Multiparty Protocols, Pseudorandom Generators for Logspace, and Time-Space Trade-Offs

Let f(x1, …, xk) be a Boolean function that k parties wish to collaboratively evaluate, where each xi is a bit-string of length n. The ith party knows each input argument except xi; and each party has unlimited computational power. They share a blackboard, viewed by all parties, where they can exchange messages. The objective is to minimize the number of bits written on the board. We prove lower bounds of the form Ω(n · c−k), for the number of bits that need to be exchanged in order to compute some (explicitly given) polynomial time computable functions. Our bounds hold even if the parties only wish to have a 1 % advantage at guessing the value of f on random inputs. The lower bound proofs are based on discrepancy upper bounds for specific functions over “cylinder intersection” sets. These results may be of independent interest. We give several applications of the lower bounds. The first application is a pseudorandom generator for Logspace. We explicitly construct (in polynomial time pseudorandom sequences of length n from a random seed of length exp(c √log n) that no Logspace Turing machine will be able to distinguish from truly random sequences. As a corollary we give an explicit construction of a universal traversal sequence of length exp(exp(c√log n)) for arbitrary undirected graphs on n vertices. We then apply the multiparty protocol lower bounds to derive several new time-space trade-offs. We give a tight time-space trade-off of the form TS =Θ(n2), for general, k-head Turing machines; the bounds hold for a function that can be computed in linear time and constant space by a k + 1-head Turing machine. We also give a new length-width trade-off for oblivious branching programs; in particular, our bound implies new lower bounds on the size of arbitrary branching programs, or on the size of Boolean formulas (over an arbitrary finite base). Using universal hashing, Nisan has recently constructed considerably improved random generators for Logspace, with the implication of shorter explicit universal traversal sequences. The time-space and related trade-off results mentioned above are not affected by this development.

[1]  Noam Nisan On Read-Once vs. Multiple Access to Randomness in Logspace , 1993, Theor. Comput. Sci..

[2]  Andrew Chi-Chih Yao,et al.  Some complexity questions related to distributive computing(Preliminary Report) , 1979, STOC.

[3]  Saharon Shelah,et al.  Nondeterministic Linear-Time Tasks May Require Substantially Nonlinear Deterministic Time in the Case of Sublinear Work Space , 1988, STOC.

[4]  Alfred V. Aho,et al.  On notions of information transfer in VLSI circuits , 1983, STOC.

[5]  Noam Nisan,et al.  Pseudorandom bits for constant depth circuits , 1991, Comb..

[6]  Vince Grolmusz,et al.  The BNS Lower Bound for Multi-Party Protocols in Nearly Optimal , 1994, Inf. Comput..

[7]  Andrew C. Yao,et al.  Lower bounds by probabilistic arguments , 1983, 24th Annual Symposium on Foundations of Computer Science (sfcs 1983).

[8]  Allan Borodin,et al.  Two applications of complementation via inductive counting , 1988, [1988] Proceedings. Structure in Complexity Theory Third Annual Conference.

[9]  Andrew Chi-Chih Yao,et al.  ON ACC and threshold circuits , 1990, Proceedings [1990] 31st Annual Symposium on Foundations of Computer Science.

[10]  J. Spencer Probabilistic Methods in Combinatorics , 1974 .

[11]  Oded Goldreich,et al.  Unbiased Bits from Sources of Weak Randomness and Probabilistic Communication Complexity , 1988, SIAM J. Comput..

[12]  N. Linial,et al.  On the cover time of random walks on graphs , 1989 .

[13]  Noam Nisan,et al.  Pseudorandom generators for space-bounded computation , 1992, Comb..

[14]  Mauricio Karchmer Two Time-Space Tradeoffs for Element Distinctness , 1986, Theor. Comput. Sci..

[15]  Donald E. Knuth,et al.  The art of computer programming. Vol.2: Seminumerical algorithms , 1981 .

[16]  Donald E. Knuth The Art of Computer Programming 2 / Seminumerical Algorithms , 1971 .

[17]  Manuel Blum,et al.  How to generate cryptographically strong sequences of pseudo random bits , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).

[18]  Howard J. Karloff,et al.  Universal Traversal Sequences of Length n^O(log n) for Cliques , 1988, Inf. Process. Lett..

[19]  Sorin Istrail,et al.  Polynomial universal traversing sequences for cycles are constructible , 1988, STOC '88.

[20]  Peter Frankl,et al.  Complexity classes in communication complexity theory , 1986, 27th Annual Symposium on Foundations of Computer Science (sfcs 1986).

[21]  Andrew Chi-Chih Yao,et al.  Theory and application of trapdoor functions , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).

[22]  Avi Wigderson,et al.  Deterministic simulation of probabilistic constant depth circuits , 1985, 26th Annual Symposium on Foundations of Computer Science (sfcs 1985).

[23]  Noam Nisan,et al.  On read-once vs. multiple access to randomness in logspace , 1990, Proceedings Fifth Annual Structure in Complexity Theory Conference.

[24]  Richard J. Lipton,et al.  Random walks, universal traversal sequences, and the complexity of maze problems , 1979, 20th Annual Symposium on Foundations of Computer Science (sfcs 1979).

[25]  Umesh V. Vazirani,et al.  Strong communication complexity or generating quasi-random sequences from two communicating semi-random sources , 1987, Comb..

[26]  Noam Nisan,et al.  Pseudorandom generators for space-bounded computations , 1990, STOC '90.

[27]  Noga Alon,et al.  Meanders, Ramsey theory and lower bounds for branching programs , 1986, 27th Annual Symposium on Foundations of Computer Science (sfcs 1986).

[28]  Alan Cobham,et al.  The Recognition Problem for the Set of Perfect Squares , 1966, SWAT.

[29]  W. Schmidt Equations over Finite Fields: An Elementary Approach , 1976 .

[30]  Saharon Shelah,et al.  Nondeterministic linear-time tasks may require substantially nonlinear deterministic time in the case of sublinear work space , 1988, JACM.