Multiparty communication complexity

Last updated

In theoretical computer science, multiparty communication complexity is the study of communication complexity in the setting where there are more than 2 players.

In the traditional two–party communication game, introduced by Yao (1979), [1] two players, P1 and P2 attempt to compute a Boolean function

Player P1 knows the value of x2, P2 knows the value of x1, but Pi does not know the value of xi, for i = 1, 2.

In other words, the players know the other's variables, but not their own. The minimum number of bits that must be communicated by the players to compute f is the communication complexity of f, denoted by κ(f).

The multiparty communication game, defined in 1983, [2] is a powerful generalization of the 2–party case: Here the players know all the others' input, except their own. Because of this property, sometimes this model is called "numbers on the forehead" model, since if the players were seated around a round table, each wearing their own input on the forehead, then every player would see all the others' input, except their own.

The formal definition is as follows: players: intend to compute a Boolean function

On set of variables there is a fixed partition of classes , and player knows every variable, except those in , for . The players have unlimited computational power, and they communicate with the help of a blackboard, viewed by all players.

The aim is to compute ), such that at the end of the computation, every player knows this value. The cost of the computation is the number of bits written onto the blackboard for the given input and partition . The cost of a multiparty protocol is the maximum number of bits communicated for any from the set {0,1}n and the given partition . The -party communication complexity, of a function , with respect to partition , is the minimum of costs of those -party protocols which compute . The -party symmetric communication complexity of is defined as

where the maximum is taken over all k-partitions of set .

Upper and lower bounds

For a general upper bound both for two and more players, let us suppose that A1 is one of the smallest classes of the partition A1,A2,...,Ak. Then P1 can compute any Boolean function of S with |A1| + 1 bits of communication: P2 writes down the |A1| bits of A1 on the blackboard, P1 reads it, and computes and announces the value . So, the following can be written:

The Generalized Inner Product function (GIP) [3] is defined as follows: Let be -bit vectors, and let be the times matrix, with columns as the vectors. Then is the number of the all-1 rows of matrix , taken modulo 2. In other words, if the vectors correspond to the characteristic vectors of subsets of an element base-set, then GIP corresponds to the parity of the intersection of these subsets.

It was shown [3] that

with a constant c > 0.

An upper bound on the multiparty communication complexity of GIP shows [4] that

with a constant c > 0.

For a general Boolean function f, one can bound the multiparty communication complexity of f by using its L1 norm [5] as follows: [6]

Multiparty communication complexity and pseudorandom generators

A construction of a pseudorandom number generator was based on the BNS lower bound for the GIP function. [3]

  1. Yao, Andrew Chi-Chih (1979), "Some complexity questions related to distributive computing", Proceedings of the 11th ACM Symposium on Theory of Computing (STOC '79), pp. 209–213, doi: 10.1145/800135.804414 , S2CID   999287 .
  2. Chandra, Ashok K.; Furst, Merrick L.; Lipton, Richard J. (1983), "Multi-party protocols", Proceedings of the 15th ACM Symposium on Theory of Computing (STOC '83), pp. 94–99, doi:10.1145/800061.808737, ISBN   978-0897910996, S2CID   18180950 .
  3. 1 2 3 Babai, László; Nisan, Noam; Szegedy, Márió (1992), "Multiparty protocols, pseudorandom generators for logspace, and time-space trade-offs", Journal of Computer and System Sciences, 45 (2): 204–232, doi:10.1016/0022-0000(92)90047-M, MR   1186884 .
  4. Grolmusz, Vince (1994), "The BNS lower bound for multi-party protocols is nearly optimal", Information and Computation, 112 (1): 51–54, doi: 10.1006/inco.1994.1051 , MR   1277711 .
  5. Bruck, Jehoshua; Smolensky, Roman (1992), "Polynomial threshold functions, AC0 functions, and spectral norms" (PDF), SIAM Journal on Computing, 21 (1): 33–42, doi:10.1137/0221003, MR   1148813 .
  6. Grolmusz, V. (1999), "Harmonic analysis, real approximation, and the communication complexity of Boolean functions", Algorithmica, 23 (4): 341–353, CiteSeerX   10.1.1.53.6729 , doi:10.1007/PL00009265, MR   1673395, S2CID   26779824 .

Related Research Articles

<span class="mw-page-title-main">Entropy (information theory)</span> Expected amount of information needed to specify the output of a stochastic data source

In information theory, the entropy of a random variable is the average level of "information", "surprise", or "uncertainty" inherent to the variable's possible outcomes. Given a discrete random variable , which takes values in the alphabet and is distributed according to :

In computational complexity theory, the class NC (for "Nick's Class") is the set of decision problems decidable in polylogarithmic time on a parallel computer with a polynomial number of processors. In other words, a problem with input size n is in NC if there exist constants c and k such that it can be solved in time O((log n)c) using O(nk) parallel processors. Stephen Cook coined the name "Nick's class" after Nick Pippenger, who had done extensive research on circuits with polylogarithmic depth and polynomial size.

In theoretical computer science, communication complexity studies the amount of communication required to solve a problem when the input to the problem is distributed among two or more parties. The study of communication complexity was first introduced by Andrew Yao in 1979, while studying the problem of computation distributed among several machines. The problem is usually stated as follows: two parties each receive a -bit string and . The goal is for Alice to compute the value of a certain function, , that depends on both and , with the least amount of communication between them.

A commitment scheme is a cryptographic primitive that allows one to commit to a chosen value while keeping it hidden to others, with the ability to reveal the committed value later. Commitment schemes are designed so that a party cannot change the value or statement after they have committed to it: that is, commitment schemes are binding. Commitment schemes have important applications in a number of cryptographic protocols including secure coin flipping, zero-knowledge proofs, and secure computation.

<span class="mw-page-title-main">Complexity class</span> Set of problems in computational complexity theory

In computational complexity theory, a complexity class is a set of computational problems "of related resource-based complexity". The two most commonly analyzed resources are time and memory.

Secure multi-party computation is a subfield of cryptography with the goal of creating methods for parties to jointly compute a function over their inputs while keeping those inputs private. Unlike traditional cryptographic tasks, where cryptography assures security and integrity of communication or storage and the adversary is outside the system of participants, the cryptography in this model protects participants' privacy from each other.

<span class="mw-page-title-main">Boolean function</span> Function returning one of only two values

In mathematics, a Boolean function is a function whose arguments and result assume values from a two-element set. Alternative names are switching function, used especially in older computer science literature, and truth function, used in logic. Boolean functions are the subject of Boolean algebra and switching theory.

In cryptography, a secret sharing scheme is verifiable if auxiliary information is included that allows players to verify their shares as consistent. More formally, verifiable secret sharing ensures that even if the dealer is malicious there is a well-defined secret that the players can later reconstruct. The concept of verifiable secret sharing (VSS) was first introduced in 1985 by Benny Chor, Shafi Goldwasser, Silvio Micali and Baruch Awerbuch.

TC0 is a complexity class used in circuit complexity. It is the first class in the hierarchy of TC classes.

<span class="mw-page-title-main">Circuit complexity</span> Model of computational complexity

In theoretical computer science, circuit complexity is a branch of computational complexity theory in which Boolean functions are classified according to the size or depth of the Boolean circuits that compute them. A related notion is the circuit complexity of a recursive language that is decided by a uniform family of circuits .

Richard Jay Lipton is an American computer scientist who is Associate Dean of Research, Professor, and the Frederick G. Storey Chair in Computing in the College of Computing at the Georgia Institute of Technology. He has worked in computer science theory, cryptography, and DNA computing.

Correlation attacks are a class of cryptographic known-plaintext attacks for breaking stream ciphers whose keystreams are generated by combining the output of several linear-feedback shift registers (LFSRs) using a Boolean function. Correlation attacks exploit a statistical weakness that arises from the specific Boolean function chosen for the keystream. While some Boolean functions are vulnerable to correlation attacks, stream ciphers generated using such functions are not inherently insecure.

In computational complexity theory, the language TQBF is a formal language consisting of the true quantified Boolean formulas. A (fully) quantified Boolean formula is a formula in quantified propositional logic where every variable is quantified, using either existential or universal quantifiers, at the beginning of the sentence. Such a formula is equivalent to either true or false. If such a formula evaluates to true, then that formula is in the language TQBF. It is also known as QSAT.

In Boolean algebra, a parity function is a Boolean function whose value is one if and only if the input vector has an odd number of ones. The parity function of two inputs is also known as the XOR function.

In computational complexity the decision tree model is the model of computation in which an algorithm is considered to be basically a decision tree, i.e., a sequence of queries or tests that are done adaptively, so the outcome of previous tests can influence the tests performed next.

In computational complexity theory, the complexity class PPP is a subclass of TFNP. It is the class of search problems that can be shown to be total by an application of the pigeonhole principle. Christos Papadimitriou introduced it in the same paper that introduced PPAD and PPA. PPP contains both PPAD and PWPP as subclasses. These complexity classes are of particular interest in cryptography because they are strongly related to cryptographic primitives such as one-way permutations and collision-resistant hash functions.

<span class="mw-page-title-main">Bella Subbotovskaya</span> Russian mathematician

Bella Abramovna Subbotovskaya was a Soviet mathematician who founded the short-lived Jewish People's University (1978–1983) in Moscow. The school's purpose was to offer free education to those affected by structured anti-Semitism within the Soviet educational system. Its existence was outside Soviet authority and it was investigated by the KGB. Subbotovskaya herself was interrogated a number of times by the KGB and shortly thereafter was hit by a truck and died, in what has been speculated was an assassination.

Garbled circuit is a cryptographic protocol that enables two-party secure computation in which two mistrusting parties can jointly evaluate a function over their private inputs without the presence of a trusted third party. In the garbled circuit protocol, the function has to be described as a Boolean circuit.

In theoretical computer science, the log-rank conjecture states that the deterministic communication complexity of a two-party Boolean function is polynomially related to the logarithm of the rank of its input matrix.

The Hidden Matching Problem is a computation complexity problem that can be solved using quantum protocols: Let be a positive even integer. In the Hidden Matching Problem, Alice is given and Bob is given ( denotes the family of all possible perfect matchings on nodes). Their goal is to output a tuple such that the edge belongs to the matching and .