ABSTRACT
Let ƒ(x1, ···· xk) be a Boolean function that k parties wish to collaboratively evaluate. The i'th party knows each input argument except xi; and each party has unlimited computational power. They share a blackboard, viewed by all parties, where they can exchange messages. The objective is to minimize the number of bits written on the board.
We prove lower bounds of the form Ω(n·c-k), for the number of bits that need to be exchanged in order to compute some (explicitly given) functions in P. Our bounds hold even if the parties only wish to have a 1% advantage at guessing the value of ƒ on random inputs. We then give several applications of our lower bounds.
Our first application is a pseudorandom generator for Logspace. We explicitly construct (in polynomial time) pseudorandom sequences of length n from a random seed of length exp(c√logn) that no Logspace Turing machine will be able to distinguish from truly random sequences. As a corollary we give an explicit construction of universal traversal sequence of length exp(exp(c√logn)) for arbitrary undirected graphs on n vertices.
We then apply the multiparty protocol lower bounds to derive several new time-space tradeoffs. We give a tight time-space tradeoff of the form TS=Θ(n2), for general, k-head Turing-Machines; the bounds hold for a function that can be computed in linear time and constant space by a k+1-head Turing Machine. We also give a new length-width tradeoff for oblivious branching programs; in particular our bound implies new lower bounds on the size of arbitrary branching programs, or on the size of Boolean formulas (over an arbitrary finite base).
- AKLLR.R. Aleliunas, R.M. Karp, R.j. Lipton, L. Lovasz and C. Rackoff, "Random walks, universal traversing sequences and the complexity of maze problems", FOCS '79. Google ScholarDigital Library
- AM.N. AIon and W. Maass, "Meanders, Ramsey theory and lower bounds for branching programs", FOCS '86. Google ScholarDigital Library
- AUY.A.V. Aho, J,D. Ullman and M. Yanakakis, "On notions of information transfer in VLSI circuits", STOC'83. Google ScholarDigital Library
- AW.M. Ajtai and A. Wigderson, "Deterministic simulation of Probabilistic constant depth circuits'', 26th FOCS, pp. 11-19, 1985.Google ScholarDigital Library
- BCDRT.A. Borodin, S.A. Cook, P.W. Dymond, W.L. Ruzzo and M. Tompa, "Two applications of inductive counting for complementation problems'', manuscript, 1988.Google Scholar
- BFS.L. Babai, P. Frankl and J. Simon, "Complexity classes in communication complexity theory", FOCS '86. Google ScholarDigital Library
- BlM.M. Blum and S. Micali, "How to generate cryptographically strong sequences of pseudo random bits", 23rd FOCS, pp. 112-I 17, 1982.Google Scholar
- CFL.Chandra, Furst and Lipton, "Multiparty protocols'', FOCS '83.Google Scholar
- CG.B. Chor and O. Goldreich, "Unbiased bits from weak sources of randomness", FOCS '85.Google Scholar
- DG.P. Duris and Z. Galil, "A time-space tradeoff for language recognition", Math. Systems theory 17 3-12, 1984.Google ScholarCross Ref
- GuS.Y. Gurevich and S. Shelah, "Nondeterministic linear tasks may require substantially nonlinear deterministic time in the case of sublinear work space", STOC '88. Google ScholarDigital Library
- ILL.R. Impagliazzo L. Levin and M. Luby, "Pseudorandom generators from any one-way function", STOC '89. Google ScholarDigital Library
- Is.S. Istrail, "Polynomial universal traversing sequences for cycles are constructible", STOC '88. Google ScholarDigital Library
- Ka.M. Karchmer, "Two time-space tradeoffs for element distinctness", Theoretical Computer Science 47, 1986. Google ScholarDigital Library
- KLNS.J.D. Kahn, N. Linial, N. Nisan and M.E. Saks, "On the cover time of random walks in graphs", Journal of Theoretical Probability, Vol. 2, No. 1, 1989.Google ScholarCross Ref
- Kn.D. Knuth, "The art of computer programming, Vol II". Google ScholarDigital Library
- KPS.H. Karlof, R. Paturi and J. Simon, "Universal sequences of length n~(t~~ for cliques", manuscript, 1987.Google Scholar
- Ne.E.I. Necipomk, "A boolean function", Soviet Mathematics Doklady 7:4, 999-1000, 1966.Google Scholar
- Ni.N. Nisan, "l-way vs. 2-way access to randomness in Logspace", manuscript, 1989.Google Scholar
- NW.N. Nisan and A. Wigderson, "Hardness vs. Randomness", FOCS '88. Google ScholarDigital Library
- RT.I.H. Reif and J.D. Tygar, "Towards a theory of parallel randomized computation", TR-07- 84, Aiken computation lab., Harvard university, 1984.Google Scholar
- Va.U.V. Vazirani, "Towards a strong communication complexity theory or generating quasi-random sequences from two communicating semirandom sources", STOC '85. Google ScholarDigital Library
- Ya1.A.C. Yao, "Some complexity questions related to distributed computing", STOC '79. Google ScholarDigital Library
- Y2.A.C. Yao, "Theory and applications of trapdoor functions", 23rd FOCS, pp. 80-91, 1982.Google ScholarCross Ref
- Y3.A.C. Yao, "Lower bounds by probabilistic arguments", STOC '83.Google Scholar
Index Terms
- Multiparty protocols and logspace-hard pseudorandom sequences
Recommendations
Protocols for Multiparty Coin Toss with a Dishonest Majority
Coin-tossing protocols are protocols that generate a random bit with uniform distribution, although some corrupted parties might try to bias the output. These protocols are used as a building block in many cryptographic protocols. Cleve (Proc. of the ...
Interactive Coding for Multiparty Protocols
ITCS '15: Proceedings of the 2015 Conference on Innovations in Theoretical Computer ScienceThe problem of constructing error-resilient interactive protocols was introduced in the seminal works of Schulman (FOCS 1992, STOC 1993). These works show how to convert any two-party interactive protocol into one that is resilient to constant-fraction ...
Protocols for multiparty coin toss with dishonest majority
CRYPTO'10: Proceedings of the 30th annual conference on Advances in cryptologyCoin-tossing protocols are protocols that generate a random bit with uniform distribution. These protocols are used as a building block in many cryptographic protocols. Cleve [STOC 1986] has shown that if at least half of the parties can be malicious, ...
Comments