Multiparty Communication Complexity (A biased introduction) Arkadev Chattopadhyay TIFR, Mumbai TexPoint fonts used in EMF. Read the TexPoint manual before.

Slides:



Advertisements
Similar presentations
Tight Bounds for Distributed Functional Monitoring David Woodruff IBM Almaden Qin Zhang Aarhus University MADALGO Based on a paper in STOC, 2012.
Advertisements

The Complexity of Linear Dependence Problems in Vector Spaces David Woodruff IBM Almaden Joint work with Arnab Bhattacharyya, Piotr Indyk, and Ning Xie.
Tight Bounds for Distributed Functional Monitoring David Woodruff IBM Almaden Qin Zhang Aarhus University MADALGO.
Optimal Space Lower Bounds for All Frequency Moments David Woodruff MIT
Quantum Lower Bounds The Polynomial and Adversary Methods Scott Aaronson September 14, 2001 Prelim Exam Talk.
Parikshit Gopalan Georgia Institute of Technology Atlanta, Georgia, USA.
Computing with Polynomials over Composites Parikshit Gopalan Algorithms, Combinatorics & Optimization. Georgia Tech.
Optimal Space Lower Bounds for all Frequency Moments David Woodruff Based on SODA 04 paper.
Tight Lower Bounds for the Distinct Elements Problem David Woodruff MIT Joint work with Piotr Indyk.
Truthful Mechanisms for Combinatorial Auctions with Subadditive Bidders Speaker: Shahar Dobzinski Based on joint works with Noam Nisan & Michael Schapira.
Separating Deterministic from Randomized Multiparty Communication Complexity Joint work with Paul Beame (University of Washington) Matei David (University.
Theory of Computing Lecture 23 MAS 714 Hartmut Klauck.
Quantum One-Way Communication is Exponentially Stronger than Classical Communication TexPoint fonts used in EMF. Read the TexPoint manual before you delete.
Random non-local games Andris Ambainis, Artūrs Bačkurs, Kaspars Balodis, Dmitry Kravchenko, Juris Smotrovs, Madars Virza University of Latvia.
The Communication Complexity of Approximate Set Packing and Covering
Lecture 24 MAS 714 Hartmut Klauck
C&O 355 Lecture 23 N. Harvey TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: A A A A A A A A A A.
Gillat Kol (IAS) joint work with Ran Raz (Weizmann + IAS) Interactive Channel Capacity.
Gillat Kol joint work with Ran Raz Competing Provers Protocols for Circuit Evaluation.
Linear Systems With Composite Moduli Arkadev Chattopadhyay (University of Toronto) Joint with: Avi Wigderson TexPoint fonts used in EMF. Read the TexPoint.
TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAA A.
Rotem Zach November 1 st, A rectangle in X × Y is a subset R ⊆ X × Y such that R = A × B for some A ⊆ X and B ⊆ Y. A rectangle R ⊆ X × Y is called.
Yi Wu (CMU) Joint work with Parikshit Gopalan (MSR SVC) Ryan O’Donnell (CMU) David Zuckerman (UT Austin) Pseudorandom Generators for Halfspaces TexPoint.
Non-Uniform ACC Circuit Lower Bounds Ryan Williams IBM Almaden TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA A A.
CS151 Complexity Theory Lecture 6 April 15, 2015.
On the tightness of Buhrman- Cleve-Wigderson simulation Shengyu Zhang The Chinese University of Hong Kong On the relation between decision tree complexity.
CS151 Complexity Theory Lecture 7 April 20, 2004.
Derandomization: New Results and Applications Emanuele Viola Harvard University March 2006.
Arithmetic Hardness vs. Randomness Valentine Kabanets SFU.
Lattices for Distributed Source Coding - Reconstruction of a Linear function of Jointly Gaussian Sources -D. Krithivasan and S. Sandeep Pradhan - University.
CS151 Complexity Theory Lecture 6 April 15, 2004.
Theory of Computing Lecture 22 MAS 714 Hartmut Klauck.
The Power of Super-Log Number of Players Arkadev Chattopadhyay (TIFR, Mumbai) Joint with: Michael Saks ( Rutgers )
1 Algorithms for Large Data Sets Ziv Bar-Yossef Lecture 13 June 22, 2005
C&O 355 Lecture 2 N. Harvey TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: A A.
Complexity Theory Lecture 2 Lecturer: Moni Naor. Recap of last week Computational Complexity Theory: What, Why and How Overview: Turing Machines, Church-Turing.
Small subgraphs in the Achlioptas process Reto Spöhel, ETH Zürich Joint work with Torsten Mütze and Henning Thomas TexPoint fonts used in EMF. Read the.
C&O 355 Mathematical Programming Fall 2010 Lecture 4 N. Harvey TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: A A A.
Quantum Computing MAS 725 Hartmut Klauck NTU TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: A A A A.
On Constructing Parallel Pseudorandom Generators from One-Way Functions Emanuele Viola Harvard University June 2005.
Communication Complexity Rahul Jain Centre for Quantum Technologies and Department of Computer Science National University of Singapore. TexPoint fonts.
Languages with Bounded Multiparty Communication Complexity Arkadev Chattopadhyay (McGill) Joint work with: Andreas Krebs (Tubingen) Michal Koucky (Czech.
PODC Distributed Computation of the Mode Fabian Kuhn Thomas Locher ETH Zurich, Switzerland Stefan Schmid TU Munich, Germany TexPoint fonts used in.
One-way multi-party communication lower bound for pointer jumping with applications Emanuele Viola & Avi Wigderson Columbia University IAS work done while.
A limit on nonlocality in any world in which communication complexity is not trivial IFT6195 Alain Tapp.
Asymmetric Communication Complexity And its implications on Cell Probe Complexity Slides by Elad Verbin Based on a paper of Peter Bro Miltersen, Noam Nisan,
Fall 2013 CMU CS Computational Complexity Lectures 8-9 Randomness, communication, complexity of unique solutions These slides are mostly a resequencing.
Umans Complexity Theory Lectures Lecture 7b: Randomization in Communication Complexity.
Massive Data Sets and Information Theory Ziv Bar-Yossef Department of Electrical Engineering Technion.
Data Stream Algorithms Lower Bounds Graham Cormode
CPSC 536N Sparse Approximations Winter 2013 Lecture 1 N. Harvey TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAAAAAAAA.
Norms, XOR lemmas, and lower bounds for GF(2) polynomials and multiparty protocols Emanuele Viola, IAS (Work partially done during postdoc at Harvard)
Pseudorandom Bits for Constant-Depth Circuits with Few Arbitrary Symmetric Gates Emanuele Viola Harvard University June 2005.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Tight Bound for the Gap Hamming Distance Problem Oded Regev Tel Aviv University TexPoint fonts used in EMF. Read the TexPoint manual before you delete.
Hartmut Klauck Centre for Quantum Technologies Nanyang Technological University Singapore.
The Message Passing Communication Model David Woodruff IBM Almaden.
Pseudorandomness: New Results and Applications Emanuele Viola IAS April 2007.
Information Complexity Lower Bounds
A new characterization of ACC0 and probabilistic CC0
Circuit Lower Bounds A combinatorial approach to P vs NP
Branching Programs Part 3
Tight Fourier Tails for AC0 Circuits
CS 154, Lecture 6: Communication Complexity
Linear sketching with parities
Linear sketching over
Linear sketching with parities
Classical Algorithms from Quantum and Arthur-Merlin Communication Protocols Lijie Chen MIT Ruosong Wang CMU.
CS21 Decidability and Tractability
Oracle Separation of BQP and PH
Presentation transcript:

Multiparty Communication Complexity (A biased introduction) Arkadev Chattopadhyay TIFR, Mumbai TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAA A A AA A A

TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAA A A A Yao’s 2-Party Model of Alice a1a1 Alice and Bob collaborate to compute f(X,Y). Aim to minimize the communication cost. Complexity of any f is at most n+1. Bob b1b1 a2a2 brbr Y X = a 1 (X) = a 2 (X,b 1 ) = b 1 (Y,a 1 ) = b r (Y,a 1, ,a r ) Unbounded Computational Power Unbounded Computational Power n n

TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAA A A A Easy Functions Alice (Even) Bob PARITY(X,Y)=1 Y X Compute PARITY(X,Y). My Parity is odd CC(PARITY) = 2. CC(MAJORITY) = O(log n).

TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAA A A A Hard Functions How about EQ(X,Y), i.e. is X=Y? Intuitively, this should require n bits of communication! Needs an argument!

TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAA A A A Rectangularity of Protocols Alice Bob Y X ¼ (X,Y) X’ Y’ ¼ (X’,Y’) X’ X Y’ Y ¼ (X,Y’) ¼ (X’,Y) Observation. Every transcript corresponds to a rectangle of form R X £ C Y. = = =

TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAA A A A Diagonals are Hard to Cover X Y Fact: No two 1’s on diagonal share the same transcript. CC(Equality) ¸ log ( 2 n ) + 1 = n + 1. X,Y X’,Y’ X,Y’ X’,Y

TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAA A A A Set-Disjointness Alice Bob Disj(A,B)=0 Disj(x,y) = 0 iff for some i, x i = y i = 1. Suppose ¼ (a, a c ) = ¼ (b, b c ) Then ¼ (a,b c ) = ¼ (b,a c ) = ¼ (a,a c ) = ¼ (b,b c ) Contradiction! Conclusion: All 2 n inputs of form ( x,x c ) have distinct transcripts. CC(Disj) ¸ n + 1

TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAA A A A Inner-Product Alice Bob IP(x,y) ´   x i ¢ y i (mod 2) R x £ C y be 0-monochromatic. Lin. Ind. Concl: Size of monochromatic rectangle is at most 2 n. CC(IP) ¸ n – o(n) x y x 1, , x ® n y 1, , y ¯ n Lin. Ind. x i ¢ y j = 0 ® + ¯ · 1 IP(X,Y)=1

TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAA A A A Can randomization help? One central theme of theory of computation.

TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAA A A A The Power of Randomness Alice mod 2 Bob 0 Y X Compute EQUALITY(X,Y). mod 2 =0 R 1 / 2 (EQ) = = r = 1 X  Y Randomized protocols can be much more powerful than deterministic ones.

TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAA A A A Limits of Random Protocols Set-Disjointness: Disj(x,y) = 0 iff for some i, x i = y i = 1. R(Set-Disj) =  (n). (Kalyanasundaram-Schnitger’87, Razborov’90) Alice Bob Disj(A,B)=0 Celebrated Result

TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAA A A A Streaming Computation Goal: Answer questions about the frequency distribution on {1, ,n}. Problem: How much space S is needed to approximate the maximal frequency? D[1, ,m] D[i] 2 {1, , n} S

TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAA A A A Application to Streaming Alice S bits Bob 0 Y X S | A x [ B y | 1 = 2 AxAx ByBy Concl: |M| 1 needs  (N) space How much space needed to compute max frequency?

TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAA A A A Many More Applications… Data Structures. Circuit complexity. Pseudo-randomness. Combinatorial Optimization. Property Testing. (Swiss-Army Knife of Computer Scientists)

TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAA A A A Multiparty Communication

TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAA A A A Number-on-Forehead Model Alice Bob Charlie Chandra-Furst-Lipton’83 Every pair of bits visible to someone. Overlap of Information Fewer and fewer information missing from a player. Lower bounds are challenging

TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAA A A A Foreheads Make a Difference X Bob Y Z Charlie Alice 1 1 Is EQ(X,Y,Z)? Is X=Y? Is Z=X? 2-bit protocol Exploits Information Overlap EQUALITY is hard for 2 parties!

TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAA A A A NOF Lower Bounds Benefits Circuit Lower Bounds Branching Program Lower Bounds Pseudo-random generators Lower bounds on length of proofs Data-structure lower bounds More to be discovered….

TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAA A A A Constant-Depth Circuits Conjecture (Smolensky’87): MAJ needs exponential size circuits of constant depth having AND/OR/MOD m gates. ACC 0 ´ {fns having poly-size ckts with AND/OR/MOD gates}. Open: Is NP µ ACC 0 ?

TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAA A A A Bounded Depth Circuits f computed by constant-depth circuits with AND/OR/MOD gates efficiently, AND SYMM f Beigel –Tarui’91 Beige

TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAA A A A Protocols for Depth 2 AND SYMM f Question: k+1-party NOF complexity of f ? Observ: Each AND gate can be computed by one player. Protocol : Players 1, ,k send the number of AND gates they see firing 1, communicating only poly-log bits each. Player k+1 announces the answer.

TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAA A A A NOF Attack on ACC Theorem: Every f 2 ACC 0 has poly-log(n) simultaneous k- party communication complexity for some k = poly-log(n), under every input partition. Corollary of Beigel-Tarui’91 Major Goal: Find f that is hard for large number of players.

A Conjecture f:{0,1} n ! {0,1} X1X1 X2X2 X3X3 XkXk (f ± q) (X 1,X 2, ,X k ) = ) MAJ ± MAJ  ACC f(q(C 1 ),q(C 2 ),…,q(C n )) n Question: Complexity of (MAJ ± MAJ)? Observation: a la Beigel-Tarui’91 ) MAJ  ACC 0 Proposed by Babai-Kimmel-Lokam’95 q:{0,1} k ! {0,1}.

TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAA A A A Examples of Composition PARITY ± AND Remark 1: Argument for Set-Disj spawned many new techniques. ´ IP Popular Names NOR ± AND ´ Set-Disj Complexity ? Deterministic Chor-Goldreich’85 KS’87, Razborov’90 BJKS’02 £ (n). Folklore k=2 Randomized Discrepancy Very influential Remark 2: Has many diverse applications.

TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAA A A A NOF Lower Bounds PARITY ± AND ´ GIP Popular Names NOR ± AND ´ Set-Disj Deterministic/Randomized  (n/4 k ).  ((log n)/k). Babai-Nisan-Szegedy’89 Tesson’05 k ¸ 3 Seminal Paper Lee-Shraibman’08, C-Ada’08 Sherstov’12 Sherstov’13 Rao-Yehudayoff’14 Deterministic Apology: SKIPPED other attempts Improvement Beame-Huynh-Ngoc’09

TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAA A A A NOF Lower Bounds PARITY ± AND ´ GIP Popular Names Deterministic/Randomized  (n/4 k ). Babai-Nisan-Szegedy’89 k ¸ 3 Seminal Paper Remark 1: There is no separate, easier argument for deterministic case. Remark 2: All strong bounds on (interactive) k-complexity use variations of the BNS argument. Remark 3: All known bounds decay exponentially in k, are trivial for k= ! (log n). Remark 4: By contrast, for k=2 several methods are known. Chor-Goldreich’85 Discrepancy Razborov’89 Corruption Raz’95 Fourier-analytic BJKS’02 and many more Information Theory

TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAA A A A Surprising Upper Bounds SYM ± AND {GIP, Disj,…} Popular Names SYM ± g {GIP, MAJ ± MAJ, Disj…} Deterministic  (n/2 k + k ¢ log n ). O(k.(log n) 2 ), k ¸ log n + 2. Grolmusz’91, Pudlak Babai-Gal-Kimmel-Lokam’ k ¸ 3 Ada-C-Fawzi-Nguyen’12 g: compressible SYM ± ANY SYM ± ANY s Simultaneous s ¼ log log n C-Saks’14 Almost- Simultaneous O(k.(log n) 2 ), k ¸ log n + 4. poly-log(n), k ¸ 2log n

TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAA A A A Cylinder Intersections X Y Z C Z ´ C Z (X,Y) C Y ´ C Y (X,Z) C X ´ C X (Y,Z) C= C X Å C Y Å C Z is a cylinder intersection. Rectangles, i.e. C 1 (X) £ C 2 (Y) £ C 3 (Z), are very special. Fact: A c-bit deterministic protocol partitions inputs into at most 2 c monochromatic cylinder intersections.

TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAA A A A The Discrepancy Method Discrepancy: For a probability distr ¹, | ¹ -wt of f -1 (1) in C – ¹ -wt of f -1 (-1) in C | disc ¹ ( f, C ) = disc ¹ ( f ) = max C disc ¹ ( f, C ). Discrepancy Method: ¦ ´ C1 [ C2 [  [ Ct¦ ´ C1 [ C2 [  [ Ct Adv in C i = disc ¹ (f,C i ) Total Adv = 2 ² Union bound Yao’s method

TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAA A A A Question: How do we compute discrepancy? An inductive Cauchy-Schwarz argument.

TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAA A A A Cauchy-Schwarz Magic 0/1 valued Cauchy-Schwarz £2£2 £2£2 2 2 £2£2 ind of X

TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAA A A A The BNS-Chung Criterion Theorem (Raz’00): Cube Measure/Gower’s norm

TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAA A A A Application to GIP cici Observation: Conclusion: Discrepancy Method:

TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAA A A A Limitations of Discrepancy L - = set of non-disjoint inputs L + = set of disjoint inputs ith column C i = set of inputs that have an all-one ith column Fact: L - = C 1 [  [ C n. Fact: Each C i is a rectangle. Conclusion 1: L - has a small cover. Conclusion 2: For every distribution ¹, Corollary: Impossible to get ! (log n) bounds for DISJ by direct DM.

TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAA A A A Generalized Discrepancy Lemma (Generalized Discrepancy): Denote X = Y 1 £  £ Y k. Let f: X  {1,-1} and g: X  {1,-1} be such that Corr ¹ (f,g) ¸ ±, for some distribution ¹. Remark: The classical discrepancy method follows by putting g=f and hence ± =1. disc( g ) << disc( f ) Klauck’01 applied to f = MAJ ± AND.

TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAA A A A Composed Functions Question: Given f, how to find g? Answer: No general technique known. For f ± q, Sherstov’08 and Shi-Zhu’08 gave techniques for 2-party.

TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAA A A A Polynomial Representation Let V ´ {f | f:{0,1} n  R }. Observation: V is a vector space of dimension 2 n. Defn: For each S µ {1, ,n}, Fact: The set M ´ { Â S | S µ [{1, ,n} forms a basis of V, called the Fourier basis. Definition: Let f=  S c S Â S. The degree of f is the cardinality of a maximal S such that c S  0.

TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAA A A A Approximation of Functions Fundamental: How closely can f :{0, 1} n ! R be approximated by low degree functions? Definition: The ± -approximate degree of f, deg ± ( f ), is the minimum integer d such that there exists Á 2 span({ Â S : | S | · d}) and max x 2 {0,1} n

TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAA A A A Degree of Functions AND(X) = X 1 X 2  X n OR(X) = 1 – (1-X 1 )(1-X 2 )  (1-X n ) PARITY(X) MAJORITY(X) Exact degree £ (n) Fact (Nisan-Szegedy’92): Deg 1/3 (OR) = Approx degree?

TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAA A A A Pattern Matrix Method 10 X1X1 X2X2 01 X1X1 X2X2 X Y X1X1 IN : X2X2 Let q:{0,1} s £ {0,1} s  {0,1} have IN as a sub-(partial)function. Let f have high approximation degree d. For f ± q, Sherstov’08 applied Generalized-Discrepancy : 2 2

TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAA A A A Pattern Tensor Method q: {0,1} sk  {0,1}, contains. f : {0,1} m  {0,1}, approximation degree d. Lee-Shraibman’08 and C-Ada’08 applied Generalized-Discrepancy : Indices into tensor doubly exp in k constant k, n  (1)

TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAA A A A Block-Composition Introduced by Shi-Zhu’08 for 2-party. f : {0,1} m  {0,1}, approximation degree d. q : {0,1} s £ {0,1} s  {0,1}. same property as before spectral (analytic) property f ± q: Generalized-Discrepancy gives strong 2-party bounds. How to extend to k ¸ 3 parties?

TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAA A A A Discrepancy Amplification q : {0,1} (k+1) £ t  {0,1}. Theorem(C’08): If, º : q is º -balanced. Defn: q is ( °, º )-amplifiable if for all S µ [m]:

TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAA A A A Multiparty Block Composition f : {0,1} m  {0,1}, approximation degree d. q : {0,1} (k+1) £ s  {0,1}. same property as before q is º -balanced and ( °, º )-amplifiable Theorem(C’08): If,

TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAA A A A Proof Approximation-Orthogonality Simple Fourier Analysis

TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAA A A A Approximation-Orthogonality Lemma (Sherstov08, Shi-Zhu08): Let f :{0,1} m ! {-1, 1} have deg ± ( f ) = d ¸ 1. Then, there exists a g :{0,1} m ! {-1,1} and a distribution ¹ such that and g is ( ¹, d )-orthogonal, i.e.

TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAA A A A Block Communication Strategy Fact (NS’92): Deg 1/3 (OR) =  ( ). f disc ¸ ( g ± q ) is low. R k ² ( g ± q ) is high R k ² ( f ± q ) is high ( ¹, d )- orthogonal Discrepancy-Method g ( ¹, ± )- Correlated block q g±qg±q ( ¸, ± )- Correlated Hardness-Amplification Lemma block q Approximation/Orthogonality Lemma Approx-degree= d f±qf±q