The Power of Super-Log Number of Players Arkadev Chattopadhyay (TIFR, Mumbai) Joint with: Michael Saks ( Rutgers )

Slides:



Advertisements
Similar presentations
Merkle Puzzles Are Optimal
Advertisements

Quantum Lower Bounds The Polynomial and Adversary Methods Scott Aaronson September 14, 2001 Prelim Exam Talk.
Parikshit Gopalan Georgia Institute of Technology Atlanta, Georgia, USA.
The Contest between Simplicity and Efficiency in Asynchronous Byzantine Agreement Allison Lewko The University of Texas at Austin TexPoint fonts used in.
Matroids from Lossless Expander Graphs
Factor Graphs, Variable Elimination, MLEs Joseph Gonzalez TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA A AA A A.
C&O 355 Mathematical Programming Fall 2010 Lecture 12 N. Harvey TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA A.
1 Combinatorial Agency with Audits Raphael Eidenbenz ETH Zurich, Switzerland Stefan Schmid TU Munich, Germany TexPoint fonts used in EMF. Read the TexPoint.
Gillat Kol (IAS) joint work with Ran Raz (Weizmann + IAS) Interactive Channel Capacity.
Gillat Kol joint work with Ran Raz Competing Provers Protocols for Circuit Evaluation.
Linear Systems With Composite Moduli Arkadev Chattopadhyay (University of Toronto) Joint with: Avi Wigderson TexPoint fonts used in EMF. Read the TexPoint.
Foundations of Cryptography Lecture 4 Lecturer: Moni Naor.
On the relation between probabilistic and deterministic avoidance games Torsten Mütze, ETH Zürich Joint work with Michael Belfrage (ETH Zürich), Thomas.
1 Truthful Mechanism for Facility Allocation: A Characterization and Improvement of Approximation Ratio Pinyan Lu, MSR Asia Yajun Wang, MSR Asia Yuan Zhou,
1 of 9 ON ALMOST LYAPUNOV FUNCTIONS Daniel Liberzon University of Illinois, Urbana-Champaign, U.S.A. TexPoint fonts used in EMF. Read the TexPoint manual.
The double-dimer model and skew Young diagrams Richard W. Kenyon David B. Wilson Brown University Microsoft Research TexPoint fonts used in EMF. Read the.
1 List Coloring and Euclidean Ramsey Theory TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: A A A A Noga Alon, Tel Aviv.
TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAA A.
Strong Implementation of Social Choice Functions in Dominant Strategies Clemens ThielenSven O. Krumke 3rd International Workshop on Computational Social.
Non-Uniform ACC Circuit Lower Bounds Ryan Williams IBM Almaden TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA A A.
On Sketching Quadratic Forms Robert Krauthgamer, Weizmann Institute of Science Joint with: Alex Andoni, Jiecao Chen, Bo Qin, David Woodruff and Qin Zhang.
ETH Zurich – Distributed Computing Group Roger Wattenhofer 1ETH Zurich – Distributed Computing – Christoph Lenzen Roger Wattenhofer Exponential.
Maximum A Posteriori (MAP) Estimation Pieter Abbeel UC Berkeley EECS TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.:
Lattices for Distributed Source Coding - Reconstruction of a Linear function of Jointly Gaussian Sources -D. Krithivasan and S. Sandeep Pradhan - University.
On sparse Ramsey graphs Torsten Mütze, ETH Zürich Joint work with Ueli Peter (ETH Zürich) TexPoint fonts used in EMF. Read the TexPoint manual before you.
Dan Boneh Intro. Number Theory Modular e’th roots Online Cryptography Course Dan Boneh.
Complexity Theory Lecture 2 Lecturer: Moni Naor. Recap of last week Computational Complexity Theory: What, Why and How Overview: Turing Machines, Church-Turing.
Small subgraphs in the Achlioptas process Reto Spöhel, ETH Zürich Joint work with Torsten Mütze and Henning Thomas TexPoint fonts used in EMF. Read the.
Quantum Computing MAS 725 Hartmut Klauck NTU TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: A A A A.
Eric Allender Rutgers University Dual VP Classes Joint work with Anna Gál (U. Texas) and Ian Mertz (Rutgers) MFCS, Milan, August 27, 2015.
On Constructing Parallel Pseudorandom Generators from One-Way Functions Emanuele Viola Harvard University June 2005.
An algorithmic proof of the Lovasz Local Lemma via resampling oracles Jan Vondrak IBM Almaden TexPoint fonts used in EMF. Read the TexPoint manual before.
Languages with Bounded Multiparty Communication Complexity Arkadev Chattopadhyay (McGill) Joint work with: Andreas Krebs (Tubingen) Michal Koucky (Czech.
Number Theory Project The Interpretation of the definition Andre (JianYou) Wang Joint with JingYi Xue.
PODC Distributed Computation of the Mode Fabian Kuhn Thomas Locher ETH Zurich, Switzerland Stefan Schmid TU Munich, Germany TexPoint fonts used in.
One-way multi-party communication lower bound for pointer jumping with applications Emanuele Viola & Avi Wigderson Columbia University IAS work done while.
Communication vs. Computation S Venkatesh Univ. Victoria Presentation by Piotr Indyk (MIT) Kobbi Nissim Microsoft SVC Prahladh Harsha MIT Joe Kilian NEC.
Some Fundamental Insights of Computational Complexity Theory Avi Wigderson IAS, Princeton, NJ Hebrew University, Jerusalem.
Zero-Knowledge Argument for Polynomial Evaluation with Applications to Blacklists Stephanie Bayer Jens Groth University College London TexPoint fonts used.
Umans Complexity Theory Lectures Lecture 7b: Randomization in Communication Complexity.
1/27/ Fundamental Theorem of Algebra. Intro Find all zeros for each of the following: Multiplicity – When more than one zero occurs at the.
ETH Zurich – Distributed Computing Group Stephan Holzer 1ETH Zurich – Distributed Computing – Stephan Holzer Yvonne Anne Pignolet Jasmin.
ETH Zurich – Distributed Computing Group Stephan Holzer 1ETH Zurich – Distributed Computing – Stephan Holzer Yvonne Anne Pignolet Jasmin.
Pseudorandom Bits for Constant-Depth Circuits with Few Arbitrary Symmetric Gates Emanuele Viola Harvard University June 2005.
Smooth Boolean Functions are Easy: Efficient Algorithms for Low-Sensitivity Functions Rocco Servedio Joint work with Parikshit Gopalan (MSR) Noam Nisan.
Tight Bound for the Gap Hamming Distance Problem Oded Regev Tel Aviv University TexPoint fonts used in EMF. Read the TexPoint manual before you delete.
ETH Zurich – Distributed Computing Group Stephan Holzer 1ETH Zurich – Distributed Computing – Stephan Holzer Yvonne Anne Pignolet Jasmin.
Conjugate Pairs Theorem Every complex polynomial function of degree n  1 has exactly n complex zeros, some of which may repeat. 1) A polynomial function.
The Message Passing Communication Model David Woodruff IBM Almaden.
Multiparty Communication Complexity (A biased introduction) Arkadev Chattopadhyay TIFR, Mumbai TexPoint fonts used in EMF. Read the TexPoint manual before.
ETH Zurich – Distributed Computing Group Stephan HolzerETH Zurich – Distributed Computing – Stephan Holzer - ETH Zürich Thomas Locher.
Information Complexity Lower Bounds
Jens Groth, University College London
Linear Algebra with Sub-linear Zero-Knowledge Arguments
Effcient quantum protocols for XOR functions
Sketching and Embedding are Equivalent for Norms
CS 154, Lecture 6: Communication Complexity
TexPoint fonts used in EMF.
Linear sketching with parities
CRYPTOGRAPHY קריפטוגרפיה Thu 15:45-18:15.
Simulations and Reductions
Linear sketching over
Fundamental Theorem of Algebra
Renaming and Oriented Manifolds
Linear sketching with parities
CS21 Decidability and Tractability
New Direct Product results in Communication Complexity
Combinatorial Topology and Distributed Computing
8-5 Rational Zero Theorem
Towards a Classification of Non-interactive Computational Assumptions in Cyclic Groups Essam Ghadafi University of the West of England Jens Groth University.
Presentation transcript:

The Power of Super-Log Number of Players Arkadev Chattopadhyay (TIFR, Mumbai) Joint with: Michael Saks ( Rutgers )

A Conjecture f:{0,1} n ! {0,1} X1X1 X2X2 X3X3 XkXk (f ± g) ( X 1, X 2, , X k ) = ) MAJ ± MAJ  ACC f(g(C 1 ), g(C 2 ),…, g(C n )) n Question: Complexity of (MAJ ± MAJ)? Observation: a la Beigel-Tarui’91 ) MAJ  ACC 0 Proposed by Babai-Kimmel-Lokam’95 g:{0,1} k ! {0,1}.

TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAA A A A Some Upper Bounds SYM ± AND {GIP, Disj,…} Popular Names SYM ± g {GIP, MAJ ± MAJ, Disj…} Deterministic  (n/ 2 k + k ¢ log n ). O(k.(log n) 2 ), k ¸ log n + 2. Grolmusz’91, Pudlak Babai-Gal-Kimmel-Lokam’02 k ¸ 3 Ada-C-Fawzi-Nguyen’12 g: compressible and symmetric SYM ± ANY Simultaneous Almost- Simultaneous O(k.(log n) 2 ), k ¸ log n + 4.

Block Composition f:{0,1} n ! {0,1} X1X1 X2X2 X3X3 XkXk (f n ± g r ) ( X 1, X 2, , X k ) = ) MAJ  ACC 0 f(g(A 1 ), g(A 2 ),…, g(A n )) n = 2 r = 3 Conjecture: Fact: Babai-Gal-Kimmel-Lokam’02 g:{0,1} k £ r ! {0,1}. Still Open! A1A1 A2A2 Even for interactive protocols

TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAA A A A Our Result Theorem: SYM n ± ANY r has a 2-round k-party deterministic protocol of cost when, Remark 1: First protocol for r > 1. Remark 2: Corollary: MAJ ± MAJ r has efficient protocol when r is poly-log and k is a sufficiently large poly-log. r = O(log log n)

Main Ingredients Computing k-1 degree polynomials is easy for k- players. (Goldman-Hastad’90’s) Degree reduction by basis change. (New Idea)

Low degree Polynomials x3 x5 x7x3 x5 x7 Alice Bob x 6 x 10 x 11 x2 x8 x9x2 x8 x9 Charlie Alex x 1 x 4 x 12 Bob, Charlie Alice Alex Alice, Charlie Bob, Alex deg( P ) = 3 k = 4 > deg( P ) Simultaneous k -party deterministic protocol Cost = O( k ¢ log| F |)

A Polynomial Fantasy f:{0,1} n ! {0,1} (SYM ± g) ( C 1, C 2, , C n ) = Fantasy: P high (Ci) = 0 for all i !! g:{0,1} k ! {0,1} µ F p. Prime p > n g(X) ´ P(X 1, ,X k ) deg(P) · k P ´ P high (X) + P low (X) deg < k deg = k easy k-player protocol of cost = k.log(p) Bad

Shifted Basis Example: Fact: B u is a basis for every u 2 {0,1} k u = 0 k gives standard basis u -shifted A Def: u is good for A if for all column C of A, u and C agree on some co-ordinate good bad no agreement

Good is Really Good (SYM ± g) ( C 1, C 2, , C n ) = Fact: P high ( C ) = 0 for all C if u is good for A. easy k-player protocol of cost log(p) Bad u Apply u -shift u u Zeroed out!

Good Shifts Are Aplenty Observation: If k À log n + 1, Player k spots many good shifts. Protocol: Player k announces a good shift u. All players compute their portions using u. Simultaneous! Cost = k - 1 Cost = k ¢ log(p) = O( k ¢ log n ) Extends to r = O(log log n).

Future Direction Can we go to r = O(log n)? Is ? Thank You!