Subhash Khot Ravi Kumar Yuval Rabani Abstract Given a database of n points in {0, 1} d, the partial match problem is: In response to a

More information

The Alon-Saks-Seymour and Rank-Coloring Conjectures

The Alon-Saks-Seymour and Rank-Coloring Conjectures The Alon-Saks-Seymour and Rank-Coloring Conjectures Michael Tait Department of Mathematical Sciences University of Delaware Newark, DE 19716 tait@math.udel.edu April 20, 2011 Preliminaries A graph is a

More information

On Randomized One-Round Communication Complexity. Ilan Kremer Noam Nisan Dana Ron. Hebrew University, Jerusalem 91904, Israel

On Randomized One-Round Communication Complexity. Ilan Kremer Noam Nisan Dana Ron. Hebrew University, Jerusalem 91904, Israel On Randomized One-Round Communication Complexity Ilan Kremer Noam Nisan Dana Ron Institute of Computer Science Hebrew University, Jerusalem 91904, Israel Email: fpilan,noam,danarg@cs.huji.ac.il November

More information

Quantum Communication Complexity

Quantum Communication Complexity Quantum Communication Complexity Hartmut Klauck FB Informatik, Johann-Wolfgang-Goethe-Universität 60054 Frankfurt am Main, Germany Abstract This paper surveys the field of quantum communication complexity.

More information

An Approximation Algorithm for Approximation Rank

An Approximation Algorithm for Approximation Rank An Approximation Algorithm for Approximation Rank Troy Lee Columbia University Adi Shraibman Weizmann Institute Conventions Identify a communication function f : X Y { 1, +1} with the associated X-by-Y

More information

Communication Complexity

Communication Complexity Communication Complexity Jaikumar Radhakrishnan School of Technology and Computer Science Tata Institute of Fundamental Research Mumbai 31 May 2012 J 31 May 2012 1 / 13 Plan 1 Examples, the model, the

More information

Lecture 16 Oct 21, 2014

Lecture 16 Oct 21, 2014 CS 395T: Sublinear Algorithms Fall 24 Prof. Eric Price Lecture 6 Oct 2, 24 Scribe: Chi-Kit Lam Overview In this lecture we will talk about information and compression, which the Huffman coding can achieve

More information

Hardness of MST Construction

Hardness of MST Construction Lecture 7 Hardness of MST Construction In the previous lecture, we saw that an MST can be computed in O( n log n+ D) rounds using messages of size O(log n). Trivially, Ω(D) rounds are required, but what

More information

CS369E: Communication Complexity (for Algorithm Designers) Lecture #8: Lower Bounds in Property Testing

CS369E: Communication Complexity (for Algorithm Designers) Lecture #8: Lower Bounds in Property Testing CS369E: Communication Complexity (for Algorithm Designers) Lecture #8: Lower Bounds in Property Testing Tim Roughgarden March 12, 2015 1 Property Testing We begin in this section with a brief introduction

More information

CMPUT 675: Approximation Algorithms Fall 2014

CMPUT 675: Approximation Algorithms Fall 2014 CMPUT 675: Approximation Algorithms Fall 204 Lecture 25 (Nov 3 & 5): Group Steiner Tree Lecturer: Zachary Friggstad Scribe: Zachary Friggstad 25. Group Steiner Tree In this problem, we are given a graph

More information

Multi-Party Quantum Communication Complexity with Routed Messages

Multi-Party Quantum Communication Complexity with Routed Messages Multi-Party Quantum Communication Complexity with Routed Messages Seiichiro Tani Masaki Nakanishi Shigeru Yamashita Abstract This paper describes a general quantum lower bounding technique for the communication

More information

Information Complexity and Applications. Mark Braverman Princeton University and IAS FoCM 17 July 17, 2017

Information Complexity and Applications. Mark Braverman Princeton University and IAS FoCM 17 July 17, 2017 Information Complexity and Applications Mark Braverman Princeton University and IAS FoCM 17 July 17, 2017 Coding vs complexity: a tale of two theories Coding Goal: data transmission Different channels

More information

Direct product theorem for discrepancy

Direct product theorem for discrepancy Direct product theorem for discrepancy Troy Lee Rutgers University Joint work with: Robert Špalek Direct product theorems Knowing how to compute f, how can you compute f f f? Obvious upper bounds: If can

More information

Competing Provers Protocols for Circuit Evaluation

Competing Provers Protocols for Circuit Evaluation THEORY OF COMPUTING www.theoryofcomputing.org Competing Provers Protocols for Circuit Evaluation Gillat Kol Ran Raz April 21, 2014 Abstract: Let C be a fan-in 2) Boolean circuit of size s and depth d,

More information

Algebraic Problems in Computational Complexity

Algebraic Problems in Computational Complexity Algebraic Problems in Computational Complexity Pranab Sen School of Technology and Computer Science, Tata Institute of Fundamental Research, Mumbai 400005, India pranab@tcs.tifr.res.in Guide: Prof. R.

More information

Information Complexity vs. Communication Complexity: Hidden Layers Game

Information Complexity vs. Communication Complexity: Hidden Layers Game Information Complexity vs. Communication Complexity: Hidden Layers Game Jiahui Liu Final Project Presentation for Information Theory in TCS Introduction Review of IC vs CC Hidden Layers Game Upper Bound

More information

Lecture Lecture 9 October 1, 2015

Lecture Lecture 9 October 1, 2015 CS 229r: Algorithms for Big Data Fall 2015 Lecture Lecture 9 October 1, 2015 Prof. Jelani Nelson Scribe: Rachit Singh 1 Overview In the last lecture we covered the distance to monotonicity (DTM) and longest

More information

Rank minimization via the γ 2 norm

Rank minimization via the γ 2 norm Rank minimization via the γ 2 norm Troy Lee Columbia University Adi Shraibman Weizmann Institute Rank Minimization Problem Consider the following problem min X rank(x) A i, X b i for i = 1,..., k Arises

More information

Handout 5. α a1 a n. }, where. xi if a i = 1 1 if a i = 0.

Handout 5. α a1 a n. }, where. xi if a i = 1 1 if a i = 0. Notes on Complexity Theory Last updated: October, 2005 Jonathan Katz Handout 5 1 An Improved Upper-Bound on Circuit Size Here we show the result promised in the previous lecture regarding an upper-bound

More information

Multiparty Communication Complexity of Disjointness

Multiparty Communication Complexity of Disjointness Multiparty Communication Complexity of Disjointness Aradev Chattopadhyay and Anil Ada School of Computer Science McGill University, Montreal, Canada achatt3,aada@cs.mcgill.ca We obtain a lower bound of

More information

Lecture Hardness of Set Cover

Lecture Hardness of Set Cover PCPs and Inapproxiability CIS 6930 October 5, 2009 Lecture Hardness of Set Cover Lecturer: Dr. My T. Thai Scribe: Ying Xuan 1 Preliminaries 1.1 Two-Prover-One-Round Proof System A new PCP model 2P1R Think

More information

Winter 2011 Josh Benaloh Brian LaMacchia

Winter 2011 Josh Benaloh Brian LaMacchia Winter 2011 Josh Benaloh Brian LaMacchia Fun with Public-Key Tonight we ll Introduce some basic tools of public-key crypto Combine the tools to create more powerful tools Lay the ground work for substantial

More information

A Threshold of ln(n) for approximating set cover

A Threshold of ln(n) for approximating set cover A Threshold of ln(n) for approximating set cover October 20, 2009 1 The k-prover proof system There is a single verifier V and k provers P 1, P 2,..., P k. Binary code with k codewords, each of length

More information

25.2 Last Time: Matrix Multiplication in Streaming Model

25.2 Last Time: Matrix Multiplication in Streaming Model EE 381V: Large Scale Learning Fall 01 Lecture 5 April 18 Lecturer: Caramanis & Sanghavi Scribe: Kai-Yang Chiang 5.1 Review of Streaming Model Streaming model is a new model for presenting massive data.

More information

Lecture Notes 20: Zero-Knowledge Proofs

Lecture Notes 20: Zero-Knowledge Proofs CS 127/CSCI E-127: Introduction to Cryptography Prof. Salil Vadhan Fall 2013 Lecture Notes 20: Zero-Knowledge Proofs Reading. Katz-Lindell Ÿ14.6.0-14.6.4,14.7 1 Interactive Proofs Motivation: how can parties

More information

Direct product theorem for discrepancy

Direct product theorem for discrepancy Direct product theorem for discrepancy Troy Lee Rutgers University Robert Špalek Google Direct product theorems: Why is Google interested? Direct product theorems: Why should Google be interested? Direct

More information

Structure of protocols for XOR functions

Structure of protocols for XOR functions Electronic Colloquium on Computational Complexity, Report No. 44 (016) Structure of protocols for XOR functions Kaave Hosseini Computer Science and Engineering University of California, San Diego skhossei@ucsd.edu

More information

Lecture 14: Secure Multiparty Computation

Lecture 14: Secure Multiparty Computation 600.641 Special Topics in Theoretical Cryptography 3/20/2007 Lecture 14: Secure Multiparty Computation Instructor: Susan Hohenberger Scribe: Adam McKibben 1 Overview Suppose a group of people want to determine

More information

Secure Multiparty Computation from Graph Colouring

Secure Multiparty Computation from Graph Colouring Secure Multiparty Computation from Graph Colouring Ron Steinfeld Monash University July 2012 Ron Steinfeld Secure Multiparty Computation from Graph Colouring July 2012 1/34 Acknowledgements Based on joint

More information

Lecture 9 and 10: Malicious Security - GMW Compiler and Cut and Choose, OT Extension

Lecture 9 and 10: Malicious Security - GMW Compiler and Cut and Choose, OT Extension CS 294 Secure Computation February 16 and 18, 2016 Lecture 9 and 10: Malicious Security - GMW Compiler and Cut and Choose, OT Extension Instructor: Sanjam Garg Scribe: Alex Irpan 1 Overview Garbled circuits

More information

The Communication Complexity of Correlation. Prahladh Harsha Rahul Jain David McAllester Jaikumar Radhakrishnan

The Communication Complexity of Correlation. Prahladh Harsha Rahul Jain David McAllester Jaikumar Radhakrishnan The Communication Complexity of Correlation Prahladh Harsha Rahul Jain David McAllester Jaikumar Radhakrishnan Transmitting Correlated Variables (X, Y) pair of correlated random variables Transmitting

More information

Lecture 12: Interactive Proofs

Lecture 12: Interactive Proofs princeton university cos 522: computational complexity Lecture 12: Interactive Proofs Lecturer: Sanjeev Arora Scribe:Carl Kingsford Recall the certificate definition of NP. We can think of this characterization

More information

Notes on Complexity Theory Last updated: December, Lecture 27

Notes on Complexity Theory Last updated: December, Lecture 27 Notes on Complexity Theory Last updated: December, 2011 Jonathan Katz Lecture 27 1 Space-Bounded Derandomization We now discuss derandomization of space-bounded algorithms. Here non-trivial results can

More information

Philipp Woelfel FB Informatik, LS2 Univ. Dortmund Dortmund, Germany Abstract. 1.

Philipp Woelfel FB Informatik, LS2 Univ. Dortmund Dortmund, Germany Abstract. 1. On the Complexity of Integer Multiplication in Branching Programs with Multiple Tests and in Read-Once Branching Programs with Limited Nondeterminism (Extended Abstract) Philipp Woelfel FB Informatik,

More information

On the tightness of the Buhrman-Cleve-Wigderson simulation

On the tightness of the Buhrman-Cleve-Wigderson simulation On the tightness of the Buhrman-Cleve-Wigderson simulation Shengyu Zhang Department of Computer Science and Engineering, The Chinese University of Hong Kong. syzhang@cse.cuhk.edu.hk Abstract. Buhrman,

More information

arxiv: v1 [cs.cc] 12 Feb 2009

arxiv: v1 [cs.cc] 12 Feb 2009 Symposium on Theoretical Aspects of Computer Science 2009 (Freiburg), pp. 685 696 www.stacs-conf.org arxiv:0902.2146v1 [cs.cc] 12 Feb 2009 A STRONGER LP BOUND FOR FORMULA SIZE LOWER BOUNDS VIA CLIQUE CONSTRAINTS

More information

Lecture 21: P vs BPP 2

Lecture 21: P vs BPP 2 Advanced Complexity Theory Spring 206 Prof. Dana Moshkovitz Lecture 2: P vs BPP 2 Overview In the previous lecture, we began our discussion of pseudorandomness. We presented the Blum- Micali definition

More information

Theorem 11.1 (Lund-Fortnow-Karloff-Nisan). There is a polynomial length interactive proof for the

Theorem 11.1 (Lund-Fortnow-Karloff-Nisan). There is a polynomial length interactive proof for the Lecture 11 IP, PH, and PSPACE May 4, 2004 Lecturer: Paul Beame Notes: Daniel Lowd 11.1 IP and PH Theorem 11.1 (Lund-Fortnow-Karloff-Nisan). There is a polynomial length interactive proof for the predicate

More information

CS 350 Algorithms and Complexity

CS 350 Algorithms and Complexity 1 CS 350 Algorithms and Complexity Fall 2015 Lecture 15: Limitations of Algorithmic Power Introduction to complexity theory Andrew P. Black Department of Computer Science Portland State University Lower

More information

New Bounds for the Garden-Hose Model

New Bounds for the Garden-Hose Model New Bounds for the Garden-Hose Model Hartmut Klauck 1 and Supartha Podder 2 1 CQT and Nanyang Technological University, Singapore hklauck@gmail.com 2 CQT Singapore supartha@gmail.com Abstract We show new

More information

The Computational Complexity Column

The Computational Complexity Column The Computational Complexity Column by Vikraman Arvind Institute of Mathematical Sciences, CIT Campus, Taramani Chennai 600113, India arvind@imsc.res.in http://www.imsc.res.in/~arvind Communication complexity

More information

A note on monotone real circuits

A note on monotone real circuits A note on monotone real circuits Pavel Hrubeš and Pavel Pudlák March 14, 2017 Abstract We show that if a Boolean function f : {0, 1} n {0, 1} can be computed by a monotone real circuit of size s using

More information

Lecture 7: Fingerprinting. David Woodruff Carnegie Mellon University

Lecture 7: Fingerprinting. David Woodruff Carnegie Mellon University Lecture 7: Fingerprinting David Woodruff Carnegie Mellon University How to Pick a Random Prime How to pick a random prime in the range {1, 2,, M}? How to pick a random integer X? Pick a uniformly random

More information

Lower Bounds in Communication Complexity

Lower Bounds in Communication Complexity Foundations and Trends R in sample Vol. xx, No xx (xxxx) 1135 c xxxx xxxxxxxxx DOI: xxxxxx Lower Bounds in Communication Complexity Troy Lee 1 and Adi Shraibman 2 1 Columbia University New York 10027,

More information

THE ALON-SAKS-SEYMOUR AND RANK-COLORING CONJECTURES. by Michael Tait

THE ALON-SAKS-SEYMOUR AND RANK-COLORING CONJECTURES. by Michael Tait THE ALON-SAKS-SEYMOUR AND RANK-COLORING CONJECTURES by Michael Tait A thesis submitted to the Faculty of the University of Delaware in partial fulfillment of the requirements for the degree of Master of

More information

A Strong Direct Product Theorem for Corruption and the Multiparty NOF Communication Complexity of Disjointness

A Strong Direct Product Theorem for Corruption and the Multiparty NOF Communication Complexity of Disjointness A Strong Direct Product Theorem for Corruption and the Multiparty NOF Communication Complexity of Disjointness Paul Beame University of Washington Seattle, WA 98195-2350 beame@cs.washington.edu Nathan

More information

Lecture 14: IP = PSPACE

Lecture 14: IP = PSPACE IAS/PCMI Summer Session 2000 Clay Mathematics Undergraduate Program Basic Course on Computational Complexity Lecture 14: IP = PSPACE David Mix Barrington and Alexis Maciel August 3, 2000 1. Overview We

More information

6.842 Randomness and Computation Lecture 5

6.842 Randomness and Computation Lecture 5 6.842 Randomness and Computation 2012-02-22 Lecture 5 Lecturer: Ronitt Rubinfeld Scribe: Michael Forbes 1 Overview Today we will define the notion of a pairwise independent hash function, and discuss its

More information

QUANTUM COMMUNICATIONS BASED ON QUANTUM HASHING. Alexander Vasiliev. Kazan Federal University

QUANTUM COMMUNICATIONS BASED ON QUANTUM HASHING. Alexander Vasiliev. Kazan Federal University QUANTUM COMMUNICATIONS BASED ON QUANTUM HASHING Alexander Vasiliev Kazan Federal University Abstract: In this paper we consider an application of the recently proposed quantum hashing technique for computing

More information

How many rounds can Random Selection handle?

How many rounds can Random Selection handle? How many rounds can Random Selection handle? Shengyu Zhang Abstract The construction of zero-knowledge proofs can be greatly simplified if the protocol is only required be secure against the honest verifier.

More information

CS151 Complexity Theory. Lecture 13 May 15, 2017

CS151 Complexity Theory. Lecture 13 May 15, 2017 CS151 Complexity Theory Lecture 13 May 15, 2017 Relationship to other classes To compare to classes of decision problems, usually consider P #P which is a decision class easy: NP, conp P #P easy: P #P

More information

An approximation algorithm for approximation rank

An approximation algorithm for approximation rank An approximation algorithm for approximation rank Troy Lee Department of Computer Science Rutgers University Adi Shraibman Department of Mathematics Weizmann Institute of Science arxiv:0809.2093v1 [cs.cc]

More information

Lecture December 2009 Fall 2009 Scribe: R. Ring In this lecture we will talk about

Lecture December 2009 Fall 2009 Scribe: R. Ring In this lecture we will talk about 0368.4170: Cryptography and Game Theory Ran Canetti and Alon Rosen Lecture 7 02 December 2009 Fall 2009 Scribe: R. Ring In this lecture we will talk about Two-Player zero-sum games (min-max theorem) Mixed

More information

THE CIS PROBLEM AND RELATED RESULTS IN GRAPH THEORY

THE CIS PROBLEM AND RELATED RESULTS IN GRAPH THEORY THE CIS PROBLEM AND RELATED RESULTS IN GRAPH THEORY RYAN ALWEISS, YANG LIU Abstract. In this survey, we will show that there are instances of the CIS problem on n vertices which cannot be solved deterministically

More information

COMMUNICATION VS. COMPUTATION

COMMUNICATION VS. COMPUTATION comput. complex. 16 (2007), 1 33 1016-3328/07/010001-33 DOI 10.1007/s00037-007-0224-y c Birkhäuser Verlag, Basel 2007 computational complexity COMMUNICATION VS. COMPUTATION Prahladh Harsha, Yuval Ishai,

More information

CS 350 Algorithms and Complexity

CS 350 Algorithms and Complexity CS 350 Algorithms and Complexity Winter 2019 Lecture 15: Limitations of Algorithmic Power Introduction to complexity theory Andrew P. Black Department of Computer Science Portland State University Lower

More information

Randomised Individual Communication Complexity

Randomised Individual Communication Complexity Randomised Individual Communication Complexity Harry Buhrman Centrum voor Wiskunde en Informatica and the University of Amsterdam. Kruislaan 413, 1098 SJ Amsterdam The Netherlands. email: buhrman@cwi.nl

More information

Randomness. What next?

Randomness. What next? Randomness What next? Random Walk Attribution These slides were prepared for the New Jersey Governor s School course The Math Behind the Machine taught in the summer of 2012 by Grant Schoenebeck Large

More information

2

2 Space-Time Tradeos for Graph Properties by Yevgeniy Dodis Submitted to the Department of Electrical Engineering and Computer Science in partial fulllment of the requirements for the degree of Master of

More information

Non-Interactive ZK:The Feige-Lapidot-Shamir protocol

Non-Interactive ZK:The Feige-Lapidot-Shamir protocol Non-Interactive ZK: The Feige-Lapidot-Shamir protocol April 20, 2009 Remainders FLS protocol Definition (Interactive proof system) A pair of interactive machines (P, V ) is called an interactive proof

More information

Direct Product Theorems for Classical Communication Complexity via Subdistribution Bounds

Direct Product Theorems for Classical Communication Complexity via Subdistribution Bounds Direct Product Theorems for Classical Communication Complexity via Subdistribution Bounds Rahul Jain U. Waterloo Hartmut Klauck Goethe-Universität Frankfurt December 17, 2007 Ashwin Nayak U. Waterloo &

More information

18.310A Final exam practice questions

18.310A Final exam practice questions 18.310A Final exam practice questions This is a collection of practice questions, gathered randomly from previous exams and quizzes. They may not be representative of what will be on the final. In particular,

More information

Notes on Space-Bounded Complexity

Notes on Space-Bounded Complexity U.C. Berkeley CS172: Automata, Computability and Complexity Handout 7 Professor Luca Trevisan April 14, 2015 Notes on Space-Bounded Complexity These are notes for CS278, Computational Complexity, scribed

More information

Lecture 20: LP Relaxation and Approximation Algorithms. 1 Introduction. 2 Vertex Cover problem. CSCI-B609: A Theorist s Toolkit, Fall 2016 Nov 8

Lecture 20: LP Relaxation and Approximation Algorithms. 1 Introduction. 2 Vertex Cover problem. CSCI-B609: A Theorist s Toolkit, Fall 2016 Nov 8 CSCI-B609: A Theorist s Toolkit, Fall 2016 Nov 8 Lecture 20: LP Relaxation and Approximation Algorithms Lecturer: Yuan Zhou Scribe: Syed Mahbub Hafiz 1 Introduction When variables of constraints of an

More information