Communication Complexity D 2 F : cost of the most efficient - - PowerPoint PPT Presentation

communication complexity
SMART_READER_LITE
LIVE PREVIEW

Communication Complexity D 2 F : cost of the most efficient - - PowerPoint PPT Presentation

June 20, 2016 Yassine Hamoudi Carnegie Mellon University Communication Complexity D 2 F : cost of the most efficient deterministic protocol R 2 F : cost of the most efficient randomized protocol with error 1 3 Alice Bob channel Number


slide-1
SLIDE 1

Communication Complexity

Yassine Hamoudi June 20, 2016

Carnegie Mellon University

slide-2
SLIDE 2

Two player model F : {0, 1}n × {0, 1}n → {0, 1}

Alice Bob x ∈ {0, 1}n y ∈ {0, 1}n

0, 1 channel

F(x, y) =? F(x, y) =? Number of bits communicated?

  • D2 F : cost of the most efficient deterministic protocol
  • R2 F : cost of the most efficient randomized protocol with error 1 3

1

slide-3
SLIDE 3

Two player model F : {0, 1}n × {0, 1}n → {0, 1}

Alice Bob x ∈ {0, 1}n y ∈ {0, 1}n

0, 1 channel

F(x, y) =? F(x, y) =? Number of bits communicated?

  • D2(F) : cost of the most efficient deterministic protocol
  • R2(F) : cost of the most efficient randomized protocol with error 1/3

1

slide-4
SLIDE 4

Two player simultaneous model

Alice Bob Referee x ∈ {0, 1}n y ∈ {0, 1}n F(x, y) =? Simultaneous communication complexity: D||

2 (F) and R|| 2 (F) 2

slide-5
SLIDE 5

Number On the Forehead model

x1 x2 x3 x4 F(x1, . . . , xk) = ? NOF model:

  • Player i does not see xi. Communicate by broadcasting
  • Communication cost: Dk(F), Rk(F), D||

k (F) and R|| k (F) 3

slide-6
SLIDE 6

Applications of Communication Complexity

Circuit complexity [HG91, BT94] Ramsey theory [CFL83] Branching programs [CFL83] Proof complexity [BPS07] Quasirandom graphs [CT93] Streaming algorithms [AMS96] Property testing [BBM12] Game theory [CS04, NS06] Data structures [MNSW95]

4

slide-7
SLIDE 7

Contents

The log n barrier and composed functions Decision tree complexity and log-rank conjecture Conclusion

5

slide-8
SLIDE 8

The log n barrier and composed functions

slide-9
SLIDE 9

ACC0 and the log n barrier

The log n barrier: Find a function F such that D||

k (F) = ω(polylog n) when k = polylog n.

Motivations:

  • ACC0 = functions computable by polysize constant-depth circuits made
  • f AND, OR, NOT and MODm gates
  • NEXP

ACC0 [Wil14]

  • Conjecture: NP

ACC0 F breaks the log n barrier

HG91

F ACC0

6

slide-10
SLIDE 10

ACC0 and the log n barrier

The log n barrier: Find a function F such that D||

k (F) = ω(polylog n) when k = polylog n.

Motivations:

  • ACC0 = functions computable by polysize constant-depth circuits made
  • f AND, OR, NOT and MODm gates
  • NEXP ⊈ ACC0 [Wil14]
  • Conjecture: NP ⊈ ACC0

F breaks the log n barrier

HG91

F ACC0

6

slide-11
SLIDE 11

ACC0 and the log n barrier

The log n barrier: Find a function F such that D||

k (F) = ω(polylog n) when k = polylog n.

Motivations:

  • ACC0 = functions computable by polysize constant-depth circuits made
  • f AND, OR, NOT and MODm gates
  • NEXP ⊈ ACC0 [Wil14]
  • Conjecture: NP ⊈ ACC0

F breaks the log n barrier

[HG91]

= = = ⇒ F / ∈ ACC0

6

slide-12
SLIDE 12

Composed functions

· · · . . .

x1,1 x1,2 x1,3 x2,1 x2,2 x2,3 xk,1 xk,2 xk,3 x1,n x2,n xk,n Player 1 (x1) Player 2 (x2) Player k (xk) n k

Given f 0 1 n t 0 1 and g 0 1 t k 0 1 : f g x1 xk

7

slide-13
SLIDE 13

Composed functions

· · · · · · . . .

x1,1 x1,t x2,1 x2,t xk,1 xk,t x1,tn x2,tn xk,tn Player 1 (x1) Player 2 (x2) Player k (xk) t k g g f

Given f : {0, 1}n/t → {0, 1} and g : {0, 1}t·k → {0, 1}: f ◦ g(x1, . . . , xk)

7

slide-14
SLIDE 14

Prior work

Symmetric function = invariant under any permutation of the input When k polylog n:

  • Dk Sym

AND1 log2 n [Gro94]

  • Dk Sym

Sym1 log3 n [BGKL04]

  • Dk Sym

Any1 log3 n [ACFN15]

  • Dk Sym

Anyt polylogn for t log log n [CS14] Our result:

  • D||

k Sym

Symt polylogn for constant t

8

slide-15
SLIDE 15

Prior work

Symmetric function = invariant under any permutation of the input When k = polylog n:

  • Dk(Sym ◦ AND1) = O

( log2 n ) [Gro94]

  • D||

k (Sym ◦ Sym1)

= O ( log3 n ) [BGKL04]

  • D||

k (Sym ◦ Any1)

= O ( log3 n ) [ACFN15]

  • Dk(Sym ◦ Anyt)

= O (polylogn) for t ≤ log log n [CS14] Our result:

  • D||

k Sym

Symt polylogn for constant t

8

slide-16
SLIDE 16

Prior work

Symmetric function = invariant under any permutation of the input When k = polylog n:

  • Dk(Sym ◦ AND1) = O

( log2 n ) [Gro94]

  • D||

k (Sym ◦ Sym1)

= O ( log3 n ) [BGKL04]

  • D||

k (Sym ◦ Any1)

= O ( log3 n ) [ACFN15]

  • Dk(Sym ◦ Anyt)

= O (polylogn) for t ≤ log log n [CS14] Our result:

  • D||

k (Sym ◦ Symt) = O (polylogn) for constant t 8

slide-17
SLIDE 17

Proof sketch

Symmetric f and g with t = 2:

g g g f

· · ·

1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1

yi1 i2 i3 # columns with exactly i1 occurrences of 1, i2 of 2 and i3 of 3 Recovering the yi1 i2 i3’s is enough since f and g are symmetric

9

slide-18
SLIDE 18

Proof sketch

Symmetric f and g with t = 2:

g g g f

· · ·

1 2 2 3 2 1 1 1 3 1 1 1 2 3 2 1 2 1 2 1 1 2 1 2 3 3 1 1 2

yi1 i2 i3 # columns with exactly i1 occurrences of 1, i2 of 2 and i3 of 3 Recovering the yi1 i2 i3’s is enough since f and g are symmetric

9

slide-19
SLIDE 19

Proof sketch

Symmetric f and g with t = 2:

g g g f

· · ·

1 2 2 3 2 1 1 1 3 1 1 1 2 3 2 1 2 1 2 1 1 2 1 2 3 3 1 1 2

yi1,i2,i3 = # columns with exactly i1 occurrences of 1, i2 of 2 and i3 of 3 Recovering the yi1 i2 i3’s is enough since f and g are symmetric

9

slide-20
SLIDE 20

Proof sketch

Symmetric f and g with t = 2:

g g g f

· · ·

1 2 2 3 2 1 1 1 3 1 1 1 2 3 2 1 2 1 2 1 1 2 1 2 3 3 1 1 2

yi1,i2,i3 = # columns with exactly i1 occurrences of 1, i2 of 2 and i3 of 3 → y0,0,0 = 1 Recovering the yi1 i2 i3’s is enough since f and g are symmetric

9

slide-21
SLIDE 21

Proof sketch

Symmetric f and g with t = 2:

g g g f

· · ·

1 2 2 3 2 1 1 1 3 1 1 1 2 3 2 1 2 1 2 1 1 2 1 2 3 3 1 1 2

yi1,i2,i3 = # columns with exactly i1 occurrences of 1, i2 of 2 and i3 of 3 → y0,0,0 = 1, y1,0,0 = 2 Recovering the yi1 i2 i3’s is enough since f and g are symmetric

9

slide-22
SLIDE 22

Proof sketch

Symmetric f and g with t = 2:

g g g f

· · ·

1 2 2 3 2 1 1 1 3 1 1 1 2 3 2 1 2 1 2 1 1 2 1 2 3 3 1 1 2

yi1,i2,i3 = # columns with exactly i1 occurrences of 1, i2 of 2 and i3 of 3 → y0,0,0 = 1, y1,0,0 = 2, y0,4,1 = 0, . . . Recovering the yi1 i2 i3’s is enough since f and g are symmetric

9

slide-23
SLIDE 23

Proof sketch

Symmetric f and g with t = 2:

g g g f

· · ·

1 2 2 3 2 1 1 1 3 1 1 1 2 3 2 1 2 1 2 1 1 2 1 2 3 3 1 1 2

yi1,i2,i3 = # columns with exactly i1 occurrences of 1, i2 of 2 and i3 of 3 → y0,0,0 = 1, y1,0,0 = 2, y0,4,1 = 0, . . . Recovering the yi1,i2,i3’s is enough since f and g are symmetric

9

slide-24
SLIDE 24

Proof sketch

1 2 2 3 2 1 1 1 3 1 1 1 2 3 2 1 2 1 2 1 1 2 1 2 3 3 1 1 2

  • Player 1 sends to the referee:

a1

i1,i2,i3 = # columns he sees with i1 occurrences of 1, i2 of 2 and i3 of 3

→ a1

0,0,0 = 2, a1 1,0,0 = 1, a1 2,1,1 = 1, . . .

  • Players 2 to 5 do the same

10

slide-25
SLIDE 25

Proof sketch

1 2 2 3 2 1 1 1 3 1 1 1 2 3 2 1 2 1 2 1 1 2 1 2 3 3 1 1 2

  • Player 1 sends to the referee:

a1

i1,i2,i3 = # columns he sees with i1 occurrences of 1, i2 of 2 and i3 of 3

→ a1

0,0,0 = 2, a1 1,0,0 = 1, a1 2,1,1 = 1, . . .

  • Players 2 to 5 do the same

10

slide-26
SLIDE 26

Proof sketch

The referee computes: bi1,i2,i3 = a1

i1,i2,i3 + · · · + a5 i1,i2,i3

It verifies: yi1 i2 i3 yi1 i2 i3 n k i1 i2 i3 yi1 i2 i3 i1 1 yi1

1 i2 i3

i2 1 yi1 i2

1 i3

i3 1 yi1 i2 i3

1

bi1 i2 i3 Theorem If k 52t log n then it admits exactly one integral solution. the referee recovers the yi1 i2 i3’s and computes the output

11

slide-27
SLIDE 27

Proof sketch

The referee computes: bi1,i2,i3 = a1

i1,i2,i3 + · · · + a5 i1,i2,i3

It verifies:                    yi1,i2,i3 ≥ 0 yi1 i2 i3 n k i1 i2 i3 yi1 i2 i3 i1 1 yi1

1 i2 i3

i2 1 yi1 i2

1 i3

i3 1 yi1 i2 i3

1

bi1 i2 i3 Theorem If k 52t log n then it admits exactly one integral solution. the referee recovers the yi1 i2 i3’s and computes the output

11

slide-28
SLIDE 28

Proof sketch

The referee computes: bi1,i2,i3 = a1

i1,i2,i3 + · · · + a5 i1,i2,i3

It verifies:                    yi1,i2,i3 ≥ 0 ∑ yi1,i2,i3 = n k i1 i2 i3 yi1 i2 i3 i1 1 yi1

1 i2 i3

i2 1 yi1 i2

1 i3

i3 1 yi1 i2 i3

1

bi1 i2 i3 Theorem If k 52t log n then it admits exactly one integral solution. the referee recovers the yi1 i2 i3’s and computes the output

11

slide-29
SLIDE 29

Proof sketch

The referee computes: bi1,i2,i3 = a1

i1,i2,i3 + · · · + a5 i1,i2,i3

It verifies:                    yi1,i2,i3 ≥ 0 ∑ yi1,i2,i3 = n (k − (i1 + i2 + i3))yi1,i2,i3 + (i1 + 1)yi1+1,i2,i3 +(i2 + 1)yi1,i2+1,i3 + (i3 + 1)yi1,i2,i3+1 = bi1,i2,i3 Theorem If k 52t log n then it admits exactly one integral solution. the referee recovers the yi1 i2 i3’s and computes the output

11

slide-30
SLIDE 30

Proof sketch

The referee computes: bi1,i2,i3 = a1

i1,i2,i3 + · · · + a5 i1,i2,i3

It verifies:                    yi1,i2,i3 ≥ 0 ∑ yi1,i2,i3 = n (k − (i1 + i2 + i3))yi1,i2,i3 + (i1 + 1)yi1+1,i2,i3 +(i2 + 1)yi1,i2+1,i3 + (i3 + 1)yi1,i2,i3+1 = bi1,i2,i3 Theorem If k ≥ 52t log n then it admits exactly one integral solution. → the referee recovers the yi1,i2,i3’s and computes the output

11

slide-31
SLIDE 31

Decision tree complexity and log-rank conjecture

slide-32
SLIDE 32

Log-rank conjecture

F : {0, 1}n × {0, 1}n → {0, 1} Proposition ([MS82]) Let MF ∈ {0, 1}n×n be the communication matrix: MF(x, y) = F(x, y). log rank MF ≤ D2(F) Conjecture For some absolute constant c: log rank MF D2 F logc rank MF

12

slide-33
SLIDE 33

Log-rank conjecture

F : {0, 1}n × {0, 1}n → {0, 1} Proposition ([MS82]) Let MF ∈ {0, 1}n×n be the communication matrix: MF(x, y) = F(x, y). log rank MF ≤ D2(F) Conjecture For some absolute constant c: log rank MF ≤ D2(F) ≤ logc rank MF

12

slide-34
SLIDE 34

XOR and AND functions

  • A function F : {0, 1}n × {0, 1}n → {0, 1} is an XOR function if:

F(x, y) = f(x ⊕ y) for some f : {0, 1}n → {0, 1}

  • A function F

0 1 n 0 1 n 0 1 is an AND function if: F x y f x y Examples: Equality x y NOR x y , Hammingd x y GAPd x y , Disjointness x y NOR x y , InnerProduct x y MOD2 x y , etc. Interests:

  • For XOR functions: rank MF

mon f [BC99]

  • For AND functions: rank MF

mon f [BdW01]

  • Connections with Decision Tree complexity

13

slide-35
SLIDE 35

XOR and AND functions

  • A function F : {0, 1}n × {0, 1}n → {0, 1} is an XOR function if:

F(x, y) = f(x ⊕ y) for some f 0 1 n 0 1

  • A function F : {0, 1}n × {0, 1}n → {0, 1} is an AND function if:

F(x, y) = f(x ∧ y) Examples: Equality x y NOR x y , Hammingd x y GAPd x y , Disjointness x y NOR x y , InnerProduct x y MOD2 x y , etc. Interests:

  • For XOR functions: rank MF

mon f [BC99]

  • For AND functions: rank MF

mon f [BdW01]

  • Connections with Decision Tree complexity

13

slide-36
SLIDE 36

XOR and AND functions

  • A function F : {0, 1}n × {0, 1}n → {0, 1} is an XOR function if:

F(x, y) = f(x ⊕ y) for some f 0 1 n 0 1

  • A function F : {0, 1}n × {0, 1}n → {0, 1} is an AND function if:

F(x, y) = f(x ∧ y) Examples: Equality(x, y) = NOR(x ⊕ y), Hammingd(x, y) = GAPd(x ⊕ y), Disjointness(x, y) = NOR(x ∧ y), InnerProduct(x, y) = MOD2(x ∧ y), etc. Interests:

  • For XOR functions: rank MF

mon f [BC99]

  • For AND functions: rank MF

mon f [BdW01]

  • Connections with Decision Tree complexity

13

slide-37
SLIDE 37

XOR and AND functions

  • A function F : {0, 1}n × {0, 1}n → {0, 1} is an XOR function if:

F(x, y) = f(x ⊕ y) for some f 0 1 n 0 1

  • A function F : {0, 1}n × {0, 1}n → {0, 1} is an AND function if:

F(x, y) = f(x ∧ y) Examples: Equality(x, y) = NOR(x ⊕ y), Hammingd(x, y) = GAPd(x ⊕ y), Disjointness(x, y) = NOR(x ∧ y), InnerProduct(x, y) = MOD2(x ∧ y), etc. Interests:

  • For XOR functions: rank MF = mon f

[BC99]

  • For AND functions: rank MF = mon⋆ f [BdW01]
  • Connections with Decision Tree complexity

13

slide-38
SLIDE 38

Decision tree complexity

A decision tree is an ordered tree where each internal node is labeled with a query, and each leaf is labeled with 0 or 1. x3 x2 x1 x1 x2 1 1 1

14

slide-39
SLIDE 39

Decision tree complexity

A decision tree is an ordered tree where each internal node is labeled with a query, and each leaf is labeled with 0 or 1. x3 x2 x1 x1 x2 1 1 1 Input: x1x2x3 = 011 on a regular decision tree DT(f), RDT(f) and QDT(f)

14

slide-40
SLIDE 40

Decision tree complexity

A decision tree is an ordered tree where each internal node is labeled with a query, and each leaf is labeled with 0 or 1. x1 ⊕ x2 ⊕ x3 x2 x1 ⊕ x2 x2 ⊕ x3 x2 1 1 1 Input: x1x2x3 = 011 on a parity decision tree DT⊕(f), RDT⊕(f) and QDT⊕(f)

14

slide-41
SLIDE 41

Decision tree complexity

A decision tree is an ordered tree where each internal node is labeled with a query, and each leaf is labeled with 0 or 1. x2 ∧ x3 x1 ∧ x3 x1 x2 x1 ∧ x3 1 1 1 Input: x1x2x3 = 011 on a conjunctive decision tree DT∧(f), RDT∧(f) and QDT∧(f)

14

slide-42
SLIDE 42

Connections

Proposition ([ZS10]) For any XOR function F(x, y) = f(x ⊕ y): D2(F) ≤ 2 · DT⊕(f) For any AND function F(x, y) = f(x ∧ y): D2(F) ≤ 2 · DT∧(f) Conjecture

  • Communication and Decision Tree complexities are polynomially related
  • Log-rank conjecture for decision trees:
  • XOR function: log mon f

D2 F 2 DT f logc mon f

  • AND function: log mon

f D2 F 2 DT f logc mon f

15

slide-43
SLIDE 43

Connections

Proposition ([ZS10]) For any XOR function F(x, y) = f(x ⊕ y): D2(F) ≤ 2 · DT⊕(f) For any AND function F(x, y) = f(x ∧ y): D2(F) ≤ 2 · DT∧(f) Conjecture

  • Communication and Decision Tree complexities are polynomially related
  • Log-rank conjecture for decision trees:
  • XOR function: log mon f

D2 F 2 DT f logc mon f

  • AND function: log mon

f D2 F 2 DT f logc mon f

15

slide-44
SLIDE 44

Connections

Proposition ([ZS10]) For any XOR function F(x, y) = f(x ⊕ y): D2(F) ≤ 2 · DT⊕(f) For any AND function F(x, y) = f(x ∧ y): D2(F) ≤ 2 · DT∧(f) Conjecture

  • Communication and Decision Tree complexities are polynomially related
  • Log-rank conjecture for decision trees:
  • XOR function: log mon(f) ≤ D2(F) ≤ 2 · DT⊕(f) ≤ logc mon(f)
  • AND function: log mon⋆(f) ≤ D2(F) ≤ 2 · DT∧(f) ≤ logc mon⋆(f)

15

slide-45
SLIDE 45

Symmetric XOR and AND functions

Communication complexity1 of (nontrivial) XOR and AND functions, for symmetric f: XOR functions AND functions Deterministic Θ (n) Θ ( (n − t(f)) ( 1 + log

n n−t(f)

)) Randomized Θ (r(f)) Θ† ( (n − t(f)) ( 1 + log

n n−t(f)

)) Quantum Θ (r(f)) Θ⋆ (√ n · ℓ0(f) + ℓ1(f) )

1[ZS09, BdW01, Raz03]

16

slide-46
SLIDE 46

Symmetric functions

Decision tree complexities2 of (nontrivial) symmetric functions: Regular Parity Conjunctive Deterministic Θ (n) Θ (n) Θ ( (n − t(f)) ( 1 + log

n n−t(f)

)) Randomized Θ (n) Θ (r(f)) Θ† ( (n − t(f)) ( 1 + log

n n−t(f)

)) Quantum Θ (√ n · ℓ(f) ) Θ (r(f)) Θ⋆ (√ n · ℓ0(f) + ℓ1(f) ) Result: Communication and Decision Tree complexities are polynomially related for symmetric functions.

2[ZS09, BdW01, Raz03, BBC+01]

17

slide-47
SLIDE 47

Symmetric functions

Decision tree complexities2 of (nontrivial) symmetric functions: Regular Parity Conjunctive Deterministic Θ (n) Θ (n) Θ ( (n − t(f)) ( 1 + log

n n−t(f)

)) Randomized Θ (n) Θ (r(f)) Θ† ( (n − t(f)) ( 1 + log

n n−t(f)

)) Quantum Θ (√ n · ℓ(f) ) Θ (r(f)) Θ⋆ (√ n · ℓ0(f) + ℓ1(f) ) Result: Communication and Decision Tree complexities are polynomially related for symmetric functions.

2[ZS09, BdW01, Raz03, BBC+01]

17

slide-48
SLIDE 48

Conclusion

slide-49
SLIDE 49

Our contributions:

  • first efficient simultaneous protocol for Sym ◦ Symt
  • full characterization of the decision tree complexities of symmetric

functions

  • efficient construction for Ramsey numbers over Fn

p

Future work:

  • other protocols for larger families of composed functions
  • breaking the log n barrier
  • log-rank conjecture for XOR and AND functions (using decision tree

complexity?)

18

slide-50
SLIDE 50

Our contributions:

  • first efficient simultaneous protocol for Sym ◦ Symt
  • full characterization of the decision tree complexities of symmetric

functions

  • efficient construction for Ramsey numbers over Fn

p

Future work:

  • other protocols for larger families of composed functions
  • breaking the log n barrier
  • log-rank conjecture for XOR and AND functions (using decision tree

complexity?)

18

slide-51
SLIDE 51

References I

Anil Ada, Arkadev Chattopadhyay, Omar Fawzi, and Phuong Nguyen. The NOF multiparty communication complexity of composed functions. Computational Complexity, 24(3):645–694, 2015. Noga Alon, Yossi Matias, and Mario Szegedy. The space complexity of approximating the frequency moments. In Proceedings of the Twenty-eighth Annual ACM Symposium on Theory

  • f Computing, STOC ’96, pages 20–29, New York, NY, USA, 1996. ACM.

Robert Beals, Harry Buhrman, Richard Cleve, Michele Mosca, and Ronald de Wolf. Quantum lower bounds by polynomials.

  • J. ACM, 48(4):778–797, July 2001.

Eric Blais, Joshua Brody, and Kevin Matulef. Property testing lower bounds via communication complexity. computational complexity, 21(2):311–358, 2012.

19

slide-52
SLIDE 52

References II

Anna Bernasconi and Bruno Codenotti. Spectral analysis of boolean functions as a graph eigenvalue problem. IEEE Transactions on Computers, 48(3):345–351, 1999. Harry Buhrman and Ronald de Wolf. Communication complexity lower bounds by polynomials. In Proceedings of the 16th Annual Conference on Computational Complexity, CCC ’01, pages 120–, Washington, DC, USA, 2001. IEEE Computer Society. László Babai, Anna Gál, Peter G. Kimmel, and Satyanarayana V. Lokam. Communication complexity of simultaneous messages. SIAM J. Comput., 33(1):137–166, January 2004. László Babai, Peter G. Kimmel, and Satyanarayana V. Lokam. Simultaneous messages vs. communication, pages 361–372. Springer Berlin Heidelberg, Berlin, Heidelberg, 1995.

20

slide-53
SLIDE 53

References III

Paul Beame, Toniann Pitassi, and Nathan Segerlind. Lower bounds for Lovász–Schrijver systems and beyond follow from multiparty communication complexity. SIAM J. Comput., 37(3):845–869, 2007. Richard Beigel and Jun Tarui. On ACC. Computational Complexity, 4(4):350–366, 1994. Ashok K. Chandra, Merrick L. Furst, and Richard J. Lipton. Multi-party protocols. In Proceedings of the Fifteenth Annual ACM Symposium on Theory of Computing, STOC ’83, pages 94–99, New York, NY, USA, 1983. ACM. Vincent Conitzer and Tuomas Sandholm. Communication complexity as a lower bound for learning in games. In Proceedings of the Twenty-first International Conference on Machine Learning, ICML ’04, pages 24–, New York, NY, USA, 2004. ACM.

21

slide-54
SLIDE 54

References IV

Arkadev Chattopadhyay and Michael E. Saks. The power of super-logarithmic number of players. In Klaus Jansen, José D. P. Rolim, Nikhil R. Devanur, and Cristopher Moore, editors, Approximation, Randomization, and Combinatorial

  • Optimization. Algorithms and Techniques (APPROX/RANDOM 2014),

volume 28 of Leibniz International Proceedings in Informatics (LIPIcs), pages 596–603, Dagstuhl, Germany, 2014. Schloss Dagstuhl–Leibniz-Zentrum fuer Informatik. Fan R. K. Chung and Prasad Tetali. Communication complexity and quasi randomness. SIAMJDiscreteMath, 6(1):110–123, 1993. Ben Green. Finite field models in additive combinatorics. In Bridget S. Webb, editor, Surveys in Combinatorics 2005, pages 1–28. Cambridge University Press, 2005.

Cambridge Books Online.

22

slide-55
SLIDE 55

References V

Vince Grolmusz. The BNS lower bound for multi-party protocols is nearly optimal. Information and Computation, 112:51–54, 1994. Johan Håstad and Mikael Goldmann. On the power of small-depth threshold circuits. Computational Complexity, 1(2):113–129, 1991. Michael T. Lacey and William McClain. On an argument of Shkredov on two-dimensional corners. Online Journal of Analytic Combinatorics, 2007. Peter Bro Miltersen, Noam Nisan, Shmuel Safra, and Avi Wigderson. On data structures and asymmetric communication complexity. In Proceedings of the Twenty-seventh Annual ACM Symposium on Theory

  • f Computing, STOC ’95, pages 103–111, New York, NY, USA, 1995. ACM.

23

slide-56
SLIDE 56

References VI

Kurt Mehlhorn and Erik M. Schmidt. Las Vegas is better than determinism in VLSI and distributed computing. In Proceedings of the Fourteenth Annual ACM Symposium on Theory of Computing, STOC ’82, pages 330–337, New York, NY, USA, 1982. ACM. Noam Nisan and Ilya Segal. The communication requirements of efficient allocations and supporting prices. Journal of Economic Theory, 129:192–224, 2006. A A Razborov. Quantum communication complexity of symmetric predicates. Izvestiya: Mathematics, 67(1):145, 2003. Ryan Williams. Nonuniform acc circuit lower bounds.

  • J. ACM, 61(1):2:1–2:32, January 2014.

24

slide-57
SLIDE 57

References VII

Andrew Chi-Chih Yao. On ACC and threshold circuits. In 31st Annual Symposium on Foundations of Computer Science, St. Louis, Missouri, USA, October 22-24, 1990, Volume II, pages 619–627, 1990. Zhiqiang Zhang and Yaoyun Shi. Communication complexities of symmetric XOR functions. Quantum Info. Comput., 9(3):255–263, March 2009. Zhiqiang Zhang and Yaoyun Shi. On the parity complexity measures of boolean functions.

  • Theor. Comput. Sci., 411(26-28):2612–2618, June 2010.

25

slide-58
SLIDE 58

Equality function

Equality(x1, . . . , xk) = 1 ⇔ x1 = · · · = xk D2(Equality) = Ω(n)

  • log-rank method

R||

2 (Equality) = O (1)

  • Alice and Bob test x · r = y · r mod 2 for two random r ∈ {0, 1}n

D||

k (Equality) = O (1) when k > 2

  • Player 1 checks x2 = · · · = xk
  • Player 2 checks x1 = x3 = · · · = xk

26

slide-59
SLIDE 59

ACC0 and Sym+

Sym+(s, k) = depth-2 circuits whose top gate is a symmetric gate of fan-in s, and each bottom gate is an AND gate of fan-in k SYM AND AND · · ·

s k k

  • ACC0 ⊂ SYM+(2polylog n, polylog n) [Yao90, BT94]
  • f is computed by a SYM+(s, k − 1) circuit ⇒ for any partition of the input

between k players, there is a protocol of cost O (k log s) computing f

27

slide-60
SLIDE 60

Symmetric XOR and AND functions

F(x, y) = f(x ⊕ y) is symmetric iff f is symmetric f x depends only on x . Hence f n 0 1

  • t f

min p f p 1 f p

  • 0 f

min p n 2 f i f n 2 for i p n 2

  • 1 f

min p n 2 f i f n 2 for i n 2 n p

  • f

min p f i f i 1 for i p n p 1

  • r f

min p f i f i 2 for i p n p 2

28

slide-61
SLIDE 61

Symmetric XOR and AND functions

F(x, y) = f(x ⊕ y) is symmetric iff f is symmetric → f(x) depends only on |x|. Hence f : {0, . . . , n} → {0, 1}

  • t f

min p f p 1 f p

  • 0 f

min p n 2 f i f n 2 for i p n 2

  • 1 f

min p n 2 f i f n 2 for i n 2 n p

  • f

min p f i f i 1 for i p n p 1

  • r f

min p f i f i 2 for i p n p 2

28

slide-62
SLIDE 62

Symmetric XOR and AND functions

F(x, y) = f(x ⊕ y) is symmetric iff f is symmetric → f(x) depends only on |x|. Hence f : {0, . . . , n} → {0, 1}

  • t(f)

= min{p : f(p − 1) ̸= f(p)}

  • ℓ0(f) = min{p ≤ n/2 : f(i) = f(n/2) for i ∈ [p, n/2]}
  • ℓ1(f) = min{p ≤ n/2 : f(i) = f(n/2) for i ∈ [n/2, n − p]}
  • ℓ(f) = min{p : f(i) = f(i + 1) for i ∈ [p, n − p − 1]}
  • r(f)

= min{p : f(i) = f(i + 2) for i ∈ [p, n − p − 2]}

28

slide-63
SLIDE 63

Ramsey numbers and EvalG

slide-64
SLIDE 64

EvalG

For any Abelian group G and x1, . . . , xk ∈ G: EvalG(x1, . . . , xk) = 1 ⇔ x1 + · · · + xk = 0 Communication complexity:

  • Rk EvalG

1 since x1 xk x1 x2 xk

  • Dk EvalG

connections to Ramsey theory

29

slide-65
SLIDE 65

EvalG

For any Abelian group G and x1, . . . , xk ∈ G: EvalG(x1, . . . , xk) = 1 ⇔ x1 + · · · + xk = 0 Communication complexity:

  • R||

k (EvalG) = O (1) since

x1 + · · · + xk = 0 ⇔ x1 = −(x2 · · · + xk)

  • Dk(EvalG) → connections to Ramsey theory

29

slide-66
SLIDE 66

Ramsey numbers

k-dimensional corner in Gk: (x1, x2, . . . , xk), (x1 + λ, x2, . . . , xk), (x1, x2 + λ, . . . , xk), . . . , (x1, x2, . . . , xk + λ) Ramsey numbers:

  • ck G = min # of colors to avoid monochromatic k-dim corner in Gk
  • rk G = size of largest subset of Gk without any k-dim corner

Chandra, Furst and Lipton [CFL83]: log ck G Dk

1 EvalG

k log ck G

30

slide-67
SLIDE 67

Ramsey numbers

k-dimensional corner in Gk: (x1, x2, . . . , xk), (x1 + λ, x2, . . . , xk), (x1, x2 + λ, . . . , xk), . . . , (x1, x2, . . . , xk + λ) Ramsey numbers:

  • c∠

k (G) = min # of colors to avoid monochromatic k-dim corner in Gk

  • r∠

k (G) = size of largest subset of Gk without any k-dim corner

Chandra, Furst and Lipton [CFL83]: log ck G Dk

1 EvalG

k log ck G

30

slide-68
SLIDE 68

Ramsey numbers

k-dimensional corner in Gk: (x1, x2, . . . , xk), (x1 + λ, x2, . . . , xk), (x1, x2 + λ, . . . , xk), . . . , (x1, x2, . . . , xk + λ) Ramsey numbers:

  • c∠

k (G) = min # of colors to avoid monochromatic k-dim corner in Gk

  • r∠

k (G) = size of largest subset of Gk without any k-dim corner

Chandra, Furst and Lipton [CFL83]: log(c∠

k (G)) ≤ Dk+1(EvalG) ≤ k + log(c∠ k (G)) 30

slide-69
SLIDE 69

Connections

Chandra, Furst and Lipton [CFL83]: log(c∠

k (G)) ≤ Dk+1(EvalG) ≤ k + log(c∠ k (G)) 31

slide-70
SLIDE 70

Ramsey numbers and EvalFn

p

Motivations for G = Fn

p:

  • the proofs are easier and cleaner
  • they can be adapted to any other group [Gre05]
  • EvalFn

p ∈ Sym ◦ Symp

Prior work:

  • D3 Eval n

p

1 [LM07]

  • ck

n 2

2n 2k

2nk

1

[ACFN15]

  • an explicit large corner free set over

n 2 [ACFN15]

  • ck

n p

2

p log2 n p p log n when k

1 p log 3n [CS14] Our result:

  • the first explicit large corner-free set over

n p, of size pnk Ck2 pk

k2

32

slide-71
SLIDE 71

Ramsey numbers and EvalFn

p

Motivations for G = Fn

p:

  • the proofs are easier and cleaner
  • they can be adapted to any other group [Gre05]
  • EvalFn

p ∈ Sym ◦ Symp

Prior work:

  • D3(EvalFn

p) = ω(1) [LM07]

  • c∠

k (Fn 2) ≤ O

( 2n/2k−2nk+1) [ACFN15]

  • an explicit large corner free set over Fn

2 [ACFN15]

  • c∠

k (Fn p) ≤ 2O(p log2 n)pO(p log n) when k > 1 + p log(3n) [CS14]

Our result:

  • the first explicit large corner-free set over

n p, of size pnk Ck2 pk

k2

32

slide-72
SLIDE 72

Ramsey numbers and EvalFn

p

Motivations for G = Fn

p:

  • the proofs are easier and cleaner
  • they can be adapted to any other group [Gre05]
  • EvalFn

p ∈ Sym ◦ Symp

Prior work:

  • D3(EvalFn

p) = ω(1) [LM07]

  • c∠

k (Fn 2) ≤ O

( 2n/2k−2nk+1) [ACFN15]

  • an explicit large corner free set over Fn

2 [ACFN15]

  • c∠

k (Fn p) ≤ 2O(p log2 n)pO(p log n) when k > 1 + p log(3n) [CS14]

Our result:

  • the first explicit large corner-free set over Fn

p, of size pnk Ck2 pk+k2 32

slide-73
SLIDE 73

Results

Our contribution: the first explicit large corner-free set in Fn

p

Definitions:

  • M

n p k is seen as a k

n matrix over

p

  • d c cj

Hamming distance between columns c and cj

  • ni c M

number of columns at distance i to c in M For any c

k p, Nk

0 and N0 Nk

1

0 such that

k i 0 Ni

n: Sk

c

M

n p k

i k ni c M Ni is a corner-free set. If k

log n log 1

1 p 1

and Ni

k i p 1 i pk

n then Sk

c pnk Ck2 pk

k2

33

slide-74
SLIDE 74

Results

Our contribution: the first explicit large corner-free set in Fn

p

Definitions:

  • M ∈ (Fn

p)k is seen as a k × n matrix over Fp

  • d(c, cj) = Hamming distance between columns c and cj
  • ni,c(M) = number of columns at distance i to c in M

For any c

k p, Nk

0 and N0 Nk

1

0 such that

k i 0 Ni

n: Sk

c

M

n p k

i k ni c M Ni is a corner-free set. If k

log n log 1

1 p 1

and Ni

k i p 1 i pk

n then Sk

c pnk Ck2 pk

k2

33

slide-75
SLIDE 75

Results

Our contribution: the first explicit large corner-free set in Fn

p

Definitions:

  • M ∈ (Fn

p)k is seen as a k × n matrix over Fp

  • d(c, cj) = Hamming distance between columns c and cj
  • ni,c(M) = number of columns at distance i to c in M

For any c ∈ Fk

p, Nk = 0 and N0, . . . , Nk−1 ≥ 0 such that ∑k i=0 Ni = n:

Sk

c = {M ∈ (Fn p)k : ∀i ∈ {0, . . . , k}, ni,c(M) = Ni}

is a corner-free set. If k

log n log 1

1 p 1

and Ni

k i p 1 i pk

n then Sk

c pnk Ck2 pk

k2

33

slide-76
SLIDE 76

Results

Our contribution: the first explicit large corner-free set in Fn

p

Definitions:

  • M ∈ (Fn

p)k is seen as a k × n matrix over Fp

  • d(c, cj) = Hamming distance between columns c and cj
  • ni,c(M) = number of columns at distance i to c in M

For any c ∈ Fk

p, Nk = 0 and N0, . . . , Nk−1 ≥ 0 such that ∑k i=0 Ni = n:

Sk

c = {M ∈ (Fn p)k : ∀i ∈ {0, . . . , k}, ni,c(M) = Ni}

is a corner-free set. If k ≥ ⌈

log n log ( 1+

1 p−1

)

⌉ and Ni = ⌊(k

i

) (p−1)i

pk

n ⌋ then |Sk

c| ≥ pnk Ck2 pk+k2 33

slide-77
SLIDE 77

The log n barrier and composed functions

slide-78
SLIDE 78

Composed functions

Given f : {0, 1}n → {0, 1} and − → g = (g1, . . . , gn) where gi : {0, 1}k → {0, 1}: f ◦ − → g (x1, . . . , xk) = f(. . . , gi(x1,i, . . . , xk,i), . . . ) · · · . . .

x1,1 x1,2 x1,3 x2,1 x2,2 x2,3 xk,1 xk,2 xk,3 x1,n x2,n xk,n Player 1 (x1) Player 2 (x2) Player k (xk) n k g1 g2 g3 gn f

34

slide-79
SLIDE 79

Composed functions

Definitions:

  • f ◦ g if g1 = · · · = gn
  • Symmetric = invariant under any permutation of the input
  • Any ◦ −

− → Any, Any ◦ Any, Sym ◦ − − → Any, Sym ◦ Sym... Motivations:

  • very simple structure
  • most of the important functions: GIP

MOD2 AND Sym Sym, MAJ MAJ Sym Sym, DISJ NOR AND Sym Sym

  • major open problems still unknown for composed functions

35

slide-80
SLIDE 80

Composed functions

Definitions:

  • f ◦ g if g1 = · · · = gn
  • Symmetric = invariant under any permutation of the input
  • Any ◦ −

− → Any, Any ◦ Any, Sym ◦ − − → Any, Sym ◦ Sym... Motivations:

  • very simple structure
  • most of the important functions: GIP = MOD2 ◦ AND ∈ Sym ◦ Sym,

MAJ ◦ MAJ ∈ Sym ◦ Sym, DISJ = NOR ◦ AND ∈ Sym ◦ Sym

  • major open problems still unknown for composed functions

35

slide-81
SLIDE 81

Prior work

Conjecture ([BKL95]): MAJ ◦ MAJ breaks the log n barrier When k log n :

  • Dk f

g log2 n for f g Sym AND [Gro94]

  • Dk f

g log3 n for f g Sym Comp [BGKL04]

  • Dk f

g log3 n for f g Sym Any [ACFN15] none of the functions in Sym Any can break the log n barrier

36

slide-82
SLIDE 82

Prior work

Conjecture ([BKL95]): MAJ ◦ MAJ breaks the log n barrier When k = Ω(log n):

  • Dk(f ◦ g) = O

( log2 n ) for f ◦ g ∈ Sym ◦ AND [Gro94]

  • D||

k (f ◦ g) = O

( log3 n ) for f ◦ g ∈ Sym ◦ Comp [BGKL04]

  • D||

k (f ◦ −

→ g ) = O ( log3 n ) for f ◦ − → g ∈ Sym ◦ − − → Any [ACFN15] none of the functions in Sym Any can break the log n barrier

36

slide-83
SLIDE 83

Prior work

Conjecture ([BKL95]): MAJ ◦ MAJ breaks the log n barrier When k = Ω(log n):

  • Dk(f ◦ g) = O

( log2 n ) for f ◦ g ∈ Sym ◦ AND [Gro94]

  • D||

k (f ◦ g) = O

( log3 n ) for f ◦ g ∈ Sym ◦ Comp [BGKL04]

  • D||

k (f ◦ −

→ g ) = O ( log3 n ) for f ◦ − → g ∈ Sym ◦ − − → Any [ACFN15] → none of the functions in Sym ◦ − − → Any can break the log n barrier

36

slide-84
SLIDE 84

Composed functions of block-width t

· · · · · · . . .

x1,1 x1,t x2,1 x2,t xk,1 xk,t x1,tn x2,tn xk,tn Player 1 (x1) Player 2 (x2) Player k (xk) t · n k g1 gn f

  • MAJt

0 1 k t 0 1

  • Conjecture : MAJ

MAJ

n breaks the barrier 37

slide-85
SLIDE 85

Composed functions of block-width t

· · · · · · . . .

x1,1 x1,t x2,1 x2,t xk,1 xk,t x1,tn x2,tn xk,tn Player 1 (x1) Player 2 (x2) Player k (xk) t · n k g1 gn f

  • MAJt : {0, 1}k·t → {0, 1}
  • Conjecture : MAJ ◦ MAJ√n breaks the barrier

37

slide-86
SLIDE 86

Composed functions of block-width t {0, 1}t ∼ F2t

· · · · · · . . .

x1,1 x1,t x2,1 x2,t xk,1 xk,t x1,tn x2,tn xk,tn Player 1 (x1) Player 2 (x2) Player k (xk) t · n k g1 gn f

Given f 0 1 n 0 1 and g g1 gn where gi

k p

0 1 : f g x1 xk f gi x1 i xk i Any Anyp Any Anyp Sym Anyp

38

slide-87
SLIDE 87

Composed functions of block-width t

F2t

· · · . . .

x1,1 x1,2 x1,3 x2,1 x2,2 x2,3 xk,1 xk,2 xk,3 x1,n x2,n xk,n Player 1 (x1) Player 2 (x2) Player k (xk) n k g1 g2 g3 gn f

Given f 0 1 n 0 1 and g g1 gn where gi

k p

0 1 : f g x1 xk f gi x1 i xk i Any Anyp Any Anyp Sym Anyp

38

slide-88
SLIDE 88

Composed functions of block-width t

F2t

· · · . . .

x1,1 x1,2 x1,3 x2,1 x2,2 x2,3 xk,1 xk,2 xk,3 x1,n x2,n xk,n Player 1 (x1) Player 2 (x2) Player k (xk) n k g1 g2 g3 gn f

Given f : {0, 1}n → {0, 1} and − → g = (g1, . . . , gn) where gi : Fk

p → {0, 1}:

f ◦ − → g (x1, . . . , xk) = f(. . . , gi(x1,i, . . . , xk,i), . . . ) → Any ◦ − − → Anyp, Any ◦ Anyp, Sym ◦ Anyp, . . .

38

slide-89
SLIDE 89

Prior work

Conjecture: MAJ ◦ MAJ√

log n breaks the log n barrier

When k polylog n :

  • Dk f

g log3 n for f g Sym Any2 [ACFN15]

  • Dk f

g polylogn for f g Sym Anyp and p polylog n [CS14] New results for constant p:

  • Dk f

g polylogn for f g Sym Symp (k polylog n)

  • Dk f

g polylogn for f g Sym Compp (k polylog n)

  • MAJ

MAJt cannot break the barrier for constant t

39

slide-90
SLIDE 90

Prior work

Conjecture: MAJ ◦ MAJ√

log n breaks the log n barrier

When k = Ω(polylog n):

  • D||

k (f ◦ −

→ g ) = O ( log3 n ) for f ◦ − → g ∈ Sym ◦ − − → Any2 [ACFN15]

  • Dk(f ◦ g) = O (polylogn) for f ◦ g ∈ Sym ◦ −

− → Anyp and p ≤ polylog n [CS14] New results for constant p:

  • Dk f

g polylogn for f g Sym Symp (k polylog n)

  • Dk f

g polylogn for f g Sym Compp (k polylog n)

  • MAJ

MAJt cannot break the barrier for constant t

39

slide-91
SLIDE 91

Prior work

Conjecture: MAJ ◦ MAJ√

log n breaks the log n barrier

When k = Ω(polylog n):

  • D||

k (f ◦ −

→ g ) = O ( log3 n ) for f ◦ − → g ∈ Sym ◦ − − → Any2 [ACFN15]

  • Dk(f ◦ g) = O (polylogn) for f ◦ g ∈ Sym ◦ −

− → Anyp and p ≤ polylog n [CS14] New results for constant p:

  • D||

k (f ◦ g) = O (polylogn) for f ◦ g ∈ Sym ◦ Symp (k = polylog n)

  • D||

k (f ◦ g) = O (polylogn) for f ◦ g ∈ Sym ◦ Compp (k ≥ polylog n)

  • MAJ ◦ MAJt cannot break the barrier for constant t

39

slide-92
SLIDE 92

Proof sketch

Symmetric f and g over F3:

g g g f

· · ·

1 2 2 3 2 1 1 1 3 1 1 1 2 3 2 1 2 1 2 1 1 2 1 2 3 3 1 1 2

yi,j = # columns with i one’s and j two’s Recovering the yi j’s is enough since f and g are symmetric

40

slide-93
SLIDE 93

Proof sketch

Symmetric f and g over F3:

g g g f

· · ·

1 2 2 3 2 1 1 1 3 1 1 1 2 3 2 1 2 1 2 1 1 2 1 2 3 3 1 1 2

yi,j = # columns with i one’s and j two’s → y0,0 = 1 Recovering the yi j’s is enough since f and g are symmetric

40

slide-94
SLIDE 94

Proof sketch

Symmetric f and g over F3:

g g g f

· · ·

1 2 2 3 2 1 1 1 3 1 1 1 2 3 2 1 2 1 2 1 1 2 1 2 3 3 1 1 2

yi,j = # columns with i one’s and j two’s → y0,0 = 1, y1,0 = 2 Recovering the yi j’s is enough since f and g are symmetric

40

slide-95
SLIDE 95

Proof sketch

Symmetric f and g over F3:

g g g f

· · ·

1 2 2 3 2 1 1 1 3 1 1 1 2 3 2 1 2 1 2 1 1 2 1 2 3 3 1 1 2

yi,j = # columns with i one’s and j two’s → y0,0 = 1, y1,0 = 2, y1,1 = 1 Recovering the yi j’s is enough since f and g are symmetric

40

slide-96
SLIDE 96

Proof sketch

Symmetric f and g over F3:

g g g f

· · ·

1 2 2 3 2 1 1 1 3 1 1 1 2 3 2 1 2 1 2 1 1 2 1 2 3 3 1 1 2

yi,j = # columns with i one’s and j two’s → y0,0 = 1, y1,0 = 2, y1,1 = 1, . . . Recovering the yi,j’s is enough since f and g are symmetric

40

slide-97
SLIDE 97

Proof sketch

1 2 2 3 2 1 1 1 3 1 1 1 2 3 2 1 2 1 2 1 1 2 1 2 3 3 1 1 2

  • Player 1 sends to the referee:

a1

i,j = # columns she sees with i one’s and j two’s

→ a1

0,0 = 2, a1 1,0 = 1, a1 1,1 = 3, . . .

  • Players 2 to 5 do the same

41

slide-98
SLIDE 98

Proof sketch

1 2 2 3 2 1 1 1 3 1 1 1 2 3 2 1 2 1 2 1 1 2 1 2 3 3 1 1 2

  • Player 1 sends to the referee:

a1

i,j = # columns she sees with i one’s and j two’s

→ a1

0,0 = 2, a1 1,0 = 1, a1 1,1 = 3, . . .

  • Players 2 to 5 do the same

41

slide-99
SLIDE 99

Proof sketch

1 2 2 3 2 1 1 1 3 1 1 1 2 3 2 1 2 1 2 1 1 2 1 2 3 3 1 1 2

The referee computes: bi,j = a1

i,j + · · · + a5 i,j

Note that: bi j k i j yi j i 1 yi

1 j

j 1 yi j

1 42

slide-100
SLIDE 100

Proof sketch

1 2 2 3 2 1 1 1 3 1 1 1 2 3 2 1 2 1 2 1 1 2 1 2 3 3 1 1 2

The referee computes: bi,j = a1

i,j + · · · + a5 i,j

Note that:

  • b0,0 =

bi j k i j yi j i 1 yi

1 j

j 1 yi j

1 42

slide-101
SLIDE 101

Proof sketch

1 2 2 2 2 1 1 1 1 1 1 2 1 2 1 2 1 2 1 1 2 1 2 2 1 1 1 2

The referee computes: bi,j = a1

i,j + · · · + a5 i,j

Note that:

  • b0,0 = 5y0,0

bi j k i j yi j i 1 yi

1 j

j 1 yi j

1 42

slide-102
SLIDE 102

Proof sketch

1 2 2 2 2 1 1 1 1 1 1 2 1 2 1 2 1 2 1 1 2 1 2 2 1 1 1 2

The referee computes: bi,j = a1

i,j + · · · + a5 i,j

Note that:

  • b0,0 = 5y0,0 + y1,0

bi j k i j yi j i 1 yi

1 j

j 1 yi j

1 42

slide-103
SLIDE 103

Proof sketch

1 2 2 3 2 1 1 1 3 1 1 1 2 3 2 1 2 1 2 1 1 2 1 2 3 3 1 1 2

The referee computes: bi,j = a1

i,j + · · · + a5 i,j

Note that:

  • b0,0 = 5y0,0 + y1,0 + y0,1

bi j k i j yi j i 1 yi

1 j

j 1 yi j

1 42

slide-104
SLIDE 104

Proof sketch

1 2 2 2 2 1 1 1 1 1 1 2 1 2 1 2 1 2 1 1 2 1 2 2 1 1 1 2

The referee computes: bi,j = a1

i,j + · · · + a5 i,j

Note that:

  • b0,0 = 5y0,0 + y1,0 + y0,1
  • b1,0 = 4y1,0

bi j k i j yi j i 1 yi

1 j

j 1 yi j

1 42

slide-105
SLIDE 105

Proof sketch

1 2 2 2 2 1 1 1 1 1 1 2 1 2 1 2 1 2 1 1 2 1 2 2 1 1 1 2

The referee computes: bi,j = a1

i,j + · · · + a5 i,j

Note that:

  • b0,0 = 5y0,0 + y1,0 + y0,1
  • b1,0 = 4y1,0 + y1,1

bi j k i j yi j i 1 yi

1 j

j 1 yi j

1 42

slide-106
SLIDE 106

Proof sketch

1 2 2 3 2 1 1 1 3 1 1 1 2 3 2 1 2 1 2 1 1 2 1 2 3 3 1 1 2

The referee computes: bi,j = a1

i,j + · · · + a5 i,j

Note that:

  • b0,0 = 5y0,0 + y1,0 + y0,1
  • b1,0 = 4y1,0 + y1,1 + 2y2,0

bi j k i j yi j i 1 yi

1 j

j 1 yi j

1 42

slide-107
SLIDE 107

Proof sketch

1 2 2 3 2 1 1 1 3 1 1 1 2 3 2 1 2 1 2 1 1 2 1 2 3 3 1 1 2

The referee computes: bi,j = a1

i,j + · · · + a5 i,j

Note that:

  • b0,0 = 5y0,0 + y1,0 + y0,1
  • b1,0 = 4y1,0 + y1,1 + 2y2,0
  • . . .

bi,j = (k − (i + j))yi,j + (i + 1)yi+1,j + (j + 1)yi,j+1

42

slide-108
SLIDE 108

Proof sketch

Let (bi1,...,ip)0≤i1+···+ip≤k−1 be integers. Consider the system of equations:        (k − (i1 + · · · + ip))yi1,...,ip +

p

j=1

(ij + 1)yi1,...,ij−1,ij+1,ij+1,...,ip = bi1,...,ip 0 ≤ i1 + · · · + ip ≤ k − 1 Assume further that yi1,...,ip ≥ 0, 0 ≤ i1 + · · · + ip ≤ k and ∑

i1+···+ip≤k

yi1,...,ip ≤ n Theorem If k 1 5p log n then it admits at most one integral solution. the referee recovers the yi j’s and computes the output

43

slide-109
SLIDE 109

Proof sketch

Let (bi1,...,ip)0≤i1+···+ip≤k−1 be integers. Consider the system of equations:        (k − (i1 + · · · + ip))yi1,...,ip +

p

j=1

(ij + 1)yi1,...,ij−1,ij+1,ij+1,...,ip = bi1,...,ip 0 ≤ i1 + · · · + ip ≤ k − 1 Assume further that yi1,...,ip ≥ 0, 0 ≤ i1 + · · · + ip ≤ k and ∑

i1+···+ip≤k

yi1,...,ip ≤ n Theorem If k > 1 + 5p log n then it admits at most one integral solution. the referee recovers the yi j’s and computes the output

43

slide-110
SLIDE 110

Proof sketch

Let (bi1,...,ip)0≤i1+···+ip≤k−1 be integers. Consider the system of equations:        (k − (i1 + · · · + ip))yi1,...,ip +

p

j=1

(ij + 1)yi1,...,ij−1,ij+1,ij+1,...,ip = bi1,...,ip 0 ≤ i1 + · · · + ip ≤ k − 1 Assume further that yi1,...,ip ≥ 0, 0 ≤ i1 + · · · + ip ≤ k and ∑

i1+···+ip≤k

yi1,...,ip ≤ n Theorem If k > 1 + 5p log n then it admits at most one integral solution. → the referee recovers the yi,j’s and computes the output

43

slide-111
SLIDE 111

Proof sketch

Conclusion:

  • [BGKL04] proved the uniqueness for p = 2
  • we generalized to any p
  • sending all the aℓ

i,j has cost O (k(k + p) log n) → not efficient is

k = ω(polylog n) (compressibility) Future work:

  • remove the compressibility condition
  • handle larger p

44

slide-112
SLIDE 112

Proof sketch

Conclusion:

  • [BGKL04] proved the uniqueness for p = 2
  • we generalized to any p
  • sending all the aℓ

i,j has cost O (k(k + p) log n) → not efficient is

k = ω(polylog n) (compressibility) Future work:

  • remove the compressibility condition
  • handle larger p

44