Communication vs. Computation

Abstract.We initiate a study of tradeoffs between communication and computation in well-known communication models and in other related models. The fundamental question we investigate is the following: Is there a computational task that exhibits a strong tradeoff behavior between the amount of communication and the amount of time needed for local computation?Under various standard assumptions, we exhibit Boolean functions that show strong tradeoffs between communication and time complexity in the following scenarios:Finally, we study a time-degree tradeoff problem that arises in arithmetization of Boolean functions, and relate it to time-communication tradeoff questions in multi-party communication complexity and cryptography.Two-party communication complexity.We exhibit a polynomial time computable Boolean function that has a low randomized communication complexity, while any communication-efficient (randomized) protocol for this function requires a super polynomial amount of local computation. In the case of deterministic two-party protocols, we show a similar result relative to a random oracle.Query complexity.We exhibit a polynomial-time computable Boolean function that can be computed by querying a few bits of its input, but where any such query-efficient scheme requires a super-polynomial amount of computation.Property testing.We exhibit a polynomial-time decidable property that can be tested (i.e., strings which have the property can be distinguished from ones that are far from the property) by querying a few bits of the input, but where any such query-efficient tester requires a super-polynomial amount of computation.

[1]  Andrew Chi-Chih Yao,et al.  How to generate and exchange secrets , 1986, 27th Annual Symposium on Foundations of Computer Science (sfcs 1986).

[2]  Leslie G. Valiant,et al.  NP is as easy as detecting unique solutions , 1985, STOC '85.

[3]  Andrew Chi-Chih Yao,et al.  Some complexity questions related to distributive computing(Preliminary Report) , 1979, STOC.

[4]  Leslie G. Valiant,et al.  NP is as easy as detecting unique solutions , 1985, STOC '85.

[5]  Leonid A. Levin,et al.  A hard-core predicate for all one-way functions , 1989, STOC '89.

[6]  Carsten Lund,et al.  Algebraic methods for interactive proof systems , 1992, JACM.

[7]  Martin Tompa,et al.  Communication-Space Tradeoffs for Unrestricted Protocols , 1994, SIAM J. Comput..

[8]  Oded Goldreich,et al.  Foundations of Cryptography: Basic Tools , 2000 .

[9]  Joan Feigenbaum,et al.  Locally random reductions: Improvements and applications , 1997, Journal of Cryptology.

[10]  Silvio Micali,et al.  The Round Complexity of Secure Protocols (Extended Abstract) , 1990, STOC 1990.

[11]  Zvi Galil,et al.  Lower bounds on communication complexity , 1984, STOC '84.

[12]  Silvio Micali,et al.  The round complexity of secure protocols , 1990, STOC '90.

[13]  Ran Canetti,et al.  Bounds on tradeoffs between randomness and communication complexity , 1990, Proceedings [1990] 31st Annual Symposium on Foundations of Computer Science.

[14]  Avi Wigderson,et al.  Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.

[15]  Leslie G. Valiant,et al.  Fast Parallel Computation of Polynomials Using Few Processors , 1983, SIAM J. Comput..

[16]  Lance Fortnow,et al.  Arithmetization: A new method in structural complexity theory , 2005, computational complexity.

[17]  Satyanarayana V. Lokam,et al.  Communication Complexity of Simultaneous Messages , 2003, SIAM J. Comput..

[18]  Adi Shamir,et al.  The discrete log is very discreet , 1990, STOC '90.

[19]  Noam Nisan,et al.  Rounds in communication complexity revisited , 1991, STOC '91.

[20]  David Chaum,et al.  Multiparty unconditionally secure protocols , 1988, STOC '88.

[21]  Adi Shamir,et al.  The Discrete Logarithm Modulo a Composite Hides O(n) Bits , 1993, J. Comput. Syst. Sci..

[22]  David Chaum,et al.  Multiparty Unconditionally Secure Protocols (Extended Abstract) , 1988, STOC.

[23]  Joan Feigenbaum,et al.  Security with Low Communication Overhead , 1990, CRYPTO.

[24]  Silvio Micali,et al.  How to play ANY mental game , 1987, STOC.

[25]  Richard J. Lipton,et al.  Multi-party protocols , 1983, STOC.

[26]  Oded Goldreich,et al.  Unbiased Bits from Sources of Weak Randomness and Probabilistic Communication Complexity , 1988, SIAM J. Comput..

[27]  Oded Goldreich,et al.  Foundations of Cryptography: Volume 1, Basic Tools , 2001 .

[28]  Eyal Kushilevitz,et al.  Communication Complexity , 1997, Adv. Comput..