Lower Bounds for Number-in-Hand Multiparty Communication Complexity - - PowerPoint PPT Presentation

lower bounds for number in hand multiparty communication
SMART_READER_LITE
LIVE PREVIEW

Lower Bounds for Number-in-Hand Multiparty Communication Complexity - - PowerPoint PPT Presentation

Lower Bounds for Number-in-Hand Multiparty Communication Complexity Jeff M. Phillips Elad Verbin, Qin Zhang Univ. of Utah CTIC/MADALGO, Aarhus Univ. SODA 2012, Kyoto Jan. 17, 2012 1-1 The multiparty communication model x 1 = 010011 x 2 =


slide-1
SLIDE 1

1-1

Lower Bounds for Number-in-Hand Multiparty Communication Complexity

  • Jan. 17, 2012

Jeff M. Phillips Elad Verbin, Qin Zhang

  • Univ. of Utah

CTIC/MADALGO, Aarhus Univ.

SODA 2012, Kyoto

slide-2
SLIDE 2

2-1

x1 = 010011 x2 = 111011 x3 = 111111 xk = 100011

The multiparty communication model

slide-3
SLIDE 3

2-2

x1 = 010011 x2 = 111011 x3 = 111111 xk = 100011 We want to compute f(x1, x2, . . . , xk) f can be bit-wise XOR, OR, AND, MAJ . . .

The multiparty communication model

slide-4
SLIDE 4

2-3

x1 = 010011 x2 = 111011 x3 = 111111 xk = 100011 We want to compute f(x1, x2, . . . , xk) f can be bit-wise XOR, OR, AND, MAJ . . .

Message passing: If x1 talks to x2, others can- not hear. Blackboard: One speaks, everyone else hears.

The multiparty communication model

Today’s focus

slide-5
SLIDE 5

3-1

Related work

So natural, must be studied?

slide-6
SLIDE 6

3-2

Related work

So natural, must be studied? The Blackboard model: Quite a few works. The Message-passing model: Almost nothing.

slide-7
SLIDE 7

3-3

Related work

So natural, must be studied? The Blackboard model: Quite a few works. The Message-passing model: Almost nothing. Back to the “ancient” time:

“lower bounds on the multiparty communication complexity” by Duris and Rolim ’98. Gives some deterministic lower bounds.

slide-8
SLIDE 8

3-4

Related work

So natural, must be studied? The Blackboard model: Quite a few works. The Message-passing model: Almost nothing. Back to the “ancient” time:

“lower bounds on the multiparty communication complexity” by Duris and Rolim ’98. Gives some deterministic lower bounds.

Gal and Gopalan for “longest increasing sequence”, ’07.

and Guha and Huang for “random order streams”, ’09. Under “private message model” but it is different from ours.

slide-9
SLIDE 9

4-1

Our results

  • 1. Ω(nk) for the k-bitwise-XOR/OR/AND/MAJ.
  • 2. Ω(n log k) for k-bitwise-AND/OR in the black-

board model.

  • 3. ˜

Ω(nk) for k-connectivity. All tight, and for randomized algorithms.

slide-10
SLIDE 10

4-2

Our results

  • 1. Ω(nk) for the k-bitwise-XOR/OR/AND/MAJ.
  • 2. Ω(n log k) for k-bitwise-AND/OR in the black-

board model.

  • 3. ˜

Ω(nk) for k-connectivity. All tight, and for randomized algorithms. Artificial? Well, some interesting problems can be reduced to these (later).

slide-11
SLIDE 11

5-1

Warm up – k-bitwise-XOR

1 S1 S2 A1,1 A1,2 A1,n A2,1 A2,2 A2,n S k

2

A k

2 ,1 A k 2 ,2

A k

2 ,n

Sk Ak,1 Ak,2 Ak,n XOR

slide-12
SLIDE 12

6-1

2-XOR ⇒ k-XOR

x1 x2 x3 x4 x5

slide-13
SLIDE 13

6-2

2-XOR ⇒ k-XOR

x1 x2 x3 x4 x5

Pick a random guy, say x4. Total CC is C ⇒ the expected CC(x4 : others) is at most 2C/k.

slide-14
SLIDE 14

6-3

2-XOR ⇒ k-XOR

x1 x2 x3 x4 x5

Pick a random guy, say x4. Total CC is C ⇒ the expected CC(x4 : others) is at most 2C/k. Alice and Bob want to solve the 2-XOR (the inputs are randomly from {0, 1}n) ⇒ running a protocol for k-XOR as follows:

slide-15
SLIDE 15

6-4

2-XOR ⇒ k-XOR

x1 x2 x3 x4 x5

Pick a random guy, say x4. Total CC is C ⇒ the expected CC(x4 : others) is at most 2C/k. Alice and Bob want to solve the 2-XOR (the inputs are randomly from {0, 1}n) ⇒ running a protocol for k-XOR as follows: Alice Bob Alice plays a random guy with her input. Bob plays another random guy with his input. He also plays the other k − 2 guys with random inputs from {0, 1}n.

slide-16
SLIDE 16

6-5

2-XOR ⇒ k-XOR

x1 x2 x3 x4 x5

Pick a random guy, say x4. Total CC is C ⇒ the expected CC(x4 : others) is at most 2C/k. Alice and Bob want to solve the 2-XOR (the inputs are randomly from {0, 1}n) ⇒ running a protocol for k-XOR as follows: Alice Bob

Note: inputs of all k-players are symmetric.

Alice plays a random guy with her input. Bob plays another random guy with his input. He also plays the other k − 2 guys with random inputs from {0, 1}n.

slide-17
SLIDE 17

6-6

2-XOR ⇒ k-XOR

x1 x2 x3 x4 x5

Pick a random guy, say x4. Total CC is C ⇒ the expected CC(x4 : others) is at most 2C/k. Alice and Bob want to solve the 2-XOR (the inputs are randomly from {0, 1}n) ⇒ running a protocol for k-XOR as follows: Alice Bob

E[CC(2-XOR)] ≤ 2

k CC(k-XOR)

Note: inputs of all k-players are symmetric. Ω(n)

Alice plays a random guy with her input. Bob plays another random guy with his input. He also plays the other k − 2 guys with random inputs from {0, 1}n.

Ω(nk)

slide-18
SLIDE 18

7-1

k-bitwise-OR

1 1 S1 S2 A1,1 A1,2 A1,n A2,1 A2,2 A2,n Sk Ak,1 Ak,2 Ak,n OR S k

2

A k

2 ,1 A k 2 ,2

A k

2 ,n

slide-19
SLIDE 19

8-1

As always, first, try to find the hard distance for k-OR! First attempt: each coordinate is 1 w.p. 1/k.

Intuition to reduce from 2-DISJ

slide-20
SLIDE 20

8-2

As always, first, try to find the hard distance for k-OR! First attempt: each coordinate is 1 w.p. 1/k.

Intuition to reduce from 2-DISJ

Hard for k = 2 but not for general k.

slide-21
SLIDE 21

8-3

As always, first, try to find the hard distance for k-OR! First attempt: each coordinate is 1 w.p. 1/k. Second attempt: random partition n coordinates to two equal-sized sets. important set: each entry is 1 w.p. 1/k. balancing set: all entries are 1.

Intuition to reduce from 2-DISJ

Hard for k = 2 but not for general k.

slide-22
SLIDE 22

8-4

As always, first, try to find the hard distance for k-OR! First attempt: each coordinate is 1 w.p. 1/k. Second attempt: random partition n coordinates to two equal-sized sets. important set: each entry is 1 w.p. 1/k. balancing set: all entries are 1.

Seems hard but, wait! The Slepian-Wolf coding.

Intuition to reduce from 2-DISJ

Hard for k = 2 but not for general k.

slide-23
SLIDE 23

8-5

As always, first, try to find the hard distance for k-OR! First attempt: each coordinate is 1 w.p. 1/k. Second attempt: random partition n coordinates to two equal-sized sets. important set: each entry is 1 w.p. 1/k. balancing set: all entries are 1.

Seems hard but, wait! The Slepian-Wolf coding.

Intuition to reduce from 2-DISJ

Hard for k = 2 but not for general k.

Third attempt: same as the second. Except the balancing set: each entry is 1 w.p. 1/2.

slide-24
SLIDE 24

8-6

As always, first, try to find the hard distance for k-OR! First attempt: each coordinate is 1 w.p. 1/k. Second attempt: random partition n coordinates to two equal-sized sets. important set: each entry is 1 w.p. 1/k. balancing set: all entries are 1.

Seems hard but, wait! The Slepian-Wolf coding.

Intuition to reduce from 2-DISJ

Hard for k = 2 but not for general k. It works! Now Alice takes one vector. Bob takes the other k − 1 vectors and OR them together, and then takes the complement. Looks like 2-DISJ.

Third attempt: same as the second. Except the balancing set: each entry is 1 w.p. 1/2.

slide-25
SLIDE 25

9-1

2-DISJ ⇒ k-OR

x1 x2 x3 x4 x5

2-DISJ: Alice has x ∈ [n] and Bob has y ∈ [n]. W.p. 1/4, x and y are random subsets of [n] of size n/4 and |x ∩ y| = 1. And w.p. 1 − 1/4, x and y are random subsets of [n] of size n/4 and x ∩ y = ∅. Pick a random guy, say x4. Total CC is C ⇒ the expected CC(x4 : others) is at most 2C/k.

slide-26
SLIDE 26

9-2

2-DISJ ⇒ k-OR

x1 x2 x3 x4 x5

2-DISJ: Alice has x ∈ [n] and Bob has y ∈ [n]. W.p. 1/4, x and y are random subsets of [n] of size n/4 and |x ∩ y| = 1. And w.p. 1 − 1/4, x and y are random subsets of [n] of size n/4 and x ∩ y = ∅. Pick a random guy, say x4. Total CC is C ⇒ the expected CC(x4 : others) is at most 2C/k. Alice plays a random guy with her input x. Bob plays the other k − 1 guys with his input y. Alice Bob

slide-27
SLIDE 27

9-3

2-DISJ ⇒ k-OR

x1 x2 x3 x4 x5

2-DISJ: Alice has x ∈ [n] and Bob has y ∈ [n]. W.p. 1/4, x and y are random subsets of [n] of size n/4 and |x ∩ y| = 1. And w.p. 1 − 1/4, x and y are random subsets of [n] of size n/4 and x ∩ y = ∅. Pick a random guy, say x4. Total CC is C ⇒ the expected CC(x4 : others) is at most 2C/k. Alice plays a random guy with her input x. Bob plays the other k − 1 guys with his input y. Alice Bob

Again: inputs of all k-players are symmetric.

slide-28
SLIDE 28

9-4

2-DISJ ⇒ k-OR

x1 x2 x3 x4 x5

2-DISJ: Alice has x ∈ [n] and Bob has y ∈ [n]. W.p. 1/4, x and y are random subsets of [n] of size n/4 and |x ∩ y| = 1. And w.p. 1 − 1/4, x and y are random subsets of [n] of size n/4 and x ∩ y = ∅. Pick a random guy, say x4. Total CC is C ⇒ the expected CC(x4 : others) is at most 2C/k. Alice plays a random guy with her input x. Bob plays the other k − 1 guys with his input y. Alice Bob

Again: inputs of all k-players are symmetric.

Razborov[90]: Ω(n).

E[CC(2-DISJ)] ≤ 2

k CC(k-OR)

Ω(nk)

slide-29
SLIDE 29

10-1

Summary of other reults

  • 1. Ω(nk) for the MAJ.
  • 2. Ω(n log k) for AND and OR in the blackboard model.
  • 3. ˜

Ω(nk) for k-connectivity. (one of main technical contributions)

  • 4. Some direct sum results.
  • 5. Some applications, e.g. the heavy hitter problem and

the ǫ-kernels in the site-server model (next page).

slide-30
SLIDE 30

11-1

Motivation

· · ·

S1 S2 S3 Sk

time

C

coordinator sites

The Distributed Streaming Model

slide-31
SLIDE 31

11-2

Motivation

· · ·

S1 S2 S3 Sk

time

C

coordinator sites

The Distributed Streaming Model

Static case (or the site-server model, exactly our model)

  • Top-k (Can and Wang ’04,

Michel et. al. ’05, Patt- Shamir and Shafrir ’08)

  • Heavy-hitter (Zhao et. al.

’06, Huang et. al. ’11) Dynamic case

  • Samplings

(Cormode et.

  • al. ’10)
  • Frequent moments (. . .)
  • Heavy-hitter (. . . )
  • Quantile (. . .)
  • Entropy (. . .)
  • Various sketches (. . .)
  • Non-linear functions (. . .)
slide-32
SLIDE 32

11-3

Motivation

· · ·

S1 S2 S3 Sk

time

C

coordinator sites

The Distributed Streaming Model

Static case (or the site-server model, exactly our model)

  • Top-k (Can and Wang ’04,

Michel et. al. ’05, Patt- Shamir and Shafrir ’08)

  • Heavy-hitter (Zhao et. al.

’06, Huang et. al. ’11) Dynamic case

  • Samplings

(Cormode et.

  • al. ’10)
  • Frequent moments (. . .)
  • Heavy-hitter (. . . )
  • Quantile (. . .)
  • Entropy (. . .)
  • Various sketches (. . .)
  • Non-linear functions (. . .)

A large number of upper bounds, but very few lower bounds.

slide-33
SLIDE 33

12-1

Motivation (Cont.)

Secure Multiparty Computation: Players who do not trust each other, but want to compute a joint function of their inputs.

slide-34
SLIDE 34

12-2

Motivation (Cont.)

Secure Multiparty Computation: Players who do not trust each other, but want to compute a joint function of their inputs. Streaming: A stream of data that can only be scanned from left to

  • right. The goal is to compute some function of the stream,

and minimize the space usage.

slide-35
SLIDE 35

12-3

Motivation (Cont.)

Secure Multiparty Computation: Players who do not trust each other, but want to compute a joint function of their inputs. Streaming: A stream of data that can only be scanned from left to

  • right. The goal is to compute some function of the stream,

and minimize the space usage.

Some nice lower bounds given, e.g., by Bar-Yossef el. al. ’04 for frequent moments, but in blackboard model or the “one way” private message model.

slide-36
SLIDE 36

13-1

There are problems that might be impossible to lower bound using symmetrization.

E.g. k-DISJ ...

Discussions

slide-37
SLIDE 37

13-2

There are problems that might be impossible to lower bound using symmetrization.

E.g. k-DISJ ...

Require proving distributional lower bounds for 2-player problems, often over somewhat-convoluted distributions.

Discussions

Can we avoid this?

slide-38
SLIDE 38

13-3

There are problems that might be impossible to lower bound using symmetrization.

E.g. k-DISJ ...

Require proving distributional lower bounds for 2-player problems, often over somewhat-convoluted distributions. In order to use symmetrization, one needs to find a hard distribution for the k-player problem which is symmetric.

Can we relax or generalize this?

Discussions

Can we avoid this?

slide-39
SLIDE 39

14-1

List of other problems

  • Coordinate-wise problems: Each player gets a vector
  • f length n. Some symmetric coordinate-wise function

g : {0, 1}k → {0, 1} is applied, resulting in a length n

  • vector. Then a “combining function” h : {0, 1}n → Z

is applied to the bits of the result.

  • Equality: Each player gets a vector of length n, and

the goal is to decide whether all players have received the same vector.

  • Graph problems
  • Pointer Chasing
  • . . .
slide-40
SLIDE 40

15-1

The End

T HANK YOU

Q and A