Boolean Circuit Depth (II) Yijia Chen Fudan University A Quick - - PowerPoint PPT Presentation

boolean circuit depth ii
SMART_READER_LITE
LIVE PREVIEW

Boolean Circuit Depth (II) Yijia Chen Fudan University A Quick - - PowerPoint PPT Presentation

Boolean Circuit Depth (II) Yijia Chen Fudan University A Quick Recap Definition The depth d ( C ) of a circuit C is the length of the longest path from the output node to an input node. The size L ( F ) of a formula F is the number of its input


slide-1
SLIDE 1

Boolean Circuit Depth (II)

Yijia Chen Fudan University

slide-2
SLIDE 2

A Quick Recap

slide-3
SLIDE 3

Definition

The depth d(C) of a circuit C is the length of the longest path from the

  • utput node to an input node. The size L(F) of a formula F is the number of

its input nodes. For a function f , the depth complexity d(f ) is the minimum depth of a circuit computing f and the size complexity L(f ) is the minimum size of a formula computing f . The measure dm(C), Lm(F), dm(f ), and Lm(f ) are defined similarly for monotone circuits, formulas, and functions respectively.

slide-4
SLIDE 4

Definition

For a Boolean function f : {0, 1}n → {0, 1} let X = f −1(1) and Y = f −1(0). We define Rf =

  • (x, y, i)
  • x ∈ X, y ∈ Y , and i ∈ {1, . . . , n} with xi = yi
  • .

For monotone f we also define Mf =

  • (x, y, i)
  • x ∈ X, y ∈ Y , and i ∈ {1, . . . , n} with xi = 1 and yi = 0
  • .
slide-5
SLIDE 5

Theorem

d(f ) = D(Rf ) and L(f ) = C P(Rf ).

Theorem

dm(f ) = D(CMf ) and Lm(f ) = C P(Mf ). We prove circuit lower bounds by reductions to lower bounds for communication complexity.

slide-6
SLIDE 6

Matching

Given a graph G on n vertices, match(G) =

  • 1,

if there is a matching of size ≥ n/3 in G, 0,

  • therwise.

Theorem

dm(match) = Ω(n).

slide-7
SLIDE 7

stcon

Given a directed graph G on n nodes, stcon(G) =

  • 1,

if there is a path in G from vertex 1 to vertex n 0,

  • therwise.

Theorem

dm(stcon) = Ω(log2 n).

slide-8
SLIDE 8

Set Cover

slide-9
SLIDE 9

Let g : {0, 1}n × {0, 1}n → {0, 1} whose deterministic communication complexity D(g) is significantly larger than its nondeterministic communication complexity N(g).

slide-10
SLIDE 10

Let g : {0, 1}n × {0, 1}n → {0, 1} whose deterministic communication complexity D(g) is significantly larger than its nondeterministic communication complexity N(g). Let R1, . . . , Rt be a cover (possibly with intersections) of the matrix Mg corresponding to g with monochromatic rectangles.

slide-11
SLIDE 11

Let g : {0, 1}n × {0, 1}n → {0, 1} whose deterministic communication complexity D(g) is significantly larger than its nondeterministic communication complexity N(g). Let R1, . . . , Rt be a cover (possibly with intersections) of the matrix Mg corresponding to g with monochromatic rectangles. Thus N(g) ≤ t.

slide-12
SLIDE 12

Let g : {0, 1}n × {0, 1}n → {0, 1} whose deterministic communication complexity D(g) is significantly larger than its nondeterministic communication complexity N(g). Let R1, . . . , Rt be a cover (possibly with intersections) of the matrix Mg corresponding to g with monochromatic rectangles. Thus N(g) ≤ t. We define M =

  • (x, y, i)
  • x, y ∈ {0, 1}n and (x, y) ∈ Ri
  • .

M is a total relation,

slide-13
SLIDE 13

Let g : {0, 1}n × {0, 1}n → {0, 1} whose deterministic communication complexity D(g) is significantly larger than its nondeterministic communication complexity N(g). Let R1, . . . , Rt be a cover (possibly with intersections) of the matrix Mg corresponding to g with monochromatic rectangles. Thus N(g) ≤ t. We define M =

  • (x, y, i)
  • x, y ∈ {0, 1}n and (x, y) ∈ Ri
  • .

M is a total relation, and D(g) ≤ D(M).

slide-14
SLIDE 14

We construct a function f : {0, 1}t → {0, 1} such that D(Mf ) ≥ D(M).

slide-15
SLIDE 15

We construct a function f : {0, 1}t → {0, 1} such that D(Mf ) ≥ D(M). f (z1, . . . , zt) =      1, if there exists a row x of Mg such that for all i we have

  • x ∈ Ri =

⇒ zi = 1

  • 0,
  • therwise.
slide-16
SLIDE 16

We construct a function f : {0, 1}t → {0, 1} such that D(Mf ) ≥ D(M). f (z1, . . . , zt) =      1, if there exists a row x of Mg such that for all i we have

  • x ∈ Ri =

⇒ zi = 1

  • 0,
  • therwise.

f is monotone.

slide-17
SLIDE 17

Reduction from M to Mf

slide-18
SLIDE 18

Reduction from M to Mf

  • 1. Alice, given x ∈ {0, 1}n, constructs x′ ∈ {0, 1}t by assigning x′

i = 1 if the

the row x belongs to Ri and 0 otherwise.

slide-19
SLIDE 19

Reduction from M to Mf

  • 1. Alice, given x ∈ {0, 1}n, constructs x′ ∈ {0, 1}t by assigning x′

i = 1 if the

the row x belongs to Ri and 0 otherwise. So f (x′) = 1.

slide-20
SLIDE 20

Reduction from M to Mf

  • 1. Alice, given x ∈ {0, 1}n, constructs x′ ∈ {0, 1}t by assigning x′

i = 1 if the

the row x belongs to Ri and 0 otherwise. So f (x′) = 1.

  • 2. Bob, given y ∈ {0, 1}n, constructs y ′ ∈ {0, 1}t by assigning y ′

i = 0 if the

column y belongs to Ri and 1 otherwise.

slide-21
SLIDE 21

Reduction from M to Mf

  • 1. Alice, given x ∈ {0, 1}n, constructs x′ ∈ {0, 1}t by assigning x′

i = 1 if the

the row x belongs to Ri and 0 otherwise. So f (x′) = 1.

  • 2. Bob, given y ∈ {0, 1}n, constructs y ′ ∈ {0, 1}t by assigning y ′

i = 0 if the

column y belongs to Ri and 1 otherwise. So f (y ′) = 0.

slide-22
SLIDE 22

Reduction from M to Mf

  • 1. Alice, given x ∈ {0, 1}n, constructs x′ ∈ {0, 1}t by assigning x′

i = 1 if the

the row x belongs to Ri and 0 otherwise. So f (x′) = 1.

  • 2. Bob, given y ∈ {0, 1}n, constructs y ′ ∈ {0, 1}t by assigning y ′

i = 0 if the

column y belongs to Ri and 1 otherwise. So f (y ′) = 0.

  • 3. Alice and Bob use the protocol for the relation Mf on (x′, y ′) to get an

index i with x′

i = 1 and y ′ i = 0. Thus, both x and y intersect Ri, i.e.,

(x, y, i) ∈ M.

slide-23
SLIDE 23

Reduction from M to Mf

  • 1. Alice, given x ∈ {0, 1}n, constructs x′ ∈ {0, 1}t by assigning x′

i = 1 if the

the row x belongs to Ri and 0 otherwise. So f (x′) = 1.

  • 2. Bob, given y ∈ {0, 1}n, constructs y ′ ∈ {0, 1}t by assigning y ′

i = 0 if the

column y belongs to Ri and 1 otherwise. So f (y ′) = 0.

  • 3. Alice and Bob use the protocol for the relation Mf on (x′, y ′) to get an

index i with x′

i = 1 and y ′ i = 0. Thus, both x and y intersect Ri, i.e.,

(x, y, i) ∈ M. Assume D(g) = N2(g), then the function f has t = 2N(g) variables and dm(f ) = D(Mf ) ≥ D(M) ≥ D(g) = log2 t. Similarly L(f ) = Ω(tlog t).

slide-24
SLIDE 24

We can write f (z1, . . . , zt) ≡ ∃x ∈{0, 1}n :

  • (x ∈ R1) =

⇒ (z1 = 1)

  • ∧ · · · ∧
  • (x ∈ Rt) =

⇒ (zt = 1)

  • .
slide-25
SLIDE 25

We can write f (z1, . . . , zt) ≡ ∃x ∈{0, 1}n :

  • (x ∈ R1) =

⇒ (z1 = 1)

  • ∧ · · · ∧
  • (x ∈ Rt) =

⇒ (zt = 1)

  • .

If deciding “x ∈ Ri” can be done in time polynomial in t, then f is a function in NP,

slide-26
SLIDE 26

We can write f (z1, . . . , zt) ≡ ∃x ∈{0, 1}n :

  • (x ∈ R1) =

⇒ (z1 = 1)

  • ∧ · · · ∧
  • (x ∈ Rt) =

⇒ (zt = 1)

  • .

If deciding “x ∈ Ri” can be done in time polynomial in t, then f is a function in NP, and can be rewritten to a 3-CNF formula f (z1, . . . , zt) ≡ ∃x1 · · · xp

  • ϕ1 ∧ · · · ∧ ϕs
  • ,
slide-27
SLIDE 27

We can write f (z1, . . . , zt) ≡ ∃x ∈{0, 1}n :

  • (x ∈ R1) =

⇒ (z1 = 1)

  • ∧ · · · ∧
  • (x ∈ Rt) =

⇒ (zt = 1)

  • .

If deciding “x ∈ Ri” can be done in time polynomial in t, then f is a function in NP, and can be rewritten to a 3-CNF formula f (z1, . . . , zt) ≡ ∃x1 · · · xp

  • ϕ1 ∧ · · · ∧ ϕs
  • ,

where

  • 1. xn+1, . . . , xp are auxiliary variables,
slide-28
SLIDE 28

We can write f (z1, . . . , zt) ≡ ∃x ∈{0, 1}n :

  • (x ∈ R1) =

⇒ (z1 = 1)

  • ∧ · · · ∧
  • (x ∈ Rt) =

⇒ (zt = 1)

  • .

If deciding “x ∈ Ri” can be done in time polynomial in t, then f is a function in NP, and can be rewritten to a 3-CNF formula f (z1, . . . , zt) ≡ ∃x1 · · · xp

  • ϕ1 ∧ · · · ∧ ϕs
  • ,

where

  • 1. xn+1, . . . , xp are auxiliary variables,
  • 2. each ϕi is a disjunction of 3 literals on the variables x1, . . . , xp,
slide-29
SLIDE 29

We can write f (z1, . . . , zt) ≡ ∃x ∈{0, 1}n :

  • (x ∈ R1) =

⇒ (z1 = 1)

  • ∧ · · · ∧
  • (x ∈ Rt) =

⇒ (zt = 1)

  • .

If deciding “x ∈ Ri” can be done in time polynomial in t, then f is a function in NP, and can be rewritten to a 3-CNF formula f (z1, . . . , zt) ≡ ∃x1 · · · xp

  • ϕ1 ∧ · · · ∧ ϕs
  • ,

where

  • 1. xn+1, . . . , xp are auxiliary variables,
  • 2. each ϕi is a disjunction of 3 literals on the variables x1, . . . , xp,
  • 3. and both p and s are polynomially bounded in t.
slide-30
SLIDE 30

The set-cover problem

slide-31
SLIDE 31

The set-cover problem

set-cover Input: A collection of m sets over a universe of ℓ elements and a number d. Problem: Is there a subcollection of d sets that covers the whole universe?

slide-32
SLIDE 32

Reduction to the set-cover problem

slide-33
SLIDE 33

Reduction to the set-cover problem

Recall f (z1, . . . , zt) ≡ ∃x1 · · · xp

  • ϕ1 ∧ · · · ∧ ϕs
  • .
slide-34
SLIDE 34

Reduction to the set-cover problem

Recall f (z1, . . . , zt) ≡ ∃x1 · · · xp

  • ϕ1 ∧ · · · ∧ ϕs
  • .
  • 1. The universe is of size s + p, one element for each ϕi, and one element for

each xi ∨ ¯ xi.

slide-35
SLIDE 35

Reduction to the set-cover problem

Recall f (z1, . . . , zt) ≡ ∃x1 · · · xp

  • ϕ1 ∧ · · · ∧ ϕs
  • .
  • 1. The universe is of size s + p, one element for each ϕi, and one element for

each xi ∨ ¯ xi.

  • 2. For every xi there are two sets Axi =1 and Axi =0. Axi =1 contains all terms in

which xi appears, and Axi =0 contains all terms in which ¯ xi appears.

slide-36
SLIDE 36

Reduction to the set-cover problem

Recall f (z1, . . . , zt) ≡ ∃x1 · · · xp

  • ϕ1 ∧ · · · ∧ ϕs
  • .
  • 1. The universe is of size s + p, one element for each ϕi, and one element for

each xi ∨ ¯ xi.

  • 2. For every xi there are two sets Axi =1 and Axi =0. Axi =1 contains all terms in

which xi appears, and Axi =0 contains all terms in which ¯ xi appears.

  • 3. Finally, set d = p.
slide-37
SLIDE 37

The correctness

slide-38
SLIDE 38

The correctness

If f is 1, then there exists an assignment for x1, . . . , xp that satisfies all the

  • terms. Then the corresponding p sets from a cover.
slide-39
SLIDE 39

The correctness

If f is 1, then there exists an assignment for x1, . . . , xp that satisfies all the

  • terms. Then the corresponding p sets from a cover.

If there is cover, then for every i at least one of Ax1=1 and Axi =0 is in the cover in order to cover the term xi ∨ ¯ xi.

slide-40
SLIDE 40

The correctness

If f is 1, then there exists an assignment for x1, . . . , xp that satisfies all the

  • terms. Then the corresponding p sets from a cover.

If there is cover, then for every i at least one of Ax1=1 and Axi =0 is in the cover in order to cover the term xi ∨ ¯

  • xi. Since the cover is of size p, exactly one of

Ax1=1 and Axi =0 is in the cover.

slide-41
SLIDE 41

The correctness

If f is 1, then there exists an assignment for x1, . . . , xp that satisfies all the

  • terms. Then the corresponding p sets from a cover.

If there is cover, then for every i at least one of Ax1=1 and Axi =0 is in the cover in order to cover the term xi ∨ ¯

  • xi. Since the cover is of size p, exactly one of

Ax1=1 and Axi =0 is in the cover. Then the cover induces a satisfying assignment, since the universe contains all the terms.

slide-42
SLIDE 42

Reduction to the set-cover problem (3)

slide-43
SLIDE 43

Reduction to the set-cover problem (3)

The reduction can be performed in a small depth O(log t).

slide-44
SLIDE 44

Reduction to the set-cover problem (3)

The reduction can be performed in a small depth O(log t). Hence dm(set-cover) ≥ d(f ) − O(log t) = Ω(log2 t).

slide-45
SLIDE 45

Monotone Constant-Depth Circuits

slide-46
SLIDE 46

Circuits of unbounded fan-in

slide-47
SLIDE 47

Circuits of unbounded fan-in

Now ∧- and ∨-gates can have unbounded number of inputs.

slide-48
SLIDE 48

Circuits of unbounded fan-in

Now ∧- and ∨-gates can have unbounded number of inputs. Among others, constant-depth circuits become meaningful.

slide-49
SLIDE 49

Circuits of unbounded fan-in

Now ∧- and ∨-gates can have unbounded number of inputs. Among others, constant-depth circuits become meaningful. We can define similarly d(f ) and L(f ).

slide-50
SLIDE 50

Circuits of unbounded fan-in

Now ∧- and ∨-gates can have unbounded number of inputs. Among others, constant-depth circuits become meaningful. We can define similarly d(f ) and L(f ). It is still the case that L(F), the size of a formula F, translate to the protocol partition number C P(f ).

slide-51
SLIDE 51

Circuits of unbounded fan-in

Now ∧- and ∨-gates can have unbounded number of inputs. Among others, constant-depth circuits become meaningful. We can define similarly d(f ) and L(f ). It is still the case that L(F), the size of a formula F, translate to the protocol partition number C P(f ). However, the depth d(f ) is equal to the round complexity of the protocol, the number of alternations between the communication from Alice to Bob and the communication from Bob to Alice.

slide-52
SLIDE 52

Depth k vs. depth k − 1 for monotone circuits

slide-53
SLIDE 53

Depth k vs. depth k − 1 for monotone circuits

We construct a formula f : {0, 1}n → {0, 1} with n = mk as follows.

slide-54
SLIDE 54

Depth k vs. depth k − 1 for monotone circuits

We construct a formula f : {0, 1}n → {0, 1} with n = mk as follows.

  • 1. f consists of a complete m-ary tree of depth k.
slide-55
SLIDE 55

Depth k vs. depth k − 1 for monotone circuits

We construct a formula f : {0, 1}n → {0, 1} with n = mk as follows.

  • 1. f consists of a complete m-ary tree of depth k.
  • 2. Each of its mk leaves is labelled by a unique variable in {x1, . . . , xn}.
slide-56
SLIDE 56

Depth k vs. depth k − 1 for monotone circuits

We construct a formula f : {0, 1}n → {0, 1} with n = mk as follows.

  • 1. f consists of a complete m-ary tree of depth k.
  • 2. Each of its mk leaves is labelled by a unique variable in {x1, . . . , xn}.
  • 3. The gates in the odd levels (including the root) are labelled by ∧, and

those in the even levels are labelled by ∨.

slide-57
SLIDE 57

Depth k vs. depth k − 1 for monotone circuits

We construct a formula f : {0, 1}n → {0, 1} with n = mk as follows.

  • 1. f consists of a complete m-ary tree of depth k.
  • 2. Each of its mk leaves is labelled by a unique variable in {x1, . . . , xn}.
  • 3. The gates in the odd levels (including the root) are labelled by ∧, and

those in the even levels are labelled by ∨. We show that any depth k − 1 formula computing f has size exponential in m.

slide-58
SLIDE 58

The tree problem Tk

slide-59
SLIDE 59

The tree problem Tk

Consider the complete m-ary tree of depth k.

slide-60
SLIDE 60

The tree problem Tk

Consider the complete m-ary tree of depth k. A labelling of the tree assigns to each leaf a bit, and to each internal node a number in {1, . . . , m}.

slide-61
SLIDE 61

The tree problem Tk

Consider the complete m-ary tree of depth k. A labelling of the tree assigns to each leaf a bit, and to each internal node a number in {1, . . . , m}. The labels of the internal nodes define a (unique) path from the root to a leaf, where the label of each internal node is viewed as a pointer to one of its children.

slide-62
SLIDE 62

The tree problem Tk

Consider the complete m-ary tree of depth k. A labelling of the tree assigns to each leaf a bit, and to each internal node a number in {1, . . . , m}. The labels of the internal nodes define a (unique) path from the root to a leaf, where the label of each internal node is viewed as a pointer to one of its children. An input to the tree problem is a labelling of the tree, where

slide-63
SLIDE 63

The tree problem Tk

Consider the complete m-ary tree of depth k. A labelling of the tree assigns to each leaf a bit, and to each internal node a number in {1, . . . , m}. The labels of the internal nodes define a (unique) path from the root to a leaf, where the label of each internal node is viewed as a pointer to one of its children. An input to the tree problem is a labelling of the tree, where

  • 1. Bob gets as his input the labels of all nodes in the odd levels,
slide-64
SLIDE 64

The tree problem Tk

Consider the complete m-ary tree of depth k. A labelling of the tree assigns to each leaf a bit, and to each internal node a number in {1, . . . , m}. The labels of the internal nodes define a (unique) path from the root to a leaf, where the label of each internal node is viewed as a pointer to one of its children. An input to the tree problem is a labelling of the tree, where

  • 1. Bob gets as his input the labels of all nodes in the odd levels,
  • 2. and Alice gets her input the labels of all nodes in even level.
slide-65
SLIDE 65

The tree problem Tk

Consider the complete m-ary tree of depth k. A labelling of the tree assigns to each leaf a bit, and to each internal node a number in {1, . . . , m}. The labels of the internal nodes define a (unique) path from the root to a leaf, where the label of each internal node is viewed as a pointer to one of its children. An input to the tree problem is a labelling of the tree, where

  • 1. Bob gets as his input the labels of all nodes in the odd levels,
  • 2. and Alice gets her input the labels of all nodes in even level.

The goal is to compute the label of the leaf reached by the path induced by the labelling.

slide-66
SLIDE 66

The tree problem Tk

Consider the complete m-ary tree of depth k. A labelling of the tree assigns to each leaf a bit, and to each internal node a number in {1, . . . , m}. The labels of the internal nodes define a (unique) path from the root to a leaf, where the label of each internal node is viewed as a pointer to one of its children. An input to the tree problem is a labelling of the tree, where

  • 1. Bob gets as his input the labels of all nodes in the odd levels,
  • 2. and Alice gets her input the labels of all nodes in even level.

The goal is to compute the label of the leaf reached by the path induced by the labelling. It is known that the (k − 1)-round communication complexity Dk−1(Tk) of Tk is Dk−1(Tk) = Ω

  • m/polylog(m)
  • .
slide-67
SLIDE 67

Reduction from Tk to Mf (1)

slide-68
SLIDE 68

Reduction from Tk to Mf (1)

  • 1. Alice computes a sequence of sets S1, . . . , Sk inductively:
slide-69
SLIDE 69

Reduction from Tk to Mf (1)

  • 1. Alice computes a sequence of sets S1, . . . , Sk inductively:

◮ S1 contains only the root of the tree.

slide-70
SLIDE 70

Reduction from Tk to Mf (1)

  • 1. Alice computes a sequence of sets S1, . . . , Sk inductively:

◮ S1 contains only the root of the tree. ◮ If i is even, then

Si+1 =

  • the child of v defined by the labelling given to Alice
  • v ∈ Si
slide-71
SLIDE 71

Reduction from Tk to Mf (1)

  • 1. Alice computes a sequence of sets S1, . . . , Sk inductively:

◮ S1 contains only the root of the tree. ◮ If i is even, then

Si+1 =

  • the child of v defined by the labelling given to Alice
  • v ∈ Si
  • ◮ If i is odd, then

Si+1 =

  • all the children of v
  • v ∈ Si
slide-72
SLIDE 72

Reduction from Tk to Mf (1)

  • 1. Alice computes a sequence of sets S1, . . . , Sk inductively:

◮ S1 contains only the root of the tree. ◮ If i is even, then

Si+1 =

  • the child of v defined by the labelling given to Alice
  • v ∈ Si
  • ◮ If i is odd, then

Si+1 =

  • all the children of v
  • v ∈ Si
  • 2. Bob computes a sequence of sets Q1, . . . , Qk inductively:
slide-73
SLIDE 73

Reduction from Tk to Mf (1)

  • 1. Alice computes a sequence of sets S1, . . . , Sk inductively:

◮ S1 contains only the root of the tree. ◮ If i is even, then

Si+1 =

  • the child of v defined by the labelling given to Alice
  • v ∈ Si
  • ◮ If i is odd, then

Si+1 =

  • all the children of v
  • v ∈ Si
  • 2. Bob computes a sequence of sets Q1, . . . , Qk inductively:

◮ Q1 contains only the root of the tree.

slide-74
SLIDE 74

Reduction from Tk to Mf (1)

  • 1. Alice computes a sequence of sets S1, . . . , Sk inductively:

◮ S1 contains only the root of the tree. ◮ If i is even, then

Si+1 =

  • the child of v defined by the labelling given to Alice
  • v ∈ Si
  • ◮ If i is odd, then

Si+1 =

  • all the children of v
  • v ∈ Si
  • 2. Bob computes a sequence of sets Q1, . . . , Qk inductively:

◮ Q1 contains only the root of the tree. ◮ If i is even, then

Qi+1 =

  • all the children of v
  • v ∈ Qi
slide-75
SLIDE 75

Reduction from Tk to Mf (1)

  • 1. Alice computes a sequence of sets S1, . . . , Sk inductively:

◮ S1 contains only the root of the tree. ◮ If i is even, then

Si+1 =

  • the child of v defined by the labelling given to Alice
  • v ∈ Si
  • ◮ If i is odd, then

Si+1 =

  • all the children of v
  • v ∈ Si
  • 2. Bob computes a sequence of sets Q1, . . . , Qk inductively:

◮ Q1 contains only the root of the tree. ◮ If i is even, then

Qi+1 =

  • all the children of v
  • v ∈ Qi
  • ◮ If i is odd, then

Qi+1 =

  • the child of v defined by the labelling given to Bob
  • v ∈ Qi
slide-76
SLIDE 76

Reduction from Tk to Mf (2)

slide-77
SLIDE 77

Reduction from Tk to Mf (2)

  • 3. Alice computes a string x of length n by putting 1 in all coordinates j for

j ∈ Sk and 0 elsewhere.

slide-78
SLIDE 78

Reduction from Tk to Mf (2)

  • 3. Alice computes a string x of length n by putting 1 in all coordinates j for

j ∈ Sk and 0 elsewhere.

  • 4. Bob computes a string y of length n by putting 0 in all coordinates j for

j ∈ Qk and 1 elsewhere.

slide-79
SLIDE 79

Reduction from Tk to Mf (2)

  • 3. Alice computes a string x of length n by putting 1 in all coordinates j for

j ∈ Sk and 0 elsewhere.

  • 4. Bob computes a string y of length n by putting 0 in all coordinates j for

j ∈ Qk and 1 elsewhere.

  • 5. Finally, Alice and Bob use the protocol for Mf on (x, y) and output the

result.

slide-80
SLIDE 80

The correctness (1)

slide-81
SLIDE 81

The correctness (1)

We first show f (x) = 1 and f (y) = 0

slide-82
SLIDE 82

The correctness (1)

We first show f (x) = 1 and f (y) = 0 f (x) = 1 By induction on i from k − 1 to 1, if each node in Si+1 computes the value 1, then so do all the nodes in Si.

slide-83
SLIDE 83

The correctness (1)

We first show f (x) = 1 and f (y) = 0 f (x) = 1 By induction on i from k − 1 to 1, if each node in Si+1 computes the value 1, then so do all the nodes in Si. f (y) = 0 By induction on i from k − 1 to 1 if each node in Qi+1 computes the value 0, then so do all the nodes in Qi.

slide-84
SLIDE 84

The correctness (2)

slide-85
SLIDE 85

The correctness (2)

Finally, we prove that there is exactly one j with xj = 1 and yj = 0 by showing that for every i ∈ {1, . . . , k} the set Si ∩ Qi includes a single node vi, which is the node in level i that the path from the root reaches.

slide-86
SLIDE 86

The correctness (2)

Finally, we prove that there is exactly one j with xj = 1 and yj = 0 by showing that for every i ∈ {1, . . . , k} the set Si ∩ Qi includes a single node vi, which is the node in level i that the path from the root reaches.

◮ It is trivially true for i = 1, i.e., S1 = Q1 = {root}.

slide-87
SLIDE 87

The correctness (2)

Finally, we prove that there is exactly one j with xj = 1 and yj = 0 by showing that for every i ∈ {1, . . . , k} the set Si ∩ Qi includes a single node vi, which is the node in level i that the path from the root reaches.

◮ It is trivially true for i = 1, i.e., S1 = Q1 = {root}. ◮ If i is odd, then we put all the children of Si to Si+1, and only those

defined by the labelling to Qi+1.

slide-88
SLIDE 88

The correctness (2)

Finally, we prove that there is exactly one j with xj = 1 and yj = 0 by showing that for every i ∈ {1, . . . , k} the set Si ∩ Qi includes a single node vi, which is the node in level i that the path from the root reaches.

◮ It is trivially true for i = 1, i.e., S1 = Q1 = {root}. ◮ If i is odd, then we put all the children of Si to Si+1, and only those

defined by the labelling to Qi+1. Since vi ∈ Si ∩ Qi, then the next node vi+1 on the path is in Si+1 ∩ Qi+1.

slide-89
SLIDE 89

The correctness (2)

Finally, we prove that there is exactly one j with xj = 1 and yj = 0 by showing that for every i ∈ {1, . . . , k} the set Si ∩ Qi includes a single node vi, which is the node in level i that the path from the root reaches.

◮ It is trivially true for i = 1, i.e., S1 = Q1 = {root}. ◮ If i is odd, then we put all the children of Si to Si+1, and only those

defined by the labelling to Qi+1. Since vi ∈ Si ∩ Qi, then the next node vi+1 on the path is in Si+1 ∩ Qi+1. Conversely, if v ∈ Si+1 ∩ Qi+1, then its father is in Si ∩ Qi = {vi}. Thus, v = vi+1.

slide-90
SLIDE 90

The correctness (2)

Finally, we prove that there is exactly one j with xj = 1 and yj = 0 by showing that for every i ∈ {1, . . . , k} the set Si ∩ Qi includes a single node vi, which is the node in level i that the path from the root reaches.

◮ It is trivially true for i = 1, i.e., S1 = Q1 = {root}. ◮ If i is odd, then we put all the children of Si to Si+1, and only those

defined by the labelling to Qi+1. Since vi ∈ Si ∩ Qi, then the next node vi+1 on the path is in Si+1 ∩ Qi+1. Conversely, if v ∈ Si+1 ∩ Qi+1, then its father is in Si ∩ Qi = {vi}. Thus, v = vi+1.

◮ The case for even i is symmetric.

slide-91
SLIDE 91

The lower bound

We conclude for any constant k, the size of any depth k − 1 formula for f is C P,k−1(Mf ) = Ω

  • 2Dk−1(Mf )/(k−1)

= Ω

  • 2Dk−1(Tf )/(k−1)

= Ω

  • 2m/polylog(m)

.

slide-92
SLIDE 92

Small Circuits

slide-93
SLIDE 93

Q-Circuits

A Q-circuit is a directed acyclic graph whose gates are taken from a fixed family of gates Q.

slide-94
SLIDE 94

Q-Circuits

A Q-circuit is a directed acyclic graph whose gates are taken from a fixed family of gates Q. The cost of a circuit is its size, i.e., the number of gates.

slide-95
SLIDE 95

Q-Circuits

A Q-circuit is a directed acyclic graph whose gates are taken from a fixed family of gates Q. The cost of a circuit is its size, i.e., the number of gates.

Definition

The Q-circuits complexity of a function f , denoted by SQ(f ), is the minimum cost of a Q-circuit computing f .

slide-96
SLIDE 96

Worst-case partition

slide-97
SLIDE 97

Worst-case partition

Definition

Let f : {0, 1}m → {0, 1} be a function. Let S and T be a partition of the variables x1, . . . , xm into two disjoint sets. The (deterministic) communication complexity of f between S and T, denoted DS:T(f ), is the complexity of computing f where Alice sees all bits in S, and Bob sees all bits in T.

slide-98
SLIDE 98

Worst-case partition

Definition

Let f : {0, 1}m → {0, 1} be a function. Let S and T be a partition of the variables x1, . . . , xm into two disjoint sets. The (deterministic) communication complexity of f between S and T, denoted DS:T(f ), is the complexity of computing f where Alice sees all bits in S, and Bob sees all bits in T. The worse-case communication complexity of f , denoted by Dworst(f ), is the maximum of DS;T(f ) over all such partitions.

slide-99
SLIDE 99

Lemma

Denote cQ = maxq∈Q Dworst(q).

slide-100
SLIDE 100

Lemma

Denote cQ = maxq∈Q Dworst(q). Then, for all f we have SQ(f ) ≥ Dworst(f ) cQ .

slide-101
SLIDE 101

Proof

slide-102
SLIDE 102

Proof

Fix an arbitrary partition of the input bits into two disjoint sets.

slide-103
SLIDE 103

Proof

Fix an arbitrary partition of the input bits into two disjoint sets.

  • 1. Alice and Bob agree on a “bottom-up” order of the gates.
slide-104
SLIDE 104

Proof

Fix an arbitrary partition of the input bits into two disjoint sets.

  • 1. Alice and Bob agree on a “bottom-up” order of the gates.
  • 2. For every gate q there are some inputs for q that are the results of previous

gates (whose values are known to both player) and some input variables.

slide-105
SLIDE 105

Proof

Fix an arbitrary partition of the input bits into two disjoint sets.

  • 1. Alice and Bob agree on a “bottom-up” order of the gates.
  • 2. For every gate q there are some inputs for q that are the results of previous

gates (whose values are known to both player) and some input variables. Alice and Bob compute the value of q using the best protocol for computing q with respect to any partition that has

slide-106
SLIDE 106

Proof

Fix an arbitrary partition of the input bits into two disjoint sets.

  • 1. Alice and Bob agree on a “bottom-up” order of the gates.
  • 2. For every gate q there are some inputs for q that are the results of previous

gates (whose values are known to both player) and some input variables. Alice and Bob compute the value of q using the best protocol for computing q with respect to any partition that has

◮ all the inputs to the gate that are Alice’s variables in one set,

slide-107
SLIDE 107

Proof

Fix an arbitrary partition of the input bits into two disjoint sets.

  • 1. Alice and Bob agree on a “bottom-up” order of the gates.
  • 2. For every gate q there are some inputs for q that are the results of previous

gates (whose values are known to both player) and some input variables. Alice and Bob compute the value of q using the best protocol for computing q with respect to any partition that has

◮ all the inputs to the gate that are Alice’s variables in one set, ◮ all the inputs to the gate that are Bob’s variables in the other set,

slide-108
SLIDE 108

Proof

Fix an arbitrary partition of the input bits into two disjoint sets.

  • 1. Alice and Bob agree on a “bottom-up” order of the gates.
  • 2. For every gate q there are some inputs for q that are the results of previous

gates (whose values are known to both player) and some input variables. Alice and Bob compute the value of q using the best protocol for computing q with respect to any partition that has

◮ all the inputs to the gate that are Alice’s variables in one set, ◮ all the inputs to the gate that are Bob’s variables in the other set, ◮ and all the other inputs (that both players know) are partitioned in an

arbitrary way.

slide-109
SLIDE 109

Proof

Fix an arbitrary partition of the input bits into two disjoint sets.

  • 1. Alice and Bob agree on a “bottom-up” order of the gates.
  • 2. For every gate q there are some inputs for q that are the results of previous

gates (whose values are known to both player) and some input variables. Alice and Bob compute the value of q using the best protocol for computing q with respect to any partition that has

◮ all the inputs to the gate that are Alice’s variables in one set, ◮ all the inputs to the gate that are Bob’s variables in the other set, ◮ and all the other inputs (that both players know) are partitioned in an

arbitrary way.

Thus, to simulate each gate, cQ bits of communication are sufficient.

slide-110
SLIDE 110

Proof

Fix an arbitrary partition of the input bits into two disjoint sets.

  • 1. Alice and Bob agree on a “bottom-up” order of the gates.
  • 2. For every gate q there are some inputs for q that are the results of previous

gates (whose values are known to both player) and some input variables. Alice and Bob compute the value of q using the best protocol for computing q with respect to any partition that has

◮ all the inputs to the gate that are Alice’s variables in one set, ◮ all the inputs to the gate that are Bob’s variables in the other set, ◮ and all the other inputs (that both players know) are partitioned in an

arbitrary way.

Thus, to simulate each gate, cQ bits of communication are sufficient. Because the circuit is of size SQ(f ), the whole simulation uses at most cQ · SQ(f ) bits.

slide-111
SLIDE 111

Threshold gates

slide-112
SLIDE 112

Threshold gates

A threshold gate is determined by:

slide-113
SLIDE 113

Threshold gates

A threshold gate is determined by:

  • 1. t edges z1, . . . , zt entering the gate,
slide-114
SLIDE 114

Threshold gates

A threshold gate is determined by:

  • 1. t edges z1, . . . , zt entering the gate,
  • 2. each edge is associated with an integer weight wi,
slide-115
SLIDE 115

Threshold gates

A threshold gate is determined by:

  • 1. t edges z1, . . . , zt entering the gate,
  • 2. each edge is associated with an integer weight wi,
  • 3. an integer θ.
slide-116
SLIDE 116

Threshold gates

A threshold gate is determined by:

  • 1. t edges z1, . . . , zt entering the gate,
  • 2. each edge is associated with an integer weight wi,
  • 3. an integer θ.

Then the gate computes whether

t

  • i=1

wi · zi > θ.

slide-117
SLIDE 117

gt by threshold gates

slide-118
SLIDE 118

gt by threshold gates

The “greater than” function gt(x, y) =

  • 1,

if x > y 0,

  • therwise.
slide-119
SLIDE 119

gt by threshold gates

The “greater than” function gt(x, y) =

  • 1,

if x > y 0,

  • therwise.

Assume x = xn · · · x1 and y = yn · · · y1. Then x > y ⇐ ⇒

n

  • i=1

2i−1xi +

n

  • i=1

−2i−1yi = x − y > θ = 0.

slide-120
SLIDE 120

The total weight of a threshold gate

slide-121
SLIDE 121

The total weight of a threshold gate

For a threshold gate specified by (w1, . . . , wt, θ), its total weight is

t

  • i=1

|wi|.

slide-122
SLIDE 122

The total weight of a threshold gate

For a threshold gate specified by (w1, . . . , wt, θ), its total weight is

t

  • i=1

|wi|. For the previous threshold gate (1, 2, . . . , 2n−1, −1, −2, . . . , −2n−1, 0), its total weight is W = 2 ·

n

  • i=1

2i−1 = 2n+1 − 2.

slide-123
SLIDE 123

The total weight of a threshold gate

For a threshold gate specified by (w1, . . . , wt, θ), its total weight is

t

  • i=1

|wi|. For the previous threshold gate (1, 2, . . . , 2n−1, −1, −2, . . . , −2n−1, 0), its total weight is W = 2 ·

n

  • i=1

2i−1 = 2n+1 − 2. We will show that an exponential weight, W ≥ 2n is necessary for computing gt with a single gate.

slide-124
SLIDE 124

cQ ≤ log W + 1

slide-125
SLIDE 125

cQ ≤ log W + 1

Let S : T be an arbitrary partition of the input bits.

slide-126
SLIDE 126

cQ ≤ log W + 1

Let S : T be an arbitrary partition of the input bits.

  • 1. Alice computes

zi ∈S wzi zi and send the result to Bob.

slide-127
SLIDE 127

cQ ≤ log W + 1

Let S : T be an arbitrary partition of the input bits.

  • 1. Alice computes

zi ∈S wzi zi and send the result to Bob.

  • 2. Bob computes

zi ∈T wzi zi, adds the result to the number received from

Alice, and compares the sum with θ.

slide-128
SLIDE 128

Now we apply SQ(gt) ≥ Dworst(gt)/cQ and Dworst(gt) = D(gt) = n + 1.

slide-129
SLIDE 129

Now we apply SQ(gt) ≥ Dworst(gt)/cQ and Dworst(gt) = D(gt) = n + 1. Thus the size of any Q-circuit computing gt is at least n + 1 log W + 1.

slide-130
SLIDE 130

Depth 2 Threshold Circuits

slide-131
SLIDE 131

Lemma

Assume that a function f : {0, 1}m → {0, 1} can be computed by a depth 2 threshold circuit, whether the total weight of each gate is bounded by W . Then Rpub,worst

1/2+1/(4W )(f ) ≤ log W + 1.

slide-132
SLIDE 132

Proof (1)

slide-133
SLIDE 133

Proof (1)

The first step is to covert a given circuit for f to a circuit with the following properties.

slide-134
SLIDE 134

Proof (1)

The first step is to covert a given circuit for f to a circuit with the following properties.

  • 1. The top gate is a threshold gate whose threshold θ′ = 0.
slide-135
SLIDE 135

Proof (1)

The first step is to covert a given circuit for f to a circuit with the following properties.

  • 1. The top gate is a threshold gate whose threshold θ′ = 0. We feed the gate

with the constant 1 with weight −θ.

slide-136
SLIDE 136

Proof (1)

The first step is to covert a given circuit for f to a circuit with the following properties.

  • 1. The top gate is a threshold gate whose threshold θ′ = 0. We feed the gate

with the constant 1 with weight −θ.

  • 2. The weighted sum computed by the gate is always nonzero.
slide-137
SLIDE 137

Proof (1)

The first step is to covert a given circuit for f to a circuit with the following properties.

  • 1. The top gate is a threshold gate whose threshold θ′ = 0. We feed the gate

with the constant 1 with weight −θ.

  • 2. The weighted sum computed by the gate is always nonzero. We multiply

each weight by 2,

slide-138
SLIDE 138

Proof (1)

The first step is to covert a given circuit for f to a circuit with the following properties.

  • 1. The top gate is a threshold gate whose threshold θ′ = 0. We feed the gate

with the constant 1 with weight −θ.

  • 2. The weighted sum computed by the gate is always nonzero. We multiply

each weight by 2, and decrease the weight of the constant 1 by 1, i.e., its weight is −2θ + 1.

slide-139
SLIDE 139

Proof (1)

The first step is to covert a given circuit for f to a circuit with the following properties.

  • 1. The top gate is a threshold gate whose threshold θ′ = 0. We feed the gate

with the constant 1 with weight −θ.

  • 2. The weighted sum computed by the gate is always nonzero. We multiply

each weight by 2, and decrease the weight of the constant 1 by 1, i.e., its weight is −2θ + 1. The function does not change, and the new total weight W ′ ≤ 4W .

slide-140
SLIDE 140

Proof (2)

slide-141
SLIDE 141

Proof (2)

Let f1, . . . , ft be the functions that are the inputs to the top gate and w1, . . . , wt. These functions are either constants or input variables or threshold gates, all satisfy Dworst(fi) ≤ log W + 1.

slide-142
SLIDE 142

Proof (3)

slide-143
SLIDE 143

Proof (3)

Fix an arbitrary partition of the inputs, and in the public coin model.

slide-144
SLIDE 144

Proof (3)

Fix an arbitrary partition of the inputs, and in the public coin model.

  • 1. Alice and Bob choose at random an index 1 ≤ i ≤ t with

Pr

  • i is chosen
  • = |wi|

W ′ .

slide-145
SLIDE 145

Proof (3)

Fix an arbitrary partition of the inputs, and in the public coin model.

  • 1. Alice and Bob choose at random an index 1 ≤ i ≤ t with

Pr

  • i is chosen
  • = |wi|

W ′ .

  • 2. They run the deterministic protocol for fi with the fixed partition to get an
  • utput b.
slide-146
SLIDE 146

Proof (3)

Fix an arbitrary partition of the inputs, and in the public coin model.

  • 1. Alice and Bob choose at random an index 1 ≤ i ≤ t with

Pr

  • i is chosen
  • = |wi|

W ′ .

  • 2. They run the deterministic protocol for fi with the fixed partition to get an
  • utput b.

3.

3.1 If b = 0, then the output is chosen uniformly at random from 0 and 1.

slide-147
SLIDE 147

Proof (3)

Fix an arbitrary partition of the inputs, and in the public coin model.

  • 1. Alice and Bob choose at random an index 1 ≤ i ≤ t with

Pr

  • i is chosen
  • = |wi|

W ′ .

  • 2. They run the deterministic protocol for fi with the fixed partition to get an
  • utput b.

3.

3.1 If b = 0, then the output is chosen uniformly at random from 0 and 1. 3.2 If b = 1, then the output is 1 if wi > 0 and 0 if wi < 0.

slide-148
SLIDE 148

Proof (4)

slide-149
SLIDE 149

Proof (4)

Consider an input x with f (x) = 1.

slide-150
SLIDE 150

Proof (4)

Consider an input x with f (x) = 1. Let α = Pr

1≤i≤t

  • fi(x) = 0
  • .
slide-151
SLIDE 151

Proof (4)

Consider an input x with f (x) = 1. Let α = Pr

1≤i≤t

  • fi(x) = 0
  • .

The contribution of these indices to the probability that the output is 1 is α/2.

slide-152
SLIDE 152

Proof (4)

Consider an input x with f (x) = 1. Let α = Pr

1≤i≤t

  • fi(x) = 0
  • .

The contribution of these indices to the probability that the output is 1 is α/2. Moreover Pr

i

  • fi(x) = 1
  • = 1 − α.
slide-153
SLIDE 153

Proof (4)

Consider an input x with f (x) = 1. Let α = Pr

1≤i≤t

  • fi(x) = 0
  • .

The contribution of these indices to the probability that the output is 1 is α/2. Moreover Pr

i

  • fi(x) = 1
  • = 1 − α.

By f (x) = “

i wi · fi(x) > 0?′′ we have

  • i:fi (x)=1

wi > 0,

slide-154
SLIDE 154

Proof (4)

Consider an input x with f (x) = 1. Let α = Pr

1≤i≤t

  • fi(x) = 0
  • .

The contribution of these indices to the probability that the output is 1 is α/2. Moreover Pr

i

  • fi(x) = 1
  • = 1 − α.

By f (x) = “

i wi · fi(x) > 0?′′ we have

  • i:fi (x)=1

wi > 0, and note the weights are integers,

slide-155
SLIDE 155

Proof (4)

Consider an input x with f (x) = 1. Let α = Pr

1≤i≤t

  • fi(x) = 0
  • .

The contribution of these indices to the probability that the output is 1 is α/2. Moreover Pr

i

  • fi(x) = 1
  • = 1 − α.

By f (x) = “

i wi · fi(x) > 0?′′ we have

  • i:fi (x)=1

wi > 0, and note the weights are integers, the contribution of these indices to the probability that the output is 1 is at least (1 − α)/2 + 1/W ′.

slide-156
SLIDE 156

Proof (4)

Consider an input x with f (x) = 1. Let α = Pr

1≤i≤t

  • fi(x) = 0
  • .

The contribution of these indices to the probability that the output is 1 is α/2. Moreover Pr

i

  • fi(x) = 1
  • = 1 − α.

By f (x) = “

i wi · fi(x) > 0?′′ we have

  • i:fi (x)=1

wi > 0, and note the weights are integers, the contribution of these indices to the probability that the output is 1 is at least (1 − α)/2 + 1/W ′. Therefore the total success probability is at least α 2 + 1 − α 2 + 1 W ′ = 1 2 + 1 W ′ .

slide-157
SLIDE 157

Proof (5)

slide-158
SLIDE 158

Proof (5)

The case for an x with f (x) = 0 is symmetric.

slide-159
SLIDE 159

Proof (5)

The case for an x with f (x) = 0 is symmetric. Here, we crucially use the fact that

  • i

wi · fi(x) = 0.

slide-160
SLIDE 160

Proof (5)

The case for an x with f (x) = 0 is symmetric. Here, we crucially use the fact that

  • i

wi · fi(x) = 0. In both case, we get the correct answer with probability 1 2 + 1 W ′ ≥ 1 2 + 1 4W .

slide-161
SLIDE 161

Proof (5)

The case for an x with f (x) = 0 is symmetric. Here, we crucially use the fact that

  • i

wi · fi(x) = 0. In both case, we get the correct answer with probability 1 2 + 1 W ′ ≥ 1 2 + 1 4W . And Dworst(fi) ≤ log W + 1.

slide-162
SLIDE 162

ip by depth 2 threshold circuits

slide-163
SLIDE 163

ip by depth 2 threshold circuits

By Exercise 3.30 Rpub,worst

1/2+1/W (ip) ≥ m − O(log W ).

slide-164
SLIDE 164

ip by depth 2 threshold circuits

By Exercise 3.30 Rpub,worst

1/2+1/W (ip) ≥ m − O(log W ).

By the previous lemma any depth 2 threshold circuit for ip must satisfy Rpub,worst

1/2+1/W (ip) ≤ log(W /4) + 1.

slide-165
SLIDE 165

ip by depth 2 threshold circuits

By Exercise 3.30 Rpub,worst

1/2+1/W (ip) ≥ m − O(log W ).

By the previous lemma any depth 2 threshold circuit for ip must satisfy Rpub,worst

1/2+1/W (ip) ≤ log(W /4) + 1.

Thus W = 2Ω(m).

slide-166
SLIDE 166

ip by depth 2 threshold circuits

By Exercise 3.30 Rpub,worst

1/2+1/W (ip) ≥ m − O(log W ).

By the previous lemma any depth 2 threshold circuit for ip must satisfy Rpub,worst

1/2+1/W (ip) ≤ log(W /4) + 1.

Thus W = 2Ω(m). If the circuit has s gates with each wi and θ is at most w, then s = 2Ω(m)/w.

slide-167
SLIDE 167

ip by depth 2 threshold circuits

By Exercise 3.30 Rpub,worst

1/2+1/W (ip) ≥ m − O(log W ).

By the previous lemma any depth 2 threshold circuit for ip must satisfy Rpub,worst

1/2+1/W (ip) ≤ log(W /4) + 1.

Thus W = 2Ω(m). If the circuit has s gates with each wi and θ is at most w, then s = 2Ω(m)/w. That is, provided the weights are small, the size of the circuit has to be exponential.

slide-168
SLIDE 168

Thank You!