skip to main content
10.1145/73007.73008acmconferencesArticle/Chapter ViewAbstractPublication PagesstocConference Proceedingsconference-collections
Article
Free Access

Multiparty protocols and logspace-hard pseudorandom sequences

Published:01 February 1989Publication History

ABSTRACT

Let ƒ(x1, ···· xk) be a Boolean function that k parties wish to collaboratively evaluate. The i'th party knows each input argument except xi; and each party has unlimited computational power. They share a blackboard, viewed by all parties, where they can exchange messages. The objective is to minimize the number of bits written on the board.

We prove lower bounds of the form Ω(n·c-k), for the number of bits that need to be exchanged in order to compute some (explicitly given) functions in P. Our bounds hold even if the parties only wish to have a 1% advantage at guessing the value of ƒ on random inputs. We then give several applications of our lower bounds.

Our first application is a pseudorandom generator for Logspace. We explicitly construct (in polynomial time) pseudorandom sequences of length n from a random seed of length exp(c√logn) that no Logspace Turing machine will be able to distinguish from truly random sequences. As a corollary we give an explicit construction of universal traversal sequence of length exp(exp(c√logn)) for arbitrary undirected graphs on n vertices.

We then apply the multiparty protocol lower bounds to derive several new time-space tradeoffs. We give a tight time-space tradeoff of the form TS=Θ(n2), for general, k-head Turing-Machines; the bounds hold for a function that can be computed in linear time and constant space by a k+1-head Turing Machine. We also give a new length-width tradeoff for oblivious branching programs; in particular our bound implies new lower bounds on the size of arbitrary branching programs, or on the size of Boolean formulas (over an arbitrary finite base).

References

  1. AKLLR.R. Aleliunas, R.M. Karp, R.j. Lipton, L. Lovasz and C. Rackoff, "Random walks, universal traversing sequences and the complexity of maze problems", FOCS '79. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. AM.N. AIon and W. Maass, "Meanders, Ramsey theory and lower bounds for branching programs", FOCS '86. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. AUY.A.V. Aho, J,D. Ullman and M. Yanakakis, "On notions of information transfer in VLSI circuits", STOC'83. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. AW.M. Ajtai and A. Wigderson, "Deterministic simulation of Probabilistic constant depth circuits'', 26th FOCS, pp. 11-19, 1985.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. BCDRT.A. Borodin, S.A. Cook, P.W. Dymond, W.L. Ruzzo and M. Tompa, "Two applications of inductive counting for complementation problems'', manuscript, 1988.Google ScholarGoogle Scholar
  6. BFS.L. Babai, P. Frankl and J. Simon, "Complexity classes in communication complexity theory", FOCS '86. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. BlM.M. Blum and S. Micali, "How to generate cryptographically strong sequences of pseudo random bits", 23rd FOCS, pp. 112-I 17, 1982.Google ScholarGoogle Scholar
  8. CFL.Chandra, Furst and Lipton, "Multiparty protocols'', FOCS '83.Google ScholarGoogle Scholar
  9. CG.B. Chor and O. Goldreich, "Unbiased bits from weak sources of randomness", FOCS '85.Google ScholarGoogle Scholar
  10. DG.P. Duris and Z. Galil, "A time-space tradeoff for language recognition", Math. Systems theory 17 3-12, 1984.Google ScholarGoogle ScholarCross RefCross Ref
  11. GuS.Y. Gurevich and S. Shelah, "Nondeterministic linear tasks may require substantially nonlinear deterministic time in the case of sublinear work space", STOC '88. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. ILL.R. Impagliazzo L. Levin and M. Luby, "Pseudorandom generators from any one-way function", STOC '89. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Is.S. Istrail, "Polynomial universal traversing sequences for cycles are constructible", STOC '88. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Ka.M. Karchmer, "Two time-space tradeoffs for element distinctness", Theoretical Computer Science 47, 1986. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. KLNS.J.D. Kahn, N. Linial, N. Nisan and M.E. Saks, "On the cover time of random walks in graphs", Journal of Theoretical Probability, Vol. 2, No. 1, 1989.Google ScholarGoogle ScholarCross RefCross Ref
  16. Kn.D. Knuth, "The art of computer programming, Vol II". Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. KPS.H. Karlof, R. Paturi and J. Simon, "Universal sequences of length n~(t~~ for cliques", manuscript, 1987.Google ScholarGoogle Scholar
  18. Ne.E.I. Necipomk, "A boolean function", Soviet Mathematics Doklady 7:4, 999-1000, 1966.Google ScholarGoogle Scholar
  19. Ni.N. Nisan, "l-way vs. 2-way access to randomness in Logspace", manuscript, 1989.Google ScholarGoogle Scholar
  20. NW.N. Nisan and A. Wigderson, "Hardness vs. Randomness", FOCS '88. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. RT.I.H. Reif and J.D. Tygar, "Towards a theory of parallel randomized computation", TR-07- 84, Aiken computation lab., Harvard university, 1984.Google ScholarGoogle Scholar
  22. Va.U.V. Vazirani, "Towards a strong communication complexity theory or generating quasi-random sequences from two communicating semirandom sources", STOC '85. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Ya1.A.C. Yao, "Some complexity questions related to distributed computing", STOC '79. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Y2.A.C. Yao, "Theory and applications of trapdoor functions", 23rd FOCS, pp. 80-91, 1982.Google ScholarGoogle ScholarCross RefCross Ref
  25. Y3.A.C. Yao, "Lower bounds by probabilistic arguments", STOC '83.Google ScholarGoogle Scholar

Index Terms

  1. Multiparty protocols and logspace-hard pseudorandom sequences

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            STOC '89: Proceedings of the twenty-first annual ACM symposium on Theory of computing
            February 1989
            600 pages
            ISBN:0897913078
            DOI:10.1145/73007

            Copyright © 1989 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 1 February 1989

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • Article

            Acceptance Rates

            STOC '89 Paper Acceptance Rate56of196submissions,29%Overall Acceptance Rate1,469of4,586submissions,32%

            Upcoming Conference

            STOC '24
            56th Annual ACM Symposium on Theory of Computing (STOC 2024)
            June 24 - 28, 2024
            Vancouver , BC , Canada

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader