Separating Deterministic from Randomized Multiparty Communication Complexity Joint work with Paul Beame (University of Washington) Matei David (University.

Slides:



Advertisements
Similar presentations
Constant-Round Private Database Queries Nenad Dedic and Payman Mohassel Boston UniversityUC Davis.
Advertisements

Estimating Distinct Elements, Optimally
1+eps-Approximate Sparse Recovery Eric Price MIT David Woodruff IBM Almaden.
Optimal Space Lower Bounds for All Frequency Moments David Woodruff MIT
Quantum Lower Bounds The Polynomial and Adversary Methods Scott Aaronson September 14, 2001 Prelim Exam Talk.
Lower Bounds for Local Search by Quantum Arguments Scott Aaronson.
Limitations of Quantum Advice and One-Way Communication Scott Aaronson UC Berkeley IAS Useful?
The Complexity of Agreement A 100% Quantum-Free Talk Scott Aaronson MIT.
Optimal Space Lower Bounds for all Frequency Moments David Woodruff Based on SODA 04 paper.
Optimal Bounds for Johnson- Lindenstrauss Transforms and Streaming Problems with Sub- Constant Error T.S. Jayram David Woodruff IBM Almaden.
Xiaoming Sun Tsinghua University David Woodruff MIT
Tight Lower Bounds for the Distinct Elements Problem David Woodruff MIT Joint work with Piotr Indyk.
Subspace Embeddings for the L1 norm with Applications Christian Sohler David Woodruff TU Dortmund IBM Almaden.
Recognising Languages We will tackle the problem of defining languages by considering how we could recognise them. Problem: Is there a method of recognising.
Computational Complexity
Truthful Mechanisms for Combinatorial Auctions with Subadditive Bidders Speaker: Shahar Dobzinski Based on joint works with Noam Nisan & Michael Schapira.
Low-End Uniform Hardness vs. Randomness Tradeoffs for Arthur-Merlin Games. Ronen Shaltiel, University of Haifa Chris Umans, Caltech.
Lower Bounds for Non-Black-Box Zero Knowledge Boaz Barak (IAS*) Yehuda Lindell (IBM) Salil Vadhan (Harvard) *Work done while in Weizmann Institute. Short.
Parallel Repetition of Two Prover Games Ran Raz Weizmann Institute and IAS.
Short seed extractors against quantum storage Amnon Ta-Shma Tel-Aviv University 1.
The Round Complexity of Two-Party Random Selection Saurabh Sanghvi and Salil Vadhan Harvard University.
A threshold of ln(n) for approximating set cover By Uriel Feige Lecturer: Ariel Procaccia.
Complexity Classes: P and NP
Approximate List- Decoding and Hardness Amplification Valentine Kabanets (SFU) joint work with Russell Impagliazzo and Ragesh Jaiswal (UCSD)
1 Complexity ©D.Moshkovitz Cryptography Where Complexity Finally Comes In Handy…
Theory of Computing Lecture 23 MAS 714 Hartmut Klauck.
1 Decidability continued…. 2 Theorem: For a recursively enumerable language it is undecidable to determine whether is finite Proof: We will reduce the.
Circuit and Communication Complexity. Karchmer – Wigderson Games Given The communication game G f : Alice getss.t. f(x)=1 Bob getss.t. f(y)=0 Goal: Find.
Quantum Information and the PCP Theorem Ran Raz Weizmann Institute.
Quantum One-Way Communication is Exponentially Stronger than Classical Communication TexPoint fonts used in EMF. Read the TexPoint manual before you delete.
Statistically motivated quantifiers GUHA matrices/searches can be seen from a statistical point of view, too. We may ask ‘Is the coincidence of two predicates.
Secret Sharing, Matroids, and Non-Shannon Information Inequalities.
Deterministic vs. Non-Deterministic Graph Property Testing Asaf Shapira Tel-Aviv University Joint work with Lior Gishboliner.
The Communication Complexity of Approximate Set Packing and Covering
Complexity Theory Lecture 3 Lecturer: Moni Naor. Recap Last week: Non deterministic communication complexity Probabilistic communication complexity Their.
COMP 553: Algorithmic Game Theory Fall 2014 Yang Cai Lecture 21.
Gillat Kol (IAS) joint work with Ran Raz (Weizmann + IAS) Interactive Channel Capacity.
Introduction to Modern Cryptography, Lecture 12 Secure Multi-Party Computation.
Complexity 15-1 Complexity Andrei Bulatov Hierarchy Theorem.
Complexity 18-1 Complexity Andrei Bulatov Probabilistic Algorithms.
1 Introduction to Computability Theory Lecture12: Reductions Prof. Amos Israeli.
CS151 Complexity Theory Lecture 6 April 15, 2015.
CS151 Complexity Theory Lecture 7 April 20, 2004.
Complexity 19-1 Complexity Andrei Bulatov More Probabilistic Algorithms.
Theory of Computing Lecture 22 MAS 714 Hartmut Klauck.
Collecting Correlated Information from a Sensor Network Micah Adler University of Massachusetts, Amherst.
1 Algorithms for Large Data Sets Ziv Bar-Yossef Lecture 13 June 22, 2005
Complexity Theory Lecture 2 Lecturer: Moni Naor. Recap of last week Computational Complexity Theory: What, Why and How Overview: Turing Machines, Church-Turing.
CS151 Complexity Theory Lecture 13 May 11, Outline proof systems interactive proofs and their power Arthur-Merlin games.
Cs3102: Theory of Computation Class 24: NP-Completeness Spring 2010 University of Virginia David Evans.
One-way multi-party communication lower bound for pointer jumping with applications Emanuele Viola & Avi Wigderson Columbia University IAS work done while.
Communication vs. Computation S Venkatesh Univ. Victoria Presentation by Piotr Indyk (MIT) Kobbi Nissim Microsoft SVC Prahladh Harsha MIT Joe Kilian NEC.
Asymmetric Communication Complexity And its implications on Cell Probe Complexity Slides by Elad Verbin Based on a paper of Peter Bro Miltersen, Noam Nisan,
Fall 2013 CMU CS Computational Complexity Lectures 8-9 Randomness, communication, complexity of unique solutions These slides are mostly a resequencing.
Umans Complexity Theory Lectures Lecture 7b: Randomization in Communication Complexity.
Computability & Complexity II Chris Umans Caltech.
Communication Complexity Guy Feigenblat Based on lecture by Dr. Ely Porat Some slides where adapted from various sources Complexity course Computer science.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Topic 36: Zero-Knowledge Proofs
Probabilistic Algorithms
Information Complexity Lower Bounds
Introduction to Randomized Algorithms and the Probabilistic Method
Branching Programs Part 3
Effcient quantum protocols for XOR functions
CS 154, Lecture 6: Communication Complexity
Imperfectly Shared Randomness
CS21 Decidability and Tractability
Shengyu Zhang The Chinese University of Hong Kong
CS151 Complexity Theory Lecture 7 April 23, 2019.
Presentation transcript:

Separating Deterministic from Randomized Multiparty Communication Complexity Joint work with Paul Beame (University of Washington) Matei David (University of Toronto) Toni Pitassi (University of Toronto) Philipp Woelfel

Multiparty Communication k players Each player has a Post-It © Note with an n-bit string on the forehead Each player can see what’s written on the other players’ Post-It © Notes, but not what’s on her own Goal: compute the function f:{ 0,1} kn  {0,1} Alice Bob Chris

Protocols Players communicate in rounds. In each round one player writes a message to board. All players can see the messages. At some point the players agree that the protocol ends. All players can deduce f(x,y,z) from board contents. Complexity: Length of the final string on the board

Randomization Randomized Protocols: Each player can use a random source Private Coin / Public Coin

Why? For k=2 very well understood (“number-on-forehead”=“number-in-hand”). Best known lower bounds: Ω(n/2 k ) [BNS92,CT93,Raz00,FG06] Any function in ACC 0 has a protocol with complexity (log n) O(1) for k= (log n) O(1). Many other applications (time space tradeoffs, proof system lower bounds, circuit complexity,…)

Natural Questions Does nondeterminism help? Does randomization help? Public coin vs. private coin?

Complexity Classes & Separations P [k] = class of functions with a k-player deterministic protocol of complexity (log n) O(1) Analogously define RP [k], BPP [k], NP [k]. Explicit Separations: Lee,Shraibman 08 / Chattopadhyay,Ada 08: Set Inters.  NP [k] -BPP [k ] for all k ≤ loglog n-O(logloglog n). David, Pitassi, Viola 08 / Beame,Huynh-Ngoc 08: Explicit functions f  NP [k] -BPP [k] for k = Ω(log n)

Result For k=n O(1) : RP [k] ≠ P [k] * But we don’t know a function that’s in RP [k] - P [k] *

Proof Overview Proof for k=3: 1.Define a special class of simple functions. 2.Each simple function is in co-RP [k]. 3.Show: If a simple functions has a deterministic protocol of complexity D, then it has a special deterministic protocol of complexity D + O(1). 4.Show that there are more simple functions than special protocols of complexity n/2.  There exists a simple function of complexity more than n/2-1.  f is in co-RP [k] but not in P [k].

Simple Functions Let g:{0,1} n x {0,1} n  {0,1} m. f(x,y,z)=1 if and only if g(x,y)=z. Chris knows x,y and can compute g(x,y). E.g., f(x,y,z)=1 iff x+y=z =30. Do I have 30 on my Post-It © ? 7 7

Proof Overview Proof for k=3: 1.Define a special class of simple functions. 2.Each simple function is in co-RP [k]. 3.Show: If a simple functions has a deterministic protocol of complexity D, then it has a special deterministic protocol of complexity D + O(1). 4.Show that there are more simple functions than special protocols of complexity n/2.  There exists a simple function of complexity more than n/2-1.  f is in co-RP [k] but not in P [k].

7 7 Each Simple function is in co-RP [k] Alice knows z. Chris knows g(x,y). Solve: EQ[ g(x,y), z ]. Well-known randomized 2-party protocol (compare fingerprints). Small 1-sided error probability, false positives. Complexity Private coins: O(log n). Public coins: O(1) g(x,y) z z Zzzzz… g(x,y)=z?

Proof Overview Proof for k=3: 1.Define a special class of simple functions. 2.Each simple function is in co-RP [k]. 3.Show: If a simple functions has a deterministic protocol of complexity D, then it has a special deterministic protocol of complexity D + O(1). 4.Show that there are more simple functions than special protocols of complexity n/2.  There exists a simple function of complexity more than n/2-1.  f is in co-RP [k] but not in P [k].

7 7 Special Protocols for Simple Functions Let f be a simple fct. and P a det. protocol for f with complexity D Chris computes r=g(x,y) and writes T=P(x,y,r) on board. A. & B. check whether they would send the same messages as in T. If yes, they write 1s, otherwise 0. Iff last 2 bits are 1, accept. Complexity of P’ = D If I have 30 on my Post-It ©, then P produces…

Correctness Case 1: f(x,y,z)=1  g(x,y)=z.  Chris sends P(x,y,z).  Alice and Bob accept. Case 2: f(x,y,z)=0 P(x,y,z)≠P(x,y,r) Consider the first bit (at pos. i) where the protocols differ. This bit is not being sent by Chris’: Knowing the first i-1 bits of P(x,y,z), Chris cannot distinguish between (x,y,z) and (x,y,r)  Either Alice or Bob notices the error

Proof Overview Proof for k=3: 1.Define a special class of simple functions. 2.Each simple function is in co-RP [k]. 3.Show: If a simple functions has a deterministic protocol of complexity D, then it has a special deterministic protocol of complexity D + O(1). 4.Show that there are more simple functions than special protocols of complexity n/2.  There exists a simple function of complexity more than n/2-1.  f is in co-RP [k] but not in P [k].

# of Protocols vs. # of Functions The Number of Special Protocols: Chris sends a D-bit message that depends on (x,y).  Function f C :{0,1} 2n  {0,1} D Alice and Bob decide to accept or reject, depending on Chris’ message and (x,z) and (y,z), resp.  f A :{0,1} n+m+D  {0,1} and f B :{0,1} n+m+D  {0,1} log(# functions f C ) = D·2 2n log(# functions f A ) = log(# functions f B ) = 2 n+m+D  A protoc. can be described with D·2 2n +2 n+m+D+1 bits.

# Protocols vs. # of Functions  log(#protocols) = D·2 2n +2 n+m+D+1. The Number of Functions: Each simple function is uniquely determined by g:{0,1} n x {0,1} n  {0,1} m  Each simple function can be described with m·2 2n bits.  log(#simple functions) = m·2 2n Putting Things Together:  D·2 2n +2 n+m+D+1 ≥ m·2 2n  2 D ≥ m2 2n-n-m-1 -D·2 2n-n-m-1 = (m-D)·2 n-m-1  D ≥ min{m/2, (n-m-2)·log m}  E.g., for m=n/2 we have D ≥ n/2

Proof Overview Proof for k=3: 1.Define a special class of simple functions. 2.Each simple function is in co-RP [k]. 3.Show: If a simple functions has a deterministic protocol of complexity D, then it has a special deterministic protocol of complexity D + O(1). 4.Show that there are more simple functions than special protocols of complexity n/2.  There exists a simple function f of complexity more than n/2-O(1).  f is in co-RP [k] but not in P [k].

Public Coins vs. Private Coins R(f) = complexity for 1-sided error ≤ ½, private coins. R pub (f) = […], public coins. D(f) = complexity of deterministic protocols. Newman ’91: For all functions f: R(f)=R pub (f)+O(log n). Is there a function f, where R(f)=R pub (f )+Ω(log n)? Recall: There is a simple function f* s.t. D ( f*)=Ω(n). Hence, R pub (f*)=O(1) Lemma (similar to k=2): D(f)  k(log k)2 O(R(f)) for all f.  R(f*) = Ω(log n), if k = n ε, ε<1.  R(f*) = R pub (f*)+Ω(log n).

Explicit Lower Bounds for Simple Functions Explicit Functions for k=3: H: 2-wise independent hash family U  Z For a hash function hH and key xU, let g(h,x)=h(x). I.e., f(h,x,z)=1 iff h(x)=z. Theorem: For k≤εlog n, ε>0 small enough, there is an explicitly defined function f k such that D ( f k )=Ω(log n). Theorem: For k≤εlog n, ε>0 small enough, there is an explicitly defined function f k such that D ( f k )=Ω(log n). Corollary: For k≤εlog n, ε>0 small enough, there is an explicitly defined function f k such that R ( f k )=Ω(loglog n) but R pub (f k )=O(1).

Proof Idea Assume there is a protocol with complexity D Recall: Chris sends message first, then Alice and Bob decide. For each (h,x) Chris sends one out of 2 D messages. Corresponds to a 2 D -coloring of the function matrix of g. x h g

Proof Idea Consider the most popular value/color pair (z,c). Let M  HU be the rectangle spanned by these entries. Assume: (x,y)M Chris has entry z Chris sends message c  Alice and Bob accept.  g(x,y)=z. x h g

Proof Idea Consider function g |M Hash-Mixing-Lemma [MNT93]: Pr(g(x,y)=z|(x,y)M)  |Z| -1  M is large and only few entries in M have value z. Same preconditions, but # of colors reduced by 1. Some inputs are “covered” Continue this, until all colors have been used up. If #colors is too small, not all inputs can be covered h g x x xx x xxx xx

Open Problems Define an explicit function in RP [k] – P [k] Prove better lower bounds for simple functions.

Alice Bob Chris This talk was not sponsored by Post-It ©