Amortized Communication Complexity

نویسندگان

  • Amos Beimel
  • Benny Chor
  • Alon Orlitsky
چکیده

We thank Mauricio Karchmer and Avi Wigderson for raising the question and for helpful discussions, and Amos Beimel, Benny Chor, Alon Orlitsky and Steve Ponzio for many interesting comments on earlier versions of this paper. Finally, we thank an anonymous referee for his very helpful comments and criticism. 17 For values of`which are around log n we would like to replace the term p ` log n with p `+log n. This can be done by sampling the b i 's via a random walk in an expander a la Ajtai, Komll os and Szemer edi 2] (in such a case the b i 's are not independent): The elements of B n are mapped to nodes of a constant degree expander G. Then, a random walk of length k in G is generated, and the vectors b 1 ; b 2 ; : : :; b k are the vectors corresponding to the nodes of the walk. The number of bits required to specify the walk is O(log jB n j + k) which is O(log n + k). (See e.g. 13] for details.) As before, P 1 selects the random bits and sends them to P 2 , so that they both agree on the same sequence. If x 6 = y then the probability that hb i ; xi = hb i ; yi for all 1 i k goes down exponentially in k. The strings c 1 ; c 2 ; : : :; c k are selected similarly in B ` using O(k + log`) bits. To conclude, we have a randomized protocol, in the private coins model, for computing the identity function onìnstances with probability of error at most 2 ?(p `) and expected complexity of O(`+log n), which is O(`), for`suuciently large. With a \small" additional error the protocol can be converted to a protocol that uses O(`) bits in the worst case. This gives a constructive proof for Theorem 10. 7 Open Problems We conclude this work by mentioning some open problems: In 7] it was conjectured that for any relation f, the communication complexity, C(f), can not be smaller than C(f) by more than an additive factor of O(log n). The examples given in our paper do not contradict this conjecture. On the other hand, according to the best lower bound we are able to prove (Corollary 8), even for (non-partial) …

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Amortized Communication Complexity

In this work we study the direct-sum problem with respect to communication complexity: Consider a relation f deened over f0; 1g n f0; 1g n. Can the communication complexity of simultaneously computing f onìnstances (x 1 ; y 1); : : : ; (x ` ; y `) be smaller than the communication complexity of computing f on thè instances, separately? Let the amortized communication complexity of f be the comm...

متن کامل

Amortized Communication Complexity of an Equality Predicate

We study the communication complexity of the direct sum of independent copies of the equality predicate. We prove that the probabilistic communication complexity of this problem is equal to O(N); computational complexity of the proposed protocol is polynomial in size of inputs. Our protocol improves the result achieved in [11]. Our construction is based on two techniques: Nisan’s pseudorandom g...

متن کامل

Infinite Communication Complexity

Suppose that Alice and Bob are given each an infinite string, and they want to decide whether their two strings are in a given relation. How much communication do they need? How can communication be even defined and measured for infinite strings? In this article, we propose a formalism for a notion of infinite communication complexity, prove that it satisfies some natural properties and coincid...

متن کامل

Quantum Information Complexity and Amortized Communication

We define a new notion of information cost for quantum protocols, and a corresponding notion of quantum information complexity for bipartite quantum channels, and then investigate the properties of such quantities. These are the fully quantum generalizations of the analogous quantities for bipartite classical functions that have found many applications recently, in particular for proving commun...

متن کامل

Public-Key Encryption with Efficient Amortized Updates

Searching and modifying public-key encrypted data has received a lot of attention in recent literature. In this paper we re-visit this important topic and achieve improved amortized bounds including resolving a prominent open question posed by Boneh et al. [3]. First, we consider the following much simpler to state problem: A server holds a copy of Alice’s database that has been encrypted under...

متن کامل

Trading Information Complexity for Error

We consider the standard two-party communication model. The central problem studied in this article is how much one can save in information complexity by allowing an error of ε. • For arbitrary functions, we obtain lower bounds and upper bounds indicating a gain that is of order Ω(h(ε)) and O(h( √ ε)). Here h denotes the binary entropy function. • We analyze the case of the two-bit AND function...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1995