Communication Complexity of Simultaneous Messages
نویسندگان
چکیده
In the multiparty communication game (CFL-game) of Chandra, Furst, and Lipton (Proc. 15th ACM STOC, 1983, 94–99) k players collaboratively evaluate a function f(x0, . . . , xk−1) in which player i knows all inputs except xi. The players have unlimited computational power. The objective is to minimize communication. In this paper, we study the Simultaneous Messages (SM) model of multiparty communication complexity. The SM model is a restricted version of the CFL-game in which the players are not allowed to communicate with each other. Instead, each of the k players simultaneously sends a message to a referee, who sees none of the inputs. The referee then announces the function value. We prove lower and upper bounds on the SM-complexity of several classes of explicit functions. Our lower bounds extend to randomized SM complexity via an entropy argument. A lemma establishing a tradeoff between average Hamming distance and range size for transformations of the Boolean cube might be of independent interest. Our lower bounds on SM-complexity imply an exponential gap between the SM-model and the CFL-model for up to (log n)1− players, for any > 0. This separation is obtained by comparing the respective complexities of the generalized addressing function, GAFG,k, where G is a group of order n. We also combine our lower bounds on SM complexity with ideas of H̊astad and Goldmann (Computational Complexity 1 (1991), 113–129) to derive superpolynomial lower bounds for certain depth-2 circuits computing a function related to the GAF function. We prove some counter-intuitive upper bounds on SM-complexity. We show that GAFZt2,3 has SM-complexity O(n). When the number of players is at least c log n, for some constant c > 0, our SM protocol for GAFZt2,k has polylog(n) complexity. We also examine a class of functions defined by certain depth-2 circuits. This class includes the “Generalized Inner Product” function and “Majority of Majorities.” When the number of players is at least 2+logn, we obtain polylog(n) upper bounds for this class of functions.
منابع مشابه
Simultaneous Messages vs. Communication
In the multiparty communication game introduced by Chandra, Furst, and Lipton CFL] (1983), k players wish to evaluate collaboratively a function f (x0; : : : ; xk?1) for which player i sees all inputs except xi: The players have unlimited computational power. The objective is to minimize the amount of communication. We consider a restricted version of the multiparty communication game which we ...
متن کاملNonverbal Messages and Intercultural Communication
Intercultural communication takes place when individuals influenced by different cultural communities negotiate shared meanings in interaction. As every country has its own cultural value system; consequently, nonverbal communication is different from country to country. Therefore, having knowledge about the similarities and differences of nonverbal communication in different cultures increases...
متن کاملDistance-Aware Beamforming for Multiuser Secure Communication Systems
Typical cryptography schemes are not well suited for low complexity types of equipment, e.g., Internet of things (IoT) devices, as they may need high power or impose high computational complexity on the device. Physical (PHY) layer security techniques such as beamforming (in multiple antennas systems) are possible alternatives to provide security for such applications. In this paper, we consid...
متن کاملLower bound for communication complexity with no public randomness
We give a self contained proof of a logarithmic lower bound on the communication complexity of any non redundant function, given that there is no access to shared randomness. This bound was first stated in Yao’s seminal paper [STOC 1979], but no full proof appears in the literature. Our proof uses the method of Babai and Kimmel [Computational Complexity 1997], introduced there in the context of...
متن کاملRandomized Simultaneous Messages: Solution of a Problem of Yao in Communication Complexity
We solve a 17 year old problem of Yao (FOCS 79). In the two-player communication model introduced by Yao in 1979, Alice and Bob wish to collaboratively evaluate a function in which Alice knows only input and Bob knows only input . Both players have unlimited computational power. The objective is to minimize the amount of communication. Yao (FOCS 79) also introduced an oblivious version of this ...
متن کاملRobust Non-interactive Multiparty Computation Against Constant-Size Collusion
Non-Interactive Multiparty Computations (Beimel et al., Crypto 2014) is a very powerful notion equivalent (under some corruption model) to garbled circuits, Private Simultaneous Messages protocols, and obfuscation. We present robust solutions to the problem of Non-Interactive Multiparty Computation in the computational and information-theoretic models. Our results include the first efficient an...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- SIAM J. Comput.
دوره 33 شماره
صفحات -
تاریخ انتشار 2003