Functional Inversion and Communication Complexity

In this paper, we study the relation between the multi-party communication complexity over various communication topologies and the complexity of inverting functions and/or permutations. In particular, we show that if a function has a ring-protocol or a tree-protocol of communication complexity bounded by H, then there is a circuit of size O(2Hn) which computes an inverse of the function. Consequently, we have proved, although inverting NC0 Boolean circuits is NP-complete, planar NC1 Boolean circuits can be inverted in NC, and hence in polynomial time. In general, NCk planar boolean circuits can be inverted in O(nlog(k-1)n) time. Also from the ring-protocol results, we derive an ?(n log n) lower bound on the VLSI area to layout any one-way functions. Our results on inverting boolean circuits can be extended to invert algebraic circuits over finite rings.One significant aspect of our result is that it enables us to compare the communication power of two topologies. We have proved that on some topologies, no one-way function nor its inverse can be computed with bounded communication complexity.

[1]  S. Teng,et al.  Optimal Tree Contraction in the EREW Model , 1988 .

[2]  Gary L. Miller,et al.  Finding small simple cycle separators for 2-connected planar graphs. , 1984, STOC '84.

[3]  Russell Impagliazzo,et al.  Limits on the provable consequences of one-way permutations , 1988, STOC '89.

[4]  C. Thomborson,et al.  A Complexity Theory for VLSI , 1980 .

[5]  Andrew Chi-Chih Yao,et al.  Theory and application of trapdoor functions , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).

[6]  J. Håstad Computational limitations of small-depth circuits , 1987 .

[7]  Jeffrey C. Lagarias,et al.  One-Way Functions and Circuit Complexity , 1986, Inf. Comput..

[8]  Zhi-Li Zhang,et al.  Efficiently inverting bijections given by straight line programs , 1990, Proceedings [1990] 31st Annual Symposium on Foundations of Computer Science.

[9]  R. Tarjan,et al.  A Separator Theorem for Planar Graphs , 1977 .

[10]  John Rompel,et al.  One-way functions are necessary and sufficient for secure signatures , 1990, STOC '90.

[11]  Gary L. Miller,et al.  Parallel tree contraction and its application , 1985, 26th Annual Symposium on Foundations of Computer Science (sfcs 1985).

[12]  Johan Håstad,et al.  Almost optimal lower bounds for small depth circuits , 1986, STOC '86.

[13]  Andrew Chi-Chih Yao,et al.  Some complexity questions related to distributive computing(Preliminary Report) , 1979, STOC.

[14]  Judea Pearl,et al.  Heuristics : intelligent search strategies for computer problem solving , 1984 .

[15]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[16]  Mario Szegedy Functions with bounded symmetric communication complexity and circuits with mod m gates , 1990, STOC '90.