On the communication complexity of sparse set disjointness and - - PowerPoint PPT Presentation

on the communication complexity of sparse set
SMART_READER_LITE
LIVE PREVIEW

On the communication complexity of sparse set disjointness and - - PowerPoint PPT Presentation

On the communication complexity of sparse set disjointness and exists-equal problems Mert Saglam University of Washington Joint work with Gbor Tardos Communication complexity f(X,Y)=? X Y Alice Bob R: Shared random source R


slide-1
SLIDE 1

On the communication complexity of sparse set disjointness and exists-equal problems

Mert Saglam University of Washington Joint work with Gábor Tardos

slide-2
SLIDE 2

Communication complexity

Alice Bob X Y f(X,Y)=?

slide-3
SLIDE 3

Communication complexity

Alice Bob X Y f(X,Y)=?

R

R: Shared random source

slide-4
SLIDE 4

Communication complexity

Alice Bob X Y f(X,Y)=? m1(R,X) m2(R, Y, m1) m3(R, X, m1,m2)

R

R: Shared random source

mr(R, Y, m1,...,mr-1)

slide-5
SLIDE 5

Communication complexity

Alice Bob X Y f(X,Y)=? m1(R,X) m2(R, Y, m1) m3(R, X, m1,m2) f(X,Y)

R

R: Shared random source

mr(R, Y, m1,...,mr-1)

slide-6
SLIDE 6

Communication complexity

Alice Bob X Y f(X,Y)=? m1(R,X) m2(R, Y, m1) m3(R, X, m1,m2) f(X,Y)

R

R: Shared random source

}

# rounds mr(R, Y, m1,...,mr-1)

slide-7
SLIDE 7

Disjointness problem

S={3,7,8,11} T={2,5,8,14} S,T⊆[m]

slide-8
SLIDE 8

Disjointness problem

S={3,7,8,11} T={2,5,8,14} |S ∩ T| ≟ 0 S,T⊆[m]

slide-9
SLIDE 9

Disjointness problem

S={3,7,8,11} T={2,5,8,14} |S ∩ T| ≟ 0 S,T⊆[m]

slide-10
SLIDE 10

Disjointness problem

S={3,7,8,11} T={2,5,8,14} |S ∩ T| ≟ 0 S,T⊆[m] In Sparse Set Disjointness DISJk |T|, |S|≤k

m

slide-11
SLIDE 11

Previous work

Total Bits Rounds Error 𝛁(k), m≥k2 Arbitrary 1/3 Babai, Frankl, Simon 86 𝛁(k) Arbitrary 1/3 Kalyanasundaram, Schnitger 92, Razborov 92, Bar-Yossef et al. 02 𝚷(k log k) 1 1/k Folklore 𝛁(k log k) 1 1/3 Folklore, Buhrman et al. 13, Woodruff 08 𝚷(k) 𝚷(log k) 0.01 Håstad, Wigderson 93

slide-12
SLIDE 12

Our contributions

Bits Rounds Error Best Previous

𝚷(k log(r) k) r 1/exp(r)(c log(r) k)

𝚷(k log k), for r=1

𝚷(k) log* k exp(-k1-𝜁)

𝚷(log k) rounds, 0.01 error 0.01 error

𝛁(k log(r) k) r 1/3 error

𝛁(k) 𝛁(k log k), for r=1

Defn: exp(r)(x) = 22

⋰2x

slide-13
SLIDE 13

Our contributions

Bits Rounds Error Best Previous

𝚷(k log(r) k) r 1/exp(r)(c log(r) k)

𝚷(k log k), for r=1

𝚷(k) log* k exp(-k1-𝜁)

𝚷(log k) rounds, 0.01 error 0.01 error

𝛁(k log(r) k) r 1/3 error

𝛁(k) 𝛁(k log k), for r=1

Holds for any r ≤ log* k

Defn: exp(r)(x) = 22

⋰2x

slide-14
SLIDE 14

The upper bound

slide-15
SLIDE 15
  • S:

:T

Håstad-Wigderson protocol

Z1 Z2 Z3 ⋯ Zk ⋯

  • Zi: random, ∀a∈[m], Pr[a∈Zi]=p
slide-16
SLIDE 16
  • S:

:T

Håstad-Wigderson protocol

Z1 Z2 Z3 ⋯ Zk ⋯

  • Zi: random, ∀a∈[m], Pr[a∈Zi]=p
  • Finds the first k*, Zk*⊇S
slide-17
SLIDE 17
  • S:

:T

Håstad-Wigderson protocol

Z1 Z2 Z3 ⋯ Zk ⋯

  • Zi: random, ∀a∈[m], Pr[a∈Zi]=p
  • Finds the first k*, Zk*⊇S
slide-18
SLIDE 18
  • S:

:T Zk*

Håstad-Wigderson protocol

Z1 Z2 Z3 ⋯ Zk ⋯

  • Zi: random, ∀a∈[m], Pr[a∈Zi]=p
  • Finds the first k*, Zk*⊇S
slide-19
SLIDE 19
  • S:

:T Zk*

Håstad-Wigderson protocol

Z1 Z2 Z3 ⋯ Zk ⋯

  • Zi: random, ∀a∈[m], Pr[a∈Zi]=p
  • Finds the first k*, Zk*⊇S
  • Pr[Zi⊇S] = p|S|, so
slide-20
SLIDE 20
  • S:

:T Zk*

Håstad-Wigderson protocol

Z1 Z2 Z3 ⋯ Zk ⋯

  • Zi: random, ∀a∈[m], Pr[a∈Zi]=p
  • Finds the first k*, Zk*⊇S

E[ k* ] = 1/p|S|

  • Pr[Zi⊇S] = p|S|, so
slide-21
SLIDE 21
  • S:

:T Zk*

Håstad-Wigderson protocol

Z1 Z2 Z3 ⋯ Zk ⋯

  • Zi: random, ∀a∈[m], Pr[a∈Zi]=p
  • Finds the first k*, Zk*⊇S

E[ k* ] = 1/p|S|

  • Pr[Zi⊇S] = p|S|, so
  • Send k* to Bob: |S|log 1/p bits
slide-22
SLIDE 22
  • S:

:T Zk*

Håstad-Wigderson protocol

  • If a ∈ S ∩ T ⇒ a ∈ Zk*,

Z1 Z2 Z3 ⋯ Zk ⋯

slide-23
SLIDE 23
  • S:

:T Zk*

Håstad-Wigderson protocol

so set T’ = T ∩ Zk*

  • If a ∈ S ∩ T ⇒ a ∈ Zk*,

Z1 Z2 Z3 ⋯ Zk ⋯

slide-24
SLIDE 24
  • S:

:T Zk*

Håstad-Wigderson protocol

so set T’ = T ∩ Zk*

  • If a ∈ S ∩ T ⇒ a ∈ Zk*,

Z1 Z2 Z3 ⋯ Zk ⋯

slide-25
SLIDE 25
  • S:

:T Zk*

Håstad-Wigderson protocol

so set T’ = T ∩ Zk*

  • If a ∈ S ∩ T ⇒ a ∈ Zk*,
  • If S ∩T=∅, E[|T’|] = p|T|

Z1 Z2 Z3 ⋯ Zk ⋯

slide-26
SLIDE 26
  • S:

:T

Håstad-Wigderson protocol

so set T’ = T ∩ Zk*

  • If a ∈ S ∩ T ⇒ a ∈ Zk*,
  • If S ∩T=∅, E[|T’|] = p|T|
  • Bob repeats for T’

Z1 Z2 Z3 ⋯ Zk ⋯

slide-27
SLIDE 27
  • S:

:T

Håstad-Wigderson protocol

so set T’ = T ∩ Zk*

  • If a ∈ S ∩ T ⇒ a ∈ Zk*,
  • If S ∩T=∅, E[|T’|] = p|T|
  • Bob repeats for T’

Z1 Z2 Z3 ⋯ Zk ⋯

Zh*

Zh*⊇T’

slide-28
SLIDE 28
  • S:

:T

Håstad-Wigderson protocol

so set T’ = T ∩ Zk*

  • If a ∈ S ∩ T ⇒ a ∈ Zk*,
  • If S ∩T=∅, E[|T’|] = p|T|
  • For p=1/2, if S ∩T=∅, in O(log k) rounds S’=T’=∅
  • Bob repeats for T’

Z1 Z2 Z3 ⋯ Zk ⋯

Zh*

Zh*⊇T’

slide-29
SLIDE 29
  • S:

:T

Håstad-Wigderson protocol

Run O(log k) rounds

➡ If S’=T’=∅, declare DISJOINT ➡ Otherwise, declare INTERSECT

slide-30
SLIDE 30
  • S:

:T

Håstad-Wigderson protocol

Cost: |S’| bits per round Run O(log k) rounds

➡ If S’=T’=∅, declare DISJOINT ➡ Otherwise, declare INTERSECT

slide-31
SLIDE 31
  • S:

:T

Håstad-Wigderson protocol

Cost: |S’| bits per round Run O(log k) rounds Total = k + k/2 + k/4 + ⋯ = O(k)

➡ If S’=T’=∅, declare DISJOINT ➡ Otherwise, declare INTERSECT

slide-32
SLIDE 32

Our bound: Rr(DISJk)≤O(k log(r) k)

  • S:

:T Zi: random, ∀a∈[m], Pr[a∈Zi]=p

Z1 Z2 Z3 ⋯ Zk ⋯

slide-33
SLIDE 33

Our bound: Rr(DISJk)≤O(k log(r) k)

  • S:

:T Zi: random, ∀a∈[m], Pr[a∈Zi]=p

Z1 Z2 Z3 ⋯ Zk ⋯

Bits per round: |S’|log 1/p

slide-34
SLIDE 34

Our bound: Rr(DISJk)≤O(k log(r) k)

  • S:

:T Observation: Sets get smaller ⇒ can afford smaller p each round Zi: random, ∀a∈[m], Pr[a∈Zi]=p

Z1 Z2 Z3 ⋯ Zk ⋯

Bits per round: |S’|log 1/p

slide-35
SLIDE 35

Our bound: Rr(DISJk)≤O(k log(r) k)

  • S:

:T Observation: Sets get smaller ⇒ can afford smaller p each round Zi: random, ∀a∈[m], Pr[a∈Zi]=p

Z1 Z2 Z3 ⋯ Zk ⋯

Bits per round: |S’|log 1/p Defn: exp(r)(x) = 22

⋰2x

slide-36
SLIDE 36

Our bound: Rr(DISJk)≤O(k log(r) k)

  • S:

:T Observation: Sets get smaller ⇒ can afford smaller p each round Zi: random, ∀a∈[m], Pr[a∈Zi]=p

Z1 Z2 Z3 ⋯ Zk ⋯

Bits per round: |S’|log 1/p Defn: exp(r)(x) = 22

⋰2x

pi = 1/exp(i)(5 log(r) k)

slide-37
SLIDE 37

Our bound: Rr(DISJk)≤O(k log(r) k)

Run r rounds

➡ If S’=T’=∅, declare DISJOINT ➡ Otherwise, declare INTERSECT

slide-38
SLIDE 38

Our bound: Rr(DISJk)≤O(k log(r) k)

Run r rounds

➡ If S’=T’=∅, declare DISJOINT ➡ Otherwise, declare INTERSECT

  • pi = 1/exp(i)(5 log(r) k)
  • if S ∩T=∅, in r rounds S’=T’=∅

Fact 1

slide-39
SLIDE 39

Our bound: Rr(DISJk)≤O(k log(r) k)

Run r rounds

➡ If S’=T’=∅, declare DISJOINT ➡ Otherwise, declare INTERSECT

  • pi = 1/exp(i)(5 log(r) k)
  • if S ∩T=∅, in r rounds S’=T’=∅

Fact 1 Fact 2 |messagei| ≤ 5k log(r) k / 2i

slide-40
SLIDE 40

Our bound: Rr(DISJk)≤O(k log(r) k)

Run r rounds

➡ If S’=T’=∅, declare DISJOINT ➡ Otherwise, declare INTERSECT

  • pi = 1/exp(i)(5 log(r) k)
  • if S ∩T=∅, in r rounds S’=T’=∅

Fact 1 Fact 2 |messagei| ≤ 5k log(r) k / 2i |messagei| ≤ ∏

pi-2t+1 |S| log 1/pi

k exp(i-1) exp(i-3) ≤ log exp(i) For i>3, ≤ k / 2i

t=1 i/2

slide-41
SLIDE 41

The lower bound

slide-42
SLIDE 42

Exists-equal problem

  • Stronger lower bound: easier problem

exists-equal (EE)

slide-43
SLIDE 43

Exists-equal problem

  • Stronger lower bound: easier problem

exists-equal (EE)

  • Let x,y∈[t]n
slide-44
SLIDE 44

Exists-equal problem

  • Stronger lower bound: easier problem

exists-equal (EE)

  • Let x,y∈[t]n
  • EEn(x, y) = 1 iff ∃i, xi=yi

t

slide-45
SLIDE 45

Exists-equal problem

  • Stronger lower bound: easier problem

exists-equal (EE)

  • Let x,y∈[t]n

3 4 4 5 1 2 3 4 2 4

x: y:

  • EEn(x, y) = 1 iff ∃i, xi=yi

t

slide-46
SLIDE 46

Exists-equal problem

  • Stronger lower bound: easier problem

exists-equal (EE)

  • Let x,y∈[t]n

3 4 4 5 1 2 3 4 2 4

x: y: So EE(x,y)=1

  • EEn(x, y) = 1 iff ∃i, xi=yi

t

slide-47
SLIDE 47

Exists-equal problem

  • EEn is OR of n equality problems over [t].
  • EEn = DISJn

t tn t

slide-48
SLIDE 48

Exists-equal problem

3 4 4 5 1 2 3 4 2 4

  • EEn is OR of n equality problems over [t].
  • EEn = DISJn

t tn t

slide-49
SLIDE 49

Exists-equal problem

3 4 4 5 1 2 3 4 2 4

  • EEn is OR of n equality problems over [t].
  • EEn = DISJn
  • =

t tn t

slide-50
SLIDE 50

Exists-equal problem

3 4 4 5 1 2 3 4 2 4

  • EEn is OR of n equality problems over [t].
  • EEn = DISJn
  • =

t tn t

slide-51
SLIDE 51

Exists-equal problem

3 4 4 5 1 2 3 4 2 4

  • EEn is OR of n equality problems over [t].
  • EEn = DISJn
  • =

|S| = |T| = n S, T ⊂ [nt]

t tn t

slide-52
SLIDE 52

The lower bound

  • Show: any r-round EE protocol communicates

Ω(n log(r) n) bits.

slide-53
SLIDE 53

The lower bound

  • Show: any r-round EE protocol communicates

Ω(n log(r) n) bits.

  • EE is OR of n equality problems, so decompose to

subproblems

slide-54
SLIDE 54

The lower bound

  • Show: any r-round EE protocol communicates

Ω(n log(r) n) bits.

  • EE is OR of n equality problems, so decompose to

subproblems

  • Show Ω(log(r) n) lower bound per subproblem
slide-55
SLIDE 55

The lower bound

  • Show: any r-round EE protocol communicates

Ω(n log(r) n) bits.

  • EE is OR of n equality problems, so decompose to

subproblems

  • Show Ω(log(r) n) lower bound per subproblem
  • Equality has O(1) bit communication protocol
slide-56
SLIDE 56

The lower bound

  • Show: any r-round EE protocol communicates

Ω(n log(r) n) bits.

  • EE is OR of n equality problems, so decompose to

subproblems

  • Show Ω(log(r) n) lower bound per subproblem
  • Equality has O(1) bit communication protocol
slide-57
SLIDE 57

The lower bound

  • Show: any r-round EE protocol communicates

Ω(n log(r) n) bits.

  • EE is OR of n equality problems, so decompose to

subproblems

  • Show Ω(log(r) n) lower bound per subproblem
  • Equality has O(1) bit communication protocol
  • We get super-linear increase in complexity!
slide-58
SLIDE 58

The lower bound

By Yao’s lemma, sufficient to consider deterministic protocols with random input

slide-59
SLIDE 59

The lower bound

By Yao’s lemma, sufficient to consider deterministic protocols with random input

๏ Set t=4n

slide-60
SLIDE 60

The lower bound

By Yao’s lemma, sufficient to consider deterministic protocols with random input

๏ Set t=4n ๏ Hard distribution ν: (x,y)∈ [t]n x [t]n, uniform random

slide-61
SLIDE 61

The lower bound

By Yao’s lemma, sufficient to consider deterministic protocols with random input

๏ Set t=4n ๏ Hard distribution ν: (x,y)∈ [t]n x [t]n, uniform random ๏ 3/4 ⩽ Pr(x,y)~ν[EE(x,y)=0] = (1-1/(4n))n ⩽ e-1/4 < 0.78

slide-62
SLIDE 62

The lower bound

By Yao’s lemma, sufficient to consider deterministic protocols with random input

๏ Set t=4n ๏ Hard distribution ν: (x,y)∈ [t]n x [t]n, uniform random ๏ 3/4 ⩽ Pr(x,y)~ν[EE(x,y)=0] = (1-1/(4n))n ⩽ e-1/4 < 0.78 ๏ ⇒ Any 0-round protocol has 0.22 error

slide-63
SLIDE 63

Round elimination

Thm: No r-round C = O(n log(r) n)-bits protocol for EEn

t

Induction on r:

slide-64
SLIDE 64

Round elimination

Thm: No r-round C = O(n log(r) n)-bits protocol for EEn

t

Induction on r: r-round C=𝛇n log(r) n-bits protocol for EEn

t

slide-65
SLIDE 65

Round elimination

Thm: No r-round C = O(n log(r) n)-bits protocol for EEn

t

Induction on r:

construct r-round C=𝛇n log(r) n-bits protocol for EEn

t

slide-66
SLIDE 66

Round elimination

Thm: No r-round C = O(n log(r) n)-bits protocol for EEn

t

Induction on r:

construct (r-1)-round 10C-bits protocol for EEn’ where n’=n/B and t’=t/B

B=2C/n

t’

r-round C=𝛇n log(r) n-bits protocol for EEn

t

slide-67
SLIDE 67

Round elimination

Observe 10C=𝛑(n’ log(r-1) n’) Contradicts induction hypothesis! Thm: No r-round C = O(n log(r) n)-bits protocol for EEn

t

Induction on r:

construct (r-1)-round 10C-bits protocol for EEn’ where n’=n/B and t’=t/B

B=2C/n

t’

r-round C=𝛇n log(r) n-bits protocol for EEn

t

slide-68
SLIDE 68

Round elimination

Observe 10C=𝛑(n’ log(r-1) n’) Contradicts induction hypothesis! Thm: No r-round C = O(n log(r) n)-bits protocol for EEn

t

Induction on r:

construct Note: t’=4n’ (r-1)-round 10C-bits protocol for EEn’ where n’=n/B and t’=t/B

B=2C/n

t’

r-round C=𝛇n log(r) n-bits protocol for EEn

t

slide-69
SLIDE 69

Fixing the first message

x1 x2 x3 x4 x5 ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ xtn

slide-70
SLIDE 70

Fixing the first message

x1 x2 x3 x4 x5 ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ xtn

slide-71
SLIDE 71

Fixing the first message

  • Throw x0, Pry[P(x0,y) ≠EE(x0,y)] ≥2δ

x1 x2 x3 x4 x5 ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ xtn

slide-72
SLIDE 72

Fixing the first message

  • Throw x0, Pry[P(x0,y) ≠EE(x0,y)] ≥2δ

x1 x2 x3 x4 x5 ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ xtn ⋮ ⋮ ⋮ ⋮ ⋮ ⋮

slide-73
SLIDE 73

Fixing the first message

  • Throw x0, Pry[P(x0,y) ≠EE(x0,y)] ≥2δ

x1 x2 x3 x4 x5 ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ xtn ⋮ ⋮ ⋮ ⋮ ⋮ ⋮

  • At most half the inputs are gone
slide-74
SLIDE 74

Fixing the first message

  • Throw x0, Pry[P(x0,y) ≠EE(x0,y)] ≥2δ

x1 x2 x3 x4 x5 ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ xtn ⋮ ⋮ ⋮ ⋮ ⋮ ⋮

  • At most half the inputs are gone
  • Fix the most frequent message m*
slide-75
SLIDE 75

Fixing the first message

  • Throw x0, Pry[P(x0,y) ≠EE(x0,y)] ≥2δ

x1 x2 x3 x4 x5 ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ xtn ⋮ ⋮ ⋮ ⋮ ⋮ ⋮

  • At most half the inputs are gone
  • Fix the most frequent message m*
  • Let S⊆[t]n be inputs on which m* is sent
slide-76
SLIDE 76

Fixing the first message

  • Throw x0, Pry[P(x0,y) ≠EE(x0,y)] ≥2δ

x1 x2 x3 x4 x5 ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ xtn ⋮ ⋮ ⋮ ⋮ ⋮ ⋮

  • At most half the inputs are gone
  • Fix the most frequent message m*
  • Let S⊆[t]n be inputs on which m* is sent
slide-77
SLIDE 77

Fixing the first message

  • Throw x0, Pry[P(x0,y) ≠EE(x0,y)] ≥2δ

x1 x2 x3 x4 x5 ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ xtn ⋮ ⋮ ⋮ ⋮ ⋮ ⋮

  • At most half the inputs are gone
  • Fix the most frequent message m*
  • Let S⊆[t]n be inputs on which m* is sent
slide-78
SLIDE 78

Fixing the first message

  • Throw x0, Pry[P(x0,y) ≠EE(x0,y)] ≥2δ

x1 x2 x3 x4 x5 ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ xtn ⋮ ⋮ ⋮ ⋮ ⋮ ⋮

  • At most half the inputs are gone
  • Fix the most frequent message m*
  • Let S⊆[t]n be inputs on which m* is sent
  • C-bits protocol ⇒ ≤2C different messages
slide-79
SLIDE 79

Fixing the first message

  • Throw x0, Pry[P(x0,y) ≠EE(x0,y)] ≥2δ

x1 x2 x3 x4 x5 ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ xtn ⋮ ⋮ ⋮ ⋮ ⋮ ⋮

  • At most half the inputs are gone
  • Fix the most frequent message m*
  • Let S⊆[t]n be inputs on which m* is sent
  • C-bits protocol ⇒ ≤2C different messages
  • |S| ≥tn/2C+1
slide-80
SLIDE 80

S S S S S

r-round protocol for EEn ⇒ (r-1)-round protocol for

Randomness

u

B = 2C/n

v u,v ∈ [t’]n’ n’ = n/B uB vB X Y

repeat B times

[t]n

t t’

slide-81
SLIDE 81

S S S S S

r-round protocol for EEn ⇒ (r-1)-round protocol for

Randomness

u

B = 2C/n

v u,v ∈ [t’]n’ n’ = n/B uB vB X Y

repeat B times

[t]n

t t’

slide-82
SLIDE 82

S S S S S

r-round protocol for EEn ⇒ (r-1)-round protocol for

Randomness

u

B = 2C/n

v u,v ∈ [t’]n’ n’ = n/B uB vB X Y

repeat B times

X’ [t]n

t t’

slide-83
SLIDE 83

S S S S S

r-round protocol for EEn ⇒ (r-1)-round protocol for

Randomness

u

B = 2C/n

v u,v ∈ [t’]n’ n’ = n/B uB vB X Y

repeat B times

X’ [t]n

t t’

①EE(u,v)≈EE(X’, Y)

slide-84
SLIDE 84

S S S S S

r-round protocol for EEn ⇒ (r-1)-round protocol for

Randomness

u

B = 2C/n

v u,v ∈ [t’]n’ n’ = n/B uB vB X Y

repeat B times

X’ [t]n

t t’

①EE(u,v)≈EE(X’, Y) ② Y | X’ is ≈uniform

slide-85
SLIDE 85

S S S S S

r-round protocol for EEn ⇒ (r-1)-round protocol for

Randomness

u

B = 2C/n

v u,v ∈ [t’]n’ n’ = n/B uB vB X Y

repeat B times

X’ [t]n

t t’

①EE(u,v)≈EE(X’, Y) ③ X’∈S ⇒ first message fixed ② Y | X’ is ≈uniform

slide-86
SLIDE 86

Protocol for EEn’ :

t’

slide-87
SLIDE 87

Protocol for EEn’ : Given u,v ∈ [t’]n’

t’

slide-88
SLIDE 88

Protocol for EEn’ : Given u,v ∈ [t’]n’

2 3 1 4 2 1 4 2 3 4 1 3

u: v:

t’

slide-89
SLIDE 89

Protocol for EEn’ : Given u,v ∈ [t’]n’ Recall n’ = n/B

2 3 1 4 2 1 4 2 3 4 1 3

u: v:

B=2C/n

t’

slide-90
SLIDE 90

Protocol for EEn’ : Given u,v ∈ [t’]n’ Recall n’ = n/B

2 3 1 4 2 1 4 2 3 4 1 3

u: v:

Repeat each coordinate B times

B=2C/n

t’

slide-91
SLIDE 91

Protocol for EEn’ : Given u,v ∈ [t’]n’ Recall n’ = n/B

2 3 1 4 2 1 4 2 3 4 1 3

u: v:

Repeat each coordinate B times

B=2C/n

t’

2 2 2 2 3 3 3 3 1 1 1 1 4 4 4 4 2 2 2 2 1 1 1 1 4 4 4 4 2 2 2 2 3 3 3 3 4 4 4 4 1 1 1 1 3 3 3 3

uB: vB:

slide-92
SLIDE 92

Protocol for EEn’ : Given u,v ∈ [t’]n’ Recall n’ = n/B

2 3 1 4 2 1 4 2 3 4 1 3

u: v:

Repeat each coordinate B times

Pick a random function fi: [t’]↦[t] for each i∈[n]

B=2C/n

t’

2 2 2 2 3 3 3 3 1 1 1 1 4 4 4 4 2 2 2 2 1 1 1 1 4 4 4 4 2 2 2 2 3 3 3 3 4 4 4 4 1 1 1 1 3 3 3 3

uB: vB:

slide-93
SLIDE 93

Protocol for EEn’ : Given u,v ∈ [t’]n’ Recall n’ = n/B

2 3 1 4 2 1 4 2 3 4 1 3

u: v:

Repeat each coordinate B times

Pick a random function fi: [t’]↦[t] for each i∈[n]

B=2C/n

t’

2 2 2 2 3 3 3 3 1 1 1 1 4 4 4 4 2 2 2 2 1 1 1 1 4 4 4 4 2 2 2 2 3 3 3 3 4 4 4 4 1 1 1 1 3 3 3 3

uB: vB:

4 2 7 9 2 7 3 6 2 5 2 6 9 3 1 7 6 7 8 4 2 6 9 3 6 3 1 3 8 7 1 5 4 7 8 9 9 3 1 7 2 1 3 6 9 2 2 1

: Phantom match

slide-94
SLIDE 94

Protocol for EEn’ : Given u,v ∈ [t’]n’ Recall n’ = n/B

2 3 1 4 2 1 4 2 3 4 1 3

u: v:

Repeat each coordinate B times

Pick a random function fi: [t’]↦[t] for each i∈[n] Permute coordinates randomly

B=2C/n

t’

2 2 2 2 3 3 3 3 1 1 1 1 4 4 4 4 2 2 2 2 1 1 1 1 4 4 4 4 2 2 2 2 3 3 3 3 4 4 4 4 1 1 1 1 3 3 3 3

uB: vB:

4 2 7 9 2 7 3 6 2 5 2 6 9 3 1 7 6 7 8 4 2 6 9 3 6 3 1 3 8 7 1 5 4 7 8 9 9 3 1 7 2 1 3 6 9 2 2 1

: Phantom match

slide-95
SLIDE 95

Protocol for EEn’ : Given u,v ∈ [t’]n’ Recall n’ = n/B

2 3 1 4 2 1 4 2 3 4 1 3

u: v:

3 2 8 1 5 9 2 3 3 7 6 3 9 7 6 9 7 7 4 2 5 9 5 8 1 8 3 1 7 3 9 3 1 1 2 1 2 7 5 3 1 7 6 3 7 9 7 3

Repeat each coordinate B times

Pick a random function fi: [t’]↦[t] for each i∈[n] Permute coordinates randomly

B=2C/n

t’

2 2 2 2 3 3 3 3 1 1 1 1 4 4 4 4 2 2 2 2 1 1 1 1 4 4 4 4 2 2 2 2 3 3 3 3 4 4 4 4 1 1 1 1 3 3 3 3

uB: vB:

4 2 7 9 2 7 3 6 2 5 2 6 9 3 1 7 6 7 8 4 2 6 9 3 6 3 1 3 8 7 1 5 4 7 8 9 9 3 1 7 2 1 3 6 9 2 2 1

: Phantom match

slide-96
SLIDE 96

Protocol for EEn’ : Given u,v ∈ [t’]n’ Recall n’ = n/B

2 3 1 4 2 1 4 2 3 4 1 3

u: v:

3 2 8 1 5 9 2 3 3 7 6 3 9 7 6 9 7 7 4 2 5 9 5 8 1 8 3 1 7 3 9 3 1 1 2 1 2 7 5 3 1 7 6 3 7 9 7 3

Repeat each coordinate B times

Pick a random function fi: [t’]↦[t] for each i∈[n] Permute coordinates randomly

X: Y:

B=2C/n

t’

2 2 2 2 3 3 3 3 1 1 1 1 4 4 4 4 2 2 2 2 1 1 1 1 4 4 4 4 2 2 2 2 3 3 3 3 4 4 4 4 1 1 1 1 3 3 3 3

uB: vB:

4 2 7 9 2 7 3 6 2 5 2 6 9 3 1 7 6 7 8 4 2 6 9 3 6 3 1 3 8 7 1 5 4 7 8 9 9 3 1 7 2 1 3 6 9 2 2 1

: Phantom match

slide-97
SLIDE 97

Step 2: Rounding to S

Randomness

u

B = 2C/n

v u,v ∈ [t’]n’ n’ = n/B S S S S S uB vB X Y

repeat B times

[t]n ①EE(u,v)≈EE(X’, Y) ③ X’∈S ⇒ first message fixed ② Y | X’ is ≈uniform

slide-98
SLIDE 98

Step 2: Rounding to S

Randomness

u

B = 2C/n

v u,v ∈ [t’]n’ n’ = n/B S S S S S uB vB X Y

repeat B times

X’ [t]n ①EE(u,v)≈EE(X’, Y) ③ X’∈S ⇒ first message fixed ② Y | X’ is ≈uniform

slide-99
SLIDE 99
  • Nx= S ∩ Ball(X, n(1-1/B))
  • X’: uniform in NX

S

Nx

slide-100
SLIDE 100
  • Nx= S ∩ Ball(X, n(1-1/B))
  • X’: uniform in NX ③ X’∈S ⇒ first message fixed

S

Nx

slide-101
SLIDE 101
  • Nx= S ∩ Ball(X, n(1-1/B))
  • X’: uniform in NX ③ X’∈S ⇒ first message fixed

S

Nx

slide-102
SLIDE 102

3 2 8 1 5 9 2 3 3 7 6 3 9 7 6 9 7 7 4 2 5 9 5 8 1 8 3 1 7 3 9 3 1 1 2 1 2 7 5 3 1 7 6 3 7 9 7 3

X: Y:

  • Nx= S ∩ Ball(X, n(1-1/B))
  • X’: uniform in NX ③ X’∈S ⇒ first message fixed

S

Nx

slide-103
SLIDE 103

3 2 8 1 5 9 2 3 3 7 6 3 9 7 6 9 7 7 4 2 5 9 5 8 1 8 3 1 7 3 9 3 1 1 2 1 2 7 5 3 1 7 6 3 7 9 7 3

X: Y:

  • Nx= S ∩ Ball(X, n(1-1/B))
  • X’: uniform in NX ③ X’∈S ⇒ first message fixed

S

Nx

slide-104
SLIDE 104

3 2 8 1 5 9 2 3 3 7 6 3 9 7 6 9 7 7 4 2 5 9 5 8 1 8 3 1 7 3 9 3 1 1 2 1 2 7 5 3 1 7 6 3 7 9 7 3

X: Y:

  • Nx= S ∩ Ball(X, n(1-1/B))
  • X’: uniform in NX

2 4 7 2 5 1 4 6 3 7 2 1 8 3 3 8 2 9 6 2 5 9 5 8 1 8 3 1 7 3 9 3 1 1 2 1 2 7 5 3 1 7 6 3 7 9 7 3

X’: Y:

Correlated randomness from Nx

③ X’∈S ⇒ first message fixed

S

Nx

slide-105
SLIDE 105

3 2 8 1 5 9 2 3 3 7 6 3 9 7 6 9 7 7 4 2 5 9 5 8 1 8 3 1 7 3 9 3 1 1 2 1 2 7 5 3 1 7 6 3 7 9 7 3

X: Y:

  • Nx= S ∩ Ball(X, n(1-1/B))
  • X’: uniform in NX

2 4 7 2 5 1 4 6 3 7 2 1 8 3 3 8 2 9 6 2 5 9 5 8 1 8 3 1 7 3 9 3 1 1 2 1 2 7 5 3 1 7 6 3 7 9 7 3

X’: Y: ③ X’∈S ⇒ first message fixed

S

Nx

slide-106
SLIDE 106

3 2 8 1 5 9 2 3 3 7 6 3 9 7 6 9 7 7 4 2 5 9 5 8 1 8 3 1 7 3 9 3 1 1 2 1 2 7 5 3 1 7 6 3 7 9 7 3

X: Y:

  • Nx= S ∩ Ball(X, n(1-1/B))
  • X’: uniform in NX

2 4 7 2 5 1 4 6 3 7 2 1 8 3 3 8 2 9 6 2 5 9 5 8 1 8 3 1 7 3 9 3 1 1 2 1 2 7 5 3 1 7 6 3 7 9 7 3

X’: Y: About one match survives, so EE(u,v)=1 ⇒ EE(X’, Y)=1 ③ X’∈S ⇒ first message fixed

S

Nx

slide-107
SLIDE 107

3 2 8 1 5 9 2 3 3 7 6 3 9 7 6 9 7 7 4 2 5 9 5 8 1 8 3 1 7 3 9 3 1 1 2 1 2 7 5 3 1 7 6 3 7 9 7 3

X: Y:

  • Nx= S ∩ Ball(X, n(1-1/B))
  • X’: uniform in NX

2 4 7 2 5 1 4 6 3 7 2 1 8 3 3 8 2 9 6 2 5 9 5 8 1 8 3 1 7 3 9 3 1 1 2 1 2 7 5 3 1 7 6 3 7 9 7 3

X’: Y: About one match survives, so EE(u,v)=1 ⇒ EE(X’, Y)=1 Since t=4n, Pr[Phantom] < 1/4, so EE(u,v)=0 ⇒ EE(X’,Y)=0 ③ X’∈S ⇒ first message fixed

S

Nx

slide-108
SLIDE 108

3 2 8 1 5 9 2 3 3 7 6 3 9 7 6 9 7 7 4 2 5 9 5 8 1 8 3 1 7 3 9 3 1 1 2 1 2 7 5 3 1 7 6 3 7 9 7 3

X: Y:

  • Nx= S ∩ Ball(X, n(1-1/B))
  • X’: uniform in NX

2 4 7 2 5 1 4 6 3 7 2 1 8 3 3 8 2 9 6 2 5 9 5 8 1 8 3 1 7 3 9 3 1 1 2 1 2 7 5 3 1 7 6 3 7 9 7 3

X’: Y: About one match survives, so EE(u,v)=1 ⇒ EE(X’, Y)=1 Since t=4n, Pr[Phantom] < 1/4, so EE(u,v)=0 ⇒ EE(X’,Y)=0 ①EE(u,v)≈EE(X’, Y) ③ X’∈S ⇒ first message fixed

S

Nx

slide-109
SLIDE 109

3 2 8 1 5 9 2 3 3 7 6 3 9 7 6 9 7 7 4 2 5 9 5 8 1 8 3 1 7 3 9 3 1 1 2 1 2 7 5 3 1 7 6 3 7 9 7 3

X: Y:

  • Nx= S ∩ Ball(X, n(1-1/B))
  • X’: uniform in NX

2 4 7 2 5 1 4 6 3 7 2 1 8 3 3 8 2 9 6 2 5 9 5 8 1 8 3 1 7 3 9 3 1 1 2 1 2 7 5 3 1 7 6 3 7 9 7 3

X’: Y: About one match survives, so EE(u,v)=1 ⇒ EE(X’, Y)=1 Since t=4n, Pr[Phantom] < 1/4, so EE(u,v)=0 ⇒ EE(X’,Y)=0 ①EE(u,v)≈EE(X’, Y)

③ X’∈S ⇒ first message fixed

S

Nx

slide-110
SLIDE 110

② Y | X’ is ≈uniform Show:

slide-111
SLIDE 111
  • This is needed as Pr[P(X’,Y)≠EE(X,Y)]≤2δ
  • nly if

Y | X’ is uniform ② Y | X’ is ≈uniform Show:

slide-112
SLIDE 112
  • This is needed as Pr[P(X’,Y)≠EE(X,Y)]≤2δ
  • nly if

Y | X’ is uniform

We show H(Y | X’) = n log t - O(1)

② Y | X’ is ≈uniform Show:

slide-113
SLIDE 113

Entropy loss comes from coordinates in L Entropy loss = |L|log t - H(XL | L, X’) ≤ |L|log t - (|L|/n)H(X | X’)

3 2 8 1 5 9 2 3 3 7 6 3 9 7 6 9 7 7 4 2 5 9 5 8 1 8 3 1 7 3 9 3 1 1 2 1 2 7 5 3 1 7 6 3 7 9 7 3

X: Y: L: Set of , intentional matches of X, Y

slide-114
SLIDE 114

(Han-Shearer) Entropy loss comes from coordinates in L Entropy loss = |L|log t - H(XL | L, X’) ≤ |L|log t - (|L|/n)H(X | X’)

3 2 8 1 5 9 2 3 3 7 6 3 9 7 6 9 7 7 4 2 5 9 5 8 1 8 3 1 7 3 9 3 1 1 2 1 2 7 5 3 1 7 6 3 7 9 7 3

X: Y: L: Set of , intentional matches of X, Y

slide-115
SLIDE 115

Want to lower bound H(X’ | X)

S S S S S S

slide-116
SLIDE 116

Want to lower bound H(X’ | X) i.e., log |Nx| for uniform random x

S S S S S S

slide-117
SLIDE 117

Want to lower bound H(X’ | X) i.e., log |Nx| for uniform random x

Recall Nx= S ∩ Ball(X, n(1-1/B))

S S S S S S

slide-118
SLIDE 118

Want to lower bound H(X’ | X) i.e., log |Nx| for uniform random x

Recall Nx= S ∩ Ball(X, n(1-1/B))

S S S S S S

Nx

slide-119
SLIDE 119

Want to lower bound H(X’ | X) i.e., log |Nx| for uniform random x

Recall Nx= S ∩ Ball(X, n(1-1/B))

S S S S S S

Nx

slide-120
SLIDE 120

S S S S S S

What is the worst case S?

slide-121
SLIDE 121

S S S S S S

What is the worst case S?

slide-122
SLIDE 122

S S S S S S

Nx

What is the worst case S?

slide-123
SLIDE 123

S S S S S S

Nx

What is the worst case S?

slide-124
SLIDE 124

S S S S S S

Nx

What is the worst case S?

slide-125
SLIDE 125

What is the worst case S?

S

slide-126
SLIDE 126

What is the worst case S?

S

Nx

slide-127
SLIDE 127

What is the worst case S?

S

Nx

slide-128
SLIDE 128

What is the worst case S?

S

Nx

  • This intuition is correct even in

high dimensions

slide-129
SLIDE 129

What is the worst case S?

S

Nx

  • This intuition is correct even in

high dimensions

  • Even for the Hamming distance
slide-130
SLIDE 130

An isoperimetric inequality

  • n [t]n

Conjecture: Let S⊆[t]n, |S| = kn (k < t). Then

E[log |B(x, d) ∩ S|] ≥ E[log |B(x, d) ∩ [k]n|]

where: x: uniform random B(x,d): radius-d Hamming ball around x log 0: -1.

slide-131
SLIDE 131

An isoperimetric inequality

  • n [t]n

Conjecture: Let S⊆[t]n, |S| = kn (k < t). Then

E[log |B(x, d) ∩ S|] ≥ E[log |B(x, d) ∩ [k]n|]

where: x: uniform random B(x,d): radius-d Hamming ball around x log 0: -1. Theorem (informal): For any S⊆[t]n, ∃ I ⊂ [n], |I|=n/5, the conjecture is true in the projected space

slide-132
SLIDE 132

Review

slide-133
SLIDE 133

Review

  • Tight round / communication tradeoff for DISJ
slide-134
SLIDE 134

Review

  • Tight round / communication tradeoff for DISJ
  • Super-sum for OR of equality: R(EEn) = ω(n) . R(EQ)
slide-135
SLIDE 135

Review

  • Tight round / communication tradeoff for DISJ
  • Super-sum for OR of equality: R(EEn) = ω(n) . R(EQ)
  • New perspective for direct sum: Isoperimetric

considerations

slide-136
SLIDE 136

Conjecture: Let S⊆[t]n, |S| = kn (k < t). Then

E[log |B(x, d) ∩ S|] ≥ E[log |B(x, d) ∩ [k]n|]

where: x: uniform random B(x,d): radius-d Hamming ball around x log 0: -1.

Thank You!