SLIDE 1
Communication Complexity
Yassine Hamoudi June 20, 2016
Carnegie Mellon University
SLIDE 2 Two player model F : {0, 1}n × {0, 1}n → {0, 1}
Alice Bob x ∈ {0, 1}n y ∈ {0, 1}n
0, 1 channel
F(x, y) =? F(x, y) =? Number of bits communicated?
- D2 F : cost of the most efficient deterministic protocol
- R2 F : cost of the most efficient randomized protocol with error 1 3
1
SLIDE 3 Two player model F : {0, 1}n × {0, 1}n → {0, 1}
Alice Bob x ∈ {0, 1}n y ∈ {0, 1}n
0, 1 channel
F(x, y) =? F(x, y) =? Number of bits communicated?
- D2(F) : cost of the most efficient deterministic protocol
- R2(F) : cost of the most efficient randomized protocol with error 1/3
1
SLIDE 4
Two player simultaneous model
Alice Bob Referee x ∈ {0, 1}n y ∈ {0, 1}n F(x, y) =? Simultaneous communication complexity: D||
2 (F) and R|| 2 (F) 2
SLIDE 5 Number On the Forehead model
x1 x2 x3 x4 F(x1, . . . , xk) = ? NOF model:
- Player i does not see xi. Communicate by broadcasting
- Communication cost: Dk(F), Rk(F), D||
k (F) and R|| k (F) 3
SLIDE 6
Applications of Communication Complexity
Circuit complexity [HG91, BT94] Ramsey theory [CFL83] Branching programs [CFL83] Proof complexity [BPS07] Quasirandom graphs [CT93] Streaming algorithms [AMS96] Property testing [BBM12] Game theory [CS04, NS06] Data structures [MNSW95]
4
SLIDE 7
Contents
The log n barrier and composed functions Decision tree complexity and log-rank conjecture Conclusion
5
SLIDE 8
The log n barrier and composed functions
SLIDE 9 ACC0 and the log n barrier
The log n barrier: Find a function F such that D||
k (F) = ω(polylog n) when k = polylog n.
Motivations:
- ACC0 = functions computable by polysize constant-depth circuits made
- f AND, OR, NOT and MODm gates
- NEXP
ACC0 [Wil14]
ACC0 F breaks the log n barrier
HG91
F ACC0
6
SLIDE 10 ACC0 and the log n barrier
The log n barrier: Find a function F such that D||
k (F) = ω(polylog n) when k = polylog n.
Motivations:
- ACC0 = functions computable by polysize constant-depth circuits made
- f AND, OR, NOT and MODm gates
- NEXP ⊈ ACC0 [Wil14]
- Conjecture: NP ⊈ ACC0
F breaks the log n barrier
HG91
F ACC0
6
SLIDE 11 ACC0 and the log n barrier
The log n barrier: Find a function F such that D||
k (F) = ω(polylog n) when k = polylog n.
Motivations:
- ACC0 = functions computable by polysize constant-depth circuits made
- f AND, OR, NOT and MODm gates
- NEXP ⊈ ACC0 [Wil14]
- Conjecture: NP ⊈ ACC0
F breaks the log n barrier
[HG91]
= = = ⇒ F / ∈ ACC0
6
SLIDE 12
Composed functions
· · · . . .
x1,1 x1,2 x1,3 x2,1 x2,2 x2,3 xk,1 xk,2 xk,3 x1,n x2,n xk,n Player 1 (x1) Player 2 (x2) Player k (xk) n k
Given f 0 1 n t 0 1 and g 0 1 t k 0 1 : f g x1 xk
7
SLIDE 13
Composed functions
· · · · · · . . .
x1,1 x1,t x2,1 x2,t xk,1 xk,t x1,tn x2,tn xk,tn Player 1 (x1) Player 2 (x2) Player k (xk) t k g g f
Given f : {0, 1}n/t → {0, 1} and g : {0, 1}t·k → {0, 1}: f ◦ g(x1, . . . , xk)
7
SLIDE 14 Prior work
Symmetric function = invariant under any permutation of the input When k polylog n:
AND1 log2 n [Gro94]
Sym1 log3 n [BGKL04]
Any1 log3 n [ACFN15]
Anyt polylogn for t log log n [CS14] Our result:
k Sym
Symt polylogn for constant t
8
SLIDE 15 Prior work
Symmetric function = invariant under any permutation of the input When k = polylog n:
( log2 n ) [Gro94]
k (Sym ◦ Sym1)
= O ( log3 n ) [BGKL04]
k (Sym ◦ Any1)
= O ( log3 n ) [ACFN15]
= O (polylogn) for t ≤ log log n [CS14] Our result:
k Sym
Symt polylogn for constant t
8
SLIDE 16 Prior work
Symmetric function = invariant under any permutation of the input When k = polylog n:
( log2 n ) [Gro94]
k (Sym ◦ Sym1)
= O ( log3 n ) [BGKL04]
k (Sym ◦ Any1)
= O ( log3 n ) [ACFN15]
= O (polylogn) for t ≤ log log n [CS14] Our result:
k (Sym ◦ Symt) = O (polylogn) for constant t 8
SLIDE 17
Proof sketch
Symmetric f and g with t = 2:
g g g f
· · ·
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
yi1 i2 i3 # columns with exactly i1 occurrences of 1, i2 of 2 and i3 of 3 Recovering the yi1 i2 i3’s is enough since f and g are symmetric
9
SLIDE 18
Proof sketch
Symmetric f and g with t = 2:
g g g f
· · ·
1 2 2 3 2 1 1 1 3 1 1 1 2 3 2 1 2 1 2 1 1 2 1 2 3 3 1 1 2
yi1 i2 i3 # columns with exactly i1 occurrences of 1, i2 of 2 and i3 of 3 Recovering the yi1 i2 i3’s is enough since f and g are symmetric
9
SLIDE 19
Proof sketch
Symmetric f and g with t = 2:
g g g f
· · ·
1 2 2 3 2 1 1 1 3 1 1 1 2 3 2 1 2 1 2 1 1 2 1 2 3 3 1 1 2
yi1,i2,i3 = # columns with exactly i1 occurrences of 1, i2 of 2 and i3 of 3 Recovering the yi1 i2 i3’s is enough since f and g are symmetric
9
SLIDE 20
Proof sketch
Symmetric f and g with t = 2:
g g g f
· · ·
1 2 2 3 2 1 1 1 3 1 1 1 2 3 2 1 2 1 2 1 1 2 1 2 3 3 1 1 2
yi1,i2,i3 = # columns with exactly i1 occurrences of 1, i2 of 2 and i3 of 3 → y0,0,0 = 1 Recovering the yi1 i2 i3’s is enough since f and g are symmetric
9
SLIDE 21
Proof sketch
Symmetric f and g with t = 2:
g g g f
· · ·
1 2 2 3 2 1 1 1 3 1 1 1 2 3 2 1 2 1 2 1 1 2 1 2 3 3 1 1 2
yi1,i2,i3 = # columns with exactly i1 occurrences of 1, i2 of 2 and i3 of 3 → y0,0,0 = 1, y1,0,0 = 2 Recovering the yi1 i2 i3’s is enough since f and g are symmetric
9
SLIDE 22
Proof sketch
Symmetric f and g with t = 2:
g g g f
· · ·
1 2 2 3 2 1 1 1 3 1 1 1 2 3 2 1 2 1 2 1 1 2 1 2 3 3 1 1 2
yi1,i2,i3 = # columns with exactly i1 occurrences of 1, i2 of 2 and i3 of 3 → y0,0,0 = 1, y1,0,0 = 2, y0,4,1 = 0, . . . Recovering the yi1 i2 i3’s is enough since f and g are symmetric
9
SLIDE 23
Proof sketch
Symmetric f and g with t = 2:
g g g f
· · ·
1 2 2 3 2 1 1 1 3 1 1 1 2 3 2 1 2 1 2 1 1 2 1 2 3 3 1 1 2
yi1,i2,i3 = # columns with exactly i1 occurrences of 1, i2 of 2 and i3 of 3 → y0,0,0 = 1, y1,0,0 = 2, y0,4,1 = 0, . . . Recovering the yi1,i2,i3’s is enough since f and g are symmetric
9
SLIDE 24 Proof sketch
1 2 2 3 2 1 1 1 3 1 1 1 2 3 2 1 2 1 2 1 1 2 1 2 3 3 1 1 2
- Player 1 sends to the referee:
a1
i1,i2,i3 = # columns he sees with i1 occurrences of 1, i2 of 2 and i3 of 3
→ a1
0,0,0 = 2, a1 1,0,0 = 1, a1 2,1,1 = 1, . . .
- Players 2 to 5 do the same
10
SLIDE 25 Proof sketch
1 2 2 3 2 1 1 1 3 1 1 1 2 3 2 1 2 1 2 1 1 2 1 2 3 3 1 1 2
- Player 1 sends to the referee:
a1
i1,i2,i3 = # columns he sees with i1 occurrences of 1, i2 of 2 and i3 of 3
→ a1
0,0,0 = 2, a1 1,0,0 = 1, a1 2,1,1 = 1, . . .
- Players 2 to 5 do the same
10
SLIDE 26
Proof sketch
The referee computes: bi1,i2,i3 = a1
i1,i2,i3 + · · · + a5 i1,i2,i3
It verifies: yi1 i2 i3 yi1 i2 i3 n k i1 i2 i3 yi1 i2 i3 i1 1 yi1
1 i2 i3
i2 1 yi1 i2
1 i3
i3 1 yi1 i2 i3
1
bi1 i2 i3 Theorem If k 52t log n then it admits exactly one integral solution. the referee recovers the yi1 i2 i3’s and computes the output
11
SLIDE 27
Proof sketch
The referee computes: bi1,i2,i3 = a1
i1,i2,i3 + · · · + a5 i1,i2,i3
It verifies: yi1,i2,i3 ≥ 0 yi1 i2 i3 n k i1 i2 i3 yi1 i2 i3 i1 1 yi1
1 i2 i3
i2 1 yi1 i2
1 i3
i3 1 yi1 i2 i3
1
bi1 i2 i3 Theorem If k 52t log n then it admits exactly one integral solution. the referee recovers the yi1 i2 i3’s and computes the output
11
SLIDE 28
Proof sketch
The referee computes: bi1,i2,i3 = a1
i1,i2,i3 + · · · + a5 i1,i2,i3
It verifies: yi1,i2,i3 ≥ 0 ∑ yi1,i2,i3 = n k i1 i2 i3 yi1 i2 i3 i1 1 yi1
1 i2 i3
i2 1 yi1 i2
1 i3
i3 1 yi1 i2 i3
1
bi1 i2 i3 Theorem If k 52t log n then it admits exactly one integral solution. the referee recovers the yi1 i2 i3’s and computes the output
11
SLIDE 29
Proof sketch
The referee computes: bi1,i2,i3 = a1
i1,i2,i3 + · · · + a5 i1,i2,i3
It verifies: yi1,i2,i3 ≥ 0 ∑ yi1,i2,i3 = n (k − (i1 + i2 + i3))yi1,i2,i3 + (i1 + 1)yi1+1,i2,i3 +(i2 + 1)yi1,i2+1,i3 + (i3 + 1)yi1,i2,i3+1 = bi1,i2,i3 Theorem If k 52t log n then it admits exactly one integral solution. the referee recovers the yi1 i2 i3’s and computes the output
11
SLIDE 30
Proof sketch
The referee computes: bi1,i2,i3 = a1
i1,i2,i3 + · · · + a5 i1,i2,i3
It verifies: yi1,i2,i3 ≥ 0 ∑ yi1,i2,i3 = n (k − (i1 + i2 + i3))yi1,i2,i3 + (i1 + 1)yi1+1,i2,i3 +(i2 + 1)yi1,i2+1,i3 + (i3 + 1)yi1,i2,i3+1 = bi1,i2,i3 Theorem If k ≥ 52t log n then it admits exactly one integral solution. → the referee recovers the yi1,i2,i3’s and computes the output
11
SLIDE 31
Decision tree complexity and log-rank conjecture
SLIDE 32
Log-rank conjecture
F : {0, 1}n × {0, 1}n → {0, 1} Proposition ([MS82]) Let MF ∈ {0, 1}n×n be the communication matrix: MF(x, y) = F(x, y). log rank MF ≤ D2(F) Conjecture For some absolute constant c: log rank MF D2 F logc rank MF
12
SLIDE 33
Log-rank conjecture
F : {0, 1}n × {0, 1}n → {0, 1} Proposition ([MS82]) Let MF ∈ {0, 1}n×n be the communication matrix: MF(x, y) = F(x, y). log rank MF ≤ D2(F) Conjecture For some absolute constant c: log rank MF ≤ D2(F) ≤ logc rank MF
12
SLIDE 34 XOR and AND functions
- A function F : {0, 1}n × {0, 1}n → {0, 1} is an XOR function if:
F(x, y) = f(x ⊕ y) for some f : {0, 1}n → {0, 1}
0 1 n 0 1 n 0 1 is an AND function if: F x y f x y Examples: Equality x y NOR x y , Hammingd x y GAPd x y , Disjointness x y NOR x y , InnerProduct x y MOD2 x y , etc. Interests:
- For XOR functions: rank MF
mon f [BC99]
- For AND functions: rank MF
mon f [BdW01]
- Connections with Decision Tree complexity
13
SLIDE 35 XOR and AND functions
- A function F : {0, 1}n × {0, 1}n → {0, 1} is an XOR function if:
F(x, y) = f(x ⊕ y) for some f 0 1 n 0 1
- A function F : {0, 1}n × {0, 1}n → {0, 1} is an AND function if:
F(x, y) = f(x ∧ y) Examples: Equality x y NOR x y , Hammingd x y GAPd x y , Disjointness x y NOR x y , InnerProduct x y MOD2 x y , etc. Interests:
- For XOR functions: rank MF
mon f [BC99]
- For AND functions: rank MF
mon f [BdW01]
- Connections with Decision Tree complexity
13
SLIDE 36 XOR and AND functions
- A function F : {0, 1}n × {0, 1}n → {0, 1} is an XOR function if:
F(x, y) = f(x ⊕ y) for some f 0 1 n 0 1
- A function F : {0, 1}n × {0, 1}n → {0, 1} is an AND function if:
F(x, y) = f(x ∧ y) Examples: Equality(x, y) = NOR(x ⊕ y), Hammingd(x, y) = GAPd(x ⊕ y), Disjointness(x, y) = NOR(x ∧ y), InnerProduct(x, y) = MOD2(x ∧ y), etc. Interests:
- For XOR functions: rank MF
mon f [BC99]
- For AND functions: rank MF
mon f [BdW01]
- Connections with Decision Tree complexity
13
SLIDE 37 XOR and AND functions
- A function F : {0, 1}n × {0, 1}n → {0, 1} is an XOR function if:
F(x, y) = f(x ⊕ y) for some f 0 1 n 0 1
- A function F : {0, 1}n × {0, 1}n → {0, 1} is an AND function if:
F(x, y) = f(x ∧ y) Examples: Equality(x, y) = NOR(x ⊕ y), Hammingd(x, y) = GAPd(x ⊕ y), Disjointness(x, y) = NOR(x ∧ y), InnerProduct(x, y) = MOD2(x ∧ y), etc. Interests:
- For XOR functions: rank MF = mon f
[BC99]
- For AND functions: rank MF = mon⋆ f [BdW01]
- Connections with Decision Tree complexity
13
SLIDE 38
Decision tree complexity
A decision tree is an ordered tree where each internal node is labeled with a query, and each leaf is labeled with 0 or 1. x3 x2 x1 x1 x2 1 1 1
14
SLIDE 39
Decision tree complexity
A decision tree is an ordered tree where each internal node is labeled with a query, and each leaf is labeled with 0 or 1. x3 x2 x1 x1 x2 1 1 1 Input: x1x2x3 = 011 on a regular decision tree DT(f), RDT(f) and QDT(f)
14
SLIDE 40
Decision tree complexity
A decision tree is an ordered tree where each internal node is labeled with a query, and each leaf is labeled with 0 or 1. x1 ⊕ x2 ⊕ x3 x2 x1 ⊕ x2 x2 ⊕ x3 x2 1 1 1 Input: x1x2x3 = 011 on a parity decision tree DT⊕(f), RDT⊕(f) and QDT⊕(f)
14
SLIDE 41
Decision tree complexity
A decision tree is an ordered tree where each internal node is labeled with a query, and each leaf is labeled with 0 or 1. x2 ∧ x3 x1 ∧ x3 x1 x2 x1 ∧ x3 1 1 1 Input: x1x2x3 = 011 on a conjunctive decision tree DT∧(f), RDT∧(f) and QDT∧(f)
14
SLIDE 42 Connections
Proposition ([ZS10]) For any XOR function F(x, y) = f(x ⊕ y): D2(F) ≤ 2 · DT⊕(f) For any AND function F(x, y) = f(x ∧ y): D2(F) ≤ 2 · DT∧(f) Conjecture
- Communication and Decision Tree complexities are polynomially related
- Log-rank conjecture for decision trees:
- XOR function: log mon f
D2 F 2 DT f logc mon f
f D2 F 2 DT f logc mon f
15
SLIDE 43 Connections
Proposition ([ZS10]) For any XOR function F(x, y) = f(x ⊕ y): D2(F) ≤ 2 · DT⊕(f) For any AND function F(x, y) = f(x ∧ y): D2(F) ≤ 2 · DT∧(f) Conjecture
- Communication and Decision Tree complexities are polynomially related
- Log-rank conjecture for decision trees:
- XOR function: log mon f
D2 F 2 DT f logc mon f
f D2 F 2 DT f logc mon f
15
SLIDE 44 Connections
Proposition ([ZS10]) For any XOR function F(x, y) = f(x ⊕ y): D2(F) ≤ 2 · DT⊕(f) For any AND function F(x, y) = f(x ∧ y): D2(F) ≤ 2 · DT∧(f) Conjecture
- Communication and Decision Tree complexities are polynomially related
- Log-rank conjecture for decision trees:
- XOR function: log mon(f) ≤ D2(F) ≤ 2 · DT⊕(f) ≤ logc mon(f)
- AND function: log mon⋆(f) ≤ D2(F) ≤ 2 · DT∧(f) ≤ logc mon⋆(f)
15
SLIDE 45 Symmetric XOR and AND functions
Communication complexity1 of (nontrivial) XOR and AND functions, for symmetric f: XOR functions AND functions Deterministic Θ (n) Θ ( (n − t(f)) ( 1 + log
n n−t(f)
)) Randomized Θ (r(f)) Θ† ( (n − t(f)) ( 1 + log
n n−t(f)
)) Quantum Θ (r(f)) Θ⋆ (√ n · ℓ0(f) + ℓ1(f) )
1[ZS09, BdW01, Raz03]
16
SLIDE 46 Symmetric functions
Decision tree complexities2 of (nontrivial) symmetric functions: Regular Parity Conjunctive Deterministic Θ (n) Θ (n) Θ ( (n − t(f)) ( 1 + log
n n−t(f)
)) Randomized Θ (n) Θ (r(f)) Θ† ( (n − t(f)) ( 1 + log
n n−t(f)
)) Quantum Θ (√ n · ℓ(f) ) Θ (r(f)) Θ⋆ (√ n · ℓ0(f) + ℓ1(f) ) Result: Communication and Decision Tree complexities are polynomially related for symmetric functions.
2[ZS09, BdW01, Raz03, BBC+01]
17
SLIDE 47 Symmetric functions
Decision tree complexities2 of (nontrivial) symmetric functions: Regular Parity Conjunctive Deterministic Θ (n) Θ (n) Θ ( (n − t(f)) ( 1 + log
n n−t(f)
)) Randomized Θ (n) Θ (r(f)) Θ† ( (n − t(f)) ( 1 + log
n n−t(f)
)) Quantum Θ (√ n · ℓ(f) ) Θ (r(f)) Θ⋆ (√ n · ℓ0(f) + ℓ1(f) ) Result: Communication and Decision Tree complexities are polynomially related for symmetric functions.
2[ZS09, BdW01, Raz03, BBC+01]
17
SLIDE 48
Conclusion
SLIDE 49 Our contributions:
- first efficient simultaneous protocol for Sym ◦ Symt
- full characterization of the decision tree complexities of symmetric
functions
- efficient construction for Ramsey numbers over Fn
p
Future work:
- other protocols for larger families of composed functions
- breaking the log n barrier
- log-rank conjecture for XOR and AND functions (using decision tree
complexity?)
18
SLIDE 50 Our contributions:
- first efficient simultaneous protocol for Sym ◦ Symt
- full characterization of the decision tree complexities of symmetric
functions
- efficient construction for Ramsey numbers over Fn
p
Future work:
- other protocols for larger families of composed functions
- breaking the log n barrier
- log-rank conjecture for XOR and AND functions (using decision tree
complexity?)
18
SLIDE 51 References I
Anil Ada, Arkadev Chattopadhyay, Omar Fawzi, and Phuong Nguyen. The NOF multiparty communication complexity of composed functions. Computational Complexity, 24(3):645–694, 2015. Noga Alon, Yossi Matias, and Mario Szegedy. The space complexity of approximating the frequency moments. In Proceedings of the Twenty-eighth Annual ACM Symposium on Theory
- f Computing, STOC ’96, pages 20–29, New York, NY, USA, 1996. ACM.
Robert Beals, Harry Buhrman, Richard Cleve, Michele Mosca, and Ronald de Wolf. Quantum lower bounds by polynomials.
- J. ACM, 48(4):778–797, July 2001.
Eric Blais, Joshua Brody, and Kevin Matulef. Property testing lower bounds via communication complexity. computational complexity, 21(2):311–358, 2012.
19
SLIDE 52
References II
Anna Bernasconi and Bruno Codenotti. Spectral analysis of boolean functions as a graph eigenvalue problem. IEEE Transactions on Computers, 48(3):345–351, 1999. Harry Buhrman and Ronald de Wolf. Communication complexity lower bounds by polynomials. In Proceedings of the 16th Annual Conference on Computational Complexity, CCC ’01, pages 120–, Washington, DC, USA, 2001. IEEE Computer Society. László Babai, Anna Gál, Peter G. Kimmel, and Satyanarayana V. Lokam. Communication complexity of simultaneous messages. SIAM J. Comput., 33(1):137–166, January 2004. László Babai, Peter G. Kimmel, and Satyanarayana V. Lokam. Simultaneous messages vs. communication, pages 361–372. Springer Berlin Heidelberg, Berlin, Heidelberg, 1995.
20
SLIDE 53
References III
Paul Beame, Toniann Pitassi, and Nathan Segerlind. Lower bounds for Lovász–Schrijver systems and beyond follow from multiparty communication complexity. SIAM J. Comput., 37(3):845–869, 2007. Richard Beigel and Jun Tarui. On ACC. Computational Complexity, 4(4):350–366, 1994. Ashok K. Chandra, Merrick L. Furst, and Richard J. Lipton. Multi-party protocols. In Proceedings of the Fifteenth Annual ACM Symposium on Theory of Computing, STOC ’83, pages 94–99, New York, NY, USA, 1983. ACM. Vincent Conitzer and Tuomas Sandholm. Communication complexity as a lower bound for learning in games. In Proceedings of the Twenty-first International Conference on Machine Learning, ICML ’04, pages 24–, New York, NY, USA, 2004. ACM.
21
SLIDE 54 References IV
Arkadev Chattopadhyay and Michael E. Saks. The power of super-logarithmic number of players. In Klaus Jansen, José D. P. Rolim, Nikhil R. Devanur, and Cristopher Moore, editors, Approximation, Randomization, and Combinatorial
- Optimization. Algorithms and Techniques (APPROX/RANDOM 2014),
volume 28 of Leibniz International Proceedings in Informatics (LIPIcs), pages 596–603, Dagstuhl, Germany, 2014. Schloss Dagstuhl–Leibniz-Zentrum fuer Informatik. Fan R. K. Chung and Prasad Tetali. Communication complexity and quasi randomness. SIAMJDiscreteMath, 6(1):110–123, 1993. Ben Green. Finite field models in additive combinatorics. In Bridget S. Webb, editor, Surveys in Combinatorics 2005, pages 1–28. Cambridge University Press, 2005.
Cambridge Books Online.
22
SLIDE 55 References V
Vince Grolmusz. The BNS lower bound for multi-party protocols is nearly optimal. Information and Computation, 112:51–54, 1994. Johan Håstad and Mikael Goldmann. On the power of small-depth threshold circuits. Computational Complexity, 1(2):113–129, 1991. Michael T. Lacey and William McClain. On an argument of Shkredov on two-dimensional corners. Online Journal of Analytic Combinatorics, 2007. Peter Bro Miltersen, Noam Nisan, Shmuel Safra, and Avi Wigderson. On data structures and asymmetric communication complexity. In Proceedings of the Twenty-seventh Annual ACM Symposium on Theory
- f Computing, STOC ’95, pages 103–111, New York, NY, USA, 1995. ACM.
23
SLIDE 56 References VI
Kurt Mehlhorn and Erik M. Schmidt. Las Vegas is better than determinism in VLSI and distributed computing. In Proceedings of the Fourteenth Annual ACM Symposium on Theory of Computing, STOC ’82, pages 330–337, New York, NY, USA, 1982. ACM. Noam Nisan and Ilya Segal. The communication requirements of efficient allocations and supporting prices. Journal of Economic Theory, 129:192–224, 2006. A A Razborov. Quantum communication complexity of symmetric predicates. Izvestiya: Mathematics, 67(1):145, 2003. Ryan Williams. Nonuniform acc circuit lower bounds.
- J. ACM, 61(1):2:1–2:32, January 2014.
24
SLIDE 57 References VII
Andrew Chi-Chih Yao. On ACC and threshold circuits. In 31st Annual Symposium on Foundations of Computer Science, St. Louis, Missouri, USA, October 22-24, 1990, Volume II, pages 619–627, 1990. Zhiqiang Zhang and Yaoyun Shi. Communication complexities of symmetric XOR functions. Quantum Info. Comput., 9(3):255–263, March 2009. Zhiqiang Zhang and Yaoyun Shi. On the parity complexity measures of boolean functions.
- Theor. Comput. Sci., 411(26-28):2612–2618, June 2010.
25
SLIDE 58 Equality function
Equality(x1, . . . , xk) = 1 ⇔ x1 = · · · = xk D2(Equality) = Ω(n)
R||
2 (Equality) = O (1)
- Alice and Bob test x · r = y · r mod 2 for two random r ∈ {0, 1}n
D||
k (Equality) = O (1) when k > 2
- Player 1 checks x2 = · · · = xk
- Player 2 checks x1 = x3 = · · · = xk
26
SLIDE 59 ACC0 and Sym+
Sym+(s, k) = depth-2 circuits whose top gate is a symmetric gate of fan-in s, and each bottom gate is an AND gate of fan-in k SYM AND AND · · ·
s k k
- ACC0 ⊂ SYM+(2polylog n, polylog n) [Yao90, BT94]
- f is computed by a SYM+(s, k − 1) circuit ⇒ for any partition of the input
between k players, there is a protocol of cost O (k log s) computing f
27
SLIDE 60 Symmetric XOR and AND functions
F(x, y) = f(x ⊕ y) is symmetric iff f is symmetric f x depends only on x . Hence f n 0 1
min p f p 1 f p
min p n 2 f i f n 2 for i p n 2
min p n 2 f i f n 2 for i n 2 n p
min p f i f i 1 for i p n p 1
min p f i f i 2 for i p n p 2
28
SLIDE 61 Symmetric XOR and AND functions
F(x, y) = f(x ⊕ y) is symmetric iff f is symmetric → f(x) depends only on |x|. Hence f : {0, . . . , n} → {0, 1}
min p f p 1 f p
min p n 2 f i f n 2 for i p n 2
min p n 2 f i f n 2 for i n 2 n p
min p f i f i 1 for i p n p 1
min p f i f i 2 for i p n p 2
28
SLIDE 62 Symmetric XOR and AND functions
F(x, y) = f(x ⊕ y) is symmetric iff f is symmetric → f(x) depends only on |x|. Hence f : {0, . . . , n} → {0, 1}
= min{p : f(p − 1) ̸= f(p)}
- ℓ0(f) = min{p ≤ n/2 : f(i) = f(n/2) for i ∈ [p, n/2]}
- ℓ1(f) = min{p ≤ n/2 : f(i) = f(n/2) for i ∈ [n/2, n − p]}
- ℓ(f) = min{p : f(i) = f(i + 1) for i ∈ [p, n − p − 1]}
- r(f)
= min{p : f(i) = f(i + 2) for i ∈ [p, n − p − 2]}
28
SLIDE 63
Ramsey numbers and EvalG
SLIDE 64 EvalG
For any Abelian group G and x1, . . . , xk ∈ G: EvalG(x1, . . . , xk) = 1 ⇔ x1 + · · · + xk = 0 Communication complexity:
1 since x1 xk x1 x2 xk
connections to Ramsey theory
29
SLIDE 65 EvalG
For any Abelian group G and x1, . . . , xk ∈ G: EvalG(x1, . . . , xk) = 1 ⇔ x1 + · · · + xk = 0 Communication complexity:
k (EvalG) = O (1) since
x1 + · · · + xk = 0 ⇔ x1 = −(x2 · · · + xk)
- Dk(EvalG) → connections to Ramsey theory
29
SLIDE 66 Ramsey numbers
k-dimensional corner in Gk: (x1, x2, . . . , xk), (x1 + λ, x2, . . . , xk), (x1, x2 + λ, . . . , xk), . . . , (x1, x2, . . . , xk + λ) Ramsey numbers:
- ck G = min # of colors to avoid monochromatic k-dim corner in Gk
- rk G = size of largest subset of Gk without any k-dim corner
Chandra, Furst and Lipton [CFL83]: log ck G Dk
1 EvalG
k log ck G
30
SLIDE 67 Ramsey numbers
k-dimensional corner in Gk: (x1, x2, . . . , xk), (x1 + λ, x2, . . . , xk), (x1, x2 + λ, . . . , xk), . . . , (x1, x2, . . . , xk + λ) Ramsey numbers:
k (G) = min # of colors to avoid monochromatic k-dim corner in Gk
k (G) = size of largest subset of Gk without any k-dim corner
Chandra, Furst and Lipton [CFL83]: log ck G Dk
1 EvalG
k log ck G
30
SLIDE 68 Ramsey numbers
k-dimensional corner in Gk: (x1, x2, . . . , xk), (x1 + λ, x2, . . . , xk), (x1, x2 + λ, . . . , xk), . . . , (x1, x2, . . . , xk + λ) Ramsey numbers:
k (G) = min # of colors to avoid monochromatic k-dim corner in Gk
k (G) = size of largest subset of Gk without any k-dim corner
Chandra, Furst and Lipton [CFL83]: log(c∠
k (G)) ≤ Dk+1(EvalG) ≤ k + log(c∠ k (G)) 30
SLIDE 69
Connections
Chandra, Furst and Lipton [CFL83]: log(c∠
k (G)) ≤ Dk+1(EvalG) ≤ k + log(c∠ k (G)) 31
SLIDE 70 Ramsey numbers and EvalFn
p
Motivations for G = Fn
p:
- the proofs are easier and cleaner
- they can be adapted to any other group [Gre05]
- EvalFn
p ∈ Sym ◦ Symp
Prior work:
p
1 [LM07]
n 2
2n 2k
2nk
1
[ACFN15]
- an explicit large corner free set over
n 2 [ACFN15]
n p
2
p log2 n p p log n when k
1 p log 3n [CS14] Our result:
- the first explicit large corner-free set over
n p, of size pnk Ck2 pk
k2
32
SLIDE 71 Ramsey numbers and EvalFn
p
Motivations for G = Fn
p:
- the proofs are easier and cleaner
- they can be adapted to any other group [Gre05]
- EvalFn
p ∈ Sym ◦ Symp
Prior work:
p) = ω(1) [LM07]
k (Fn 2) ≤ O
( 2n/2k−2nk+1) [ACFN15]
- an explicit large corner free set over Fn
2 [ACFN15]
k (Fn p) ≤ 2O(p log2 n)pO(p log n) when k > 1 + p log(3n) [CS14]
Our result:
- the first explicit large corner-free set over
n p, of size pnk Ck2 pk
k2
32
SLIDE 72 Ramsey numbers and EvalFn
p
Motivations for G = Fn
p:
- the proofs are easier and cleaner
- they can be adapted to any other group [Gre05]
- EvalFn
p ∈ Sym ◦ Symp
Prior work:
p) = ω(1) [LM07]
k (Fn 2) ≤ O
( 2n/2k−2nk+1) [ACFN15]
- an explicit large corner free set over Fn
2 [ACFN15]
k (Fn p) ≤ 2O(p log2 n)pO(p log n) when k > 1 + p log(3n) [CS14]
Our result:
- the first explicit large corner-free set over Fn
p, of size pnk Ck2 pk+k2 32
SLIDE 73 Results
Our contribution: the first explicit large corner-free set in Fn
p
Definitions:
n p k is seen as a k
n matrix over
p
Hamming distance between columns c and cj
number of columns at distance i to c in M For any c
k p, Nk
0 and N0 Nk
1
0 such that
k i 0 Ni
n: Sk
c
M
n p k
i k ni c M Ni is a corner-free set. If k
log n log 1
1 p 1
and Ni
k i p 1 i pk
n then Sk
c pnk Ck2 pk
k2
33
SLIDE 74 Results
Our contribution: the first explicit large corner-free set in Fn
p
Definitions:
p)k is seen as a k × n matrix over Fp
- d(c, cj) = Hamming distance between columns c and cj
- ni,c(M) = number of columns at distance i to c in M
For any c
k p, Nk
0 and N0 Nk
1
0 such that
k i 0 Ni
n: Sk
c
M
n p k
i k ni c M Ni is a corner-free set. If k
log n log 1
1 p 1
and Ni
k i p 1 i pk
n then Sk
c pnk Ck2 pk
k2
33
SLIDE 75 Results
Our contribution: the first explicit large corner-free set in Fn
p
Definitions:
p)k is seen as a k × n matrix over Fp
- d(c, cj) = Hamming distance between columns c and cj
- ni,c(M) = number of columns at distance i to c in M
For any c ∈ Fk
p, Nk = 0 and N0, . . . , Nk−1 ≥ 0 such that ∑k i=0 Ni = n:
Sk
c = {M ∈ (Fn p)k : ∀i ∈ {0, . . . , k}, ni,c(M) = Ni}
is a corner-free set. If k
log n log 1
1 p 1
and Ni
k i p 1 i pk
n then Sk
c pnk Ck2 pk
k2
33
SLIDE 76 Results
Our contribution: the first explicit large corner-free set in Fn
p
Definitions:
p)k is seen as a k × n matrix over Fp
- d(c, cj) = Hamming distance between columns c and cj
- ni,c(M) = number of columns at distance i to c in M
For any c ∈ Fk
p, Nk = 0 and N0, . . . , Nk−1 ≥ 0 such that ∑k i=0 Ni = n:
Sk
c = {M ∈ (Fn p)k : ∀i ∈ {0, . . . , k}, ni,c(M) = Ni}
is a corner-free set. If k ≥ ⌈
log n log ( 1+
1 p−1
)
⌉ and Ni = ⌊(k
i
) (p−1)i
pk
n ⌋ then |Sk
c| ≥ pnk Ck2 pk+k2 33
SLIDE 77
The log n barrier and composed functions
SLIDE 78
Composed functions
Given f : {0, 1}n → {0, 1} and − → g = (g1, . . . , gn) where gi : {0, 1}k → {0, 1}: f ◦ − → g (x1, . . . , xk) = f(. . . , gi(x1,i, . . . , xk,i), . . . ) · · · . . .
x1,1 x1,2 x1,3 x2,1 x2,2 x2,3 xk,1 xk,2 xk,3 x1,n x2,n xk,n Player 1 (x1) Player 2 (x2) Player k (xk) n k g1 g2 g3 gn f
34
SLIDE 79 Composed functions
Definitions:
- f ◦ g if g1 = · · · = gn
- Symmetric = invariant under any permutation of the input
- Any ◦ −
− → Any, Any ◦ Any, Sym ◦ − − → Any, Sym ◦ Sym... Motivations:
- very simple structure
- most of the important functions: GIP
MOD2 AND Sym Sym, MAJ MAJ Sym Sym, DISJ NOR AND Sym Sym
- major open problems still unknown for composed functions
35
SLIDE 80 Composed functions
Definitions:
- f ◦ g if g1 = · · · = gn
- Symmetric = invariant under any permutation of the input
- Any ◦ −
− → Any, Any ◦ Any, Sym ◦ − − → Any, Sym ◦ Sym... Motivations:
- very simple structure
- most of the important functions: GIP = MOD2 ◦ AND ∈ Sym ◦ Sym,
MAJ ◦ MAJ ∈ Sym ◦ Sym, DISJ = NOR ◦ AND ∈ Sym ◦ Sym
- major open problems still unknown for composed functions
35
SLIDE 81 Prior work
Conjecture ([BKL95]): MAJ ◦ MAJ breaks the log n barrier When k log n :
g log2 n for f g Sym AND [Gro94]
g log3 n for f g Sym Comp [BGKL04]
g log3 n for f g Sym Any [ACFN15] none of the functions in Sym Any can break the log n barrier
36
SLIDE 82 Prior work
Conjecture ([BKL95]): MAJ ◦ MAJ breaks the log n barrier When k = Ω(log n):
( log2 n ) for f ◦ g ∈ Sym ◦ AND [Gro94]
k (f ◦ g) = O
( log3 n ) for f ◦ g ∈ Sym ◦ Comp [BGKL04]
k (f ◦ −
→ g ) = O ( log3 n ) for f ◦ − → g ∈ Sym ◦ − − → Any [ACFN15] none of the functions in Sym Any can break the log n barrier
36
SLIDE 83 Prior work
Conjecture ([BKL95]): MAJ ◦ MAJ breaks the log n barrier When k = Ω(log n):
( log2 n ) for f ◦ g ∈ Sym ◦ AND [Gro94]
k (f ◦ g) = O
( log3 n ) for f ◦ g ∈ Sym ◦ Comp [BGKL04]
k (f ◦ −
→ g ) = O ( log3 n ) for f ◦ − → g ∈ Sym ◦ − − → Any [ACFN15] → none of the functions in Sym ◦ − − → Any can break the log n barrier
36
SLIDE 84 Composed functions of block-width t
· · · · · · . . .
x1,1 x1,t x2,1 x2,t xk,1 xk,t x1,tn x2,tn xk,tn Player 1 (x1) Player 2 (x2) Player k (xk) t · n k g1 gn f
0 1 k t 0 1
MAJ
n breaks the barrier 37
SLIDE 85 Composed functions of block-width t
· · · · · · . . .
x1,1 x1,t x2,1 x2,t xk,1 xk,t x1,tn x2,tn xk,tn Player 1 (x1) Player 2 (x2) Player k (xk) t · n k g1 gn f
- MAJt : {0, 1}k·t → {0, 1}
- Conjecture : MAJ ◦ MAJ√n breaks the barrier
37
SLIDE 86
Composed functions of block-width t {0, 1}t ∼ F2t
· · · · · · . . .
x1,1 x1,t x2,1 x2,t xk,1 xk,t x1,tn x2,tn xk,tn Player 1 (x1) Player 2 (x2) Player k (xk) t · n k g1 gn f
Given f 0 1 n 0 1 and g g1 gn where gi
k p
0 1 : f g x1 xk f gi x1 i xk i Any Anyp Any Anyp Sym Anyp
38
SLIDE 87
Composed functions of block-width t
F2t
· · · . . .
x1,1 x1,2 x1,3 x2,1 x2,2 x2,3 xk,1 xk,2 xk,3 x1,n x2,n xk,n Player 1 (x1) Player 2 (x2) Player k (xk) n k g1 g2 g3 gn f
Given f 0 1 n 0 1 and g g1 gn where gi
k p
0 1 : f g x1 xk f gi x1 i xk i Any Anyp Any Anyp Sym Anyp
38
SLIDE 88
Composed functions of block-width t
F2t
· · · . . .
x1,1 x1,2 x1,3 x2,1 x2,2 x2,3 xk,1 xk,2 xk,3 x1,n x2,n xk,n Player 1 (x1) Player 2 (x2) Player k (xk) n k g1 g2 g3 gn f
Given f : {0, 1}n → {0, 1} and − → g = (g1, . . . , gn) where gi : Fk
p → {0, 1}:
f ◦ − → g (x1, . . . , xk) = f(. . . , gi(x1,i, . . . , xk,i), . . . ) → Any ◦ − − → Anyp, Any ◦ Anyp, Sym ◦ Anyp, . . .
38
SLIDE 89 Prior work
Conjecture: MAJ ◦ MAJ√
log n breaks the log n barrier
When k polylog n :
g log3 n for f g Sym Any2 [ACFN15]
g polylogn for f g Sym Anyp and p polylog n [CS14] New results for constant p:
g polylogn for f g Sym Symp (k polylog n)
g polylogn for f g Sym Compp (k polylog n)
MAJt cannot break the barrier for constant t
39
SLIDE 90 Prior work
Conjecture: MAJ ◦ MAJ√
log n breaks the log n barrier
When k = Ω(polylog n):
k (f ◦ −
→ g ) = O ( log3 n ) for f ◦ − → g ∈ Sym ◦ − − → Any2 [ACFN15]
- Dk(f ◦ g) = O (polylogn) for f ◦ g ∈ Sym ◦ −
− → Anyp and p ≤ polylog n [CS14] New results for constant p:
g polylogn for f g Sym Symp (k polylog n)
g polylogn for f g Sym Compp (k polylog n)
MAJt cannot break the barrier for constant t
39
SLIDE 91 Prior work
Conjecture: MAJ ◦ MAJ√
log n breaks the log n barrier
When k = Ω(polylog n):
k (f ◦ −
→ g ) = O ( log3 n ) for f ◦ − → g ∈ Sym ◦ − − → Any2 [ACFN15]
- Dk(f ◦ g) = O (polylogn) for f ◦ g ∈ Sym ◦ −
− → Anyp and p ≤ polylog n [CS14] New results for constant p:
k (f ◦ g) = O (polylogn) for f ◦ g ∈ Sym ◦ Symp (k = polylog n)
k (f ◦ g) = O (polylogn) for f ◦ g ∈ Sym ◦ Compp (k ≥ polylog n)
- MAJ ◦ MAJt cannot break the barrier for constant t
39
SLIDE 92
Proof sketch
Symmetric f and g over F3:
g g g f
· · ·
1 2 2 3 2 1 1 1 3 1 1 1 2 3 2 1 2 1 2 1 1 2 1 2 3 3 1 1 2
yi,j = # columns with i one’s and j two’s Recovering the yi j’s is enough since f and g are symmetric
40
SLIDE 93
Proof sketch
Symmetric f and g over F3:
g g g f
· · ·
1 2 2 3 2 1 1 1 3 1 1 1 2 3 2 1 2 1 2 1 1 2 1 2 3 3 1 1 2
yi,j = # columns with i one’s and j two’s → y0,0 = 1 Recovering the yi j’s is enough since f and g are symmetric
40
SLIDE 94
Proof sketch
Symmetric f and g over F3:
g g g f
· · ·
1 2 2 3 2 1 1 1 3 1 1 1 2 3 2 1 2 1 2 1 1 2 1 2 3 3 1 1 2
yi,j = # columns with i one’s and j two’s → y0,0 = 1, y1,0 = 2 Recovering the yi j’s is enough since f and g are symmetric
40
SLIDE 95
Proof sketch
Symmetric f and g over F3:
g g g f
· · ·
1 2 2 3 2 1 1 1 3 1 1 1 2 3 2 1 2 1 2 1 1 2 1 2 3 3 1 1 2
yi,j = # columns with i one’s and j two’s → y0,0 = 1, y1,0 = 2, y1,1 = 1 Recovering the yi j’s is enough since f and g are symmetric
40
SLIDE 96
Proof sketch
Symmetric f and g over F3:
g g g f
· · ·
1 2 2 3 2 1 1 1 3 1 1 1 2 3 2 1 2 1 2 1 1 2 1 2 3 3 1 1 2
yi,j = # columns with i one’s and j two’s → y0,0 = 1, y1,0 = 2, y1,1 = 1, . . . Recovering the yi,j’s is enough since f and g are symmetric
40
SLIDE 97 Proof sketch
1 2 2 3 2 1 1 1 3 1 1 1 2 3 2 1 2 1 2 1 1 2 1 2 3 3 1 1 2
- Player 1 sends to the referee:
a1
i,j = # columns she sees with i one’s and j two’s
→ a1
0,0 = 2, a1 1,0 = 1, a1 1,1 = 3, . . .
- Players 2 to 5 do the same
41
SLIDE 98 Proof sketch
1 2 2 3 2 1 1 1 3 1 1 1 2 3 2 1 2 1 2 1 1 2 1 2 3 3 1 1 2
- Player 1 sends to the referee:
a1
i,j = # columns she sees with i one’s and j two’s
→ a1
0,0 = 2, a1 1,0 = 1, a1 1,1 = 3, . . .
- Players 2 to 5 do the same
41
SLIDE 99
Proof sketch
1 2 2 3 2 1 1 1 3 1 1 1 2 3 2 1 2 1 2 1 1 2 1 2 3 3 1 1 2
The referee computes: bi,j = a1
i,j + · · · + a5 i,j
Note that: bi j k i j yi j i 1 yi
1 j
j 1 yi j
1 42
SLIDE 100 Proof sketch
1 2 2 3 2 1 1 1 3 1 1 1 2 3 2 1 2 1 2 1 1 2 1 2 3 3 1 1 2
The referee computes: bi,j = a1
i,j + · · · + a5 i,j
Note that:
bi j k i j yi j i 1 yi
1 j
j 1 yi j
1 42
SLIDE 101 Proof sketch
1 2 2 2 2 1 1 1 1 1 1 2 1 2 1 2 1 2 1 1 2 1 2 2 1 1 1 2
The referee computes: bi,j = a1
i,j + · · · + a5 i,j
Note that:
bi j k i j yi j i 1 yi
1 j
j 1 yi j
1 42
SLIDE 102 Proof sketch
1 2 2 2 2 1 1 1 1 1 1 2 1 2 1 2 1 2 1 1 2 1 2 2 1 1 1 2
The referee computes: bi,j = a1
i,j + · · · + a5 i,j
Note that:
bi j k i j yi j i 1 yi
1 j
j 1 yi j
1 42
SLIDE 103 Proof sketch
1 2 2 3 2 1 1 1 3 1 1 1 2 3 2 1 2 1 2 1 1 2 1 2 3 3 1 1 2
The referee computes: bi,j = a1
i,j + · · · + a5 i,j
Note that:
- b0,0 = 5y0,0 + y1,0 + y0,1
bi j k i j yi j i 1 yi
1 j
j 1 yi j
1 42
SLIDE 104 Proof sketch
1 2 2 2 2 1 1 1 1 1 1 2 1 2 1 2 1 2 1 1 2 1 2 2 1 1 1 2
The referee computes: bi,j = a1
i,j + · · · + a5 i,j
Note that:
- b0,0 = 5y0,0 + y1,0 + y0,1
- b1,0 = 4y1,0
bi j k i j yi j i 1 yi
1 j
j 1 yi j
1 42
SLIDE 105 Proof sketch
1 2 2 2 2 1 1 1 1 1 1 2 1 2 1 2 1 2 1 1 2 1 2 2 1 1 1 2
The referee computes: bi,j = a1
i,j + · · · + a5 i,j
Note that:
- b0,0 = 5y0,0 + y1,0 + y0,1
- b1,0 = 4y1,0 + y1,1
bi j k i j yi j i 1 yi
1 j
j 1 yi j
1 42
SLIDE 106 Proof sketch
1 2 2 3 2 1 1 1 3 1 1 1 2 3 2 1 2 1 2 1 1 2 1 2 3 3 1 1 2
The referee computes: bi,j = a1
i,j + · · · + a5 i,j
Note that:
- b0,0 = 5y0,0 + y1,0 + y0,1
- b1,0 = 4y1,0 + y1,1 + 2y2,0
bi j k i j yi j i 1 yi
1 j
j 1 yi j
1 42
SLIDE 107 Proof sketch
1 2 2 3 2 1 1 1 3 1 1 1 2 3 2 1 2 1 2 1 1 2 1 2 3 3 1 1 2
The referee computes: bi,j = a1
i,j + · · · + a5 i,j
Note that:
- b0,0 = 5y0,0 + y1,0 + y0,1
- b1,0 = 4y1,0 + y1,1 + 2y2,0
- . . .
bi,j = (k − (i + j))yi,j + (i + 1)yi+1,j + (j + 1)yi,j+1
42
SLIDE 108
Proof sketch
Let (bi1,...,ip)0≤i1+···+ip≤k−1 be integers. Consider the system of equations: (k − (i1 + · · · + ip))yi1,...,ip +
p
∑
j=1
(ij + 1)yi1,...,ij−1,ij+1,ij+1,...,ip = bi1,...,ip 0 ≤ i1 + · · · + ip ≤ k − 1 Assume further that yi1,...,ip ≥ 0, 0 ≤ i1 + · · · + ip ≤ k and ∑
i1+···+ip≤k
yi1,...,ip ≤ n Theorem If k 1 5p log n then it admits at most one integral solution. the referee recovers the yi j’s and computes the output
43
SLIDE 109
Proof sketch
Let (bi1,...,ip)0≤i1+···+ip≤k−1 be integers. Consider the system of equations: (k − (i1 + · · · + ip))yi1,...,ip +
p
∑
j=1
(ij + 1)yi1,...,ij−1,ij+1,ij+1,...,ip = bi1,...,ip 0 ≤ i1 + · · · + ip ≤ k − 1 Assume further that yi1,...,ip ≥ 0, 0 ≤ i1 + · · · + ip ≤ k and ∑
i1+···+ip≤k
yi1,...,ip ≤ n Theorem If k > 1 + 5p log n then it admits at most one integral solution. the referee recovers the yi j’s and computes the output
43
SLIDE 110
Proof sketch
Let (bi1,...,ip)0≤i1+···+ip≤k−1 be integers. Consider the system of equations: (k − (i1 + · · · + ip))yi1,...,ip +
p
∑
j=1
(ij + 1)yi1,...,ij−1,ij+1,ij+1,...,ip = bi1,...,ip 0 ≤ i1 + · · · + ip ≤ k − 1 Assume further that yi1,...,ip ≥ 0, 0 ≤ i1 + · · · + ip ≤ k and ∑
i1+···+ip≤k
yi1,...,ip ≤ n Theorem If k > 1 + 5p log n then it admits at most one integral solution. → the referee recovers the yi,j’s and computes the output
43
SLIDE 111 Proof sketch
Conclusion:
- [BGKL04] proved the uniqueness for p = 2
- we generalized to any p
- sending all the aℓ
i,j has cost O (k(k + p) log n) → not efficient is
k = ω(polylog n) (compressibility) Future work:
- remove the compressibility condition
- handle larger p
44
SLIDE 112 Proof sketch
Conclusion:
- [BGKL04] proved the uniqueness for p = 2
- we generalized to any p
- sending all the aℓ
i,j has cost O (k(k + p) log n) → not efficient is
k = ω(polylog n) (compressibility) Future work:
- remove the compressibility condition
- handle larger p
44