SLIDE 1 On the communication complexity of sparse set disjointness and exists-equal problems
Mert Saglam University of Washington Joint work with Gábor Tardos
SLIDE 2
Communication complexity
Alice Bob X Y f(X,Y)=?
SLIDE 3
Communication complexity
Alice Bob X Y f(X,Y)=?
R
R: Shared random source
SLIDE 4
Communication complexity
Alice Bob X Y f(X,Y)=? m1(R,X) m2(R, Y, m1) m3(R, X, m1,m2)
R
R: Shared random source
mr(R, Y, m1,...,mr-1)
SLIDE 5
Communication complexity
Alice Bob X Y f(X,Y)=? m1(R,X) m2(R, Y, m1) m3(R, X, m1,m2) f(X,Y)
R
R: Shared random source
mr(R, Y, m1,...,mr-1)
SLIDE 6
Communication complexity
Alice Bob X Y f(X,Y)=? m1(R,X) m2(R, Y, m1) m3(R, X, m1,m2) f(X,Y)
R
R: Shared random source
}
# rounds mr(R, Y, m1,...,mr-1)
SLIDE 7
Disjointness problem
S={3,7,8,11} T={2,5,8,14} S,T⊆[m]
SLIDE 8
Disjointness problem
S={3,7,8,11} T={2,5,8,14} |S ∩ T| ≟ 0 S,T⊆[m]
SLIDE 9
Disjointness problem
S={3,7,8,11} T={2,5,8,14} |S ∩ T| ≟ 0 S,T⊆[m]
SLIDE 10 Disjointness problem
S={3,7,8,11} T={2,5,8,14} |S ∩ T| ≟ 0 S,T⊆[m] In Sparse Set Disjointness DISJk |T|, |S|≤k
m
SLIDE 11 Previous work
Total Bits Rounds Error 𝛁(k), m≥k2 Arbitrary 1/3 Babai, Frankl, Simon 86 𝛁(k) Arbitrary 1/3 Kalyanasundaram, Schnitger 92, Razborov 92, Bar-Yossef et al. 02 𝚷(k log k) 1 1/k Folklore 𝛁(k log k) 1 1/3 Folklore, Buhrman et al. 13, Woodruff 08 𝚷(k) 𝚷(log k) 0.01 Håstad, Wigderson 93
SLIDE 12 Our contributions
Bits Rounds Error Best Previous
𝚷(k log(r) k) r 1/exp(r)(c log(r) k)
𝚷(k log k), for r=1
𝚷(k) log* k exp(-k1-𝜁)
𝚷(log k) rounds, 0.01 error 0.01 error
𝛁(k log(r) k) r 1/3 error
𝛁(k) 𝛁(k log k), for r=1
Defn: exp(r)(x) = 22
⋰2x
SLIDE 13 Our contributions
Bits Rounds Error Best Previous
𝚷(k log(r) k) r 1/exp(r)(c log(r) k)
𝚷(k log k), for r=1
𝚷(k) log* k exp(-k1-𝜁)
𝚷(log k) rounds, 0.01 error 0.01 error
𝛁(k log(r) k) r 1/3 error
𝛁(k) 𝛁(k log k), for r=1
Holds for any r ≤ log* k
Defn: exp(r)(x) = 22
⋰2x
SLIDE 14
The upper bound
SLIDE 15
:T
Håstad-Wigderson protocol
Z1 Z2 Z3 ⋯ Zk ⋯
- Zi: random, ∀a∈[m], Pr[a∈Zi]=p
SLIDE 16
:T
Håstad-Wigderson protocol
Z1 Z2 Z3 ⋯ Zk ⋯
- Zi: random, ∀a∈[m], Pr[a∈Zi]=p
- Finds the first k*, Zk*⊇S
SLIDE 17
:T
Håstad-Wigderson protocol
Z1 Z2 Z3 ⋯ Zk ⋯
- Zi: random, ∀a∈[m], Pr[a∈Zi]=p
- Finds the first k*, Zk*⊇S
SLIDE 18
:T Zk*
Håstad-Wigderson protocol
Z1 Z2 Z3 ⋯ Zk ⋯
- Zi: random, ∀a∈[m], Pr[a∈Zi]=p
- Finds the first k*, Zk*⊇S
SLIDE 19
:T Zk*
Håstad-Wigderson protocol
Z1 Z2 Z3 ⋯ Zk ⋯
- Zi: random, ∀a∈[m], Pr[a∈Zi]=p
- Finds the first k*, Zk*⊇S
- Pr[Zi⊇S] = p|S|, so
SLIDE 20
:T Zk*
Håstad-Wigderson protocol
Z1 Z2 Z3 ⋯ Zk ⋯
- Zi: random, ∀a∈[m], Pr[a∈Zi]=p
- Finds the first k*, Zk*⊇S
E[ k* ] = 1/p|S|
SLIDE 21
:T Zk*
Håstad-Wigderson protocol
Z1 Z2 Z3 ⋯ Zk ⋯
- Zi: random, ∀a∈[m], Pr[a∈Zi]=p
- Finds the first k*, Zk*⊇S
E[ k* ] = 1/p|S|
- Pr[Zi⊇S] = p|S|, so
- Send k* to Bob: |S|log 1/p bits
SLIDE 22
:T Zk*
Håstad-Wigderson protocol
Z1 Z2 Z3 ⋯ Zk ⋯
SLIDE 23
:T Zk*
Håstad-Wigderson protocol
so set T’ = T ∩ Zk*
Z1 Z2 Z3 ⋯ Zk ⋯
SLIDE 24
:T Zk*
Håstad-Wigderson protocol
so set T’ = T ∩ Zk*
Z1 Z2 Z3 ⋯ Zk ⋯
SLIDE 25
:T Zk*
Håstad-Wigderson protocol
so set T’ = T ∩ Zk*
- If a ∈ S ∩ T ⇒ a ∈ Zk*,
- If S ∩T=∅, E[|T’|] = p|T|
Z1 Z2 Z3 ⋯ Zk ⋯
SLIDE 26
:T
Håstad-Wigderson protocol
so set T’ = T ∩ Zk*
- If a ∈ S ∩ T ⇒ a ∈ Zk*,
- If S ∩T=∅, E[|T’|] = p|T|
- Bob repeats for T’
Z1 Z2 Z3 ⋯ Zk ⋯
SLIDE 27
:T
Håstad-Wigderson protocol
so set T’ = T ∩ Zk*
- If a ∈ S ∩ T ⇒ a ∈ Zk*,
- If S ∩T=∅, E[|T’|] = p|T|
- Bob repeats for T’
Z1 Z2 Z3 ⋯ Zk ⋯
Zh*
Zh*⊇T’
SLIDE 28
:T
Håstad-Wigderson protocol
so set T’ = T ∩ Zk*
- If a ∈ S ∩ T ⇒ a ∈ Zk*,
- If S ∩T=∅, E[|T’|] = p|T|
- For p=1/2, if S ∩T=∅, in O(log k) rounds S’=T’=∅
- Bob repeats for T’
Z1 Z2 Z3 ⋯ Zk ⋯
Zh*
Zh*⊇T’
SLIDE 29
:T
Håstad-Wigderson protocol
Run O(log k) rounds
➡ If S’=T’=∅, declare DISJOINT ➡ Otherwise, declare INTERSECT
SLIDE 30
:T
Håstad-Wigderson protocol
Cost: |S’| bits per round Run O(log k) rounds
➡ If S’=T’=∅, declare DISJOINT ➡ Otherwise, declare INTERSECT
SLIDE 31
:T
Håstad-Wigderson protocol
Cost: |S’| bits per round Run O(log k) rounds Total = k + k/2 + k/4 + ⋯ = O(k)
➡ If S’=T’=∅, declare DISJOINT ➡ Otherwise, declare INTERSECT
SLIDE 32 Our bound: Rr(DISJk)≤O(k log(r) k)
:T Zi: random, ∀a∈[m], Pr[a∈Zi]=p
Z1 Z2 Z3 ⋯ Zk ⋯
SLIDE 33 Our bound: Rr(DISJk)≤O(k log(r) k)
:T Zi: random, ∀a∈[m], Pr[a∈Zi]=p
Z1 Z2 Z3 ⋯ Zk ⋯
Bits per round: |S’|log 1/p
SLIDE 34 Our bound: Rr(DISJk)≤O(k log(r) k)
:T Observation: Sets get smaller ⇒ can afford smaller p each round Zi: random, ∀a∈[m], Pr[a∈Zi]=p
Z1 Z2 Z3 ⋯ Zk ⋯
Bits per round: |S’|log 1/p
SLIDE 35 Our bound: Rr(DISJk)≤O(k log(r) k)
:T Observation: Sets get smaller ⇒ can afford smaller p each round Zi: random, ∀a∈[m], Pr[a∈Zi]=p
Z1 Z2 Z3 ⋯ Zk ⋯
Bits per round: |S’|log 1/p Defn: exp(r)(x) = 22
⋰2x
SLIDE 36 Our bound: Rr(DISJk)≤O(k log(r) k)
:T Observation: Sets get smaller ⇒ can afford smaller p each round Zi: random, ∀a∈[m], Pr[a∈Zi]=p
Z1 Z2 Z3 ⋯ Zk ⋯
Bits per round: |S’|log 1/p Defn: exp(r)(x) = 22
⋰2x
pi = 1/exp(i)(5 log(r) k)
SLIDE 37 Our bound: Rr(DISJk)≤O(k log(r) k)
Run r rounds
➡ If S’=T’=∅, declare DISJOINT ➡ Otherwise, declare INTERSECT
SLIDE 38 Our bound: Rr(DISJk)≤O(k log(r) k)
Run r rounds
➡ If S’=T’=∅, declare DISJOINT ➡ Otherwise, declare INTERSECT
- pi = 1/exp(i)(5 log(r) k)
- if S ∩T=∅, in r rounds S’=T’=∅
Fact 1
SLIDE 39 Our bound: Rr(DISJk)≤O(k log(r) k)
Run r rounds
➡ If S’=T’=∅, declare DISJOINT ➡ Otherwise, declare INTERSECT
- pi = 1/exp(i)(5 log(r) k)
- if S ∩T=∅, in r rounds S’=T’=∅
Fact 1 Fact 2 |messagei| ≤ 5k log(r) k / 2i
SLIDE 40 Our bound: Rr(DISJk)≤O(k log(r) k)
Run r rounds
➡ If S’=T’=∅, declare DISJOINT ➡ Otherwise, declare INTERSECT
- pi = 1/exp(i)(5 log(r) k)
- if S ∩T=∅, in r rounds S’=T’=∅
Fact 1 Fact 2 |messagei| ≤ 5k log(r) k / 2i |messagei| ≤ ∏
pi-2t+1 |S| log 1/pi
k exp(i-1) exp(i-3) ≤ log exp(i) For i>3, ≤ k / 2i
t=1 i/2
SLIDE 41
The lower bound
SLIDE 42 Exists-equal problem
- Stronger lower bound: easier problem
exists-equal (EE)
SLIDE 43 Exists-equal problem
- Stronger lower bound: easier problem
exists-equal (EE)
SLIDE 44 Exists-equal problem
- Stronger lower bound: easier problem
exists-equal (EE)
- Let x,y∈[t]n
- EEn(x, y) = 1 iff ∃i, xi=yi
t
SLIDE 45 Exists-equal problem
- Stronger lower bound: easier problem
exists-equal (EE)
3 4 4 5 1 2 3 4 2 4
x: y:
- EEn(x, y) = 1 iff ∃i, xi=yi
t
SLIDE 46 Exists-equal problem
- Stronger lower bound: easier problem
exists-equal (EE)
3 4 4 5 1 2 3 4 2 4
x: y: So EE(x,y)=1
- EEn(x, y) = 1 iff ∃i, xi=yi
t
SLIDE 47 Exists-equal problem
- EEn is OR of n equality problems over [t].
- EEn = DISJn
t tn t
SLIDE 48 Exists-equal problem
3 4 4 5 1 2 3 4 2 4
- EEn is OR of n equality problems over [t].
- EEn = DISJn
t tn t
SLIDE 49 Exists-equal problem
3 4 4 5 1 2 3 4 2 4
- EEn is OR of n equality problems over [t].
- EEn = DISJn
- =
t tn t
SLIDE 50 Exists-equal problem
3 4 4 5 1 2 3 4 2 4
- EEn is OR of n equality problems over [t].
- EEn = DISJn
- =
t tn t
SLIDE 51 Exists-equal problem
3 4 4 5 1 2 3 4 2 4
- EEn is OR of n equality problems over [t].
- EEn = DISJn
- =
|S| = |T| = n S, T ⊂ [nt]
t tn t
SLIDE 52 The lower bound
- Show: any r-round EE protocol communicates
Ω(n log(r) n) bits.
SLIDE 53 The lower bound
- Show: any r-round EE protocol communicates
Ω(n log(r) n) bits.
- EE is OR of n equality problems, so decompose to
subproblems
SLIDE 54 The lower bound
- Show: any r-round EE protocol communicates
Ω(n log(r) n) bits.
- EE is OR of n equality problems, so decompose to
subproblems
- Show Ω(log(r) n) lower bound per subproblem
SLIDE 55 The lower bound
- Show: any r-round EE protocol communicates
Ω(n log(r) n) bits.
- EE is OR of n equality problems, so decompose to
subproblems
- Show Ω(log(r) n) lower bound per subproblem
- Equality has O(1) bit communication protocol
SLIDE 56 The lower bound
- Show: any r-round EE protocol communicates
Ω(n log(r) n) bits.
- EE is OR of n equality problems, so decompose to
subproblems
- Show Ω(log(r) n) lower bound per subproblem
- Equality has O(1) bit communication protocol
SLIDE 57 The lower bound
- Show: any r-round EE protocol communicates
Ω(n log(r) n) bits.
- EE is OR of n equality problems, so decompose to
subproblems
- Show Ω(log(r) n) lower bound per subproblem
- Equality has O(1) bit communication protocol
- We get super-linear increase in complexity!
SLIDE 58
The lower bound
By Yao’s lemma, sufficient to consider deterministic protocols with random input
SLIDE 59 The lower bound
By Yao’s lemma, sufficient to consider deterministic protocols with random input
๏ Set t=4n
SLIDE 60 The lower bound
By Yao’s lemma, sufficient to consider deterministic protocols with random input
๏ Set t=4n ๏ Hard distribution ν: (x,y)∈ [t]n x [t]n, uniform random
SLIDE 61 The lower bound
By Yao’s lemma, sufficient to consider deterministic protocols with random input
๏ Set t=4n ๏ Hard distribution ν: (x,y)∈ [t]n x [t]n, uniform random ๏ 3/4 ⩽ Pr(x,y)~ν[EE(x,y)=0] = (1-1/(4n))n ⩽ e-1/4 < 0.78
SLIDE 62 The lower bound
By Yao’s lemma, sufficient to consider deterministic protocols with random input
๏ Set t=4n ๏ Hard distribution ν: (x,y)∈ [t]n x [t]n, uniform random ๏ 3/4 ⩽ Pr(x,y)~ν[EE(x,y)=0] = (1-1/(4n))n ⩽ e-1/4 < 0.78 ๏ ⇒ Any 0-round protocol has 0.22 error
SLIDE 63 Round elimination
Thm: No r-round C = O(n log(r) n)-bits protocol for EEn
t
Induction on r:
SLIDE 64 Round elimination
Thm: No r-round C = O(n log(r) n)-bits protocol for EEn
t
Induction on r: r-round C=𝛇n log(r) n-bits protocol for EEn
t
SLIDE 65 Round elimination
Thm: No r-round C = O(n log(r) n)-bits protocol for EEn
t
Induction on r:
⇒
construct r-round C=𝛇n log(r) n-bits protocol for EEn
t
SLIDE 66 Round elimination
Thm: No r-round C = O(n log(r) n)-bits protocol for EEn
t
Induction on r:
⇒
construct (r-1)-round 10C-bits protocol for EEn’ where n’=n/B and t’=t/B
B=2C/n
t’
r-round C=𝛇n log(r) n-bits protocol for EEn
t
SLIDE 67 Round elimination
Observe 10C=𝛑(n’ log(r-1) n’) Contradicts induction hypothesis! Thm: No r-round C = O(n log(r) n)-bits protocol for EEn
t
Induction on r:
⇒
construct (r-1)-round 10C-bits protocol for EEn’ where n’=n/B and t’=t/B
B=2C/n
t’
r-round C=𝛇n log(r) n-bits protocol for EEn
t
SLIDE 68 Round elimination
Observe 10C=𝛑(n’ log(r-1) n’) Contradicts induction hypothesis! Thm: No r-round C = O(n log(r) n)-bits protocol for EEn
t
Induction on r:
⇒
construct Note: t’=4n’ (r-1)-round 10C-bits protocol for EEn’ where n’=n/B and t’=t/B
B=2C/n
t’
r-round C=𝛇n log(r) n-bits protocol for EEn
t
SLIDE 69 Fixing the first message
x1 x2 x3 x4 x5 ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ xtn
SLIDE 70 Fixing the first message
x1 x2 x3 x4 x5 ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ xtn
SLIDE 71 Fixing the first message
- Throw x0, Pry[P(x0,y) ≠EE(x0,y)] ≥2δ
x1 x2 x3 x4 x5 ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ xtn
SLIDE 72 Fixing the first message
- Throw x0, Pry[P(x0,y) ≠EE(x0,y)] ≥2δ
x1 x2 x3 x4 x5 ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ xtn ⋮ ⋮ ⋮ ⋮ ⋮ ⋮
SLIDE 73 Fixing the first message
- Throw x0, Pry[P(x0,y) ≠EE(x0,y)] ≥2δ
x1 x2 x3 x4 x5 ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ xtn ⋮ ⋮ ⋮ ⋮ ⋮ ⋮
- At most half the inputs are gone
SLIDE 74 Fixing the first message
- Throw x0, Pry[P(x0,y) ≠EE(x0,y)] ≥2δ
x1 x2 x3 x4 x5 ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ xtn ⋮ ⋮ ⋮ ⋮ ⋮ ⋮
- At most half the inputs are gone
- Fix the most frequent message m*
SLIDE 75 Fixing the first message
- Throw x0, Pry[P(x0,y) ≠EE(x0,y)] ≥2δ
x1 x2 x3 x4 x5 ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ xtn ⋮ ⋮ ⋮ ⋮ ⋮ ⋮
- At most half the inputs are gone
- Fix the most frequent message m*
- Let S⊆[t]n be inputs on which m* is sent
SLIDE 76 Fixing the first message
- Throw x0, Pry[P(x0,y) ≠EE(x0,y)] ≥2δ
x1 x2 x3 x4 x5 ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ xtn ⋮ ⋮ ⋮ ⋮ ⋮ ⋮
- At most half the inputs are gone
- Fix the most frequent message m*
- Let S⊆[t]n be inputs on which m* is sent
SLIDE 77 Fixing the first message
- Throw x0, Pry[P(x0,y) ≠EE(x0,y)] ≥2δ
x1 x2 x3 x4 x5 ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ xtn ⋮ ⋮ ⋮ ⋮ ⋮ ⋮
- At most half the inputs are gone
- Fix the most frequent message m*
- Let S⊆[t]n be inputs on which m* is sent
SLIDE 78 Fixing the first message
- Throw x0, Pry[P(x0,y) ≠EE(x0,y)] ≥2δ
x1 x2 x3 x4 x5 ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ xtn ⋮ ⋮ ⋮ ⋮ ⋮ ⋮
- At most half the inputs are gone
- Fix the most frequent message m*
- Let S⊆[t]n be inputs on which m* is sent
- C-bits protocol ⇒ ≤2C different messages
SLIDE 79 Fixing the first message
- Throw x0, Pry[P(x0,y) ≠EE(x0,y)] ≥2δ
x1 x2 x3 x4 x5 ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ xtn ⋮ ⋮ ⋮ ⋮ ⋮ ⋮
- At most half the inputs are gone
- Fix the most frequent message m*
- Let S⊆[t]n be inputs on which m* is sent
- C-bits protocol ⇒ ≤2C different messages
- |S| ≥tn/2C+1
SLIDE 80 S S S S S
r-round protocol for EEn ⇒ (r-1)-round protocol for
Randomness
u
B = 2C/n
v u,v ∈ [t’]n’ n’ = n/B uB vB X Y
repeat B times
[t]n
t t’
SLIDE 81 S S S S S
r-round protocol for EEn ⇒ (r-1)-round protocol for
Randomness
u
B = 2C/n
v u,v ∈ [t’]n’ n’ = n/B uB vB X Y
repeat B times
[t]n
t t’
SLIDE 82 S S S S S
r-round protocol for EEn ⇒ (r-1)-round protocol for
Randomness
u
B = 2C/n
v u,v ∈ [t’]n’ n’ = n/B uB vB X Y
repeat B times
X’ [t]n
t t’
SLIDE 83 S S S S S
r-round protocol for EEn ⇒ (r-1)-round protocol for
Randomness
u
B = 2C/n
v u,v ∈ [t’]n’ n’ = n/B uB vB X Y
repeat B times
X’ [t]n
t t’
①EE(u,v)≈EE(X’, Y)
SLIDE 84 S S S S S
r-round protocol for EEn ⇒ (r-1)-round protocol for
Randomness
u
B = 2C/n
v u,v ∈ [t’]n’ n’ = n/B uB vB X Y
repeat B times
X’ [t]n
t t’
①EE(u,v)≈EE(X’, Y) ② Y | X’ is ≈uniform
SLIDE 85 S S S S S
r-round protocol for EEn ⇒ (r-1)-round protocol for
Randomness
u
B = 2C/n
v u,v ∈ [t’]n’ n’ = n/B uB vB X Y
repeat B times
X’ [t]n
t t’
①EE(u,v)≈EE(X’, Y) ③ X’∈S ⇒ first message fixed ② Y | X’ is ≈uniform
SLIDE 86 Protocol for EEn’ :
t’
SLIDE 87 Protocol for EEn’ : Given u,v ∈ [t’]n’
t’
SLIDE 88 Protocol for EEn’ : Given u,v ∈ [t’]n’
2 3 1 4 2 1 4 2 3 4 1 3
u: v:
t’
SLIDE 89 Protocol for EEn’ : Given u,v ∈ [t’]n’ Recall n’ = n/B
2 3 1 4 2 1 4 2 3 4 1 3
u: v:
B=2C/n
t’
SLIDE 90 Protocol for EEn’ : Given u,v ∈ [t’]n’ Recall n’ = n/B
2 3 1 4 2 1 4 2 3 4 1 3
u: v:
Repeat each coordinate B times
B=2C/n
t’
SLIDE 91 Protocol for EEn’ : Given u,v ∈ [t’]n’ Recall n’ = n/B
2 3 1 4 2 1 4 2 3 4 1 3
u: v:
Repeat each coordinate B times
B=2C/n
t’
2 2 2 2 3 3 3 3 1 1 1 1 4 4 4 4 2 2 2 2 1 1 1 1 4 4 4 4 2 2 2 2 3 3 3 3 4 4 4 4 1 1 1 1 3 3 3 3
uB: vB:
SLIDE 92 Protocol for EEn’ : Given u,v ∈ [t’]n’ Recall n’ = n/B
2 3 1 4 2 1 4 2 3 4 1 3
u: v:
Repeat each coordinate B times
Pick a random function fi: [t’]↦[t] for each i∈[n]
B=2C/n
t’
2 2 2 2 3 3 3 3 1 1 1 1 4 4 4 4 2 2 2 2 1 1 1 1 4 4 4 4 2 2 2 2 3 3 3 3 4 4 4 4 1 1 1 1 3 3 3 3
uB: vB:
SLIDE 93 Protocol for EEn’ : Given u,v ∈ [t’]n’ Recall n’ = n/B
2 3 1 4 2 1 4 2 3 4 1 3
u: v:
Repeat each coordinate B times
Pick a random function fi: [t’]↦[t] for each i∈[n]
B=2C/n
t’
2 2 2 2 3 3 3 3 1 1 1 1 4 4 4 4 2 2 2 2 1 1 1 1 4 4 4 4 2 2 2 2 3 3 3 3 4 4 4 4 1 1 1 1 3 3 3 3
uB: vB:
4 2 7 9 2 7 3 6 2 5 2 6 9 3 1 7 6 7 8 4 2 6 9 3 6 3 1 3 8 7 1 5 4 7 8 9 9 3 1 7 2 1 3 6 9 2 2 1
: Phantom match
⦁
SLIDE 94 Protocol for EEn’ : Given u,v ∈ [t’]n’ Recall n’ = n/B
2 3 1 4 2 1 4 2 3 4 1 3
u: v:
Repeat each coordinate B times
Pick a random function fi: [t’]↦[t] for each i∈[n] Permute coordinates randomly
B=2C/n
t’
2 2 2 2 3 3 3 3 1 1 1 1 4 4 4 4 2 2 2 2 1 1 1 1 4 4 4 4 2 2 2 2 3 3 3 3 4 4 4 4 1 1 1 1 3 3 3 3
uB: vB:
4 2 7 9 2 7 3 6 2 5 2 6 9 3 1 7 6 7 8 4 2 6 9 3 6 3 1 3 8 7 1 5 4 7 8 9 9 3 1 7 2 1 3 6 9 2 2 1
: Phantom match
⦁
SLIDE 95 Protocol for EEn’ : Given u,v ∈ [t’]n’ Recall n’ = n/B
2 3 1 4 2 1 4 2 3 4 1 3
u: v:
3 2 8 1 5 9 2 3 3 7 6 3 9 7 6 9 7 7 4 2 5 9 5 8 1 8 3 1 7 3 9 3 1 1 2 1 2 7 5 3 1 7 6 3 7 9 7 3
Repeat each coordinate B times
Pick a random function fi: [t’]↦[t] for each i∈[n] Permute coordinates randomly
B=2C/n
t’
2 2 2 2 3 3 3 3 1 1 1 1 4 4 4 4 2 2 2 2 1 1 1 1 4 4 4 4 2 2 2 2 3 3 3 3 4 4 4 4 1 1 1 1 3 3 3 3
uB: vB:
4 2 7 9 2 7 3 6 2 5 2 6 9 3 1 7 6 7 8 4 2 6 9 3 6 3 1 3 8 7 1 5 4 7 8 9 9 3 1 7 2 1 3 6 9 2 2 1
: Phantom match
⦁
SLIDE 96 Protocol for EEn’ : Given u,v ∈ [t’]n’ Recall n’ = n/B
2 3 1 4 2 1 4 2 3 4 1 3
u: v:
3 2 8 1 5 9 2 3 3 7 6 3 9 7 6 9 7 7 4 2 5 9 5 8 1 8 3 1 7 3 9 3 1 1 2 1 2 7 5 3 1 7 6 3 7 9 7 3
Repeat each coordinate B times
Pick a random function fi: [t’]↦[t] for each i∈[n] Permute coordinates randomly
X: Y:
B=2C/n
t’
2 2 2 2 3 3 3 3 1 1 1 1 4 4 4 4 2 2 2 2 1 1 1 1 4 4 4 4 2 2 2 2 3 3 3 3 4 4 4 4 1 1 1 1 3 3 3 3
uB: vB:
4 2 7 9 2 7 3 6 2 5 2 6 9 3 1 7 6 7 8 4 2 6 9 3 6 3 1 3 8 7 1 5 4 7 8 9 9 3 1 7 2 1 3 6 9 2 2 1
: Phantom match
⦁
SLIDE 97 Step 2: Rounding to S
Randomness
u
B = 2C/n
v u,v ∈ [t’]n’ n’ = n/B S S S S S uB vB X Y
repeat B times
[t]n ①EE(u,v)≈EE(X’, Y) ③ X’∈S ⇒ first message fixed ② Y | X’ is ≈uniform
SLIDE 98 Step 2: Rounding to S
Randomness
u
B = 2C/n
v u,v ∈ [t’]n’ n’ = n/B S S S S S uB vB X Y
repeat B times
X’ [t]n ①EE(u,v)≈EE(X’, Y) ③ X’∈S ⇒ first message fixed ② Y | X’ is ≈uniform
SLIDE 99
- Nx= S ∩ Ball(X, n(1-1/B))
- X’: uniform in NX
S
Nx
SLIDE 100
- Nx= S ∩ Ball(X, n(1-1/B))
- X’: uniform in NX ③ X’∈S ⇒ first message fixed
S
Nx
SLIDE 101
- Nx= S ∩ Ball(X, n(1-1/B))
- X’: uniform in NX ③ X’∈S ⇒ first message fixed
✓
S
Nx
SLIDE 102 3 2 8 1 5 9 2 3 3 7 6 3 9 7 6 9 7 7 4 2 5 9 5 8 1 8 3 1 7 3 9 3 1 1 2 1 2 7 5 3 1 7 6 3 7 9 7 3
X: Y:
- Nx= S ∩ Ball(X, n(1-1/B))
- X’: uniform in NX ③ X’∈S ⇒ first message fixed
✓
S
Nx
SLIDE 103 3 2 8 1 5 9 2 3 3 7 6 3 9 7 6 9 7 7 4 2 5 9 5 8 1 8 3 1 7 3 9 3 1 1 2 1 2 7 5 3 1 7 6 3 7 9 7 3
X: Y:
- Nx= S ∩ Ball(X, n(1-1/B))
- X’: uniform in NX ③ X’∈S ⇒ first message fixed
✓
S
Nx
SLIDE 104 3 2 8 1 5 9 2 3 3 7 6 3 9 7 6 9 7 7 4 2 5 9 5 8 1 8 3 1 7 3 9 3 1 1 2 1 2 7 5 3 1 7 6 3 7 9 7 3
X: Y:
- Nx= S ∩ Ball(X, n(1-1/B))
- X’: uniform in NX
2 4 7 2 5 1 4 6 3 7 2 1 8 3 3 8 2 9 6 2 5 9 5 8 1 8 3 1 7 3 9 3 1 1 2 1 2 7 5 3 1 7 6 3 7 9 7 3
X’: Y:
Correlated randomness from Nx
③ X’∈S ⇒ first message fixed
✓
S
Nx
SLIDE 105 3 2 8 1 5 9 2 3 3 7 6 3 9 7 6 9 7 7 4 2 5 9 5 8 1 8 3 1 7 3 9 3 1 1 2 1 2 7 5 3 1 7 6 3 7 9 7 3
X: Y:
- Nx= S ∩ Ball(X, n(1-1/B))
- X’: uniform in NX
2 4 7 2 5 1 4 6 3 7 2 1 8 3 3 8 2 9 6 2 5 9 5 8 1 8 3 1 7 3 9 3 1 1 2 1 2 7 5 3 1 7 6 3 7 9 7 3
X’: Y: ③ X’∈S ⇒ first message fixed
✓
S
Nx
SLIDE 106 3 2 8 1 5 9 2 3 3 7 6 3 9 7 6 9 7 7 4 2 5 9 5 8 1 8 3 1 7 3 9 3 1 1 2 1 2 7 5 3 1 7 6 3 7 9 7 3
X: Y:
- Nx= S ∩ Ball(X, n(1-1/B))
- X’: uniform in NX
2 4 7 2 5 1 4 6 3 7 2 1 8 3 3 8 2 9 6 2 5 9 5 8 1 8 3 1 7 3 9 3 1 1 2 1 2 7 5 3 1 7 6 3 7 9 7 3
X’: Y: About one match survives, so EE(u,v)=1 ⇒ EE(X’, Y)=1 ③ X’∈S ⇒ first message fixed
✓
S
Nx
SLIDE 107 3 2 8 1 5 9 2 3 3 7 6 3 9 7 6 9 7 7 4 2 5 9 5 8 1 8 3 1 7 3 9 3 1 1 2 1 2 7 5 3 1 7 6 3 7 9 7 3
X: Y:
- Nx= S ∩ Ball(X, n(1-1/B))
- X’: uniform in NX
2 4 7 2 5 1 4 6 3 7 2 1 8 3 3 8 2 9 6 2 5 9 5 8 1 8 3 1 7 3 9 3 1 1 2 1 2 7 5 3 1 7 6 3 7 9 7 3
X’: Y: About one match survives, so EE(u,v)=1 ⇒ EE(X’, Y)=1 Since t=4n, Pr[Phantom] < 1/4, so EE(u,v)=0 ⇒ EE(X’,Y)=0 ③ X’∈S ⇒ first message fixed
✓
S
Nx
SLIDE 108 3 2 8 1 5 9 2 3 3 7 6 3 9 7 6 9 7 7 4 2 5 9 5 8 1 8 3 1 7 3 9 3 1 1 2 1 2 7 5 3 1 7 6 3 7 9 7 3
X: Y:
- Nx= S ∩ Ball(X, n(1-1/B))
- X’: uniform in NX
2 4 7 2 5 1 4 6 3 7 2 1 8 3 3 8 2 9 6 2 5 9 5 8 1 8 3 1 7 3 9 3 1 1 2 1 2 7 5 3 1 7 6 3 7 9 7 3
X’: Y: About one match survives, so EE(u,v)=1 ⇒ EE(X’, Y)=1 Since t=4n, Pr[Phantom] < 1/4, so EE(u,v)=0 ⇒ EE(X’,Y)=0 ①EE(u,v)≈EE(X’, Y) ③ X’∈S ⇒ first message fixed
✓
S
Nx
SLIDE 109 3 2 8 1 5 9 2 3 3 7 6 3 9 7 6 9 7 7 4 2 5 9 5 8 1 8 3 1 7 3 9 3 1 1 2 1 2 7 5 3 1 7 6 3 7 9 7 3
X: Y:
- Nx= S ∩ Ball(X, n(1-1/B))
- X’: uniform in NX
2 4 7 2 5 1 4 6 3 7 2 1 8 3 3 8 2 9 6 2 5 9 5 8 1 8 3 1 7 3 9 3 1 1 2 1 2 7 5 3 1 7 6 3 7 9 7 3
X’: Y: About one match survives, so EE(u,v)=1 ⇒ EE(X’, Y)=1 Since t=4n, Pr[Phantom] < 1/4, so EE(u,v)=0 ⇒ EE(X’,Y)=0 ①EE(u,v)≈EE(X’, Y)
✓
③ X’∈S ⇒ first message fixed
✓
S
Nx
SLIDE 110
② Y | X’ is ≈uniform Show:
SLIDE 111
- This is needed as Pr[P(X’,Y)≠EE(X,Y)]≤2δ
- nly if
Y | X’ is uniform ② Y | X’ is ≈uniform Show:
SLIDE 112
- This is needed as Pr[P(X’,Y)≠EE(X,Y)]≤2δ
- nly if
Y | X’ is uniform
We show H(Y | X’) = n log t - O(1)
② Y | X’ is ≈uniform Show:
SLIDE 113 Entropy loss comes from coordinates in L Entropy loss = |L|log t - H(XL | L, X’) ≤ |L|log t - (|L|/n)H(X | X’)
3 2 8 1 5 9 2 3 3 7 6 3 9 7 6 9 7 7 4 2 5 9 5 8 1 8 3 1 7 3 9 3 1 1 2 1 2 7 5 3 1 7 6 3 7 9 7 3
X: Y: L: Set of , intentional matches of X, Y
⦁
SLIDE 114 (Han-Shearer) Entropy loss comes from coordinates in L Entropy loss = |L|log t - H(XL | L, X’) ≤ |L|log t - (|L|/n)H(X | X’)
3 2 8 1 5 9 2 3 3 7 6 3 9 7 6 9 7 7 4 2 5 9 5 8 1 8 3 1 7 3 9 3 1 1 2 1 2 7 5 3 1 7 6 3 7 9 7 3
X: Y: L: Set of , intentional matches of X, Y
⦁
SLIDE 115
Want to lower bound H(X’ | X)
S S S S S S
SLIDE 116
Want to lower bound H(X’ | X) i.e., log |Nx| for uniform random x
S S S S S S
SLIDE 117
Want to lower bound H(X’ | X) i.e., log |Nx| for uniform random x
Recall Nx= S ∩ Ball(X, n(1-1/B))
S S S S S S
SLIDE 118 Want to lower bound H(X’ | X) i.e., log |Nx| for uniform random x
Recall Nx= S ∩ Ball(X, n(1-1/B))
S S S S S S
Nx
SLIDE 119 Want to lower bound H(X’ | X) i.e., log |Nx| for uniform random x
Recall Nx= S ∩ Ball(X, n(1-1/B))
S S S S S S
Nx
SLIDE 120
S S S S S S
What is the worst case S?
SLIDE 121
S S S S S S
What is the worst case S?
SLIDE 122 S S S S S S
Nx
What is the worst case S?
SLIDE 123 S S S S S S
Nx
What is the worst case S?
SLIDE 124 S S S S S S
Nx
What is the worst case S?
SLIDE 125 What is the worst case S?
S
SLIDE 126 What is the worst case S?
S
Nx
SLIDE 127 What is the worst case S?
S
Nx
SLIDE 128 What is the worst case S?
S
Nx
- This intuition is correct even in
high dimensions
SLIDE 129 What is the worst case S?
S
Nx
- This intuition is correct even in
high dimensions
- Even for the Hamming distance
SLIDE 130 An isoperimetric inequality
Conjecture: Let S⊆[t]n, |S| = kn (k < t). Then
E[log |B(x, d) ∩ S|] ≥ E[log |B(x, d) ∩ [k]n|]
where: x: uniform random B(x,d): radius-d Hamming ball around x log 0: -1.
SLIDE 131 An isoperimetric inequality
Conjecture: Let S⊆[t]n, |S| = kn (k < t). Then
E[log |B(x, d) ∩ S|] ≥ E[log |B(x, d) ∩ [k]n|]
where: x: uniform random B(x,d): radius-d Hamming ball around x log 0: -1. Theorem (informal): For any S⊆[t]n, ∃ I ⊂ [n], |I|=n/5, the conjecture is true in the projected space
SLIDE 132
Review
SLIDE 133 Review
- Tight round / communication tradeoff for DISJ
SLIDE 134 Review
- Tight round / communication tradeoff for DISJ
- Super-sum for OR of equality: R(EEn) = ω(n) . R(EQ)
SLIDE 135 Review
- Tight round / communication tradeoff for DISJ
- Super-sum for OR of equality: R(EEn) = ω(n) . R(EQ)
- New perspective for direct sum: Isoperimetric
considerations
SLIDE 136
Conjecture: Let S⊆[t]n, |S| = kn (k < t). Then
E[log |B(x, d) ∩ S|] ≥ E[log |B(x, d) ∩ [k]n|]
where: x: uniform random B(x,d): radius-d Hamming ball around x log 0: -1.
Thank You!